text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Programmable Restoration Granularity in
Constraint Programming
Yong Lin and Martin Henz
arXiv:1601.06517v2 [cs.PL] 4 Feb 2016
School of Computing, National University of Singapore, Singapore
{linyong, henz}@comp.nus.edu.sg
Abstract. In most constraint programming systems, a limited number
of search engines is offered while the programming of user-customized
search algorithms requires low-level efforts, which complicates the deployment of such algorithms. To alleviate this limitation, concepts such
as computation spaces have been developed. Computation spaces provide
a coarse-grained restoration mechanism, because they store all information contained in a search tree node. Other granularities are possible, and
in this paper we make the case for dynamically adapting the restoration
granularity during search. In order to elucidate programmable restoration granularity, we present restoration as an aspect of a constraint programming system, using the model of aspect-oriented programming. A
proof-of-concept implementation using Gecode shows promising results.
1
Introduction
Constraint Programming (CP) solves combinatorial problems through constraintbased search, which explores a problem-defined search tree in a certain order.
The exploring of search tree may encounter a failure, which signals a false search
direction. To recover search from such a failure, restoration service is called to
provide an ever visited state to switch search direction.
In CP systems, restoration has been implemented in several manners. Mozart/Oz
system copies each ever accessed state for direct retrieval, in a format of computation space (space for short); Constraint Logic Programming (CLP) systems
such as CHIP [3], clp(FD) [2] and ECLi PSe [1] record state change information
in a trail data strucutre to roll back; Gecode [10] system maintains generated
constraints to recompute [8]; our newly proposed recollection [6] stores constraint
propagation affected variable domains to recollect.
For all above implemented techniques, they differ on the granularity of the
stored information. Copying is coarse-grained since a computation space encapsulates all speculative computation structures; on the other hand, recomputation does not store any specific data structures, but the instructions committed
for guiding search. Both trailing and recollection are finer-grained than space
copying since they store only part information of a state. Actually, the granularity of a restored technique determines its advantages and limitations. If one
can program to synthetically use these techniques in a system, more efficient
2
Yong Lin and Martin Henz
restoration is expected; an early effort was conducted by the proposal of computation space, which enables user to place state copies in the search tree as they
intend. However, as we have claimed, space is coarse-grained, while recomputation is only aware of committed constraints. Therefore, we advocate that it is
a non-trivial study to include other finer-grained techniques to program a more
powerful restoration scheme.
In this paper, we propose to program restoration granularities, aiming at
improving constraint programming system performance. The initial effort has
been conducted by integrating coarse-grained copying, finer-grained recollection
and constraint-aware recomputation. Especially, we propose to program restoration granularity in aspect-oriented programming for a more modular and flexible
restoration implementation. The rest of this paper is organized as follows: Section 2 briefly goes through the notions in CP systen implementation; in Section 3,
we present a prototype of programming restoration granularity ; subsequently,
in Section 4, we employ the concept aspect to illustrate the landscape of more
modular and flexible restoration implementation, taking Gecode as an example;
last, we conclude in Section 5.
2
Basics
In CP systems, constraint propagation is demonstrated insufficient to solve a
problem when it reaches a fix point. Search then comes into play; it branches
on the fix point to generate constraints and then commits one of generated constraints to proceed. This interleaving of constraint propagation and branching
creates a search tree, where each node is a computation state. In such a search
tree, branches are constraints, internal nodes are fix points and leaf nodes are
either solutions or search failures. A search failure indicates a false search direction, which requires the restoration of a previously visited internal state to
switch search directions.
In constraint programming systems, state restoration can be implemented in
several ways. Trailing-based method stores how one states was modified to reach
other conjunct state in a trail structure to roll back previous performed operations [4]; this method is efficient for the problems imposing weak propagation [7].
However, trailing couples tightly with propagation engine and search facilities,
which potentially limits parallel exploration. Copying approach duplicates each
ever accessed fix point state and restoration is a simple direct state retrieval. This
technique causes neither runtime nor memory issues for small and medium size
problem. As for large problems, copying may introduce memory management
penalty on account of its substantially occupied memory [7]. Recomputation
barely maintains previously committed constraints so that it can recompute a
state. This approach consumes rather limited memory, but its runtime may be
dragged significantly if a problem is computation expensive. Our proposed recollection memorizes the variables that were changed in fix point reasoning steps
at a moderate extra memory investment; it conducts restoration by updating
a higher level state, using the stored variables. For all these restoration tech-
Programmable Restoration Granularity in Constraint Programming
3
niques, we can observe that their ways to conduct restoration are determined
by the granularity of information they have stored during search. Specifically,
copying is coarse-grained since it stores all information of states; by contrast,
trailing and recollection are finer-grained. As for recomputation, it merely stores
the meta-information (constraints) that was used to instruct search directions.
3
A Prototype
In this section, we would present a proof-of-concept that programs restoration
granularity. The organization of this section is as follows: Section 3.1 highlights the traits of a few problem, which spurs our investigation in programming
restoration granularity and we describe the prototype in Section 3.2; evaluation
is conducted in Section 3.3.
3.1
Motivation
A deep search tree may be expanded for solving a hard problem. Table 1 illustrates the search tree statistics of four problems exploring for the first solution,
where the Queens problem is modeled by either a set of disequality constraints
or three global constraints of the “all-different constraints” family (denoted as
Queens-S). In this table, the column failures counts the total number of failures
during search; first signals the tree level where the first search failure emerges,
while peak is the value of the deepest tree level. [1, first ) accumulates the number
of failures occurs between the root and the first level, and [first, peak ] records
the number of failures between first and peak.
Problem
failures first peak [1, first) [first, peak ]
Queens(200)
146,838 164
Queens-S(200)
146,838 164
Knights(22)
19,877 386
Sport-League(22) 1,035
62
200
200
451
249
0
0
0
5
146,838
146,838
19,877
1,030
Table 1. Search Tree Statistics of Problem Search Trees
Although any of restoration techniques is capable of accomplishing its duty
correctly, they respectively exhibit advantage towards certain case, as we have
claimed. From these search tree statistics, we perceive that the emergence of
the first failure can be an important signal for more intensive search failures.
Therefore, if copying is employed as an underlying restoration to support the
solving of these problems, then the space copies maintained between the root
f irst − 1 level cannot contribute at all. This indicates that an ideal restoration
should customize problem search traits.
4
Yong Lin and Martin Henz
3.2
Programming Granularity
To deal with the skewed failure distribution as displayed in Table 1, a straightforward method is storing restoration information of difference granularity as
search proceeds, and restoration then adapt the stored information to conduct
relevant process. We initially program a prototype by integrating copying, recomputation and recollection. In this prototype, we take the search tree level
where the first failure emerges as a border level, which horizontally divides the
search tree into upper and bottom two parts. For search in the upper part of the
search tree, only generated constraints are kept, while neither coarse-grained
state copies nor finer-grained propagation modified variables is stored. When
search explores beyond the border level, both copying and recollection will be
activated to collaborate: the placing of a coarse-grained state copy alternates n
finer-grained recollection explorations (n is configurable and set to eithgt ). Because of this change of information granularity, restoration now need to switch
between different code segment. Specifically, when a state in upper part search
tree is expected, the restoration routine switches to recomputation. When a state
in the bottom part is required, the restoration routine first attempts to recollect
from the nearest state copy; if this effort fails, it then recomputes to restore
the border state first and then update this border state to the requested one
by recollection. We can take an optimization measure by maintaining a border
state copy to avoid the possible recomputation when restoring a bottom state.
Similarly, one can also employ other measures to optimize the recomputation in
upper part.
3.3
Evaluation
We evaluate our programmed prototype over the four problems, where we sought
the motivation to program restoration granularity. Both recomputation and recollection enable adaptive function and set copying distance to eight. The evaluations were conducted on a Intel Core 2 Quad processor PC system, running
an Ubuntu operating system 11.10 with four Gigabyte main memory. We built
our sample on top of Gecode version 3.7.3, which also served as the reference
instance of comparisons. Each collected runtime1 value is an arithmetic mean
of 20 runs with a variation coefficient less than 2%; memory numbers are peak
memory consumption.
We compare the prototype with both adaptive recomputation and adaptive
recollection, and Table 2 depicts the evaluations results. These numbers reveal
that our prototype can significantly save memory than the other two restoration
alternatives; but for Sport-League problem, the memory saving is not as significant, which can be on account of it first failure comes earlier (at level 62 of a tree
with peak depth 249). Meanwhile, Queens problems expose better runtime performances by adaptive recomputation. Nevertheless, it deserves to highlight that
1
We take wall clock time.
Programmable Restoration Granularity in Constraint Programming
Problems
Queens(200)
Queens-S(200)
Knights(22)
Sport-League(22)
5
Recomputation
Recollection
Prototype
Time(ms) Mem(KB) Time(ms) Mem(KB) Time(ms) Mem(KB)
4,330
2,156
1,858
352
25,748
1,485
4,460
7,710
4,578
2,473
1,704
331
28,238
3,974
4,592
7,937
4,601
2,469
1,744
339
6,244
542
2,333
6,109
Table 2. Comparisons of Prototype with Recomputation and Recollection
Knights problem almost halves memory consumption than the other two techniques, while marginally improves its runtime than recomputation. This promising result confirms the opportunities of programming restoration granularity to
seek better performance.
4
Programmability
As mentioned in previous section, the way to implement restoration is actually determined by the granularity of storing information for restoration. This
information is implemented to store by search engine at exploration steps; on
the other hand, restoration is a service provided for search engine. This observation claims that the maintained restoration information cuts across the two
abstractions: search engine and restoration.
In developing applications, the occurrence of crosscutting abstraction is not
rare; transactions, security-related operation, logging etc all exemplify crosscutting abstractions. To facilitate the programming of crosscutting abstraction,
aspect-oriented programming [5](AOP) proposes to encapsulate a crosscutting
abstraction as an aspect. The implementation of an aspect mainly consists of
two tasks: advice and pointcut. An advice is a means of specifying the code to
run at a joint point, where additional behaviors attempt to add in the program;
a pointcut determines the matches of executing specified advice at a joint point.
To program restoration granularity, one should correctly implement the switching between restoration technique code segments. In our prototype, we achieve
the communication between code segments by introducing a signal. However,
this signal couples tightly with a specific program; suppose one redefines the
criteria to switch restoration techniques, the code is quite likely to change, probably drastically. Therefore, it is of great significance to implement a more flexible
and modular design to program restoration granularity, and we claim that programming restoration as an aspect can achieve this design goal.
In this section, we propose to adopt aspect-oriented programming to program
restoration granularity in Gecode system for a modular and flexible implementation. Specifically, Section 4.1 briefly explains the design of search facilities
in Gecode system; In Section 4.2, we discuss the issues related with deploying
aspect in Gecode search facilities.
6
Yong Lin and Martin Henz
4.1
Search Facilities
In the Gecode system, it defines a class of Edge to keep the restoration information of each visited fixpoint; all Edge objects will be pushed into a stack
structure Path by search engine. Program 1 outlines the class declaration of
Edge. In the Edge, the Choice object encapsulates fix point generated two constraints2 , which are respectively represented by 0 and 1; the currently committed
constraint alternative is recorded by the integer variable alternative. Choice object is a compulsory information component in each created Edge object since
it instructs search direction by committing constraint, whereas the space copy
space is optional. Specifically, if search engine wraps a space in each Edge,
then it is a copying-based restoration; if none of Edge stores space copy, it is
a recomputation-based restoration; hybrid variants can be obtained by placing
space copies in Edges occasionally such as adaptive recomputation. In Gecode,
all restoration related services are defined on the structure path, which collects
the Edge objects generated between root and current node.
Program 1 Class Edge
class Edge
{
Space * space;
/* Space copy */
Choice * choice;
/* fixpoint generated Choice */
/* committed choice alternative */
unsigned int altternative;
vector¡int¿ doms;
/* variable domains */
public:
Edge(Space * s, Choice * c, vector¡int¿ doms):
{
alternative = 0;
/* commit to the first alternative */
...
/* other initialization statements */
}
...
}
As we have claimed, space is coarse-grained data, while constraints are metainformation for instructing search. We introduce a finer-grained data structure
dom, which collects the variable domains that were affected in the fix point
reasoning3. This vector contains sufficient information to conduct recollection.
One can also introduce other data structures to further explore other restoration
possibilities.
In Gecode, search engine is constructed by programming on computation
spaces. The space provides an interface status() to trigger internal constraint
propagation, which returns a status value; search engine then switches to the
relevant code segment according to the space status, as depicted in Program2.
If the space return a constraint propagation results of failure, the search engine
2
3
We restrict our discussion on binary search tree
We insist on Finite Domain Integer Domain problems in this discussion
Programmable Restoration Granularity in Constraint Programming
7
first requests to adjust search direction by calling Adjust()4 , and then enter the
code segment where restoration is defined5 .
Program 2 Search Engine
while true do
switch (Status(space))
/* query space status */
case fixpoint :
Choice ch←Choice(space)
/* return solution space */
Push(Edge(ch . . .))
Commit(space, ch)
/* commit a constraint to space */
case solution:
return space
/* return solution space */
case failure:
if not Adjust(. . .) then
break
/* The problem is not solvable */
end if
Restore(. . .) {
Pointcut1
Recomputation code
/* originally programmed recomputation */
Pointcut2 }
end switch
end while
4.2
Restoration as an Aspect
To program in aspect-oriented programming paradigm, it requires support from
the underlying programming language compiler/system. Currently, quite a few
programming languages have implemented AOP, within the language, or as an
external library; AspectC++ [9] has provided a set of extensions to facilitate the
use of AOP in C++. Gecode is an open source constraint programming library
constructed in C++; thus, a following exploration is provisioning restoration
service of Gecode with the aspect-oriented programming paradigm.
To deploy restoration as an aspect, it requires to address the definition of
advice and pointcut. Specifically, we define advice to exploit the information
of a specific granularity so that it can individually, or collaboratively with the
recomputation code, restore ever visited fix point; this collaboration requires
the pointcuts (advice can be matched and applied for execution) either before
and after the orignal recomputation code segment, as illustrated in Program 2.
In our prototype, we place the code of copying and recollection at the place
marked by pointcut2 ; but as we have stressed, we currently use a specific signal
to coordinate the code switching. Thus, we conjecture that a more modular and
flexible restoration can be built by using AOP.
4
5
It will return a Boolean false if another search direction is impossible
Restore() method is not actually defined in search engine, we expose it body in
search engine for facilitating explanation
8
5
Yong Lin and Martin Henz
Conclusion
Restoration is a key component of search facilities in constraint programming
systems; its implementation can significantly impact on the performance and
construction of a search engine. Although the proposal of computation space
facilitates the programming of restoration, it is coarse-grained since a space
encapsulates all data structures of a state in the search tree.
In this paper, we have proposed to program restoration granularity. We implemented such a prototype by integrates coarse-grained copying, finer-grained
recollection and constraint-based recomputation; its evaluation gives promising results. In the prototype, we employed a specific signal to coordinate the
execution of between restoration code segments, which couples tightly with a
program. Thus, we have further propose to provision restoration with aspectoriented programming. The significance of this prospective effort is, on the one
hand, modularizing restoration code segments that implement different techniques while flexing their assemble. On the other hand, it also potentially provides more provisions to construct search engines that run a wide spectrum of
search algorithms.
References
1. Abderrahamane Aggoun, David Chan, Pierre Dufresne, Eamon Falvey, Hugh
Grant, Warwick Harvey, Alexander Herold, Geoffrey Macartney, Micha Meier,
David Miller, et al. Eclipse user manual, 1997.
2. Philippe Codognet and Daniel Diaz. Compiling constraints in clp (fd). The Journal
of Logic Programming, 27(3):185–226, 1996.
3. Mehmet Dincbas, Pascal Van Hentenryck, Helmut Simonis, Abderrahmane Aggoun, Thomas Graf, and Françoise Berthier. The constraint logic programming
language chip. In Proceeding of the International Conference on Fifth Generation
Computer Science FGCS-88, pages 693–702, 1988.
4. Joxan Jaffar and Michael J. Maher. Constraint logic programming: a survey. The
Journal of Logic Programming, pages 503 – 581, 1994. Special Issue: Ten Years of
Logic Programming.
5. Gregor Kiczales, John Lamping, Anurag Mendhekar, Chris Maeda, Cristina Lopes,
Jean-Marc Loingtier, and John Irwin. Aspect-oriented programming. Springer,
1997.
6. Yong Lin.
Prototypical implementation of recollection based on Gecode.
www.comp.nus.edu.sg/~ henz/recollection, May 2013.
7. Christian Schulte. Comparing trailing and copying for constraint programming.
In Proceedings of the 1999 International Conference on Logic Programming, pages
275–289, Cambridge, MA, USA, 1999. Massachusetts Institute of Technology.
8. Christian Schulte. Programming Constraint Services, volume 2302 of Lecture Notes
in Artificial Intelligence. Springer-Verlag, 2002.
9. AspectC++ Project Team. The Homepage of AspectC++. www.aspectc.org,
2012.
10. Gecode Project Team.
Generic COnstraint Development Environment.
www.gecode.org, June 2012.
| 6cs.PL
|
Exploring Spatial Context for 3D Semantic Segmentation of Point Clouds
Francis Engelmann† , Theodora Kontogianni† , Alexander Hermans and Bastian Leibe
Computer Vision Group, Visual Computing Institute
RWTH Aachen University
arXiv:1802.01500v1 [cs.CV] 5 Feb 2018
{engelmann,kontogianni,hermans,leibe}@vision.rwth-aachen.de
Abstract
Deep learning approaches have made tremendous
progress in the field of semantic segmentation over the past
few years. However, most current approaches operate in
the 2D image space. Direct semantic segmentation of unstructured 3D point clouds is still an open research problem. The recently proposed PointNet architecture presents
an interesting step ahead in that it can operate on unstructured point clouds, achieving encouraging segmentation results. However, it subdivides the input points into a grid of
blocks and processes each such block individually. In this
paper, we investigate the question how such an architecture
can be extended to incorporate larger-scale spatial context.
We build upon PointNet and propose two extensions that
enlarge the receptive field over the 3D scene. We evaluate
the proposed strategies on challenging indoor and outdoor
datasets and show improved results in both scenarios.
Input-Level Context
Figure 1: We explore mechanisms to extend the spatial context for 3D semantic segmentation of point clouds.
can be obtained from visual SLAM approaches operating on
the vehicle’s cameras [13]. Finding approaches that can directly operate on point cloud data is highly desirable, since
it avoids costly preprocessing and format conversion steps.
However, the question what is the best network architecture
to process unstructured 3D point clouds is still largely open.
In this paper, we take inspiration from the recent PointNet work by Qi et al. [25], which currently defines the state
of the art in 3D semantic segmentation. PointNet learns a
higher dimensional spatial feature representation for each
3D point and then aggregates all the points within a small
3D volume (typically an occupancy grid cell) in order to
bring in some form of 3D neighborhood context. However,
this neighborhood context is very restricted, as each grid
cell is processed independently.
In this paper, we investigate possible mechanisms to incorporate context into a point cloud processing architecture.
We focus on spatial context, which has been identified as
being very important for semantic segmentation [19, 24].
We introduce two mechanisms to add spatial context to an
existing PointNet. The first mechanism incorporates neighborhood information by processing input data from multiple scales or multiple adjacent regions together (inputlevel context). The second mechanism operates on the estimated point descriptors and aims at consolidating them by
exchanging information over a larger spatial neighborhood
1. Introduction
Semantic segmentation is an important capability for
intelligent vehicles, such as autonomous cars or mobile
robots. Identifying the semantic meaning of the observed
3D structure around the vehicle is a prerequisite for solving
subsequent tasks such as navigation or reconstruction [5, 6].
Consequently, the problem has attracted a lot of attention,
and notable successes have been achieved with the help of
deep learning techniques. However, most state-of-the-art
semantic segmentation approaches operate on 2D images,
which naturally lend themselves to processing with Convolutional Neural Networks (CNNs) [16, 3, 28, 22].
Processing unstructured 3D point clouds, such as those
obtained from LiDAR or stereo sensors, is a much harder
problem, and it is only recently that first successful deep
learning approaches have been proposed for this task [18,
12, 31, 25]. Such point clouds can be obtained from LiDAR sensors mounted on top of a recording vehicle or they
† Both
Output-Level Context
authors contributed equally.
1
2. Related Work
Unstructured Point Clouds. A varied number of sensors and setups exist which help to obtain unstructured point
clouds: areal data from airborne laser scanners, laser scanners mounted on dynamic setups in a push-broom configuration [17], rotating lasers e.g. Velodyne [8], or static lasers
[9]. Additionally, indoor spaces can be scanned using devices such as the Microsoft Kinect [21] or Matterport cameras [1]. All these devices produce point clouds of different
quality and density. We apply our method to indoor data
from [1] and to synthetic urban outdoor data from [7].
Traditional Methods. Hackel et al. [10] use traditional
random forest classifiers with 3D features (without color).
Their method is based on eigenvalues and eigenvectors of
covariance tensors created by the nearest neighbors of the
points. Their main contribution is an efficient approximate
nearest neighbors computation at different scales. Munoz
et al. [20] follow a similar approach but replace the random
forest classifier with an associative Markov network. Random forest classifiers are also used in [32] to classify data
from 2D images and 3D point clouds, which they later fuse.
Similarly, Xu et al. [30] fuse camera and LiDAR sensor
data. Xiong et al. [29] propose a sequential parsing procedure that learns the spatial relationships of objects. Lai et
al. [15] introduce a hierarchical sparse coding technique for
learning features from synthetic data. Vosselman et al. [27]
combine multiple segmentation and post-processing methods to achieve useful point cloud segmentations.
Deep-learning Methods. In a deep learning context,
point clouds can be represented in a regular volumetric grid
in order to apply 3D convolutions [18, 12]. Alternatively,
3D points can be mapped to a 2D representation followed
by 2D convolutions [26]. In [2], the authors are performing 2D convolutions in 2D snapshots of a 3D point cloud
and then project the labels back to 3D space. In [23] a deep
learning framework learns semantic segmentation by tracking point clouds. Yi et al. [31] use spectral CNNs on 3D
models represented as shape graphs for shape part segmentation. Recent methods operate directly on raw point clouds
with KD-trees [14] or fully convolutional layers [25].
MLP
Point
Features
M
1 x D’
Global
Feature
S
C
MLP
NxM
N x D’
NxD
(output-level context). For both mechanisms, we explore
several possible realizations and compare them experimentally. As our results show, both mechanisms improve semantic segmentation quality.
Contributions. The key contributions of our work can
be summarized as follows: (1) We present two mechanisms
that can be used to incorporate spatial context into semantic 3D point cloud segmentation. (2) We show how these
mechanisms can be incorporated into the PointNet pipeline.
(3) We verify experimentally that our proposed extensions
achieve improved results on challenging indoor and outdoor
datasets.
N x D+D’
Figure 2: Simplified PointNet Architecture. In this work,
we build upon the PointNet architecture for semantic segmentation. In short, it computes a global feature which
summarizes a set of input points. Specifically, the network
takes N points as input, applies a series of multi-layerperceptrons transformations and aggregates the point features by max pooling them into a global feature. Global
and local features are concatenated and the per point class
scores are returned. (MLP): Multi-Layer-Perception, (M):
Max-Pool, (S): Vertical Stack, (C): Concatenate. See text
and Qi et al. [25] for more details.
3. Method
In this section we start by reviewing the PointNet model,
then we introduce our mechanisms of extending context and
finish by describing our two exemplary architectures.
3.1. PointNet
PointNet [25] is a deep neural network that, when used
for semantic segmentation, takes as input a point cloud and
outputs the per point semantic class labels. First, it splits
a point cloud into 3D blocks, then it takes N points inside a block and after a series of Multi-Layer-Perceptrons
(MLP) per point, the points are mapped into a higher dimensional space D0 , these are called local point-features.
Max-pooling is applied to aggregate information from all
the points resulting in a common global-feature invariant to
input permutations. The global-feature is then concatenated
with all the point-features. After another series of MLPs
these combined features are used to predict the M output
class scores. Figure 2 shows a simplified model.
Caveats. The global-features in PointNet summarize
the context of a single block (block-feature), as a result the
aggregated information is passed only among points inside
the same block.
Context outside a block is equally important and could help
make more informed class label predictions. Therefore
we introduce two mechanisms to add context: input-level
context – which operates directly on the input point clouds
– and output-level context – which consolidates the output
from the input-level context.
3.2. Input-Level Context
In this straightforward addition, we increase the context of the network by considering a group of blocks simultaneously instead of one individual block at a time as
done in PointNet. Context is shared among all blocks in
a group. These groups of blocks are selected either from
NxD
Input-Level Context
MLP (64,128)
Output Score
Multi-Scale
Block Feature
M
NxD
MLP (64,128)
M
NxD
MLP (64,128)
M
C
S
C
O=256
O=128
MLP (M)
:block feature
Consolidation Unit (CU)
NxO
Multi-Scale Blocks
same position
different scales
NxM
N x 128+384
1 x 384
MLP (O)
N x 2zO
1xO
M
S
C
M
: max pool
S
: stack
C
: concatenate
Figure 3: Architecture with multi-scale input blocks and consolidation units (MS-CU). The network takes as input three
blocks from multiple scales, each one containing N D-dimensional points. Separately, for each scale, it learns a blockfeature similarly to the PointNet mechanism. The concatenated block-features are appended to the input-features and then
transformed by a sequence of consolidation units (see Section 3.3). The network outputs per point scores. Shaded fields
represent block-features.
the same position but at multiple different scales (MultiScale Blocks, see Figure 3, left) or from neighboring cells
in a regular grid (Grid Blocks, see Figure 4, left). For each
input block, we compute a block-feature using the mechanism from PointNet. For the multi-scale version, we train a
block-descriptor for each scale individually to obtain scaledependent block-features. In the case of grid blocks, all
block features are computed by a shared single-scale blockdescriptor. In the end, both approaches output a set of
block-features corresponding to the input blocks.
3.3. Output-Level Context
At this stage, we further consolidate the block-features
obtained from the previous stage. Here, we differ between
two consolidation approaches:
Consolidation Units (CU) consume a set of point features,
transform them into a higher dimensional space using
MLPs and apply max-pooling to generate a common
block-feature which is again concatenated with each of the
high dimensional input features (see Figure 3, blue box).
This procedure is similar to the block-feature mechanism
of PointNet. The key point is that CUs can be chained together into a sequence CUs forming a deeper network. The
intuition behind this setup is as follows: In the beginning
each point sees only its own features. After appending the
block-features, each point is additionally informed about
the features of its neighboring points. By applying CUs
multiple times, this shared knowledge is reinforced.
Recurrent Consolidation Units (RCU) are the second type of context consolidation we employ. RCUs
take as input a sequence of block-features originating
from spatially nearby blocks and return a sequence of
corresponding updated block-features. The core idea
is to create block-features that take into consideration
neighboring blocks as well. In more detail, RCUs are
implemented as RNNs, specifically GRUs [4], which are
a simpler variation of standard LSTMs [11]. GRUs have
the capability to learn long range dependencies. That range
can either be over time (as in speech recognition) or over
space as in our case. The cells of the unrolled GRU are
connected in an unsynchronized many-to-many fashion
(see Figure 4, blue box). This means that the updated
block-features are returned only after the GRU has seen the
whole input sequence of block-features. Intuitively, GRU
retain relevant information about the scene in their internal
memory and update it according to new observations.
We use this memory mechanism to consolidate and share
the information across all input blocks. For example,
the decision about whether a point belongs to a chair is
changed if the network remembers that it has seen a table
further down in the room.
In the following, we describe two exemplary architectures which combine the previously introduced components. For those, we provide a detailed evaluation and report
improved results in Section 4.
3.4. Multi-Scale (MS) Architecture
The full MS architecture is displayed in Figure 3. The
learned block-features from the multi-scale blocks, (see
Section 3.2) are concatenated into one multi-scale blockfeature. This multi-scale block-feature is further concatenated with the transformed input point-features and passed
through a series of CUs (see Section 3.3). Applying a final
MLP results in output scores for each input point.
Specific for this architecture is the sampling procedure to
select the positions of the multi-scale blocks: We randomly
pick a D-dimensional point from the input point cloud as
the center of the blocks and we group together N randomly
selected points that fall within a specified radius. This procedure is repeated at the same point for multiple radii.
Output Score
Input-Level Context
NxM
M
shared
…
M
MLP (128,64)
shared
…
MLP (128,64)
M
shared
…
MLP (128,64)
M
NxD
NxD
MLP (128,64)
NxD
NxD
S
Grid Blocks
different positions
same scale
1 x 64
1 x 64
1 x 64
1 x 64
1 x 64
GRU-RNN
1 x 64
1 x 64
1 x 64
S
S
S
S
…
…
…
C
MLP (M)
C
MLP (M)
C
MLP (M)
C
MLP (M)
shared
shared
shared
Recurrent Consolidation Unit (RCU)
:block feature
GRU RNN (unrolled)
M
: max pool
S
: stack
C
: concatenate
Figure 4: Architecture with grid input blocks and a recurrent consolidation unit (GB-RCU). The network takes as
input four blocks from a grid structure, each one containing N D-dimensional points. It then learns the block-features
using the same MLP weights for each block. All block-features are passed through a recurrent consolidation unit (see
Section 3.3) which shares the spatial context among all blocks and returns updated block-features. The updated blockfeatures are appended to the input-features together with the original block-features and used to compute the output per point
scores. Shaded fields represent block-features. Some skip-connections are omitted for clarity.
3.5. Grid (G) Architecture
Figure 4 shows the pipeline of the architecture with grid
input blocks. It consists of the following components: The
input level context is a group of four blocks from a 2x2
grid-neighborhood (see Section 3.2) is fed into a series
of MLPs that transform the point features, with weights
shared among all blocks. These block-features are passed
to an RCU that updates the individual block-features with
common context from all neighboring blocks. The updated block-features are then concatenated with the original
block-features. They are then used, along with the local features, for class predictions. After a series of fully connected
layers the output of class scores is computed for each point.
4. Experiments
For experimental evaluation, we compare our two architectures with PointNet [25], the current state-of-the-art
semantic segmentation method directly operating on point
clouds. We produce quantitative results for our models and
the baseline on two challenging datasets: Stanford LargeScale 3D Indoor Spaces (S3DIS) [1] and on Virtual KITTI
(vKITTI) [7]. Additionally, we provide qualitative results
on point clouds obtained from a Velodyne HDL-64E LiDAR scanner from the KITTI dataset [8]. We will now describe these datasets in more detail.
Stanford Large Scale 3D Indoor Scenes. This dataset
is composed of 6 different large scale indoor areas, mainly
conference rooms, personal offices and open spaces. It contains dense 3D point clouds scanned using a Matterport
camera. Each point is labeled with one of the 13 semantic
classes listed in Table 1. Using the reference implementation of PointNet, we were able to reproduce the results reported by Qi et al. [25], see Table 4. Throughout the paper,
we follow the same evaluation protocol used in [25], which
is a 6-fold cross validation over all the areas.
Virtual KITTI. Due to the lack of semantically annotated large-scale outdoor datasets, we rely on the photorealistic synthetic vKITTI dataset which closely mimics the
real-world KITTI dataset. It consists of 5 different monocular video sequences in urban settings, fully annotated with
depth and pixel-level semantic labels. In total there are
13 semantic class, listed in Table 2. For our purposes, we
project the given 2D depth into 3D space to obtain semantically annotated 3D point clouds. Conveniently, this procedure results in point clouds that resemble the varying density of real world point clouds obtained by Velodyne LiDAR
scanners (see Figure 5). For test and training, we split the
original sequences into 6 non-overlapping subsequences.
The final train-test sets are created by choosing point clouds
from each subsequence at regular time-intervals. For evaluation, we also follow the 6-fold cross validation protocol.
4.1. Evaluation Measures
As in [25], we evaluate on the intersection over union
(IoU), the average per class accuracy and overall accuracy.
Intersection over union is computed as:
IoU =
TP
TP + FP + FN
(1)
where TP is the number of true positives, FP the number of
false positives and FN the number of false negatives.
4.2. Quantitative Results
In this section, we analyze the effectiveness of the inputblock schemes and the consolidation units exemplary on the
two previously introduced models. As input features, we
differentiate between geometry (XYZ) and geometry with
color (XYZ+RGB).
Geometry with Color. First, we compare the gridblocks in combination with a recurrent consolidation block
(G+RCU) to the original PointNet. Using the same evaluation setup as described in [25] we are able to show improved
results over PointNet, see Table 4 and Table 1. This proves
our hypothesis that RCU are able to convey context among
blocks and thus improving results. During training, each
room is split into blocks of 1x1 m on the ground plane.
Each block extends over the whole room height. Neighboring blocks are overlapping by 0.5 meters in both directions. We select four blocks simultaneously from a 2x2
grid-neighborhood (see Figure 4, left). Each block contains
4096 points. The unrolled GRU is 8 cells long (4 input, 4
output). It’s memory size is 64. During testing, the room is
split into non-overlapping blocks and evaluated on all 2x2
groups of blocks. Each block is evaluated only once.
Next, we take a look at the multi-scale input block with
consolidation units (MS-CU) model. To build the multiscale blocks, we follow the process described in Section 3.4.
As radii, we choose [0.25, 0.5, 1.0] m. As distance metric
we choose the Chebyshev-distance which generates axisaligned rectangular blocks. The middle scale block is equal
to the PointNet block regarding shape and size.
By using sampling (necessary for the multi-scale block
construction), we diverge from the previous training procedure so we re-run all experiments under these new conditions.
We validate the influence of each of the architecture’s
components by adding them one-by-one to our pipeline and
evaluating after each step, see Table 4 and Table 1. First,
we only consider the input-level context i.e the multi-scale
block feature (MS) as input to our pipeline while skipping
the consolidation units. This shows some performance benefits over PointNet but not as much as one would expect
Figure 6: Qualitative results on laser point clouds.
Dataset: Velodyne HDL-64E laser scans from KITTI Raw
[8]. We trained our model on vKITTI point clouds without
color and applied it on real-world laser point clouds. So far,
only classes like road, building and car give decent results.
considering the enlarged input context. Next, we take only
single-scale input blocks and add one consolidation unit
(SS+CU(1)). The results show that the CU outperforms the
MS input blocks. It also shows that CUs provide a simple
technique to boost the network’s performance. Finally, we
combine both the MS blocks and the CU while appending
another CU to the network (MS+CC(2)). This full model is
depicted in Figure 3.
Geometry only.
Until now, each input point
was described by a 9-dimensional feature vector
[X, Y, Z, R, G, B, X 0 , Y 0 , Z 0 ] where [X, Y, Z] are the
spatial coordinates of a point, [R, G, B] its color and
[X 0 , Y 0 , Z 0 ] the normalized coordinated based on the size
of the environment, see [25] for further details. Without
doubt, color is a very strong input feature in the context
of semantic segmentation. In this section, we pose the
question what will happen if no color information is
available like it is the case with point clouds obtained from
laser scanners. To simulate the missing colors, we simply
discard the color information from the input feature and
re-run the experiments. Table 3 and 2 show the obtained
results. See caption for discussion of the results.
4.3. Qualitative Results
We present qualitative results of our models applied to
indoor scenarios in Figure 7 and outdoor results in Figure ??
along with a short discussion. Additionally, we applied our
pre-trained geometry-only model (vKITTI) to real-world
laser data. The results are shown in Figure 6 and Figure ??.
5. Conclusion
Figure 5: We train our network on synthetic point clouds
generated from vKITTI [7] (left) and apply it onto realworld Velodyne LiDAR point clouds (right). The structure
and the varying density are comparable.
In this work, we investigated the question how to incorporate spatial context into a neural network architecture for
3D semantic segmentation. Building upon PointNet, we
proposed two extension (Input-level context and Outputlevel context) which we successfully applied onto indoor
and outdoor datasets. Still, numerous other combinations
remain possible. The full exploration of the design space is
left for future work.
Floo
Wal
l
Bea
m
Colu
mn
Win
dow
Doo
r
Tab
le
Cha
ir
Sofa
Boo
Boa
rd
Clut
ter
kcas
e
Ceil
i ng
*PointNet [25]
*MS
*MS + RCU
*SS + CU(1)
*MS + CU(2)
43.5
44.4
45.5
45.9
47.8
81.5
82.2
83.6
88.6
88.6
86.7
86.9
86.9
92.6
95.8
64.8
64.2
67.5
66.3
67.3
29.4
33.8
40.5
36.2
36.9
16.3
22.8
17.1
23.6
24.9
39.1
43.3
37.0
47.1
48.6
48.1
52.0
48.8
51.2
52.3
52.5
51.0
53.9
50.2
51.9
42.5
38.6
42.3
36.9
45.1
5.4
9.2
6.8
12.6
10.6
37.6
36.1
39.7
33.7
36.8
30.4
23.6
32.8
22.7
24.7
31.4
33.7
34.2
35.3
37.5
PointNet [25]
G + RCU
47.6
49.7
88.0
90.3
88.7
92.1
69.3
67.9
42.4
44.7
23.1
24.2
47.5
52.3
51.6
51.2
54.1
58.1
42.0
47.4
9.6
6.9
38.2
39.0
29.4
30.0
35.2
41.9
r
mean IoU
S3DIS Dataset [1]
rd
Boa
Clut
te
26.4
30.0
12.5
16.8
25.5
31.2
Car
Van
3.5
5.3
0.7
2.2
1.5
3.6
25.1
43.0
3.4
13.3
r
kcas
Boo
3.7
10.6
11.6
18.7
Truck
2.8
9.4
Sofa
Traffi
c
3.6
12.4
42.4
46.1
Misc
Traffi
cSign
49.9
58.4
ir
ail
Guar
dR
17.7
44.0
Cha
Tab
le
51.6
47.2
Pole
Doo
r
35.3
36.7
Light
Win
dow
29.3
28.8
mn
Colu
11.9
14.6
19.6
25.6
Road
76.4
87.1
m
32.9
38.9
Bea
vKITTI Dataset [7]
*PointNet [25]
*MS + CU(2)
37.0
37.7
ing
57.9
58.8
Build
Wal
l
87.2
94.9
ion
84.0
86.5
Vege
tat
mean IoU
17.9
26.4
Floo
r
40.0
43.0
Tree
*PointNet [25]
*MS + CU(2)
mean IoU
Ceil
S3DIS Dataset [1]
Terra
in
ing
e
Table 1: IoU per semantic class. S3DIS dataset with XYZ-RGB input features. We compare our models with different
components against the original PointNet baseline. By adding different components, we can see an improvement of mean
IoU. We obtain state-of-the-art results in mean IoU and all individual class IoU. Entries marked with * use random sampling
for input block selection instead of discrete positions on a regular grid.
Table 2: IoU per semantic class. S3DIS and vKITTI datasets both with XYZ input features (no color). Our methods
not only outperform PointNet consistently on two datasets, the improvements in mean IoU are also more considerable when
no color is available. This suggests that our network architectures are able to learn improved geometric features and are more
robust to varying point densities as they occur in the outdoor vKITTI dataset.
mean
IoU
overall
accuracy
avg. class
accuracy
S3DIS Dataset [1] – no RGB
*PointNet [25]
*MS + CU(2)
40.0
43.0
72.1
75.4
52.9
55.2
vKITTI Dataset [7] – no RGB
*PointNet [25]
*MS + CU(2)
17.9
26.4
63.3
73.2
29.9
40.9
Table 3: S3DIS and vKITTI datasets with only XYZ input
features, without RGB. We show improved results on indoor
(S3DIS) and outdoor (vKITTI) datasets. Our presented mechanisms are even more important when no color is available.
S3DIS Dataset [1]
XYZ-RGB
mean
IoU
overall
accuracy
avg. class
accuracy
*PointNet [25]
*MS
*MS + RCU
*SS + CU(1)
*MS + CU(2)
43.5
44.4
45.5
45.9
47.8
75.0
75.5
77.2
77.8
79.2
55.5
57.6
57.2
57.7
59.7
PointNet [25]
G + RCU
47.6
49.7
78.5
81.1
66.2
66.4
Table 4: S3DIS Dataset with XYZ-RGB input features. Comparison of different context expansion techniques on input- and
output-level (see Sections 3.2–3.3). MS: Multi-Scale, SS: SingleScale, G: Grid, CU: Consolidation Unit, RCU: Recurrent Consolidation Unit. Entries marked with * use random sampling for input
block selection instead of discrete positions on a regular grid.
Ceiling
Floor
XYZ-RGB Input
Wall
Beam
Column
PointNet[25]
Window
Door
Table
Ours, G-RCU
Chair
Sofa
Bookcase
Ours, MS-CU(2)
Board
Clutter
Ground Truth
Figure 7: Indoor qualitative results. Dataset: S3DIS [1] with XYZ-RGB input features. From left to right: input point
cloud, baseline method PointNet, our results using the G-RCU model (see Figure 4), our results using the MS-CU(2) model
(see Figure 3), ground truth semantic labels. Our models produce more consistent and less noisy labels.
Terrain Tree Vegetation Building Road Car Truck Van GuardRail TrafficSign TrafficLight Pole Misc
Ours, MS-CU(2)
PointNet [25]
Ground Truth
Figure 8: Outdoor qualitative results. Dataset: Virtual KITTI [7]. Results were obtained using only XYZ coordinates as input, no color information was used. Left: baseline method PointNet. Center: our results using the MS-CU model
as illustrated in Figure 3. Right: ground truth semantic labels. The outputs of our method are less fragmented (cars, houses)
and finer structures like street lights and poles are recognized better.
Tree
Grass
Topiary
Ground
Obstacle
Unknown
6. Acknowledgment
We are grateful to our colleagues for providing valuable
feedback on the paper and having fruitful discussions, especially with Umer Rafi and Paul Voigtlaender. This work
was supported by the ERC Starting Grant project CVSUPER (ERC-2012-StG-307432).
Ground truth
Labels: top
Our prediction
Labels: below
Terrain Tree Vegetation GuardRail TrafficSign TrafficLight
Figure 9: Qualitative results on 3DRMS’17 Challenge.
We trained our model on vKITTI point clouds without
color and applied it to the 3DRMS laser data. Training and
test datasets do not have the same semantic labels. Despite
that, common classes like trees are successfully segmented
and plausible ones are given otherwise (e.g. terrain instead
of grass, guardrail instead of obstacle).
References
[1] I. Armeni, O. Sener, A. R. Zamir, H. Jiang, I. Brilakis,
M. Fischer, and S. Savarese. 3D Semantic Parsing of LargeScale Indoor Spaces. In CVPR, 2016.
[2] A. Boulch, B. L. Saux, and N. Audebert. Unstructured Point
Cloud Semantic Labeling Using Deep Segmentation Networks. In Eurographics Workshop on 3D Object Retrieval,
2017.
[3] L. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L.
Yuille. DeepLab: Semantic Image Segmentation with Deep
Convolutional Nets, Atrous Convolution, and Fully Connected CRFs. arXiv preprint arXiv:1606.00915, 2016.
[4] K. Cho, B. van Merrienboer, Ç. Gülçehre, F. Bougares,
H. Schwenk, and Y. Bengio. Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine
Translation. In EMNLP, 2014.
[5] F. Engelmann, J. Stückler, and B. Leibe. Joint object pose
estimation and shape reconstruction in urban street scenes
using 3D shape priors. In Proc. of the German Conference
on Pattern Recognition (GCPR), 2016.
[6] F. Engelmann, J. Stückler, and B. Leibe. SAMP: shape and
motion priors for 4d vehicle reconstruction. In WACV, 2017.
[7] A. Gaidon, Q. Wang, Y. Cabon, and E. Vig. Virtual Worlds as
Proxy for Multi-Object Tracking Analysis. In CVPR, 2016.
[8] A. Geiger, P. Lenz, C. Stiller, and R. Urtasun. Vision meets
Robotics: The KITTI Dataset. IJRR, 32(11), 2013.
[9] T. Hackel, N. Savinov, L. Ladicky, J. D. Wegner,
K. Schindler, and M. Pollefeys. Semantic3D.net: A new
Large-scale Point Cloud Classification Benchmark. arXiv
preprint arXiv:1704.03847, 2017.
[10] T. Hackel, J. D. Wegner, and K. Schindler. Fast Semantic
Segmentation of 3D Points Clouds with Strongly Varying
Density. ISPRS, 3(3), 2016.
[11] S. Hochreiter and J. Schmidhuber. Long Short-Term Memory. Neural computation, 9(8), 1997.
[12] J. Huang and S. You. Point cloud labeling using 3D Convolutional Neural Network. In ICPR, 2016.
[13] A. Kasyanov, F. Engelmann, J. Stückler, and B. Leibe.
Keyframe-Based Visual-Inertial Online SLAM with Relocalization. In IROS, 2017.
[14] R. Klokov and V. S. Lempitsky. Escape from Cells: Deep
Kd-Networks for The Recognition of 3D Point Cloud Models. arXiv preprint arXiv:1704.01222, 2017.
[15] K. Lai, L. Bo, and D. Fox. Unsupervised feature learning for
3D scene labeling. In ICRA, 2014.
[16] J. Long, E. Shelhamer, and T. Darrell. Fully Convolutional
Networks for Semantic Segmentation. In CVPR, 2015.
[17] W. Maddern, G. Pascoe, C. Linegar, and P. Newman. 1 Year,
1000km: The Oxford RobotCar Dataset. IJRR, 36(1), 2017.
[18] D. Maturana and S. Scherer. VoxNet: A 3D Convolutional
Neural Network for Real-Time Object Recognition. In IROS,
2015.
[19] R. Mottaghi, X. Chen, X. Liu, N.-G. Cho, S.-W. Lee, S. Fidler, R. Urtasun, and A. Yuille. The Role of Context for
Object Detection and Semantic Segmentation in the Wild. In
CVPR, 2014.
[20] D. Munoz, N. Vandapel, and M. Hebert. Directional Associative Markov Network for 3-D Point Cloud Classification.
In 3DPVT, 2008.
[21] P. K. Nathan Silberman, Derek Hoiem and R. Fergus. Indoor
segmentation and support inference from rgbd images. In
ECCV, 2012.
[22] H. Noh, S. Hong, and B. Han. Learning Deconvolution Network for Semantic Segmentation. In ICCV, 2015.
[23] P. Ondruska, J. Dequaire, D. Zeng Wang, and I. Posner. Endto-End Tracking and Semantic Segmentation Using Recurrent Neural Networks. In RSS, Workshop on Limits and Potentials of Deep Learning in Robotics, 2016.
[24] T. Pohlen, A. Hermans, M. Mathias, and B. Leibe. FullResolution Residual Networks for Semantic Segmentation in
Street Scenes. In CVPR, 2017.
[25] C. R. Qi, H. Su, K. Mo, and L. J. Guibas. PointNet: Deep
Learning on Point Sets for 3D Classification and Segmentation. In CVPR, 2017.
[26] C. R. Qi, H. Su, M. Niener, A. Dai, M. Yan, and L. J. Guibas.
Volumetric and Multi-View CNNs for Object Classification
on 3D Data. In CVPR, 2016.
[27] G. Vosselman. Point Cloud Segmentation for Urban Scene
Classification. ISPRS, 1, 2013.
[28] Z. Wu, C. Shen, and A. van den Hengel. High-performance
Semantic Segmentation Using Very Deep Fully Convolutional Networks. arXiv preprint arXiv:1604.04339, 2016.
[29] X. Xiong, D. Munoz, J. A. Bagnell, and M. Hebert. 3-D
Scene Analysis via Sequenced Predictions over Points and
Regions. In ICRA, 2011.
[30] P. Xu, F. Davoine, J. Bordes, H. Zhao, and T. Denoeux. Information Fusion on Oversegmented Images: An Application
for Urban Scene Understanding. In MVA, 2013.
[31] L. Yi, H. Su, X. Guo, and L. J. Guibas. SyncSpecCNN: Synchronized Spectral CNN for 3D Shape Segmentation. arXiv
preprint arXiv:1612.00606, 2016.
[32] R. Zhang, S. A. Candra, K. Vetter, and A. Zakhor. Sensor Fusion for Semantic Segmentation of Urban Scenes. In ICRA,
2015.
| 1cs.CV
|
arXiv:1505.01034v2 [math.OC] 12 Apr 2016
A probabilistic interpretation of set-membership filtering:
application to polynomial systems through polytopic bounding ⋆
Alessio Benavoli a , Dario Piga b ,
a
b
IDSIA Dalle Molle Institute for Artificial Intelligence SUPSI-USI, Manno, Switzerland.
IMT Institute for Advanced Studies Lucca, Piazza San Francesco 19, 55100 Lucca, Italy.
Abstract
Set-membership estimation is usually formulated in the context of set-valued calculus and no probabilistic calculations are necessary.
In this paper, we show that set-membership estimation can be equivalently formulated in the probabilistic setting by employing sets of
probability measures. Inference in set-membership estimation is thus carried out by computing expectations with respect to the updated
set of probability measures P as in the probabilistic case. In particular, it is shown that inference can be performed by solving a particular
semi-infinite linear programming problem, which is a special case of the truncated moment problem in which only the zero-th order
moment is known (i.e., the support). By writing the dual of the above semi-infinite linear programming problem, it is shown that, if the
nonlinearities in the measurement and process equations are polynomial and if the bounding sets for initial state, process and measurement
noises are described by polynomial inequalities, then an approximation of this semi-infinite linear programming problem can efficiently be
obtained by using the theory of sum-of-squares polynomial optimization. We then derive a smart greedy procedure to compute a polytopic
outer-approximation of the true membership-set, by computing the minimum-volume polytope that outer-bounds the set that includes all
the means computed with respect to P.
Key words: State estimation; Filtering; Set-membership estimation; set of probability measures; Sum-of-squares polynomials.
1 Introduction
Inferring the value of the state of a dynamical system at the
various time instants is a classical problem in control and estimation theory. The state is estimated based on noisy signal
observations and on a state transition model, which in turn
is affected by two sources of uncertainty (namely, process
disturbance and uncertainty on the initial state conditions).
In the literature, there are two main approaches for dealing
with the uncertainties and noises acting on the system:
• the stochastic (probabilistic) approach that assumes that
the noises and the uncertainties are unknown but they can
be described by known probability distributions.
• the set-membership approach that assumes that the noises
and the uncertainties are unknown but bounded in some
compact sets.
The probabilistic approach is grounded on Bayesian filtering, whose aim is to update with the measurements and
⋆ This paper was not presented at any IFAC meeting. Corresponding author Alessio Benavoli. Tel. 0041 58 666 6509
Email addresses: [email protected] (Alessio Benavoli),
[email protected] (Dario Piga).
Preprint submitted to Automatica
propagate up on time the probability density function (PDF)
of the state. Inferences are then carried out by computing
expectations with respect to this PDF, i.e., mean, variance,
credible regions. It is well known that, for linear discretetime dynamical systems corrupted by Gaussian noises, the
Bayesian filter reduces to the Kalman filter.
The set-membership approach is instead based on the
construction of a compact set which is guaranteed to include the state values of the system that are consistent
with the measured output and the assumed bounds on
the noises/disturbances [1,2,3,4,5,6]. This compact set is
propagated in time and updated recursively with the output observations. In set-membership estimation, computing
inferences thus means to determine this compact set. Setmembership estimation was first proposed in [7,8], where
an ellipsoidal bounding of the state of linear dynamical
systems is computed. The application of ellipsoidal sets
to the state estimation problem has also been studied by
other authors, for example [9,10], and, independently, in the
communications and signal processing community, starting
from the works [11,12,13,14]. In order to improve the estimation accuracy, the use of a convex polytope instead of an
ellipsoid has been proposed in [15,16]. Unfortunately such
a polytope may be extremely complex and the correspond-
11 November 2017
about the bounding region as well as the probabilistic moments (mean and variance) of the noises or that are able
to deal with a Gaussian measurement noise and a bounded,
with known moments, process noise etc.. Moreover, it can
allow us to compute credible regions (Bayesian confidence
intervals) that takes into account of both deterministic and
probabilistic uncertainty, as well as it allows us to make decisions by choosing the action that minimizes the expectation of some loss function (this is important, for instance, in
control design). In the context of this paper a first attempt
in combining deterministic and probabilistic uncertainty has
been proposed in [29], while [31] has proposed a joint Zonotopic and Gaussian Kalman filter for discrete-time LTV systems simultaneously subject to bounded disturbances and
Gaussian noises. The work [32] instead proposes a Bayesian
approach to set-membership estimation imposing a uniform
distribution on the membership-set similar to the idea proposed in [33,34]. We will show that this approach is different from set-membership estimation, since set-membership
estimation cannot be interpreted in the Bayesian framework,
but only in the framework of set of probability measures.
Second, under this probabilistic interpretation, inferences in
set-membership estimation are carried out by computing expectations with respect to the set P as in the probabilistic
case. In particular, we show that the membership set X (i.e.,
the set that includes the state with guarantee) can be obtained
by computing the union of the supports of the probability
measures in P. Moreover, we prove that a minimum volume
convex outer-approximation of X can simply be obtained
by computing the set M that includes all the means computed with respect to the probabilities in P. The proof is not
constructive, hence we do not have a convenient description
of M. However we show that we can determine the least
conservative half-space H that includes M , by solving a
semi-infinite linear programming problem. This problem is
a special case of the truncated moment problem [35,36,37]
in which only the zero-th order moment is known (i.e., the
support).
Third, by writing the dual of the above semi-infinite linear
programming problem, we show that, if the nonlinearities in
the measurement and process equations are polynomial and
if the bounding sets for initial state, process and measurement noises are described by polynomial inequalities, then
a feasible solution of the dual can be obtained by simply
checking the non-negativity of a polynomial on a compact
set described by polynomial inequalities. An approximation
of this semi-infinite linear programming problem can be obtained by reformulating it as semidefinite programming by
using the theory of sum-of-squares (SOS) polynomial optimization. We prove that the approximate solution is robust,
in the sense that the computed half-space H is guaranteed
to include M, and so the membership set X .
Fourth, we provide a procedure to determine the minimumvolume polytope S bounding M. This procedure is based
on a refinement of the algorithm originally proposed in [38]
to compute an approximation of the minimum-volume polytope containing a given semialgebraic set. In particular, we
use a Monte Carlo integration approach to compute an approximation of the volume of a polytope, and a greedy pro-
ing polytopic updating algorithms may require an excessive
amount of calculations and storage (without any approximations, the number of vertices of the polytope increases
exponentially in time). For this reason, it has been suggested to outer approximate the true polytope with a simpler
polytope, i.e. possessing a limited number of vertices or,
equivalently, faces [17]. In this respect, a parallelotopic
approximation of the set-membership set was presented in
[18,19]. A parallelotope is the generalisation of the parallelogram to Rn . Minimum-volume bounding parallelotopes
are then used to estimate the state of a discrete-linear dynamical system with polynomial complexity. Zonotopes
have been proposed to reduce the conservativeness of parallelotopes. Intuitively zonotopes are polytopes with parallel
faces, for a more precise definition see [20, Ch. 2]. A parallelotope is thus a special zonotope. Zonotopes are used in
[21,22,23] to build a state bounding observer in the context
of linear discrete systems.
Zonotopes are also employed to address the problem of
set-membership estimation for non-linear discrete-time systems with a bounded description of noise and uncertainties [24]. At each sample time, a guaranteed bound of the
uncertain state trajectory of the system is calculated using interval arithmetic applied to the nonlinear functions
through the mean interval extension theorem. This outer
bound is represented by a zonotope. Similar approaches for
set-membership estimation for nonlinear systems are presented in [25,26,27], where ellipsoids are used instead of
zonotopes. Recently, randomized methods are used in [28]
to approximate, with probabilistic guarantees, the uncertain
state trajectory with polynomial sublevel sets.
The aim of this paper is to address the problem of the estimation of the state of a discrete-time non-linear dynamical system (characterized by polynomial non-linearities) in
which initial state and noises are unknown but bounded by
some compact sets (defined by polynomial inequalities). We
are therefore in the context of set-membership estimation,
but we will address this problem in a very different way
from the approaches presented above. We reformulate setmembership in the probabilistic setting and solve it using
the theory of moments and positive polynomials. More precisely the contributions are the following.
First, by exploiting recent results on filtering with sets of
probability measures [29,30], we show that set-membership
estimation can be equivalently formulated in a probabilistic setting by employing sets of probability measures. In
particular, we show that the prediction and updating steps
of set-membership estimation can be obtained by applying
Chapman-Kolmogorov equation and Bayes’ rule point-wise
to the elements of this set of probability measures P . This
unifies the probabilistic approach (Bayes filter) and the setmembership approach to state estimation. This result can
have an enormous impact, because it finally can allow us to
combine set-membership and classical probabilistic uncertainty in order to obtain hybrid filters, i.e., stochastic (probabilistic) filters that are for instance able to use information
2
and therefore n = 2, m = 1, d = 2 and s(d) =
cedure to determine an outer-bounding polytope S as the
intersection of a pre-specified number of half-spaces Hj ,
where each half-space Hj is added to the description of S
so to minimize the volume of the polytope including M.
This allows us to solve the set-membership estimation problem for polynomial non-linear systems very efficiently and
through convex optimization.
Finally, by means of a numerical example involving the
Lotka Volterra prey-predator model, we show the effectiveness of our approach.
x(0) ∈ X0 , w(k) ∈ Wk , v(k) ∈ Vk ,
y(k) = cd (x(k), k) + v(k),
Wk = {w(k) ∈ Rn : hw
i (w(k), k) ≤ 0, i = 1, . . . , tw } ,
(5)
where hw
i (with i = 1, . . . , tw , tw ∈ N) are polynomial
functions in the variable w(k). The sets X0 , Vk are described
in a similar manner.
This paper addresses a set-membership filtering problem,
which aims at recursively estimating, at each time sample
k = 1, 2, . . . , To , (an outer approximation of) the state uncertainty set Xk , defined as the set of all values x(k) compatible with the available information, namely the system
equations (1), the bounds on the initial state and on the noises
(4), and the output observations y(1), y(2), . . . , y(To ). Formally, the set-membership filtering problem is defined as
follows.
(1)
where x(k) = [x1 (k), . . . , xn (k)]⊤ ∈ Rn is the state of the
system at the time k, y(k) ∈ Rm is the measured output
vector, w(k − 1) ∈ Rn is the process noise and v(k) ∈
Rm is the measurement noise. In this paper, we consider
polynomial non-linearities ad (x(k), k) and cd (x(k), k), i.e.,
ad (x(k − 1), k − 1) =Ak−1 qd (x(k − 1)),
cd (x(k), k) =Ck qd (x(k)),
(4)
where X0 , Wk , Vk are compact basic semi-algebraic sets,
i.e., compact sets described by the polynomial inequalities:
Consider an uncertain non-linear discrete-time dynamical
system described by the difference equations:
x(k) = ad (x(k − 1), k − 1) + w(k − 1),
= 6.
We further assume that the only available information about
the initial state x(0) and the noises w(k), v(k) is:
2 Problem Description
(
n+d
d
Problem 1 [Set-membership filtering]
Given the system equations (1), the observations, the bounding sets for the noises Wk , Vk and the initial state uncertainty set X0 , compute recursively the state uncertainty set
Xk defined as:
(2a)
(2b)
with
qd (x) =
Xk = { x(k) ∈ Rn: x(k)−ad (x(k − 1), k − 1) ∈ Wk−1 ,
[1, x1 , . . . , xn , x21 , x1 x2 , . . . , xn−1 xn , x2n , . . . , xd1 , . . . , xdn ]⊤
(3)
being the vector of all monomials of degrees
less
than
or
equal to d, which has dimension s(d) = n+d
,
and
A
∈
k−1
d
Rn×s(d) , Ck ∈ Rm×s(d) are known time-variant coefficient
matrices. The resulting system will be referred in the paper
as uncertain time-variant polynomial system of degree d.
y(k) − cd (x(k), k) ∈ Vk ,
x(k − 1) ∈ Xk−1 }
for each k = 1, 2, . . . , To .
Note that, in general, the sets Xk might be nonconvex and
their representation can become more and more complicated
as the time index k increases. Under the assumption that
Xk is bounded, algorithms for computing simple sets (e.g.,
boxes, parallelotopes, zonotops or ellipsoidal regions) outerbounding the state uncertainty sets Xk have been then proposed to reduce this complexity. After formulating the setmembership filtering problem in a probabilistic setting, this
paper presents an algorithm for computing (an approximation of) the minimum-volume polytope outer-bounding the
sets Xk .
Example 1 Let us consider the discrete-time polynomial
system:
x1 (k) = x1 (k − 1) (2 − x1 (k − 1)) + w1 (k − 1),
x2 (k) = x1 (k − 1)x2 (k − 1) + 0.5x2 (k − 1) + w2 (k − 1),
The output equation is given by: y(k) = x1 (k) + x2 (k) +
v(k). We can rewrite this system as in (2a)–(2b):
qd (x) = [1, x1 , x2 , x21 , x1 x2 , x22 ]⊤
"
#
0 2 0 −1 0 0
Ak−1 =
0 0 0.5 0 1 0
h
i
Ck−1 = 0 1 1 0 0 0
3 A probabilistic framework for set-membership estimation
Set-membership estimation is usually formulated in the context of set-valued calculus. We will show in the following
3
upper bound for the expectation of g is given by the solution
of the optimization problem:
paragraph that set-membership estimation can be equivalently formulated in the probabilistic setting by employing
sets of probability measures. Consider the set-membership
constraint x ∈ X (the time index is dropped for brevity of
notation) with X ⊂ Rn . This constraint can be translated
in a probabilistic setting by saying that the only probabilistic information on the value x of the variable X is that it
belongs to the set X , or equivalently,
sup
P
X
(7)
Problem (7), i.e., determining an upper bound for the expectation of g with respect to the probability measure Pr given
the knowledge of its support X , is a special case of the truncated moment problem [35,36,37] in which only the zero-th
order moment is known (i.e., the support). Hence, we have
the following result [39], [40, Lemma 3.1]:
The support does not uniquely define a probability measure,
as there are an indefinite number of probability measures
with support X . 3 Hence, x ∈ X is equivalent to the constraint that the probability measure of x belongs to the set
PX (X), that is the set of all probability measures on the
variable X with support X . Let us define with P the Cumulative Distribution Function (CDF) of the probability measure Pr. For instance on R we have that P (x) = Pr(−∞, x]
(this definition can easily be extended to Rn ). Then we can
easily characterize the set of probability measures PX (X)
as follows:
Proposition 1 The optimum of (7) is obtained by an atomic
measure 4 Pr = δx̂ , where x̂ = arg supx∈X g(x).
Note in fact that, ∀ Pr ∈ PX (X), with associated CDF P ,
E[g] =
dP (x) = 1 ,
g(x)dP (x),
which is a semi-infinite linear program, since it has a finite
number constraints and an infinite dimensional variable (the
probability measure Pr). Note that we use “sup” instead
of “max” to indicate that an optimal solution might not be
attained. The lower bound of the expectation can be obtained
by replacing sup with inf.
where Pr is a probability measure on X . 1 More precisely
Pr is a nonnegative Borel measure on X . 2 In other words,
this means that we only know the support of the probability
measure of the variable X.
R
X
s.t. P ∈ PX (X),
Pr(X ∈ X ) = Pr(X ) = 1,
PX (X) = P :
R
Z
g(x)dP (x) ≤
X
(6)
Z
g(x)δx̂ (dx) = g(x̂),
X
where g(x̂), by definition of x̂, is the supremum of g on
X . The first integral must be understood as a LebesgueStieltjes integral with respect to the cumulative distribution
of an atomic measure on Rn . This means that dP (x) denotes
the distributional derivative of the cumulative distribution
of an atomic measure, that are in our case Dirac measures
δx̂ (dx) (hence the second integral). From this result, it follows that the probability measures that gives the lower and
upper bounds for the expectation of g are atomic (discrete)
measures.
In order to formulate the set-membership filtering problem
in a probabilistic framework it is useful to exploit a result derived by Karr in [39], where it is proven that the set of probability measures PX (X) which are feasible for the semiinfinite linear program problem (7) is convex and compact
with respect to the weak∗ topology. As a result, PX (X) can
be expressed as the convex hull of its extreme points and,
according to Proposition 1, these extreme points are atomic
measures on X , i.e.:
where the integral is a Lebesgue-Stieltjes integral with respect to P . Hence, because of the equivalence between Borel
probability measures and cumulative distributions, hereafter
we will use interchangeably Pr and P .
3.1 Inference on the state
In state estimation, we are interested in making inferences
about X or, equivalently, computing expectations of realvalued functions g of X. Since there are an indefinite number
of probability measures with support X , we cannot compute
a single expectation of g. However, we can compute upper
and lower bounds for the expectation of g with respect to the
probability measures Pr with support X . For instance, the
1
To clarify this aspect, consider the experiment of rolling a dice.
Assume that the probability Pr of the outcomes x of the dice
is completely unknown, then the only knowledge about the experiment is that x ∈ X = {1, 2, 3, 4, 5, 6}, or, equivalently, that
Pr({1, 2, 3, 4, 5, 6}) = 1. Therefore, the statement Pr(X ) = 1 is
a model for our (epistemic) uncertainty about the probabilities of
the dice outcomes. We only know that x ∈ {1, 2, 3, 4, 5, 6}.
2
The sample space is Rn and we are considering the Borel σalgebra. X is assumed to be an element of the σ-algebra.
3
The uniform distribution is one of them, but it is not the only
one. So by considering only the uniform distribution as in [32],
we loose the full equivalence with set-membership.
PX (X) ≡ Co {δx̂ : x̂ ∈ X } ,
(8)
where ≡ means equivalent in terms of inferences (expectations). Summing up what we have obtained so far:
4
An atomic measure in Rn is a measure which accepts as an
argument a subset A of Rn , and returns δx (A) = 1 if x ∈ A,
zero otherwise.
4
(1) the set-membership constraint x ∈ X is equivalent to
(6);
(2) for the inferences, PX (X) is equivalent to the convex
hull of all atomic measures on X , (8).
by applying the Chapman-Kolmogorov equation point-wise
to the probability measures Pr(·|x(k−1)) in P(X(k)|X(k−
1)) and Qr in P(X(k − 1)) we obtain
Z
Pr(x(k)) =
Ix(k) (x′ )dP (x′ |x(k − 1))dQ(x(k − 1))
n
n
R
R
Z Z
=
Ix(k) (x′ )δad (x(k−1),k−1)+ŵ (dx′ )δx̂ (dx(k − 1))
n
n
R
R
Z
δad (x(k−1),k−1)+ŵ (x(k))δx̂ (dx(k − 1))
=
Hence, we can derive the prediction and updating step
for set-membership estimation by applying the ChapmanKolmogorov equation and Bayes’ rule to the set of probability measures in (8). This means that, by reformulating
set-membership constraints in a probabilistic way, we can
reformulate set-membership estimation in the realm of
stochastic (probabilistic) filtering applied to set of probability measures.
Rn
= δad (x̂,k−1)+ŵ (x(k))
(12)
where Ix(k) (x′ ) denotes the indicator function 5 and with
x̂ ∈ Xk−1 and ŵ
R ∈ Wk−1 and where we have exploited the fact that Rn Ix(k) (x′ )δad (x(k−1),k−1)+ŵ (dx′ ) =
Ix(k) (ad (x(k −1), k −1)+ ŵ) = δad (x(k−1),k−1)+ŵ (x(k)).
From (8), (12) and the definition of X̂k , the theorem follows.
3.2 Propagating in time and updating set of distributions
We start by deriving the set-membership filtering prediction
step by applying the Chapman-Kolmogorov equation.
Theorem 1 (Prediction) Consider the system equation in
(1) with w(k − 1) ∈ Wk−1 and assume that the only probabilistic knowledge about X(k − 1) is the support Xk−1 .
Then it follows that the probability measure Pr on the value
x(k) of the state at time k belongs to the set
o
n
P̂X̂k (X(k)) ≡ Co δx̂ : x̂ ∈ Xˆk ,
Z
Theorem 1 shows that, by applying the ChapmanKolmogorov equation point-wise to the probability measures in P(X(k)|x(k − 1)) and PXk−1 (X(k − 1)), we can
obtain a set of probability measures PX̂k (X(k)), which is
completely defined by its support and whose support coincides with the one obtained in set-membership estimation
after the prediction step.
(9)
with
We now derive a similar result for the updating step.
n
Xˆk = x(k) : x(k) = ad (x(k − 1), k − 1) + w(k − 1)
o
with x(k − 1) ∈ Xk−1 , w(k − 1) ∈ Wk−1 ,
Theorem 2 (Updating) Consider the measurement equation in (1) with v(k) ∈ Vk and assume that the only probabilistic knowledge about x(k) is described by (9)–(10). Then
it follows that the updated probability measures P on the
value x(k) of the state at time k belongs to the set:
(10)
or equivalently:
n
Xˆk = x(k) : x(k) − ad (x(k − 1), k − 1) ∈ Wk−1
o
with x(k − 1) ∈ Xk−1 . (11)
PXk (X(k)) ≡ Co {δx̂ : x̂ ∈ Xk } ,
(13)
Xk = Xˆk ∩ Yk ,
(14)
Yk = {x(k) : y(k) − cd (x(k), k) ∈ Vk }.
(15)
where
Proof: Let us consider the time instant k. From the system
equation in (1), w(k − 1) ∈ Wk−1 and (8), it follows that
with
P(X(k)|x(k − 1))
≡ Co δad (x(k−1),k−1)+ŵ : ŵ ∈ Wk−1 ,
Proof: Observe that, at each time k,
P(Y(k)|x(k)) ≡ Co δcd (x(k),k)+v̂ : v̂ ∈ Vk .
this is the conditional set of probability measures for the variable X(k) given the value x(k − 1) of the variable X(k − 1)
Hence, since X(k − 1) ∈ Xk−1 and so the set of probability
measures for the variable X(k − 1) is
Then, the updating step consists of applying Bayes’rule
to the probability measures P(Y(k)|x(k)) and to Q in
PXk−1 (X(k − 1)) ≡ Co {δx̂ : x̂ ∈ Xk−1 } ,
5
5
Ix(k) (x′ ) = 1 when x(k) = x′ and zero otherwise.
by Xk , i.e.,
P̂X̂k (X(k)):
R
)dP (y′ |x(k))dQ(x(k))
dP (x(k)|y(k)) = R
I
(y′ )dP (y′ |x(k))dQ(x(k))
Rn Rm y(k)
Pr(y(k)|x(k))dQ(x(k))
= R
,
Rn Pr(y(k)|x(k))dQ(x(k))
RRm Iy(k) (y
′
Pr(y(k)|x(k)) =
Iy(k) (y′ )dP (y′ |x(k)).
Rm
Rn
=
R
A1.1 Initialize PX0 (X(0)) ≡ Co {δx̂ : x̂ ∈ X0 }.
A1.2 For k = 1, . . . , To :
o
n
A1.2.1 P̂X̂k (X(k)) ≡ Co δx̂ : x̂ ∈ X̂k with X̂k defined in (10);
A1.2.2 PXk (X(k)) ≡ Co {δx̂ : x̂ ∈ Xk } with Xk defined in (14).
Pr(y(k)|x(k))dQ(x(k))
Rn
δcd (x(k),k)+v̂ (y(k))δx̂ (dx(k)) > 0.
steps A1.2.1 and A1.2.1 are the prediction and the updating
steps, respectively. Note that the set of probability measures
PXk (X(k)) (or P̂X̂k (X(k))) is computed by taking into account all the observations yk = {y(1), y(2), . . . , y(k)} (respectively yk−1 ). Hence, it should be more correctly denoted
as PXk (X(k)|yk ) (respectively PX̂k (X(k)|yk−1 )). We have
omitted this notation for brevity.
Hence, the above inequality holds if and only if x̂ and v̂ are
chosen, at time k, such that:
cd (x̂, k) + v̂ = y(k).
(16)
Bayes’ rule is only defined for those probability measures
for which the denominator is strictly positive, that implies
that the above equality must be satisfied. 6 The equality (16)
can be satisfied only if x̂ ∈ Yk which, together with the
constraint x̂ ∈ X̂k , implies that
Remark 1 Under the assumptions (2a),(2b) and (5), the set
Xk is a semialgebraic set in Rn , described by the intersections of the semialgebraic sets X̂k (Eq. (11)) and Yk (Eq.
(15)). Formally, Xk is the projection in the space of x(k) of
the set
x̂ ∈ Xˆk ∩ Yk .
Under the constraint (16), it follows that δcd (x̂,k)+v̂ (y(k)) =
1 and, thus, the denominator is equal to one. Hence, we have
that
R
(17)
Algorithm 1: prediction and updating
Note that the probability of a point on Rn can be nonzero
since Pr is an atomic measure. In order to apply Bayes’ rule
we need to ensure that the denominator is strictly greater
than zero:
R
dP (x(k)) = 1,
Xk
where Xk is given by (14), or equivalently by (6). In other
words, the support of the probability measure Pr of the value
of the state x(k) given the output observation y(k) and the
system equations (1) is nothing but Xk . This is in accordance
with the set-membership formulation, which claims that
x(k) belongs to state uncertainty set Xk defined in (6). Then
we can solve set-membership filtering by applying recursively Theorems 1 and 2, as described in Algorithm 1. The
where we have exploited the fact that
Z
Z
′
X˜k = x̃ ∈ R2n : hs (x̃(k)) ≤ 0, s = 1, . . . , m ,
(18)
where x̃(k) is the augmented state vector x̃(k) =
⊤
⊤
x (k) x⊤ (k − 1) and hs (x̃(k)) (with s = 1, . . . , m)
are the polynomial functions in x(k) and x(k −1) (or equivalently in x̃(k)) defining Xˆk and Yk . In the rest of the paper,
we will use the following notation to describe the set Xk :
′
dP (x(k)|y(k)) = Rm Iy(k) (y )dP (y |x(k))dQ(x(k))
R
= Rm Iy(k) (y′ )δcd (x(k),k)+v̂ (y(k))δx̂ (dx(k))
= δcd (x(k),k)+v̂ (y(k))δx̂ (dx(k))
= δcd (x̂,k)+v̂ (y(k))δx̂ (dx(k))
Xk = {x(k) ∈ Rn : hs (x̃(k)) ≤ 0, s = 1, . . . , m} . (19)
= δx̂ (dx(k))
Remark 2 The reformulation of set-membership in the
probabilistic framework is important for two main reasons.
First, it allows us to reinterpret the operations performed
in set-membership estimation and justifies them in terms
of a probabilistic framework. We have just seen the reinterpretation of prediction and updating in terms of the
Chapman-Kolmogorov equation and Bayes’ rule. We will
further investigate this interpretation in the next sections.
In particular, in Section 4, we will show that the convex
membership set computed in set-membership estimation can
also be interpreted as the set of posterior means calculated
with x̂ ∈ Xˆk ∩ Yk . Hence, the updated probability measure Pr(·|y(k)) on the values of the state at time k is
Pr(·|y(k)) = δx̂ , which proves the theorem.
From Theorem 2, the support of the updated probability
measure Pr on the value x(k) of the state at time k is given
6
This way of updating set of probability measures has been
proposed by Walley [41, Appendix J] under the name of regular
extension.
6
Theorem 3 Assume that Xk is compact and that Ω1 ⊆ Rn
is a convex set defined as follows:
with respect to the posterior set of probability measures
PXk (X(k)) (in the Bayesian setting, we know that the
posterior mean is the optimal estimate with respect to a
quadratic loss function – a similar result holds for the set
of posterior means [42, Sec.5]). This result can also now
be applied to set-membership estimation because, after this
probabilistic interpretation, we are now able to compute
expectations. Moreover, in Section 5 we will also highlight
the connection between set-membership estimation and the
theory of moments (through duality).
Second, we are now potentially able to combine setmembership and classical probabilistic uncertainty in order
to obtain hybrid filters, i.e., stochastic (probabilistic) filters that are for instance able to use information about
the bounding region as well as the probabilistic moments
(mean and variance) of the noises or that are able to deal
with a Gaussian measurement noise and a bounded, with
known moments, process noise etc.. A first attempt in this
direction is described in [29] for scalar systems. We plan to
further investigate this direction in future work by using the
theory of SOS polynomial optimization, that we also use in
the next sections.
Ω1 = arg
Ω⊆R Ω
dx(k)
Then, it results that Ω1 = M, with
Z
M=
x(k)dP (x(k)) : P ∈ PXk (X(k)) .
(21)
(22)
Xk
Proof: From (21) it follows that Ω1 is the minimum volume
convex set that includes Xk . Thus, if Xk is convex, then
Ω1 = Xk . Hence, from (8), the equality
Z
x(k)δx̂(k) (dx(k)) = x̂(k),
Xk
and (22), it immediately follows that M = Ω1 . Conversely
assume that Xk is not convex, then Ω1 ⊃ Xk . Since Ω1
is the minimum volume convex set that includes Xk , then
Ω1 must be equal to the convex-hull of Xk . This means
that for each x̂ ∈ Ω1 , there exist z1 , z2 ∈ Xk such that
wz1 + (1 − w)z2 = x̂ for some w ∈ [0, 1] (by definition of
convex hull). Then, consider the probability measure
wδz1 + (1 − w)δz2 .
(23)
Because of (8), it holds:
dx(k)
s.t.
R
dP (x(k)) = 1, ∀P ∈ PXk (X(k)).
Ω⊆R ,Ω conv. Ω
Ω
In the probabilistic formulation of filtering, all the available
information at time k is encoded in the posterior probability
distribution of the state x(k) given all the observations yk ).
In the set-membership setting, this information is encoded in
the updated set of probability measures PXk (X(k)). Inferences can then be expressed in terms of expectations computed with respect to this set. The set-membership estimation problem can, for instance, be reformulated as follows:
R
R
s.t.
R
dP (x(k)) = 1, ∀P ∈ PXk (X(k))
4 Computing the support as an inference on the set of
probability measures
Ω∗ = arg minn
inf
n
wδz1 + (1 − w)δz2 ∈ PXk (X(k)),
(20)
and
Z
Ω
The solution of (20) is the minimum-volume set Ω ⊆ Rn ,
such that Pr(x(k) ∈ Ω) = 1 for all probability measures Pr
in PXk (X(k)) (i.e., with support Xk ). 7 Thus, Ω∗ coincides
with Xk . Since Xk may be not convex, the problem (20) is
in general difficult to solve. However, the problem can be
simplified by restricting Ω to be convex, thus computing a
convex outer-approximation of Xk .
(24)
x(k) (wδz1 (dx(k)) + (1 − w)δz2 (dx(k))) = x̂. (25)
Xk
Thus, x̂ belongs to M, and vice versa.
Theorem 3 has the following fundamental implications:
• a convex outer-bounding of the set of all the possible
means computed with respect to the probability measures
in PXk (X(k)) (i.e., the set M) is also a convex outerbounding of the support Xk of the set of probability measures PXk (X(k)).
• the tightest convex outer-bounding of the support Xk of
the set of probability distributions PXk (X(k)) is the set
of the means computed with respect to the probability
measure in PXk (X(k)).
The following theorem shows that computing the minimumvolume convex set Ω such that P (x(k) ∈ Ω) = 1 is
equivalent to obtain the set that includes all the possible
means computed with respect to the probability measure in
PXk (X(k)).
7
It is thus the union of all the supports of the probability measures
in PXk (X(k)).
7
M (or equivalently, including X ), is obtained for ν = ν ∗ ,
with
R
ν ∗ = max ω ⊤ xdP (x)
R P
(28)
s.t. dP (x) = 1.
We can thus use M as an outer-approximation of Xk . Algorithm 1 is therefore modified to include the following additional steps.
Refinement of Algorithm 1: outer-approximation step
X
A1.1.3 Outer-approximate Xk with M defined in (22).
A1.1.4 Redefine PXk (X(k)) ≡ Co {δx̂ : x̂ ∈ M}.
R
Proof: Let ρ = xdP (x) be a point belonging to M. Let
us first prove that if ν ≥ ν ∗ , then M ⊆ H. First, note that:
Z
ω ⊤ ρ ≤ ν ∗ = sup ω ⊤ xdP (x)
P
Z
s.t.
dP (x) = 1
Unfortunately, Theorem 3 does not provide a constructive
way to find the set M. However, by restricting the outerapproximation of the support Xk to have a simple form (e.g.,
a polytope), Theorem 3 can be still exploited to determine an
outer-bounding set of Xk . The following theorem provides
results to compute an outer-bounding box of Xk .
X
Therefore,
for ν ≥ ν ∗ , ω ⊤ ρ ≤ ν ∗ ≤ ν, which means that
R
ρ = xdP (x) also belongs to H for all ρ ∈ M. Thus, H
contains M. By choosing ν = ν ∗ , we obtain the tightest
half-space defined by the normal vector ω that includes M.
Theorem 4 (Box approximation) The minimum volume
box that includes Xk can be found by solving the following
family of optimization problems
R
x∗i (k) = opt xi (k)dP (x(k))
P
R
dP (x(k)) = 1.
s.t.
It can be observed that (28) reduces to (26) when ω = ei
for i = 1, . . . , n, where ei is an element of the natural
basis of Rn . Note that, in Problem (28): (i) the optimization
variables are the amount of non-negative mass assigned to
each point x in X (i.e., the measure P r(x)); (ii) the objective
function and the constraint are linear in the optimization
variables. Therefore, (28) is a semi-infinite linear program
(i.e., infinite number of decision variables but finite number
of constraints). By exploiting duality of semi-infinite linear
program (see for instance [43]), we can write the dual of
(28), which is defined as:
(26)
Xk
for i = 1, . . . , n, where byRselecting opt to be min or max
we obtain theR half-spaces xi (k)dP (x(k)) ≥ x∗i (k) and,
respectively, xi (k)dP (x(k)) ≤ x∗i (k) which define the
box.
The proof of Theorem 4 is provided together with the proof
of Theorem 5. Based on Theorem 4, by computing the lower
and upper means of the components x1 (k), . . . , xn (k) of the
vector x(k), the tightest box that outer-approximates Xk is
obtained. In the following we will discuss how to efficiently
solve optimization problems similar to (26) and how to find
an outer-approximation of Xk that is less conservative than
a box. For simplicity of notation, in the rest of the paper, the
dependence of the state x(k) and of the set Xk on the time
index k will be dropped, and only used when necessary.
ν ∗ = inf ν
ν
s.t. ν ≥ ω ⊤ x, ∀x ∈ X ,
which is also a semi-infinite linear program (i.e., finite number of decision variables (ν) but infinite number of constraints). A solution ν is feasible for Problem (29) provided
that:
ν − ω ⊤ x ≥ 0, ∀x ∈ X .
Hence, checking the feasibility of ν is equivalent to check
the non-negativity of the polynomial ν − ω ⊤ x in the set X .
5 Exploiting duality
Remark 3 The probabilistic formulation of the setmembership estimation described so far is general enough,
and it is valid also when the dynamical system in (1) is
not a polynomial system and when the uncertainty sets
X0 , Wk , Vk in (4) are not semialgebraic, but just compact sets. The assumptions of polynomiality are used in
the following to efficiently solve the semi-infinite linear
programming problem (29) through convex optimization.
In this section we discuss how to efficiently solve optimization problems similar to (26). In particular, we slightly modify (26) in order to be able to determine the more general
half-space
H = ρ ∈ Rn : ω ⊤ ρ ≤ ν ,
(27)
R
where ω ∈ Rn , ν ∈ R and ρ = xdP (x). 8
5.1 Sum-of-squares polynomials
Theorem 5 Let us fix the normal vector ω defining the halfspace H in (27). Then, the tightest half-space H including
8
(29)
A sufficient condition for a polynomial to be non-negative
over a semialgebraic set is that it can be written in terms of
sum-of-squares (SOS) polynomials (see, e.g., [44]).
The half-space H lies on the space of the means.
8
Definition 1 A polynomial σ(x̃), with x̃ ∈ R2n , of degree
2d is a sum-of-squares polynomial, denoted by σ(x̃) ∈ Σ[x̃],
if and only if it can be written as:
σ(x̃) = qd (x̃)⊤ Qqd (x̃),
to linear equalities in ν and in the matrix coefficients Qs (with s = 1, . . . , m). Besides, enforcing
σ0 (x̃), σ1 (x̃), . . . , σm (x̃) to be sum of square polynomials leads to linear matrix inequality (LMI) constraints in the coefficients of σ0 (x̃), σ1 (x̃), . . . , σm (x̃)
(i.e., Qs 0).
(2) For ν = ν ∗∗ , the robust constraint ν ∗∗ − ω ⊤ x ≥
0 ∀x ∈ X appearing in Problem (29) is guaranteed to
be satisfied. As matter of fact, for all x̃ ∈ X˜ , hs (x̃) ≤ 0
(with s = 1, . . . , m) by definition of X˜ . Furthermore,
the SOS polynomials σs (x̃) = qd (x̃)⊤ Qs qd (x̃) (with
s = 0, . . . , m) are always nonnegative over R2n as
Qs 0. Thus, both the left and the right side of the
equation in Problem (33) are nonnegative for all x̃ ∈ X̃ .
(3) Since the equality constraint in (33) gives only a sufficient condition for the non-negativity of ν − ω⊤ x on
X , it follows that ν ∗ ≤ ν ∗∗ . Therefore, conservativeness is introduced in solving (33) instead of (29), as
highlighted in Corollary 1.
(4) However, according to the Putinar’s Positivstellensatz
(see, e.g., [46] and [47, Ch. 3]), a polynomial which is
nonnegative over a compact semialgebraic set X can
exactly always be written as a combination of SOS
polynomials, provided that the degree of the SOS polynomials σ0 (x̃), . . . , σm (x̃) is large enough. In other
words, we can make ν ∗∗ close to ν ∗ by increasing the
degree of the SOS. However, in practice it often happens that the relaxed solution ν ∗∗ and the optimal one
ν ∗ coincide with each other for small values of the SOS
degree 2d.
(30)
where Q is a real symmetric
positive semidefinite matrix
of dimension 2n+d
.
The
vector
of monomials qd (x̃) is
d
defined as in (3). The set of SOS polynomials of degree less
then or equal to 2d is denoted as Σ2d [x̃].
Then, for a given integer d ≥ 1, a sufficient condition for
ν − ω ⊤ x to be non-negative in X is (see for instance [37,
Ch. 4]):
ν − ω ⊤ x = σ0 (x̃) −
m
P
σs (x̃)hs (x̃) ∀ x̃ ∈ R2n
s=1
(31)
σ0 (x̃), σ1 (x̃), . . . , σm (x̃) ∈ Σ2d [x̃],
where hs (x̃) (with s = 1, . . . , m) are the polynomial nonpositive inequality constraints defining the semialgebraic set
X . In order to avoid confusion, we would like to stress
that also ν − ω⊤ x is a polynomial in the variable x̃. In
fact, we remind that the augmented state x̃(k) is defined as:
⊤
x̃(k) = x⊤ (k) x⊤ (k − 1) .
The following (more conservative) optimization problem can
be then solved instead of (29):
ν ∗∗ = inf ν
Corollary 1 The set M is guaranteed to belong to the halfspace H : ω⊤ x ≤ ν ∗∗ , i.e.
ν,σs
ν − ω⊤ x = σ0 (x̃) −
m
X
σs (x̃)hs (x̃), ∀ x̃ ∈ R2n
s=1
M ⊆ H.
σ0 (x̃), σ1 (x̃), . . . , σm (x̃) ∈ Σ2d [x̃].
(34)
(32)
Proof: The proof straightforwardly follows from Theorem 5
and ν ∗ ≤ ν ∗∗ .
Note that, by rewriting the SOS polynomials σs (x̃) (with
s = 0, . . . , m) as in (30), Problem (32) can be also rewritten
as:
Example 2 Let us consider the discrete-time polynomial
system described by the difference equations:
ν ∗∗ = inf ν
ν,Qs
⊤
ν − ω x =qd (x̃)⊤ Q0 qd (x̃)+
m
X
−
qd (x̃)⊤ Qs qd (x̃)hs (x̃), ∀ x̃ ∈ R2n
x1 (k)=x1(k−1)x2 (k−1)(x1(k−1) + x2(k−1))+w1 (k−1),
x2 (k)=x1(k−1)x2 (k−1)(2x1(k−1) + x2(k−1))+w2 (k−1).
(35)
The output equation is given by: y(k) = x1 (k) + x2 (k) +
v(k). The following conditions are assumed: (i) the initial state x(0) belongs to X0 = {x(0) : kx(0)k2 ≤ 0.2},
the process noise w(k) = [w1 (k) w2 (k)]⊤ is bounded by
kw(k)k2 ≤ 0.4, and the measurement noise by kv(k)k∞ ≤
0.5. The observed output y(k) at time k = 1 is y(k) = 0.
We are interested in computing an half-space H : ω ⊤ ρ ≤ ν
containing the state uncertainty set Xk (or equivalently M)
at time k = 1. The normal vector ω characterizing H is
fixed and it is equal to ω = [−1 − 0.5]⊤ . In order to compute the constant parameter ν defining H, the SDP Problem
s=1
Qs 0, s = 0, . . . , m.
(33)
Some remarks:
(1) Problem (33) is a semidefinite programming (SDP)
problem [44,45], thus convex. In fact, checking if the
polynomial ν − ω T x is equal to qd (x̃)⊤ Q0 qd (x̃) −
P
m
⊤
2n
leads
s=1 qd (x̃) Qs qd (x̃)hs (x̃) for all x̃ ∈ R
9
Now consider the following family of half-spaces:
Hj = ρ ∈ Rn : ω ⊤
j ρ ≤ νj ,
for j = 1, . . . , J with J ≥ n + 1. Our goal is to choose the
normal vectors ωj , along with the constant parameters νj ,
defining the half-spaces Hj such that
TJ
(1) M ⊆ S = j=1 Hj ;
(2) the polytope S has minimum volume.
In other words, now also the normal vectors ω j for j =
1, . . . , J have to be optimized. Then, we can formulate the
problem we aim to solve as:
Fig. 1. True state uncertainty set X1 (dark grey region) and half-space H : −ρ1 − 0.5ρ2 ≤ 0.45 (light gray region).
inf
S
(33) with x̃(1) = [xT (1) xT (0)]T and
Z
dx s.t. M ⊆ S,
(38)
S
where S in (38) is constrained to be a polytope. There are
two main aspects making (38) a challenging problem, i.e.,
h1 (x̃(1)) :x1 (0)2 + x2 (0)2 − 0.22 ≤ 0,
(36)
2
(1) the minimum-volume polytope outer-approximating a
generic compact set in Rn might not exist. For instance,
if M is an ellipsoid, its convex hull is described by an
infinite number of half-spaces, namely all the supporting hyperplanes at every boundary point of M.
R
(2) the problem of computing the exact volume S dx of
a polytope S in Rn is #P -hard (see, e.g. [50,51]. The
interested reader is also referred to [52] for details on
#P -hard problems). Although several algorithms have
been proposed in the literature to compute the volume
of a polytope S through triangulation [53,54,55,56],
Gram’s relation [57], Laplace transform [58] or randomized methods [59,60,61], all the approaches mentioned above require an exact description of the polytope S in terms of its half-space or vertex representation. However, in our case, the parameters ω j , νj defining the half-spaces Hj are unknown, as determining
ωj , νj is part of the problem itself.
h2 (x̃(1)) :(x1 (1)−x1(0)x2 (0)(x1(0) + x2(0))) +
|
{z
}
w12 (0)
2
(x1 (1)−x1(0)x2 (0)(2x1(0) + x2(0))) − 0.42 ≤ 0,
{z
}
|
w22 (0)
h3 (x̃(1)) :y(1) − x1 (1) − x2 (1) − 0.5 ≤ 0,
{z
}
|
v(1)
h4 (x̃(1)) : − y(1) − x1 (1) − x2 (1) − 0.5 ≤ 0,
|
{z
}
v(1)
(37)
is solved for a SOS degree 2d = 4. The SOStools [48] has
been used to easily handle the SOS polynomials appearing
in (33). The CPU time taken by the solver SeDuMi [49]
to compute a solution of the SDP Problem (33) on a 2.40GHz Intel Pentium IV with 3 GB of RAM is 2.1 seconds.
The computed half-space H is plotted in Fig. 1, along with
the true state uncertainty set X1 . According to Theorem 5
and Corollary 1, X1 is included in the half-space H. Note
also that, although the original robust optimization problem
(29) has been replaced with the SDP problem (33), the computed parameter ν ∗∗ defining H is such that the hyperplane
ω⊤ x = ν ∗∗ is “almost” tangent to the set X1 . Thus, only a
small level of conservativeness is introduced in using SOS.
In the following paragraph we present a greedy algorithm to
evaluate an approximation of the minimum-volume polytope
outer-approximating the set M.
6.1 Approximation of the objective function
As already pointed out in the previous paragraph, one of the
main problems in solving (38) is that an analytical expression
for the computation of the volume of a polytope S in Rn is
not available and the polytope S is unknown, as computing
S is part of the problem itself. In order to overcome such
a problem, a Monte Carlo integration approach [62] is used
here to approximate the volume of S. Specifically, given an
outer-bounding box B of the set M (which can be computed
as discussed in Theorem 4) and a sequence of N random
points {pi }N
i=1 independent and uniformly distributed in B,
6 Computation of the minimum-volume polytope containing M
In the previous section, given the normal vector ω defining
the half-space H in (27), we have shown how to compute,
through convex optimization, the constant parameter ν such
that M ⊂ H.
10
the integral
R
Algorithm 2: Polytopic outer approximation S of M
[input ] List L = {pi }N
i=1 of N random points uniformly
distributed in the box B.
A2.1 Set j = 1.
A2.2 Compute the half-space Hj , defined as Hj : ω ⊤
j ρ−
νj ≤ 0 (with ωj 6= 0), that contains the minimum number
of points in the list L and such that M is included in Hj ,
i.e.,
dx can be approximated as:
S
Z
dx ≈ V ol(B)
S
N
1 X
I{S} (pi ),
N i=1
(39)
where V ol(B) is the volume of the box B and I{S} (pi ) is the
indicator function of the (unknown) polytope S defined as
I{S} (pi ) =
(
1 if pi ∈ S
0 otherwise
ω ∗j , νj∗ =arg minn
(40)
ω j ∈R
νj ∈R i=1
#
N
1 X
I{S} (pi ) = V ol(S),
E V ol(B)
N i=1
"
N →∞
(41)
(corresponding to the objective function of problem (43)).
Then, the new half-space H2 that minimizes an approximation of the volume of the polytope B ∩H1 ∩H2 is generated.
In order to approximate the volume of B ∩ H1 ∩ H2 , all
the points pi of the list L = {pi }N
i=1 that do not belong
to the polytope B ∩ H1 are discarded, and all and only
the points belonging to B ∩ H1 are collected in a new list
1
The volume of B ∩ H1 ∩ H2
L1 = {pi }N
i=1 (step A2.3).
PN1
is then approximated by i=1 I{H2 } (pi ), with pi ∈ L1 .
The procedure is repeated until NJ+1 = NJ (step A2.4),
which means that the number of samples pi belonging to
the polytope B ∩ H1 ∩ . . . ∩ HJ+1 is equal to the number
of samples pi belonging to the polytope B ∩ H1 ∩ . . . ∩ HJ .
Note that, because of the constraint M ⊆ Hj appearing in
optimization problem (50), the half-spaces H1 , . . . , HJ are
TJ
guaranteed to contain the set M, and thus S = B ∩ j=1 Hj
is an outer approximation of M. Finally, we would like
to remark that, in case we are interested also in bounding
the maximum number of half-spaces defining the polytopic
outer approximation S , Algorithm 2 can be stopped after
an a-priori specified number of iterations.
where w.p. 1 is for with probability 1. For finite samples N ,
the level of accuracy of the approximation in (39) depends
on the shape of the set S as well as on the volume of the
outer box B. The reader is referred to as [62] for details on
Monte Carlo integration methods.
On the basis of (39), the volume minimization of problem
(38) can be then approximated as
min
S∈S
N
X
I{S} (pi ) s.t. M ⊆ S
(43)
A2.3 Collect all the points pi ∈ L belonging to the halfspace Hj (computed through (43)) in a list Lj . Let Nj be
the number of elements of Lj .
A2.4 If Nj < N , then L ← Lj , N ← Nj , j ← j + 1 and
go to step A2.2. Otherwise, set J = j − 1 and go to step
A2.5.
TJ
A2.5 Define the polytope S as S = B ∩ j=1 Hj .
[output ] Polytope S.
where the expectation is taken with respect to the random
variable pi . Furthermore, because of the strong law of large
numbers,
N
1 X
I{S} (pi ) = V ol(S) w.p. 1,
N i=1
I{Hj } (pi )
s.t.
ω j 6= 0
M ⊆ Hj
pi ∈ L, i = 1, . . . , N
Remark 4 It is worth remarking that:
lim V ol(B)
N
X
(42)
i=1
In the following subsection, we describe a greedy procedure
aiming at computing an approximation of the minimization
problem (42).
6.2 A greedy approach for solving (42)
The key steps of the approach proposed in this section to
compute a polytopic outer-approximation S of the set M
are summarized in Algorithm 2.
Example 3 Let us consider again Example 2. The first steps
of Algorithm 2 are visualized in Fig. 2. An outer-bounding
box B of the true state uncertainty set (dark gray region) is
first computed (Fig. (a)). A set of 80 random points (black
dots) uniformly distributed in B is generated (Fig. (b)). The
half-space H1 containing the true state uncertainty set and
the minimum number of points is computed. The points which
do not belong to H1 are discarded (gray dots in Fig. (c)). A
new half-space H2 containing the true state uncertainty set
Algorithm 2 generates a sequence of half-spaces H1 , . . . , HJ
as follows. First, the half-space H1 that minimizes an
approximation of the volume of the polytope B ∩ H1 is
computed. The approximation is due to Rthe fact that the
volume of B ∩ H1 , given by the integral B∩H1 dx, is apPN
proximated (up to the constant V ol(B)
) by i=1 I{H1 } (pi )
N
11
and the minimum number of black dots is computed (Fig.
(d)). Again, the points that do not belong to H1 ∩ H2 are
discarded (gray dots in Fig. (d)). The procedure terminates
when no more black points can be discarded.
RHj (pi )
✻
❅
❅
❅
❅
q 1
IHj (pi )
❅
❅
❅
❅
✲
ω⊤
j p i − νj
Fig. 3. Indicator function IHj (pi ) (black solid line) and approximate function R{Hj } (pi ) (gray thin line). When ω ⊤
j pi − νj > 0,
I{Hj } (pi ) and R{Hj } (pi ) are overlapped and they are equal to 0.
tions I{Hj } (pi ) with the convex functions R{Hj } (pi ), i.e.,
(a)
(b)
ω̃ ∗j , ν̃j∗ =arg minn
N
X
ω j ∈R
νj ∈R i=1
R{Hj } (pi )
s.t.
ω j 6= 0
M ⊆ Hj
pi ∈ L, i = 1, . . . , N.
(c)
(46)
Theorem 6 If (i) there exists at least one point pi in the list
⊤
L such that ω̃ ∗j pi − ν̃j∗ < 0 and (ii) ω̃ ∗j , ν̃j∗ is the optimal
(d)
⊤
solution of problem (46), then the hyperplane ω̃ ∗j ρ−ν̃j∗ = 0
is a supporting hyperplane for the set M.
Fig. 2. First steps of Algorithm 2.
Proof: Theorem 6 is proved by contradiction. Let H̃j∗ be the
Technical details of step A2.2, which is the core of Algorithm 2, are provided in the following sections.
⊤
half-space defined as H̃j∗ : ω̃ ∗j ρ − ν̃j∗ ≤ 0. Let us suppose
that ω̃∗j , ν̃j∗ is a feasible solution of problem (46) such that
⊤
ω̃∗j ρ − ν̃j∗ = 0 is not a supporting hyperplane for M, that
6.3 Approximation of the indicator functions
⊤
is, for some ε > 0, H̃j : ω̃ ∗j ρ − ν̃j∗ + ε ≤ 0 for all x ∈ M.
Let us define ν̃j as ν̃j = ν̃j∗ − ε. Note that {ω̃∗j , ν̃j } is
still a feasible solution of problem (46) and H̃j ⊆ H̃j∗ . Let
P
V∗ = N
i=1 R{H̃∗ } (pi ) be the value of the cost function of
Note that the objective function of problem (43) is noncontinuous and nonconvex since it is the sum of the indicator
functions I{Hj } (pi ) defined as
j
I{Hj } (pi ) =
(
1 if
0 if
ω⊤
j pi
ω⊤
j pi
− νj ≤ 0,
− νj > 0.
Problem (46) obtained for ω = ω̃∗j and ν = ν̃j∗ . R{H̃∗ } (pi )
j
is then given by
(44)
R{H̃∗ } (pi ) =
We then transform it in a convex objective function. Each
indicator function I{Hj } (pi ) is here approximated by the
convex function R{Hj } (xi ) defined as
R{Hj } (pi ) =
(
⊤
−ω⊤
j pi + νj if ω j pi − νj ≤ 0,
0
if ω⊤
j pi − νj > 0.
j
(
⊤
⊤
−ω̃∗j pi + ν̃j∗ if ω̃∗j pi − ν̃j∗ ≤ 0
⊤
if ω̃∗j pi − ν̃j∗ > 0
0
(47)
PN
Similarly, let Ṽ =
i=1 R{H̃j } (pi ) be the value of the
cost function of Problem (46) obtained when ω = ω̃∗j and
ν = ν̃j . The term R{H̃j } (pi ) is the given by
(45)
R{H̃j } (pi ) =
A plot of the functions I{Hj } (pi ) and R{Hj } (pi ) is given in
Fig. 3.
(
⊤
⊤
−ω̃ ∗j pi + ν̃j if ω̃∗j pi − ν̃j ≤ 0
⊤
if ω̃∗j pi − ν̃j > 0
0
(48)
Since H̃j ⊆ H̃j∗ , then when R{H̃∗ } (pi ) = 0, also R{H̃j } (pi )
Problem (43) is thus relaxed by replacing the indicator func-
j
12
is equal to zero. On the other hand, when R{H̃∗ } (pi ) =
following SDP problems:
j
⊤
−ω̃∗j pi
+ ν̃j∗ > 0, then R{H̃j } (pi ) can be equal either to
⊤
zero or to −ω̃∗j pi + ν̃j
⊤
−ω̃∗j pi + ν̃j∗ −ε
ω∗j , ν ∗j = arg minn
⊤
−ω̃ ∗j pi + ν̃j∗ .
=
≤
On the basis of the above considerations, it follows:
R
= R{H̃j } (pi ) if ω̃ ∗j pi − ν̃j∗ ≥ 0
{H̃∗
} (pi )
j
> R{H̃j } (pi ) if ω̃ ∗j pi − ν̃j∗ < 0
R
ω j ∈R
νj ∈R i=1
Qs
⊤
(49)
νj − ω j x = qd (x̃)⊤ Q0 qd (x̃)+
m
X
−
qd (x̃)⊤ Qs qd (x̃)hs (x̃), ∀ x̃ ∈ R2n
Since by hypothesis (i) there exists at least one point pi in
⊤
the list L such that ω̃∗j pi − ν̃j∗ < 0, it follows that V ∗ > Ṽ .
Therefore, ω̃ ∗j , ν̃j∗ is not the optimal solution of problem
(46). This contradicts hypothesis (ii).
s=1
ω ∗j , ν ∗j
νj − ω j x = qd (x̃)⊤ Q0 qd (x̃)+
m
X
−
qd (x̃)⊤ Qs qd (x̃)hs (x̃), ∀ x̃ ∈ R2n
R{Hj } (pi )
(51b)
s=1
Qs 0, s = 0, . . . , m.
pi ∈ L, i = 1, . . . , N
with ω j,1 denoting the first component of vector ω j . The
optimizer {ω∗j , νj∗ } of Problem (50) is the given by the pair
{ω∗j , ν ∗j } or {ω∗j , ν ∗j } that provides the minimum value of
PN
the objective function i=1 R{Hj } (pi ).
Remark 5 For a fixed degree 2d of the SOS polynomials,
the number of optimization variables of Problems (51) increases polynomially with the state dimension n and linearly with the number m of constraints hs (x̃) defining the
set X . Specifically, the number of optimization variables of
Problem (51) is O(mn2d ). In fact, the number of free decision variables
in the
matrices Qs (with s = 0, . . . , m) is
2n+d
2n+d
1+ d
d
= O(n2d ). On the other hand, for a
2
fixed n, the size of the matrices Qs increases exponentially
with the degree 2d of the SOS polynomials. In order not to
obtain too conservative results, practical experience of the
authors suggests to take d ≥ ⌈ d2 ⌉ + 1, where ⌈·⌉ denotes
the ceiling operator. We remind that d is the degree of the
considered polynomial system in (1). Roughly speaking, because of memory requirement issues, the relaxed SDP problems (51) can be solved in commercial workstations and
with general purpose SDP solvers like SeDuMi in case of
polynomial systems with 4 state variables and of degree d
not greater than 6. Systems with more state variables can
be considered in case of smaller values of d. Similarly, systems of higher degree can be considered in case of a smaller
number of state variables.
R{Hj } (pi )
s.t.
ω j 6= 0
ω j ∈R
νj ∈R i=1
Qs
νj − ω j x = qd (x̃)⊤ Q0 qd (x̃)+
m
X
−
qd (x̃)⊤ Qs qd (x̃)hs (x̃), ∀ x̃ ∈ R2n
The constraints M ⊆ Hj can be handled through the SOSbased approach already discussed in Section 5.1. Specifically, by introducing a SOS relaxation, Problem (46) is replaced by:
ω j ∈R
νj ∈R i=1
Qs
= arg minn
N
X
s.t.
ω j,1 = −1
6.4 Handling the constraint M ⊆ Hj
N
X
(51a)
Qs 0, s = 0, . . . , m.
pi ∈ L, i = 1, . . . , N
Theorem 6 has the following interpretation. Among all
the half-spaces defined by the normal vector ω̃ ∗j and containing the set M, the optimization problem (46) provides
⊤
the half-space Hj∗ : ω̃ ∗j ρ − ν̃j∗ ≤ 0 which minimizes the
volume Rof the polytope B ∩ H1∗ ∩ . . . ∩ Hj∗ , even if the
integral B∩H∗ ∩...H∗ dx is approximated (up to a constant)
1
j
PN
by i=1 I{H∗j } (pi ) and the indicator functions I{H∗j } (pi )
are replaced by the convex functions R{H∗j } (pi ).
ω ∗j , νj∗ = arg minn
R{Hj } (pi )
s.t.
ωj,1 = 1
⊤
{H̃∗
} (pi )
j
N
X
(50)
s=1
Qs 0, s = 0, . . . , m.
pi ∈ L, i = 1, . . . , N
Note that, as already discussed in Section 5.1, the constraint
satisfied for all x ∈ X . Therefore, the
νj − ω ⊤
j x ≥ 0 is
is guaranteed to
half-space: Hj = ρ ∈ Rn : ω ⊤
j ρ ≤ νj
contain X . Thus, also the set M is included in Hj . Finally,
note that, in order to deal with the nonconvex constraint
ωj 6= 0 in (50), Problem (50) can be splitted into the two
13
Remark 6 As already discussed, Algorithm 2 computes, at
⊤
each iteration, an half-space Hj : ωj x̃ − νj ≤ 0 containing
the set X (thus also M), i.e.,
⊤
ωj x̃ − νj ≤ 0
∀ x̃ ∈ X .
(52)
The parameters ωj and νj are then computed by solving
Problem (50), and replacing the robust constraint (52) with
a SOS constraint (see Problem (50)). Note that the same
principles of Algorithm 2 and of the SOS-based relaxation
discussed in this section can be used to compute, instead of
an half-space Hj , a more complex semialgebraic set (e.g.,
an ellipsoid) described by the polynomial inequality:
ω ⊤ q(x̃) ≤ 0
∀ x̃ ∈ X ,
Fig. 4. Final polytope after running Algorithm 2.
(53)
• Approximation of the robust constraint ν − ω⊤ x ≥
0 ∀x ∈ X with the
Pmconvex conservative constraint
ν − ω ⊤ x = σ0 (x̃) − s=1 σs (x̃)hs (x̃).
with q(x̃) being a vector of monomials in the variable x̃. The
parameters ω can be then computed by properly modifying
the SOS-relaxed Problem (50). For instance, in case we are
interested in computing an ellipsoidal outer approximation
of X , the function ω ⊤ q(x̃) should have a quadratic form,
and its Hessian should be enforced to be positive definite.
The latter source of approximation can be reduced by increasing the degree 2d of the SOS polynomials. In fact,
as already discussed in Section 5.1, according to the Putinar’s Positivstellensatz each function ν − ω ⊤ x such that
ν − ω ⊤ xP≥ 0 ∀x ∈ X can be written as ν − ω⊤ x =
σ0 (x̃) − m
s=1 σs (x̃)hs (x̃) provided that the degree of the
SOS polynomials σ0 , σ1 , . . . , σm is large enough. On the
other hand, there is no theoretical result concerning the accuracy of the approximation of the indicator functions in
Problem (43) with the convex functions R{Hj } (pi ) appearing in Problem (51). Because of that, the polytope S obtained
by solving convex problems (51) (for j = 1, . . . , J) is not
guaranteed to minimize the original nonconvex optimization
problem (42). Algorithm 3 can then be used to refine the
polytopic outer approximation S provided by Algorithm 2.
Example 4 Let us continue with Example 2. Fig. 4 shows
the polytope obtained by applying Algorithm 2 solving Problems (51) instead of the nonconvex optimization in A2.2.
The SDP Problems (51) are solved for a degree of the SOS
polynomials equal to 2d = 4. The solution is a polytope
S that outer-bounds X1 . It can be observed that because
of the approximations introduced (SOS and the approximation of the indicator functions), which are necessary to efficiently solve the optimizations, the half-spaces bounding
X1 are not tangent to it and the computed region S still include two black points. Therefore, the computed polytope is
not the minimum-volume polytope. However, it is already a
very good outer-approximation of it. In the next section, we
describe a further refinement of Algorithm 2 aiming to computing a tighter polytope S. According to the steps A1.1.3
and A1.1.4 of Algorithm 1, we outer-approximate M (and
so X1 ) with S. At the next time step (k = 2) of the setmembership filter, we repeat the procedure to compute a new
polytope outer-bounding X2 . The difference is now that instead of h1 (·) in (36), we have the 9 linear inequalities that
define the polytope in Fig. 4. This procedure is repeated recursively in time.
The main principle of Algorithm 3 is to process, one by one,
all the points belonging to the polytopic outer-approximation
S initially given by Algorithm 2. For each of such points
⊤
pi , an half-space Hi : ω∗i x̃ − νi∗ ≤ 0 including the set
X (i.e., X ⊆ Hi ) and at the same not containing the point
⊤
pi (i.e., pi 6∈ Hi , or equivalently −ω∗i pi + νi∗ < 0) is
seeked. In this way, all the points pi which do not belong to
the minimum volume polytopic outer approximation of X
are discarded. Thus, a tighter (but more complex) polytopic
outer approximation of X is obtained.
6.5 Refinement of the polytope S
An important feature enjoyed by the refined polytope S ∗ is
given by the following theorem.
Summarizing, an approximate solution of the robust optimization problem (43) is computed by solving the convex
SDP problems (51), and, on the basis of Algorithm 2, the
polytopic-outer approximation S of the set M is then defined as S = B ∩ H1 ∩ . . . ∩ HJ .
Note that, in solving (51) instead of (43), two different
sources of approximation are introduced:
Theorem 7 The polytope S ∗ computed with Algorithm 3 is
a global minimizer of problem (42).
Proof: Let S̃ be a polytope belonging to the set of feasibility
of problem (42) (i.e., M ⊆ S̃) which does not minimize
(42). This means that there exists a polytope S̃˜ such that
M ⊆ S̃˜ ⊆ S̃ and a point p̄ given as input of Algorithm 2
• Approximation of the indicator functions I{Hj } (pi ) with
the convex functions R{Hj } (pi ) (see Fig. 3);
14
Algorithm 3: Refinement of the polytope S
[input] Sequence of the random points pi provided as input
of Algorithm 2 and such that pi ∈ S. Let Ñ be the number
of points pi belonging to S.
A3.1 S ∗ ← S
A3.2 for i = 1 : Ñ
A3.2.1 Compute the solution of the following optimization problem
ω∗i , νi∗ =arg
min −ω⊤ pi + ν
ω ∈ Rn
ν∈R
(54)
s.t.
ω 6= 0
Fig. 5. Exampe 1: hyperplanes defining the polytope S1∗ (black
lines) and true state uncertainty set X1 (gray region).
ν − ω ⊤ x ≥ 0 ∀x ∈ X .
problems (51) in the format required by the used SDP solver.
7 Numerical examples
A3.2.2 S ∗ ← S ∗ ∩ Hi .
[output] Polytope S ∗ .
Let us consider the discrete-time Lotka Volterra preypredator model [63] described by the difference equations:
˜ Thus, for p = p̄, the optimal
such that: p̄ ∈ S̃ and p̄ 6∈ S̃.
i
⊤
solution {ω∗i , νi∗ } of Problem (54) is such that ω ∗i pi −νi∗ >
⊤
0. Let Hi be the half-space defined as Hi : ω ∗i x − νi∗ ≤ 0.
Obviously, p̄ 6∈ Hi . Besides, the output S ∗ of Algorithm 3
is contained in the hyperspace Hi . Therefore, since p̄ 6∈ Hi
and S ∗ ⊆ Hi , it follows that the point p̄ 6∈ S ∗ . Then, a
polytope S̃ that does not minimize the optimization problem
(42) can not be the output of Algorithm 3.
x1(k)=x1 (k−1)(r+1−rx1 (k−1)−bx2 (k−1))+w1 (k−1),
x2(k)=cx1 (k−1)x2 (k−1) + (1 − d)x2 (k−1)+w2 (k−1),
(55)
where x1 (k) and x2 (k) denote the prey and the predator
population size, respectively. In the example, the following
values of the parameters are considered: r = 0.25, b = 0.95,
c = 1.1 and d = 0.55. The observed output is the sum of
the population of the prey and predator densities, i.e.,
Theorem 7 mainly says that there exists no polytope including M and containing less randomly generated points pi
than S ∗ . However, it is worth remarking that only an approximated solution of Problem (54) can be computed, as
the robust constraint ν − ω ⊤ x ≥ 0 ∀x ∈ X appearing in
(54) has to be handled with the SOS-based techniques described in the previous section. Thus, conservativeness could
be added at this step. Therefore, the main interpretation to
be given to Theorem 7 is that Algorithm 3 cancels the effect
of approximating the indicator function I{Hj } (pi ) with the
convex function R{Hj } (pi ).
y(k) = x1 (k) + x2 (k) + v(k),
(56)
where the measurement noise v(k) is bounded and such that
kv(k)k∞ ≤ 0.05. The initial prey and predator sizes x(0) =
⊤
[x1 (0) x2 (0)] are known to belong to the box X0 =
[0.28 0.32] × [0.78 0.82] and the noise process w(k) =
[w1 (k) w2 (k)]⊤ is bounded by kw(k)k∞ ≤ 0.001. The
data are obtained by simulating the model with initial conditions x1 (0) = 0.8 and x2 (0) = 0.3, and by corrupting
the output observations with a random noise v(k) uniformly
distributed within the interval [−0.05 0.05].
Example 5 Let us continue with Example 2. Fig. 5 shows
the computed polytope S1∗ , along with the true state uncertainty set X1 . The CPU taken by the proposed algorithm to
compute the 54 hyper-spaces that define the polytope S1∗ is
about 830 seconds. However, only 80 out of 830 seconds
are spent by the solver SeDuMi to solve 108 (i.e., 54 × 2)
SDP problems of the type (51). The other 750 seconds are
required by the SOStools interface to formulate, 108 times,
the SDP problems (51) in the format used by SeDuMi. Therefore, the computational time required to compute the polytope S1∗ can be drastically reduced not only by using more
efficient SDP solvers, but also directly formulating the SDP
Polytopic outer approximations Sk∗ of the state uncertainty
sets Xk (with k = 1, . . . , 40) are computed through Algorithm 2. N = 20 random points are used to approximate the
volume of the polytope Sk∗ (as described in Section 6.1). In
order to limit the complexity in the description of the polytopes Sk∗ , the maximum number of halfspaces describing Sk∗
is set to 8. This means that Algorithm 2 is stopped after at
most 4 iterations (we remind that the initial outer-bounding
box Bk is already described by 4 half-spaces). When the
15
0.4
0.4
0.3
0.3
x2
0.5
x2
0.5
0.2
0.2
0.1
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0
0.1
0.8
0.2
0.3
x1
0.4
0.5
0.6
0.7
0.8
x1
Fig. 6. Example 2: outer-bounding polytopes (gray) and true state
trajectory (black dots).
Fig. 7. Example 2: outer-bounding boxes (gray) and true state
trajectory (black dots).
output of Algorithm 2 is a polytope Sk∗ described by less
than 8 half-spaces, Algorithms 3 is used to refine the polytopic outer approximation Sk∗ . Fig. 6 shows the computed
polytopes Sk∗ outer approximating the state uncertainty sets
Xk (with k = 1, . . . , 40), along with the true state trajectory.
The Hybrid toolbox [64] has been used to plot the polytopes in Fig. 6. The average CPU time required to compute
a polytope Sk∗ is 28 seconds (not including the time required
by the SOStools interface to formulate the SDP problems
(51) in the format used by the solver SeDuMi). For the sake
of comparison, Fig. 7 shows the outer-bounding approximations of the state uncertainty sets Xk when boxes, instead of
polytopes, are propagated over time. For a better comparison, in Fig. 8 the bounds on the time-trajectory of each state
variable obtained by propagating boxes and polytopes are
plotted. The obtained results show that, as expected, propagating polytopic uncertainty sets instead of boxes provides
a more accurate state estimation. Finally, we would like to
remark that a small uncertainty on the noise process is assumed (i.e., kw(k)k∞ ≤ 0.001) since, for larger bounds on
kw(k)k∞ , it would not be possible to clearly visualize the
uncertainty boxes in Fig. 7.
0.9
0.8
0.7
x1 , x2
0.6
x1
0.5
0.4
0.3
0.2
x2
0.1
0
0
10
20
30
40
time
Fig. 8. Example 2: bounds on state trajectories obtained by propagating boxes (black line); bounds on state trajectories obtained
by propagating polytopes (gray line); true state trajectory (black
dots).
lem can be obtained by using the theory of sum-of-squares
polynomial optimization. We have finally derived a procedure to compute a polytopic outer-approximation of the true
membership-set, by computing the minimum-volume polytope that outer-bounds the set that includes all the means
computed with respect to P. It is worth remarking that the
set-membership filtering approach discussed in the paper can
be extended to handle noise-corrupted input signal observations and uncertainty in the model parameters, provided
that the corresponding state uncertainty set Xk remains a
semi-algebraic set. As future works, we aim first to speed up
the proposed state estimation algorithm in order to be able
to use it in real-time applications in systems with fast dynamics. To this aim, dedicated numerical algorithms, written
in Fortran and C++, for solving the formulated SDP opti-
8 Conclusions
In this paper we have shown that set-membership estimation can be equivalently formulated in a probabilistic setting by employing sets of probability measures. Inferences
in set-membership estimation are thus carried out by computing expectations with respect to the updated set of probability measures P, as in the probabilistic case, and they can
be formulated as a semi-infinite linear programming problem. We have further shown that, if the nonlinearities in the
measurement and process equations are polynomial and if
the bounding sets for initial state, process and measurement
noises are described by polynomial inequalities, then an approximation of this semi-infinite linear programming prob-
16
mization problems will be developed. Furthermore, the SDP
problems will be directly formulated in the format required
by the SDP solver, thus avoiding the use of interfaces like
SOStools. An open source toolbox will be then released.
Second, by exploiting the probabilistic interpretation of setmembership estimation, we plan to reformulate it using the
theory of moments developed by Lasserre. This will allow
us to ground totally set-membership estimation in the realm
of the probabilistic setting, which will give us the possibility
of combining the two approaches in order to obtain hybrid
filters, i.e., filters that include both classical probabilistic uncertainties and set-membership uncertainties.
[15] H. Piet-Lahanier and E. Walter, “Further results on recursive
polyhedral description of parameter uncertainty in the bounded-error
context,” in Proceedings of the 28th IEEE Conference on Decision
and Control, Tampa, Florida, USA, pp. 1964 –1966, 1989.
[16] S. Mo and J. Norton, “Fast and robust algorithm to compute
exact polytope parameter bounds,” Mathematics and computers in
simulation, vol. 32, no. 5-6, pp. 481–493, 1990.
[17] V. Broman and M. Shensa, “A compact algorithm for the intersection
and approximation of N-dimensional polytopes,” Mathematics and
computers in simulation, vol. 32, no. 5-6, pp. 469–480, 1990.
[18] L. Chisci, A. Garulli, and G. Zappa, “Recursive state bounding by
parallelotopes,” Automatica, vol. 32:7, pp. 1049–1055, 1996.
[19] L. Chisci, A. Garulli, A. Vicino, and G. Zappa, “Block
recursive parallelotopic bounding in set membership identification,”
Automatica, vol. 34, no. 1, pp. 15–22, 1998.
References
[20] V. T. H. Le, C. Stoica, T. Alamo, E. F. Camacho, and D. Dumur,
Zonotopes: From Guaranteed State-estimation to Control. John Wiley
& Sons, 2013.
[1] M. Milanese and A. Vicino, “Optimal estimation theory for dynamic
sistems with set membership uncertainty: an overview,” Automatica,
vol. 27, no. 6, pp. 997–1009, 1991.
[21] V. Puig, J. Saludes, and J. Quevedo, “Worst-case simulation of
discrete linear time-invariant interval dynamic systems,” Reliable
Computing, vol. 9, no. 4, pp. 251–290, 2003.
[2] P. L. Combettes, “The foundations of set theoretic estimation,”
Proceedings of the IEEE, vol. 81, pp. 182–208, Feb 1993.
[22] C. Combastel, “A state bounding observer based on zonotopes,” in
European Control Conference, 2003.
[3] M. Milanese, J. Norton, H. Piet-Lahanier, and E. Walter, eds.,
Bounding approaches to system identification. New York: Plenum
Press, 1996.
[23] V. T. H. Le, T. Alamo, E. F. Camacho, C. Stoica, and D. Dumur,
“A new approach for guaranteed state estimation by zonotopes,” in
Proceedings of the 18th IFAC World Congress, Milano, Italy, vol. 28,
2011.
[4] M. Milanese and C. Novara, “Unified set membership theory
for identification, prediction and filtering of nonlinear systems,”
Automatica, vol. 47, no. 10, pp. 2141–2151, 2011.
[5] V. Cerone, D. Piga, and D. Regruto, “Set-membership error-invariables identification through convex relaxation techniques,” IEEE
Transactions on Automatic Control, vol. 57, pp. 517–522, 2012.
[24] T. Alamo, J. Bravo, and E. Camacho, “Guaranteed state estimation
by zonotopes,” in Proceedings of the 42nd IEEE Conference on
Decision and Control, Maui, Hawaii, USA, pp. 5831 – 5836, dec.
2003.
[6] M. Casini, A. Garulli, and A. Vicino, “Feasible parameter set
approximation for linear models with bounded uncertain regressors,”
IEEE Transactions on Automatic Control, vol. 50, no. 11, pp. 2910–
2920, 2014.
[25] G. Calafiore, “Reliable localization using set-valued nonlinear filters,”
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems
and Humans, vol. 35, no. 2, pp. 189–197, 2005.
[26] L. El Ghaoui and G. Calafiore, “Robust filtering for discrete-time
systems with bounded noise and parametric uncertainty,” IEEE
Transactions on Automatic Control, vol. 46, no. 7, pp. 1084–1089,
2001.
[7] F. C. Schweppe, “Recursive state estimation: Unknown but bounded
errors and system inputs,” in Adaptive Processes, Sixth Symposium
on, vol. 6, pp. 102 –107, oct. 1967.
[8] D. Bertsekas and I. Rhodes, “Recursive state estimation for a
set-membership description of uncertainty,” IEEE Transactions on
Automatic Control, vol. 16, pp. 117 – 128, apr 1971.
[27] C. Maier and F. Allgöwer, “A set-valued filter for discrete
time polynomial systems using sum of squares programming,” in
Proceedings of the 48th IEEE Conference on Decision and Control,
Shanghai, China, pp. 223–228, 2009.
[9] V. Kuntsevich and M. Lychak, Guaranteed estimates, adaptation and
robustness in control systems. Springer-Verlag, 1992.
[28] F. Dabbene, D. Henrion, C. Lagoa, and P. Shcherbakov, “Randomized
approximations of the image set of nonlinear mappings with
applications to filtering,” in IFAC Symposium on Robust Control
Design (ROCOND 2015), Bratislava (Russia), 2015.
[10] A. Savkin and I. Petersen, “Robust state estimation and model
validation for discrete-time uncertain systems with a deterministic
description of noise and uncertainty,” Automatica, vol. 34, no. 2,
pp. 271–274, 1998.
[29] A. Benavoli, “The generalized moment-based filter,” IEEE
Transactions on Automatic Control, vol. 58, no. 10, pp. 2642–2647,
2013.
[11] E. Fogel and Y. Huang, “On the value of information in system
identificationbounded noise case,” Automatica, vol. 18, no. 2, pp. 229
– 238, 1982.
[30] A. Benavoli, M. Zaffalon, and E. Miranda, “Robust filtering through
coherent lower previsions,” IEEE Transactions on Automatic Control,
2011.
[12] J. R. Deller and S. F. Odeh, “Implementing the optimal bounding
ellipsoid algorithm on a fast processor,” in Acoustics, Speech, and
Signal Processing, 1989. ICASSP-89., 1989 International Conference
on, pp. 1067–1070, IEEE, 1989.
[13] J. R. Deller and T. C. Luk, “Linear prediction analysis of speech
based on set-membership theory,” Computer Speech & Language,
vol. 3, no. 4, pp. 301 – 327, 1989.
[31] C. Combastel, “Merging kalman filtering and zonotopic state
bounding for robust fault detection under noisy environment,” IFACPapersOnLine, vol. 48, no. 21, pp. 289 – 295, 2015. 9th {IFAC}
Symposium on Fault Detection, Supervision and Safety for Technical
Processes {SAFEPROCESS}, Paris, 2015.
[14] J. R. Deller, M. Nayeri, and M. S. Liu, “Unifying the
landmark developments in optimal bounding ellipsoid identification,”
International Journal of Adaptive Control and Signal Processing,
vol. 8, no. 1, pp. 43–60, 1994.
[32] R. Fernandez-Canti, J. Blesa, and V. Puig, “Set-membership
identification and fault detection using a bayesian framework,” in
Control and Fault-Tolerant Systems (SysTol), 2013 Conference on,
pp. 572–577, Oct 2013.
17
[54] E. Allgöwer and P. Schmidt, “Computing volumes of polyhedra.,”
Math. Comput., vol. 46, no. 173, pp. 171–174, 1986.
[33] A. Gning, L. Mihaylova, and F. Abdallah, “Mixture of uniform
probability density functions for non linear state estimation using
interval analysis,” in Information Fusion (FUSION), 2010 13th
Conference on, pp. 1–8, 2010.
[55] J. B. Lasserre, “An analytical expression and an algorithm for the
volume of a convex polyhedron in Rn ,” Journal of optimization
theory and applications, vol. 39, no. 3, pp. 363–377, 1983.
[34] A. Gning, B. Ristic, and L. Mihaylova, “A box particle filter
for stochastic and set-theoretic measurements with association
uncertainty,” in Information Fusion (FUSION), 2011 Proceedings of
the 14th International Conference on, pp. 1–8, 2011.
[56] A. Bemporad, C. Filippi, and F. Torrisi, “Inner and outer
approximations of polytopes using boxes,” Computational Geometry,
vol. 27, no. 2, pp. 151–178, 2004.
[35] J. Shohat and J. Tamarkin, The problem of moments. American
Mathematical Society, 1950.
[57] J. Lawrence, “Polytope volume computation,” Mathematics of
Computation, vol. 57, no. 195, pp. 259–271, 1991.
[36] M. Krein and A. Nudelḿan, The Markov moment problem and
extremal problems, vol. 50. Amer Mathematical Society, 1977.
[58] J. B. Lasserre and E. S. Zeron, “A Laplace transform algorithm for
the volume of a convex polytope,” Journal of the ACM, vol. 48,
no. 6, pp. 1126–1140, 2001.
[37] J. Lasserre, Moments, positive polynomials and their applications,
vol. 1 of Imperial College Press Optimization Series. World
Scientific, 2009.
[59] R. Smith, “Efficient Monte Carlo procedures for generating points
uniformly distributed over bounded regions,” Operations Research,
pp. 1296–1308, 1984.
[38] V. Cerone, D. Piga, and D. Regruto, “Polytopic outer approximations
of semialgebraic sets,” in IEEE 51st Annual Conference on Decision
and Control, Maui, Hawaii, USA, pp. 7793–7798, 2012.
[60] M. Dyer, A. Frieze, and R. Kannan, “A random polynomial-time
algorithm for approximating the volume of convex bodies,” Journal
of the ACM, vol. 38, no. 1, pp. 1–17, 1991.
[39] A. Karr, “Extreme points of certain sets of probability measures, with
applications,” Mathematics of Operations Research, vol. 8, no. 1,
pp. 74–85, 1983.
[61] S. Wiback, I. Famili, H. Greenberg, and B. Palsson, “Monte Carlo
sampling can be used to determine the size and shape of the steadystate flux space,” Journal of theoretical biology, vol. 228, no. 4,
pp. 437–447, 2004.
[40] A. Shapiro, “On duality theory of conic linear problems,” in in SemiInfinite Programming: Nonconvex Optimization and Its Applications,
pp. 135–165, 2001.
[62] C. Robert and G. Casella, Monte Carlo statistical methods. Springer
Science, 2004.
[41] P. Walley, Statistical Reasoning with Imprecise Probabilities. New
York: Chapman and Hall, 1991.
[63] M. R. S. Raj, A. G. M. Selvam, and R. Janagaraj, “Stability in a
discrete prey-predator model,” Internation Journal of Latest Research
in Science and Technology, vol. 2, no. 1, pp. 482–485, 2013.
[42] A. Benavoli and M. Zaffalon, “Density-ratio robustness in dynamic
state estimation,” Mechanical Systems and Signal Processing, vol. 37,
no. 12, pp. 54 – 75, 2013.
[64] A. Bemporad, “Hybrid Toolbox - User’s Guide,” 2004.
http://cse.lab.imtlucca.it/ bemporad/hybrid/toolbox.
[43] J. B. Lasserre, “Global optimization with polynomials and the
problem of moments,” SIAM Journal on Optimization, vol. 11,
pp. 796–817, 2001.
[44] P. Parrilo, “Semidefinite programming relaxations for semialgebraic
problems,” Mathematical Programming, vol. 96, pp. 293–320, 2003.
[45] G. Chesi, A. Garulli, A. Tesi, and A. Vicino, “Solving quadratic
distance problems: an LMI-based approach,” IEEE Trans. Automatic
Control, vol. 48, no. 2, pp. 200–212, 2003.
[46] M. Putinar, “Positive polynomials on compact semi-algebraic sets,”
Indiana University Mathematics Journal, vol. 42, pp. 969–984, 1993.
[47] M. Laurent, “Sums of squares, moment matrices and optimization
over polynomials,” Emerging Applications of Algebraic Geometry,
Vol. 149 of IMA Volumes in Mathematics and its Applications, M.
Putinar and S. Sullivant (eds.), pp. 157–270, 2009.
[48] A.
Papachristodoulou,
J. Anderson, G. Valmorbida, S. Prajna, P. Seiler, and P. A. Parrilo,
SOSTOOLS: Sum of squares optimization toolbox for MATLAB, 2013.
url: http://www.eng.ox.ac.uk/control/sostools.
[49] J. F. Sturm, “Using SeDuMi 1.02, a MATLAB Toolbox for
optimization over symmetric cones,” Optim. Methods Software,
vol. 11, no. 12, pp. 625–653, 1999.
[50] M. Dyer and A. Frieze, “On the complexity of computing the volume
of a polyhedron,” SIAM Journal on Computing, vol. 17, pp. 967–
974, 1988.
[51] B. Bueler, A. Enge, and K. Fukuda, “Exact volume computation for
polytopes: a practical study,” in DMV SEMINAR, vol. 29, pp. 131–
154, Springer, 2000.
[52] S. Arora and B. Barak, Computational complexity: a modern
approach. Cambridge University Press, 2009.
[53] J. Cohen and T. Hickey, “Two algorithms for determining volumes
of convex polyhedra,” Journal of the ACM, vol. 26, no. 3, pp. 401–
414, 1979.
18
url:
0.4
yo − ŷ
0.2
0
−0.2
−0.4
20
40
60
80
100 120 140 160 180 200
Sample
0.4
yo − ŷ
0.2
0
−0.2
−0.4
20
40
60
80
100 120 140 160 180 200
Sample
| 3cs.SY
|
Evolving Deep Convolutional Neural Networks
for Image Classification
Yanan Sun, Bing Xue and Mengjie Zhang
arXiv:1710.10741v2 [cs.NE] 31 Oct 2017
School of Engineering and Computer Science, Victoria University of Wellington
PO Box 600, Wellington 6140, New Zealand
e-mail: {Yanan.Sunm, Bing.Xue, Mengjie.Zhang}@ecs.vuw.ac.nz
where X and Y are the input data and corresponding label,
respectively, F (·) denotes the architecture choosing function
with the given data, G(·) refers to the initialization method
of the connection weights Weight based on the chosen architecture, and L(·) measures the differences between the
true label and the label predicted by the CNN using X
and Weight . Typically, the Gradient Descend (GD)-based approaches, e.g., Stochastic GD (SGD), are utilized to minimize
L(X, Weight , Y ) within the given number of epochs, where
the connection weight values are iteratively updated. Although
L(·) is not differentiable in all occasions, GD-based methods
are preferred due to their effectiveness and good scalability
as the number of connection weights increases. A CNN
commonly has a huge number of connection weights. However,
F (·) and G(·) are countable functions that are discrete and
neither convex or concave, and they are not well addressed in
practice. Furthermore, because the gradient-based optimizers
are heavily dependent on the initial values of the weights
(including biases), it is essential to choose a suitable G(·)
that can help the consecutive GD-based approaches to escape
from local minima. Furthermore, the performance of assigned
architectures cannot be evaluated until the minimization of L(·)
is finished, while the minimization is a progress of multiple
iterations, which in turn increases the difficulty of choosing the
I. I NTRODUCTION
potential optimal F (·). Therefore, the architecture design and
Convolutional neural networks (CNNs) have demonstrated
connection weight initialization strategy should be carefully
their exceptional superiority in visual recognition tasks, such
treated in CNNs.
as traffic sign recognition [1], biological image segmentaTypically, most of the architecture design approaches were
tion [2], and image classification [3]. CNNs are originally
initially developed for the deep learning algorithms in the early
motivated by the computational model of the cat visual cortex
date (e.g., the Stacked Auto-Encoders (SAEs) [10], [11] and
specializing in processing vision and signal related tasks [4].
the Deep Belief Networks (DBNs) [12]), such as Grid Search
Since LetNet-5 was proposed in 1989 [5], [6], which is an
(GS), Random Search (RS) [13], Bayesian-based Gaussion
implementation of CNNs and whose connection weights are
Process (BGP) [14], [15], Tree-structured Parzen Estimators
optimized by the Back-Propagation (BP) algorithm [7], various
(TPE) [16], and Sequential Model-Based Global Optimizavariants of CNNs have been developed, such as VGGNet [8]
tion (SMBO) [17]. Theoretically, GS exhaustively tests all
and ResNet [9]. These variants significantly improve the clascombinations of the parameters to expectedly seize the best
sification accuracies of the best rivals in image classification
one. However, GS cannot evaluate all combinations within an
tasks. Diverse variants of CNNs differ from their architectures
acceptable time in reality. Moreover, GS is difficult to optimize
and weight connections.
the parameters of continuous values [13]. RS could reduce the
Mathematically, a CNN can be formulated by (1) in the
exhaustive adverse of GS, but the absolute “random” severely
context of an image classification task with the input (X, Y ),
challenges the sampling behavior in the search space [18]–[20].
In addition, BGP incurs extra parameters (i.e., the kernels) that
Architecture = F (X, Y )
Weight = G(Architecture )
(1) are arduous to tune. TPE treats each parameter independently,
while the most key parameters in CNNs are dependent (e.g.,
minimize L(X, Weight , Y )
Abstract—Evolutionary computation methods have been successfully applied to neural networks since two decades ago, while
those methods cannot scale well to the modern deep neural networks due to the complicated architectures and large quantities
of connection weights. In this paper, we propose a new method
using genetic algorithms for evolving the architectures and
connection weight initialization values of a deep convolutional
neural network to address image classification problems. In the
proposed algorithm, an efficient variable-length gene encoding
strategy is designed to represent the different building blocks and
the unpredictable optimal depth in convolutional neural networks.
In addition, a new representation scheme is developed for effectively initializing connection weights of deep convolutional neural
networks, which is expected to avoid networks getting stuck into
local minima which is typically a major issue in the backward
gradient-based optimization. Furthermore, a novel fitness evaluation method is proposed to speed up the heuristic search
with substantially less computational resource. The proposed
algorithm is examined and compared with 22 existing algorithms
on nine widely used image classification tasks, including the stateof-the-art methods. The experimental results demonstrate the
remarkable superiority of the proposed algorithm over the stateof-the-art algorithms in terms of classification error rate and the
number of parameters (weights).
Index Terms—Genetic algorithms, convolutional neural network, image classification, deep learning.
the convolutional layer size and its stride, more details can be
seen in Subsection II-A). The methods mentioned above have
shown their good performance in most SAEs and DBNs, but
are not suitable to CNNs. Their success in SAEs and DBNs is
due largely to the architecture construction approaches, which
are greedy layer-wised by stacking a group of building blocks
with the same structures (i.e., the three-layer neural networks).
In each building block, these architecture-search methods are
utilized for only optimizing the parameters, such as the number
of neurons in the corresponding layer. However in CNNs, the
layer-wised method cannot be applied due to their architecture
characteristics of non-stacking routine, and we must confirm
the entire architectures at a time. Furthermore, multiple different building blocks exist in CNNs, and different orders
of them would result in significantly different performance.
Therefore, the architecture design in CNNs should be carefully
treated. Recently, Baker et al. [21] proposed an architecture
design approach for CNNs based on reinforcement learning,
named MetaQNN, which employed 10 Graphic Processing
Unit (GPU) cards with 8-10 days for the experiments on the
CIFAR-10 dataset.
Due to the drawbacks of existing methods and limited
computational resources available to interested researchers,
most of these works in CNNs are typically performed by
experts with rich domain knowledge [13]. Genetic Algorithms
(GAs), which are a paradigm of the evolutionary algorithms
that do not require rich domain knowledge [22], [23], adapt
the meta-heuristic pattern motivated by the process of natural
selection [24] for optimization problems. GAs are preferred in
various fields due to their characteristics of gradient-free and
insensitivity to local minima [25]. These promising properties
are collectively achieved by a repeated series of the selection, mutation, and crossover operators. Therefore, it can be
naturally utilized for the optimization of architecture design
and the connection weight initialization for CNNs. Indeed,
GAs for evolving neural networks can be traced back to
1989 [26]. In 1999, Yao [25] presented a survey about these
different approaches, which are largely for the optimization
of connection weights in the fixed architecture topologies.
In 2002, Stanley and Miikkulainen proposed the NeuronEvolution Augmenting Topology (NEAT) [27] algorithm to
evolve the architecture and connection weights of a small
scale neural network. Afterwards, the HyperNEAT [28], i.e.,
NEAT combined with the compositional pattern producing
networks [29], was proposed to evolve a larger scale neural
network with an indirect encoding strategy. Motivated by
the HyperNEAT, multiple variants [30]–[32] were proposed
to evolve even larger scale neural networks. However, the
major deficiencies of the HyperNEAT-based approaches are:
1) they are only suitable for evolving deep neural networks
with global connection and single building blocks, such as
SAEs and DBNs, but not CNNs where local connection exists
and multiple different building blocks need to be evolved
simultaneously, and 2) hybrid weigh connections (e.g., connections between two layers that are non-adjacent) may be
evolved, which are contrast to the architectures of CNNs.
Indeed, the views have been many years that evolutionary
algorithms are incapable of evolving the architecture and
connection weights in CNNs due to the tremendous number
of related parameters [33]–[35]. Until very recently in 2017,
Google showed their Large Evolution for Image Classification
(LEIC) method specializing at the architecture optimization
of CNNs [36]. LETC is materialized by GAs without the
crossover operator, implemented on 250 high-end computers,
and archives competitive performance against the state-ofthe-art on the CIFAR-10 dataset by training for about 20
days. Actually, by directly using GAs for the architecture
design of CNNs, several issues would raise in nature: 1)
the best architecture is unknown until the performance is
received based on it. However, evaluating the performance of
one individual takes a long time, and appears more severely
for the entire population. This would require much more
computational resources for speeding up the evolution; 2)
the optimal depth of CNNs for one particular problem is
unknown, therefore it is hard to constrain the search space
for the architecture optimization. In this regard, a variablelength gene encoding strategy may be the best choice for
both 1) and 2), but how to assign the crossover operation for
different building blocks is a newly resulted problem; and 3)
the weight initialization values heavily affect the performance
of the confirmed architecture, but addressing this problem
involves a good gene encoding strategy and the optimization
of hundreds and thousands decision variables.
A. Goal
The aim of this paper is to design and develop an effective
and efficient GA method to automatically discover good architectures and corresponding connection weight initialization
values of CNNs (i.e., the first two formulae in (1)) without
manual intervention. To achieve this goal, the objectives below
have been specified:
1) Design a flexible gene encoding scheme of the architecture, which does not constrain the maximal length of
the building blocks in CNNs. With this gene encoding
scheme, the evolved architecture is expected to benefit
CNNs to achieve good performance in solving different
tasks at hand.
2) Investigate the connection weight encoding strategy,
which is capable of representing tremendous numbers of
the connection weights in an economy way. With this
encoding approach, the weight connection initialization
problem in CNNs is expected to be effectively optimized
by the proposed GA.
3) Develop associated selection (including the environmental selection), crossover, and mutation operators that can
cope with the designed gene encoding strategies of both
architectures and connection weights.
4) Propose an effective fitness measure of the individuals
representing different CNNs, which does not require
intensive computational resources.
Input
24x24
Feature maps
4@20x20
Feature maps
4@10x10
Feature maps
8@8x8
Feature maps
8@4x4
Full connection layer
128x1
Flatten
Convolution
Pooling
Convolution
Pooling
Fig. 1. An general architecture of the Convolutional Neural Network.
5) Investigate whether the new approach significantly outperform the existing methods in both classification accuracy
and number of weights.
B. Organization
the feature map and the input data through padding zeros,
the convolutional operations are categorized into two types:
the VALID (without padding) and the SAME (with padding).
Specifically, each element in the feature map is the sum of the
products of each element from the filter and the corresponding
elements this filter overlaps. If the input data is with multiple
channels, say 3, one feature map will also require 3 different
filters, and each filter convolves on each channel, then the
results are summed element-wised.
1
0
0
1
1
0
1
0
1
1
1
1
0
1
0
0
1
2
2
0
0
1
1
0
1
0
1
1
1
1
0
1
2
2
The reminder of this paper is organized as follows: the Filter {width:2, height:2}
2
2
1
1
1
1
1
1
1
1
1
Feature map
background of the CNNs, the related works on the architecture Stride {width:1, height:1}
Input 4x4
3x3
Input 4x4
design and weight initialization approaches of CNNs are
reviewed in Section II. The framework and the details of each
Fig. 2. An illustration of convolutional operation.
step in the proposed algorithm are elaborated in Section III.
The experiment design and experimental results of the proAn example of the VALID convolutional operation is illusposed algorithm are shown in Sections IV and V, respectively. trated by Fig. 2, where the filter has the same width and height
Next, further discussions are made in Section VI. Finally, the equal to 2, the input data is with the size of 4 × 4, and the
conclusions and future work are detailed in Section VII.
stride has the same height and width equal to 1. As shown in
Fig. 2, the generated feature map is with the size of 3 × 3, the
II. BACKGROUND AND R ELATED W ORK
shadow areas in the input data with different colors refer to
A. Architecture of Convolutional Neural Network
the overlaps with the filter at different positions of the input
1) Bone of CNNs: Fig. 1 exhibits an extensive architecture data, the shadow areas in the feature map are the respective
of one CNN, where there are two convolutional operations, resulted convolutional outcomes, and numbers in the filter are
two pooling operations, the resulted four groups of feature the connection weight values. Generally, convolutional results
maps, and the full connection layer in the tail. The last layer, regarding each filter are updated by adding a bias term and
which is a full connection layer, receives the input data by then through a nonlinearity, such as the Rectifier Linear Unit
flattening all elements of the fourth group of feature maps. (ReLU) [37], before they are stored into the feature map. ObviGenerally, the convolutional layers and the pooling layers can ously, the involved parameters in one convolutional operation
be mixed to stack together in the head of the architecture, are the filter width, the filter height, the number of feature
while the full connection layers are constantly stacked with maps, the stride width, the stride height, the convolutional
each other in the tail of the architecture. The numbers in Fig. 1 type, and the connection weight in the filter.
refer to the sizes of the corresponding layer. Particularly, the
3) Pooling: Intuitively, the pooling operation resembles the
input data is with 24 × 24, the output is with 128 × 1, and convolution operation except for the element-wised product
the other numbers denote the feature map configurations. For and the resulted values of the corresponding feature map.
example, 4@20 × 20 implies there are 4 feature maps, each Briefly, the pooling operation employs a predefined window
with the size of 4 × 4.
(i.e., the kernel) to collect the average value or the maximal
In the following, the details of the convolutional layer and value of the elements where it slides, and the slide size is
the pooling layer, which are associated with the convolution also called “stride” as in the convolutional operation. For
and the pooling operations, respectively, are documented in better understanding, an example of the pooling operation is
detail, while the full connection layer is not intended to illustrated by Fig. 3, where the kernel is with the size of 2 × 2,
describe here because it is well-known.
and the both stride width and height are 2, the input data
2) Convolution: Given an input image with the size of is with the size of 4 × 4, the shadows with different colors
n × n, in order to receive a feature map generated by the refer to the two slide positions and the resulted pooling values.
convolutional operations, a filter must be defined in advance. In this example, the maximal pooling operation is employed.
Actually, a filter (it can also be simply seen as a matrix) is Evidently in the pooling operation, the involved parameters
randomly initialized with a predefined size (i.e., the filter width are the kernel width, the kernel height, the stride width, the
and the filter height). Then, this filter travels from the leftmost stride height, and the pooling type.
to the rightmost of the input data with the step size equal to
a stride (i.e., the stride width), and then travels again after B. CNN Architecture Design Algorithm
In this subsection, only LEIC [36] is concerned due to its
moving downward with the step size equal to a stride (i.e.,
the stride height), until reach the right bottom of the input specific intention for the architecture design of CNNs. To this
image. Depending on whether to keep the same sizes between end, we will review the algorithm and then point out the
first initialization method. In the second initialization approach,
the shortage of the first one has been solved, but the major diffi0
1
1
1
0
1
1
1
1
1
culty exists in choosing the parameter of the distribution, such
1
1
0
1
1
1
0
1
1
1
as the range of the uniform distribution, and the mean value as
Kernel {width:2, height:2}
1
1
1
1
1
1
1
1
Stride {width:2, height:2}
Feature map
well as the standard derivation of the Gaussian distribution. To
Input 4x4
2x2
Input 4x4
solve this problem, the Xavier initializer presented a range for
uniform sampling based on the neuron saturation prior using
Fig. 3. An illustration of pooling operation.
the sigmoid activation function [39]. Supposed the number of
neurons in two adjacent layers are n1 and n2 , the values of
limitations, which are used to highlight the necessity of the the weights connecting
these two layers are initialized
within
i
h p
p
corresponding work in the proposed algorithm.
the range of − 6/(n1 + n2 ), 6/(n1 + n2 ) by uniformly
LEIC employed a GA to evolve the architectures of CNNs, sampling. Although the Xavier initializer works better than the
where individuals were evolved from scratch, and each individ- initialization methods from the other two categories, a couple
ual was encoded with a variable-length chromosome. During of major issues exist: 1) It highly relies on the architectures of
the phase of evolution, different kinds of layers can be incor- CNNs, particularity the number of neurons in each layer in the
porated into the individuals by the mutation operation, with networks (e.g., n and n in its formulation). If the optimal
1
2
the expectation that individuals with promising performance architectures of the networks are not found, the resulted
will be generated. Note that, the crossover operation, which initialized parameters perform badly as well, then there is no
are designed for local search in GAs, were not investigated way to evaluate the desired performance of the architectures
in the main part of LEIC. Without any crossover operator, and may mislead the adjustment of the architectures. 2) The
GAs typically require a large population size for reducing Xavier initializer is presented on the usage of the sigmoid
the adverse impact. Therefore, LETC adopted a population activation, while the widely used activation function in CNNs
size of 103 , while that of a magnitude with order 102 is is the ReLU [3], [9], [40], [41].
a general setting in the GA community. In addition, 250
To the best of our knowledge, there has not been any existhigh-end computers were employed for LEIC, which was ing evolutionary algorithm for searching for the connection
caused by the fitness assignment approach utilized in LEIC. weight initialization of deep learning algorithms including
In LEIC, each individual was evaluated with the final image CNNs. The main reason is the tremendous numbers of weights,
classification accuracy, which typically took a long time due to which are difficult to be effectively encoded into the chromothe iterative nature of GD-based optimizers. However, LEIC somes and to be efficiently optimized due to its large-scale
reported an external experiment on the crossover operation, global optimization nature [42].
which was used only for exchanging the mutation probabilities
III. T HE PROPOSED ALGORITHM
and the connection weights trained by SGD. Although it is
In this section, the proposed Evolving deep Convolutional
difficult to reach the actual reason why the crossover has not
been used for evolving the architectures in LETC, it is obvious Neural Networks (EvoCNN) for image classification is docuat least that the crossover operations are not easy to achieve mented in detail.
for chromosomes with different lengths. This would be more A. Algorithm Overview
complicated in CNNs that have multiple different building
blocks.
In summary, the main deficiency of LEIC is its high com- Algorithm 1: Framework of EvoCNN
putational complexity mainly caused by the fitness evaluation 1 P0 ←Initialize the population with the proposed gene
encoding strategy;
strategy it adopts as well as without crossover operations. The
2
t
← 0;
huge computational resource that LEIC requires makes it very
3
while
termination criterion is not satisfied do
intractable in academic environment.
4
Evaluate the fitness of individuals in Pt ;
C. Connection Weight Initialization
5
S ← Select parent solutions with the developed slack
binary tournament selection;
Typically, the initialization methods are classified into three
6
Q
t ← Generate offsprings with the designed genetic
different categorises. The first employs constant numbers to
operators
from S;
initialize all connection weights, such as the zero initializer,
7
P
←Environmental
selection from Pt ∪ Qt ;
t+1
one initializer, and other fixed value initializer. The second is
8
t
←
t
+
1;
the distribution initializer, such as using the Gaussion distribution or uniform distribution to initialize the weights. The third 9 end
covers the initialization approaches with some prior knowl- 10 Select the best individual from Pt and decode it to the
corresponding convolutional neural network.
edge, and the famous Xavier initializer [38] belongs to this
category. Because of the numerous connection weights existAlgorithm 1 outlines the framework of the proposed
ing in CNNs, it is not necessary that all the connection weights
start with the same values, which is the major deficiency of the EvoCNN method. Firstly, the population is initialized based on
max(1,0,1,1)
0
1
1
0
max(0,1,1,0)
0
1
1
0
C
P
C
C
C
P
C
P
C
Convolutional
C
C
P
F
...
F
F
F
...
P
...
C
Pooling
P
Full connection
F
Fig. 4. An example of three chromosomes with different lengths in EvoCNN.
TABLE I
T HE ENCODED INFORMATION IN E VO CNN.
Unit Type
convolutional
layer
pooling layer
full connection
layer
Encoded Information
the filter width, the filter height, the number of feature
maps, the stride width, the stride height, the convolutional type, the standard deviation and the mean value
of filter elements
the kernel width, the kernel height, the stride width, the
stride height, and the pooling type (i.e., the average or
the maximal)
the number of neurons, the standard deviation of
connection weights, and the mean value of connection
weights
the proposed flexible gene encoding strategy (line 1). Then, the
evolution begins to take effect until a predefined termination
criterion, such as the maximum number of the generations,
has been satisfied (lines 3-9). Finally, the best individual is
selected and decoded to the corresponding CNN (line 10) for
final training.
During the evolution, all individuals are evaluated first based
on the proposed efficient fitness measurement (line 4). After
that, parent solutions are selected by the developed slack
binary tournament selection (line 5), and new offspring are
generated with the designed genetic operators (line 6). Next,
representatives are selected from the existing individuals and
the generated offsprings to form the population in the next
generation to participate subsequent evolution (line 7). In
the following subsections, the key steps in Algorithm 1 are
narrated in detail.
B. Gene Encoding Strategy
Table I. Commonly, hundreds of thousands connection weights
may exist in one convolutional or full connection layer, which
cannot be all explicitly represented by a chromosome and
effectively optimized by GAs. Therefore, in EvoCNN, we use
only two statistical real numbers, the standard derivation and
mean value of the connection weights, to represent the numerous weight parameters, which can be easily implemented by
GAs. When the optimal mean value and the standard derivation
are received, the connection weights are sampled from the
corresponding Gaussian distribution. The details of population
initialization in EvoCNN are given in the next subsection
based on the gene encoding strategy introduced above.
C. Population Initialization
Algorithm 2: Population Initialization
Input: The population size N , the maximal number of
convolutional and pooling layers Ncp , and the
maximal number of full connection layers Nf .
Output: Initialized population P0 .
1 P0 ← ∅;
2 while |P0 | ≤ N do
3
part1 ← ∅;
4
ncp ← Uniformaly generate an integer between
[1, Ncp ];
5
while |part1 | ≤ ncp do
6
r ← Uniformly generated a number between
[0, 1];
7
if r ≤ 0.5 then
8
l ← Initialize a convolutional layer with
random settings;
9
else
10
l ← Initialize a pooling layer with random
settings;
11
end
12
part1 ← part1 ∪ l;
13
end
14
part2 ← ∅;
15
nf ← Uniformaly generate an integer between
[1, Nf ];
16
while |part2 | ≤ nf do
17
l ← Initialize a full connection layer with random
settings;
18
part2 ← part2 ∪ l;
19
end
20
P0 ← P0 ∪ (part1 ∪ part2 );
21 end
22 Return P0 .
As introduced in Subsection II-A, three different building
blocks, i.e., the convolutional layer, the pooling layer, and the
full connection layer, exist in the architectures of CNNs. Therefore, they should be encoded in parallel into one chromosome
for evolution. Because the optimal depth of a CNN in solving
one particular problem is unknown prior to confirming its
architecture, the variable-length gene encoding strategy, which
is very suitable for this occasion, is employed in the proposed
EvoCNN method. Furthermore, because the performance of
CNNs is highly affected by their depths [8], [43]–[45], this
For convenience of the elaboration, each chromosome is
variable-length gene encoding strategy makes the proposed
EvoCNN method have chances to reach the best result due separated into two parts. The first part includes the convolutional layers and the pooling layers, and the other part is the
to no constrains on the architecture search space.
In particular, an example of three chromosomes with dif- full connection layers. Based on the convention of the CNN
ferent lengths from EvoCNN is illustrated by Fig. 4, and all architectures, the first part starts with one convolutional layer.
represented information in these three layers are detailed in The second part can be added to only at the tail of the first
part. In addition, the length of each part is set by randomly evaluation in EvoCNN. Because EvoCNN concerns on solving
choosing a number within a predefined range.
image classification tasks, the classification error is the best
Algorithm 2 shows the major steps of the population initial- strategy to assign their fitness. The number of connection
ization, where |·| is a cardinality operator, lines 3-13 show the weights is also chosen as an additional indicator to measure
generation of the first part of one chromosome, and lines 14- the individual’s quality based on the principle of Occam’s
19 show that of the second part. During the initialization of razor [46].
the first part, a convolutional layer is added first. Then, a
With the conventions, each represented CNN is trained
convolutional layer or a pooling layer is determined by the on the training set Dtrain , and the fitness is estimated on
once coin tossing probability and then added to the end, which another dataset Df itness 1 . CNNs are frequently with deep
is repeated until the predefined length of this part is met. For architectures, thus thoroughly training them for receiving the
the second part, full connection layers are chosen and then final classification error would take considerable expenditure
added. Note here that, convolutional layers, pooling layers, of computing resource and a very long time due to the
and full connection layers are initialized with the random large number of training epochs required (>100 epochs are
settings, i.e., the information encoded into them are randomly invariably treated in fully training CNNs). This will make it
specified before they are stored into the corresponding part. much more impracticable here due to the population-based
After these two parts finished, they are combined and returned GAs with multiple generations (i.e., each individual will take a
as one chromosome. With the same approach, a population of full training in each generation). We have designed an efficient
individuals are generated.
method to address this concern. In this method, each individual
is trained with only a small number of epochs, say 5 or 10
D. Fitness Evaluation
epochs, based on their architectures and connection weight
initialization values, and then the mean value and the standard
derivation
of classification error are calculated on each batch
Algorithm 3: Fitness Evaluation
of
D
f itness in the last epoch. Both the mean value and the
Input: The population Pt , the training epoch number k
standard
derivation of classification errors, are employed as the
for measuring the accuracy tendency, the training
fitness
of
one individual. Obviously, the smaller mean value,
set Dtrain , the fitness evaluation dataset Df itness ,
the
better
individual.
When the compared individuals are with
and the batch size num of batch.
the
same
mean
values,
the less standard derivation indicates
Output: The population with fitness Pt .
the
better
one.
1 for each individual s in Pt do
In summary, three indicators are used in the fitness evalu2
i ← 1;
ation,
which are the mean value, standard derivation, and the
3
eval steps ← |Df itness |/num of batch;
number
of parameters. There are several motivations behind
4
while i ≤ k do
this
fitness
evaluation strategy: 1) It is sufficient to investigat5
Train the connection weights of the CNN
ing
only
the
tendency of the performance. If individuals are
represented by individual s;
with
better
performance
in the first several training epochs of
6
if i == k then
CNNs,
they
will
probably
still have the better performance in
7
accy list ← ∅;
the
following
training
epochs
with greater confidence. 2) The
8
j ← 1;
mean
value
and
the
standard
derivation are statistical signifi9
while j ≤ eval steps do
cance
indicators,
thus
suitable
for investigating this tendency,
10
accyj ← Evaluate the classification error
and
the
final
classification
error
can be received by optimizing
on the j-th batch data from Df itness ;
only
the
best
individual
evolved
by the proposed EvoCNN
11
accy list ← accy list ∪ accyj ;
method.
3)
CNN
models
with
less
number of connection
12
j ← j + 1;
weights
are
preferred
by
smart
devices
(more details are
13
end
discussed
in
Section
VI).
14
Calculate the number of parameters in s, the
mean value and standard derivation from
E. Slack Binary Tournament Selection
accy list, assign them to individual s, and
update s from Pt ;
We develop one slack version of the standard binary tour15
end
nament selection, which are documented in Algorithm 4, to
16
i ← i + 1;
select parent solutions for the crossover operations in the
17
end
proposed EvoCNN method. Briefly, two sets of comparisons
18 end
are employed. The comparisons between the mean values of
19 Return Pt .
individuals involves a threshold α, and that comparisons between the parameter numbers involves another threshold β. If
Fitness evaluation aims at giving a quantitative measure
determining which individuals qualify for serving as parent
solutions. Algorithm 3 manifests the framework of the fitness
1 The original training set is randomly split into D
train and Df itness ,
where Df itness is unseen to the CNN training phase, which can give a good
indication of the generalization accuracy on the test set.
units, i.e., the convolutional layer, the pooling layer, and the
full connection layer, are firstly collected into three different
lists based on their orders in the corresponding chromosome,
which refers to the Unit Collection (UC) phase. Then, these
three lists are aligned at the top, and units at the same positions
are performed the crossover. This phase is named the UA
and crossover phase. Finally, the Unit Restore (UR) phase is
employed, i.e., when the crossover operation is completed, the
units in these lists are restored to their original positions of
the associated chromosomes. With these three consequential
phases (i.e., the UC, the UA and crossover, and the UR), two
chromosomes with different lengths could easily exchange
their gene information for crossover. Because the crossover
operation is performed on the unit lists where only the units
with the same types are loaded, this proposed UA crossover
operation is natural (because they have the same origins).
For the remaining units, which do not perform crossover
operations due to no paired ones, are kept at the same position.
Mutation operations may perform on each position of the
units from one chromosome. For a selected mutation point, a
unit could be added, deleted, or modified, which is determined
by a probability of 1/3. In the case of unit addition, a convolutional layer, a pooling layer, or a full connection layer is added
by taking a probability of 1/3. If the mutation is to modify an
existing unit, the particular modification is dependent on the
unit type, and all the encoded information in the unit would be
changed (encoded information on each unit type can be seen in
Table I). Note that all the encoded formation is denoted by real
the parent solution cannot be selected with these comparisons,
numbers, therefore the Simulated Crossover (SBX) [47] and
the individual with smaller standard derivation is chosen.
the polynomial mutation [48] are employed in the proposed
In practice, tremendous number of parameters exist in deep
EvoCNN method due to their notable show in real number
CNNs, which would easily cause the overfitting problem.
gene representations.
Therefore, when the difference between the mean values of
two individuals is smaller than the threshold α, we further con- G. Environmental Selection
sider the number of connection weights. The slight change of
the parameter numbers will not highly affect the performance
Algorithm 5: Environmental Selection
of CNNs. Consequently, β is also introduced.
Input: The elistsm fraction γ, and the current population
By iteratively performing this selection, parent solutions
Pt ∪ Qt .
are selected and stored into a mating pool. In the proposed
Output:
The selected population Pt+1 .
EvoCNN method, the size of the mating pool is set to be the
1 a ← Calculate the number of elites based on γ and the
same of the population size.
predefined population size N from Algorithm 2;
F. Offspring Generation
2 Pt+1 ← Select a individuals that have the best mean
values from Pt ∪ Qt ;
The steps for generating offspring are given as follows:
3 Pt ∪ Qt ← Pt ∪ Qt − Pt+1 ;
step 1): randomly select two parent solutions from the mating
4 while |Pt+1 | < N do
pool;
5
s1 , s2 ← Randomly select two individuals from
step 2): use crossover operator on the selected solutions to
Pt ∪ Qt ;
generate offspring;
6
s ← Employe Algorithm 4 to select one individual
step 3): use mutation operator on the generated offspring;
from s1 and s2 ;
step 4): store offspring, remove the parent solutions from the
7
Pt+1 ← Pt+1 ∪ s;
mating pool, and perform steps 1-3 until the mating
8 end
pool is empty.
9 Return Pt+1 .
The proposed crossover operation can be seen in Fig. 5. To
achieve crossover, we design a method called Unit Alignment
(UA) for recombining two individuals with different chromoThe environmental selection is shown in Algorithm 5. Dursome lengths. During the crossover operation, three different ing the environmental selection, the elitism and the diversity
Algorithm 4: Slack Binary Tournament Selection
Input: Two compared individuals, the mean value
threshold α, and the paramemter number
threshold β.
Output: The selected individual.
1 s1 ← The individual with larger mean value;
2 s2 ← The other individual;
3 µ1 , µ2 ← The mean values of s1 , s2 ;
4 std1 , std2 ← The standard derivations of s1 , s2 ;
5 c1 , c2 ← The parameter numbers of s1 , s2 ;
6 if µ1 − µ2 > α then
7
Return s1 .
8 else
9
if c1 − c2 > β then
10
Return s2 .
11
else
12
if std1 < std2 then
13
Return s1 .
14
else if std1 > std2 then
15
Return s2 .
16
else
17
Return randon one from {s1 , s2 }.
18
end
19
end
20 end
Convolutional
Pooling
C
Full connection
P
Chromosome #1
C1
P1
C2
Convolutional
unit list
C3
F
Chromosome #2
P2
Pooling
unit list
F1
F2
F3
C1
Full connection
unit list
P1
C2
P2
Convolutional
unit list
P3
F1
Pooling
unit list
F2
F3
Full connection
unit list
C1
P1
F1
C1
P1
F1
C2
P2
F2
C2
P2
F2
P3
F3
C3
F3
F4
F4
(a) Unit Collection
crossover
crossover
C1
C1
crossover
P1
crossover
P1
F1
P2
F2
P3
F3
F1
crossover
C2
C2
crossover
P2
C3
F2
crossover
F3
F4
(b) Unit Aligh and Crossover
Offspring #2
Offspring #1
C1
P1
C2
C3
P2
F1
F2
F3
C1
P1
C2
P2
P3
F1
F2
F3
F4
(c) Unit Restore
Fig. 5. An example to illustrate the entire crossover process. In this example, the first chromosome is with length 8 including three convolutional layers, two
pooling layers, and three full connection layers; the other one is with length 9 including two convolutional layers, three pooling layers, and four full connection
layers. In the first step of crossover (i.e., the unit collection), the convolutiona layers, the pooling layers, and the full connection layers are collected from
each chromosome and stacked with the same orders to them in each chromosome (see Fig. 5a). In the second step, the unit lists with the same unit types
are aligned at the top, i.e., the two convolutional layer lists are picked and aligned, and the same operations on the other two lists. When these unit lists
finish the alignment, units at the same positions from the each two lists are paired and performed crossover operation, which can be shown in Fig. 5b. At last,
units from these unit lists are restored based on the positions where they are from (see Fig. 5b). Note in Fig. 5b, the units that have experienced crossover
operations are highlighted with italics and underline fonts, while the units that do not perform the crossover operations remain the same.
are explicitly and elaborately addressed. To be specific, a fraction of individuals with promising mean values are chosen first,
and then the remaining individuals are selected by the modified
binary tournament selection demonstrated in Subsection III-F.
By these two strategies, the elitism and the diversity are
considered simultaneously, which are expected to collectively
improve the performance of the proposed EvoCNN method.
Note here that, the selected elites are removed before the
tournament selection gets start to work (line 3 of Algorithm 5),
while the individuals selected for the purpose of diversity are
kept in the current population for the next round of tournament
selection (lines 4-8 of Algorithm 5) based on the convention
in the community.
and then the decoded CNN will be deeply trained with a larger
number of epochs by SGD for future usage.
IV. E XPERIMENT D ESIGN
In order to quantify the performance of the proposed
EvoCNN, a series of experiments are designed and performed
on the chosen image classification benchmark datasets, which
are further compared to state-of-the-art peer competitors. In the
following, these benchmark datasets are briefly introduced at
first. Then, the peer competitors are given. Finally, parameter
settings of the proposed EvoCNN method participating into
these experiments are documented.
A. Benchmark Datasets
H. Best Individual Selection and Decoding
In these experiments, nine widely used image classification
At the end of evolution, multiple individuals are with benchmark datasets are used to examine the performance of
promising mean values but different architectures and connec- the proposed EvoCNN method. They are the Fashion [49], the
tion weight initialization values. In this regard, there will be Rectangle [50], the Rectangle Images (RI) [50], the Convex
multiple choices to select the “Best Individual”. For example, Sets (CS) [50], the MNIST Basic (MB) [50], the MNIST
if we are only concerned with the best performance, we with Background Images (MBI) [50], Random Background
could neglect their architecture configurations and consider (MRB) [50], Rotated Digits (MRD) [50], and with RD plus
only the classification accuracy. Otherwise, if we emphasis Background Images (MRDBI) [50] benchmarks.
Based on the types of the classification objects, these
the smaller number of parameters, corresponding decision
could be made. Once the “Best Individual” is confirmed, benchmarks are classified into three different categories. The
the corresponding CNN is decoded based on the encoded first category includes only Fashion, which is for recognizing
architecture and connection weight initialization information, 10 fashion objects (e.g., trousers, coats, and so on) in the
50, 000 training images and 10, 000 test images. The second final classification accuracy and is invisible to public. As for
one is composed of the MNIST [6] variants including the other architecture design approaches introduced in Section I,
MB, MBI, MRB, MRD, and the MRDBI benchmarks for such as GS, RS, among others, they are not scalable to CNNs
classifying 10 hand-written digits (i.e., 0-9). Because the and not suitable to be directly compared as well.
MNIST has been easily achieved 97%, these MNIST variants
In the experiments, state-of-the-art algorithms that have
are arbitrarily added into different barriers (e.g., random back- reported promising classification errors on the chosen benchgrounds, rotations) from the MNIST to improve the complexity marks are collected as the peer competitors of the proof classification algorithms. Furthermore, these variants have posed EvoCNN method. To be specific, the peer com12, 000 training images and 50, 000 test images, which further petitors on the Fashion benchmark are collected from the
challenges the classification algorithms due to the mush less dataset homepage2. They are 2C1P2F+Dropout, 2C1P, 3C2F,
training data while more test data. The third category is for 3C1P2F+Dropout, GRU+SVM+Dropout, GoogleNet [41],
recognizing the shapes of objects (i.e., the rectangle or not for AlexNet [3], SqueezeNet-200 [51], MLP 256-128-64, and
the Rectangle and RI benchmarks, and the convex or not for VGG16 [52], which perform the experiments on the raw
the Convex benchmark). Obviously, this category covers the dataset without any preprocessing. The peer competitors on
Rectangle, the RI, and the CS benchmarks that contain 1, 200, other benchmarks are CAE-2 [53], TIRBM [54], PGBM+DN12, 000, and 8, 000 training images, respectively, and all of 1 [55], ScatNet-2 [56], RandNet-2 [57], PCANet-2 (softthem include 50, 000 test images. Compared to the Rectangle max) [57], LDANet-2 [57], SVM+RBF [50], SVM+Poly [50],
benchmark, the RI is generated by adding randomly sampled NNet [50], SAA-3 [50], and DBN-3 [50], which are from
backgrounds from the MNIST for increasing the difficulties the literature [57] recently published and the provider of the
of classification algorithms.
benchmarks3.
In addition, each image in these benchmarks is with the size
28 × 28, and examples from these benchmarks are shown in C. Parameter Settings
Fig. 6 for reference. Furthermore, another reason for using
All the parameter settings are set based on the conventions
these benchmark datasets is that different algorithms have in the communities of evolutionary algorithms [58] and deep
reported their promising results, which is convenient for the learning [59], in addition to the maximal length of each basic
comparisons on the performance of the proposed EvoCNN layer. Specifically, the population size and the total generation
method and these host algorithms (details can be seen Subsec- number are set to be 100. The distribution index of SBX and
tion IV-B).
Polynomial mutation are both set to be 20, and their associated
probabilities are specified as 0.9 and 0.1, respectively. The
maximum lengths of the convolutional layers, the pooling
layers, and the full connection layers are set to be the same
(a) Examples from the first category. From left to right, they are T-shirt, trouser, as 5 (i.e., the maximal depths of CNNs in these experiments
pullover, dress, coat, sandal, shirt, sneaker, bag, and ankle boot.
are 15). Moreover, the proportion of the elitism is set to be
20% based on the Pareto principle. Note that the 20% data
are randomly selected from the training images as the fitness
evaluation dataset. For the implementation of the proposed
(b) Examples from the second category. From left to right, each two images
EvoCNN method, we constrain the same values of the width
are from one group, and each group is from MBi, MRB, MRD, MRDBI, and
MB, respectively. These images refer to the hand-written digits 0, 4, 2, 6, 0, and height for filter, stride, and kernel. The width and height
5, 7, 5, 9, and 6, respectively.
for stride in the convolutional layer are set to be 1, those in
the pooling layer are specified at the same value to its kernel,
and the convolutional type is fixed to “SAME”.
The proposed EvoCNN method is implemented by Tensor(c) Examples from the thrid category, From left to right, the first three images
flow [60], and each copy of the code runs in a computer
are from the Rectangle benchmark, the following four ones are from the RI
benchmark, and the remaingings are from the Convex benchmark. Specifically, equipped with two GPU cards with the identical model number
these examples with the index 1, 2, 6, 7, and 11 are positive samples.
GTX1080. During the final training phase, each individual
Fig. 6. Examples from the benchmarks chosen.
is imposed by the BatchNorm [61] for speeding up and the
weight decay with an unified number for preventing from
B. Peer Competitors
the overfitting. Due to the heuristic nature of the proposed
Ideally, the algorithms for neural network architecture de- EvoCNN method, 30 independent runs are performed on each
sign discussed in Section I should be collected here as the peer benchmark dataset, and the mean results are estimated for
competitors. However, because MetaQNN [21] and LEIC [36] the comparisons unless otherwise specified. Furthermore, the
highly rely on the computational resources, it is impossible experiments take 4 days on the Fashion benchmark for each
to reproduce the experimental results in an academic envi- run, 2–3 days on other benchmarks.
ronment. Furthermore, the benchmark dataset investigated in
2 https://github.com/zalandoresearch/fashion-mnist
these two algorithms employed different data preprocessing
3 http://www.iro.umontreal.ca/∼ lisa/twiki/bin/view.cgi/Public/DeepVsShallowComparisonIC
and augmentation techniques, which will highly enhance the
V. E XPERIMENTAL R ESULTS AND A NALYSIS
classification error rates, where the difference is only 0.2%.
The
proposed EvoCNN method further decreases the error rate
In this section, the experimental results and analysis of the
by
0.83%
to 5.47%. Furthermore, the mean performance of
proposed EvoCNN method against peer competitors are shown
EvoCNN
is
even better than the best performance of eight
in Subsection V-A. Then, the weight initialization method in
competitors,
and
only a little worse than the best of GoogleNet
the proposed EvoCNN method are specifically investigated in
and
VGG16.
However,
EvoCNN has a much smaller number
Subsection V-B.
of connection weights — EvoCNN uses 6.52 million weights
A. Overall Results
while GoogleNet uses 101 million and VGG uses 26 million
Experimental results on the Fashion benchmark dataset are weights. EvoCNN also employs only half of the numbers of
shown in Table II, and those on the MB, MRD, MRB, MBI, training epochs used in the VGG16. The results show that the
MRDBI, Rectangle, RI, and Convex benchmark datasets are proposed EvoCNN method obtains much better performance in
shown in Table III. In Tables II and III, the last two rows the architecture design and connection weight initialization of
denote the best and mean classification errors received from CNNs on the Fashion benchmark, which significantly reduces
the proposed EvoCNN method, respectively, and other rows the classification error of the evolved CNN generated by the
show the best classification errors reported by peer competi- proposed EvoCNN method.
According to Table III, EvoCNN is the best one among all
tors4 . In order to conveniently investigate the comparisons, the
terms “(+)” and “(-)” are provided to denote whether the best the 13 different methods. Specifically, EvoCNN achieves the
result generated by the proposed EvoCNN method is better or best performance on five of the eight datasets, and the second
worse that the best result obtained by the corresponding peer best on the other three datasets — the MB, MRD, and Convex
competitor. The term “—” means there is no available result datasets, where LDANet-2, TIRBM, and PCANet-2(softmax)
reported from the provider or cannot be counted. Most informa- achieve the lowest classification error rate, respectively. Furtion of the number of parameters and number of training epoch thermore, comparing the mean performance of EvoCNN with
from the peer competitors on the Fashion benchmark dataset the best of the other 12 methods, EvoCNN is the best on four
is available, therefore, such information from EvoCNN is also datasets (MRB, MBI, Rectangle and RI), second best on two
shown in Table II for multi-view comparisons. However, for (MRD and Convex), third best and fourth best on the other two
the benchmarks in Table III, such information is not presented datasets (MRDBI and MB). Particularly on MRB and MBI,
because they are not available from the peer competitors. the lowest classification error rates of the others are 6.08%
Note that all the results from the peer competitors and the and 11.5%, and the mean error rates of EvoCNN are 3.59%
proposed EvoCNN method are without any data augmentation and 4.62%, respectively. In summary, the best classification
error of the proposed EvoCNN method wins 80 out of the
preprocessing on the benchmarks.
84 comparisons against the best results from the 12 peer
competitors, and the mean classification error of EvoCNN is
TABLE II
T HE CLASSIFICATION ERRORS OF THE PROPOSED E VO CNN METHOD
better than the best error of the 12 methods on 75 out of the
AGAINST THE PEER COMPETITORS ON THE FASHION BENCHMARK
84 comparisons.
DATASET.
B. Performance Regarding Weight Initialization
It is clearly shown in Table II that by comparing the best
performance, the proposed EvoCNN method outperforms all
the ten peer competitors. The two state-of-the-art algorithms,
GoogleNet and VGG16, achieve respectively 6.5% and 6.3%
4 It is a convention in deep learning community that only the best result is
reported.
60
weight initializaed by EvoCNN
weight initialized by Xavier
50
40
30
0
Fashion
MB
MRD
MRB
MBI
MRDBI
Benchmark datasets
Rectangle
5.39
6.33
10
5.97
8.27
20
0.01
0.23
300
30
—
150
100
—
—
200
25
200
100
100
37.38
41.88
3.27M
100K
—
7.14M
—
101M
60M
500K
41K
26M
6.68M
6.52M
4.62
5.8
8.40(+)
7.50(+)
9.30(+)
7.40(+)
10.30(+)
6.30(+)
10.10(+)
10.00(+)
10.00(+)
6.50(+)
5.47
7.28
3.59
3.93
2C1P2F+Drouout
2C1P
3C2F
3C1P2F+Dropout
GRU+SVM+Dropout
GoogleNet [41]
AlexNet [3]
SqueezeNet-200 [51]
MLP 256-128-64
VGG16 [52]
EvoCNN (best)
EvoCNN (mean)
5.46
6.24
# epochs
1.28
2.45
# parameters
7.28
9.28
error(%)
Classification error (%)
classifier
RI
Convex
Fig. 7. Performance comparison between the proposed EvoCNN method and
the CNN using the evolved architecture and the Xavier weight initializer.
Further experiments are performed to examine the effectiveness of the connection weight initialization method in the
proposed EvoCNN approach. By comparing different weight
initializers, we would also investigate whether the architecture or the connection weight initialization values will affect
the classification performance. To achieve this, we initialize
another group of CNNs with the same architectures as that of
TABLE III
T HE CLASSIFICATION ERRORS OF THE PROPOSED E VO CNN METHOD AGAINST THE PEER COMPETITORS ON THE MB, MRD, MRB, MBI, MRDBI,
R ECTANGLE , RI, AND C ONVEX BENCHMARK DATASETS
classifier
MB
MRD
MRB
MBI
MRDBI
Rectangle
RI
Convex
CAE-2 [53]
TIRBM [54]
PGBM+DN-1 [55]
ScatNet-2 [56]
RandNet-2 [57]
PCANet-2 (softmax) [57]
LDANet-2 [57]
SVM+RBF [50]
SVM+Poly [50]
NNet [50]
SAA-3 [50]
DBN-3 [50]
EvoCNN (best)
EvoCNN (mean)
2.48(+)
—
—
1.27(+)
1.25(+)
1.40(+)
1.05(-)
3.03(+)
3.69(+)
4.69(+)
3.46(+)
3.11(+)
1.18
1.28
9.66(+)
4.20(-)
—
7.48(+)
8.47(+)
8.52(+)
7.52(+)
11.11(+)
15.42(+)
18.11(+)
10.30(+)
10.30(+)
5.22
5.46
10.90(+)
—
6.08(+)
12.30(+)
13.47(+)
6.85(+)
6.81(+)
14.58(+)
16.62(+)
20.04(+)
11.28(+)
6.73(+)
2.80
3.59
15.50(+)
—
12.25(+)
18.40(+)
11.65(+)
11.55(+)
12.42(+)
22.61(+)
24.01(+)
27.41(+)
23.00(+)
16.31(+)
4.53
4.62
45.23(+)
35.50(+)
36.76(+)
50.48(+)
43.69(+)
35.86(+)
38.54(+)
55.18(+)
56.41(+)
62.16(+)
51.93(+)
47.39(+)
35.03
37.38
1.21(+)
—
—
0.01(=)
0.09(+)
0.49(+)
0.14(+)
2.15(+)
2.15(+)
7.16(+)
2.41(+)
2.61(+)
0.01
0.01
21.54(+)
—
—
8.02(+)
17.00(+)
13.39(+)
16.20(+)
24.04(+)
24.05(+)
33.20(+)
24.05(+)
22.50(+)
5.03
5.97
—
—
—
6.50(+)
5.45(+)
4.19(-)
7.22(+)
19.13(+)
19.82(+)
32.25(+)
18.41(+)
18.63(+)
4.82
5.39
the evolved EvoCNN, but their weights are initialized with the
widely used Xavier initializer [38] (details in Subsection II-C).
The comparisons are illustrated in Fig. 7, where the xaxis denotes the benchmark datasets, and y-axis denotes the
classification error rates. Fig. 7 clearly shows that the proposed
connection weight initialization strategy in EvoCNN improves
the classification performance on all the benchmarks over the
widely used Xavier initializer. To be specific, the proposed
weight initialization method reaches ≈1.5% classification accuracy improvement on the Fashion, MB, MRD, MBI, RI, and
Convex benchmarks, and 4.5% on the MRDBI benchmark. By
comparing with the results in Tables II and III, it also can be
concluded that the architectures of CNNs contribute to the
classification performance more than that of the connection
weight initialization. The proposed EvoCNN method gained
promising performance by automatically evolving both the
initial connection weights and the architectures of CNNs.
operation in this context (because crossover operations can
not be easily performed between the genes from different
origins). Therefore, a new crossover operation is introduced
to the proposed EvoCNN method. UC, UA, as well as UR are
designed to complete the crossover operation, which enhances
the communications between the encoded information, and expectedly leverages the performance in pursuing the promising
architectures of CNNs.
The typically used approaches in optimizing the weights of
CNNs are based on the gradient information. It is well known
that the gradient-based optimizers are sensitive to the starting
position of the parameters to be optimized. Without a better
starting position, the gradient-based algorithms are easy to be
trapped into local minima. Intuitively, finding a better starting
position of the connection weights by GAs is intractable due
to the huge numbers of parameters. As we have elaborated, a
huge number of parameters can not be efficiently encoded into
the chromosomes, nor effectively optimized. In the proposed
VI. F URTHER D ISCUSSIONS
EvoCNN method, an indirect encoding approach is employed,
which
only encodes the means and standard derivations of
In this section, we will further discuss the encoding stratthe
weights
in each layer. In fact, employing the standard
egy of the architectures and the weights related parameters,
derivation
and
the mean to initialize the starting position of
and the fitness evaluation in the proposed EvoCNN method.
connection
weights
is a compromised approach and can be
Extra findings from the experimental results are discussed as
ubiquitously
seen
from
deep learning libraries [60], [62], [63],
well, which could provide insights on the applications of the
which
is
the
motivation
of
this design in the proposed EvoCNN
proposed EvoCNN method.
method.
With
this
strategy,
only two real numbers are used
In GAs, crossover operators play the role of exploitation
to
denote
the
hundreds
of
thousands
of parameters, which
search (i.e., the local search), and mutation operators act
could
save
much
computational
resource
for encoding and
the exploration search (i.e., the global search). Because the
optimization.
local search and the global search should complement to each
other, only well designing both of them could remarkably
Existing techniques for searching for the architectures of
promote the performance. Generally, the crossover operators CNNs typically take the final classification accuracy as the
operate on the chromosomes with the same lengths, while fitness of individuals. A final classification accuracy typically
the proposed EvoCNN method employs the variable-length requires many more epochs of the training, which is a very
ones. Furthermore, multiple different basic layers exist in time-consuming process. In order to complete the architecture
CNNs, which improve the difficulties of designing crossover design with this fitness evaluation approach, it is natural
to employ a lot of computation resource to perform this
task in parallel to speed up the design. However, computational resource is not necessarily available to all interested
researchers. Furthermore, it also requires extra professional
assistances, such as the task schedule and synchronization
in the multi-thread context, which is beyond the expertise
of most researchers/users. In fact, it is not necessary to
check individual final classification accuracy, but a tendency
that could predict their future quality would be sufficient.
Therefore, we only employ a small number of epochs to
train these individuals. With this kind of fitness measurement,
the proposed EvoCNN method does not highly reply on the
computational resource. In summary, with the well-designed
yet simplicity encoding strategies and this fitness evaluation
method, researchers without rich domain knowledge could
also design the promising CNN models for addressing specific
tasks in their (academic) environment, where is the computational resources are typically limited.
TABLE IV
T HE CLASSIFICATION ACCURACY AND THE PARAMETER NUMBERS FROM
THE INDIVIDUALS ON THE FASHION BENCHMARK DATASET.
classification accuracy
# parameters
99%
569,250
98%
98,588
97%
7,035
96%
3,205
95%
955
Moreover, interesting findings have also been discovered
when the proposed EvoCNN method terminates, i.e., multiple
individuals are with the similar performance but significant
different numbers of connection weights (See Table IV), which
are produced due to population-based nature of the proposed
EvoCNN method. Recently, various applications have been
developed, such as the auto-driving car and some interesting
real-time mobile applications. Due to the limited processing
capacity and battery in these devices, trained CNNs with
similar performance but fewer parameters are much more
preferred because they require less computational resource
and the energy consumption. In addition, similar performance
of the individuals are also found with different lengths of
the basic layers, and there are multiple pieces of hardware
that have been especially designed to speed the primitive
operations in CNNs, such as the specialized hardware for
convolutional operations. In this regard, the proposed EvoCNN
method could give manufacturers more choices to make a
decision based on their own preferences. If the traditional
approaches are employed here, it is difficult to find out such
models at a single run.
VII. C ONCLUSIONS
AND
F UTURE W ORK
The goal of the paper was to develop a new evolutionary approach to automatically evolving the architectures and weights
of CNNs for image classification problems. This goal has
been successfully achieved by proposing a new representation
for weight initialization strategy, a new encoding scheme
of variable-length chromosomes, a new genetic operator, a
slacked binary tournament selection, and an efficient fitness
evaluation method. This approach was examined and compared with 22 peer competitors including the most state-ofthe-are algorithms on nine benchmark datasets commonly
used in deep learning. The experimental results show that
the proposed EvoCNN method significantly outperforms all
of these existing algorithms on almost all these datasets in
terms of their best classification performance. Furthermore,
the mean classification error rate of the proposed algorithm
is even better than the best of others in many cases. In
addition, the model optimized by EvoCNN is with a much
smaller number of parameters yet promising best classification
performance. Specifically, the model optimized by EvoCNN
employs 100 epochs to reach the lowest classification error
rate of 5.47% on the Fasion dataset, while the state-of-theart VGG16 employs 200 epochs but 6.50% classification error
rate. Findings from the experimental results also suggest that
the proposed EvoCNN method could provide more options
for the manufacturers that are interested in integrating CNNs
into their products with limited computational and battery
resources.
In this paper, we investigate the proposed EvoCNN method
only on the commonly used middle-scale benchmarks. However, large-scale data are also widely exist in the current era
of big data. Because evaluating only one epoch on these largescale data would require significant computational resource
and take a long period, the proposed fitness evaluation method
is not suitable for them unless a huge amount computational
resources are available. In the future, we will put effort on
efficient fitness evaluation techniques. In addition, we will also
investigate evolutionary algorithms for recurrent neural networks, which are powerful tools for addressing time-dependent
data, such as the voice and video data.
R EFERENCES
[1] D. CireşAn, U. Meier, J. Masci, and J. Schmidhuber, “Multi-column
deep neural network for traffic sign classification,” Neural Networks,
vol. 32, pp. 333–338, 2012.
[2] F. Ning, D. Delhomme, Y. LeCun, F. Piano, L. Bottou, and P. E. Barbano,
“Toward automatic phenotyping of developing embryos from videos,”
IEEE Transactions on Image Processing, vol. 14, no. 9, pp. 1360–1371,
2005.
[3] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification
with deep convolutional neural networks,” in Advances in Neural Information Processing Systems, 2012, pp. 1097–1105.
[4] D. H. Hubel and T. N. Wiesel, “Receptive fields, binocular interaction
and functional architecture in the cat’s visual cortex,” The Journal of
Physiology, vol. 160, no. 1, pp. 106–154, 1962.
[5] Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard,
W. Hubbard, and L. D. Jackel, “Backpropagation applied to handwritten
zip code recognition,” Neural Computation, vol. 1, no. 4, pp. 541–551,
1989.
[6] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning
applied to document recognition,” Proceedings of the IEEE, vol. 86,
no. 11, pp. 2278–2324, 1998.
[7] D. E. Rumelhart, G. E. Hinton, and R. J. Williams, “Learning representations by back-propagating errors,” Cognitive Modeling, vol. 5, no. 3,
p. 1, 1988.
[8] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
[9] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image
recognition,” in Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, 2016, pp. 770–778.
[10] H. Bourlard and Y. Kamp, “Auto-association by multilayer perceptrons
and singular value decomposition,” Biological Cybernetics, vol. 59, no.
4-5, pp. 291–294, 1988.
[11] G. E. Hinton and R. S. Zemel, “Autoencoders, minimum description
length, and helmholtz free energy,” Advances in Neural Information
Processing Systems, pp. 3–3, 1994.
[12] G. E. Hinton and R. R. Salakhutdinov, “Reducing the dimensionality of
data with neural networks,” Science, vol. 313, no. 5786, pp. 504–507,
2006.
[13] J. Bergstra and Y. Bengio, “Random search for hyper-parameter optimization,” Journal of Machine Learning Research, vol. 13, no. Feb, pp.
281–305, 2012.
[14] C. E. Rasmussen and C. K. Williams, Gaussian processes for machine
learning. MIT press Cambridge, 2006, vol. 1.
[15] J. Močkus, “On bayesian methods for seeking the extremum,” in
Optimization Techniques IFIP Technical Conference. Springer, 1975,
pp. 400–404.
[16] J. S. Bergstra, R. Bardenet, Y. Bengio, and B. Kégl, “Algorithms
for hyper-parameter optimization,” in Advances in Neural Information
Processing Systems, 2011, pp. 2546–2554.
[17] F. Hutter, H. H. Hoos, and K. Leyton-Brown, “Sequential model-based
optimization for general algorithm configuration.” LION, vol. 5, pp. 507–
523, 2011.
[18] J. Beck and T. Fiala, “integer-making theorems,” Discrete Applied
Mathematics, vol. 3, no. 1, pp. 1–8, 1981.
[19] J. Halton and G. Smith, “Radical inverse quasi-random point sequence,
algorithm 247,” Communications of the ACM, vol. 7, p. 701, 1964.
[20] E. I. Atanassov, A. Karaivanova, and S. Ivanovska, “Tuning the generation of sobol sequence with owen scrambling.” in Large-Scale Scientific
Computing. Springer, 2009, pp. 459–466.
[21] B. Baker, O. Gupta, N. Naik, and R. Raskar, “Designing neural network
architectures using reinforcement learning,” International Conference on
Learning Representations, 2017.
[22] D. Ashlock, Evolutionary computation for modeling and optimization.
Springer Science & Business Media, 2006.
[23] T. Back, Evolutionary algorithms in theory and practice: evolution
strategies, evolutionary programming, genetic algorithms.
Oxford
university press, 1996.
[24] M. Mitchell, An introduction to genetic algorithms. MIT press, 1998.
[25] X. Yao, “Evolving artificial neural networks,” Proceedings of the IEEE,
vol. 87, no. 9, pp. 1423–1447, 1999.
[26] G. Miller, “Designing neural networks using genetic algorithms,” Proceedings of ICGA-89, 1989.
[27] K. O. Stanley and R. Miikkulainen, “Evolving neural networks through
augmenting topologies,” Evolutionary computation, vol. 10, no. 2, pp.
99–127, 2002.
[28] K. O. Stanley, D. B. D’Ambrosio, and J. Gauci, “A hypercube-based
encoding for evolving large-scale neural networks,” Artificial life, vol. 15,
no. 2, pp. 185–212, 2009.
[29] K. O. Stanley, “Compositional pattern producing networks: A novel
abstraction of development,” Genetic programming and evolvable machines, vol. 8, no. 2, pp. 131–162, 2007.
[30] J. K. Pugh and K. O. Stanley, “Evolving multimodal controllers with
hyperneat,” in Proceedings of the 15th Annual Conference on Genetic
and Evolutionary Computation. ACM, 2013, pp. 735–742.
[31] M. Kim and L. Rigazio, “Deep clustered convolutional kernels,” in
Feature Extraction: Modern Questions and Challenges, 2015, pp. 160–
172.
[32] C. Fernando, D. Banarse, M. Reynolds, F. Besse, D. Pfau, M. Jaderberg,
M. Lanctot, and D. Wierstra, “Convolution by evolution: Differentiable
pattern producing networks,” in Proceedings of the 2016 on Genetic and
Evolutionary Computation Conference. ACM, 2016, pp. 109–116.
[33] B. Zoph and Q. V. Le, “Neural architecture search with reinforcement
learning,” arXiv preprint arXiv:1611.01578, 2016.
[34] B. Baker, O. Gupta, N. Naik, and R. Raskar, “Designing neural
network architectures using reinforcement learning,” arXiv preprint
arXiv:1611.02167, 2016.
[35] P. Verbancsics and J. Harguess, “Generative neuroevolution for deep
learning,” arXiv preprint arXiv:1312.5355, 2013.
[36] E. Real, S. Moore, A. Selle, S. Saxena, Y. L. Suematsu, Q. Le, and
A. Kurakin, “Large-scale evolution of image classifiers,” arXiv preprint
arXiv:1703.01041, 2017.
[37] X. Glorot, A. Bordes, and Y. Bengio, “Deep sparse rectifier neural
networks,” in Proceedings of the Fourteenth International Conference
on Artificial Intelligence and Statistics, 2011, pp. 315–323.
[38] X. Glorot and Y. Bengio, “Understanding the difficulty of training deep
feedforward neural networks,” in Proceedings of the 13th International
Conference on Artificial Intelligence and Statistics, 2010, pp. 249–256.
[39] A. L. Hodgkin and A. F. Huxley, “A quantitative description of membrane current and its application to conduction and excitation in nerve,”
The Journal of physiology, vol. 117, no. 4, pp. 500–544, 1952.
[40] M. D. Zeiler and R. Fergus, “Visualizing and understanding convolutional networks,” in European Conference on Computer Vision.
Springer, 2014, pp. 818–833.
[41] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan,
V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in
Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition, 2015, pp. 1–9.
[42] M. N. Omidvar, X. Li, Y. Mei, and X. Yao, “Cooperative co-evolution
with differential grouping for large scale optimization,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 3, pp. 378–393, 2014.
[43] Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A
review and new perspectives,” IEEE Transactions on Pattern Analysis
and Machine Intelligence, vol. 35, no. 8, pp. 1798–1828, 2013.
[44] Y. Bengio and O. Delalleau, “On the expressive power of deep architectures,” in International Conference on Algorithmic Learning Theory.
Springer, 2011, pp. 18–36.
[45] O. Delalleau and Y. Bengio, “Shallow vs. deep sum-product networks,”
in Advances in Neural Information Processing Systems, 2011, pp. 666–
674.
[46] A. Blumer, A. Ehrenfeucht, D. Haussler, and M. K. Warmuth, “Occam’s
razor,” Information Processing Letters, vol. 24, no. 6, pp. 377–380, 1987.
[47] K. Deb and R. B. Agrawal, “Simulated binary crossover for continuous
search space,” Complex Systems, vol. 9, no. 3, pp. 1–15, 1994.
[48] K. Deb, Multi-objective optimization using evolutionary algorithms.
John Wiley & Sons, 2001, vol. 16.
[49] H. Xiao, K. Rasul, and R. Vollgraf, “Fashion-mnist: a novel image
dataset for benchmarking machine learning algorithms,” arXiv preprint
arXiv:1708.07747, 2017.
[50] H. Larochelle, D. Erhan, A. Courville, J. Bergstra, and Y. Bengio,
“An empirical evaluation of deep architectures on problems with many
factors of variation,” in Proceedings of the 24th International Conference
on Machine Learning. ACM, 2007, pp. 473–480.
[51] F. N. Iandola, S. Han, M. W. Moskewicz, K. Ashraf, W. J. Dally,
and K. Keutzer, “Squeezenet: Alexnet-level accuracy with 50x fewer
parameters and < 0.5 mb model size,” arXiv preprint arXiv:1602.07360,
2016.
[52] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
[53] S. Rifai, P. Vincent, X. Muller, X. Glorot, and Y. Bengio, “Contractive
auto-encoders: Explicit invariance during feature extraction,” in Proceedings of the 28th International Conference on Machine Learning, 2011,
pp. 833–840.
[54] K. Sohn and H. Lee, “Learning invariant representations with local
transformations,” arXiv preprint arXiv:1206.6418, 2012.
[55] K. Sohn, G. Zhou, C. Lee, and H. Lee, “Learning and selecting features
jointly with point-wise gated boltzmann machines,” in International
Conference on Machine Learning, 2013, pp. 217–225.
[56] J. Bruna and S. Mallat, “Invariant scattering convolution networks,”
IEEE transactions on Pattern Analysis and Machine Intelligence, vol. 35,
no. 8, pp. 1872–1886, 2013.
[57] T.-H. Chan, K. Jia, S. Gao, J. Lu, Z. Zeng, and Y. Ma, “Pcanet: A simple
deep learning baseline for image classification?” IEEE Transactions on
Image Processing, vol. 24, no. 12, pp. 5017–5032, 2015.
[58] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist
multiobjective genetic algorithm: Nsga-ii,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, pp. 182–197, 2002.
[59] G. E. Hinton, “A practical guide to training restricted boltzmann
machines,” in Neural Networks: Tricks of the Trade. Springer, 2012,
pp. 599–619.
[60] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S.
Corrado, A. Davis, J. Dean, M. Devin et al., “Tensorflow: Large-scale
machine learning on heterogeneous distributed systems,” arXiv preprint
arXiv:1603.04467, 2016.
[61] S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep
network training by reducing internal covariate shift,” in International
Conference on Machine Learning, 2015, pp. 448–456.
[62] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick,
S. Guadarrama, and T. Darrell, “Caffe: Convolutional architecture for
fast feature embedding,” in Proceedings of the 22nd ACM international
conference on Multimedia. ACM, 2014, pp. 675–678.
[63] T. Chen, M. Li, Y. Li, M. Lin, N. Wang, M. Wang, T. Xiao, B. Xu,
C. Zhang, and Z. Zhang, “Mxnet: A flexible and efficient machine
learning library for heterogeneous distributed systems,” arXiv preprint
arXiv:1512.01274, 2015.
| 9cs.NE
|
arXiv:1702.00143v2 [math.GR] 16 Feb 2017
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL
NILPOTENT ASSOCIATIVE ALGEBRAS OVER A FIELD
MARCO ANTONIO PELLEGRINI
Abstract. In this paper we classify the isomorphism classes of four dimensional nilpotent associative algebras over a field F, studying regular subgroups
of the affine group AGL4 (F). In particular we provide explicit representatives
for such classes when F is a finite field, the real field R or an algebraically
closed field.
1. Introduction
The aim of this paper is the classification of the isomorphism classes of four
dimensional nilpotent associative algebras over a field F. This result will be achieved
exploiting the properties of the regular subgroups of the affine group AGL4 (F).
It is worth recalling that the affine group AGLn (F) can be identified with the subgroup of GLn+1 (F) consisting of the invertible matrices having (1, 0, . . . , 0)T as first
column. It follows that AGLn (F) acts on the right on the set A = {(1, v) : v ∈ Fn }
of affine points. A subgroup R of AGLn (F) is called regular if it acts regularly on
A, namely if for every v ∈ Fn there exists a unique element in R having (1, v) as
first row. Writing the elements r of a regular subgroup R ≤ AGLn (F) as
1
v
(1.1)
r=
= µR (v),
0 In + δR (v)
we give rise to the functions δR : Fn → Matn (F) and µR : Fn → R. For instance,
the translation subgroup Tn of AGLn (F) is a regular subgroup, corresponding to
the choice δTn equal to the zero function.
We focus our attention on the set ∆n (F) of the regular subgroups R of AGLn (F)
with the property that δR is a linear function. Notice that if R is abelian, then
R ∈ ∆n (F) (see [1, 8]); however, for n ≥ 3, the set ∆n (F) also contains nonabelian
groups (see [5]). We also remark that if R ∈ ∆n (F), then R is unipotent and
contains nontrivial translations (see [4, 6]). Our main motivation for studying the
set ∆n (F) is that there exists a bijection between the set of isomorphism classes of
nilpotent associative algebras of dimension n over a field F and the set of conjugacy
classes of subgroups in ∆n (F) (see [4, Proposition 2.2]). In fact, our classification
of four dimensional nilpotent associative F-algebras (Theorem 1.1) will follow from
the classification of the conjugacy classes of regular subgroups in ∆4 (F).
The paper is organized as follows. In Section 2 we recall some useful results
concerning ∆n (F) and in the following sections we classify, up to conjugation, the
regular subgroups in ∆4 (F), see Theorems 4.2 and 5.12. More in detail, in Section
4 we deal with abelian regular subgroups and in Section 5 we consider nonabelian
2010 Mathematics Subject Classification. 16Z05, 16N40, 15A21, 20B35.
Key words and phrases. Regular subgroup; congruent matrices; nilpotent algebra; finite field.
1
2
MARCO ANTONIO PELLEGRINI
subgroups. Corollaries 4.3 and 4.5 and Propositions 5.15 and 5.23 give the explicit
classification for algebraically closed fields or finite fields. The classification for the
real field is given in Corollary 4.4 and Proposition 5.20.
Before to describe the results we obtained, we need to fix some notation. The sets
ΠS (F) and ΠA (F) are complete sets of representatives of projective congruent classes
for, respectively, symmetric and asymmetric matrices in Mat3 (F), see Definition
2.2. Given a field F, we denote by F a transversal for (F∗ )2 in F∗ . Also, for
any ρ ∈ F , we denote by Aρ (F) a fixed set of representatives for the equivalence
classes with respect to the following relation >ρ defined on A(F) = (F \ {1}) × F:
given (β1 , β2 ), (β3 , β4 ) ∈ A(F), we write (β1 , β2 ) >ρ (β3 , β4 ) if and only if either
(β3 , β4 ) = (β1 , ±β2 ) or
(1.2)
β3 =
β 1 t2 + β 2 t − ρ
t2 + β2 t − ρβ1
and
β4 = ±
β2 t2 − 2ρ(β1 + 1)t − ρβ2
t2 + β2 t − ρβ1
for some t ∈ F such that (t2 + ρ)(t2 + β2 t − ρβ1 ) 6= 0. If char F = 2, we fix two
additional sets B(F) and C(F). The set B(F) is a transversal for the subgroup
B(F) = {λ2 + λ : λ ∈ F} in F. The set C(F) is a set of representatives for the
equivalence classes with respect to the following relation ⋆ defined on F : given
x2 +x2 ρ
ρ1 , ρ2 ∈ F , we write ρ1 ⋆ ρ2 if and only if ρ2 = x12 +x22 ρ11 for some x1 , x2 , x3 , x4 ∈ F
3
4
such that x1 x4 6= x2 x3 . For convenience, we assume 1 ∈ F and 0 ∈ B(F).
We can now state our main result.
Theorem 1.1. The distinct isomorphism classes of four dimensional nilpotent associative algebras over a field F can be represented by the algebras described in the
second column of Table 1 (abelian case) and Table 2 (nonabelian case).
In particular, there are exactly
9
if F = F is algebraically closed and char F 6= 2,
10 if F = F is algebraically closed and char F = 2,
11 if F = Fq is finite,
12 if F = R,
nonisomorphic abelian nilpotent associative F-algebras of dimension four. We point
out that the classification given in Theorem 1.1 for the abelian case was already
obtained, using other techniques, by De Graaf [2] (if F = Fq or R) and by Poonen
[7] (for algebraically closed fields). It is also interesting to observe that if F = Fq
is a finite field, then there are exactly 5q + 9 (if q is odd) or 5q + 6 (if q is even)
nonisomorphic nonabelian nilpotent associative Fq -algebras of dimension four (see
Proposition 5.23).
2. Preliminary results
Our classification of regular subgroups in ∆4 (F) basically relies on the key results
of [4, 5] that we recall in this section.
Proposition 2.1. [5, Theorems 2.4 and 4.4] Let R ∈ ∆n (F). Then,
(a) R is a unipotent subgroup;
(b) up to conjugation under AGLn (F), the center Z(R) of R contains a nontrivial element z that coincides with its Jordan form diag (Jn1 , . . . , Jnk ) having
upper unitriangular Jordan blocks Jni of respective sizes ni ≥ ni+1 for all
i ≥ 1.
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
R
R − I5
0 x1 x2 x3 x4
0
0
x
x
x
1
2
3
0
0
0
x
x
1
2
0
0
0
0
x1
0
0
0
0
0
0 x1 x2 x3 x4
0
0
x1 x2
0
0
0
0
x1
0
0
0
0
0
0
0
0
0
0
0
0 x1 x2 x3 x4
0
0
x1
0
x2
0
0
0
0
x1
0
0
0
0
x3
0
0
0
0
0
0 x1 x2 x3 x4
0
0
0
x1 x2
0
0
0
0
x1
0
0
0
0
0
0
0
0
0
0
0 x1 x2
x3
x4
0
0
0
x1
x2
0
0
0
ρx2 x1
0
0
0
0
0
0
0
0
0
0
0 x1 x2
x3
x4
0
0
0
x1
x2
0
0
0
ǫx
x
+ x2
2
1
0
0
0
0
0
0
0
0
0
0
x1 x2 x3
x4
0
0
0
α1 x1 + α2 x2 + α3 x3
0
0
0
α2 x1 + β2 x2 + β3 x3
0
0
0
α3 x1 + β3 x2 + γ3 x3
3
Conditions
S(5)
S(4,1)
♯
S(3,2)
U1 (0, 0)
U1 (0, ρ)
U1 (1, ǫ)
RD
0
0
0
0
0
0
0
0
char F 6= 2
ρ ∈ F
ρ ∈ C(F)
if char F 6= 2
if char F = 2
char F = 2, ǫ ∈ B(F)
α1
α2
α3
α2
β2
β3
α3
β3 ∈ ΠS (F)
γ3
0
Table 1. Four dimensional abelian nilpotent associative Falgebras and abelian regular subgroups of AGL4 (F).
If δR is a linear function then a regular subset R of AGLn (F) is a subgroup if
and only if
δR (vδR (w)) = δR (v)δR (w),
for all v, w ∈ Fn ,
see [5]. Also, given v, w ∈ Fn ,
µR (v)µR (w) = µR (w)µR (v)
if and only if
vδR (w) = wδR (v).
We also recall that two subgroups R1 , R2 ∈ ∆n (F) are conjugate in AGLn (F) if
and only if there exists a matrix g = diag(1, ḡ) with ḡ ∈ GLn (F) such that R1g = R2
(see [5, Proposition 3.4]). On the other hand it is useful, mainly to prove that two
regular subgroups are not conjugate, to introduce the following three parameters.
4
MARCO ANTONIO PELLEGRINI
R
0
0
0
0
0
0
0
0
0
0
U2 (0, 1, 0, 1, 1)
U2 (0, 1, 0, 0, 1)
U3 (0, 1, 0)
U3 (0, 1, 1)
U3 (1, λ, 0)
U4 (ρ, β1 , β2 )
U5 (1, 1, ǫ)
RD
x1
0
0
0
0
x1
0
0
0
0
R − I5
x2 x3
x4
x1
0
x2 + x3
0
0
x1
0
0
x3
0
0
0
x2 x3
x4
x1
0
x2 + x3
0
0
x1
0
0
0
0
0
0
x1 x2 x3 x4
0
x1
0
0
0
0
0
0
0
0
0
x1
0
0
0
0
0
0
0
0
0
0 x1 x2 x3
x4
0
0
x1
0
0
0
0
0
0
0
0
0
0
0
x1 + x3
0
0
0
0
0
0 x1 x2 x3
x4
0
0
x1
0
x3
0
0
0
0
0
0
0
0
0
λx1
0
0
0
0
0
1 x1 x2
x3
x4
0
1
0
x1
x2
0
0
1
ρx
β
x
+
β
x
2
1
1
2
2
0
0
0
1
0
0
0
0
0
1
0 x1 x2 x3
x4
0
0
0
x2 x1 + x2
0
0
0
x1
ǫx2
0
0
0
0
0
0
0
0
0
0
0 x1 x2 x3
x4
0
0
0
0
α1 x1 + α2 x2 + α3 x3
0
0
0
0
β 1 x1 + β 2 x2 + β 3 x3
0
0
0
0
γ1 x1 + γ2 x2 + γ3 x3
0
0
0
0
Conditions
λ ∈ F \ {1}
ρ ∈ F , (β1 , β2 ) ∈ Aρ (F)
char F = 2, ǫ ∈ B(F)
α1
β1
γ1
α2
β2
γ2
α3
β3 ∈ ΠA (F)
γ3
0
Table 2. Four dimensional nonabelian nilpotent associative Falgebras and nonabelian regular subgroups in ∆4 (F).
Let H ∈ {R, Z(R)}, where R ∈ ∆n (F). Then we may define:
d(H) =
r(H) =
k(H) =
max{deg minF (h − In+1 ) : h ∈ H};
max{rk(h − In+1 ) : h ∈ H};
dim Ker (δR |H ).
The last parameter is justified since the set {v ∈ Fn : µR (v) ∈ Z(R)} is a subspace
of Fn (see [4, Proposition 2.1]).
We will proceed considering the possible values of (d(Z(R)), r(Z(R)) for R ∈
∆4 (F) and working in the centralizer of a Jordan form as described in Proposition
2.1(b). Unfortunately, the case r(Z(R)) = 2 will require a different approach, based
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
5
on the classification of the regular subgroups in ∆3 (F) obtained in [5]. In particular,
we will make use of the following observation.
e ∈ ∆n (F), n ≥ 2, can be written as
Any regular subgroup R
X
xn
1
e = R(R, D) = 0 In−1 + δR (X) DX T : X ∈ Fn−1 , xn ∈ F ,
(2.1)
R
0
0
1
for some R ∈ ∆n−1 (F) and some square matrix D ∈ Matn−1 (F) such that
(2.2)
T
DδR (ei )T eT
j = δR (ej )Dei
for all i, j = 1, . . . , n − 1
({e1 , . . . , en−1 } denotes the canonical basis of Fn−1 ), see [4]. In particular, we can
take R = Tn−1 : in this case any square matrix D ∈ Matn−1 satisfies (2.2). We set
X
xn
1
(2.3)
RD := R(Tn−1 , D) = 0 In−1 DX T : X ∈ Fn−1 , xn ∈ F .
0
0
1
The study of these subgroups RD is justified mainly because of their connection
with projectively congruent matrices.
Definition 2.2. [9] Two matrices A, B ∈ Matn (F) are said to be projectively congruent if P AP T = λB, for some non-zero element λ ∈ F∗ and some invertible
matrix P ∈ GLn (F).
Lemma 2.3. [4, Lemma 3.2] Given two matrices A, B ∈ Matn−1 (F), the subgroups
RA and RB are conjugate in AGLn (F) if and only if A and B are projectively
congruent.
Furthermore, it is easy to see that
2 if DT = −D and D has zero diagonal,
d(RD ) =
3 otherwise,
2 if D =
6 0,
r(RD ) =
1 if D = 0,
k(RD ) =
n − rk(D).
A given nilpotent associative algebra N of dimension n can be embedded into
Matn+1 (F) via
0 mB
,
m 7→
0 δ(m)
where, for any m ∈ N , mB and δ(m) denote, respectively, the coordinate row
vector of m and the matrix of the right multiplication by m with respect to a
fixed basis B of N over F. Identifying N with its image, L = FIn+1 + N is a
split local subalgebra of Matn+1 (F) with Jacobson radical J(L) = N . The subset
R = {In+1 + m : m ∈ N } ⊆ L consists of invertible matrices and is closed under
multiplication, since δ(m1 δ(m2 )) = δ(m1 )δ(m2 ) for all m1 , m2 ∈ N . Hence, R is a
regular subgroup lying in ∆n (F), by [5, Lemma 2.1]. On the other hand, given a
regular subgroup R ∈ ∆n (F), we have that
(2.4)
LR = FIn+1 + R
is a split local F-algebra of dimension n, by [5, Theorem 3.3]. Notice that set
0
v
n
N = J(LR ) = R − In+1 =
:v∈F
0 δR (v)
6
MARCO ANTONIO PELLEGRINI
is a nilpotent associative F-algebra of dimension n.
Proposition 2.4. [4, 5] Let R1 , R2 ∈ ∆n (F) and LR1 , LR2 be as in (2.4). Then
the following conditions are equivalent:
(a) the subgroups R1 and R2 are conjugate in AGLn (F);
(b) the split local algebras LR1 and LR2 are isomorphic;
(c) the nilpotent associative algebras J(LR1 ) and J(LR2 ) are isomorphic.
For sake of brevity, we write
x1 x2 . . . xn
1
R=
0 In + δR (x1 , x2 , . . . , xn )
to indicate the regular subgroup
x1 x2 . . . xn
1
R=
: x1 , . . . , xn ∈ F .
0 In + δR (x1 , x2 , . . . , xn )
For all i ≤ n, we denote by Xi the matrix of R − In+1 obtained taking xi = 1 and
xj = 0 for all j 6= i. Finally, Ei,j is the elementary matrix having 1 at position
(i, j), 0 elsewhere.
3. The regular subgroups in ∆4 (F)
For classifying the regular subgroups R ∈ ∆4 (F), where F is any field, we consider
the possible values of (d(Z(R)), r(Z(R))). By Proposition 2.1 the subgroup R is
unipotent and its center contains an element conjugate in AGL4 (F) to one of the
following Jordan forms z:
z
d(Z(R)) r(Z(R))
J5
5
4
diag(J4 , I1 )
4
3
diag(J3 , J2 )
3
3
diag(J3 , I2 )
3
2
diag(J2 , J2 , I1 )
2
2
diag(J2 , I3 )
2
1
Some of these cases have been already studied in [5]: we recall here the results
obtained in Lemmas 5.2, 5.4 and 7.4. First of all, if d(Z(R)) ≥ 4, then R is abelian.
In particular, if d(R) = 5, then R is conjugate to
1 x1 x2 x3 x4
0 1 x1 x2 x3
1 x1 x2
S(5) =
0 0
.
0 0
0
1 x1
0 0
0
0
1
If d(R) = 4, we
the subgroup R
where
1
0
S(4,1) =
0
0
0
have two conjugacy classes of regular subgroups: when k(R) = 2
♯
is conjugate to S(4,1) and when k(R) = 1 it is conjugate to S(3,2)
,
x1
1
0
0
0
x2
x1
1
0
0
x3
x2
x1
1
0
x4
0
0
0
1
and
♯
S(3,2)
1
0
=
0
0
0
x1
1
0
0
0
x2
x1
1
0
0
x3
0
0
1
0
x4
x2
x1
.
x3
1
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
7
Now, if d(Z(R)) = r(Z(R)) = 3, then again R is abelian. Conjugating the subgroups
obtained in [5, Lemma 7.4] by g = diag(I2 , E1,2 + E2,1 , 1), we obtain that R is
conjugate to
1 x1 x2 x3
x4
0 1
0
x1
x2
(3.1)
U1 (α, β) = 0 0
1 βx2 x1 + αx2
0 0
0
1
0
0 0
0
0
1
for some α, β ∈ F.
If d(Z(R)) = 3 and r(Z(R)) = 2, we may assume that z = diag(J3 , I2 )g ∈ Z(R),
where g = diag(I2 , E1,3 + E2,1 + E3,2 ). So, working in CAGL4 (F) (z) and using the
linearity of δR we obtain that R is conjugate to a subgroup RD , where
1 0
0
D = 0 β2 β3 ,
0 γ2 γ3
for some β2 , β3 , γ2 , γ3 ∈ F.
If d(Z(R)) = r(Z(R)) = 2, we may assume that the center of R contains the
element z = diag(J2 , J2 , I1 )g , where g = diag(1, E1,2 + E2,1 , E1,2 + E2,1 ). Again,
working in CAGL4 (F) (z) and using the linearity of δR we obtain that R is conjugate
to the subgroup
1 x1 x2 x3
x4
0 1 ζx1 0 α1 x1 + x2 + α3 x3
1
0
x1
(3.2)
U2 (α1 , α3 , γ1 , γ3 , ζ) =
0 0
0 0
0
1
γ1 x1 + γ3 x3
0 0
0
0
1
for some α1 , α3 , γ1 , γ3 , ζ ∈ F.
Finally, if R is abelian and (d(R), r(R)) = (2, 1), then R = T4 by [5, Lemma 5.3].
4. The abelian case
In this section we assume that R ∈ ∆4 (F) is abelian. In view of the results
recalled in Section 3, we are left to determine the conjugacy classes of subgroups
of type U1 (α, β), U2 (α1 , α3 , γ1 , γ3 , ζ) and RD where D ∈ Mat3 (F) is a symmetric
matrix. We start with the subgroups U1 (α, β).
Lemma 4.1. Let R be an abelian regular subgroup of AGL4 (F) such that d(R) =
r(R) = 3. Then R is conjugate to exactly one of the following subgroups:
U1 (0, ρ) with ρ ∈ F ∪ {0}
if char F 6= 2;
U1 (1, ǫ) with ǫ ∈ B(F)
or
U1 (0, ρ) with ρ ∈ C(F)
if char F = 2.
Proof. By the previous argument, we can assume that R = U1 (α, β), as in (3.1), for
some α, β ∈ F. First, suppose that char F 6= 2 and set ∆ = α2 + 4β. If ∆ 6= 0, write
∆ = ω 2 ρ for some ω ∈ F∗ and a unique ρ ∈ F . We can define an epimorphism (of
algebras) Ψ : F[t1 , t2 ] → LU1 (α,β) by setting
Ψ(t1 ) = ωρX1 ,
Ψ(t2 ) = αX1 − 2X2 .
8
MARCO ANTONIO PELLEGRINI
We have Ker (Ψ) = ht31 , t32 , t21 −ρt22 i. The subgroup U1 (α, β) is conjugate to U1 (0, ρ)
by Proposition 2.4. Now, it is quite easy to see that two subgroups U1 (0, ρ1 ) and
U1 (0, ρ2 ) (ρ1 , ρ2 ∈ F ) are conjugate in AGL4 (F) if and only if ρ1 = ρ2 .
If α2 + 4β = 0, we consider the epimorphism Ψ : F[t1 , t2 ] → LU1 (α,β) defined by
Ψ(t1 ) = X1 ,
ht31 ,
Ψ(t2 ) = αX1 − 2X2 ,
t21 t2 ,
whose kernel is Ker (Ψ) =
t22 i. Again by Proposition 2.4, U1 (α, β) is
conjugate to U1 (0, 0) (which is not conjugate to U1 (0, ρ), ρ ∈ F ).
Next, suppose that char F = 2. If α 6= 0, take ǫ ∈ B(F) such that ǫ + αβ2 ∈ B(F).
Then, there exists r ∈ F such that r2 + αr + β + α2 ǫ = 0 (a polynomial t2 + t + λ is
reducible in F[t] if and only if λ ∈ B(F)). In this case, we can define an epimorphism
Ψ : F[t1 , t2 ] → LU1 (α,β) by setting
Ψ(t1 ) = rX1 + X2 ,
ht31 ,
t32 ,
t21
Ψ(t2 ) = αX1 .
ǫt22 i,
+ t1 t2 +
proving that U1 (α, β) is conjugate
We obtain Ker (Ψ) =
to U1 (1, ǫ). Now, U1 (1, ǫ1 ) and U1 (1, ǫ2 ) are conjugate in AGL4 (F) if and only if
ǫ1 + ǫ2 ∈ B(F). It follows that U (α, β) is conjugate to exactly one subgroup U1 (1, ǫ)
with ǫ ∈ B(F).
Finally, assume α = 0. For β = 0 observe that U1 (0, 0)g = U1 (0, 1), where
g = I5 + E3,2 + E5,4 . If β 6= 0, write β = ω 2 ρ for some ω ∈ F∗ and a unique ρ ∈ F .
An epimorphism Ψ : F[t1 , t2 ] → LU1 (0,β) can be defined by taking
Ψ(t1 ) = X2 ,
ht31 ,
t32 ,
t21
Ψ(t2 ) = ωX1 .
ρt22 i
and so U1 (0, β) is conjugate to U1 (0, ρ).
+
We have Ker (Ψ) =
Furthermore, given ρ1 , ρ2 ∈ F , the subgroup U1 (0, ρ1 ) is conjugate to U1 (0, ρ2 ) if
x2 +x2 ρ
and only if ρ1 ⋆ ρ2 , that is if and only if ρ2 = x21 +x22 ρ11 for some x1 , x2 , x3 , x4 ∈ F
3
4
such that x1 x4 6= x2 x3 (see the notation described in the Introduction).
To conclude we observe that subgroups U1 (0, ρ), ρ ∈ C(F), are not conjugate to
subgroups U1 (1, ǫ), ǫ ∈ B(F).
We can now classify the abelian regular subgroups of AGL4 (F).
Theorem 4.2. Let F be a field. The distinct conjugacy classes of abelian regular
subgroups of AGL4 (F) can be represented by the subgroups described in the first
column of Table 1.
Proof. Let R ≤ AGL4 (F) be an abelian regular subgroup. Clearly, 2 ≤ d(R) ≤ 5.
As seen in Section 3, if d(R) = 5 then R is conjugate to S(5) , and if d(R) = 4 then
♯
R is conjugate either to S(4,1) or to S(3,2)
.
Suppose that d(R) = 3. Then 2 ≤ r(R) ≤ 3. If r(R) = 3, we apply Lemma 4.1:
if char F 6= 2, R is conjugate to U1 (0, ρ) for a unique ρ ∈ F ∪ {0}; if char F = 2,
it is conjugate either to U1 (1, ǫ) for a unique ǫ ∈ B(F) or to U1 (0, ρ) for a unique
ρ ∈ C(F). If r(R) = 2, then R is conjugate to a subgroup RD for some D ∈ Mat3 (F).
Suppose d(R) = 2. Then 1 ≤ r(R) ≤ 2. If r(R) = 2 we apply [5, Lemma
7.7], obtaining that char F = 2 and R is conjugate to U2 (0, 0, 0, 0, 0) = RD , where
D = E1,2 + E2,1 . If r(R) = 1, then U = T4 = R0 , where 0 ∈ Mat3 (F) is the zero
matrix.
Notice that in three cases, R is conjugate to a subgroup RD . By Lemma 2.3 the
statement of the theorem is proved considering a set ΠS (F) of representatives for
projective congruent classes of symmetric matrices in Mat3 (F).
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
9
We now provide explicit representatives for algebraically closed fields, for R and
for finite fields.
Corollary 4.3. Let F = F be an algebraically closed field. If char F 6= 2, there are
exactly 9 distinct conjugacy classes of abelian regular subgroups of AGL4 (F), that
can be represented by
♯
S(5) , S(4,1) , S(3,2)
, U1 (0, 0), U1 (0, 1), RE1,1 , RE1,1 +E2,2 , RI3 , T4 .
If char F = 2, there are exactly 10 distinct conjugacy classes of abelian regular
subgroups of AGL4 (F), that can be represented by
♯
S(5) , S(4,1) , S(3,2)
, U1 (0, 0), U1 (1, 0), RE1,1 , RE1,1 +E2,2 , RE2,3 +E3,2 , RI3 , T4 .
Proof. Since F is algebraically closed, F = {1} and, when char F = 2, B(F) = {0}
and C(F) = {1}. The set ΠS (F) can be obtained applying, for instance, [3, Theorem
2.1]. Hence, the statement is proved noticing that, as observed in the proof of
Lemma 4.1, when char F = 2 the subgroups U1 (0, 0) and U1 (0, 1) are conjugate.
Corollary 4.4. There are exactly 12 distinct conjugacy classes of abelian regular
subgroups of AGL4 (R), that can be represented by
♯
S(5) , S(4,1) , S(3,2)
, U1 (0, 0), U1 (0, 1), U1 (0, −1),
RE1,1 , RE1,1 +E2,2 , RE1,1 −E2,2 , RE1,1 +E2,2 −E3,3 , RI3 , T4 .
Proof. First of all, we can take R = {1, −1}. The set ΠS (F) can be obtained
again applying [3, Theorem 2.1], noticing that two matrices A, B ∈ Matn (F) are
projectively congruent if and only if A is congruent to ±B.
Corollary 4.5. Let F = Fq be a finite field. There are exactly 11 distinct conjugacy
classes of abelian regular subgroups of AGL4 (q), that can be represented by:
(a) for q odd,
♯
S(5) , S(4,1) , S(3,2)
, U1 (0, 0), U1 (0, 1), U1 (0, ξ), RD ,
where x2 − ξ is a fixed irreducible polynomial of Fq [x] and
D ∈ ΠS (Fq ) = {0, E1,1 , E1,1 + E2,2 , E1,1 + ξE2,2 , I3 };
(b) for q even,
♯
S(5) , S4,1 , S(3,2)
, U1 (0, 0), U1 (1, 0), U1 (1, ξ), RD ,
where x2 + x + ξ is a fixed irreducible polynomial of Fq [x] and
D ∈ ΠS (Fq ) = {0, E1,1 , E1,1 + E2,2 , E2,3 + E3,2 , I3 }.
Proof. For q odd we have F = {1, ξ} and for q even we have F = C(F) = {1}
and B(F) = {0, ξ}. The set ΠS (Fq ) has been determined in [9, Theorem 4].
10
MARCO ANTONIO PELLEGRINI
5. The nonabelian case
In this section we assume that R ∈ ∆4 (F) is nonabelian. We are reduced to
study the cases when (d(Z(R)), r(Z(R))) = (3, 2), (2, 2) or (2, 1). We recall that if
(d(Z(R)), r(Z(R))) = (3, 2) then R is conjugate to a subgroup of shape RD .
If d(Z(R)) = r(Z(R)) = 2, then R is conjugate to U2 (α1 , α3 , γ1 , γ3 , ζ) as in (3.2).
Clearly, U2 (α1 , α3 , γ1 , γ3 , 0) = RD , where
α1 1 α3
D = 1 0 0 .
γ1 0 γ3
So, we have to consider now the case ζ 6= 0. Notice that since R is nonabelian, we
must have γ1 6= α3 . Furthermore, we have d(R) = 4 and r(R) = 3.
Lemma 5.1. There are exactly 2 conjugacy classes of nonabelian regular subgroups R ∈ ∆4 (F) such that d(Z(R)) = r(Z(R)) = 2, not conjugate to RA for
any A ∈ Mat3 (F). Such classes can be represented by the subgroups U2 (0, 1, 0, 1, 1)
and U2 (0, 1, 0, 0, 1).
Proof. By the previous considerations, we may assume that R = U2 (α1 , α3 , γ1 , γ3 , ζ)
where ζ 6= 0 and γ1 6= α3 .
First, suppose γ3 6= 0: in this case k(R) = 1. Consider the algebra L =
LU2 (0,1,0,1,1) defined in (2.4):
L = Span(t1 , t2 ) such that: t31 = t22 = t1 t2 ;
t2 t1 = 0.
The function Ψ : L → LR defined by
Ψ(t1 ) =
(α3 − γ1 )2
X1 ,
γ3 ζ
Ψ(t2 ) =
−γ1 (α3 − γ1 )3
(α3 − γ1 )3
X2 +
X3 ,
2
γ3 ζ
γ32 ζ
is an isomorphism: by Proposition 2.4, R is conjugate to U2 (0, 1, 0, 1, 1).
Suppose now that γ3 = 0: in this case k(R) = 2 and so R is not conjugate to
U2 (0, 1, 0, 1, 1). Consider the algebra L = LU2 (0,1,0,0,1) :
L = Span(t1 , t2 ) such that: t31 = t1 t2 ;
t22 = t2 t1 = 0.
The function Ψ : L → LR defined by
Ψ(t1 ) = (α3 − γ1 )X1 ,
Ψ(t2 ) = −ζγ1 (α3 − γ1 )X2 + ζ(α3 − γ1 )X3
is an isomorphism and so R is conjugate to U2 (0, 1, 0, 0, 1).
We now consider the case when d(Z(R)) = 2 and r(Z(R)) = 1. Instead of
working in CAGL4 (F) (diag(J2 , I3 )), it is more convenient to write R as R(R̃, D), for
some R̃ ∈ ∆3 (F) and D ∈ Mat3 (F), see (2.1). The regular subgroups in ∆3 (F) have
been classified in [5].
Theorem 5.2. [5, Section 7.2] Let F be a field. The distinct conjugacy classes of
regular subgroups in ∆3 (F) are represented by
S(4) ,
S(3,1) ,
Rρ (ρ ∈ F ),
U13 (if char F = 2),
T3 ,
N1 ,
N3,λ (λ ∈ F∗ ),
N2 (if char F 6= 2).
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
11
Suppose that R = R(S(4) , D) for some D ∈ Mat3 (F). By (2.2), D = α1 E1,1 +
α2 (E1,2 E2,1 ) + α3 (E1,3 + E2,2 + E3,1 ) for some α1 , α2 , α3 ∈ F. It follows that R is
abelian. Furthermore, R(T3 , D) = RD . Hence, we have to consider the six subcases
corresponding to R̃ = S(3,1) , Rρ , U13 , N1 , N2 , N3,λ .
Lemma 5.3. There are exactly |F| + 1 distinct conjugacy classes of nonabelian
subgroups R = R(S(3,1) , D) ∈ ∆4 (F) such that d(Z(R)) = 2 and r(Z(R)) = 1. Such
classes can be represented by the subgroups corresponding to
D
d(R) r(R)
E3,1
3
3
E3,1 + E3,3
3
3
E1,3 + λE3,1 (λ ∈ F \ {0, 1})
3
3
E1,3
3
2
k(R)
3
2
2
2
These subgroups are not conjugate to RA for any A ∈ Mat3 (F).
Proof. Let R = R(S(3,1) , D) for some D ∈ Mat3 (F) such that d(Z(R)) = 2 and
r(Z(R))
= 1.
By (2.2) and the hypothesis that R is nonabelian, we obtain D =
ᾱ1 ᾱ2 ᾱ3
ᾱ2 0
0 with γ̄1 6= ᾱ3 . Moreover, the condition r(Z(R)) = 1 implies ᾱ2 = 0.
γ̄1 0 γ̄3
Then, R is conjugate via g = I5 − ᾱ1 E3,5 to
1 x1 x2 x3
x4
0 1 x1 0
α3 x3
,
1
0
0
U3 (α3 , γ1 , γ3 ) = 0 0
0 0
0
1 γ1 x1 + γ3 x3
0 0
0
0
1
for some α3 , γ1 , γ3 ∈ F such that γ1 6= α3 .
Suppose that γ3 6= 0. Then d(R) = r(R) = 3 and k(R) = 2. Consider the algebra
L = LU3 (0,1,1) :
L = Span(t1 , t2 ) such that: t2 t1 = t22 ;
t31 = t1 t2 = 0.
The function Ψ : L → LR defined by
Ψ(t1 ) = γ3 X1 − α3 X3 ,
Ψ(t2 ) = (γ1 − α3 )X3
is an isomorphism and so R is conjugate to U3 (0, 1, 1).
Suppose now that γ3 = α3 = 0 (and so γ1 6= 0). Then d(R) = r(R) = k(R) = 3.
In this case, consider the algebra L = LU3 (0,1,0) :
L = Span(t1 , t2 ) such that: t31 = t22 = t1 t2 = t2 t21 = 0.
The function Ψ : L → LR defined by
Ψ(t1 ) = X1 ,
Ψ(t2 ) = X3
is an isomorphism: it follows that R is conjugate to U3 (0, 1, 0).
Finally, suppose that γ3 = 0 and α3 6= 0. For any λ ∈ F \ {1}, consider the
algebra Lλ = LU3 (1,λ,0) :
Lλ = Span(t1 , t2 ) such that: t31 = t22 = t21 t2 = 0;
t2 t1 = λt1 t2 .
12
MARCO ANTONIO PELLEGRINI
The function Ψ : Lλ → LR defined by
γ1
α3
is an isomorphism and hence R is conjugate to U3 (1, λ, 0) for some λ 6= 1. Now,
notice that if λ = 0 then d(U3 (1, 0, 0)) = 3 and r(U3 (1, 0, 0)) = k(U3 (1, 0, 0)) = 2.
Otherwise, d(U3 (1, λ, 0)) = r(U3 (1, λ, 0)) = 3 and k(U3 (1, λ, 0)) = 2. Furthermore,
U3 (1, 0, 0) is not conjugate to any RA (direct computations) and the same holds for
the other subgroups, since r(RA ) ≤ 2. The subgroups U3 (1, λ1 , 0) and U3 (1, λ2 , 0)
are conjugate if and only if λ1 = λ2 . To conclude, we observe that U3 (1, λ, 0) is not
conjugate to U3 (0, 1, 1).
Ψ(t1 ) = X1 ,
Ψ(t2 ) = X3 ,
λ=
Before to consider the next subcase, we recall the following notation given in the
Introduction. For any ρ ∈ F , we denote by Aρ (F) a fixed set of representatives
for the equivalence classes with respect to the following relation >ρ defined on
A(F) = (F \ {1}) × F: given (β1 , β2 ), (β3 , β4 ) ∈ A(F), we write (β1 , β2 ) >ρ (β3 , β4 ) if
and only if either (β3 , β4 ) = (β1 , ±β2 ) or
(5.1)
β3 =
β 1 t2 + β 2 t − ρ
t2 + β2 t − ρβ1
and
β4 = ±
β2 t2 − 2ρ(β1 + 1)t − ρβ2
t2 + β2 t − ρβ1
for some t ∈ F such that (t2 + ρ)(t2 + β2 t − ρβ1 ) 6= 0.
Lemma 5.4. The distinct conjugacy classes of nonabelian subgroups R = R(Rρ , D)
∈ ∆4 (F) such that d(Z(R)) = 2 and r(Z(R)) = 1 can be represented by
R(Rρ , E1,2 + β1 E2,1 + β2 E2,2 )
with ρ ∈ F and (β1 , β2 ) ∈ Aρ (F). Furthermore, d(R) = r(R) = 3 and k(R) = 2.
Proof. Let R = R(Rρ , D) ∈ ∆4 (F), with ρ ∈ F and D ∈ Mat3 (F), be a nonabelian
subgroup such that d(Z(R)) = 2 andr(Z(R)) = 1.
By (2.2) and the hypothesis
ᾱ1 ᾱ2 0
that R is nonabelian, we have D = β̄1 β̄2 0, with β̄1 6= ᾱ2 . Taking g =
0
0 0
1 −ᾱ1 ᾱ2−1
0 1
ρ −β̄2 β̄1−1
diag I3 ,
if ᾱ2 6= 0 and g = diag 1,
,
if
ρ 0
0
ᾱ−1
0
ρβ̄1−1
2
ᾱ2 = 0, we obtain that R is conjugate via g to the subgroup
1 x1 x2 x3
x4
0 1
0
x1
x2
0
0
1
ρx
β
x
+
β
x
where β1 6= 1.
U4 (ρ, β1 , β2 ) =
2
1 1
2 2 ,
0 0
0
1
0
0 0
0
0
1
Let ρ1 , ρ2 ∈ F , β1 , β2 , β3 , β4 ∈ F with β1 , β3 6= 1. It is quite easy to verify that
the subgroups U4 (ρ1 , β1 , β2 ) and U4 (ρ2 , β3 , β4 ) are conjugate in AGL4
(F) if and
a1 a2
,
only if there exists an element g = diag(1, A, B) ∈ GL5 (F), with A =
a3 a4
b1 b2
B =
, such that U4 (ρ1 , β1 , β2 )g = U4 (ρ2 , β3 , β4 ). This holds if and only
b3 b4
if b1 = ρ2 a22 + a21 , b2 = (β3 + 1)a1 a2 + β4 a22 , b3 = ρ2 a2 a4 + a1 a3 , b4 = β3 a2 a3 +
β4 a2 a4 + a1 a4 and
(5.2)
a1 a3 + a2 a4 ρ2 = 0,
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
13
(5.3)
(β1 β3 − 1)a2 a3 + β4 (β1 − 1)a2 a4 + (β1 − β3 )a1 a4 = 0,
ρ1 ρ2 a22 + ρ1 a21 − ρ2 a24 − a23 = 0,
β2 (β3 a2 a3 + β4 a2 a4 + a1 a4 ) + β4 (a22 ρ1 − a24 ) + (β3 + 1)(a1 a2 ρ1 − a3 a4 ) = 0
provided that
(a1 a4 − a2 a3 )(a21 + a1 a2 β4 − a22 ρ2 β3 ) 6= 0.
(5.4)
Now, if a2 = 0, from (5.2) and (5.4) we get a3 = 0 and in this case (5.3) gives
β3 = β1 , ρ2 = ρ1 and β4 = ±β2 (notice that, taking g = diag(1, 1, −1, 1, −1),
we have U4 (ρ1 , β1 , β2 )g = U4 (ρ1 , β1 , −β2 )). Hence, we may suppose a2 6= 0 and
a4 = −a1 a3 (a2 ρ2 )−1 by (5.2). In this case (5.3) gives ρ2 = ρ1 , a3 = ±a2 ρ1 , f0 = 0
and f+ = 0 or f− = 0, where
f0
= a21 (β1 − β3 ) + a1 a2 β4 (β1 − 1) − a22 ρ1 (β1 β3 − 1),
f±
= a21 (β2 ± β4 ) + a1 a2 (β2 β4 ∓ 2ρ1 (β3 + 1)) − a22 ρ1 (β2 β3 ± β4 )
provided that
(5.5)
(a21 + a22 ρ1 )(a21 + a1 a2 β4 − a22 ρ1 β3 ) 6= 0.
Taking a2 = ±1, it follows that U4 (ρ1 , β1 , β2 ) is conjugate to U4 (ρ2 , β3 , β4 ) if and
only if ρ2 = ρ1 and either (β3 , β4 ) = (β1 , ±β2 ) or
2
β2 t2 − 2ρ1 (β1 + 1)t − ρ1 β2
β1 t + β2 t − ρ1
, ±
(β3 , β4 ) = 2
t + β2 t − ρ1 β1
t2 + β 2 t − ρ 1 β 1
for some t ∈ F such that (t2 + ρ)(t2 + β2 t − ρ1 β1 ) 6= 0. In other words, this holds if
and only if ρ2 = ρ1 and (β1 , β2 ) >ρ1 (β3 , β4 ).
Remark 5.5. Let ρ ∈ F , β1 , β3 ∈ F \ {1} and β2 , β4 ∈ F. Then:
(a) U4 (ρ, β1 , β2 ) and U4 (ρ, −1, 0) are conjugate if and only if (β1 , β2 ) = (−1, 0);
(b) U4 (ρ, β1 , β2 ) and U4 (ρ, β1 , β4 ) are conjugate if and only if β4 = ±β2 ;
(c) U4 (ρ, β1 , 0) and U4 (ρ, β3 , 0) are conjugate if and only if either β3 = β1 or
β1 6= 0 and β3 = β1−1 ;
(d) U4 (ρ, β1 , 0) and U4 (ρ, 0, β4 ) are conjugate if and only if β1 = ρω 2 and
2
6= ±1.
β4 = ρω2ρω
2 −1 for some ω ∈ F such that ρω
Remark 5.6. It will be useful to give the presentation of the following algebras:
(a) LU4 (ρ,0,λ) = Span(t1 , t2 ) such that: t31 = t2 t1 = 0; t22 = ρt21 + λt1 t2 ;
(b) LU4 (ρ,−1,0) = Span(t1 , t2 ) such that: t31 = t1 t2 + t2 t1 = 0; t22 = ρt21 .
Lemma 5.7. Assume char F = 2. There are exactly |B(F)| distinct conjugacy
classes of nonabelian subgroups R = R(U13 , D) ∈ ∆4 (F) such that d(Z(R)) = 2 and
r(Z(R)) = 1. Such classes can be represented by the subgroups corresponding to
D = E1,1 + E1,2 + λE2,2 (λ ∈ B(F)).
Furthermore, d(R) = r(R) = 3 and k(R) = 2.
Proof. Let R = R(U13 , D) for some
3 (F). By (2.2) and the hypothesis that
D ∈ Mat
ᾱ1 ᾱ2 0
R is nonabelian, we have D = β̄1 β̄2 0 with β̄1 6= ᾱ2 . Then, R is conjugate
0
0 0
14
MARCO ANTONIO PELLEGRINI
via g = I5 + β̄1 E4,5 to
1 x1
0 1
U5 (α1 , α2 , β2 ) =
0 0
0 0
0 0
x2
0
1
0
0
x3
x2
x1
1
0
x4
α1 x1 + α2 x2
,
β2 x2
0
1
where α2 6= 0. Then d(R) = r(R) = 3 and k(U ) = 2.
For any λ ∈ F, consider the algebra Lλ = LU5 (1,1,λ) :
Lλ = Span(t1 , t2 ) such that: t31 = t32 = t1 t2 + t2 t1 + t21 = 0;
t22 = λt21
(clearly, when λ = 0, the condition t32 = 0 can be omitted). We now define an
isomorphism of split local algebras Ψ : Lλ → LR in the following way:
Ψ(t1 ) = α2 X1 + (α1 + α2 )X2 , Ψ(t2 ) = α2 X2 ,
if β2 = 0,
Ψ(t1 ) = α2 X2 ,
Ψ(t2 ) = β2 X1 ,
if β2 6= 0,
where λ =
α1 β2
.
α22
Hence, R is conjugate to U5 (1, 1, λ) for some λ ∈ F. Now,
U5 (1, 1, λ1 ) and U5 (1, 1, λ2 ) are conjugate if and only if λ1 +λ2 ∈ B(F). We conclude
that are exactly |B(F)| conjugacy classes.
Lemma 5.8. Let R = R(N1 , D) ∈ ∆4 (F) be a nonabelian subgroup such that
d(Z(R)) = 2 and r(Z(R)) = 1. Then R is conjugate to one of the following
subgroups: RE2,1 , U3 (1, 0, 0), U3 (0, 1, 0), U3 (0, 1, 1), U4 (ρ, −1, 0), U4 (ρ, 0, λ) or
U5 (1, 1, 0), for some ρ ∈ F and λ ∈ F.
ᾱ1 ᾱ2 0
Proof. Let R = R(N1 , D) for some D ∈ Mat3 (F). By (2.2), D = β̄1 β̄2 0.
0
0 0
Then, R is conjugate via g = I5 − β̄1 E4,5 to
1 x1 x2 x3
x4
0 1
0
0 α1 x1 + α2 x2
,
U6 (α1 , α2 , β2 ) = 0 0
1 x1
β2 x2
0 0
0
1
0
0 0
0
0
1
for some α1 , α2 , β2 ∈ F. It is easy to see that U6 (α1 , α2 , β2 ) is conjugate to some
RA if and only if α1 = α2 = β2 = 0. More in detail, U6 (0, 0, 0)g = RE2,1 , where
g = diag(I3 , E1,2 + E2,1 ).
If α1 = α2 = 0 and β2 6= 0, then d(R) = 3 and r(R) = k(R) = 2. The function
Ψ : LU3 (1,0,0) → LR defined by
Ψ(t1 ) = X2 ,
Ψ(t2 ) = X1
is an isomorphism. By Proposition 2.4, R is conjugate to the subgroup U3 (1, 0, 0).
If α1 6= 0 and α2 = β2 = 0, then d(R) = r(R) = k(R) = 3. The function
Ψ : LU3 (0,1,0) → LR defined by
Ψ(t1 ) = X1 ,
Ψ(t2 ) = X2
is an isomorphism and so R is conjugate to U3 (0, 1, 0).
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
15
For the other values of α1 , α2 , β2 we have d(R) = r(R) = 3 and k(R) = 2. If
α1 , β2 6= 0 and α2 = 0, write αβ21 = ω 2 ρ for some ω ∈ F∗ and a unique ρ ∈ F : the
function Ψ : LU4 (ρ,0,0) → LR defined by
Ψ(t1 ) = ωX2 ,
Ψ(t2 ) = X1
is an isomorphism. Hence, R is conjugate to U4 (ρ, 0, 0).
We are left to consider the case where α2 6= 0. Suppose α1 = β2 = 0. If
char F 6= 2, write −1 = ω 2 ρ for some ω ∈ F∗ and a unique ρ ∈ F : the function
Ψ : LU4 (ρ,−1,0) → LR defined by
Ψ(t1 ) = ωX1 + ωX2 ,
Ψ(t2 ) = X1 − X2
is an isomorphism and hence R is conjugate to U4 (ρ, −1, 0). If char F = 2, the
function Ψ : LU5 (1,1,0) → LR defined by
Ψ(t1 ) = X1 + X2 ,
Ψ(t2 ) = X2
is an isomorphism and hence R is conjugate to U5 (1, 1, 0).
If (α1 , β2 ) 6= (0, 0), set ∆ = α1 β2 − α22 . If ∆ = 0 (and so β2 6= 0) then the
function Ψ : LU3 (0,1,1) → LR defined by
Ψ(t1 ) = β2 X1 ,
Ψ(t2 ) = β2 X1 − α2 X2
is an isomorphism. Hence, U is conjugate to U3 (0, 1, 1). If ∆ 6= 0, write
∆
α22
= ω2ρ
for some ω ∈ F∗ and a unique ρ ∈ F . The function Ψ : LU4 (ρ,0,ω−1 ) → LR defined
by
Ψ(t1 ) = α2 ωX2 ,
Ψ(t2 ) = −β2 X1 + α2 X2 if β2 6= 0,
Ψ(t1 ) = α2 ωX1 − α1 ωX2 , Ψ(t2 ) = α2 X1
if β2 = 0,
is an isomorphism. Hence, R is conjugate to U4 (ρ, 0, ω −1 ).
Lemma 5.9. Assume char F 6= 2. Let R = R(N2 , D) ∈ ∆4 (F) be a nonabelian
subgroup such that d(Z(R)) = 2 and r(Z(R)) = 1. Then R is conjugate to one of
the following subgroups: R(E1,2 −E2,1 ) , U3 (1, −1, 0) or U4 (ρ, −1, 0) for some ρ ∈ F .
Proof.
ᾱ1
β̄1
0
Let
ᾱ2
β̄2
0
R= R(N2 , D) for some D ∈ Mat3 (F). By (2.2) we must have D =
0
0. Then, R is conjugate via g = I5 − β̄1 E4,5 to
0
1 x1 x2 x3
x4
0 1
0 −x2 α1 x1 + α2 x2
0
0
1
x1
β2 x2
U7 (α1 , α2 , β2 ) =
0 0
0
1
0
0 0
0
0
1
for some α1 , α2 , β2 ∈ F. It is easy to see that U7 (α1 , α2 , β2 ) is conjugate to some
RA if and only if α1 = α2 = β2 = 0. In this case d(R) = r(R) = k(R) = 2 and
U7 (0, 0, 0)g = R(E1,2 −E2,1 ) where diag(I3 , (E2,1 − E1,2 )).
Suppose now (α1 , α2 , β2 ) 6= (0, 0, 0) and let ∆ = 4α1 β2 − α22 . Notice that in this
case d(R) = r(R) = 3 and k(R) = 2. Assume ∆ = 0 and consider the function
Ψ : LU3 (1,−1,0) → LR given by
Ψ(t1 ) = X1 , Ψ(t2 ) = α2 X1 − 2α1 X2 if α1 6= 0,
Ψ(t1 ) = X2 , Ψ(t2 ) = X1
if α1 = α2 = 0.
16
MARCO ANTONIO PELLEGRINI
Since Ψ is an isomorphism, we obtain that U7 (α1 , α2 , β2 ) is conjugate to U3 (1, −1, 0).
Now, assume ∆ 6= 0 and write ∆ = ω 2 ρ for some ω ∈ F∗ and a unique ρ ∈ F . The
function Ψ : LU4 (ρ,−1,0) → LR given by
Ψ(t1 ) = ωX1 ,
Ψ(t2 ) = α2 X1 − 2α1 X2
if α1 6= 0,
Ψ(t1 ) = ω(β2 + 1)X1 − α2 ωX2 , Ψ(t2 ) = α2 (β2 − 1)X1 − α22 X2 if α1 = 0,
is an isomorphism: R is conjugate to U4 (ρ, −1, 0).
Lemma 5.10. Let R = R(N3,λ , D) ∈ ∆4 (F), λ ∈ F∗ , be a nonabelian subgroup
such that d(Z(R)) = 2 and r(Z(R)) = 1. Then, R is conjugate to one of the
following subgroups: RA , where A = E1,1 + E2,1 + λE2,2 , U3 (0, 1, 1), U3 (1, µ, 0) for
some µ ∈ F \ {0, 1}, U4 (ρ, β1 , β2 ) for some ρ ∈ F and β1 , β2 ∈ F, or U5 (1, 1, ω)
where ω ∈ F is such that ω + λ ∈ B(F).
Proof. Let
ᾱ1
D = β̄1
0
∗
R = R(N
3,λ , D) for some λ ∈ F and some D ∈ Mat3 (F). By (2.2)
ᾱ2 0
β̄2 0. Then, R is conjugate via g = I5 − β̄λ2 E4,5 to
0 0
1 x1 x2
x3
x4
0 1
0 x1 + x2 α1 x1 + α2 x2
0
0
1
λx2
β1 x1
Ũ8 (λ, α1 , α2 , β1 ) =
0 0
0
1
0
0 0
0
0
1
for some α1 , α2 , β1 ∈ F. It is easy to see that Ũ8 (λ, α1 , α2 , β1 ) is conjugate to some
RA if and only if α1 = α2 = β1 = 0. In this case d(R) = 3 and r(R) = k(R) = 2
and Ũ8 (λ, 0, 0, 0)g = RA , where g = E1,1 + E2,3 + E5,4 − λE2,2 + λE3,3 + λ2 E4,5
and A = E1,1 + E2,1 + λE2,2 .
So, suppose (α1 , α2 , β1 ) 6= (0, 0, 0): we have d(R) = r(R) = 3 and k(R) = 2. We
may also assume β1 = 1. Namely, if β1 6= 0 it suffices to conjugate Ũ8 (λ, α1 , α2 , β1 )
by g
= diag(1,
β1
, β1
, β12 , β1 ). If β1 = 0 and
α2 6= 0, then we conjugate by the matrix
1 −1
λ (λα1 − α2 )α−1
2
diag 1,
,
and if α2 = β1 = 0, we conjugate by
λ 0
0
−λα−1
2 2
λα1 −λα21
0
α1
.
,
the matrix diag 1,
0
λα1
−λα1 α1
Now, set U8 (λ, α1 , α2 ) = Ũ8 (λ, α1 , α2 , 1) and ∆ = −λ(α2 − 1)(α1 − α2 + 1) − 1.
Suppose α2 = 1. In this case ∆ = −1 that we write as −1 = ω 2 ρ for some ω ∈ F∗
α21 λ−α1 +2
1
,
, ω(α
and a unique ρ ∈ F . If α1 6= 0, 1, then U8 (λ, α1 , 1)g = U4 ρ, 1−α
1
1 −1)
where
!!
ωα21
α1 0
0 α1 −1
g = diag 1,
,
.
ωα1
1 ω
α1 1−α
1
, where
If α1 = 0 and char F 6= 2, then U8 (λ, 0, 1)g = U4 ρ, 1 − λ2 , − 2(λ+1)
ωλ
−1
4
0
− ωλ
ω
1
g = diag 1,
,
. If α1 = 0 and char F = 2, then
2(λ+2)
−1
−2
ω
−1
2ω
ωλ
1 0
0 1
g
2
U8 (λ, 0, 1) = U5 (1, 1, λ + µ + µ ), where g = diag 1,
,
. If
µ 1
1 µ
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
R
d(R) r(R)
U3 (0, 1, 0)
3
3
U3 (0, 1, 1)
3
3
U3 (1, λ, 0)
3
3
U4 (ρ, β1 , β2 )
3
3
U5 (1, 1, ǫ)
3
3
U3 (1, 0, 0)
3
2
k(R)
3
2
2
2
2
2
17
Conditions
λ ∈ F \ {0, 1}
ρ ∈ F , (β1 , β2 ) ∈ Aρ (F)
char F = 2, ǫ ∈ B(F)
Table 3. Representatives for conjugacy classes of nonabelian subgroups having d(Z(R)) = 2 and r(Z(R)) = 1.
α1 = 1, then U8 (λ, 1, 1)g = U4 ρ, 0, −(λ + 1)ω −1 , where
0
1
0
−ω −1
g = diag 1,
,
.
ω −1 1
−ω −2 −λω −1
Hence, we may now suppose α2 6= 1. If ∆ 6= 0, we write ∆ = ρω 2 for some ω ∈ F∗
and a unique ρ ∈ F . Then U8 (λ, α1 , α2 )g = U4 (ρ, α2 , −(α1 α2 λ−α1 λ+α2 +1)ω −1 )
where
1
ω
λ(1 − α2 )2
0
g = diag 1,
,
.
λ(1 − α2 ) 0
λ(1 − α2 ) ωλ(1 − α2 )
2
2 −1) −1
2
If ∆ = 0, i.e. α1 = λ(α
λ(α2 −1) , we need to distinguish two cases. If λ(α2 −1) +α2 6=
0, then U8 (λ, α1 , α2 )g = U3 (0, 1, 1), where
1
0
λ(1 − α2 ) − 1
0
λ(1 − α2 )
0
−λ
0
,
g = diag
2
1,
0
λ(α2 − 1)
0
λα2
2
0
λ(1 − α2 )
0
λ (α2 − 1)
and if λ =
−α2
(α2 −1)2 ,
then U8 (λ, α1 , α2 )g = U3 (1, α2 , 0), where
1
0
0
0
2
αα−1
0
1
0
2
g = diag
2 .
1, 0
−α2 0 1 − α2
α2
0
α2
0
α2 −1
Corollary 5.11. Let R ∈ ∆4 (F) be a nonabelian subgroup such that d(Z(R)) = 2
and r(Z(R)) = 1. Suppose that R is not conjugate to any RA , A ∈ Mat3 (F). Then
R is conjugate to exactly one of the subgroups listed in Table 3.
Proof. In view of Lemmas 5.3, 5.4, 5.7, 5.8, 5.9 and 5.10, R is conjugate to one of the
subgroups listed in Table 3. Since d(RA ) ≤ 2, it follows from Lemma 5.3 that these
subgroups are not conjugate to RA for any A ∈ Mat3 (F). Direct computations
show that no pair of subgroups U3 (0, 1, 1), U3 (1, λ, 0), U4 (ρ, β1 , β2 ) and U5 (1, 1, ǫ)
is conjugate in AGL4 (F).
We can now give the classification of the nonabelian subgroups in ∆4 (F).
18
MARCO ANTONIO PELLEGRINI
Theorem 5.12. Let F be a field. The distinct conjugacy classes of nonabelian
regular subgroups in ∆4 (F) can be represented by the subgroups described in the
first column of Table 2.
Proof. Let R ∈ ∆4 (F) be a nonabelian regular subgroup. By the considerations given in Section 3 we have the following possibilities: (d(Z(R)), r(Z(R))) =
(3, 2), (2, 2) or (2, 1). If (d(Z(R)), r(Z(R))) = (2, 2) then R is conjugate either to
U2 (0, 1, 0, 1, 1) or to U2 (0, 1, 0, 0, 1), by Lemma 5.1. If (d(Z(R)), r(Z(R))) = (2, 1),
then R is conjugate to either one of the subgroups of Table 3 or to a subgroup RA ,
by Corollary 5.11. If (d(Z(R)), r(Z(R))) = (3, 2), then R is conjugate to a subgroup
RA . The statement of the theorem is proved considering a set ΠA (F) of representatives for projective congruent classes of asymmetric matrices in Mat3 (F).
We would like to give explicit sets Aρ , at least when F is algebraically closed, the
real field R or a finite field. Observe that, for every field F of characteristic 6= 2,
(−1, 0) ∈ Aρ for all ρ ∈ F , by Remark 5.5(a).
Fixing ρ ∈ F , β1 ∈ F \ {1} and β2 ∈ F such that (β1 , β2 ) 6= (−1, 0), define the
following polynomials in F[t]:
(5.6)
f1 (t)
g1 (t)
= β1 t2 + β2 t − ρ,
= t2 + β2 t − ρβ1 ,
f2 (t) =
g2 (t) =
β2 t2 − 2ρ(β1 + 1)t − ρβ2 ,
t2 + ρ.
Lemma 5.13. Suppose that β1 6= 1 and (β1 , β2 ) 6= (−1, 0). If either β1 = 0 or
f1 (t) is reducible, then U4 (ρ, β1 , β2 ) is conjugate to U4 (ρ, 0, λ) for some λ ∈ F.
Proof. Clearly, the statement holds if β1 = 0. So, assume β1 6= 0. Since f1 (t) is
reducible, we can take a ∈ F such
that f1 (a) = 0 and from (5.1) we obtain that
U4 (ρ, β1 , β2 ) is conjugate to U4 ρ, 0, fg21 (a)
(a) provided that g1 (a)g2 (a) 6= 0. Suppose
that f1 (a) = g1 (a)g2 (a) = 0. Observe that f1 (a) = g1 (a) = 0 implies g2 (a) = 0,
since f1 (t) = g1 (t) + (β1 − 1)g2 (t). So, we may suppose that any root of f1 (t) is
also a root of g2 (t). Clearly, this implies that ρ = −ω 2 for some ω ∈ F. Take
a = ai = (−1)i ω, i = 0, 1. If f1 (ai ) = 0 for some i, then β2 = (−1)i+1 ω(β1 + 1).
In this case, f1 (t) = (t − ai )(β1 t − (−1)i ω) implies that β1 (−1)j ω − (−1)i ω = 0 for
some j = 0, 1, whence β1 = −1 and (i, j) ∈ {(0, 1), (1, 0)}. It follows that β2 = 0,
contradicting our assumption (β1 , β2 ) 6= (−1, 0).
In the following, given a subset S of F∗ , we denote by −S and S −1 the sets
{−s : s ∈ S} and {s−1 : s ∈ S}, respectively.
Corollary 5.14. Let F be a field with no quadratic extensions.
(a) If char F 6= 2, then A1 = {(−1, 0), (0, 0)} ∪ {(0, λ) : λ ∈ N(F)}, where N(F)
is a fixed subset of F∗ such that F∗ = N(F) ⊔ −N(F).
(b) If char F = 2, then A1 = {(0, λ) : λ ∈ F}.
Proof. It follows from Lemma 5.13 and Remark 5.5.
Proposition 5.15. Let F = F be an algebraically closed field. The distinct conjugacy classes of nonabelian regular subgroups in ∆4 (F) can be represented by
U2 (0, 1, 0, 1, 1),
U2 (0, 1, 0, 0, 1),
U3 (1, λ, 0) (λ ∈ F \ {1}),
U3 (0, 1, 0),
U3 (0, 1, 1),
RD (D ∈ ΠA (F))
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
and
U4 (1, −1, 0), U4 (1, 0, 0), U4 (1, 0, β) (β ∈ N(F))
U4 (1, 0, β) (β ∈ F), U5 (1, 1, 0)
19
if char F 6= 2,
if char F = 2,
where, if char F 6= 2,
ΠA (F) =
{E2,3 , E1,2 + E2,3 , E1,3 + E2,2 + E3,1 + E3,2 , E3,2 + E3,3 − E2,3 ,
E1,1 + E2,3 , E1,1 + E3,2 + E3,3 − E2,3 , E1,1 + E2,3 − E3,2 ,
E2,3 − E3,2 , E2,3 + µE3,2 , E1,1 + E2,3 + µE3,2 : µ ∈ M(F)},
and M(F) and N(F) are subsets of F∗ such that F \ {0, ±1} = M(F) ⊔ M(F)−1 and
F∗ = N(F) ⊔ −N(F); if char F = 2,
ΠA (F)
= {E2,3 , E1,1 + E2,3 , E1,2 + E2,3 , E1,3 + E2,2 + E3,1 + E3,2 ,
E2,3 + µE3,2 : µ ∈ M(F)}
and M(F) is a subset of F∗ such that F \ {0, 1} = M(F) ⊔ M(F)−1 .
Proof. By Theorem 5.12 and Corollary 5.14 we are left to determine the set ΠA (F).
Applying [3, Theorem 2.1], the elements of ΠA (F) are the asymmetric matrices
obtained as diagonal sum of the following matrices:
0 1 0
0 0 1
0 1
0 1
0 −1
0 , 1 ,
,
,
, 0 0 1 , 0 1 0 ,
0 0
µ 0
1 1
0 0 0
1 1 0
where µ ∈ M(F). If char F 6= 2 we also allow µ = −1; if char F = 2 we must omit
the matrices
0 1
diag 1,
.
µ 0
Lemma 5.16. Let ρ = 1 and char F 6= 2. Suppose that there exists an element
ι ∈ F such that ι2 = −1. Then
A1 = {(−1, 0), (0, 0)} ∪ {(λ + 1, 2ι) : λ ∈ F∗ }.
Proof. We show that every subgroup U4 (1, β1 , β2 ), β1 6= 1, is conjugate to a unique
subgroup U4 (1, β3 , β4 ) with (β3 , β4 ) ∈ A1 as in the statement. This clearly holds
if β4 = ±2ι, so suppose β4 6= ±2ι. Keeping the notation of (5.6), let h1 (t) =
2
f2 (t) − 2ιg1 (t) ∈ F[t]. Then, a = 2ββ12 +ιβ
−2ι is a root of h1 (t). It follows that R is
conjugate to U4 (1, λ + 1, 2ι) for some λ ∈ F∗ , provided that g1 (a)g2 (a) 6= 0. Notice
that g1 (a)g2 (a) = 0 if and only if (β1 + ιβ2 + 1)(β22 + 4β1 ) = 0.
Suppose that β22 + 4β1 = 0. If β2 6= 0, take b = 2β2−1 . In this case, f1 (b) =
(β 2 +4)2
β 2 +4
f2 (b) = 0, g1 (b) = 24β 2
6= 0 and g2 (b) = 2β 2 6= 0. It follows that R is
2
2
conjugate to U4 (1, 0, 0) (this clearly holds even if β2 = 0). Now, suppose that
2 +2
β1 + ιβ2 + 1 = 0 and let h2 (t) = f2 (t) + 2ιg1 (t). Take c = − 3ιβ
β2 +2ι . Then h2 (c) = 0,
2
2 (β2 −2ι) )
2 (β2 −2ι)
g1 (c) = −2ιβ
6= 0 and g2 (c) = −8β
6= 0. It follows that R is
(β2 +2ι)2
(β2 +2ι)2
conjugate to U4 (1, −3, −2ι) and then to U4 (1, −3, 2ι), by Remark 5.5.
Finally, it is an easy computation to verify that U4 (1, λ1 + 1, 2ι) is conjugate to
U4 (1, λ2 + 1, 2ι) if and only if λ1 = λ2 .
Clearly the previous lemma gives an alternative set A1 for algebraically closed
field of characteristic 6= 2. In a very similar way we can prove the following.
20
MARCO ANTONIO PELLEGRINI
Lemma 5.17. Let ρ = −1, char F 6= 2 and suppose that −1 6∈ (F)2 . Then
A−1 = {(−1, 0), (0, 0)} ∪ {(λ + 1, 2) : λ ∈ F∗ }.
Lemma 5.18. Suppose that char F 6= 2, β1 6= 0, 1, β2 6= 0 and (β1 , β2 ) 6= (−1, 0). If
f1 (t) is irreducible and f2 (t) is reducible, then U4 (ρ, β1 , β2 ) is conjugate to U4 (ρ, λ, 0)
for some λ ∈ F \ {0, 1}.
Proof. Since f2 (t) is reducible, we can take a ∈ F such that f2 (a)
= 0 and from
f1 (a)
(5.1) we obtain that U4 (ρ, β1 , β2 ) is conjugate to U4 ρ, g1 (a) , 0 provided that
g1 (a)g2 (a) 6= 0. So, first, suppose that f2 (a) = g2 (a) = 0 for some a ∈ F. As
in Lemma 5.13, this implies that ρ = −ω 2 for some ω ∈ F∗ and a = ai = (−1)i ω
for some i = 0, 1. In particular, we get β2 = (−1)i+1 ω(β1 + 1) (whence β1 6= −1).
In this case, we obtain that f1 (ai ) = 0, an absurd, since f1 (t) is irreducible. Next,
suppose that any root of f2 (t) is a root of g1 (t) = 0 (but not a root of g2 (t)).
Let r be the resultant between f2 (t) and g1 (t) with respect to t. From r = 0
we get (β22 + 4ρβ1 )(ρ(β1 + 1)2 + β22 ) = 0. Since f1 (t) is irreducible, this implies
ρ(β1 + 1)2 + β22 = 0 and so ρ = −ω 2 for some ω ∈ F∗ and β2 = ±ω(β1 + 1). As
before, this condition implies that f1 (t) is reducible, a contradiction.
Corollary 5.19. Let F = R. Then
A1 = {(0, λ) : λ ∈ [0, +∞)} ∪ {(λ, 0) : λ ∈ [−1, 0)}.
Proof. The result follows from Lemmas 5.13 and 5.18 and Remark 5.5, observing
that f2 (t) ∈ R[t] is reducible provided that β2 6= 0.
From Theorem 5.12 and [3, Theorem 2.1] we obtain the following classification.
Proposition 5.20. The distinct conjugacy classes of nonabelian regular subgroups
in ∆4 (R) can be represented by:
U2 (0, 1, 0, 1, 1),
U2 (0, 1, 0, 0, 1),
U3 (0, 1, 1),
U3 (0, 1, 0),
RD (D ∈ ΠA (R)),
∗
U3 (1, λ + 1, 0) (λ ∈ R ), U4 (1, 0, λ) (λ ∈ [0, +∞)), U4 (1, λ, 0) (λ ∈ [−1, 0)),
U4 (−1, 0, 0), U4 (−1, −1, 0), U4 (−1, λ + 1, 2) (λ ∈ R∗ ),
where
ΠA (R)
= {E1,2 + E2,3 , E1,3 + E2,2 + E3,1 + E3,2 , E1,2 ± E3,3 , E1,2 − E2,1 ,
E1,2 − E2,1 ± E3,3 , E1,2 + µE2,1 , E1,2 − E2,1 − E2,2 ± E3,3 , E1,2 ,
E1,2 + µE2,1 ± E3,3 , νE1,1 − E1,2 + E2,1 + νE2,2 , E1,2 − E2,1 − E2,2 ,
νE1,1 − E1,2 + E2,1 + νE2,2 ± E3,3 : µ ∈ (0, 1), ν ∈ R∗ }.
Lemma 5.21. Suppose that char F 6= 2, β1 6= 0, 1 and (β1 , β2 ) 6= (−1, 0). Let
F = {1, ξ} and let ϑ ∈ F such that ϑ2 + 1 = σ 2 ξ for some σ ∈ F∗ . If f1 (t)
and f2 (t) are both irreducible, then U4 (1, β1 , β2 ) and U4 (ξ, β1 , β2 ) are conjugate,
respective, to U4 (1, λ1 , ϑ(λ1 + 1)) and U4 (ξ, −1, λ2 ) for some λ1 ∈ F \ {±1} and
λ2 ∈ F∗ .
Proof. Since f1 (t) and f2 (t) are both irreducible polynomials, then β22 +4ρβ1 = ω 2 ξ
and (β1 + 1)2 ρ2 + ρβ22 = ν 2 ξ for some ω, ν ∈ F∗ . First, consider ρ = 1. The
statement is obvious if β2 = ϑ(β1 + 1). So, assume β2 6= ϑ(β1 + 1) and let h(t) =
f2 (t)−ϑ(f1 (t)+g1 (t)). Since the discriminant of h(t) is 4(ϑ2 +1)ν 2 ξ = (2σνξ)2 , there
exists a ∈ F such that h(a) = 0. Now, denote by ri the resultant between h(t) and
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
21
gi (t) with respect to t: we obtain r1 = ν 2 ξ((β1 −1)2 ϑ2 −ω 2 ξ) and r2 = 4(ϑ2 +1)ν 2 ξ.
From r1 = 0 we get ξ = ((β1 − 1)ϑω −1 )2 , an absurd; from r2 = 0 we obtain
ϑ2 + 1 = 0, which is in contradiction with the initial
assumption on ϑ. Hence,
(a) ϑ(f1 (a)+g1 (a))
.
,
g1 (a)g2 (a) 6= 0 and so U4 (1, β1 , β2 ) is conjugate to U4 1, gf11 (a)
g1 (a)
Next, consider ρ = ξ. The statement is obvious if β1 = −1. So, assume β1 6= −1
and let h(t) = f1 (t) + g1 (t). Since the discriminant of h(t) is 4ν 2 , there exists a ∈ F
such that h(a) = 0. Clearly, if h(a) = g1 (a) = 0, then f1 (a) = 0, contradicting the
assumption that f1 (t) is irreducible. So, suppose that h(a) = g2 (a) = 0 and denote
2
by r the resultant between h(t) and g2 (t) with respect to t. Since
ξ 6= 0, we
r = 4ν
f2 (a)
obtain that g2 (a) 6= 0 and so U4 (ξ, β1 , β2 ) is conjugate to U4 ξ, −1, g1 (a) .
Lemma 5.22. Let F = Fq be a finite field and keep the previous notation.
(a) Suppose q even. Then we can take F = {1} and
−1
: a ∈ F \ {0, 1} ,
A1 = {(0, λ) : λ ∈ F} ∪ 1 + κ−1
a , aκa
where, for every a ∈ F\{0, 1}, κa ∈ F∗ is a fixed element such that κ2a +κa 6∈
a2 B(F). In particular, |A1 | = 2q − 2.
(b) Suppose q ≡ 1 (mod 4). Then we can take F = {1, ξ} and
A1
=
{(−1, 0), (0, 0)} ∪ {(λ + 1, 2ι) : λ ∈ F∗q },
Aξ
=
{(−1, 0), (0, 0)} ∪ {(0, λ) : λ ∈ N(Fq )} ∪ {(λ, 0) : λ ∈ P(Fq )} ∪
∪{(−1, λ) : λ ∈ Q(Fq )},
where ι2 = −1 and
F∗q \ {±1} ∪ {ω 2 ξ : ω ∈ Fq } = P(Fq ) ⊔ −P(Fq )
and
F∗q \ a + a−1 ξ : a ∈ F∗q = Q(Fq ) ⊔ −Q(Fq ).
In particular, |A1 | + |Aξ | = 2q + 1.
(c) Suppose q ≡ 3 (mod 4). Then we can take F = {1, −1} and
A1
=
{(−1, 0), (0, 0)} ∪ {(0, λ) : λ ∈ N(Fq )} ∪ {(λ, 0) : λ ∈ P(Fq )} ∪
A−1
=
∪{(λ, ϑ(λ + 1)) : λ ∈ S(Fq )},
{(−1, 0), (0, 0)} ∪ {(λ + 1, 2) : λ ∈ F∗q },
where ϑ is such that ϑ2 + σ 2 + 1 = 0 for some σ ∈ F∗ and
F∗q \ {±1} ∪ {ω 2 : ω ∈ F∗q } = P(Fq ) ⊔ −P(Fq )
and
F∗q
1 − aϑ
∗
\ {±1} ∪
: a ∈ Fq \ {−ϑ}
= S(Fq ) ⊔ S(Fq )−1 .
a(a + ϑ)
In particular, |A1 | + |A−1 | = 2q + 1.
Proof. Let f1 (t), f2 (t), g1 (t), g2 (t) as in (5.6). Suppose q even. If either β1 6= 0 or
f1 (t) is reducible, then U4 (1, β1 , β2 ) is conjugate to U4 (1, 0, λ) for a unique λ ∈ F, by
Lemma 5.13 and Remark 5.5. Now, suppose β1 6= 0, 1 and f1 (t) irreducible. Then
β2 6= 0, β1 β2−2 6∈ B(F) and g1 (t) is also irreducible. We obtain that U4 (1, β1 , β2 )
is conjugate to U4 (1, β3 , β4 ) (β3 6= 0, 1, β4 6= 0, β3 β4−2 6∈ B(F)) if and only if
−1
β2 (β3 +1) = β4 (β1 +1). So, U4 (1, β1 , β2 ) is conjugate to U1 (1, 1+κ−1
a , aκa ), where
−1
∗
2
a = β2 (β1 + 1) 6= 0, 1 and κa ∈ F is chosen in such a way that κa + κa 6∈ a2 B(F).
22
MARCO ANTONIO PELLEGRINI
Suppose q ≡ 1 (mod 4). The set A1 is given in Lemma 5.16. So, consider the
case ρ = ξ with (β1 , β2 ) 6= (−1, 0). If either β1 = 0 or f1 (t) is reducible, then
R = U4 (ξ, β1 , β2 ) is conjugate to U4 (ξ, 0, λ) for a unique λ ∈ N(Fq ), by Lemma 5.13
and Remark 5.5. So, assume β1 6= 0 and f1 (t) irreducible. If f2 (t) is reducible, then
R is conjugate to U4 (ξ, λ, 0) for some λ 6= 0, 1, by Lemma 5.18. Recall that, by
Remark 5.5, U4 (ξ, λ1 , 0) is conjugate to U4 (ξ, λ2 , 0) if and only if either λ2 = λ1 or
2
λ2 = λ−1
1 ; U4 (ξ, λ1 , 0) is conjugate to U4 (ξ, 0, λ2 ) if and only if λ1 = ξω and λ2 =
2
−1
2ξω(ξω − 1) for some ω ∈ F; U4 (ξ, −1, λ1 ) is conjugate to U4 (ξ, −1, λ2 ) if and
only if λ2 = ±λ1 . Finally, if β1 6= 0, 1 and both f1 (t) and f2 (t) are reducible, then
R is conjugate to U4 (ξ, −1, λ) for some λ ∈ F, by Lemma 5.21. Now, U4 (ξ, −1, λ1 )
is not conjugate to U4 (ξ, λ2 , 0) if λ1 6= 0. Furthermore, U4 (ξ, −1, λ1 ) is conjugate
2
to U4 (ξ, 0, λ2 ) if and only if λ1 = a + ξa−1 and λ2 = ±a2a−ξ for some a ∈ F∗ .
Suppose q ≡ 3 (mod 4). The set A−1 is given in Lemma 5.17. So, consider the
case ρ = 1 with (β1 , β2 ) 6= (−1, 0). Proceeding in a way similar to what we did
for the case q ≡ 1 (mod 4), R = U4 (1, β1 , β2 ) is conjugate to a subgroup having
one of the following shape U4 (1, 0, λ) for a unique λ ∈ N(Fq ), U4 (1, λ, 0) for some
λ 6= 0, 1, or U4 (1, λ, ϑ(λ + 1)) for some λ 6= 1. Now, U4 (1, λ1 , 0) is conjugate to
U4 (1, λ2 , 0) if and only if either λ2 = λ1 or λ2 = λ−1
1 ; U4 (1, λ1 , 0) is conjugate to
U4 (1, 0, λ2 ) if and only if λ1 = ω 2 and λ2 = 2ω(ω 2 − 1)−1 for some ω ∈ F \ {±1};
U4 (1, λ1 , ϑ(λ1 + 1)) is conjugate to U4 (1, λ2 , ϑ(λ2 + 1)) if and only if λ2 = λ±1
1 .
Furthermore, U4 (1, λ1 , ϑ(λ1 + 1)) is conjugate to U4 (1, 0, λ2 ) if and only if λ1 =
±1
2
1−aϑ
−1
; U4 (1, λ, ϑ(λ1 + 1)) is not conjugate
, λ2 = ∓ aa2ϑ−2a−ϑ
a(a+ϑ)
+2aϑ−1 , a 6= 0, −ϑ, ϑ
to U4 (1, λ2 , 0).
Proposition 5.23. Let F = Fq be a finite field. If q is odd, there are exactly 5q + 9
distinct conjugacy classes of nonabelian regular subgroups in ∆4 (Fq ), that can be
represented by:
U2 (0, 1, 0, 1, 1), U2 (0, 1, 0, 0, 1), U3 (0, 1, 1), U3 (0, 1, 0), U3 (1, λ, 0) (1 6= λ ∈ Fq ),
RD (D ∈ ΠA (Fq )), U4 (1, β1 , β2 ) ((β1 , β2 ) ∈ A1 ), U4 (ξ, β1 , β2 ) ((β1 , β2 ) ∈ Aξ ),
where
ΠA (Fq )
= {E2,3 − E3,2 , E1,1 + E2,3 − E3,2 , E2,2 + E2,3 + λE3,3 ,
E1,1 + E2,2 + E2,3 + λE3,3 , ξE1,1 + E2,2 + 2E2,3 + E3,3 ,
E1,3 + E2,3 + E3,2 , E1,1 + E1,3 + E2,3 + E3,2 : λ ∈ Fq }
and x2 − ξ is a fixed irreducible polynomial of Fq [x] (take ξ = −1 if q ≡ 3 (mod 4)).
If q is even, there are exactly 5q + 6 distinct conjugacy classes of nonabelian
regular subgroups in ∆4 (Fq ), that can be represented by:
U2 (0, 1, 0, 1, 1), U2 (0, 1, 0, 0, 1), U3 (0, 1, 1), U3 (0, 1, 0), U3 (1, λ, 0) (1 6= λ ∈ Fq ),
U5 (1, 1, 0), U5 (1, 1, ξ), RD (D ∈ ΠA (Fq )), U4 (1, β1 , β2 ) ((β1 , β2 ) ∈ A1 ),
where
ΠA (Fq ) = {E2,2 + E2,3 + λE3,3 , E1,1 + E2,2 + E2,3 + λE3,3 ,
E1,3 + E2,3 + E3,2 , E1,1 + E1,3 + E2,3 + E3,2 ,
ξE1,1 + E1,3 + E2,3 + E3,2 + E3,3 : λ ∈ Fq },
2
and x + x + ξ is a fixed irreducible polynomial of Fq [x].
ISOMORPHISM CLASSES OF FOUR DIMENSIONAL NILP. ASSOC. ALGEBRAS
23
Proof. The set ΠS (Fq ) have been determined in [9, Theorem 4], so the result follows
from Theorem 5.12 and Lemma 5.22.
We conclude recalling that Theorem 1.1 follows immediately from Theorems 4.2
and 5.12, applying Proposition 2.4.
References
[1] A. Caranti, F. Dalla Volta and M. Sala, Abelian regular subgroups of the affine group and
radical rings, Publ. Math. Debrecen 69 (2006) 297–308.
[2] W. De Graaf, Classification of nilpotent associative algebras of small dimension,
arXiv:1009.5339, 27 Sep 2010.
[3] R.A. Horn and V.V. Sergeichuk, Canonical matrices of bilinear and sesquilinear forms, Linear
Algebra Appl. 428 (2008), 193–223.
[4] M.A. Pellegrini, Regular subgroups, nilpotent algebras and projectively congruent matrices,
to appear in Int. J. Group Theory.
[5] M.A. Pellegrini and M.C. Tamburini Bellani, More on regular subgroups of the affine group,
Linear Algebra Appl. 505 (2016), 126–151.
[6] M.A. Pellegrini and M.C. Tamburini Bellani, Regular subgroups of the affine group with no
translations, to appear in J. Algebra, http://dx.doi.org/10.1016/j.jalgebra.2017.01.045.
[7] B. Poonen, Isomorphism types of commutative algebras of finite rank over an algebraically
closed field, in: Computational arithmetic geometry, 111–120, Contemp. Math., 463, Amer.
Math. Soc., Providence, RI, 2008.
[8] M.C. Tamburini Bellani, Some remarks on regular subgroups of the affine group, Int. J.
Group Theory 1 (2012) 17–23.
[9] G.D. Williams, Projective congruence in M3 (Fq ), Results Math. 41 (2002), 396–402.
Dipartimento di Matematica e Fisica, Università Cattolica del Sacro Cuore, Via
Musei 41, I-25121 Brescia, Italy
E-mail address: [email protected]
| 4math.GR
|
E cient textualrepresentation of structure
Brenton Chapin
arXiv:1706.00862v1 [cs.PL] 2 Jun 2017
ABSTRACT
This paper attempts a more formal approach to the legibility of text
based programming languages, presenting, with proof, minimum
possible ways of representing structure in text interleaved with
information. This presumes that a minimalist approach is best for
purposes of human readability, data storage and transmission, and
machine evaluation.
Several proposals are given for improving the expression of interleaved hierarchical structure. For instance, a single colon can
replace a pair of brackets, and bracket types do not need to be repeated in both opening and closing symbols or words. Historic and
customary uses of punctuation symbols guided the chosen form
and nature of the improvements.
KEYWORDS
programming language design, structured programming, human
readability, syntax, notation, history, data compression, minification
ACM Reference format:
Brenton Chapin. 2016. Efficient textual representation of structure. In
Proceedings of ACM Conference, Washington, DC, USA, July 2017 (Conference’17), 11 pages.
DOI: 10.1145/nnnnnnn.nnnnnnn
1
INTRODUCTION
Information is almost always more useful when organized, and
structure is key to that. Therefore efficient and clear representation of structure is of paramount importance. Structured programming languages are only one use of structure to organize one kind
of information, source code, but they make such unprecedentedly
elaborate use of structure that they have exposed deficiencies in
our methods of expression.
The languages for programming and math developed in an evolutionary manner, with much borrowing from earlier work, and
the reasons for various decisions became buried in custom and
history. Studies on choices of characters and legibility have been
patchy, with some questions overlooked because they were thought
relatively unimportant. Pioneers of programming languages hurriedly made expedient adaptations of existing notations for similar
problems. Most heavily borrowed was mathematical notation.
With many important questions needing settling with the creation of the first programming languages, issues of symbology were
mostly passed over as unimportant and arbitrary. As Bob Bemer
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
Conference’17, Washington, DC, USA
© 2016 ACM. 978-x-xxxx-xxxx-x/YY/MM. . . $15.00
DOI: 10.1145/nnnnnnn.nnnnnnn
noted, “much documentation is lost, and it was characteristic of
the times that nobody seemed to think character sets a very important feature of computers [12].” There are many studies on the
readability and other properties of various fonts and color combinations, but when discussed in relation to source code, the term
“readability” refers more to comprehensibility [21].
Punctuation is the class of symbol most closely associated with
showy, interleaved structure. Positioning is the other major method
used to indicate structure, and among the other intended purposes,
“control characters” attempted to provide ways to position text.
Currently, Python is the most popular programming language that
relies on text positioning rather than punctuation to indicate structure. Visual programming goes further yet, replacing textual indicators of structure and flow with graphical ones.
The programming language wars are still hot today, with new
languages emerging and gaining followers. One cause of the passionate debates is the tendency of language designers to resort to
an evangelical approach to justify their choices of design elements
for which they have little compelling technical reason. Sometimes
the designers make overlarge and unsubstantiated claims [19]. For
many programming languages, one of the defining features is the
choice and usage of symbols. These choices are not modifiable by
the programmers, so that if such changes are desired, a whole new
programming language may need to be created, another factor in
the very proliferation of programming languages that the ALGOL
designers were hoping to avoid.
The ideas in this paper aim at the foundation, the symbolic representation of the structure. Structure is chosen as the crucial concept that must be addressed to improve representation. Minimalism is the chosen guide.
Too much minimalism is certainly possible, for instance by expecting people to work with information that has been minimized
by data compression techniques which transform the data into a
very compact but human unreadable form. The minification techniques of removing unnecessary whitespace and shortening variable names is another example. The target of these minimization
efforts is the representation of the structure of the source code, not
the source code itself. Further, this is not about rewriting and rearranging to place information in more efficient structures, this is
about making the representation more efficient regardless of the
structure chosen. Punctuation has always been minimal, using
smaller and less obtrusive symbols than those used to represent
the letters of a language, and the syntax of structural elements follows that pattern.
Some more items to note are splits between textual representations used for source code, versus those used for markup, as in
HTML, and data organization, as in XML and YAML. Within programming languages, there is the dot (or arrow) notation of Object
Oriented Programming and the completely different notations for
Structured Programming, such as the curly braces. Yet those splits
Conference’17, July 2017, Washington, DC, USA
seem artificial, as hierarchical structure is used in all. Many programming languages are needlessly poor at expressing data. Several of the improvements in C++11 and C++14 touch on this issue, allowing more flexible constructions of constants and initializations of arrays and objects. One intent of JSON is to bridge this
divide.
Also, these are all interleaved formats, meaning the symbols
that denote the structure are interleaved with the symbols of the
data. Goals in data storage are minimal size, and fast access. An
obvious and common method to achieve both is to exclude all complex structure from the data, using an external representation. The
disadvantage is that they require some connection, often expressed
in fixed sizes and padding, which can end up using more space
than an interleaved method. Over the years, the attention paid to
brevity has varied with the cost and availability of storage.
By 1963, the American Standard Code for Information Interchange (ASCII) was set to a fixed size of 7 bits, though at least
two variable codes, Morse code (1844) and Huffman coding (1952)
existed at the time.
One of the goals of XML was human readability. Minimalism
was thought orthogonal or possibly even antithetical to the goal
of human readability, and the resulting language ironically suffers
from excessive verbosity that obscures essentials, rendering the result less human readable. XML and COBOL show that a negative
attitude towards minimalism (”10. Terseness in XML markup is
of minimal importance. [14]”), that regarding minimalism as unrelated or even an impediment to comprehension, is not correct.
Minimalism is also central to Information Theory, in which it was
demonstrated that the crude redundancy of repeating information
over and over, is very wasteful and poor at preserving the fidelity
of data against errors in the transmission. If repetition is a poor
means of ensuring the fidelity of data, perhaps it is also a poor
means of representing structure in ways easy for humans to read.
Another demonstration of the limited usefulness of repetition is
the FAT file system, which despite allocating room for a copy of
the directories and file names, is actually one of the most fragile
and easily corrupted file systems currently in use.
Of particular note is the C programming language. So many
programming languages adopted the C syntax that they have been
tagged with a moniker of their own, the “curly-brace” languages.
Perhaps one of the reasons curly brace syntax eclipsed Pascal and
ALGOL is the use of a single character each, rather than the words
BEGIN and END, to delimit blocks. The designers of C did not restrict themselves to curly braces only, they also used square brackets, parentheses, and even angle brackets, for array indexing, lists
of function parameters, and macros respectively. Why that choice
of symbol assignment? Why not use parentheses for all, and rely
on context or some other means to distinguish between a parameter list and a block of code? If there is any doubt that it is possible
to use only parentheses, the LISP programming language is proof.
Or, why not copy FORTRAN in the use of parentheses for array
indices? One kind of answer is that in C these different kinds of
brackets serve as sigils, to distinguish between identifiers for functions, arrays, and variables. But that only begs the question of why
have sigils? And it still does not answer why any particular symbol
was chosen for a particular use.
Brenton Chapin
2 HISTORY
For answers, one must dig into the history of computation and
mathematics. In the case of C, the chain of preceding languages is
roughly B, BCPL (Basic CPL), CPL (Combined Programming Language), and finally ALGOL (Algorithmic Language). The paper on
ALGOL 58 [6] says of the choice to use square brackets to delimit
array indices, only that “subscripted variables” (the term used in
ALGOL for what today we call an array variable, or simply an array), “designate quantities which are components of multidimensional arrays” and that “The complete list of subscripts is enclosed
in the subscript brackets [].” But why did they pick square brackets? FORTRAN, the oldest programming language to achieve wide
acceptance, uses parentheses, not square brackets.
For that matter, why use any bracket at all? No one says. It
seems likely that they would rather have used actual subscripted
text, just like in mathematical notation, but early computers could
not do it. Square brackets was a notational device to indicate subscription without actually presenting the text so. Apart from computer limitations, a big problem with subscripting is that the notation doesn’t nest well, at 3 or more levels becoming too small for
the human eye to read. One can surmise from the use of the term
“subscript” that this was another borrowing, from linear algebra in
which a matrix is denoted with square brackets. And indeed the
original name of ALGOL 58, is International Algebraic Language.
The only deviation in the use of square brackets for array indexes
from ALGOL to C was BCPL, which among the many simplifications of CPL it introduced, attempted to repurpose square brackets
for code blocks, using only pointer arithmetic to access array elements [8].
ASCII codified the glyphs used for nearly all programming languages. A notable exception is APL, which makes use of mathematical symbols, mainly from Set Theory and Vector calculus, that
were not put in ASCII [7]. Unlike EBCDIC, ASCII at least organized the alphabet into a contiguous block. But the exact set of
punctuation symbols is unclear, ranging from all symbols that are
not letters, numbers, and control characters, to only those used to
clarify the structure and meaning of sentences and text. There are
no formal, ordered, centuries old lists of punctuation symbols.
The ASCII ordering and choice of punctuation is derived from
the QWERTY keyboard layout, which dates to the late 19th century. The notion that QWERTY was deliberately arranged to slow
typists down is a popular but wrong myth [23]. Morse Code and
many other factors were considered, and over the years small changes
have been made to accommodate new uses. For instance, “shift-2”
is the double quote mark on many older keyboards, but today is
‘@’ on most keyboards.
We could go further back, and ask why mathematical notation
uses parentheses for functions, and square brackets for matrices.
Why is y = fx the customary, canonical expression for a function,
and why in particular the use of parentheses to bracket the independent variable x? In A History of Mathematical Notations [3],
Cajori credits Euler (1707-1783) with the first use of parentheses
to bracket the variable of a function, in a 1734 paper. That paper is
E44 [1] in the numbering scheme created to refer to Euler’s works.
However, examining E44 and several others of Euler’s papers, one
finds no such use of parentheses, and the exact phrase and formula
Efficient textual representation of structure
Cajori quoted is not present. Euler uses parentheses to group parts
of equations, but not to separate function names and variables. Euler’s notation is y = fx, and it is up to the reader to understand
that x and y are variables, and f is a function.
Note also the choice of the letter f because it is the first letter of
the word “function”, a custom followed in many places, such as the
decision in FORTRAN to use the first letter of a variable name to
indicate integer (name begins with “I” for integer, through “Z”) or
floating point (name begins with “A” through “H”). This desire to
match functionality to the first letter of an appropriate term was
taken to extremes, so that more than one early game employed
a lucky placement of keys on the QWERTY keyboard,’W’, ’E’, ’S’,
plus ’3’, to refer to west, east, south, and north respectively.
By 1837, in a major work on Number Theory which is regarded
as also an important paper on the modern definition of a function, Dirichlet (1805-1859) used parentheses around the independent variable [2]. But why did mathematicians pick those symbols,
that format? They too engaged in expedience, adopting the idea of
parentheses from still earlier scholars. Mathematical notation has
a long evolutionary history, and while fascinating, the main point
here is that many choices of symbols and syntax were made long
before any possible use in programming languages was conceived.
While 1837 is also the year that Babbage proposed the Analytical
Engine, arguably the first computer, functioning computation machinery would not be built until many years later. Therefore symbols and syntax certainly could not have been chosen based on
experiences in computer programming.
That was about as far as the early pioneers went in exploring
questions of how best to symbolize code and data. None of the
terms and areas of study, not semiotics, symbology, linguistics,
grammar, lexicology, punctuation, readability, typography, legibility, notation, expressiveness, or rubrication, quite address these
questions. Studies of notation and syntax get the closest, but even
there syntax is confined to issues of context.
Most programming languages use a hierarchical structure to organize code. Possibly the earliest and simplest formally specified
language for expressing hierarchy is Dyck Language. Object Oriented Programming and Functional Programming did not abandon
this fundamental organization, they only added to it. Declarative
programming, as represented in Prolog and SQL, at first glance
seems not to need much structure. A point of confusion is order vs
structure vs hierarchy. Declarative programming needs structure,
but not order and not necessarily hierarchy. Hierarchic structure,
of programs and data, can be more efficiently represented with several changes.
The advent of markup languages revived interest in hierarchical data storage, which was introduced in the 1960s, before the
relational database model. No longer were interleaving structural
symbols just for programs, they were harnessed to organize data.
Traditionally, data has been organized into fixed size elements so
that no symbols need be reserved for explicit denotation of structure, and, even more importantly, so that random access is quick,
taking O 1 time to retrieve any one element. This is also true of the
pre-computer era, which used tables extensively, carefully lining
up columns to aid the human eye. Where one-size-fits-all is inadequate, the expedient method used is to have a small fixed size field
Conference’17, July 2017, Washington, DC, USA
to hold a value for the size of a variable length field. Packet networking is an example of this organization of data. The roughly
analogous method in writing is the technique of employing any
of a variety of superscripted symbols such as an asterisk, *, or a
dagger, y, to indicate there is a footnote.
XML and HTML are the most well known of these markup languages, and like programming languages, their history is also evolutionary. Both trace back to Standard Generalized Markup Language (SGML) which was standardized in 1986, predating the World
Wide Web. Like so many other decisions in languages, the creators
of the Web seized upon SGML out of expediency. SGML in turn
descends from GML, an IBM effort to manage technical documentation and data, based upon ideas first articulated circa 1966 [16].
But as many have complained over the years, these markup
languages have undesirable features, and among the biggest is extreme verbosity. The rules they force upon users, to come closer to
the goal of “human readability”, often have the opposite effect. On
the scales of minimalism, XML and relatives are extremely poor because their representations are highly redundant. Not only must
brackets be balanced in “proper” HTML and XML, but the matching tags must repeat the tag name. Why did the designers do it?
Ironically, those rules have done much to add clutter and thereby
reduce the human readability that was their intended goal. YAML
(YAML Ain’t Markup Language) was motivated in part by recognition that XML is burdened with design constraints that have little
purpose in data serialization [17]. Lightweight markup languages
such as Markdown are an acknowledgment that the human readability of HTML could be better.
Most popular programming languages are poor at expressing
data. Here are some examples to illustrate this. A list of the first 10
chemical elements can be encoded in a JavaScript array like this:
c o n s t CE = [ ” ? ” , ”H” , ” He ” , ” L i ” , ” Be ” , ” B ” ,
”C ” , ” N ” , ” O ” , ” F ” , ” Ne ” ] ;
A simple trick yields a much cleaner representation:
c o n s t CE = ” ? H He L i Be B C N O F Ne ”
. split (” ”);
But this is the very sort of trick that makes programming needlessly difficult for professional programmers unfamiliar with the
arcana of a particular language.
One problem is that the default, unquoted meaning of an alphanumeric sequence is to treat it as the name of a variable. The
double quote mark changes the mode, but that mode has no support for structural elements, so only a simple string can be encoded.
The programmer is forced to change modes over and over, entering
string mode to give a short string, leaving string mode to impart a
tiny amount of structure, then entering string mode again to give
the next string. Or the programmer can use a clever trick such as
the split function, or create a function to parse a string into a
complicated object, or even employ a library such as YAML.
Another example, of a family tree, in Python:
c l a s s t n : # t n means ” t r e e node ”
def
init
( s e l f , name , c h i l d =None ) :
i f c h i l d ==None : s e l f . c = [ ]
else : self . c = child
Conference’17, July 2017, Washington, DC, USA
s e l f . n = name
familytree =
[ tn ( ” grandmother ” ,
[ tn ( ” older uncle ” ,
[ tn ( ” o l d e st 1 st cousin ” ) ,
t n ( ” 2 nd o l d e s t 1 s t c o u s i n ” ) ] ) ,
tn ( ” fat her ” ,
[ tn ( ” older s i s t e r ” ,
[ tn ( ” niece ” ) ,
t n ( ” nephew ” ) ] ) ,
t n ( ” you ” ,
[ t n ( ” son ” ,
[ tn ( ” granddaughter ” ) ] ) ,
tn ( ” daughter ” ,
[ tn ( ” grandson ” ) ] ) ] ) ,
t n ( ” younger b r o t h e r ” ) ] ) ,
...
This terrible encoding is littered with alternating brackets of 2
kinds, as well as double quote marks and commas. This shows
that Python can be even worse than LISP, for those who thought
Python’s use of indentation lead to clean code in all cases, and that
LISP had too many parentheses. To get clean looking code, the expert programmer resorts to using functions to read a simple string
(which may be a data file) into a complicated object. Employing a
data serialization library such as YAML, is a common method of
handling this issue. Should it be the preferred method? Shouldn’t
programming languages be able to do better with their native syntax? After all, native handling of regular expressions is what made
Perl popular. Improvements in the representation of structure are
applicable both to coding and to data representation.
3
ELIMINATING RUNS OF BRACKETS
The first change addresses a problem most languages have, but
which is perhaps most obvious in LISP, and for which it has been
criticized in the “backronym” of Lots of Idiotic Spurious Parentheses. Often, brackets cluster, as several structures all start or end
simultaneously. They can add to the visual clutter without adding
to the ease of comprehension.
There are many solutions to this problem, among them operator
precedence, and postfix notation, also known as Reverse Polish notation, first conceived in 1924[4]. A limitation of these Polish notations is that to make brackets unnecessary, the number of operands
must be fixed, an inflexibility that is insufficiently general for the
structures used in programming.
A popular short cut is use of context and knowledge about the
permitted or sensible content of subtrees. For instance, in HTML
the paragraph indicator, <p>, cannot be nested. This is often used
to omit the matching closing bracket, </p>, when the next structure is another paragraph, or something else that cannot be inside
a paragraph, such as a header. Such omissions are not officially
sanctioned in HTML, but are so popular that web browsers had to
support them anyway. Obvious problems with this approach are
that knowledge of every exception to the rules for indicating the
nesting may be very large, and may change.
Brenton Chapin
The approach taken in Perl 6 is to allow all kinds of shortcuts
that do not greatly complicate the parser. Compared to Perl 5,
some brackets are no longer required. In particular, the parentheses of the if and for statements are optional [18]. Effectively, this
change is a recognition that if and for are enough by themselves
to indicate structure, that they are in fact now part of the set of
symbols used to denote structure.
One could employ 2 sets of brackets, perhaps () and [], in a
scheme in which a closing bracket closes its matching opening
bracket, and all the open brackets of the other kind in between.
For example, [a [b]] becomes [a (b], [d [e [f]]] becomes
(d [e [f). This idea can work in the other direction. [[g] h]
becomes [g) h]. It even works in both directions at once, with
((j)(k)) becoming [j)(k]. However, the best this idea can do
for ((m)) is [(m].
An issue is that 2 more symbols are needed. We can employ
only one more symbol, eliminating only one of the excess opening or closing brackets, and still clean up most of clutter. Call a 3
symbol system that eliminates excess closing brackets a “closing 3”,
and a 3 symbol system that eliminates excess opening brackets an
“opening 3”. Using colon, :, for this 3rd symbol in a closing 3 system, because that approximately matches the traditional use of the
colon in written natural languages, changes (a (b)) into (a : b).
((m)) becomes (:m), (((n))) becomes (::n), and ((j)(k)) becomes ((j):k). Additionally, the brackets are still balanced, with
equal numbers of opening and closing brackets in all the systems.
For a slightly larger example, consider this Ackermann function,
from the classic textbook Structure and Interpretation of Computer
Programs, exercise 1.8 [10]:
( d e f i n e (A x y )
( cond ( ( = y 0 )
((= x 0)
((= y 1)
( e l s e (A
0)
(∗ 2 y ))
2)
(
x 1)
(A x (
y 1))))))
Employing a closing 3 system as suggested above, gives this:
( d e f i n e (A x y )
: cond ( ( = y 0 )
((= x 0)
((= y 1)
: else :A
0)
:∗ 2 y)
2)
(
x 1)
:A x :
y 1)
6 colons have replaced 6 opening brackets. The 6 matching closing brackets have been removed. Indeed, there is never a need for
multiple adjacent closing brackets, as proven next.
Theorem 3.1. Given a sequence S of arbitrary symbols over an
alphabet A in which 2 symbols, an “opening” and a “closing” symbol,
are reserved to denote hierarchy in a format that interleaves data
and structure, and S is properly balanced, the hierarchy can always
be represented in a system with 3 reserved symbols in which there are
no runs (sequences of length 2 or greater) of the closing symbol.
Proof. WLOG, let ‘(’ and ‘)’, the parentheses, represent the
opening and closing symbols in both systems, and let ‘:’, the colon,
Efficient textual representation of structure
represent the 3rd symbol in the 3 symbol system. To allow elimination of all runs of 2 or more closing symbols, assign ‘:’ the same
meaning as ‘(’, the opening of a subtree, except that the matching
closing symbol for ‘:’ is an already necessary ‘)’ that matches an
existing ‘’ which precedes the ’:’.
Then, instances of the sequence “( s1 ( s2 ))” in which s1
and s2 are arbitrary sequences which may include balanced occurrences of ‘(’ and ‘)’ and ‘:’, may be replaced with “( s1 : s2
)”.
The replacement symbols are sufficient to represent all the relationships. The symbols still indicate that s1 is the parent of s2 ,
preserve all relationships s1 and s2 have with all other sequences
before and after because none of them need change and no additional context is needed, and preserve all relationships contained
within and between s1 and s2 also because none of them change,
nor add any contextual dependencies.
This replacement can be applied repeatedly, to reduce any number of adjacent closing brackets to 1 closing bracket. Each replacement preserves the property of balance for all remaining parentheses, as exactly one pair of matched parentheses is replaced with a
single colon.
The corollary that no runs of the opening bracket are needed in
an opening 3 system, is obvious.
A pushdown automaton can easily transform from an opening
3 to a 2, or from a 2 to a closing 3, if the data is processed in reverse order. Of course, a pushdown automaton can easily reverse
a string. In practice, the C++ style of comment delimited by a 2
slashes takes more work to detect from back to front. Nor can the
start of a C style comment be simply determined working from
back to front, because “/*” can be within a comment.
A natural question is why not use a 4 symbol system, as originally outlined above with the 2 sets of bracket symbols, and eliminate all runs of opening and closing brackets? Simply put, the
additional savings is not significant, as can be seen in that it is no
help at all on the examples of ((m)) and (((n))).
As to why, it is not possible to employ any finite set of symbols to represent infinitely many numbers with just 1 symbol each,
no matter what form the representation takes. If the representation takes the form of n opening brackets followed by n closing
brackets, all of one kind of bracket can be collapsed, because n is
preserved in the other. If both are collapsed, then n must be represented some other way. That is why the idea of using 2 sets of
brackets does not work to reduce all runs of opening and of closing
brackets to 1.
Thus we see that the idea of replacing each run of closing brackets with a single closing bracket is really the removal of a redundancy, the redundancy of specifying the depth twice, first with
opening brackets, then with an equal number of closing brackets.
That redundancy is no longer available to remove once one kind
of bracket has been reduced.
The 3 symbol system need not be exclusive, can mix with 2 symbol usage as in (a (b : c)). In practice, in coding it will likely be
preferable to use the 3rd symbol only for subtrees that are known
in advance to be the terminal child. For other uses, such as minification of JavaScript or JSON, may want to use the 3rd symbol
everywhere possible.
Conference’17, July 2017, Washington, DC, USA
Removing the redundancies of the 2 symbol system can be of
some value in data compression. Since the amount of information
encoded is the same, an ideal data compression algorithm should
produce the same size compressed output whether a 2 or a 3 symbol system is used. In practice, the output sizes vary, sometimes
better for the 3 symbol system, and sometimes worse. To better test
whether the more efficient representation helps with data compression, can try a much larger example. Biologists have organized millions of species into a Tree of Life [28], using Newick format [11],
an interleaved hierarchical format. Tests upon grafted solution.tre
from version 9.1, the file with the highest percentage of interleaved
structural symbols relative to data, containing 100,734 parentheses in 721,324 characters total, show an “opening 3” system does
reduce size even after compression.
compression
none
gzip
bzip2
xz
system
original 2 symbol
721,324
250,142
218,717
211,812
opening 3
690,077
241,169
213,341
203,724
A final note about whether to prefer an opening 3 or a closing
3 system. The closing 3 is the better fit with our customs. For instance, in curly brace languages, the name of an array is given before the index of the desired element. It is arr[39] not [39]arr. It
is the same with function names and parameters– the name comes
first.
4 UNIVERSAL BRACKET
A sequence such as “[x(y]z)” in which 2 different sets of brackets are interwoven, is almost always an error, not valid in any
mainstream language. An analogous sequence in HTML could be
“<b>x<i>y</b>z</i>”, which is not valid, even though its meaning can in this case make sense. The HTML specification calls this
“misnesting”. This invalidity is used in an ad hoc fashion to reduce some of HTML’s redundancy. A common case is the closing of an outer structure that implies an inner structure must also
close, as in this example: “<tr>x<td>y</tr>”. Some omissions require knowledge that some structure is not allowed. For instance,
“<p><p></p></p>” is not valid because the ‘p’ element (p for paragraph) can’t be the direct child of another ‘p’ element. Therefore
“<p>x<p>” always implies a closing tag preceding the 2nd opening
tag: “<p>x</p><p>”. This usage is acknowledged in HTML5, but
still recommended against: “..the closing tag is considered optional.
Never rely on this. It might produce unexpected results and/or errors if you forget the end tag.” [25]
A combination opening and closing tag in one, called a “selfclosing” tag, is meant for an empty element, and has been in XML
from the start [14]. As of version 5, HTML has adopted a variation
of this idea. The XML self-closing tag requires a slash character immediately before the closing angle bracket. In HTML5, 15 element
types were singled out as making sense only as empty (void), and
HTML does not use or permit the penultimate slash character in
those tags.
Another solution to some of HTML’s verbosity is to omit the
name from the end tags, using only “</>”, which works fine since
misnesting is not allowed or often sensible anyway. SGML has
Conference’17, July 2017, Washington, DC, USA
this feature in its SHORTTAG constructs, calling it the empty end
tag. But HTML does not allow it. This idea of a universal closing
bracket or, alternatively, a universal opening bracket, can be employed in any language containing 2 or more sets of bracket symbols and in which interweaving is invalid. It eliminates misnesting,
as interweaving is no longer possible. And it reduces the alphabet
size.
If we choose the square bracket for the universal closing symbol, then a sequence such as “(x[y]z)” could become “(x[y]z]”,
and the closing parenthesis symbol would be unused, and could
be repurposed. (Note that this change does not reduce the number
of closing brackets, there are still 2 in the example. It reduces the
required size of the alphabet.)
There can still be a need for other closing characters, such as
an “unindent” invisible control character. The universal closing
bracket could still be used for that, but would want it to be invisible
in that case.
Converting back and forth between a representation that uses
closing brackets that match the opening brackets, and a representation that uses only a universal closing bracket is easily done with
a pushdown automaton. The type of the node is preserved in the
choice of opening bracket, and having the type repeated with a
matching closing bracket is merely redundant.
Having established that a universal bracket symbol is workable,
several more questions naturally arise. Does it make code easier
to understand, more human readable? Many have expressed the
sentiment that requiring a closing tag to repeat the type given in
the opening tag helps prevent human mistakes, and is therefore
good. The issue is confused by the practice of entirely omitting
tags in specific situation. With a means of representing structure
that is not so tiresomely redundant, these ugly short cuts can be
made unnecessary.
5
TYPES FOR NODES
Often the representational capability of a hierarchical structure is
enhanced by adding some means of representing different kinds of
children. An example is the “red–black tree” in which tree nodes
have been assigned an additional property, a color. This can be
and is often done independently of the structure, by means of an
additional data item. Another very popular method is sigils in the
form of different kinds of brackets. ASCII has 3 sets of symbols
meant solely for brackets: the parenthesis, square bracket, and
curly braces. One more set, the angle brackets, doubles as the mathematical symbols “greater than” and “less than”, and for that reason
was used gingerly. Further sets can be contrived, for instance ‘n’
and ‘/’, and for that matter of course any two arbitrary characters
could be chosen to serve as brackets. The obvious complaint is that
4 sets is far too few. Even if a dozen plus from Unicode are added,
it still isn’t enough.
In any case, programming language designers used all the ASCII
symbols meant for brackets early on. The curly brace languages
employ curly braces to denote blocks of code, square brackets to
denote array indices, and parentheses for parameter lists. The dual
purpose symbols for angle brackets did not go unused as brackets,
being employed in the C preprocessor, and later in the markup
languages SGML, XML, and HTML.
Brenton Chapin
These SGML markup languages expanded the number of bracket
types infinitely, by allowing multiple character brackets. Although
that solves the problems caused by finite quantities of different
bracket symbols, the means and requirements chosen add greatly
to the verbosity, a common criticism often expressed in abuse of
the rules rather than in words. It is possible that the desire for a
visual match between the opening and closing bracket led to the
SGML requirement that both the opening and closing brackets contain copies of the string employed to give them a type, despite the
obvious redundancy.
An efficient way is to designate one of the bracket sets as ”typed”,
the start of a multicharacter bracket. That allows the other brackets
to remain bare to be used same as traditionally used in programming languages, and still allows infinite bracket types. Which symbol is best employed, and where should it be positioned? Between
bracket and name, or after the name? Or, should it be a combined
symbol, a bracket that indicates a name is to follow, since there
is more than one kind of bracket available? Possibly the most efficient use of existing symbols is to keep parentheses as is, bare,
and designate the square bracket or curly brace as the indicator
for a child structure with a type, with the name to follow, similar
to HTML.
Another method is to reserve a symbol to indicate a type name
only, no structure. ‘$’ is often used similarly.
Whichever method is chosen to indicate the start of a type name,
how is the name to be ended? The name could be just like variable
names in programming languages, with only letters and numbers
(and the underscore character) allowed in the name so that any
other symbol, such as the space character, automatically ends the
name. The method of using a special symbol, as done with the
closing angle bracket of HTML, is also workable.
But the designers of HTML did not let tag names be only names.
They crammed additional structured information into “attributes”.
An example is “<ul class="vs1" id="item1"> content </ul>”.
This information could have been in the same system, for instance
something like “<ul> <attr> class = "vs1" id = "item1"
</attr> content </ul>”, or even “<ul> <attr> <nm>class </nm>
<val> vs1 </val> <nm> id </nm> <val> item1 </val> </attr>
content </ul>”. The only purposes this alternate subsystem really
serves is visual distinction and less verbosity, though it’s claimed
to maintain the distinction between data and metadata. HTML has
evolved towards lighter use of attributes, moving much formatting
information from the tags to CSS, where it is also less redundant.
6 REPRESENTING SIBLINGS AND COUSINS
The list is well known and has a long history. Each item in a list
can be considered a sibling of each other item. Traditionally, each
item is on its own line, or is separated by a comma. LISP means
“LISt Processor”, and is built around the idea of making lists the
fundamental building block with which to organize both data and
code. Comma Separated Values (CSV) notation [20] is a simple
data format based on one list with items separated by, of course,
commas. One of the most notorious departures from the use of
commas is multidimensional arrays in C, in which the syntax to
access an element at index x;y is not x;y, it is xy.
Efficient textual representation of structure
The idea of separating items in a list with a single symbol (or
word) seems simple, but turns out to have several surprisingly
tricky issues.
Consider how to represent a list in a language that does not have
any symbol analogous to the comma, Dyck Language interleaved
with data. How is the sibling relationship expressed? (First, note
the convention is to place the parent before the child, as in p(c),
although the opposite, (c)p is just as expressive.) One way is to
wrap brackets around each individual data item. Then the number
of brackets needed to represent a relationship must be increased
by 1 for all depths, so that (a)(b) means a and b are siblings, and
((c))((d)) means c and d are 1st cousins. A 2x2 array would be
((p)(q))((r)(s)). Although it works, it is far more verbose. Additionally it spoils the abbreviation of allowing siblings to be separated by a child, as in a(e)b, which must instead be (a(e))(b).
So, a better way is to always separate siblings with a child, using
a null child if the older sibling has no children, as in a()b. Then a
2x2 array can be represented with (p()q)(r()s).
Expanding to cousins is still a problem. With the addition of the
comma as a sibling separator, (p()q)(r()s) becomes (p,q)(r,s).
The sequence still has a “)(”, which the comma does not help reduce. An obvious extension is to introduce another symbol, say
semicolon, to separate 1st cousins. Then the sequence can become
(p,q;r,s).
What to do for 2nd cousins? Just add brackets to the semicolon, as in );(? Or employ yet another symbol to replace ))((?
How many symbols should be so employed? The ASCII committee
settled on 4, ASCII characters 28 through 31, though 8 were proposed [12]. They were called Information Separators [9]. We can
do better than that.
There are several issues with having 2 or more Information Separators that merit careful consideration.
First, consider the sequence p(q,r;s). q and r are siblings to
each other, and descendants of p, and s is 1st cousin to q and r.
There are several different more precise meanings this could have.
The semicolon can be given higher precedence than the brackets,
that is, all three of q, r, and s are children of p. In that case, this
particular sequence is invalid, because r and s cannot be children
of p and 1st cousins to each other. All children of the same parent
must be siblings.
Another interpretation is to allow a single opening bracket to
separate a variable number of generations instead of always one
generation. Then, since grandchildren of p can be 1st cousins to
one another, all 3 of q, r, and s must be grandchildren of p. But
this idea has the big disadvantage of adding context dependency
to the grammar. Whether q is a child or a grandchild of p cannot
be known until all the characters between the opening and closing
brackets are scanned. If a semicolon is found on the same level as
q, then q is a grandchild of p. If there are even deeper separators,
q is a great grandchild or even more distant descendant of p. If
none are found, then q is a child of p.
Best is to consider the semicolon as a combined open and close
bracket, )(, having the same precedence as any other bracket. In
that case, sis not a descendant of p, sis a nephew of p. That meaning does not add context. This does have more invalid strings, for
instance the simple sequence r;s is invalid because the brackets
are not balanced.
Conference’17, July 2017, Washington, DC, USA
Second, consider how to combine separators with colons. The
colon is a bracket, and should have the same precedence. Then a
sequence such as (p:q;r) means that p is parent to q, and not
parent or sibling to r. p is uncle to r, q is 1st cousin to r, and
r’s parent is null. Perhaps the easiest way to see this is to reverse
the colon transform to get (p(q;r)), then reverse the separator
transform to get (p(q)(r)). If p and rare supposed to be siblings,
and q a child of p, the correct way to represent that is not to use
semicolon or colon, it is p(q)r.
The 2 transforms, colon and separator, are mostly complementary, but in some cases can compete to reduce the same redundancies. The following table shows the results of transforming each of
the 14 Dyck words of length 8 (replacing ][ with a comma rather
than a semicolon, for greater visual clarity.)
Dyck word colon
separator both
1 [[[[]]]]
[:::]
[[[[]]]]
[:::]
2 [][[[]]]
[][::]
[,[[]]]
[,::]
3 [[][[]]]
[[]::]
[[,[]]]
[:,:]
4 [[]][[]]
[:][:]
[[],[]]
[[],:]
5 [[[][]]]
[:[]:]
[[[,]]]
[::,]
6 [[[]][]]
[[:]:]
[[[],]]
[:[],]
7 [[[]]][]
[::][]
[[[]],]
[[:],]
8 [][[][]]
[][[]:]
[,[,]]
[,:,]
9 [][[]][]
[][:][]
[,[],]
[,[],]
10 [[][][]]
[[][]:]
[[,,]]
[:,,]
11 [[][]][]
[[]:][]
[[,],]
[[,],]
12 [[]][][]
[:][][]
[[],,]
[[],,]
13 [][][[]]
[][][:]
[,,[]]
[,,:]
14 [][][][]
[][][][] [,,,]
[,,,]
The last column shows the result of applying the semicolon transform, followed by the colon transform. Applied second, the transform to colon can be blind to the presence of any separators, and
be correct and achieve maximum reduction. A separator acts as a
bridge, so that a colon can start a list, a natural looking use, rather
than opening the last item of a list.
If the separator transform is second, then to achieve maximum
reduction, as well as a correct transformation, it has to be done
with awareness of colons. A colon may be opening the last item
in a list, and it can be moved to the head. [[]:] can become [:,]
by replacing ]:, which is an open close pair of brackets, with a
separator, and then, replacing the opening bracket of the previous
item in the list with a colon. This can be repeated until the colon
has migrated to the front of the list. If the separator transform is
done blindly on a sequence with colons, it can be incorrect. [[]][]
is [:][] but then replacing the ][ with a separator gives [:,],
which is not correct. Correct is [[],]. Undoing [:,] shows that
sequence is actually [[][]], a list of 2 items.
Applying both transforms to the Ackermann function given earlier replaces a total of 11 bracket pairs with either a single separator
(the comma was used in this example) or a single colon:
( define :A x
cond : ( = y
(= x
(= y
else
y,
0)
0,
1)
:A
0,
∗ 2 y) ,
2,
:
x 1,
A x :
y 1)
Conference’17, July 2017, Washington, DC, USA
Third, what of types? Should the separated items be the same
types? The traditional meaning of a comma is as a separator only,
of untyped data.
Or, should text adjacent to a comma be interpreted as a type
name? A way to resolve that question is to provide another means
to add a type if desired, and let separators remain separators only.
For example, as mentioned in the section on types, the ‘$’ character could be used to indicate an alphanumeric sequence is a type
name. Deeper separators would need a list of types, or restrictions
on elements for which they can specify a new type, and while notations for that can of course be invented, there is little point when
opening brackets can accomplish that with reasonable efficiency
and without any additional rules.
Fourth, there are different potential meanings for runs of a separator symbol. 2 adjacent semicolons could mean that there is an
empty element in the middle, like for(;;i++) in C. Or, it could
mean that the separation between the data elements on either side
is deeper, that is, they are 2nd cousins instead of 1st cousins. What
should 2 semicolons mean, )()( or ))((? The former is the more
widely used meaning. The latter is accomplished by the limited
method of having more Information Separator symbols, which cannot neatly handle great depths. It seems useful to have clear and
concise ways to express either meaning. One way to do this is to
have 2 Information Separators, one for siblings and one for cousins.
The wrinkle is that repetition of these symbols would have the 2
different meanings. n of the sibling separator can mean there are
n 1 siblings who have been omitted from the list, while n of the
cousin separator can mean the cousins are nth cousins, being 1st
cousins only when n = 1. This approach, combined with an efficient way to express quantities, discussed next, can express both
meanings.
However, another way is not to use the system for expressing
quantities, and then assign different meanings to those quantities,
but to use typing. A semicolon could be followed by an integer
to indicate the depth of the divide, eg. “;3” means the adjacent
elements are 3rd cousins. Then a run of n semicolons can mean
that there are n 1 1st cousins in the middle, same as a run of n
commas means n 1 middle siblings. This makes it slightly harder
to support typed separators, but of course it can still be done, That
point is moot if sticking with the traditional meaning of separators
being typeless.
A minor matter is that separators have an inherent off-by-one
issue. A comma separated list usually contains one fewer commas
than data items. Often, specifications allow a meaningless trailing
comma to be present, for the convenience of programmers.
A big reason to support efficient representation of a cousin relationship and even reserve symbols especially for it rather than rely
on brackets is that it is a natural way to map multidimensional arrays to a hierarchical structure. Another reason is that people are
familiar with and like separators.
7
EFFICIENT REPRESENTATION OF
ARBITRARY QUANTITIES
Infinitely many numbers cannot be represented with single symbols from a finite set of symbols.
Brenton Chapin
Though we can’t collapse arbitrary quantities to single symbols,
we can however do better than using n symbols to represent n,
by employing the same principle used in the Arabic numbering
system that replaced unary numbering systems such as the Roman
one and hash marks. All this is well known, as is that a binary
numbering system has the minimum number of symbols needed
to represent quantities of n with log n symbols.
Can we do even better than log n, represent any arbitrary quantity of size n with even fewer symbols? No. For this question, the
Pigeonhole principle applies. As in data compression, to be able
to represent some quantities of amount n with fewer than log n
symbols (from a finite set of symbols), other quantities must be
represented with more than log n symbols. When the amounts are
averaged over all quantities n, the size is log n, or greater.
Numbering systems can be employed to represent structure. Rather
than come up with more and more symbols to represent greater
and greater quantities, as the ASCII committee did with their 4
separator symbols, can employ 2 symbols in a binary code.
Obviously any one symbol which may be repeated can be made
one member of a set of 2 symbols to be used in a binary encoding. But if there are many symbols which may be repeated, finding
enough symbols becomes a problem.
Since quantities are so useful, and unused symbols so precious, a
better idea is to reserve 2 symbols for a binary code for quantities
only, for any other symbol that may be repeated. For example,
instead of using 2 kinds of open bracket symbol in a binary code
as in something like [(([ to represent 9 open brackets, have 1001(
mean 9 open brackets, 1101* mean 13 asterisks, and so on.
Still better is to use an escape character and a decimal representation. The backslash can be used for this, as the only backslash
escape sequence that uses a number is n0, to mean the NULL character, ASCII 0. Then 9 open brackets can be represented with n9(.
One desirable additional symbol to allow is the minus sign, for negative quantities. If only integers are allowed, then there is no need
to overload the meaning of an escaped period for a decimal point
character.
This sort of representation is the well known idea of run-length
encoding (RLE) [5]. RLE is simple and easy, even relatively easy
for a person to understand without computer aid.
Of course there is the minor problem that the numeric symbols
themselves cannot be the object of a RLE escape sequence. There
are several easy ways to resolve that issue. Easiest is to simply not
support repetition of the digit characters, forcing the use of the
traditional method if repetition of a digit is wanted. Perhaps next
easiest is to employ a terminal symbol. To keep the representation
one character shorter, the terminal symbol can be optional, used
only if needed to remove ambiguity.
But RLE is very limited in what it can express. That keeps it
dirt simple and easy to read, but perhaps more expressiveness is
desirable, for such uses as repeating patterns, not only single characters. One simple example of such a sequence is the CR/LF pair.
With a trivial amount of additional syntax, it is possible to efficiently encode repeating patterns. A further use is as a repetition
of an escape. Suppose one has a string consisting of many, perhaps over half, of characters that must be escaped. One traditional
method is to inflate by up to double the quantity of characters by
preceding each special character with an escape character. That
Efficient textual representation of structure
can get difficult for a programmer to read, as seen in Perl’s regular expressions. A quantity that can be applied to indicate how
many characters are to be escaped can supersede the traditional escape character method. This notion is fairly obvious and has been
proposed on a number of occasions, for instance by Rivest in his
draft for S-expressions [15], for what he called “Verbatim representation”, and with Hollerith constants in FORTRAN 66 [13]. Perl’s
regular expressions has a similar mechanism.
While it is trivial to extend run length encoding to handle repeating patterns, there are still many other highly redundant strings
that this extended RLE cannot encode, yet are simple to describe.
The question is how far to go, how much complexity is really useful and can still be easily encoded? And, would it still be human
readable?
Perhaps an efficient way to represent “))(())((” and larger
combinations is also desirable? To encode such things, more is
required. A simple idea is to support the encoding of lists of quantities, a vector, rather than a single quantity. The escape character
can be employed as a separator. Then what is needed is agreement
on the meanings to assign to the multiple quantities. For example,
to encode 5 repetitions of a string of length 4, “abcd”, should it be
“n4n5abcd” or “n5n4abcd” or something else?
But if a vector of quantities is such a good idea, why not a tree
of quantities? Takes only 2 symbols to represent the structure of
a tree. However, the additional complexity is almost certainly too
much to remain human readable, and there’s the question of what
uses could we make of a tree of quantities?
One use for a vector of quantities is for the sizes of the dimensions of a multidimensional array. Such a usage creeps into the domain of external representation of structure. The interleaving can
be reduced to a single character used as a separator, or removed entirely. For instance, a 2x3 array with variable sized elements could
be notated as n2n3n? 1a,1b,1c,2a,2b,2c, using the same separator symbol every time, with the division between 1c and 2a known
to be deeper than the rest only because that info was given in the
vector of quantities. Or that 2x3 array with fixed sized elements
could be notated as n2n3n2 1a1b1c2a2b2c.
If means to represent something analogous to a Hollerith constant are provided, some probably will use it for very complicated
objects. Just serialize the data, and use the total length of the resulting string as the size. Supporting runs of the same symbol, and
blocks of data analogous to Hollerith constants, provides enough
for further elaboration if desired, while keeping the notation simpler.
We get away with unary representations, because we stick to
small and simple structures. If we seldom count higher than 3 or 5,
and almost never higher than 10, tally marks work fine. A check of
the Firefox source code reveals that only a few programs reached
a nesting depth of 15, with most never exceeding 10, so RLE for
opening brackets and colons, and quantities to indicate the depths
of separators are not going to remove much clutter. But perhaps
flatter structuring has been chosen to avoid the clutter that would
result from deeper nestings. And block escapes are still a viable
use of quantities.
Conference’17, July 2017, Washington, DC, USA
8 REPRESENTING STRUCTURE WITH
POSITIONING
The only ASCII control characters still really useful are the 2 for
indicating a new line of text. Next most used is tab, which has
ambiguous meaning and is easily and often replaced with spaces,
except in a few special cases such as Makefiles. The rest of the
ASCII control characters are very seldom seen, and when present,
modern applications may simply ignore their meanings [27]. Of
the 132,231 text files in the Firefox 50 source code, just 121 have
ASCII control characters other than the 3 most common: LF, tab,
and CR. A mere 5 files use ANSI escape sequences, which start with
the Escape character (ctrl-[, ASCII 27), and that only to set text
colors.
ASCII’s minimal means of positioning text is sufficient but not
efficient or neat. One of the worst inefficiencies is the very repetitive use of spaces to indent lines of text. Some ANSI escape sequences address this issue, but not well. The VT100 series text
terminals became popular in large part because they adopted and
extended the ANSI escape sequences. Yet they have not been much
used outside of terminal control. They did not grow beyond that
niche to become common within text files. Colored text is the ANSI
escape sequence most used, yet it is rare. One of the most common uses of colored text, highlighting of source code, does not use
ANSI at all, even though editing may still be done in a terminal
that supports ANSI. Rather, text editors parse the source code being edited to compute which colors to assign, updating in real time
as the user makes changes. HTML and CSS can specify colors directly, and are not limited to a tiny 16 color palette. That and word
processor options have become the way to set text and other colors in documents. ASCII and ANSI must use a fixed width font to
position text accurately, and consequently, source code is almost
always viewed in such fonts.
What sort of positioning information would be most useful?
Means of clear, easy, and minimal description of position that best
supports useful structures should be leading contenders. Indentation is the most popular way to express hierarchy through position
alone. It is so common that even though curly brace languages do
not use indentation, coders are exhorted to use “proper indentation” anyway, so that their source code is more readable. Perhaps
the most prominent and distinctive feature of the Python programming language is the use of pure positioning to indicate code structure. Another major use is the alignment of columns, usually for
tables. The ASCII tab character does not do either of these well.
Superscripting and subscripting can be considered a kind of positioning. It has a major limitation in that it does not scale. Each
successively deeper nesting requires progressively smaller text, which
soon becomes too small to read.
A proposal is to reassign 4 ASCII control characters for indentation. 3 of them can be increase indent (push), revert indent (pop),
and boost indent, analogous to the 2 brackets and colon in a closing 3 system. These characters can be invisible and have a width of
zero, not directly affecting the position of text. They only change
the level of indentation. The 4th character can mean forward to
the next indentation, replacing the leading spaces on all indented
lines of text. It could also mean advance to the next line, but that
Conference’17, July 2017, Washington, DC, USA
would be less flexible, wouldn’t support situations in which text
such as a line number is wanted before the indentation.
These characters do not specify the size of an indentation, only
the number of levels. This would allow individual users to set the
indentation size themselves without affecting others. It could also
make variable width fonts usable, as the problem of what unit to
use to specify indentation sizes is entirely avoided. It does add one
item to the state a text editor or viewer must maintain: a stack of
indentation levels.
Indentation characters could ease editing of source code. There
would be no more need to shift blocks of code several spaces right
or left by changing the number of leading spaces on each line,
whether by manually adding or deleting each space, or by using
some smart editor function such as that assigned to the tab key in
EMACS.
For the columns of tables, need better tab functionality. It would
be desirable not to rely on the use of a monospace font to recreate
the intended horizontal alignments. A limitation to dump is any
sort of tiny maximum distance of 8 spaces. Further, it should be
independent of any indentation setting. The C1 set of control characters contains several intended for tabular positioning, but they
do not do enough. One problem is that the state they set up is
global. Another is that they still implicitly depend upon a fixed
font, using the cursor position for fixing the location of tab stops.
It is basically a copy of the ideas and means used in the most advanced typewriters, with all their limitations.
The means HTML provides for laying out tables is fairly comprehensive and flexible, and proven over many years of use. If
better handling of tables is desired in plain text, copying HTML’s
handling and a subset of capabilities concerning tables into control character functionality seems a good approach. Lightweight
markup languages such as Markdown [26] and Bulletin Board Code
(bbcode) [22], arose to satisfy the desire to be able to create lists
and tables in text based forums more easily than with HTML. This
shows that many users like text editing to have such capabilities.
9
CONCLUSION
This paper proposed several changes in standard textual notations
to eliminate redundancy that may be hampering the human readability of structured documents such as source code. Proving that
human readability is improved was not attempted. Instead, the paper surmises that some kinds of redundancy merely add clutter,
showed where and how redundancy lurks, and proposed ways to
eliminate it. Good answers to Lots of Idiotic Spurious Parentheses
have been desired for a long time, and perhaps until now have not
been satisfactory.
Notation that scales and adds expressiveness, and allows much
more brevity without sacrificing clarity, is especially preferred. Punctuation with long histories in natural languages, especially English,
was tapped as a guide, in part because those uses are familiar to
people literate in those languages.
The first proposed change was to add a 3rd kind of bracket symbol roughly equivalent to the meaning of the colon in English, so
that a parent–child relationship represented as “(p(c))” is instead
represented as “(p:c)”. Proof was given that this 3 symbol system
Brenton Chapin
can collapse all runs of 2 or more closing brackets to a single closing bracket.
The idea of a universal closing bracket was presented. ”fa (b
[c] d) eg” can be represented as “fa (b [c] d] e]”, reducing the number of different symbols required, as ‘)’ and ‘g’ are no
longer needed.
More use of separators was proposed to replace sequences of
closing brackets followed by opening brackets. “((a()b)(c()d))”
can be represented with “((a,b;c,d))”.
Ways of adding types to the structure were discussed.
Positioning was recognized as an important way of denoting
structure. It is observed that means of expressing position have
been neglected. Markup languages limit themselves to data, and
are not much used for writing of other structured information such
as source code. Moreover, by using visible text to express position,
and requiring translation with special tools such as a web browser,
they fail at the goal of using position alone to express structure.
The means provided in ASCII work only with monospace fonts,
and require much wasteful redundancy. Repurposing some of the
unused control characters to better support indentation and tabular structure was proposed.
Together, these changes reduced the number and quantity of
symbols needed. They improved the amount of data compression
obtained by general purpose data compression programs. They reduced the size of the source code. Whether the goal of greater
human readability was also achieved was not studied, but it was
surmised that removing redundancies in the notation does help
with readability.
REFERENCES
[1] Leonhard Euler. “De infinitis curvis eiusdem generis seu methodus inveniendi aequationes pro infinitis curvis eiusdem generis,” Commentarii
academiae scientiarum Petropolitanae 7, 1740, pp. 174-189. Original available
at http://eulerarchive.maa.org/docs/originals/E044.pdf, English translation at
http://www.17centurymaths.com/contents/euler/e044tr.pdf .
[2] Dirichlet, P. G. L., “Beweis des Satzes, dass jede unbegrenzte arithmetische Progression, deren erstes Glied und Differenz ganze Zahlen
ohne gemeinschaftlichen Factor sind, unendlich viele Primzahlen
enthlt”, Abhand. Ak. Wiss. Berlin, 1837. English translation available at
http://arxiv.org/pdf/0808.1408v2.pdf.
[3] Florian Cajori. “A History of Mathematical Notations.” 1928-1929. Paragraph
643, Vol II, pg. 268.
[4] Jan Lukasiewicz. “Uwagi o aksjomacie Nicoda i ’dedukcji uoglniajfbcej’ ”
Ksiga pamifbtkowa Polskiego Towarzystwa Filozoficznego, Lww 1931.
[5] Oliver, B. M. “Efficient Coding.” Bell System Technical Journal, 31: 724-750.
doi:10.1002/j.1538-7305.1952.tb01403.x
[6] A. J. Perlis and K. Samelson. “Preliminary Report – International Algebraic
Language,” Communications of the ACM, July 1958.
[7] Kenneth E. Iverson. A Programming Language. John Wiley & Sons, Inc., New
York, NY, USA. 1962.
[8] Richards, Martin. “BCPL: A tool for compiler writing and system programming”
[9] Winett, J., ”EBCDIC Codes and Their Mapping to ASCII”, RFC 183, DOI
10.17487/RFC0183, July 1971, http://www.rfc-editor.org/info/rfc183
[10] Abelson, Harold and Sussman, Gerald Jay, with Sussman, Julie. “Structure
and Interpretation of Computer Programs.” 1985.
[11] Felsenstein,
Joe
et
al.
The
Newick
tree
format.
http://evolution.genetics.washington.edu/phylip/newicktree.html
[12] Bemer,
Robert.
“The
Great
Curly
Brace
Trace
Chase”
http://www.bobbemer.com/BRACES.HTM
[13] FORTRAN 77 4.0 Reference Manual. SunSoft. Part No.: 802-2998-10 Revision
A, November 1995. p. 38. https://archive.org/details/Fortran77Manual
[14] Tim Bray,
C. M.
Sperberg-McQueen,
et.
al.
Extensible
Markup Language (XML),
W3C
Working
Draft 14-Nov-96.
https://www.w3.org/TR/WD-xml-961114
[15] Rivest, R. “S-Expressions” Network Working Group, Internet Draft, May 4,
1997. Section 4.1. http://people.csail.mit.edu/rivest/Sexp.txt
Efficient textual representation of structure
[16] Goldfarb, Charles F. “SGML: The Reason Why and the First Published Hint.”
Journal of the American Society for Information Science, volume 48, number
7 (July 1997). Annotated reprint of Goldfarb, Charles F., Mosher, Edward J.,
and Peterson, Theodore I. “An Online System for Integrated Text Processing”
Journal of the American Society for Information Science, volume 7 (Oct 1970).
http://www.sgmlsource.com/history/jasis.htm.
[17] Oren Ben-Kiki, Clark Evans, Brian Ingerson. YAML Ain’t Markup Language
(YAML) 1.0. Final Draft 2004-JAN-29. http://yaml.org/spec/1.0/
[18] Wall,
Larry.
“Synopsis
4:
Blocks
and
Statements”
http://design.perl6.org/S04.html
[19] Markstrum, Shane. “Staking Claims: A History of Programming Language
Design Claims and Evidence.”
[20] Shafranovich, Y., ”Common Format and MIME Type for Comma-Separated
Values (CSV) Files”, RFC 4180, DOI 10.17487/RFC4180, October 2005,
http://www.rfc-editor.org/info/rfc4180
[21] Buse, Raymond P.L. and Weimer, Westley R. “A Metric for Software Readability.” Proceedings of the 2008 International Symposium on Software Testing
and Analysis, pp. 121-130.
[22] anonymous authors. Bulletin Board Code. http://www.bbcode.org
[23] Yasuoka, Kiochi and Yasuoka, Motoko. “On the Prehistory of QWERTY.” ZINBUN (2011), 42: 161-174. https://doi.org/10.14989/139379
[24] ECMA
404
The
JSON
Data
Interchange
Format.
https://www.ecma-international.org/publications/files/ECMA-ST/ECMA-404.pdf
[25] HTML Elements. http://www.w3schools.com/html/html elements.asp
[26] MacFarlane, John. CommonMark Spec. http://spec.commonmark.org/
[27] Leonard, S., ”Guidance on Markdown: Design Philosophies, Stability Strategies, and Select Registrations”, RFC 7764, DOI 10.17487/RFC7764, March 2016.
http://www.rfc-editor.org/info/rfc7764
[28] Open Tree of Life, v9.1. http://files.opentreeoflife.org/synthesis/opentree9.1/opentree9.1 tree.tgz
Conference’17, July 2017, Washington, DC, USA
| 6cs.PL
|
Some theoretical results on tensor elliptical
distribution
arXiv:1709.00801v1 [math.ST] 4 Sep 2017
M. Arashi
Department of Statistics, School of Mathematical Sciences
Shahrood University of Technology, Shahrood, Iran
Abstract: The multilinear normal distribution is a widely used tool in tensor analysis
of magnetic resonance imaging (MRI). Diffusion tensor MRI provides a statistical
estimate of a symmetric 2nd -order diffusion tensor, for each voxel within an imaging
volume. In this article, tensor elliptical (TE) distribution is introduced as an extension to the multilinear normal (MLN) distribution. Some properties including the
characteristic function and distribution of affine transformations are given. An integral representation connecting densities of TE and MLN distributions is exhibited
that is used in deriving the expectation of any measurable function of a TE variate.
Key words and phrases: Characteristic generator; Inverse Laplace transform; Stochastic representation; Tensor; Vectorial operator.
AMS Classification: Primary: 62E15, 60E10 Secondary: 53A45, 15A69
1
Introduction
Nowadays, analysis of matrix-valued data sets is become quite common in medical sciences, since
the collected data are of multiple-way (multiple-component) arrays. For example in medical
imaging, it has become possible to collect magnetic resonance imaging (MRI) data that can be
used to infer the apparent diffusivity of water in tissue in vivo. In this regard, there is a need
to consider parallel extensions of bilinear forms1 , namely tensor matrices. Tensor matrices have
been commonly used to approximate the diffusivity profile of images. This approximation yields
a diffusion tensor magnetic resonance imaging (DT-MRI) data set. Processing of DT-MRI data
sets has scientific significance in clinical sciences. Figure 1 shows the tensor filed in a diffusion
MRI image.
In image analysis, the characteristic or precision matrix of the underlying model for tensor observations and distribution of eigenvalues play deterministic roles. Hence, the underlying
tensor distribution influences the respective inference. The use of tensor and associated distributional structure in Statistics dates back to McCullagh (1987). McCullagh (1984) had already
introduced tensor notation in statistics with particular reference to the computation of polynomial cumulants. For a selective papers about tensors and applications in statistics, we refer to
Sakata (2016).
In all pronounced studies in statistical tensor analysis, tensor normal (or multilinear normal)
distribution is employed for the underlying distribution of observations. However, a slight change
in the specification of the distribution, as pointed by Basser and Pajevic (2003), may play havoc
1
Bilinear form is a two-way (two-component) array, with each component represents a vector of observations
1
Figure 1: Visualization of tensor filed of a brain
Figure 2: Visualization of a 3-dimensional data set as a 3rd -order tensor.
on the resulting inferences. To broaden the scope of the distributions and achieve reasonable
inferential conclusions, and in order to accommodate the heavier tailed distributions in a reasonable way and produce robust inference procedures for applications, tensor t-distribution can
be employed in related analysis. From a broader view point, one may define the class of tensor
elliptical distributions which includes the latter distribution as special one. In this article, we
define a new class of tensor elliptical distributions and study some of its statistical properties.
2
Preliminaries
In this section we introduce related notation to our study and give some definitions. We adhere
to the notation of Ohlson et al. (2013).
Let X be a tensor of order k (kth -order tensor, in tensor parlance), with the dimension
p = (p1 , p2 , . . . , pk ) in the x = (x1 , x2 , . . . , xk ) direction. Figure 2 shows the special case when
k = 3. Indeed 2nd -order tensor is matrix, 1st -order tensor is vector, and 0th -order tensor is
scalar.
In connection with Figure 2, Figure 3 shows that the collected data can be interpreted as
tensor, where the assessment of cardiac ventricular with helical structure is done by DT-MRI.
2
Figure 3: Helical structure of the cardiac ventricular anatomy
A vectorial representation of a tensor, make the related inference much simpler. Let vec X
denote the vectorization of tensor X = (xi1 i2 ···ik ), according to the definition of Kolda and Bader
(2009) given by
vec X
=
=
p1
X
···
pk
X
xi1 i2 ···ik e1i1 ⊗ · · · ⊗ ekik ,
ik =1
i1 =1
X
xi1 i2 ···ik ep1:k ,
(2.1)
Ip
, ..., e1i1 are the unit basis vectors of size pk , pk−1 , ..., p1 , respectively, ep1:k =
where ekik , eik−1
k−1
e1i1 ⊗ · · · ⊗ ekik , where ⊗ denotes the Kronecker product, Ip is the index set defined as Ip =
{i1 , . . . , ik : 1 ≤ ij ≤ pj , 1 ≤ j ≤ k}. In Ohlson et al. (2012), the authors concentrated
on the estimation of a Kronecker structured covariance matrix of order three (k = 3), the so
called double separable covariance matrix, generalizing the work of Srivastava et al. (2008), for
multilinear normal (MLN) distributions.
Let T p denote P
the space of all vectors x = vec X , where X is a tensor of order k, i.e.,
p
p
T = {x : x =
Ip xi1 i2 ···ik e1:k }. Note that this tensor space is described using vectors.
However, we can define tensor spaces using matrices. This is given in the following definition.
Definition 1 Let
o
n
P
(i) T pq = X : X = Ip ∪Iq xi1 ,··· ,ik ,j1 ,··· ,jl ep1:k (dq1:l )′ , Iq = {j1 , . . . , jl : 1 ≤ ji ≤ pi , 1 ≤ i ≤ l}
pq
(ii) T pq
: X = X 1 ⊗ . . . ⊗ X k , X i : pi × q i }
⊗ = {X ∈ T
(iii) T p⊗ = X ∈ T pp
⊗ : X = X 1 ⊗ . . . ⊗ X k , X i : pi × pi
Theorem 1 (Ohlson et al., 2013) A tensor X is MLN of order k, denoted by X ∼ Np (µ, Σ)
1
if x = µ + Σ 2 u, where x, µ ∈ T p , Σ ∈ T p⊗ , p = (p1 , . . . , pk ), and the elements of u ∈ T p are
independent standard normally distributed.
Note that Σ ∈ T p⊗ can be written as Kronecker product Σ = Σ1 ⊗ . . . ⊗ Σk
3
Indeed, Theorem 1 configures the MLN distribution using the stochastic representation of
vector x ∈ T p . This methodology can be mimicked to extend the above result for elliptical
models. Before revealing the main result of this paper, we need to consider the definition of
matrix elliptical distributions.
3
Tensor Elliptical Distributions
Q
∗
Let u(p ) , p∗ = ki=1 pi , denote a random vector distributed uniformly on the unit sphere
∗
surface in Rp , with characteristic function (cf) Ωp∗ (·). Hereafter, using Theorem 2.2 of Fang
et al. (1990), we propose a definition for tensor elliptical (TE) distribution. The methodology
behind our definition of TE distribution comes from two facts: (1) a random matrix X has
matrix elliptical distribution if and only if vec X has vector-variate elliptical distribution which
will be used for tensor (see Gupta et al., 2013) (2) the difference between vector-variate elliptical
and TE lies in the structure of the parameter space generated by µ and Σ.
Definition 2 A random tensor X is TE of order k, denoted by X ∼ Ep (µ, Σ, ψ), if
1
∗
x = vec(X ) = µ + RΣ 2 u(p ) ,
1
(3.1)
∗
where x, µ ∈ T p , Σ 2 ∈ T p⊗ is any square root, p = (p1 , . . . , pk ), R ≥ 0 is independent of u(p ) ,
and R ∼ F , for some cumulative distribution function (cdf ) F (·) over [0, ∞), is related to ψ by
the following relation
Z
ψ(x) =
R+
Ωp∗ (xr 2 )dF (r).
(3.2)
The question arises whether the parameters in Definition 2 are uniquely defined. TheQanswer
is no. To see this, assume that ai , i = 1, . . . , k are positive constants such that a∗ = kj=1 aj ,
∗
1
∗
Σj = aj Σj , j = 1, . . . , k and ψ (x) = ψ p∗ x . Then Ep (µ, Σ, ψ) and Ep (µ, Σ∗ , ψ ∗ ), where
Σ∗ = Σ∗1 ⊗ . . . ⊗ Σ∗k , define the same tensor elliptical distribution.
Using vector representation, x ∈ T p , we can conveniently write the probability distribution
function (pdf) of a TE extending the pdf of MLN distribution. The following result gives the
pdf of a random tensor elliptical if it possesses a density, as an extension to Ohlson et al. (2013).
Theorem 2 Under the assumptions of Definition 2, the pdf of the TE distribution is given by
1
fX (x) = |Σ|− 2 g (x − µ)′ Σ−1 (x − µ) ,
where g(·) is a non-negative function (density generator, say) satisfying
Z
1 ∗
y 2 p −1 g(y)dy < ∞.
R+
We designate X ∼ Ep (µ, Σ, g).
In a similar fashion, we have the following result.
Theorem 3 Let X ∼ Ep (µ, Σ, ψ). Then, its characteristic function has form
′
φX (S) = eiS µ ψ(S ′ ΣS),
Remark 1 Since
1
|Σ|− 2
1
= |Σ1 ⊗ Σ2 ⊗ . . . ⊗ Σk |− 2
4
S ∈ T p.
(3.3)
=
=
|Σ1 |
k
Y
i=1
p∗
p1
− 1
2
× |Σ2 |
∗
p
− 2p
|Σi |
p∗
p2
− 1
2
× . . . × |Σk |
p∗
pk
− 1
2
i
1 ∗
taking g(y) = (2π)− 2 p exp − 12 y in Definition 2, gives the pdf of MLN distribution (as given
in Theorem 1 of Ohlson et al., 2013) as
!
k
Y
p∗
1 ∗
1
− 2p
′
−1
−2p
(3.4)
fX (x) = (2π)
|Σi | i exp − (x − µ) Σ (x − µ) ,
2
i=1
where Σ is positive definite, x, µ ∈ T p , Σ ∈ T p⊗ , and p∗ =
Qk
i=1 pi .
The following result gives the distribution of affine transformations for TE variates.
Theorem 4 Let X ∼ Ep (µ, Σ, ψ), with vec X ∈ T p , A ∈ T qp is nonsingular, and B ∈ T q .
Then, AX + B ∼ Eq (Aµ + B, AΣA′ ), where Aµ + B ∈ T q and AΣA′ ∈ T q⊗ .
Proof. Let y = Ax + B, where x = vec(X ). From the stochastic representation in Definition
1
∗
2, the proof directly follows from y = (Aµ + B) + R(AΣ 2 )u(p ) .
The following result is a direct consequent of Theorem 2.16 of Gupta et al. (2013) for tensor
elliptical distributions.
Theorem 5 Under the assumptions of Definition 2, the pdf of R has from
1 ∗
2π 2 p p∗ −1
2
r
g
r
,
hR (r) =
Γ 21 p∗
r ≥ 0.
The following theorem reveals the distribution of quadratic form for a special case.
Theorem 6 Let X ∼ Ep (0, Σ(1) , ψ), where Σ(1) = Σ ⊗ I p2 ⊗ . . . ⊗ I pk ∈ T p⊗ ,
Then, the pdf of A = X X ′ is given by
Qk
j=2 pj .
1
1 (1)
π p |Σ|− 2 p1
p −p1 −1
2
g(tr Σ−1 A)
f (A) =
1 (1) |A|
Γp 1 2 p
∗
where p(1) =
p = (p1 , . . . , pk ).
In the forthcoming section, we provide a weighting representation of the pdf of TE variate
using the Laplace operator.
4
Weighting Representation
Although the proposed theorems in previous section are obtained conventionally, it is not easy to
achieve other statistical properties of the TE distributions from Definition 2 straightforwardly.
However, under a mild conditions, one can make connection between densities of TE and MLN
pdfs and derive other properties of the TE distributions using MLN distributions. In this
section, we propose a weighting representation which connects densities of the TE and MLN
distributions. This result is given in the following theorem.
5
Theorem 7 Let X ∼ Ep (µ, Σ, g), where µ ∈ T p , Σ ∈ T p⊗ and g : R+ → R+ . Also assume that
g(s2 ) is differentiable when s2 is sufficiently large, and g(s2 ) vanishes faster than s−k ; k > 1 as
s → ∞. Then, the pdf of X can be represented as an integral of series of MLN pdfs given by
Z
W(t)fNp (µ,t−1 Σ) (x)dt,
fX (x) =
R+
where fNp (µ,t−1 Σ) (·) is the pdf of Np (µ, t−1 Σ) and W(·) is a weighting function.
Proof. Let s2 = 12 (x − µ)′ Σ−1 (x − µ) and
1 ∗
W(t) = (2π) 2 p t−
p∗
2
L−1 g 2s2 ,
where L is the Laplace transform operator. It should be noted that under the regularity condition
∗
Q
1
−p
on g(s2 ), the inverse Laplace transform exists. Then, from |Σ|− 2 = ki=1 |Σi | 2pi , we have
h
∗i
1
1 ∗ p
1
f (x) = |Σ|− 2 g(2s2 ) = |Σ|− 2 L W(t)(2π)− 2 p t 2
"
#
k
∗ Y
p∗
− 2p
− 12 p∗ p2
= L W(t)(2π)
t
|Σi | i
i=1
=
=
=
Z
Z
Z
− 12 p∗
R+
W(t)(2π)
t
p∗
2
k
Y
i=1
− 12 p∗
k
Y
R+
R+
W(t)fNp (µ,t−1 Σ) (x)dt.
i=1
|Σi |
− k1
W(t)(2π)
|t
∗
p
− 2p
i
!
∗
p
− 2p
Σi |
i
2
e−ts dt
!
1
′
−1 Σ)−1 (x−µ)
e− 2 (x−µ) (t
dt
The proof is complete.
Thus, a TE variable is an integral over all MLN variables having the same covariance subject
to different scales.
Since fX (·) is the pdf of X , using Fubini’s theorem, we obtain
Z Z
Z
W(t)fNp (µ,t−1 Σ) (x)dtdx
fX (x)dx =
1=
χ
Z χ R+ Z
W(t) fNp (µ,t−1 Σ) (x)dxdt
=
+
χ
R
Z
W(t)dt
(4.1)
=
R+
where χ is the sample space. Hence, for positive weighting functions W(·), the weighting representation of TE distributions can be interpreted as an scale mixture of MLN distributions.
However, sometimes, W(·) can be negative. Note that a TE distribution is completely defined
by the matrix Σ ∈ T p⊗ and the scalar weighting function W(·).
Theorem 7 enables us to describe more properties of TE distributions via MLN distributions.
This can be done using the following important result.
Theorem 8 Let x ∼ Ep (µ, Σ, g), µ ∈ T p , Σ ∈ T p⊗ and g : R+ → R+ with weighting function
W(·), and B(x) be any Borel measurable function of x ∈ T p . Then, if E[B(x)] exists, we have
Z
W(t)ENp (µ,t−1 Σ) [B(x)]dt
E[B(x)] =
R+
6
5
Examples
In this section, we provide some examples of TE distributions based on Definition 2 with respective weighting function, as defined in Theorem 7.
Firstly, we consider some examples in which the weighting function W(.) is always positive,
resulting to scale mixture of multilinear normal distributions.
(i) Multilinear normal distribution (Ohlson et al., 2013)
The weighting function has form
W(t) = δ(t − 1),
where δ(·) is the dirac delta or impulse function having the property
R
f (x)δ(x)dx = f (0),
R
for every Borel-measurable function f (·).
(ii) Multilinear ε-contaminated normal distribution
We say the random tensor X ∈ T p has multilinear ε-contaminated normal distribution if
it has the following density
!
k
Y
p∗
1
1
− 2p
′
−1
|Σi | i
fX (x) =
(1 − ε) exp − (x − µ) Σ (x − µ)
1 ∗
2
(2π) 2 p
i=1
1
ε
+ p∗ exp − 2 (x − µ)′ Σ−1 (x − µ) .
σ
2σ
Then it can be concluded that the weighting function is given by
W(t) = (1 − ε)δ(t − 1) + εδ(t − σ 2 ).
(iii) Tensor t-distribution
We say the random matrix X ∈ T p has tensor t-distribution if it has the following density
∗
p∗
−(p∗ +ν)
ν 2 Γ p 2+ν
1
′ −1
.
(5.1)
fX (x) =
1 + (x − µ) Σ (x − µ)
1 ∗
ν
π 2 p Γ( ν2 )
ν
The corresponding weighting function has form W(t) =
tν
( tν2 ) 2 e− 2
.
tΓ( ν2 )
The tensor Cauchy distribution is obtained by setting ν = 1 in (5.1).
It is of much interest to consider cases in which the weighting function W(.) is not always positive. Such kind of distributions are not scale mixture of multilinear normal
distributions. The item below is not a tensor distribution, however it is 0th -order tensor
distribution.
(iv) The one-dimensional distribution with the following density
√
x 4 −1
2
,
1+
f (x) =
πσ
σ
where the weighting function is given by W(t) = √1tπ sin 2t .
7
6
Inference
Theorem 9 Suppose that tensor variables X 1 , . . . , X n are jointly distributed with the following
pdf
k
n
Y
X
p∗
−
|Σi | 2pi g
x′j Σ−1 xj , Σ = Σ1 ⊗ Σ2 ⊗ . . . ⊗ Σk
i=1
j=1
(r)
(2)
(3)
(k)
such that σp2 p2 = σp3 p3 = . . . = σpk pk = 1, where Σr = σij . Further, suppose g(·) is such
that g(x′ x) is a pdf in Rp and y p /2 g(y) has a finite positive maximum yg (see Anderson et al.,
1986 for the existence of yg ). Suppose that Σ̃ is an estimator which obtains from solving the
following equations (see Ohlson et al., 2013)
∗
∗
Σ̃1 =
Σ̃r
1
p∗2:k n
n
X
x′j Σ−1
2:k xj
j=1
and, for r = 2, . . . , k
n
−1
X
1
2,r(r)
2,r(r) ′
2,r
xi
,
Σ
x
=
i
1:k\r
p∗1:r−1 p∗r+1:k n
j=1
where
2,r(r)
=
xj
X
lp
pr
xi1 ,...ik e2,r
i1 :ik \ir eir
′
Σ2,r
1:k\r = Σ2 ⊗ . . . ⊗ Σr−1 ⊗ Σ1 ⊗ . . . ⊗ Σk
p
Then, the MLE of Σ is given by
Σ̂ =
− p1∗
Proof. Let A = |Σ|
p
r−1
r+1
= epi11 ⊗ epi33 ⊗ . . . ⊗ eir−1
⊗ eir+1
⊗ . . . ⊗ epikk
e2,r
i1 :ik \ir
p∗
Σ̃
yg
Σ. Also for any j = 1, . . . , n write
1
dj = x′j Σ−1 xj = |Σ|− p∗ x′j A−1 xj .
1
Since |Σ|− 2 =
Qk
∗
p
− 2p
i=1 |Σi |
(6.1)
, the likelihood can be written as
n
X
1
dj
L = |Σ|− 2 g
i
j=1
=
|Σ|
=
1
p∗
n
X
j=1
− p∗
2
n
X
j=1
p∗
dj
− p∗
x′j A−1 xj
2
2
d
p∗
2
g
n
X
j=1
g(d),
dj
(6.2)
P
where d = nj=1 dj .
The maximum of (6.2) is attained at  = à and dˆ = yg . Then the MLE of Σ is given by
1
Σ̂ = |Σ̂|
1
p∗
 =
|Σ̂| p∗
1
|Σ̃| p∗
8
Σ̃.
(6.3)
On the other hand, from (6.1) we get
|Σ̂|
|Σ̃|
1
p∗
1
p∗
=
=
′ −1
j=1 xj  xj
Pn ˆ
j=1 dj
Pn
′ −1
j=1 xj à xj
Pn ˜
j=1 dj
Pn
′ −1
j=1 xj à xj
=
Pn
=
Pn
dˆ
′ −1
j=1 xj à xj
d˜
′ −1
j=1 xj à xj
=
Pn
=
Pn
yg
′ −1
j=1 xj à xj
p∗
(6.4)
Substituting (6.4) in (6.3) and using Theorem 4.1 of Ohlson et al. (2013) gives the result.
7
Conclusion
In this article, for the purpose of robust inferring on diffusion tensor magnetic resonance imaging
(DT-MRI) observations, we proposed a class of tensor elliptical (TE) distributions. This class
includes many heavier tail distributions than the tensor normal or multilinear normal (MLN)
distribution. Important statistical properties including the characteristic function along with
the distribution of affine transformations derived. A weighting representations also exhibited
that connects densities of TE and MLN distributions.
References
Basser, P. J. and Pajevic, S. (2003). A normal distribution for tensor-valued random variables:
applications to diffusion tensor MRI. IEEE Transactions on Medical Imaging, 22(7):785794.
Fang, K.T., Kotz, S., Ng, K.W. (1990) Symmetric Multivariate and Related Distributions. Chapman and Hall, London.
Gupta, A.K. and Varga, T., and Bondar, T. (2013) Elliptically Contoured Models in Statistics
and Portfolio Theory, 2rd Ed., Springer, New York. Kolda, T.G. and Bader, B.W. (2009).
Tensor decompositions and applications. SIAM Review, 51(3):455-500.
McCullagh, P. (1987). Tensor Methods in Statistics, Chapman & Hall, London.
McCullagh, P. (1984). Tensor notation and cumulants of polynomials. Biometrika, 71(3):461476.
Ohlson, M., Rauf Ahmad, M., and von Rosen, D. (2012). More on the Kronecker structured
covariance matrix. Communications in Statistics Theory and Methods, 41:2512-2523.
Ohlson, M., Rauf Ahmad, M., and von Rosen, D. (2013). The multilinear normal distribution:
Introduction and some basic properties. Journal of Multivariate Analysis, 113:37-47.
Sakata, T. (2016). Applied Matrix and Tensor Variate Data Analysis, Springer, Japan.
Srivastava, M., von Rosen, T., and von Rosen, D. (2008). Models with a Kronecker product
covariance structure: estimation and testing. Mathematical Methods in Statistics, 17:357370.
9
| 10math.ST
|
arXiv:1711.04260v1 [cs.CV] 12 Nov 2017
Evaluation of trackers for Pan-Tilt-Zoom Scenarios
Yucao Tang
Guillaume-Alexandre Bilodeau
University of Electronic Science and Technology of China
Chengdu, China
tang [email protected]
LITIV Lab.
Polytechnique Montréal
Montréal, Canada
[email protected]
Abstract—Tracking with a Pan-Tilt-Zoom (PTZ) camera has
been a research topic in computer vision for many years.
Compared to tracking with a still camera, the images captured
with a PTZ camera are highly dynamic in nature because the
camera can perform large motion resulting in quickly changing
capture conditions. Furthermore, tracking with a PTZ camera
involves camera control to position the camera on the target. For
successful tracking and camera control, the tracker must be fast
enough, or has to be able to predict accurately the next position
of the target. Therefore, standard benchmarks do not allow to
assess properly the quality of a tracker for the PTZ scenario. In
this work, we use a virtual PTZ framework to evaluate different
tracking algorithms and compare their performances. We also
extend the framework to add target position prediction for the
next frame, accounting for camera motion and processing delays.
By doing this, we can assess if predicting can make long-term
tracking more robust as it may help slower algorithms for keeping
the target in the field of view of the camera. Results confirm that
both speed and robustness are required for tracking under the
PTZ scenario.
Index Terms—Pan-Tilt-Zoom tracking, performance evaluation, tracking algorithms
I. I NTRODUCTION
Tracking with a Pan-Tilt-Zoom (PTZ) camera has been a
research topic in computer vision for many years. Compared
to tracking with a still camera, the images captured with a PTZ
camera are highly changing in nature because the camera can
perform large motion resulting in quickly changing capture
conditions. Furthermore, tracking with a PTZ camera involves
controlling a camera and it is an online process. Therefore,
standard benchmarks, e.g. [1], do not allow to evaluate the
performance of a tracker for the PTZ scenario because they do
not account for camera control, neither for drop frames caused
by spending too much time for processing a frame to track a
target. A specific benchmark is required for evaluation in this
scenario. In this work, we used the virtual PTZ framework
that has been developed by [2] to evaluate recent trackers
for the PTZ tracking scenario. The goal of this evaluation is
to assess the performance of trackers in an online tracking
scenario where a combination of speed and robustness is
required. PTZ scenarios include many changes in scale and
in illumination and large motion. We evaluated 19 tracking
algorithms and compared and analyzed their performances.
Many of these trackers were tested in the VOT 2016 [1]
benchmark. We also extended the framework to add target
This work was conducted while Yucao Tang was doing a MITACS Globalink internship at Polytechnique Montréal
position prediction for the next frame, accounting for camera
motion and processing delays. By doing this we can assess if
prediction can help to make long-term tracking more robust
and help slower algorithm for keeping the target in the field
of view of the camera.
II. E VALUATION FRAMEWORK
AND METRICS
Chen et al. [2] proposed a C++ framework to evaluate in
a reproducible way trackers in PTZ scenarios. Because of the
online nature of this scenario, the authors proposed the use of
a PTZ camera simulator that pans, tilts and zooms based on a
spherical video captured offline. The simulator also includes
relevant delays that result in drop frames if tracking takes too
long and if the target has a large motion in the image plane.
These delays are categorized into execution delay, motion
delay and communication delay.
A. Simulator Configuration
We use the evaluation framework as indicated by Chen et
al. [2]. However, since some tracker codes are in C++ and
others in Matlab, we adjusted how the delays are calculated
to ensure fairness in execution time evaluation. We used the
chronometer functions based on execution time in C++ 11 to
calculate the time elapsed for processing frames by the trackers
instead of the real-time clock. Some of the program running
time is spent to read the image from disk drive and it was not
included in the execution time. The motion delay is calculated
by the time it takes for the simulated camera to tilt and/or pan.
We decided that there would be no communication delays by
supposing that the camera is not networked.
Some codes are written originally in Matlab and we had
to use the Matlab engine to call the Matlab function, or in
other word, tracker interfaces. Minor changes have been made
to the Matlab source codes such as eliminating the display
and drawing functions since those will affect the speed of
processing but are totally unnecessary and are thus taken as
irrelevant delays. Besides, after practical experiments, it turns
out that calling Matlab engine from C++ is actually in a time
scale of milliseconds and this overhead can be neglected since
the time to process frame by trackers is much longer than that
delay.
B. Performance Evaluation
Chen et al. defined four performance metrics to evaluate the
trackers [2]. These metrics are calculated in the image plane
for the current camera viewpoint (i.e. the viewed subregion
on the image sphere projected on the camera image plane).
Let CGT and CP T be the ground-truth target center and the
predicted target center, and AGT and AP T be the ground-truth
target bounding box and the predicted bounding box, respectively. CF OV is the center of the camera image plane, or in
other words, field of view (FOV). T P E t (Target Point Error)
and BORt (Box Overlapping Ratio) evaluate the quality of
target localization and are defined as
T P E = |CGT − CP T |
move. We experimented with three motion models to obtain
the target motion (∆d ) between two instants:
• Model 1: Object is moving at a constant speed and uses
the velocity of last instant
∆d = V1 × ∆t
•
and
•
BORt =
AGT ∩ AP T
AGT ∪ AP T
(2)
T P Ot (Target Point Offset) and T F t (Track Fragmentation)
evaluate the quality of the camera control and are defined as
t
T P O = |CF OV − CGT |
(3)
and
t
TF =
1, if T P E t is invalid
0,
otherwise
(4)
T F t indicates whether the target is inside the camera FOV.
T P E t and T P Ot are invalid and assigned -1 if the target is
outside the FOV. The overall metrics T P E, T P O, BOR are
the average metrics of the valid tracked frames. T F is the
sum of T F t divided by the number of processed frames. In
the experiments, we report only T F and BOR as they are
the most significant metrics. Besides T P E and BOR have
similar purpose, and so are T P O and T F .
III. TARGET P OSITION P REDICTION
In [2], the authors made the remark that for a tracker to be
successful, it should be either very fast, or should use some
kind of target position prediction to keep the target close to
the FOV of the camera. To assess the practicality of predicting
a target position based on previous track information, we
implemented three target motion models. Since there will be
a delay between frames, it is necessary to predict the object
position on the image sphere and move the camera accordingly
so that the target appears in its FOV. Therefore, the prediction
must account for the motion of the target and the motion of the
camera. For calculation, let a target in the first frame appear
at point P0 (on the spherical image). At next frame, the target
moves to P1 (again on the spherical image). We can calculate
its speed as V0 = P1 − P0 /t1 − t0 . Then in the third frame
if the target moved from P1 to P2 its speed would then be
V1 = P2 − P1 /t2 − t1 . Thus a basic classical mechanics model
can be used to estimate the next position in the fourth frame.
The position prediction should locate the target near the
image center as much as possible. By knowing the motion of
the target it is possible to predict where it will be later after
a delay ∆t . ∆t should account for the processing time of the
current frame in addition to the time it takes for the camera to
Model 2: Object is moving at a constant speed and uses
mean velocity in last two instant.
(V1 + V0 )
× ∆t
2
Model 3: Object can accelerate
∆d =
(1)
(5)
A × ∆t 2
+ V1 × ∆t
2
where A = V1 − V0 /t1 − t0 is the acceleration.
∆d =
(6)
(7)
IV. T ESTED T RACKERS
Among the 19 trackers we tested, six trackers are variations
of correlation filters: KCF, SRDCF, SWCF, DSST, DFST and
sKCF. Two trackers combine correlation filter outputs with
color: STAPLE and STAPLE+. One is based on structured
SVM: STRUCK. Two trackers are based purely on color:
DAT and ASMS. One tracker is based on normalized crosscorrelation: NCC. Two trackers are based on boosting: MIL
and BOOSTING. One tracker is based on optical flow (MEDIANFLOW) and one tracker includes a detector (TLD). Two
trackers can be categorized as part-based: DPCF and CTSE.
Another one combines many trackers in an ensemble: KFEBT. Below, we briefly describe the trackers. More details
can be found in the original papers describing each of them.
1) Kernelized Correlation Filter tracker (KCF) [3] KCF
is operating on HOG features. It localizes target with
the equivalent of a kernel ridge regression trained with
sample patches around the object at different translations.
This version of the KCF tracker includes multi-scale
support, sub-cell peak estimation and a model update by
linear interpolation.
2) Spatially Regularized Discriminative Correlation Filter Tracker (SRDCF) [4] This tracker is derived from
KCF. It introduces a spatial regularization function that
penalizes filter coefficients residing outside the target
area, thus solving the problems arising from assumptions
of periodicity in learning the correlation filters. The size
of the training and detection samples can be increased
without affecting the effective filter size. By selecting the
spatial regularization function to have a sparse discrete
Fourier spectrum, the filter is optimized directly in the
Fourier domain. SRDCF employs also Color Names and
greyscale features.
3) Spatial Windowing for Correlation Filter-Based Visual Tracking (SWCF) [5] This tracker is derived from
KCF. It predicts a spatial window for the observation of
the object so that the correlation output of the correlation
filter as well as the windowed observation are improved.
Moreover, the estimated spatial window of the object
4)
5)
6)
7)
8)
9)
10)
11)
patch indicates the object regions that are useful for
correlation.
Discriminative Scale Space Tracker (DSST) [6] DSST
extends the Minimum Output Sum of Squared Errors
(MOSSE)[7] tracker with robust scale estimation. DSST
also learns a one-dimensional discriminative scale filter
which is used to predict the target size. The intensity
features used in MOSSE [7] tracker are combined with a
pixel-dense representation of HOG features.
Dynamic Feature Selection Tracker (DFST) [8] DFST
is a visual tracking algorithm based on the real-time
selection of locally and temporally discriminative features. DFST provides a significant gain in accuracy and
precision with respect to KCF by the use of a dynamic set
of features. A further improvement is given by making
micro-shifts at the predicted position according the best
template matching.
Scalable Kernel Correlation Filter with Sparse Feature Integration (sKCF) [9] This tracker is derived
from KCF. It introduces an adjustable Gaussian window
function and a keypoint-based model for scale estimation.
It deals with the fixed window size limitation in KCF.
Sum of Template And Pixel-wise LEarners (STAPLE)
[10] STAPLE combines two image patch representations
that are sensitive to complementary factors to learn a
model that is robust to both color changes and deformations. It combines the scores of two models in a dense
window translation search. The scores of the two models
are indicative of their reliability.
An improved STAPLE tracker with multiple feature integration (STAPLE+) STAPLE+ is based on the
STAPLE tracker and improves it by integrating multiple
features. It extracts HOG features from color probability
map to exploit color information better. The final response
map is thus a fusion of scores obtained with different
features.
STRUCtured output tracking with Kernels
(STRUCK) [11] This is a framework for adaptive
visual object tracking. It applies a support vector
machine which is learned online. It introduces a
budgeting mechanism that prevents the unbounded
growth in the number of support vectors that would
otherwise occur during tracking.
Distractor Aware Tracker (DAT) [12] This is a trackingby-detection approach based on appearance. To distinguish the object from the surrounding areas, a discriminative model using color histograms is applied. It adapts
the object representation beforehand so that distractors
are suppressed and the risk of drifting is reduced.
Scale Adaptive Mean Shift (ASMS) [13] This is a
mean-shift tracker [14] optimizing the Hellinger distance
between a template histogram and the target in the image.
The optimization is done by a gradient descent. ASMS
addresses the problem of scale adaptation and scale
estimation. It also introduces two improvements over the
original mean-shift [14] to make the scale estimation
12)
13)
14)
15)
16)
17)
18)
19)
more robust in the presence of background clutter: 1)
a histogram color weighting and 2) a forward-backward
consistency check.
Normalized Cross-Correlation (NCC) [15] NCC follows the basic idea of tracking by searching for the best
match between a static grayscale template and the image
using normalized cross-correlation.
Multiple Instance Learning tracker (MIL) [16] MIL
uses a tracking-by-detection approach with multiple instance learning instead of traditional supervised learning
methods. It shows improved robustness to inaccuracies of
the tracker and to incorrectly labeled training samples.
BOOSTING [17] It is based on MIL[16]. This is a realtime object tracker based on a novel on-line version of the
AdaBoost algorithm. The classifier uses the surrounding
background as negative examples in the update step to
avoid the drifting problem.
MEDIANFLOW [18] This tracker uses optical flow to
match points between frames. The tracking is performed
forward and backward in time and the discrepancies between these two trajectories are measured. The proposed
error enables reliable detection of tracking failures and
selection of reliable trajectories in video sequences.
Tracking-learning-detection(TLD) [19] It combines
both a tracker and a detector. The tracker follows the
object from frame to frame using MEDIANFLOW [18].
The detector localizes the target using all appearances
that have been observed so far and corrects the tracker if
necessary. The learning estimates the detector errors and
updates it to avoid these errors in the future.
Deformable Part-based Tracking by Coupled Global
and Local Correlation Filters (DPCF) [20] This tracker
that is derived from KCF relies on joint interactions
between a global filter and local part filters. The local
filters provide an initial estimate which is used by the
global filter as a reference to determine the final result.
The global filter provides a feedback to the part filters. In
this way, it handles both partial occlusion (with the part
filters) but also scale changes (with the global filter).
Contextual Object Tracker with Structural Encoding
(CTSE)[21] This tracker uses contextual and structural
information (that is specific to a target object) into the
appearance model. This is first achieved by including
features from complementary region having correlated
motion with the target object. Second, a local structure
that represents the spatial constraints between features
within the target object is included. SIFT keypoints are
used as features to encode both these information.
Kalman filter ensemble-based tracker (KF-EBT) This
tracker combines the result of two other trackers:
ASMS[13] using a color histogram and KCF. Using a
Kalman filter, the tracker works in cycles of prediction
and correction. Firstly, a motion model predicts the target
next position. Secondly, the trackers results are fused with
the predicted position and the model is updated.
V. R ESULTS
AND ANALYSIS
In this section, we report our results on the 36 video
sequences of [2]. The video sequences that consist in tracking
persons, faces and objects include difficulties such as motion
blur, scale change, out-of-plane rotation, fast motion, cluttered
background, illumination variation, low resolution, occlusion,
presence of distractors and articulated objects. Results are
reported for the whole dataset.
A. Ranking method
During testing, we discovered that since different trackers
have different tracking speed, using only the four metrics in
section II-B is not enough. For example, some trackers have
T P E, T P O and BOR metrics the are good because they
track slowly in real-time simulation, which means they just
track a few frames correctly and all other frames are invalid
and are ignored for the calculation of the metrics. Under this
circumstance, the tracker succeed in tracking every processed
frames (which are only the first frames). Only T F can capture
to some extent this lack of performance as it verifies if the
target is in the FOV or not. Thus we consider another essential
metric: processed frame ratio (P R):
PR =
FN P
,
FT O
(8)
where FN P is the number of processed frames and FT O is
the total number of frames.
T F contains part of P R information since it stands for
whether the object is inside the FOV in the processed frames.
If P R is low, T F will be high since the tracker will not be able
to track the object correctly in the processed frames because
of the long interval between them. However, a high T F can
be caused also by poor robustness.
After considering the PTZ camera nature and the tracker test
results, we formulated a ranking formula. The formula stands
for the Euclidean distance between the point defined by the
pair (BOR, T F ) obtained by a tracker and the ideal tracker
(top-right point in figure 1). The score is thus:
p
(9)
Score = (1 − BOR)2 + T F 2 .
We selected T F and BOR because we consider that T P E
conveys similar information as BOR and T F conveys similar
information as T P O.
B. Results without processing delays
We have first set the execution ratio to zero in order to
compare different trackers for their performances for in-plane
rotations, out-of-plane rotations and drastic scene changes
caused by the camera motion. We are looking for the most
robust trackers, neglecting their processing times (they are set
to all perform at the same speed). Note that in this experiment,
the camera motion delays are considered as they reflects the
robustness of the trackers. If a tracker performs poorly, this
will cause unnecessary camera motion that will result in drop
frames.
TABLE I
T RACKER PERFORMANCES WITH EXECUTION RATIO SET TO 0 ON THE 36
VIDEO SEQUENCES OF [2]. T RACKERS ARE RANKED BASED ON THEIR
SCORE ( EQUATION 9).
Tracker Names
ASMS
DPCF [MATLAB]
TLD
DAT [MATLAB]
Staple+ [MATLAB]
Staple [MATLAB]
KF-EBT
DSST
STRUCK
SKCF
KCF
SWCF [MATLAB]
MIL
DFST [MATLAB]
BOOSTING
MEDIANFLOW
SRDCF [MATLAB]
NCC
CTSE
Score
0.65
0.71
0.72
0.72
0.72
0.72
0.74
0.78
0.85
0.87
0.88
0.88
0.89
0.90
0.92
0.98
1.01
1.03
1.21
BOR
0.42
0.40
0.56
0.35
0.37
0.36
0.36
0.38
0.31
0.30
0.28
0.31
0.28
0.27
0.26
0.27
0.73
0.24
0.04
TF
0.30
0.38
0.57
0.31
0.35
0.34
0.37
0.48
0.50
0.52
0.51
0.55
0.52
0.53
0.54
0.65
0.97
0.69
0.74
PR
0.92
0.80
0.41
0.77
1.00
1.00
0.98
0.92
0.94
0.91
0.95
0.75
0.85
0.93
0.62
0.95
0.14
0.90
0.44
Table I and Figure 1(a) give the results for the 19 trackers
based on their ranking. In the PTZ camera scenario, the
difficulties with in-plane and out-of-plane rotations will be amplified because of the application dynamic nature. Surprisingly,
trackers which adopted a scale adaptation function such as
SRDCF do not necessarily perform better than other trackers
due in great part to their slow execution speed. ASMS and
DPCF are the best performers in this experiment. In the VOT
2016 benchmark [1] there is no drop frames caused by delays
and less viewpoint changes caused by camera motion. Thus
it is reasonable that there is difference between the ranking
of our framework and that of the VOT ranking. However, our
ranking is still quite similar to that of VOT 2016 benchmark.
Trackers like Staple, Staple+, KCF-EBT and DAT are good
both in VOT benchmark and our benchmark. However, in
our benchmark the performance of ASMS is surprisingly the
best when it just ranked in the middle in VOT. And some
trackers like SRDCF do not behave well in our PTZ framework
probably because they do not output bounding boxes when the
tracking fails and as a result, the PTZ camera is not controlled
correctly. The VOT system will check every five frames to
verify whether the tracker has failed. If it has failed, it is
reinitialized. In our framework, we do not intervene in the
tracking process at all. Early failures are thus more penalized.
C. Results with processing delays
We then set the execution ratio to 1 to track objects. In the
real world the objects will keep moving while the tracker is
processing a frame. As a result, the task of tracking is harder
in this case since the intervals between processed frames are
caused both by the time for processing the frame and the
camera motion delay. P R should decline and the trackers
TABLE II
T RACKER PERFORMANCES WITH EXECUTION RATIO SET TO 1 ON THE 36
VIDEO SEQUENCES OF [2]. T RACKERS ARE RANKED BASED ON THEIR
SCORE ( EQUATION 9).
Tracker Names
ASMS
Staple [MATLAB]
KF-EBT
DAT [MATLAB]
TLD
DSST
KCF
STRUCK
SKCF
BOOSTING
Staple+ [MATLAB]
SRDCF [MATLAB]
DPCF [MATLAB]
DFST [MATLAB]
MEDIANFLOW
SWCF [MATLAB]
NCC
MIL
CTSE
Score
0.64
0.65
0.72
0.75
0.83
0.85
0.85
0.85
0.86
0.89
0.91
0.92
0.93
0.95
0.96
1.01
1.03
1.04
1.22
BOR
0.43
0.40
0.38
0.36
0.70
0.32
0.30
0.30
0.30
0.29
0.34
0.73
0.34
0.31
0.27
0.20
0.24
0.20
0.07
TF
0.29
0.25
0.36
0.39
0.77
0.51
0.49
0.49
0.50
0.53
0.62
0.88
0.65
0.65
0.62
0.61
0.69
0.66
0.79
PR
0.88
0.35
0.71
0.21
0.13
0.48
0.63
0.15
0.90
0.54
0.08
0.03
0.08
0.09
0.85
0.23
0.88
0.15
0.11
should lose targets more easily. Table II and Figure 1(b) give
the results for the 19 trackers.
Compared to the previous case, the ranking of trackers
changes. ASMS still ranks first, but DPCF degrades because
it is very slow and its P R value declines to 0.08 where it
was previously at 0.8. The other trackers relative rankings do
not change much, but the average score of trackers is higher,
which means that their performances are worse because of
the execution delay in the tracking process. Still, compared
to the VOT 2016 benchmark [1], the performance of ASMS
is still surprisingly the best. This means that this tracker is
particularly good for handling viewpoint changes. Finally, performance in VOT are better than for our task because we are
testing online tracking and camera control. The PTZ scenario
requires tracking people with different illumination variation,
different scale and from rapidly changing viewpoints. All of
those reasons make our results unique compared to other
benchmarks.
TABLE III
T RACKER PERFORMANCES WITH EXECUTION RATIO SET TO 1 AND WITH
VARIOUS PREDICTION METHODS ON THE 36 VIDEO SEQUENCES OF [2].
Tracker Names
KCF
KCF
KCF
KCF
BOOSTING
BOOSTING
BOOSTING
BOOSTING
Prediction
None
Model 1
Model 2
Model 3
None
Model 1
Model 2
Model 3
Score
0.85
1.06
0.97
1.05
0.89
1.03
1.10
1.08
BOR
0.30
0.20
0.24
0.24
0.29
0.26
0.17
0.18
TF
0.49
0.69
0.61
0.73
0.53
0.71
0.72
0.70
PR
0.63
0.14
0.15
0.12
0.54
0.12
0.12
0.11
tracker will lose the target. If the target cannot be tracked, its
speed will not be updated leading to an even worse situation
where the camera just rotate more or less randomly. The highspeed trackers are affected the most by wrong prediction. Their
process ratio decline from above 0.8 to below 0.2.
Therefore, we can conclude from this experiment that
although appealing in theory, compensating slow tracking by
a position prediction is not easy to apply in practice. It may
work for objects that are far away and that mostly move in
a plane, but it cannot work for target that are closer and that
are moving toward or away from the camera. In such cases,
the motion of the target cannot be predicted in 2D. For best
results, it is thus preferable to design a fast tracker.
VI. C ONCLUSION
This paper presented a benchmark of recent trackers for the
PTZ tracking scenario. Surprisingly, high-speed trackers, such
as MEDIANFLOW and NCC, do not necessarily behave better
than others. However, since predicting the target position was
shown to be difficult, slow trackers should be avoided for the
PTZ tracking task. The results of our test indicate that the top
performing tracker for the PTZ scenario is the ASMS tracker.
This tracker performed very well in accuracy as well as in robustness in our tests. It is impossible to conclusively determine
whether the performance of ASMS over other trackers come
from its image features or its approach. Nevertheless, results
of top trackers show that features play a significant role in the
final performance.
D. Target Position Prediction
Finally, we tested target position prediction to investigate if
it can help trackers to perform better. Table III gives results
for two trackers. Results are similar for all the other trackers.
The proposed models (see section III) for predicting the next
position of the target are not improving results. This is due
to the fact that the speed of the target is difficult to estimate
because it moves in 3D, but we estimate its motion in 2D.
Therefore, the predicted speed is not very accurate. After
calculating the speed, the framework will use this speed to
predict the target position in the next frame. It may cause
unnecessary large motion by the camera. For example, the
predicted target motion may be too large so the camera, by
rotating to this wrongly predicted position, will add delays
in the tracking process. This adds to the possibility that the
R EFERENCES
[1] M. Kristan, J. Matas, A. Leonardis, M. Felsberg, L. Cehovin, G. Fernández, T. Vojir, G. Hager, G. Nebehay,
and R. Pflugfelder, “The visual object tracking vot2016
challenge results,” in Proceedings of the IEEE international conference on computer vision workshops, 2016,
pp. 1–23.
[2] G. Chen, P.-L. St-Charles, W. Bouachir, G.-A. Bilodeau,
and R. Bergevin, “Reproducible evaluation of pan-tiltzoom tracking,” in Image Processing (ICIP), 2015 IEEE
International Conference on. IEEE, 2015, pp. 2055–
2059.
[3] J. F. Henriques, R. Caseiro, P. Martins, and J. Batista,
“High-speed tracking with kernelized correlation filters,”
process ratio = 0
BOR
0.8
0.6
0.4
0.2
0
1
0.5
0
kcf
boosting
medianflow
mil
dfst
srdcf
stapleplus
colorkcf
dpcf
swcf
dat
asms
tld
staple
struck
dsst
skcf
ncc
CTSE
TF
(a) Without processing delay
1
process ratio = 1
0.8
BOR
1
0.6
0.4
0.2
0
1
0.5
0
TF
(b) With processing delay
Fig. 1. BOR vs T F scatter plot without (left) and with processing delays (right) on the 36 video sequences of [2]. The legend that indicates the symbols
representing the trackers is the same for both plots. Ideal results are BOR = 1 and T F = 0.
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 37, no. 3, pp. 583–596, 2015.
M. Danelljan, G. Hager, F. Shahbaz Khan, and M. Felsberg, “Learning spatially regularized correlation filters
for visual tracking,” in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 4310–
4318.
E. Gundogdu and A. A. Alatan, “Spatial windowing
for correlation filter based visual tracking,” in Image
Processing (ICIP), 2016 IEEE International Conference
on. IEEE, 2016, pp. 1684–1688.
M. Danelljan, G. Häger, F. Khan, and M. Felsberg,
“Accurate scale estimation for robust visual tracking,” in
British Machine Vision Conference, Nottingham, September 1-5, 2014. BMVA Press, 2014.
D. S. Bolme, J. R. Beveridge, B. A. Draper, and Y. M.
Lui, “Visual object tracking using adaptive correlation
filters,” in Computer Vision and Pattern Recognition
(CVPR), 2010 IEEE Conference on. IEEE, 2010, pp.
2544–2550.
G. Roffo and S. Melzi, “Online feature selection for
visual tracking.” in BMVC, 2016.
A. S. Montero, J. Lang, and R. Laganiere, “Scalable
kernel correlation filter with sparse feature integration,”
in Computer Vision Workshop (ICCVW), 2015 IEEE
International Conference on. IEEE, 2015, pp. 587–594.
L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, and
P. H. Torr, “Staple: Complementary learners for realtime tracking,” in Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, 2016, pp.
1401–1409.
S. Hare, S. Golodetz, A. Saffari, V. Vineet, M.-M. Cheng,
S. L. Hicks, and P. H. Torr, “Struck: Structured output
tracking with kernels,” IEEE transactions on pattern
analysis and machine intelligence, vol. 38, no. 10, pp.
2096–2109, 2016.
[12] H. Possegger, T. Mauthner, and H. Bischof, “In defense
of color-based model-free tracking,” in Proceedings of
the IEEE Conference on Computer Vision and Pattern
Recognition, 2015, pp. 2113–2120.
[13] T. Vojir, J. Noskova, and J. Matas, “Robust scale-adaptive
mean-shift for tracking,” Pattern Recognition Letters,
vol. 49, pp. 250–258, 2014.
[14] D. Comaniciu, V. Ramesh, and P. Meer, “Real-time tracking of non-rigid objects using mean shift,” in Computer
Vision and Pattern Recognition, 2000. Proceedings. IEEE
Conference on, vol. 2. IEEE, 2000, pp. 142–149.
[15] J. P. Lewis, “Fast normalized cross-correlation,” in Vision
interface, vol. 10, no. 1, 1995, pp. 120–123.
[16] B. Babenko, M.-H. Yang, and S. Belongie, “Robust
object tracking with online multiple instance learning,”
IEEE transactions on pattern analysis and machine intelligence, vol. 33, no. 8, pp. 1619–1632, 2011.
[17] H. Grabner, M. Grabner, and H. Bischof, “Real-time
tracking via on-line boosting.”
[18] Z. Kalal, K. Mikolajczyk, and J. Matas, “Forwardbackward error: Automatic detection of tracking failures,” in Pattern recognition (ICPR), 2010 20th international conference on. IEEE, 2010, pp. 2756–2759.
[19] ——, “Tracking-learning-detection,” IEEE transactions
on pattern analysis and machine intelligence, vol. 34,
no. 7, pp. 1409–1422, 2012.
[20] O. Akin, E. Erdem, A. Erdem, and K. Mikolajczyk, “Deformable part-based tracking by coupled global and local
correlation filters,” Journal of Visual Communication and
Image Representation, vol. 38, pp. 763–774, 2016.
[21] T. Chakravorty, G.-A. Bilodeau, and E. Granger, “Contextual object tracker with structure encoding,” in Image
Processing (ICIP), 2015 IEEE International Conference
on. IEEE, 2015, pp. 4937–4941.
| 1cs.CV
|
Language-Based Image Editing with Recurrent attentive Models
arXiv:1711.06288v1 [cs.CV] 16 Nov 2017
Jianbo Chen∗ , Yelong Shen† , Jianfeng Gao† , Jingjing Liu† , Xiaodong Liu†
University of California, Berkeley∗ and Microsoft Research†
[email protected]
yeshen, jfgao, jingjl, [email protected]
Abstract
We investigate the problem of Language-Based Image Editing (LBIE) in this work. Given a source
image and a natural language description, we want to generate a target image by editing the source image based on the description. We propose a generic modeling framework for two sub-tasks of LBIE:
language-based image segmentation and image colorization. The framework uses recurrent attentive
models to fuse image and language features. Instead of using a fixed step size, we introduce for each region of the image a termination gate to dynamically determine in each inference step whether to continue
extrapolating additional information from the textual description. The effectiveness of the framework has
been validated on three datasets. First, we introduce a synthetic dataset, called CoSaL, to evaluate the
end-to-end performance of our LBIE system. Second, we show that the framework leads to state-of-theart performance on image segmentation on the ReferIt dataset. Third, we present the first language-based
colorization result on the Oxford-102 Flowers dataset, laying the foundation for future research.
1
Introduction
In this work, we aim to develop an automatic Language-Based Image Editing (LBIE) system. Given a
source image, which can be a sketch, a grayscale image or a natural image, the system will automatically
generate a target image by editing the source image following natural language instructions provided by
users. Such a system has a wide range of applications from Computer-Aided Design (CAD) to Virtual
Reality (VR). As illustrated in Figure 1, we can envision that a fashion designer presents a sketch of a pair
of new shoes (i.e., the source image) to a customer, who can provide modifications on the style and color
in verbal description, which can then be taken by the LBIE system to change the original design. The final
output (i.e., the target image) is the revised and enriched design that would meet the customers requirement.
Figure 2 showcases the use of LBIE for VR. While most VR systems are still using button-controlled or
touchscreen interface, LBIE provides a natural user interface for future VR systems, where users can easily
modify the base environment via natural language instructions.
LBIE can cover a broad range of tasks in image generation: shape, color, size, texture, position, etc.
This paper focuses on the two basic sub-tasks of LBIE: language-based segmentation and colorization for
shapes and colors. For example, in Figure 3, given the grayscale image and the expression “The flower
has red petals with yellow stigmas in the middle”, the segmentation model will identify each region of the
image as “petals”, “stigmas”, and the colorization model will paint each pixel with the suggested color. In
this intertwined task of segmentation and colorization, the distribution of target images can be multi-modal
in the sense that each pixel will have a definitive ground truth on segmentation, but not necessarily on color.
For example, the pixels on petals in Figure 3 should be red based on the textual description, but the specific
numeric values of the red color in RGB space is not uniquely specified. The system is required to colorize
the petals based on real-world knowledge. Another uncertainty lies in the fact that the input description
1
Figure 1: In an interactive design interface, a sketch of shoes is presented to a customer, who then gives
a verbal instruction on how to modify the design: “The insole of the shoes should be brown. The vamp
and the heel should be purple and shining”. The system will colorize the sketch following the customer’s
instruction. (images from [11]).
Figure 2: The image on the left is an initial virtual environment. The user provides a textual description:
“The afternoon light flooded the little room from the window, shining the ground in front of a brown bookshelf made of wood. Besides the bookshelf lies a sofa with light-colored cushions. There is a blue carpet in
front of the sofa, and a clock with dark contours above it...”. The system then modifies the virtual environment into the right image.
might not cover every detail of the image. Undescribed regions such as the leaves in the given example,
should be rendered based on past memory. In summary, the ultimate goal is to generate images guided by
the constraint of natural language expressions, but should also align with common sense of the real world.
Language-based image segmentation has been studied previously in [9]. However, our task is far more
challenging because the textual description in our task often contains multiple sentences (as in Figure 2),
while in [9] most of the expressions are simple phrases. To the best of our knowledge, language-based
colorization has not been studied systematically before. In most previous work, images are generated either
solely with natural language expressions [20],[30] or based on another image [11],[3],[31]. Instead, we want
to generate a target image based on both natural language expressions and source image. Related tasks will
be discussed in detail in Section 2.
A unique challenge in language-based image editing is the complexity of natural language expressions
and their correlation with the source images. Like the example shown in Figure 2, the description usually
consists of multiple sentences. Each sentence might refer to multiple objects in the source image. Many
details also need to be inferred from multiple sentences. When human edits the source image based on a
textual description, we often keep in mind which sentences are related to which region/object in the image,
and go back to the sentences multiple times while editing that region. This behavior of “going back” often
varies from region to region, depending on the complexity of the description for that region. An investigation
of this problem is carried out on CoSaL, a dataset introduced for the purpose, detailed in Section 4.
2
Figure 3: Left: sketch image. Middle: grayscale image. Right: color image (from [17]). A language-based
image editing system will take either of the first two images as the input, and generate the third color image
following a natural language expression: “The flower has red petals with yellow stigmas in the middle”,.
Our goal is to design a generic framework for the two sub-tasks in language-based image editing. A
diagram of the model is shown in Figure 4. Inspired by the observation aforementioned, we introduce a
recurrent attentive fusion module in our framework. The fusion module takes in image features encoding
the source image via a convolutional neural network, and textual features encoding the natural language
expression via an LSTM, and outputs the fused features to be upsampled by a deconvolutional network
into target images. In the fusion module, recurrent attentive models are employed to extract distinct textual
features based on the spatial features from different parts of an image. And a termination gate is introduced
for each region to control the number of steps it interacts with the textual features. A Gumbel-Softmax
reparametrization trick [12] is used for end-to-end training of the entire network. Details of the models and
the training process are described in Section 3.
Our contributions are summarized as follows:
• We define a new task of language-based image editing (LBIE).
• We present a generic modeling framework based on recurrent attentive models for two sub-tasks of
LBIE: language-based image segmentation and colorization.
• We introduce a synthetic dataset CoSaL to evaluate the end-to-end performance of the LBIE system.
• We achieve new state-of-the-art performance on language-based image segmentation on the ReferIt
dataset.
• We present the first language-based colorization result on the Oxford-102 Flowers dataset, laying the
foundation for future research.
2
Related Work
While the task of language-based image editing has not been studied, the community has taken significant
steps in several related areas, including Language Based object detection and Segmentation (LBS) [9],[10],
Image-to-Image Translation (IIT) [11], Generating Images from Text (GIT) [19], [30], Image Captioning
(IC) [13], [24], [28], Visual Question Answering (VQA) [2], [29], Machine Reading Comprehension (MRC)
[8], etc. We summarize the types of inputs and outputs for these related tasks in Table 1.
3
Recurrent Attentive-Fusion Module
Termination Gate 𝜏 2
Termination Gate 𝜏 1
Spatial Feature Map 𝑆 0 =V
Decoder
Spatial Feature Map 𝑆 1
Fusion
Spatial Feature Map 𝑆 𝑇
Output
𝑂
Fusion
Image Encoder
Attention
Attention
Attentive Feature Map 𝑈
Attentive Feature Map 𝑈1
0
Language Feature Vectors 𝑈
The flower has red petals with
yellow stigmas in the middle
Language Encoder
Figure 4: A high-level diagram of our model, composed of a convolutional image encoder, an LSTM text
encoder, a fusion module, a deconvolutional upsampling layer, with an optional convolutional discriminator.
MRC
VQA
IIT
IC
GIT
LBS
LBIE
Inputs
Text Image
YES
NO
YES YES
NO
YES
NO
YES
NO
YES
YES YES
YES YES
Outputs
Text Image
YES
NO
YES
NO
NO
YES
YES
NO
NO
YES
NO
YES
NO
YES
Table 1: The types of inputs and outputs for related tasks
Recurrent attentive models
Recurrent attentive models have been applied to visual question answering (VQA) to fuse language and
image features [29]. The stacked attention network proposed in [29] identifies the image regions that are
relevant to the question via multiple attention layers, which can progressively filter out noises and pinpoint
the regions relevant to the answer. In image generation, a sequential variational auto-encoder framework,
such as DRAW[7], has shown substantial improvement over standard variational auto-encoders (VAE) [15].
Similar ideas have also been explored for machine reading comprehension, where models can take multiple
iterations to infer an answer based on the given query and document [4], [26], [25], [27]. In [22] and [21],
a novel neural network architecture called ReasoNet is proposed for reading comprehension. ReasoNet
4
performs multi-step inference where the number of steps is determined by a termination gate according to
the difficulty of the problem. ReasoNet is trained using policy gradient methods.
Segmentation from language expressions
The task of language-based image segmentation is first proposed in [9]. Given an image and a natural language description, the system will identify the regions of the image that correspond to the visual entities
described in the text. The authors in [9] proposed an end-to-end approach which is composed of three
main components: a convolutional network to encode source images, an LSTM network to encode natural language descriptions, and a fully convolutional classification and upsampling network for pixel-wise
segmentation.
One of the key differences between their approach and ours is the way of integrating image and text
features. In [9], for each region in the image, the extracted spatial features are concatenated with the same
textual features. Inspired by the alignment model of [13], in our approach, each spatial feature is aligned
with different textual features based on attention models. Our approach yields superior segmentation results
than that of [9] on a benchmark dataset.
Conditional GANs in image generation
Generative adversarial networks (GANs) [6] have been widely used as a powerful tool for image generation.
Conditional GANs [16] are often employed when there are constraints that a generated image needs to
satisfy. For example, deep convolutional conditional GANs [18] have been used to synthesize images based
on textual descriptions [20] [30]. [11] proposed the use of conditional GANs for image-to-image translation.
Different from these tasks, LBIE takes both image and text as input, presenting an additional challenge of
fusing the features of the source image and the textual description.
3
The Framework
Overview The proposed modeling framework, as shown in 4, is based on neural networks, and is generic
to both the language-based image segmentation and colorization tasks. The framework is composed of a
convolutional image encoder, an LSTM text encoder, a fusion network that generates a fusion feature map
by integrating image and text features, a deconvolutional network that generates pixel-wise outputs (the
target image) by upsampling the fusion feature map, and an optional convolutional discriminator used for
training colorization models.
Image encoder The image encoder is a multi-layer convolutional neural network (CNN). Given a source
image of size H × W , the CNN encoder produces a M × N spatial feature map, with each position on the
feature map containing a D-dimensional feature vector (D channels), V = {vi : i = 1, . . . , M × N }, vi ∈
RD .
Language encoder The language encoder is a recurrent Long Short-Term Memory (LSTM) network.
Given a natural language expression of length L, we first embed each word into a vector through a word
embedding matrix, then use LSTM to produce for each word a contextual vector that encodes its contextual
information such as word order and word-word dependencies. The resulting language feature map is U =
{ui : i = 1, . . . , L}, ui ∈ RK .
5
Recurrent attentive fusion module The fusion network fuses text information in U into the M ×N image
feature map V , and outputs an M × N fusion feature map, with each position (image region) containing an
editing feature vector, O = {oi : i = 1, . . . , M × N }, oi ∈ RD .
The fusion network is devised to mimic the human image editing process. For each region in the source
image vi , the fusion network reads the language feature map U repeatedly with attention on different parts
each time until enough editing information is collected to generate the target image region. The number of
steps varies from region to region.
Internal state The internal state at time step t is denoted as S t = {sti , i = 1, . . . , M × N }, which
is a spatial feature map, with each poition (image region) containing a vector representation of the editing
information state. The initial state is the spatial feature map from the source image, S 0 = V . The sequence
of internal states is modeled by Convolutional Gated Recurrent Units (C-GRUs) which will be described
below.
Attention The attention at time step t is denoted as Û t = {ûti , i = 1, . . . , M × N }, which is a spatial
feature map generated based on the current internal state S t and the language feature map U :
Û t = Attention(U, S t ; θa )
where Attention(.) is implemented as follows
T
βij ∝ exp{sti W uj }
ûti =
L
X
βij uj .
j=1
C-GRUs C-GRUs update the current internal state S t by infusing the attention feature map Û t :
S t+1 = C-GRUs(S t , Û t ; θc ).
where C-GRUs(.) is implemented as follows
z = σ(W1 ⊗ S t + W2 ⊗ Û t + b1 ),
r = σ(W3 ⊗ S t + W4 ⊗ Û t + b2 ),
c = ReLU(W5 ⊗ (r
Ôt = h = (1 − z)
S t ) + W6 ⊗ Û t + b),
St + z
c,
S t+1 = W7 ⊗ h,
where is the elementwise-product, and ⊗ is the convolutional operator. Note that Ôt is the intermediate
output of the fusion feature map at time step t.
6
Termination gates There are M × N termination gates, each for one image region vi in V . Each
termination gate generates a binary random variable according to the current internal state of its image
region: τit ∼ p(·ftg (sti ; θtg )). If τit = 1, the fusion process for the image region vi stops at t, and the editing
feature vector for this image region is set as oi = ôti . When all terminate gates are true, the fusion process
for the entire image is completed, and the fustion network outputs the fusion feature map O.
We define ζ = (ζ1 , ζ2 , . . . , ζM ×N ), where ζi = (τi1 , τi2 , . . . , τiT ), a categorical distribution with p(ζi =
et ) = βit , where
Y
βit = ftg (sti ; θtg ) (1 − ftg (ski ; θtg )).
k<t
the probability of ith feature map stopping at time t.
Inference Algorithm 1 describes the stochastic inference process of the fusion network. The state
sequence S (1:T ) is hidden and dynamic, chained through attention and C-GRU in a recurrent fashion. The
fusion network outputs for each image region vi an editing feature vector oi at the ti -th step, where ti is
controlled by the ith termination gate, which varies from region to region.
Algorithm 1 Stochastic Inference of the Fusion Network
Require: V ∈ RD×(M ×N ) : Spatial feature map of image.
Require: U ∈ RK×L : Language feature map of expression.
Ensure: Fusion feature map O ∈ RD×(M ×N ) .
function F USION(V, U )
Initialize S 0 = V .
for all t = 0 to tmax − 1 do
Û t = Attention(U, S t ; θa )
S t+1 , Ôt = C-GRUs(S t , Û t ; θc )
Sample τ t+1 ∼ p(·|ftg (S t+1 ; θtg ))
if τit+1 = 1 and τis = 0 for s ≤ t then
Set Oi = Ôit+1 .
end if
end for
for all i = 1 to M × N do
if τi = 0 then
Set oi = ôitmax −1
end if
end for
end function
Image decoder The image decoder is a multi-layer deconvolutional network. It takes as input the M × N
fusion feature map O produced by the fusion module, and unsamples from O to produce a H × W × De
editing map E of the same size as the target image, where De is the number of classes in segmentation and
2 (ab channels) in colorization.
Discriminator The discriminator Dφ (E) takes in a generated image and outputs the probability of the
image being realistic. The structure of the discriminator follows that in [20], which uses a convolutional
7
neural network to extract features from the image. In our model, the discriminator serves the function of
judging whether an image looks natural, but not whether it is compatible with language descriptions. The
latter constraint is left to an L1 loss to be described later.
Loss and training Denote the loss as L(θ) = Eζ [l(E(ζζ , θ), Y )], where the expectation is taken over the
categorical variables ζ generated by termination gates, and lθ (ζζ ) = l(E(ζζ , θ), Y ) is the loss of output at ζ .
Because the sample space is of exponential size T M ×N , it is intractable to sum over the entire sample space.
We denote the density of ζ by pθ (ζζ ). A naive approach to approximation is to subsample the loss and update
parameters via the gradient of Monte Carlo estimate of loss:
∇θ L(θ) = ∇θ Eζ [lθ (ζζ )]
= ∇θ Eζ [lθ (ζζ )]
X
pθ (ζζ ) lθ (ζζ )∇θ log pθ (ζζ ) + ∇θ lθ (ζζ )
=
ζ
≈
1 X
lθ (ζζ )∇θ log pθ (ζζ ) + ∇θ lθ (ζζ ),
|S|
ζ ∈S
where S is a subset of ζ sampled from the distributon pθ (ζζ ). In experiments, we found the above Monte
Carlo estimate suffers from high variance. To resolve this issue, we employ the Gumbel-Softmax reparameterization trick [12], which replaces every ζi ∈ {0, 1}T sampled from Cat(β1 , β2 , . . . , βT ) by another
random variable zi generated from Gumbel-softmax distribution:
exp((log βit + εti )/λ)
zit = PT
,
t
t
k=1 exp((log βi + εi )/λ)
where λ is a temperature annealed via a fixed schedule and the auxiliary random variables ε1i , . . . , εTi are
i.i.d. samples drawn from Gumbel(0, 1) independent of the parameters βi :
εti = − log(− log uti ), uti ∼ Unif(0, 1).
Define z(εε, θ) = (z1 , z2 , . . . , zM N ). The loss can be rewritten as L(θ) = Eε [lθ (zz (εε, θ))], and the update is
approximated by taking the gradient of Monte Carlo estimates of the loss obtained from sampling ε .
We use two different losses for segmentation and colorization respectively.
Segmentation In segmentation, we assume there is a unique answer for each pixel on whether or not it
is being referred in the stage of segmentation. The response map E is of size H ×W ×De , which produces a
log probability for each class for each pixel. We use a pixel-wise softmax cross-entropy loss during training:
l(E, Y ) = Cross-Entropy(Softmax(E), Y ).
Colorization In colorization, the high-level goal is to generate realistic images under the constraint of
natural language expressions and input scene representations, we introduce a mixture of GAN loss and L1
loss for optimization as in [11]. A discriminator Dφ parametrized by φ is introduced for constructing the
GAN loss.
8
The response map E is the predicted ab color channels. It is combined with the grayscale source image
to produce a generated color image E 0 . The generator loss is a GAN loss taking E 0 as input, and L1 loss
between the ab channels of the target image Y and the response map E:
l(E, Y ) = log(1 − Dφ (E)) + γkE − Y k1 (γ = 0.01).
The discriminator Dφ is trained by first generating a sample E via Algorithm 1, combined with the
grayscale source image to produce E 0 , and optimize the following loss over φ:
log(Dφ (E 0 )) + log(1 − Dφ (Y )).
The generator loss and the discriminator loss are optimized alternatively in the training stage.
4
Experiments
We conducted three experiments to validate the performance of the proposed framework. A new dataset
“CoSaL” was introduced to test the capability of understanding multi-sentence descriptions and associating
the inferred textual features with visual features. Our framework also yielded state-of-the-art performance
on the benchmark dataset ReferIt [14] for image segmentation. A third experiment was carried out on the
Oxford-102 Flowers dataset [17], for the language-based colorization task.
4.1
Experiments on CoSaL
Dataset A synthetic dataset CoSAL - Colorizing Shapes with Artificial Language is introduced for studying the correlation between images and multi-sentence descriptions. Each image in the dataset consists of
nine shapes, paired with a textual description of the image. The goal of the task is defined as: given a blackwhite image and its corresponding description, train a model that can automatically colorize the nine shapes
following the textual description. Figure 5 shows an example of this task, which requires sophisticated
coreference resolution, multi-step inference and logical reasoning.
The dataset was created as follows: first, we divide a white-background image into 3 × 3 regions.
Each region contains a shape randomly sampled from a set of S shapes (e.g., squares, fat rectangles, tall
rectangles, circles, fat ellipses, tall ellipses, diamonds, etc.) Each shape is then filled with one of C color
choices, chosen at random. The position and the size of each shape are generated by uniform random
variables. As illustrated in Figure 5, the difficulty of this task increases with the number of color choices. In
our experiments, we specify C = 3 as a start point.
The descriptive sentences for each image can be divided into two categories: direct descriptions and
relational descriptions. The former prescribes the color of a certain shape (e.g., Diamond is red), and the
latter depicts one shape conditional of another (e.g., The shape left to Diamond is blue). To understand direct
descriptions, the model needs to associate a specified shape with its textual features. Relational description
adds another degree of difficulty, which calls for advanced inference capability of relational/multi-step reasoning. The ratio of direct descriptions to relational descriptions varies among different images, and all the
colors and shapes in each image are uniquely determined by the description. In our experiment, we randomly generated 50, 000 images with corresponding descriptions for training purpose, and 10, 000 images
with descriptions for testing.
9
Metric For this task, we use average IOU over nine shapes and the background as the evaluation metric.
Specifically, for each region, we compute the intersection-over-union (IOU), which is the ratio of the total
intersection area to the total union area of predicted colors and ground truth colors. We also compute the
IOU for the background (white) of each image. The IOU for 10 classes (9 shapes + 1 background) are
computed over the entire test set and then averaged.
Model Implementation A six-layer convolutional network is implemented as the image feature extractor.
Each layer has a 3 × 3 kernel with stride 1 and output dimension 4, 4, 8, 8, 16, 16. ReLU is used for nonlinearity after each layer, and a max-pooling layer with a kernel of size 2 is inserted after every two layers. Each
sentence in the textual description is encoded with bidirectional LSTMs that share parameters. The LSTMs
have 16 units. In the fusion network, the attention model has 16 units, the GRU cells use 16 units, and the
termination gate uses a linear map on top of the hidden state of each GRU cell. Two convolutional layers of
kernel size 1 × 1 with the output dimension of 16, 7 are put on top of the fused features as a classifier. Then
an upsampling layer is implemented on top of it, with a single-layer deconvolutional network of kernel size
16, stride 8 to upsample the classifier to the original resolution. The upsampling layer is initialized with
bilinear transforms. The maximum of T of termination steps vary from 1to4. When T = 1, the model is
reduced to simply concatenating features extracted from the convolutional network with the last vector from
LSTM.
Results Table 2 shows the average IoU of two models, with T = 1 and T = 4, respectively. Results
show that the model with attention and T = 4 achieves a better performance when there are more relational
descriptions in the dataset. When there are more direct descriptions, the two models achieve similar performance. This demonstrates the framework’s capability of interpreting multiple sentences and associating
them with the source image.
T
Attention
1
1
4
No
Yes
Yes
Number of direct descriptions
4
6
8
0.2107
0.4030
0.5033
0.2499
0.5220
0.5313
0.3186
0.7097
0.7017
Table 2: The average IoU of two models, without attention at T = 1 and with attention at T = 1, 4.
Performance varies among datasets with different ratios of direct to relational descriptions.
Figure 5 illustrates how the model with T = 3 interprets the nine sentences during each inference step.
Sentences in red are attended to in the first step. Those in yellow and green are attended in the next two
consecutive steps. One observation from the experiment was that the model first extracted information from
direct descriptions, and then focused on relational descriptions for additional reasoning.
4.2
Experiments on ReferIt
Dataset The ReferIt dataset is composed of 19, 894 photographs of real world scenes, along with 130, 525
natural language descriptions on 96, 654 distinct objects in those photographs [14]. The dataset contains
238 different object categories, including animals, people, buildings, objects and background elements (e.g.,
grass, sky). Both training and development datasets include 10, 000 images.
10
Figure 5: Right: ground truth image. Left: illustration of which sentences are attended to at each time step.
Red, yellow and green represent the first, second and third time step, respectively.
Model
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
IoU
SCRC bbox [10]
GroundeR bbox [5]
Hu, etc.[9]
Our model
9.73%
11.08%
34.02%
32.53%
4.43%
6.20%
26.71%
27.9%
1.51%
2.74%
19.32%
18.76%
0.27%
0.78%
11.63%
12.37%
0.03%
0.20%
3.92%
4.37%
21.72%
20.50%
48.03%
50.09%
Table 3: The results of previous models and our model on the ReferIt dataset.
Metric Following [9], we use two metrics for evaluation: 1) overall intersection-over-union (overall IoU)
of the predicted and ground truth of each region, averaged over the entire test set; 2) precision@threshold,
the percentage of test data whose (per image) IoU between prediction and ground truth is above the threshold. Thresholds are set to 0.5, 0.6, 0.7, 0.8, 0.9.
Model Implementation A VGG-16 architecture [23] is used as the image encoder for images of size 512×
512. Textual descriptions are encoded with an LSTM of 1, 024 units. In the fusion network, the attention
model uses 512 units and the GRU cells 1, 024 units, on top of which is a classifier and an upsampling layer
similar to the implementation in Section 4.1. The maximum number of inference steps is 3. ReLU is used
on top of each convolutional layer. L2-normalization is applied to the parameters of the network.
Results Table 3 shows the experimental results of our model and the baseline methods on the ReferIt
dataset. We see that our framework yields a better IoU and precision than [9]. Our hypothesis is that
the outperformance resulted from the unique attention mechanism used by our fusion network, which can
efficiently associate individual descriptive sentences with different regions of the source image. There is not
much discrepancy between the two models with T = 1 and T = 3, probably due to the fact that most textual
descriptions in this dataset are simple. Examples of semantic labels are provided in supplementary materials
11
Figure 6: First row: original images. Second row: results from the image-to-image translation model in
[11], without text input. Third row: results from our model, taking textual descriptions into account.
Figure 7: First row: original images. Second, third and fourth rows: results generated from our framework
with arbitrary text input: “The petals of the flower are red/blue/yellow”.
4.3
Experiments on Oxford-102 Flower Dataset
Dataset In this experiment, we use the Oxford-102 Flowers dataset [17], which contains 8, 189 images
from 102 flower categories. Each image has five textual descriptions [20]. Following [20], [19] and [1],
we split the dataset into 82 classes for training and 20 classes for testing. Given a grayscale image of a
flower and a description of the shapes and colors of the flower, the goal is to colorize the image following
the description.
Model Implementation A fifteen-layer convolutional network similar to [31] is used for encoding 64×64
images. Textual descriptions are encoded with an LSTM of 512 units. In the fusion network, the attention
model uses 128 units and the GRU cells 128 units. The image encoder is composed of 2 deconvolutional
layers, each followed by 2 convolutional layers, to upsample the fusion feature map to the target image space
of 64×64×2. The maximum length of the spatial RNN is 1. The discriminator is composed of five layers of
convolutional networks of stride 2, with the output dimension 256, 128, 64, 32, 31. The discriminator score
is the average of the final output. ReLU is used for nonlinearity following each convolutional layer, except
for the last one which uses the sigmoid function.
12
Results Due to the lack of available models for the task, we compare our framework with a previous model
developed for image-to-image translation as baseline, which colorizes images without the injection of texts.
The colorization results on 10 randomly-sampled images from the test set are shown in Figure 6. As we can
see, without text input, the baseline approach often colorizes images with the same color (in this dataset,
most images are painted with blue and white), while our framework can generate flowers similar to their
original colors which are specified in texts. Figure 7 also provides some examples of images generated with
arbitrary text input using the trained model.
5
Conclusion and Future Work
In this paper we introduce the problem of Language-Based Image Editing (LBIE), and propose a generic
modeling framework for two sub-tasks of LBIE: language-based image segmentation and colorization. At
the heart of the proposed framework is a fusion module that uses recurrent attentive models to dynamically
decide, for each region of an image, whether to continue the text-to-image fusion process. Our models have
demonstrated superior empirical results on three datasets, including the ReferIt dataset for image segmentation, the Oxford-102 Flower dataset for colorization, and a proposed CoSaL dataset for evaluating the
end-to-end performance of the LBIE system. In future, we will extend the framework to other image editing
subtasks. Another interesting area is to build a dialogue-based image editing system that allows users to edit
images in a more interactive and natural way.
References
[1] Z. Akata, S. Reed, D. Walter, H. Lee, and B. Schiele. Evaluation of output embeddings for fine-grained image
classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages
2927–2936, 2015. 12
[2] S. Antol, A. Agrawal, J. Lu, M. Mitchell, D. Batra, C. Lawrence Zitnick, and D. Parikh. Vqa: Visual question
answering. In Proceedings of the IEEE International Conference on Computer Vision, pages 2425–2433, 2015.
3
[3] Z. Cheng, Q. Yang, and B. Sheng. Deep colorization. In Proceedings of the IEEE International Conference on
Computer Vision, pages 415–423, 2015. 2
[4] B. Dhingra, H. Liu, Z. Yang, W. W. Cohen, and R. Salakhutdinov. Gated-attention readers for text comprehension. arXiv preprint arXiv:1606.01549, 2016. 4
[5] J. Donahue, L. Anne Hendricks, S. Guadarrama, M. Rohrbach, S. Venugopalan, K. Saenko, and T. Darrell.
Long-term recurrent convolutional networks for visual recognition and description. In Proceedings of the IEEE
conference on computer vision and pattern recognition, pages 2625–2634, 2015. 11
[6] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio.
Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014. 5
[7] K. Gregor, I. Danihelka, A. Graves, D. J. Rezende, and D. Wierstra. Draw: A recurrent neural network for image
generation. arXiv preprint arXiv:1502.04623, 2015. 4
[8] K. M. Hermann, T. Kocisky, E. Grefenstette, L. Espeholt, W. Kay, M. Suleyman, and P. Blunsom. Teaching
machines to read and comprehend. In Advances in Neural Information Processing Systems, pages 1693–1701,
2015. 3
[9] R. Hu, M. Rohrbach, and T. Darrell. Segmentation from natural language expressions. In European Conference
on Computer Vision, pages 108–124. Springer, 2016. 2, 3, 5, 11
[10] R. Hu, H. Xu, M. Rohrbach, J. Feng, K. Saenko, and T. Darrell. Natural language object retrieval. In Proceedings
of the IEEE Conference on Computer Vision and Pattern Recognition, pages 4555–4564, 2016. 3, 11
13
[11] P. Isola, J.-Y. Zhu, T. Zhou, and A. A. Efros. Image-to-image translation with conditional adversarial networks.
arXiv preprint arXiv:1611.07004, 2016. 2, 3, 5, 8, 12
[12] E. Jang, S. Gu, and B. Poole. Categorical reparameterization with gumbel-softmax. arXiv preprint
arXiv:1611.01144, 2016. 3, 8
[13] A. Karpathy and L. Fei-Fei. Deep visual-semantic alignments for generating image descriptions. In Proceedings
of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3128–3137, 2015. 3, 5
[14] S. Kazemzadeh, V. Ordonez, M. Matten, and T. L. Berg. Referit game: Referring to objects in photographs of
natural scenes. In EMNLP, 2014. 9, 10
[15] D. P. Kingma and M. Welling. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114, 2013. 4
[16] M. Mirza and S. Osindero. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784, 2014. 5
[17] M.-E. Nilsback and A. Zisserman. Automated flower classification over a large number of classes. In Proceedings
of the Indian Conference on Computer Vision, Graphics and Image Processing, Dec 2008. 3, 9, 12
[18] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative
adversarial networks. arXiv preprint arXiv:1511.06434, 2015. 5
[19] S. Reed, Z. Akata, H. Lee, and B. Schiele. Learning deep representations of fine-grained visual descriptions. In
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 49–58, 2016. 3, 12
[20] S. Reed, Z. Akata, X. Yan, L. Logeswaran, B. Schiele, and H. Lee. Generative adversarial text to image synthesis.
In International Conference on Machine Learning, pages 1060–1069, 2016. 2, 5, 7, 12
[21] Y. Shen, P.-S. Huang, M.-W. Chang, and J. Gao. Implicit reasonet: Modeling large-scale structured relationships
with shared memory. arXiv preprint arXiv:1611.04642, 2016. 4
[22] Y. Shen, P.-S. Huang, J. Gao, and W. Chen. Reasonet: Learning to stop reading in machine comprehension. In
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
pages 1047–1055. ACM, 2017. 4
[23] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv
preprint arXiv:1409.1556, 2014. 11
[24] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan. Show and tell: A neural image caption generator. In Proceedings
of the IEEE conference on computer vision and pattern recognition, pages 3156–3164, 2015. 3
[25] S. Wang and J. Jiang. Machine comprehension using match-lstm and answer pointer. arXiv preprint
arXiv:1608.07905, 2016. 4
[26] J. Weston, A. Bordes, S. Chopra, A. M. Rush, B. van Merriënboer, A. Joulin, and T. Mikolov. Towards aicomplete question answering: A set of prerequisite toy tasks. arXiv preprint arXiv:1502.05698, 2015. 4
[27] C. Xiong, V. Zhong, and R. Socher. Dynamic coattention networks for question answering. arXiv preprint
arXiv:1611.01604, 2016. 4
[28] K. Xu, J. Ba, R. Kiros, K. Cho, A. Courville, R. Salakhudinov, R. Zemel, and Y. Bengio. Show, attend and tell:
Neural image caption generation with visual attention. In International Conference on Machine Learning, pages
2048–2057, 2015. 3
[29] Z. Yang, X. He, J. Gao, L. Deng, and A. Smola. Stacked attention networks for image question answering. In
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 21–29, 2016. 3, 4
[30] H. Zhang, T. Xu, H. Li, S. Zhang, X. Huang, X. Wang, and D. Metaxas. Stackgan: Text to photo-realistic image
synthesis with stacked generative adversarial networks. arXiv preprint arXiv:1612.03242, 2016. 2, 3, 5
[31] R. Zhang, P. Isola, and A. A. Efros. Colorful image colorization. In European Conference on Computer Vision,
pages 649–666. Springer, 2016. 2, 12
14
| 1cs.CV
|
Simple average-case lower bounds for approximate near-neighbor
from isoperimetric inequalities
arXiv:1602.05391v2 [cs.DS] 6 Jan 2017
Yitong Yin∗
Abstract
We prove an Ω(d/ log sw
nd ) lower bound for the average-case cell-probe complexity of deterministic or Las Vegas randomized algorithms solving approximate near-neighbor (ANN) problem in
d-dimensional Hamming space in the cell-probe model with w-bit cells, using a table of size s.
This lower bound matches the highest known worst-case cell-probe lower bounds for any static
data structure problems.
This average-case cell-probe lower bound is proved in a general framework which relates the
cell-probe complexity of ANN to isoperimetric inequalities in the underlying metric space. A
tighter connection between ANN lower bounds and isoperimetric inequalities is established by
a stronger richness lemma proved by cell-sampling techniques.
1
Introduction
The nearest neighbor search (NNS) problem is a fundamental problem in Computer Science. In this
problem, a database y = (y1 , y2 , . . . , yn ) of n points from a metric space (X, dist) is preprocessed
to a data structure, and at the query time given a query point x from the same metric space, we
are asked to find the point yi in the database which is closest to x according to the metric.
In this paper, we consider a decision and approximate version of NNS, the approximate nearneighbor (ANN) problem, where the algorithm is asked to distinguish between the two cases: (1)
there is a point in the databases that is λ-close to the query point for some radius λ, or (2) all
points in the database are γλ-far away from the query point, where γ ≥ 1 is the approximation
ratio.
The complexity of nearest neighbor search has been extensively studied in the cell-probe model,
a classic model for data structures. In this model, the database is encoded to a table consisting of
memory cells. Upon each query, a cell-probing algorithm answers the query by making adaptive
cell-probes to the table. The complexity of the problem is measured by the tradeoff between the
time cost (in terms of number of cell-probes to answer a query) and the space cost (in terms of
sizes of the table and cells). There is a substantial body of work on the cell-probe complexity of
NNS for various metric space [2, 3, 5–8, 11, 12, 14, 16, 17, 20].
It is widely believed that NNS suffers from the “curse of dimensionality” [10]: The problem may
become intractable to solve when the dimension of the metric space becomes very high. Consider the
most important example, d-dimensional Hamming space {0, 1}d with d ≥ C log n for a sufficiently
∗
State Key Lab for Novel Software Technology, Nanjing University, China. [email protected]. This work was
supported by NSFC grants 61272081 and 61321491.
1
large constant C. The conjecture is that NNS in this metric remains hard to solve when either
approximation or randomization is allowed individually.
In a series of pioneering works [3, 5, 6, 11, 14], by a rectangle-based technique of asymmetric
communication complexity known as the richness lemma [15], cell-probe lower bounds in form of
Ω(d/ log s), where s stands for the number of cells in the table, were proved for deterministic approximate near-neighbor (due to Liu [14]) and randomized exact near-neighbor (due to Barkol and
Rabani [5]). Such lower bound is the highest possible lower bound one can prove in the communication model. This fundamental barrier was overcome by an elegant self-reduction technique
introduced in the seminal work of Pǎtraşcu and Thorup [18], in which the cell-probe lower bounds
for deterministic ANN and randomized exact near-neighbor were improved to Ω(d/ log sw
n ), where
w represents the number of bits in a cell. More recently, in a previous work of us [20], by applying
the technique of Pǎtraşcu and Thorup to the certificates in data structures, the lower bound for
deterministic ANN was further improved to Ω(d/ log sw
nd ). This last lower bound behaves differently
for the polynomial space where sw = poly(n), near-linear space where sw = n · polylog(n), and
linear space where sw = O(nd). In particular, the bound becomes Ω(d) when the space cost is
strictly linear in the entropy of the database, i.e. when sw = O(nd).
When both randomization and approximation are allowed, the complexity of NNS is substantially reduced. With polynomial-size tables, a Θ(log log d/ log log log d) tight bound was proved
for randomized approximate NNS in d-dimensional Hamming space [7, 8]. If we only consider the
decision version, the randomized ANN can be solved with O(1) cell-probes on a table of polynomial
size [8]. For tables of near-linear size, a technique called cell-sampling was introduced by Panigrahy et al. [16, 17] to prove Ω(log n/ log sw
n ) lower bounds for randomized ANN. This was later
extended to general asymmetric metrics [1].
Among these lower bounds, the randomized ANN lower bounds of Panigrahy et al. [16, 17] were
proved explicitly for average-case cell-probe complexity. The significance of average-case complexity
for NNS was discussed in their papers. A recent breakthrough in upper bounds [4] also attributes to
solving the problem on a random database. Retrospectively, the randomized exact near-neighbor
lower bounds due to the density version of richness lemma [5,6,11] also hold for random inputs. All
these average-case lower bounds hold for Monte Carlo randomized algorithms with fixed worst-case
cell-probe complexity. This leaves open an important case: the average-case cell-probe complexity
for the deterministic or Las Vegas randomized algorithms for ANN, where the number of cell-probes
may vary for different inputs.
1.1
Our contributions
We study the average-case cell-probe complexity of deterministic or Las Vegas randomized algorithms for the approximate near-neighbor (ANN) problem, where the number of cell-probes to
answer a query may vary for different query-database pairs and the average is taken with respect
to the distribution over input queries and databases.
For ANN in Hamming space {0, 1}n , the hard distribution over inputs is very natural: Every
point yi in the database y = (y1 , y2 , . . . , yn ) is sampled uniformly and independently from the
Hamming space {0, 1}d , and the query point x is also a point sampled uniformly and independently
from {0, 1}d . According to earlier average-case lower bounds [16,17] and the recent data-dependent
LSH algorthm [4], this input distribution seems to capture the hardest case for nearest neighbor
search and is also a central obstacle to overcome for efficient algorithms.
2
By a simple proof, we show the following lower bound for the average-case cell-probe complexity
of ANN in Hamming space with this very natural input distribution.
Theorem 1.1. For d ≥ 32 log n and d < no(1) , any deterministic or Las Vegas randomized algorithm solving (γ, λ)-approximate near-neighbor problem in d-dimensional Hamming space in the
cell-probe model with w-bitcells for w< no(1) , using a table of size s < 2d , must have expected
cell-probe complexity t = Ω
d
2
γ 2 log swγ
nd
, where the expectation is taken over both the uniform and
independent input database and query and the random bits of the algorithm.
This lower bound matches the highest known worst-case cell-probe lower bounds for any static
data structure problems. Such lower bound was only known for polynomial evaluation [13, 19] and
also worst-case deterministic ANN due to our previous work [20].
We also prove an average-case cell-probe lower bound for ANN under ℓ∞ -distance. The lower
bound matches the highest known worst-case lower bound for the problem [2].
In fact, we prove these lower bounds in a unified framework that relates the average-case cellprobe complexity of ANN to isoperimetric inequalities regarding an expansion property of the metric
space.
Inspired by the notions of metric expansion defined in [17], we define the following notion of
expansion for metric space. Let (X, dist) be a metric space. The λ-neighborhood of a point x ∈ X,
denoted as Nλ (x) is the set of all points in X within distance λ from x. Consider a distribution
µ over X. We say the λ-neighborhoods are weakly independent under distribution µ, if for any
point x ∈ X, the measure of the λ-neighborhood µ(Nλ (x)) < nβ for a constant β < 1. We say
the λ-neighborhoods are (Φ, Ψ)-expanding under distribution µ, if for any point set A ⊆ X with
1
, where Nλ (A) denotes the set of all points within distance
µ(A) ≥ Φ1 , we have µ(Nλ (A)) ≥ 1 − Ψ
λ from some point in A.
Consider the database y = (y1 , y2 , . . . , yn ) ∈ X n with every point yi sampled independently
from µ, and the query x ∈ X sampled independently from µ. We denote this input distribution as
µ × µn . We prove the following lower bound.
Theorem 1.2. For a metric space (X, dist), assume the followings:
• the γλ-neighborhoods are weakly independent under distribution µ;
• the λ-neighborhoods are (Φ, Ψ)-expanding under distribution µ.
Then any deterministic or Las Vegas randomized algorithm solving (γ, λ)-approximate near-neighbor
problem in (X, dist) in the cell-probe model with w-bit cells, using a table of size s, must have
expected cell-probe complexity
!
n log Ψ
log Φ
or t = Ω
t=Ω
sw
log n log
w + log s
Ψ
under input distribution µ × µn .
The key step to prove such a theorem is a stronger version of the richness lemma that we
prove in Section 3. The proof of this stronger richness lemma uses an idea called “cell-sampling”
introduced by Panigrahy et al. [17] and later refined by Larsen [13]. This new richness lemma as
well as this connection between the rectangle-based techniques (such as the richness lemma) and
information-theory-based techniques (such as cell-sampling) are of interests by themselves.
3
2
Preliminary
Let (X, dist) be a metric space. Let γ ≥ 1 and λ ≥ 0. The (γ, λ)-approximate near-neighbor
problem (γ, λ)-ANNnX is defined as follows: A database y = (y1 , y2 , . . . , yn ) ∈ X n of n points from
X is preprocessed and stored as a data structure. Upon each query x ∈ X, by accessing the data
structure we want to distinguish between the following two cases: (1) there is a point yi in the
database such that dist(x, z) ≤ λ; (2) for all points yi in the database we have dist(x, z) > γλ. For
all other cases the answer can be arbitrary.
More abstractly, given a universe X of queries and a universe Y of all databases, a data
structure problem is a function f : X × Y → Z that maps every pair of query x ∈ X and
database y ∈ Y to an answer f (x, y) ∈ Z. In our example of (γ, λ)-ANNnX , the query universe
is the metric space X, the database universe is the set Y = X n of all tuples of n points from X,
and f maps each query x ∈ X and database y ∈ Y to an Boolean answer: f (x, y) = 0 if there is
a λ-near neighbor of x in the database y; f (x, y) = 1 if no points in the database y is a γλ-near
neighbor of x; and f (x, y) can be arbitrary if otherwise. Note that due to a technical reason, we
usually use 1 to indicate the “no near-neighbor” case.
Given a data structure problem f : X × Y → Z, a code T : Y → Σs with alphabet Σ = {0, 1}w
encodes every database y ∈ Y to a table Ty of s cells with each cell storing a word of w bits. We
use [s] = {1, 2, . . . , s} to denote the set of indices of cells. For each i ∈ [s], we use Ty [i] to denote
the content of the i-th cell of table Ty ; and for S ⊆ [s], we write Ty [S] = (Ty [i])i∈S for the tuple
of the contents of the cells in S. Upon each query x ∈ X, a cell-probing algorithm adaptive
retrieves the contents of the cells in the table Ty (which is called cell-probes) and outputs the
answer f (x, y) at last. Being adaptive means that the cell-probing algorithm is actually a decision
tree: In each round of cell-probing the address of the cell to probe next is determined by the query
x as well as the contents of the cells probed in previous rounds. Together, this pair of code and
decision tree is called a cell-probing scheme.
For randomized cell-probing schemes, the cell-probing algorithm takes a sequence of random bits
as its internal random coin. In this paper we consider only deterministic or Las Vegas randomized
cell-probing algorithms, therefore the algorithm is guaranteed to output a correct answer when it
terminates.
When a cell-probing scheme is fixed, the size s of the table as well as the length w of each cell
are fixed. These two parameters together give the space complexity. And the number of cell-probes
may vary for each pair of inputs (x, y) or may be a random variable if the algorithm is randomized.
Given a distribution D over X × Y , the average-case cell-probe complexity for the cell-probing
scheme is given by the expected number of cell-probes to answer f (x, y) for a (x, y) sampled from
D, where the expectation is taken over both the input distribution D and the internal random bits
of the cell-probing algorithm.
3
A richness lemma for average-case cell-probe complexity
The richness lemma (or the rectangle method) introduced in [15] is a classic tool for proving cellprobe lower bounds. A data structure problem f : X × Y → {0, 1} is a natural communication
problem, and a cell-probing scheme can be interpreted as a communication protocol between the
cell-probing algorithm and the table, with cell-probes as communications.
Given a distribution D over X × Y , a data structure problem f : X × Y → {0, 1} is α-dense
4
under distribution D if ED [f (x, y)] ≥ α. A combinatorial rectangle A × B for A ⊆ X and B ⊆ Y
is a monochromatic 1-rectangle in f if f (x, y) = 1 for all (x, y) ∈ A × B.
The richness lemma states that if a problem f is dense enough (i.e. being rich in 1’s) and is
easy to solve by communication, then f contains large monochromatic 1-rectangles. Specifically, if
an α-dense problem f can be solved by Alice sending a bits and Bob sending b bits in total, then
f contains a monochromatic 1-rectangle of size α · 2−O(a) × α · 2−O(a+b) in the uniform measure.
In the cell-probe model with w-bit cells, tables of size s and cell-probe complexity t, it means the
monochromatic 1-rectangle is of size α · 2−O(t log s) × α · 2−O(t log s+tw) . The cell-probe lower bounds
can then be proved by refuting such large 1-rectangles for specific data structure problems f .
We prove the following richness lemma for average-case cell-probe complexity.
Lemma 3.1. Let µ, ν be distributions over X and Y respectively, and let f : X × Y → {0, 1}
be α-dense under the product distribution µ × ν. If there is a deterministic or randomized Las
Vegas cell-probing scheme solving f on a table of s cells, eachcell containing
w bits, with expected t
cell-probes under input distribution µ × ν, then for any ∆ ∈ 32t/α2 , s , there is a monochromatic
O(t/α2 )
s
and ν(B) ≥ α · 2−O(∆ ln ∆ +∆w) .
1-rectangle A × B ⊆ X × Y in f such that µ(A) ≥ α · ∆
s
Compared to the classic richness lemma, this new lemma has the following advantages:
• It holds for average-case cell-probe complexity.
• It gives stronger result even restricted to worst-case complexity. The newly introduced parameter ∆ should not be confused as an overhead caused by the average-case complexity
argument, rather, it strengthens the result even for the worst-case lower bounds. When
∆ = t it gives the bound in the classic richness lemma.
• The lemma claims the existence of a family of rectangles parameterized by ∆, therefore to
prove a cell-probe lower bound it is enough to refute any one rectangle from this family. As
we will see, this gives us a power to prove the highest lower bounds (even for the worst case)
known to any static data structure problems.
The proof of this lemma uses an argument called “cell-sampling” introduced by Panigrahy et
al. [16, 17] for approximate nearest neighbor search and later refined by Larsen [13] for polynomial
evaluation. Our proof is greatly influenced by Larsen’s approach.
The rest of this section is dedicated to the proof of this lemma.
3.1
Proof of the average-case richness lemma (Lemma 3.1)
By fixing random bits, it is sufficient to consider only deterministic cell-probing algorithms.
The high level idea of the proof is simple. Fix a table Ty . A procedure called the “cell-sampling
procedure” chooses the subset Γ of ∆ many cells that resolve the maximum amount of positive
queries. This associates each database y to a string ω = (Γ, Ty [Γ]), which we call a certificate,
where Ty [Γ] = (Ty [i])i∈Γ represent the contents of the cells in Γ. Due to the nature of the cellprobing algorithm, once the certificate is fixed, the set of queries it can resolve is fixed. We also
observe that if the density of 1’s in the problem f is Ω(1), then there is a Ω(1)-fraction of good
databases y such that amount of positive queries resolved by the certificate ω constructed by the
cell-sampling procedure is at least an ( ∆s )O(t) -fraction of all queries. On the other hand, since
s
+∆w)
∆w there are at most s 2∆w = 2O(∆ ln ∆
many certificates ω. Therefore,
ω ∈ [s]
∆
∆ × {0, 1}
5
s
s
at least 2−O(∆ ln ∆ +∆w) -fraction of good databases (which is at least 2−O(∆ ln ∆ +∆w) -fraction of all
databases) are associated with the same ω. Pick this popular certificate ω, the positive queries that
ω resolves together with the good databases that ω is associated with form the large monochromatic
1-rectangle.
Now we proceed to the formal parts of the proof. Given a database y ∈ Y , let Xy+ = {x ∈ X |
f (x, y) = 1} denote the set of positive queries on y. We use µ+
y = µXy+ to denote the distribution
+
induced by µ on Xy .
Let Pxy ⊆ [s] denote the set of cells probed by the algorithm to resolve query x on database y.
Fix a database y ∈ Y . Let Γ ⊆ [s] be a subset of cells. We say a query x ∈ X is resolved by Γ if
x can be resolved by probing only cells in Γ on the table storing database y, i.e. if Pxy ⊆ Γ. We
denote by
Xy+ (Γ) = {x ∈ Xy+ | Pxy ⊆ Γ}
the set of positive queries resolved by Γ on database y. Assume two databases y and y ′ are
indistinguishable over Γ: meaning that for the tables Ty and Ty′ storing y and y ′ respectively, the
cell contents Ty [i] = Ty′ [i] for all i ∈ Γ. Then due to the determinism of the cell-probing algorithm,
we have Xy+ (Γ) = Xy+′ (Γ), i.e. Γ resolve the same set of positive queries on both databases.
The cell-sampling procedure: Fix a database y ∈ Y and any ∆ ∈ 32t/α2 , s . Suppose we
have a cell-sampling procedure which does the following: The procedure deterministically1 chooses
a unique Γ ⊆ [s] such that |Γ| = ∆ and the measure µ(Xy+ (Γ)) of positive queries resolved by Γ
is maximized (and if there are more than one such Γ, the procedure chooses an arbitrary one of
them). We use Γ∗y to denote this set of cells chosen by the cell-sampling procedure. We also denote
by Xy∗ = Xy+ (Γ∗y ) the set of positive queries resolved by this chosen set of cells.
On each database y, the cell-sampling procedure chooses for us the most informative set Γ of
cells of size |Γ| = ∆ that resolve the maximum amount of positive queries. We use ωy = (Γ∗y , Ty [Γ∗y ])
to denote the contents (along with addresses) of the cells chosen by the cell-sampling procedure for
database y. We call such ωy a certificate chosen by the cell-sampling procedure for y.
Let y and y ′ be two databases. A simple observation is that if two databases y and y ′ have the
same certificate ωy = ωy′ chosen by the cell-sampling procedure, then the respective sets Xy∗ , Xy∗′
of positive queries resolved on the certificate are going to be the same as well.
Proposition 3.2. For any databases y, y ′ ∈ Y , if ωy = ωy′ then Xy∗ = Xy∗′ .
Let τ (x, y) = |P (x, y)| denote the number of cell-probes to resolve query x on database y. By
the assumption of the lemma, Eµ×ν [τ (x, y)] ≤ t for the inputs (x, y) sampled from the product
distribution µ × ν. We claim that there are many “good” columns (databases) with high density
of 1’s and low average cell-probe costs.
Claim 3.3. There is a collection Ygood ⊆ Y of substantial amount of good databases, such that
ν(Ygood ) ≥ α4 and for every y ∈ Ygood , the followings are true:
• the amount of positive queries is large: µ(Xy+ ) ≥ α2 ;
• the average cell-probe complexity among positive queries is bounded:
Ex∼µ+
[τ (x, y)] ≤
y
1
8t
.
α2
Being deterministic here means that the chosen set Γ∗y is a function of y.
6
Proof. The claim is proved by a series of averaging principles. First consider Ydense = {y ∈ Y |
µ(Xy+ ) ≥ α2 } the set of databases with at least α2 -density of positive queries. By the averaging
principle, we have ν(Ydense ) ≥ α/2. Since E[τ (x, y)] ≥ ν(Ydense )E[τ (x, y) | y ∈ Ydense ], we have
Eµ×νdense [τ (x, y)] ≤ 2t
α , where νdense = νYdense is the distribution induced by ν on Ydense . We then
construct Ygood ⊆ Ydense as the set of y ∈ Ydense with average cell-probe complexity bounded as
1
α
Ex∼µ [τ (x, y)] ≤ 4t
α . By Markov inequality νdense (Ygood ) ≥ 2 and hence ν(Ygood ) ≥ 4 . Note that
Ex∼µ [τ (x, y)] ≥ Ex∼µ+
[τ (x, y)]µ(Xy+ ). We have Ex∼µ+
[τ (x, y)] ≤ Ex∼µ [τ (x, y)]/µ(Xy+ ) ≤ α8t2 for
y
y
all y ∈ Ygood .
For the rest, we consider only these good databases. Fix any ∆ ∈ 32t/α2 , s . We claim that
for every good database y ∈ Ygood , the cell-sampling procedure always picks a subset Γ∗y ⊆ [s] of ∆
many cells, which can resolve a substantial amount of positive queries:
Claim 3.4. For every y ∈ Ygood , it holds that µ(Xy∗ ) ≥
α
4
2
∆ 8t/α
.
2s
Proof. Fix any good database y ∈ Ygood . We only need to prove there exists a Γ ⊆ [s] with |Γ| = ∆
2
∆ 8t/α
. The claims follows immediately.
that resolve positive queries µ(Xy+ (Γ)) ≥ α4 2s
[s]
We construct a hypergraph H ⊆ 2 with vertex set [s] as H = {Pxy | x ∈ Xy+ }, so that each
positive queries x ∈ Xy+ on database y is associated (many-to-one) to a hyperedge e ∈ H such
that e = Pxy is precisely the set of cells probed by the cell-probing algorithm to resolve query x on
database y.
We also define a measure µ̃ over hyperedges e ∈ H as the total measure (in µ+
y ) of the positive
queries x associated to e. Formally, for every e ∈ H,
X
µ̃(e) =
µ+
y (x).
x∈Xy+ :Pxy =e
P
P
Since e∈H µ̃(e) = x∈Xy+ µ+
y (x) = 1, this µ̃ is a well-defined probability distribution over hyperedges in H. Moreover, recalling that τ (x, y) = |Pxy |, the the average size of hyperedges
Ee∼µ̃ [|e|] = Ex∼µ+
[τ (x, y)] ≤
y
8t
.
α2
By the probabilistic method (whose proof is in the full paper [21]), there must exist a Γ ⊆ [s] of
size |Γ| = ∆, such that the sub-hypergraph HΓ induced by Γ has
1
µ̃(HΓ ) ≥
2
∆
2s
8t/α2
.
By our construction of H, the positive queries associated (many-to-one) to the hyperedges in the
induced sub-hypergraph HΓ = {Pxy | x ∈ Xy+ ∧ Pxy ⊆ Γ} are precisely those positive queries in
Xy+ (Γ) = {x ∈ Xy+ | Pxy ⊆ Γ}. Therefore,
+
µ+
y (Xy (Γ))
=
X
µ+
y (x)
x∈Xy+ ,Pxy ⊆Γ
7
1
= µ̃(HΓ ) ≥
2
∆
2s
8t/α2
.
Recall that µ(Xy+ ) ≥
α
2
for every y ∈ Ygood . And since Xy+ (Γ) ⊆ Xy+ , we have
µ(Xy+ (Γ))
=
+
+
µ+
y (Xy (Γ))µ(Xy )
α
≥
4
∆
2s
8t/α2
.
The claim is proved.
Recall that the certificate ωy = (Γ∗y , Ty [Γ∗y ]) is constructed by the cell-sampling procedure for
∆w of certificate, let Y denote the set of
database y. For every possible assignment ω ∈ [s]
ω
∆ × {0, 1}
good databases y ∈ Ygood with this certificate ωy = ω. Due to the determinism of the cell-sampling
s
procedure, this classifies the Ygood into at most ∆
2∆w many disjointed subclasses Yω . Recall that
α
ν(Ygood ) ≥ 4 . By the averaging principle, the following proposition is natural.
∆w , denoted as ω ∗ , such that
Proposition 3.5. There exists a certificate ω ∈ [s]
∆ × {0, 1}
ν(Yω∗ ) ≥
α
4
s ∆w .
∆ 2
On the other hand, fixed any ω, since all databases y ∈ Yω have the same ωy∗ , by Proposition 3.2
they must have the same Xy∗ . We can abuse the notation and write Xω = Xy∗ for all y ∈ Yω .
Now we let A = Xω∗ and B = Yω∗ , where ω ∗ satisfies Proposition 3.5. Due to Claim 3.4 and
Proposition 3.5, we have
α
µ(A) ≥
4
∆
2s
8t/α2
=α·
∆
s
O(t/α2 )
and
ν(B) ≥
4
s
α
= α · 2−O(∆ ln ∆ +∆w) .
∆w
2
s
∆
Note for every y ∈ B = Yω∗ , the A = Xω∗ = Xy+ (Γ∗y ) is a set of positive queries on database y, thus
A × B is a monochromatic 1-rectangle in f . This finishes the proof of Lemma 3.1.
4
Rectangles in conjunction problems
Many natural data structure problems can be expressed as a conjunction of point-wise relations
between the query point and database points. Consider data structure problem f : X × Y → {0, 1}.
Let Y = Y n , so that each database y ∈ Y is a tuple y = (y1 , y2 , . . . , yn ) of n points from Y. A
point-wise function g : X × Y → {0, 1} is given. The data structure problem f is defined as the
conjunction of these subproblems:
∀x ∈ X, ∀y = (y1 , y2 , . . . , yn ) ∈ Y,
f (x, y) =
n
^
g(x, yi ),
i=1
Many natural data structure problems can be defined in this way, for example:
• Membership query: X = Y is a finite domain. The point-wise function g(·, ·) is 6= that
indicates whether the two points are unequal.
• (γ, λ)-approximate near-neighbor (γ, λ)-ANNnX : X = Y is a metric space with distance
dist(·, ·). The point-wise function g is defined as: for x, z ∈ X, g(x, z) = 1 if dist(x, z) > γλ,
or g(x, z) = 0 if dist(x, z) ≤ λ. The function value can arbitrary for all other cases.
8
d
d
• Partial match PMd,n
Σ : Σ is an alphabet, Y = Σ and X = (Σ ∪ {⋆}) . The point-wise function
g is defined as: for x ∈ X and z ∈ Y, g(x, z) = 1 if there is an i ∈ [d] such that xi 6∈ {⋆, zi },
or g(x, z) = 0 if otherwise.
We show that refuting the large rectangles in the point-wise function g can give us lower bounds
for the conjunction problem f .
Let µ, ν be distributions over X and Y respectively, and let ν n be the product distribution on
Y = Y n . Let g : X × Y → {0, 1} be a point-wise function and f : X × Y → {0, 1} a data structure
problem defined by the conjunction of g as above.
Lemma 4.1. For f, g, µ, ν defined as above, assume that there is a deterministic or randomized Las
Vegas cell-probing scheme solving f on a table of s cells, each cell containing w bits, with expected
t cell-probes under input distribution µ × ν n . If the followings are true:
• the density of 0’s in g is at most
β
n
under distribution µ × ν for some constant β < 1;
1
Φ
• g does not contain monochromatic 1-rectangle of measure at least
µ × ν;
then
sw
n log Ψ
O(t)
≥Φ
or
t=Ω
n log Ψ
w + log s
×
1
Ψ
under distribution
.
Proof. By union bound, the density of 0’s in f under distribution µ × ν n is:
#
"n
^
β
g(x, yi ) = 0 ≤ n · x∼µ
Pr [g(x, z) = 0] ≤ n · = β.
Pr
x∼µ
n
z∼ν
y=(y1 ,...,yn )∼ν n
i=1
By Lemma 3.1, the Ω(1)-density of 1’s in f and the assumption of existing a cell-probing scheme
with parameters s, w and t, altogether imply that for any 4t ≤ ∆ ≤ s, f has a monochromatic
1-rectangle A × B such that
c 1 t
s
∆
µ(A) ≥
and ν n (B) ≥ 2−c2 ∆(ln ∆ +w),
(1)
s
for some constants c1 , c2 > 0 depending only on β.
Let C ⊂ Y be the largest set of columns in g to form a 1-rectangle with A. Formally,
C = {z ∈ Y | ∀x ∈ A, g(x, z) = 1}.
Clearly, for any monochromatic 1-rectangle A × D in g, we must have D ⊆ C. By definition of f as
a conjunction of g, it must hold that for all y = (y1 , y2 , . . . , yn ) ∈ B, none of yi ∈ y has g(x, yi ) = 0
for any x ∈ A, which means B ⊆ C n , and hence
ν n (B) ≤ ν n (C n ) = ν(C)n .
Recall that A × C is monochromatic 1-rectangle in g. Due to the assumption of the lemma, either
µ(A) < Φ1 or ν(C) < Ψ1 . Therefore, either µ(A) < Φ1 or ν n (B) < Ψ1n .
9
We can always choose a ∆ such that ∆ = O
n log Ψ
w
s
2−c2 ∆(ln ∆ +w) >
and ∆ = Ω
1
.
Ψn
n log Ψ
w+log s
to satisfy
If such ∆ is less than 32t/(1 − β)2 , then we immediately have a lower bound
n log Ψ
t=Ω
.
w + log s
Otherwise, due to (1), A × B is monochromatic 1-rectangle in f with ν n (B) >
must hold that µ(A) < Φ1 , which by (1) gives us
1
> µ(A) ≥
Φ
∆
s
O(t)
=
n log Ψ
sw
O(t)
1
Ψn ,
therefore it
,
which gives the lower bound
5
sw
n log Ψ
O(t)
≥ Φ.
Isoperimetry and ANN lower bounds
Given a metric space X with distance dist(·, ·) and λ ≥ 0, we say that two points x, x′ ∈ X are
λ-close if dist(x, x′ ) ≤ λ, and λ-far if otherwise. The λ-neighborhood of a point x ∈ X, denoted by
Nλ (x), is S
the set of all points from X which are λ-close to x. Given a point set A ⊆ X, we define
Nλ (A) = x∈A Nλ (x) to be the set of all points which are λ-close to some point in A.
In [17], a natural notion of metric expansion was introduced.
Definition 5.1 (metric expansion [17]). Let X be a metric space and µ a probability distribution
over X. Fix any radius λ > 0. Define
Φ(δ) ,
min
A⊂X,µ(A)≤δ
µ(Nλ (A))
.
µ(A)
The expansion Φ of the λ-neighborhoods in X under distribution µ is defined as the largest k such
1
, Φ(δ) ≥ k.
that for all δ ≤ 2k
We now introduce a more refined definition of metric expansion using two parameters Φ and Ψ.
Definition 5.2 ((Φ, Ψ)-expanding). Let X be a metric space and µ a probability distribution over
X. The λ-neighborhoods in X are (Φ, Ψ)-expanding under distributions µ if we have µ(Nλ (A)) ≥
1 − 1/Ψ for any A ⊆ X that µ(A) ≥ 1/Φ.
The metric expansion defined in [17] is actually a special case of (Φ, Ψ)-expanding: The expansion of λ-neighborhoods in a metric space X is Φ means the λ-neighborhoods are (Φ, 2)-expanding.
The notion of (Φ, Ψ)-expanding allows us to describe a more extremal expanding situation in metric
space: The expanding of λ-neighborhoods does not stop at measure 1/2, rather, it can go all the way
10
to be very close to measure 1. This generality may support higher lower bounds for approximate
near-neighbor.
Given a radius λ > 0 and an approximation ratio γ > 1, recall that the V
(γ, λ)-approximate near
neighbor problem (γ, λ)-ANNnX can be defined as a conjunction f (x, y) = i g(x, yi ) of point-wise
function g : X × X → {0, 1} where g(x, z) = 0 if x is λ-close to z; g(x, z) = 1 if x is γλ-far
from z; and g(x, z) is arbitrary for all other cases. Observe that g is actually (γ, λ)-ANN1X , the
point-to-point version of the (γ, λ)-approximate near neighbor.
The following proposition gives an intrinsic connection between the expansion of metric space
and size of monochromatic rectangle in the point-wise near-neighbor relation.
Proposition 5.1. If the λ-neighborhoods in X are (Φ, Ψ)-expanding under distribution µ, then the
function g defined as above does not contain a monochromatic 1-rectangle of measure ≥ Φ1 × 1.01
Ψ
under distribution µ × µ.
Proof. Since the λ-neighborhoods in X are (Φ, Ψ)-expanding, for any A ⊆ X with µ(A) ≥ Φ1 , we
have µ(Nλ (A)) ≥ 1 − Ψ1 . And by definition of g, for any monochromatic A × B, it must hold that
B ∩ Nλ (A) = ∅, i.e. B ⊆ X \ Nλ (A). Therefore, either µ(A) < Φ1 , or µ(B) = 1 − µ(Nλ (A)) ≤ Ψ1 <
1.01
Ψ .
The above proposition together with Lemma 4.1 immediately gives us the following corollary
which reduces lower bounds for near-neighbor problems to the isoperimetric inequalities.
Corollary 5.2. Let µ be a distribution over a metric space X. Let λ > 0 and γ ≥ 1. Assume
that there is a deterministic or randomized Las Vegas cell-probing scheme solving (γ, λ)-ANNnX on
a table of s cells, each cell containing w bits, with expected t cell-probes under input distribution
µ × µn . If the followings are true:
• Ex∼µ [µ(Nγλ (x))] ≤
β
n
for a constant β < 1;
• the λ-neighborhoods in X are (Φ, Ψ)-expanding under distribution µ;
then
sw
n log Ψ
O(t)
≥Φ
or
t=Ω
n log Ψ
w + log s
.
Remark 5.1. In [17], a lower bound for (γ, λ)-ANNnX was proved with the following form:
swt
n
t
≥ Φ.
In our Corollary 5.2, unless the cell-size w is unrealistically large to be comparable to n, the corollary
always gives the first lower bound
O(t)
sw
≥ Φ.
n log Ψ
Θ(d) , 2Θ(d) when
the
metric
space
is
2
This strictly improves the lower bound in [17]. For example,
expanding, this would give us a lower bound t = Ω logdsw , which in particular, when the space is
nd
linear (sw = O(nd)), becomes t = Ω(d).
11
5.1
Lower bound for ANN in Hamming space
Let X = {0, 1}d be the Hamming space with Hamming distance dist(·, ·). Recall that Nλ (x)
represents the λ-neighborhood around x, in this case, the Hamming ball of radius λ centered at x;
and for a set A ⊂ X, the Nλ (A) is the set of all points within distance λ to any point in A. For
any 0 ≤ r ≤ d B(r) = |Nr (0̄)| denote
of Hamming ball of radius r, where 0̄ ∈ {0, 1}d is
Pthe volume
d
the zero vector. Obviously B(r) = k≤r k .
The following isoperimetric inequality of Harper is well known.
Lemma 5.3 (Harper’s theorem [9]). Let X = {0, 1}d be the d-dimensional Hamming space. For
A ⊂ X, let r be such that |A| ≥ B(r). Then for every λ > 0, |Nλ (A)| ≥ B(r + λ).
In words, Hamming balls have the worst vertex expansion.
For 0 < r < d2 , the following upper bound for the volume of Hamming ball is well known:
d
2(1−o(1))dH(r/d) ≤
≤ B(r) ≤ 2dH(r/d) ,
r
where H(x) = −x log2 x − (1 − x) log2 (1 − x) is the Boolean entropy function.
Consider the Hamming (γ, λ)-approximate near-neighbor problem (γ, λ)-ANNnX . The hard distribution for this problem is just the uniform and independent distribution: For the database
y = (y1 , y2 , . . . , yn ) ∈ X n , each database point yi is sampled uniformly and independently from
X = {0, 1}n ; and the query point x is sampled uniformly and independently from X.
Theorem 5.4. Let d ≥ 32 log n. For any γ ≥ 1, there is a λ > 0 such that if (γ, λ)-ANNnX can be
solved by a deterministic or Las Vegas randomized cell-probing scheme on a table of s cells, each
cell containing
t cell-probes for uniform and independent database and query,
w bits, with expected
nd
d
.
then t = Ω 2 swγ2 or t = Ω γ 2 (w+log
s)
γ log
nd
Proof. Choose λ to satisfy γλ =
going to show:
• Ex∼µ [µ(Nγλ (x))] ≤
d
2
−
p
2d ln(2n). Let µ be uniform distribution over X. We are
1
2n ;
• the λ-neighborhoods in X are (Φ, Ψ)-expanding under distribution µ for some Φ = 2Ω(d/γ
2
and Ψ = 2Ω(d/γ ) .
2)
Then the cell-probe lower bounds follows directly from Corollary 5.2.
1
First, by the Chernoff bound, µ(Nγλ (x)) ≤ 2n
for any point x ∈ X. Thus trivially Ex∼µ [µ(Nγλ (x))] ≤
1
.
2n
d
On the other hand, for d ≥ 32 log n and n being sufficiently large, it holds that λ ≥ 4γ
. Let
d
d
−(1−H(r/d))d
dH(r/d)
r = 2 − 8γ . And consider any A ⊆ X with µ(A) ≥ 2
. We have |A| ≥ 2
≥ B(r).
Then by Harper’s theorem,
d
d
≥ 2d − B d2 − 8γ
= 2d − B(r) ≥ 2d − 2dH(r/d) ,
|Nλ (A)| ≥ B (r + λ) ≥ B d2 + 8γ
which means µ(Nλ (A)) ≥ 1 − 2−(1−H(r/d))d . In other words, the λ-neighborhoods in X are (Φ, Ψ)1
expanding under distribution µ for Φ = Ψ = 2(1−H(r/d))d , where r/d = 12 − 8γ
. Apparently
2
1 − H( 12 − x) = Θ(x2 ) for small enough x > 0. Hence, Φ = Ψ = 2Θ(d/γ ) .
12
5.2
Lower bound for ANN under L-infinity norm
Let Σ = {0, 1, . . . , m} and the metric space is X = Σd with ℓ∞ distance dist(x, y) = kx − yk∞ for
any x, y ∈ X.
Let µ be the distribution over X as defined
in [2]: First define a distribution π over Σ as
P
i
−(2ρ)
for all i > 0 and π(0) = 1 − i>0 π(i); and then µ is defined as µ(x1 , x2 , . . . , xd ) =
p(i) = 2
π(x1 )π(x2 ) . . . π(xd ).
The following isoperimetric inequality is proved in [2].
Lemma 5.5 (Lemma 9 of [2]). For any A ⊆ X, it holds that µ(N1 (A)) ≥ (µ(A))1/ρ .
Consider the (γ, λ)-approximate near-neighbor problem (γ, λ)-ANNnℓ∞ defined in the metric
space X under ℓ∞ distance. The hard distribution for this problem is µ × µn : For the database
y = (y1 , y2 , . . . , yn ) ∈ X n , each database point yi is sampled independently according to µ; and the
query point x is sampled independently from X according to µ. The following lower bound has
been proved in [2] and [12].
Fix any ǫ > 0 and 0 < δ < 21 . Assume Ω log1+ǫ n ≤ d ≤ o(n). For 3 < c ≤ O(log log d), define
ρ = 21 ( 4ǫ log d)1/c > 10. Now we choose γ = logρ log d and λ = 1.
Theorem 5.6. With d, γ, λ, ρ and the metric space X defined as above, if (γ, λ)-ANNnℓ∞ can be
solved by a deterministic or Las Vegas randomized cell-probing scheme on a table of s cells, each
cell containing w ≤ n1−2δ bits, with expected t ≤ ρ cell-probes under input distribution µ × µn , then
sw = nΩ(ρ/t) .
Proof. The followings are true
• µ(Nγλ (x)) =
e− log
1+ǫ/3 n
n
≤
1
2n
for any x ∈ X (Claim 6 in [2]);
δ
• the λ-neighborhoods in X are (nδρ , nδn−1 )-expanding under distribution µ for Φ = nδρ and
2
Ψ = 2Ω(d/γ ) .
δ
To see the expansion is true, let Φ = nδρ and Ψ = nδn−1 . By Lemma 5.5, for any set A ⊂ X
with µ(A) ≥ Φ, we have µ(Nλ (A)) ≥ n−δ ≥ 1 − Ψ1 . This means λ-neighborhoods of M are
δ
(nδρ , nδn−1 )-expanding.
1−δ
O(t)
n
≥ nδρ or t = Ω w+log
Due to Corollary 5.2, either nsw
1−δ
s . The second bound is always
higher with our ranges for w and t. The first bound gives sw = nΩ(ρ/t) .
References
[1] Amirali Abdullah and Suresh Venkatasubramanian. A directed isoperimetric inequality with
application to bregman near neighbor lower bounds. In STOC’15.
[2] Alexandr Andoni, Dorian Croitoru, and Mihai Pǎtraşcu. Hardness of nearest neighbor under
L-infinity. In FOCS’08.
[3] Alexandr Andoni, Piotr Indyk, and Mihai Pǎtraşcu. On the optimality of the dimensionality
reduction method. In FOCS’06.
13
[4] Alexandr Andoni and Ilya Razenshteyn. Optimal data-dependent hashing for approximate
near neighbors. In STOC’15.
[5] Omer Barkol and Yuval Rabani. Tighter lower bounds for nearest neighbor search and related
problems in the cell probe model. Journal of Computer and System Sciences, 64(4):873–896,
2002. Conference version in STOC’00.
[6] Allan Borodin, Rafail Ostrovsky, and Yuval Rabani. Lower bounds for high dimensional nearest
neighbor search and related problems. In Discrete and Computational Geometry, pages 253–
274, 2003. Conference version in STOC’99.
[7] Amit Chakrabarti, Bernard Chazelle, Benjamin Gum, and Alexey Lvov. A lower bound on
the complexity of approximate nearest-neighbor searching on the hamming cube. In Discrete
and Computational Geometry, pages 313–328, 2003. Conference version in STOC’99.
[8] Amit Chakrabarti and Oded Regev. An optimal randomised cell probe lower bound for approximate nearest neighbour searching. In SIAM Journal on Computing, 39(5):1919–1940,2010.
Conference version in FOCS’04.
[9] L.H. Harper. Optimal numberings and isoperimetric problems on graphs. Journal of Combinatorial Theory, 1(3):385 – 393, 1966.
[10] Piotr Indyk. Nearest neighbors in high-dimensional spaces. Handbook of Discrete and Computational Geometry, pages 877–892, 2004.
[11] T.S. Jayram, Subhash Khot, Ravi Kumar, and Yuval Rabani. Cell-probe lower bounds for
the partial match problem. In Journal of Computer and System Sciences, 69(3):435–447, 2004.
Conference version in STOC’03.
[12] Michael Kapralov and Rina Panigrahy. NNS lower bounds via metric expansion for ℓ∞ and
EMD. In ICALP’12.
[13] Kasper Green Larsen. Higher cell probe lower bounds for evaluating polynomials. In FOCS’12.
[14] Ding Liu. A strong lower bound for approximate nearest neighbor searching. Information
Processing Letters, 92(1):23–29, 2004.
[15] Peter Bro Miltersen, Noam Nisan, Shmuel Safra, and Avi Wigderson. On data structures and
asymmetric communication complexity. Journal of Computer and System Sciences, 57(1):37–
49, 1998. Conference version in STOC’95.
[16] Rina Panigrahy, Kunal Talwar, and Udi Wieder. A geometric approach to lower bounds for
approximate near-neighbor search and partial match. In FOCS’08.
[17] Rina Panigrahy, Kunal Talwar, and Udi Wieder. Lower bounds on near neighbor search via
metric expansion. In FOCS’10.
[18] Mihai Pǎtraşcu and Mikkel Thorup. Higher lower bounds for near-neighbor and further rich
problems. SIAM Journal on Computing, 39(2):730–741, 2010. Conference version in FOCS’06.
14
[19] Alan Siegel. On universal classes of fast high performance hash functions, their time-space
tradeoff, and their applications. In FOCS’89.
[20] Yaoyu Wang and Yitong Yin. Certificates in data structures. In ICALP’14.
[21] Yitong Yin. Simple average-case lower bounds for approximate near-neighbor from isoperimetric inequalities. arXiv preprint arXiv:1602.05391.
15
| 8cs.DS
|
arXiv:1710.04349v1 [math.ST] 12 Oct 2017
Asymptotic theory for maximum likelihood estimates in
reduced-rank multivariate generalised linear models
Efstathia Bura
a∗
∗a∗
, Sabrina Duarteb, Liliana Forzanib, Ezequiel Smuclerc, Mariela Suedc
Institute of Statistics and Mathematical Methods in Economics, TU Wien, A-1040
Vienna, Austria and Department of Statistics, George Washington University,
Washington, D.C. 20052, U.S.A.
b
Facultad de Ingenierı́a Quı́mica, UNL, Researcher of CONICET, 3000 Santa Fe,
Argentina
c
Instituto de Cálculo, UBA, CONICET, FCEN, 1428 Buenos Aires, Argentina
Abstract
Reduced-rank regression is a dimensionality reduction method with many applications. The asymptotic theory for reduced rank estimators of parameter matrices in multivariate linear models has been
studied extensively. In contrast, few theoretical results are available for reduced-rank multivariate generalised linear models. We develop M-estimation theory for concave criterion functions that are maximised
over parameters spaces that are neither convex nor closed. These results are used to derive the consistency
and asymptotic distribution of maximum likelihood estimators in reduced-rank multivariate generalised
linear models, when the response and predictor vectors have a joint distribution. We illustrate our results
in a real data classification problem with binary covariates.
Keywords: M-estimation; exponential family; rank restriction; non-convex; parameter spaces
∗
Corresponding author. Email: [email protected]
1
1
Introduction
The multivariate multiple linear regression model for a q-dimensional response Y = (Y1, . . . , Yq )T and a pdimensional predictor vector X = (X1 , . . . , Xp )T postulates that Y = BX +ǫ, where B is a q×p matrix and ǫ =
(ǫ1 , . . . , ǫq )T is the error term, with E(ǫ) = 0 and var(ǫ) = Σ. Based on a random sample (X1 , Y1), . . . , (Xn , Yn )
satisfying the model,
P ordinary least squares estimates the parameter matrix B by minimizing the squared
error loss function ni=1 ||Yi − BXi ||2 to obtain
bols =
B
n
X
i=1
Yi XiT
!
n
X
i=1
Xi XiT
!−1
.
(1)
Reduced-rank regression introduces a rank constraint on B, so that (1) is minimized subject to the
T
bT
bT
constraint rank(B) ≤ r, where r < min(p, q). The solution is B
RRR = Bols Ur Ur , where Ur are the first r
bols X T [see, e.g., Reinsel and Velu (1998)].
singular vectors of Yb T = B
Reduced-rank regression has attracted attention as a regularization method by introducing a shrinkage
penalty on B. Moreover, it is used as a dimensionality reduction method as it constructs latent factors in the
predictor space that explain the variance of the responses.
Anderson (1951) obtained the likelihood-ratio test of the hypothesis that the rank of B is a given number
and derived the associated asymptotic theory under the assumption of normality of Y and non-stochastic
X. Under the assumption of joint normality of Y and X, Izenman (1975) obtained the asymptotic distribution of the estimated reduced-rank regression coefficient matrix and drew connections between reduced-rank
regression, principal component analysis and correlation analysis. Specifically, principal component analysis
coincides with reduced-rank regression when Y = X (Izenman (2008)). The monograph by Reinsel and Velu
(1998) contains a comprehensive survey of the theory and history of reduced rank regression, including in
time series, and its many applications.
Despite the application potential of reduced-rank regression, it has received limited attention in generalised
linear models. Yee and Hastie (2003) were the first to introduce reduced-rank regression to the class of
multivariate generalised linear models, which covers a wide range of data types for both the response and
predictor vectors, including categorical data. Multivariate or vector generalised linear models is the topic of
Yee’s (2015) book, which is accompanied by the associated R packages VGAM and VGAMdata. Yee and Hastie
(2003) proposed an alternating estimation algorithm, which was shown to result in the maximum likelihood
estimate of the parameter matrix in reduced-rank multivariate generalised linear models by Bura, Duarte and
Forzani (2016). Asymptotic theory for the restricted rank maximum likelihood estimates of the parameter
matrix in multivariate GLMs has not been developed yet.
In general, a maximum likelihood estimator is a concave M-estimator in the sense that it maximizes the
empirical mean of a concave criterion function. Asymptotic theory for M-estimators defined through a concave
function has received much attention. Huber (1967), Haberman (1989) and Niemiro (1992) are among the
classical references. More recently, Hjort and Pollard (2011) presented a unified framework for the statistical
2
theory of M-estimation for convex criterion functions that are minimized over open convex sets of a Euclidean
space. Geyer (1994) studied M-estimators restricted to a closed subset of a Euclidean space.
The rank restriction in reduced rank regression imposes constraints that have not been studied before
in M-estimation as they result in neither convex nor closed parameter spaces. In this paper we (a) develop
M-estimation theory for concave criterion functions, which are maximized over parameters spaces that are
neither convex nor closed, and (b) apply the results from (a) to obtain asymptotic theory for reduced rank
regression estimators in generalised linear models. Specifically, we derive the asymptotic distribution and
properties of maximum likelihood estimators in reduced-rank multivariate generalised linear models where
both the response and predictor vectors have a joint distribution. The asymptotic theory we develop covers
reduced-rank regression for linear models as a special case. We show the improvement in inference the
asymptotic theory offers via analysing the data set Yee and Hastie (2003) analysed.
Throughout, for a function f : Rq → R, ∇f (x) denotes the row vector ∇f (x) = (∂f (x)/∂x1 , . . . , ∂f (x)/∂xq ),
f˙(x) stands for the column vector of derivatives, while ∇2 f (x) denotes the symmetric matrix of second order
derivatives. For a vector valued function f : Rq1 → Rq2 , ∇f denotes the q2 × q1 matrix,
∂f1
∂f1
∂f1
·
·
·
∂x2
∂xq1
1
∂x
∂f2 ∂f2 · · · ∂f2
∂x
∂x2
∂xq1
∇f (x) = . 1
.
.
..
.
.
..
..
.
∂fq2
∂fq2
∂fq2
· · · ∂xq
∂x1
∂x2
1
2
M-estimators
Let Z be a random vector taking values in a measurable space Z and distributed according to the law
P . We are interested in estimating a finite dimensional parameter ξ0 = ξ0 (P ) using n independent and
identically distributed copies Z1 , Z2 , . . . , Zn of Z. In the sequel, we use P f to denote the mean of f (Z); i.e.,
P f = E[f (Z)].
Let Ξ be a subset of an Euclidean space and mΞ : Z → R be a known function. Assume that the parameter
of interest ξ0 is the maximizer of the map ξ 7→ P mξ defined on Ξ. One can estimate ξ0 by maximizing an
empirical version of the optimization criterion. Specifically, given a known function mξ : Z 7→ R, define
M(ξ) := P mξ
and Mn (ξ) := Pn mξ ,
(2)
P
where, here and throughout, Pn denotes the empirical mean operator Pn V = n−1 n1=1 Vi . Hereafter, Mn (ξ)
and Pn mξ will be used interchangeably as the criterion function, depending on which of the two is appropriate
in a given setting.
Assume that ξ0 is the unique maximizer of the deterministic function M defined in (2). An M-estimator
3
for the criterion function Mn over Ξ is defined as
n
1X
mξ (Zi ) over Ξ .
ξbn = ξbn (Z1 , . . . , Zn ) maximizing Mn (ξ) =
n i=1
(3)
If the maximum of the criterion function Mn over Ξ is not attained but the supremum of Mn over Ξ is finite,
any value ξbn that almost maximizes the criterion function, in the sense that it satisfies
Mn (ξbn ) ≥ sup Mn (ξ) − An
(4)
ξ∈Ξ
for An small, can be used instead.
Definition 2.1. An estimator ξbn that satisfies (4) with An = op (1) is called a weak M-estimator for the
criterion function Mn over Ξ. When An = op (n−1 ), ξbn is called a strong M-estimator.
Proposition 6.1 in the Appendix lists the conditions for the existence, uniqueness and strong consistency
of an M-estimator, as defined in (3), when Mn is concave and the parameter space is convex. Under regularity
conditions, as those stated in Theorem 5.23 in van der Vaart (2000), the asymptotic expansion and distribution
of a consistent strong M-estimator [see Definition 2.1] for ξ0 is given by
√
n
1 X
IFξ0 (Zi ) + op (1),
n(ξbn − ξ0 ) = √
n i=1
(5)
where IFξ0 (Zi ) = −Vξ−1
ṁξ0 (Zi ), and Vξ0 is the nonsingular symmetric second derivative matrix of M(ξ) at
0
ξ0 .
2.1
Restricted M-estimators
We now consider the optimization of Mn over Ξres ⊂ Ξ, where Ξres is the image of a function that is not
necessarily injective. Specifically, we restrict the optimization problem to the set Ξres by requiring:
Condition 2.2. There exists an open set Θ ⊂ Rq and a map g : Θ → Ξ such that ξ0 ∈ g(Θ) = Ξres .
Even when an M-estimator for the unrestricted problem as defined in (3) exists, there is no a priori
guarantee that the supremum is attained when considering the restricted problem. Nevertheless, Lemma 2.3
establishes the existence of a restricted strong M-estimator, regardless of whether the original M-estimator is
a real maximiser, weak or strong. All proofs are provided in the Appendix.
Lemma 2.3. Assume there exists a weak/strong M-estimator ξbn for the criterion function Mn over Ξ. If
Condition 2.2 holds, then there exists a strong M-estimator ξbnres for the criterion function Mn over Ξres .
4
Proposition 2.4 next establishes the existence and consistency of a weak restricted M-estimator sequence
when mξ (z) is a concave function in ξ under the same assumptions as those of the unrestricted problem,
stated in Proposition 6.1 in the Appendix.
Proposition 2.4. Assume that Condition 2.2 holds. Then, under the assumptions of Proposition 6.1 in
the Appendix, there exists a strong M-estimator of the restricted problem over Ξres . Morevoer, any strong
M-estimator of the restricted problem converges to ξ0 in probability.
We derive next the asymptotic distribution of ξbnres = g(θbn ), with θbn ∈ Θ. The constrained estimator ξbnres is
√
well defined under Lemma 2.3, even when θbn is not uniquely determined. If θbn were unique and n(θbn − θ)
had an asymptotic distribution, one could use a Taylor series expansion for g to derive asymptotic results for
ξbnres . Building on this idea, Condition 2.5 introduces a parametrization of a neighborhood of ξ0 that allows
applying standard tools in order to obtain the asymptotic distribution of the restricted M-estimator.
Condition 2.5. Given ξ0 ∈ g(Θ), there exist an open set M in Ξres with ξ0 ∈ M ⊂ g(Θ), and (S, h),
where S is an open set in Rqs , qs ≤ q, and h : S → M is one-to-one, bi-continuous and twice continuously
differentiable, with ξ0 = h(s0 ) for some s0 ∈ S.
Under the setting in Condition 2.5, we will prove that sbn = h−1 (ξbnres ) is a strong M-estimator for the
criterion function Pn mh(s) over S. Then, we can apply Theorem 5.23 of van der Vaart (2000) to obtain the
asymptotic behavior of sbn , which, combined with a Taylor expansion of h about s0 , yield a linear expansion
for ξbnres . Finally, requiring Condition 2.6, which relates the parametrizations (S, h) and (Θ, g), suffices to
derive the asymptotic distribution of ξbnres in terms of g.
Condition 2.6. Consider (Θ, g) as in Condition 2.2 and (S, h) as in Condition 2.5. For each θ0 ∈ g −1 (ξ0 ),
span∇g(θ0 ) = span∇h(s0 ).
Condition 2.6 ensures that Tξ0 = span∇g(θ0 ) is well defined regardless of the fact that g −1 (ξ0 ) may contain
multiple θ0 ’s. Moreover, Tξ0 also agrees with span∇h(s0 ). Consequently, the orthogonal projection Πξ0 (Σ) onto
Tξ0 with respect to the inner product defined by a definite positive matrix Σ satisfies
Πξ0 (Σ) = ∇g(θ0 )(∇g(θ0 )T Σ ∇g(θ0 ))† ∇g(θ0 )T Σ
= ∇h(s0 )(∇h(s0 )T Σ∇h(s0 ))−1 ∇h(s0 )T Σ,
(6)
where A† denotes a generalised inverse of the matrix A. The gradient of g is not necessarily of full rank, in
contrast to the gradient of h.
Proposition 2.7. Assume that Conditions 2.2, 2.5 and 2.6 hold. Assume also that the unrestricted problem
satisfies the regularity Conditions 6.2, 6.3 and 6.4 in the Appendix. Then, any strong M-estimator ξbnres of the
restricted problem that converges in probability to ξ0 satisfies
√
n
1 X
Πξ (−V ) IFξ0 (Zi ) + op (1),
n(ξbnres − ξ0 ) = √
n i=1 0 ξ0
5
(7)
where IFξ0 (Zi ) = −Vξ−1
ṁξ0 (Zi ) is the influence function of the unrestricted estimator defined in (5), Vξ0 is
0
the nonsingular symmetric second derivative matrix of M(ξ) at ξ0 , and Πξ0 (−Vξ0 ) is defined according to (6).
√
Moreover, n(ξbnres − ξ0 ) is asymptotically normal with mean zero and asymptotic variance
o
n
√
−1 T
T
avar{ n(ξbnres − ξ0 )} = Πξ0 (−Vξ0 ) Vξ−1
(8)
P
ṁ
ṁ
ξ 0 ξ 0 Vξ0 Πξ 0 (−Vξ ) .
0
0
As a side remark, we conjecture that for estimators that are maximizers of a criterion function under restrictions that satisfy Conditions 2.2, 2.5 and 2.6, when (5) is true, (7) also holds. This can be important since
the asymptotic distribution of restricted estimators will be derived directly from the asymptotic distribution
of the unrestricted one.
3
Asymptotic theory for the maximum likelihood estimator in
reduced rank multivariate generalised linear models
In this section we show that maximum likelihood estimators in reduced-rank multivariate generalised linear
models are restricted strong M-estimators for the conditional log-likelihood. Using results in Section 2.1, we
obtain the existence, consistency and asymptotic distribution of maximum likelihood estimators in reducedrank multivariate generalised linear models.
3.1
Exponential Family
Let Y = (Y1 , . . . , Yq )T be a q-dimensional random vector and assume that its distribution belongs to a kparameter canonical exponential family with pdf (pms)
fη (y) = exp{η T T (y) − ψ(η)}h(y),
(9)
where T (y) = (T1 (y), . . . , Tk (y))T is a vector of known real-valued functions, h(y) ≥ 0 is a nonnegative known
function and η ∈ Rk is the vector of natural parameters, taking values in
Z
k
H = {η ∈ R : exp{η T T (y)}h(y)dy < ∞},
(10)
where the integral is replaced by a sum when Y is discrete. The set H of the natural parameter space is
assumed to be open and convex in Rk , and ψ a strictly convex function defined on H. Moreover, we assume
ψ(η) is convex and infinitely differentiable in H. In particular,
∇ψ(η) = ETη (T (Y )) and ∇2 ψ(η) = varη (T (Y )),
for every η ∈ H,
(11)
where ∇2 ψ is the k ×k matrix of second derivatives of ψ. Since ψ is strictly convex, varη (T (Y )) is non-singular
for every η ∈ H.
6
3.2
Multivariate generalised linear models
Let Z = (X, Y ) be a random vector, where now Y ∈ Rq is a multivariate response and X ∈ Rp is a vector of
predictors. The multivariate generalised linear model postulates that the conditional distribution of Y given
X belongs to some fixed exponential family and hypothesizes that the k-vector of natural parameters, which
we henceforth call ηx to emphasise the dependence on x, depends linearly on the vector of predictors. Thus,
the pdf (pms) of Y | X = x is given by
fY |X=x (y) = exp{ηxT T (y) − ψ(ηx )}h(y),
(12)
where ηx ∈ Rk depends linearly on x.
Frequently, a subset of the natural parameters depends on x while its complement does not. The normal
linear model with constant variance is such an example. To accommodate this structure, we partition the
vector ηx indexing model (12) into ηx1 and ηx2 , with k1 and k2 components, and assume that H, the natural
parameter space of the exponential family, is Rk1 × H2 , where H2 is an open convex subset of Rk2 , and assume
that
!
!
ηx1
η 1 + βx
ηx =
=
(13)
ηx2
η2
T
where β ∈ Rk1 ×p , η 1 ∈ Rk1 and η 2 ∈ H2 . Let ξ = ηT1 , vecT (β), ηT2 ∈ Ξ = Rk1 × Rk1 p × H2 , denotes a generic
vector and ξ0 the true parameter. Suppose n independent and identically distributed copies of Z = (X, Y )
satisfying (12) and (13), with true parameter vector ξ0 , are available. Given a realisation zi = (xi , yi ),
i = 1, . . . , n, the conditional log-likelihood, up to a factor that does not depend on the parameter of interest,
is
n
1 X T
Ln (β; η) =
η T (yi ) − ψ(ηxi ) .
(14)
n i=1 xi
Let
m(β;η) (z) = ηxT T (y) − ψ(ηx ).
(15)
By definition (3), the maximum likelihood estimator (MLE), if exits, of the parameter indexing model (12)
subject to (13) is an M-estimator.
Theorem 3.1 next establishes the existence, consistency and asymptotic normality of ξbn , the MLE of ξ0 .
Theorem 3.1. Assume that Z = (X, Y ) satisfies model (12) subject to (13) with true parameter ξ0 . Under
regularity conditions (47), (48), (49) and (50) in the Appendix, the maximum likelihood estimate of ξ0 , ξbn ,
√
exists, is unique and converges in probability to ξ0 . Moreover, n (ξbn − ξ0 ) is asymptotically normal with
covariance matrix
−1
Wξ0 = E F (X)T ∇2 ψ(F (X)ξ0)F (X)
,
(16)
7
where
F (x) =
(1, xT ) ⊗ Ik1
0
0
Ik 2
!
,
and ∇2 ψ was defined in (11)
3.3
Partial reduced rank multivariate generalised linear models
When the number of natural parameters or the number of predictors is large, the precision of the estimation
and/or the interpretation of results can be adversely affected. A way to address this is to assume that
the parameters live in a lower dimensional space. That is, we assume that the vector of predictors can be
partitioned as x = (xT1 , xT2 )T with x1 ∈ Rr and x2 ∈ Rp−r , and that the parameter corresponding to x1 ,
β1 ∈ Rk1 ×r has rank d < min{k1 , r}. In this way, the natural parameters ηx in (12) are related to the
predictors via
!
!
ηx1
η1 + β1 x1 + β2 x2
(17)
ηx =
=
ηx2
η2
where β1 ∈ Rkd1 ×r , the set of matrices in Rk1 ×p of rank d ≤ min{k1 , r}, while β2 ∈ Rk1 ×(p−r) , and β = (β1 , β2 ).
Following Yee and Hastie (2003), we refer to the exponential conditional model (12) subject to the restrictions imposed in (17) as partial reduced rank multivariate generalised linear model. The reduced-rank
multivariate generalised linear model is the special case with β2 = 0 in the partial reduced rank multivariate
generalised linear model.
To obtain the asymptotic distribution of the M-estimators for this reduced model, we will show that
Conditions 2.2, 2.5 and 2.6 are satisfied for Ξres , (Θ, g), M and (S, h), which are defined next. To maintain
consistency with notation introduced in Section 2.1, we vectorise each matrix involved in the parametrisation
of our model and reformulate accordingly the parameter space for each vectorised object. With this understanding, we use the symbol ∼
= to indicate that a matrix space component in a product space is identified with
its image through the operator vec : Rm×n → Rmn . In the sequel, to keep the notation as simple as possible,
we concatenate column vectors without transposing them; i.e., we write (a, b) for (aT , bT )T . Moreover, we
write ξ = (η 1 , β, η2 ), with the understanding that β stands for vec(β).
For the non-restricted problem, β1 belongs to Rk1 ×r , so that the entire parameter ξ = (η 1 , β1 , β2 , η2 )
belongs to
(18)
Ξ∼
= Rk1 × Rk1 ×r × Rk1 ×(p−r) × H2 .
However, for the restricted problem, we assume that the true parameter ξ0 = (η 01 , β01 , β02 , η 02 ) belongs to
Ξres ∼
= Rk1 × Rkd1 ×r × Rk1 ×(p−r) × H2 .
Let
× Rk1 ×(p−r) × H2
Θ∼
= Rk1 × Rkd1 ×d × Rd×r
d
8
(19)
(20)
and consider g : Θ → Ξres , with (η 1 , (S, T ), β2 , η2 ) 7→ (η1 , ST, β2 , η2 ). Without loss of generality, we assume
1 ×r
, the set of matrices in Rkd1 ×r whose first d rows are linearly independent. Therefore,
that β01 ∈ Rkfirst,d
!
Id
B0 ,
with A0 ∈ R(k1 −d)×d and B0 ∈ Rd×r
(21)
β01 =
d .
A0
This is trivial since β01 ∈ Rkd1 ×r and its first d rows linearly independent. Consider
1 ×r
× Rk1 ×(p−r) × H2 ,
M∼
= Rk1 × Rkfirst,d
Finally, let
and h : S → M be the map
and so ξ0 ∈ M ⊂ Ξres .
× Rk1 ×(p−r) × H2 ,
S∼
= Rk1 × R(k1 −d)×d × Rd×r
d
(η 1 , (A, B), β2 , η2 )
7→
η1 ,
B
AB
!
, β2 , η 2
!
(22)
(23)
.
(24)
Proposition 3.2. Conditions 2.2, 2.5 and 2.6 are satisfied for ξ0 , Ξ, Ξres , (Θ, g) and (S, h) defined in (18)–
(24), respectively.
Under the rank restriction on β1 in (17), the existence of the maximum likelihood estimate cannot be
guaranteed in the sense of an M-estimator as defined in (3) with mξ = m(β;η) in (15), and Ξ replaced by Ξres
in (18). However, using Lemma 2.3 we can work with a strong M-estimator sequence for the criterion function
Pn m(β;η) over Ξres . Theorem 3.3 states our main contribution.
Theorem 3.3. Let ξ0 = (η01 , β01 , β02 , η 02 ) denote the true parameter value of ξ = (η1 , β1 , β2 , η 2 ). Assume that
Z = (X, Y ) satisfies model (12), subject to (17) with ξ0 ∈ Ξres defined in (19). Then, there exists a strong
maximising sequence for the criterion function Pn mξ over Ξres for mξ = m(β;η) defined in (15). Moreover,
any weak M-estimator sequence {ξbnres } converges to ξ0 in probability.
√
If {ξbnres } is a strong M-estimator sequence, then n(ξbnres − ξ0 ) is asymptotically normal with covariance
matrix
√
avar{ n(ξbnres − ξ0 )} = Πξ0 (W −1 ) Wξ0
ξ0
where Wξ0 is defined in (16)
Remark 3.4. Since Πξ0 (W −1 ) is a projection, Πξ0 (W −1 ) Wξ0 ≤ Wξ0 . That is, the eigenvalues of Wξ0 −
ξ0
ξ0
Πξ0 (W −1 ) Wξ0 are non-negative, so that using partial reduced-rank multivariate generalised linear models reξ0
sults in efficiency gain.
9
4
Application: Marital status in a workforce study
Yee and Hastie (2003) analyse data from a self-administered questionnaire collected in a large New Zealand
workforce observational study conducted during 1992-1993. For homogeneity, the analysis was restricted
to a subset of 4105 European males with no missing values in any of the variables used. Yee and Hastie
were interested in exploring whether certain lifestyle and psychological variables were associated with marital
status, especially separation/divorce. The response variable is Y = marital status, with levels 1 = single, 2 =
separated or divorced, 3 = widower, and 4 = married or living with a partner. The married/partnered are
the reference group. Data on 14 regressors were collected, 12 of which are binary (1/0 for presence/absence,
respectively). These have been coded so that their presence is negative healthwise. Their goal was to
investigate if and how these 12 unhealthy variables were related to Y , adjusting for age and level of education.
The variables are described in Table 1.
Variable Name
Description
marital
Marital status. 1=single, 2=separated or divorced, 3=widower, and 4=married or living with a partner
Age - 30, in years
log(1+ years of education at secondary or high school)
In the last 3 months what is the largest number of drinks that
you had on any one day? (1=20 or more, 0=less than 20)
Current smoker?
Does not usually wear a hat, shirt or suntan lotion when outside during summer
Do you suffer from ‘nerves’ ?
Would you call yourself a ‘nervous’ person?
Are your feelings easily hurt?
Would you call yourself tense or ‘highly strung’ ?
Do you feel ‘just miserable’ for no reason?
Do you often feel ‘fed-up’ ?
Do you worry about awful things that might happen?
Are you a worrier?
Does your mood often go up and down?
age30
logedu1
binge
smokenow
sun
nerves
nervous
hurt
tense
miserable
fedup
worry
worrier
mood
Table 1: Variables used in the workforce study
10
A categorical response Y taking values 1, 2, 3, 4 with probabilities pr(Y = i) = pi can be expressed as a
T
multinomial vector to fit the generalised linear
P4 model presented in this paper, Y = (Y1 , Y2 , Y3 , Y4 ) , where
Yi = 1 if Y = i and Yi = 0 otherwise, and i=1 Yi = 1. The pdf of Y can be written as
fY (y) = exp{η T T (y) − ψ(η)}h(y)
(25)
P
where y = (y1 , y2 , y3, y4 ), T (y) = (y1 , y2, y3 ), η = (η1 , η2 , η3 ) ∈ R3 , ψ(η) = 1 + 3i=1 exp(ηi ) and h(y) =
1/(y1 !y2 !y3 !(1 − y1 − y2 − y3 )!). The natural parameter η = (η1 , η2 , η3 ) ∈ R3 , is related to the pdf of Y
through the identity ηi = log(pi /p4 ), i = 1, 2, 3.
Let X be the vector of predictor variables and consider pi = pi (x) = pr(Yi = 1|X = x). The dependence of
pi on x will not be made explicit in the notation. As in Yee and Hastie (2003) we fit a multinomial regression
model to Y |X = x, as in (25), with ηx
log(p1 /p4 )
ηx = log(p2 /p4 ) = η + βx
(26)
log(p3 /p4 )
where η ∈ R3 is the intercept and β ∈ R3×14 is the coefficient matrix, so that there are 3 ×14 + 3 = 42 + 3 = 45
parameters to estimate. When a multinomial linear model is fitted to the data at level 0.05, age30 and binge
are significant for log(p1 /p4 ), smokehow and tense for log(p2 /p4 ), and only age30 is significant for log(p3 /p4 ).
We next fitted a partial reduced rank multivariate generalised linear model, where the two continuous
variables, age30 and logedu1, were not subject to restriction. That is,
ηx = η + βx = η + β1 x1 + β2 x2 ,
(27)
where x2 represent the continuous variables and x1 the 12 binary predictors. The AIC criterion estimates the
rank of β1 in (27) to be one [see Yee and Hastie (2003)]. Using the asymptotic results from the current paper,
Duarte (2016) developed a test based on Bura and Yang (2011) that also estimates the dimension to be 1.
Therefore, in our notation, q = 4, k = k1 = 3, p = 14, r = 2, d = 1, and β1 = AB, A : 3 × 1 y B : 1 × 12,
β2 : 3 × 2 and η : 3 × 1. The rank restriction results in a drastic reduction in the total number of parameters
from 45 to 24.
The reduction in the estimation burden is also reflected in how tight the confidence intervals are compared
with those in the unrestricted model, as can be seen in Tables 3, 4 and Table 2 in Yee and Hastie (2003).
As a consequence the variables nervous, hurt, which are not significant in the unrestricted generalised linear
model, are significant in the reduced (27). Furthermore, some variables, such as binge, smokenow, nervous
and tense, are now significant for all responses.
All significant coefficients are positive. These correspond to the variables binge, smokenow, nervous,
tense and hurt only for widowers. Since the positive value of the binary variables indicates poor lifestyle and
negative psychological characteristics, our analysis concludes that for men with these features, the chance of
11
being single, divorced or widowed is higher than the chance of being married, adjusting for age and education.
Also, the coefficients corresponding to the response log(p3 /p4 ) are twice as large as those of log(p1 /p4 ),
suggesting the effect of the predictors differs in each group. All computations were performed using the R
package VGAM, developed by Yee (2017).
Variable
log(p1 /p4 )
log(p2 /p4 )
log(p3 /p4 )
-1.762 *
(0.377)
-1.573*
(0.388)
-2.699 *
(0.383)
-2.921*
(0.396)
-6.711 *
(1.047)
-6.123 *
(1.106)
-0.191 *
(0.008)
-0.190*
(0.008)
0.012
(0.008)
0.012
(0.008)
0.086 *
(0.023)
0.077*
(0.024)
0.338
(0.225)
0.254
(0.228)
-0.365
(0.213)
-0.316
(0.214)
-0.089
(0.559)
-0.198
(0.566)
Intercept
GLM
PRR-GLM
age30
GLM
PRR-GLM
logedu1
GLM
PRR-GLM
Table 2: Estimators with standard errors for β1 for the generalised linear model (first two rows) and the
reduced generalised linear model (last two rows). ∗ indicates significant at 5% level.
12
Variable
log(p1 /p4 )
log(p2 /p4 )
log(p3 /p4 )
0.801*
(0.143)
0.569 *
(0.125)
0.318
(0.256)
0.786 *
(0.196)
1.127
(0.670)
1.114 *
(0.409)
0.022
(0.126)
0.222 *
(0.088)
0.501 *
(0.157)
0.306 *
(0.119)
0.654
(0.469)
0.434 *
(0.208)
-0.066
(0.122)
0.011
(0.084)
0.120
(0.161)
0.015
(0.116)
-0.088
(0.518)
0.021
(0.164)
-0.102
(0.138)
-0.054
(0.101)
0.123
(0.198)
-0.074
(0.139)
-1.456
(0.841)
-0.105
(0.197)
0.297
(0.169)
0.312 *
(0.124)
0.353
(0.228)
0.430 *
(0.168)
1.007
(0.665)
0.609 *
(0.291)
0.184
(0.126)
0.180
(0.089)
0.210
(0.167)
0.248
(0.122)
0.483
(0.501)
0.352 *
(0.199)
binge
GLM
PRR-GLM
smokenow
GLM
PRR-GLM
sun
GLM
PRR-GLM
nerves
GLM
PRR-GLM
nervous
GLM
PRR-GLM
hurt
GLM
PRR-GLM
Table 3: MLEs with their standard errors in parentheses for the full rank generalised linear model (first two
rows) and the partial reduced rank generalised linear model (last two rows). ∗ indicates significant at 5%
level.
13
Variable
log(p1 /p4 )
log(p2 /p4 )
log(p3 /p4 )
0.166
(0.176)
0.302 *
(0.122)
0.483 *
(0.214)
0.416 *
(0.163)
1.108
(0.612)
0.590 *
(0.284)
-0.050
(0.138)
0.019
(0.094)
0.128
(0.178)
0.0268
(0.129)
-0.093
(0.613)
0.038
(0.185)
0.112
(0.122)
0.117
(0.094)
0.249
(0.171)
0.161
(0.129)
-0.214
(0.548)
0.229
(0.185)
0.113
(0.145)
0.003
(0.106)
-0.102
(0.209)
0.004
(0.146)
-0.548
(0.818)
0.005
(0.207)
-0.027
(0.131)
-0.116
(0.092)
-0.243
(0.180)
-0.160
(0.128)
-0.548
(0.550)
-0.227
(0.193)
-0.111
(0.123)
-0.037
(0.087)
0.092
(0.171)
-0.052
(0.120)
-0.193
(0.553)
-0.073
(0.172)
tense
GLM
PRR-GLM
miserable
GLM
PRR-GLM
fedup
GLM
PRR-GLM
worry
GLM
PRR-GLM
worrier
GLM
PRR-GLM
mood
GLM
PRR-GLM
Table 4: MLEs with their standard errors in parentheses for the full rank generalised linear model (first two
rows) and the partial reduced rank generalised linear model (last two rows). ∗ indicates significant at 5%
level.
14
5
Discussion
With the exception of the work of Yee on vector generalised linear models (VGLMs) (Yee and Wild, (1996),
Yee and Hastie (2003), Yee (2017)) reduced-rank regression has been almost exclusively restricted to data
where the response variable is continuous. Estimation in reduced-rank multinomial logit models (RR-MLM)
was studied in Yee and Hastie (2003), but no distribution results for the estimators were obtained. In this
paper we fill this gap by developing asymptotic theory for the restricted rank maximum likelihood estimates
of the parameter matrix in multivariate GLMs.
To illustrate the potential impact of our results, we refer to the real data analysis example in Section 4.
In order to assess the significance of the predictors, Yee and Hastie (2003) calculate the standard errors
for the coefficient matrix factors, A and B, independently and can only infer about the significance of the
components of the matrix A and the components of the matrix B separately. The asymptotic distribution
for either estimator is obtained assuming that the other is fixed and known. In this way, they first analyse
ν = Bx1 to check which predictors are significant and then Aν to examine how they influence each response.
Their standard errors are ad-hoc and it is unclear what the product of standard errors measures as relates to
the significance of the product of the components of the coefficient matrix β1 = AB. Moreover, this practical
ad-hoc approach cannot readily be extended when d > 1.
Using the results of Theorem 3.3, we can obtain the errors of each component of the coefficient matrices
A, B simultaneously, and assess the statistical significance of each predictor on each response. Using the
ad-hoc approach of Yee and Hastie (2003), a predictor can only be found to be significant across all responses.
For example, Yee and Hastie (2003) find the predictor hurt to be significant for all three groups (single,
divorced/separated, widower). On the other hand, we can assess the significance of any response/predictor
combination. Thus, we find hurt to be significant only for widower but not for single or separated/divorced
men groups [see Table 3].
6
Proofs
The consistency of M-estimators has long been established [see, for instance, Theorem 5.7 in van der Vaart
(2000)]. The functions M(ξ) and Mn (ξ) are defined in (2). Typically, the proof for the consistency of Mestimators assumes that ξ0 , the parameter of interest, is a well-separated point of maximum of M, which
is ascertained by assumptions (a) and (b) of Proposition 6.1. Assumption (c) of Proposition 6.1 yields
uniform consistency of Mn as an estimator of M, a property needed in order to establish the consistency of
M-estimators.
Proposition 6.1. Assume (a) mξ (z) is a strictly concave function in ξ ∈ Ξ, where Ξ is a convex open subset
of a Euclidean space; (b) the function M(ξ) is well defined for any ξ ∈ Ξ and has a unique maximizer ξ0 ; that
15
is, M(ξ0 ) > M(ξ) for any ξ 6= ξ0 ; and (c) for any compact set K in Ξ,
E sup |mξ (Z)| < ∞.
(28)
ξ∈K
Then, for each n ∈ N, there exists a unique M-estimator ξbn for the criterion function Mn over Ξ. Moreover,
ξbn → ξ0 a.e., as n → ∞.
Proof. For each compact subset K of Ξ, {mξ : ξ ∈ K} is a collection of measurable functions which, by
assumption (c), has an integrable envelope. Moreover, for each fixed z, the map ξ 7→ mξ (z) is continuous,
since it is concave and defined on the open set Ξ. As stated in Example 19.8 of van der Vaart (2000), these
conditions guarantee that the class is Glivenko-Cantelli. That is,
pr lim sup |Pn mξ − P mξ | = 0 = 1.
(29)
n→∞ ξ∈K
We need to prove that there exist a unique maximizer of Mn (ξ) = Pn ξ, and that it converges to the maximizer
of M(ξ) = P mξ . We first consider the deterministic case ignoring for the moment that {Mn } is a sequence of
random functions.
Since ξ0 belongs to the open set Ξ, there exists ε0 > 0 such that the closed ball B[ξ0 , ε0 ] is contained in
Ξ. Uniform convergence of {Mn } to M over K = {ξ : kξ − ξ0 k = ε0 } guarantees that
lim
sup
n→∞ kξ−ξ k=ε
0
0
{Mn (ξ) − Mn (ξ0 )} =
sup
kξ−ξ0 k=ε0
{M(ξ) − M(ξ0 )} < 0
(30)
because M(ξ0 ) > M(ξ) for any ξ 6= ξ0 . Then, for n ≥ n0 (ε0 ),
sup
kξ−ξ0 k=ε0
Mn (ξ) − Mn (ξ0 ) < 0.
(31)
Let ζn (ξ) = Mn (ξ) − Mn (ξ0 ). Since Mn is concave and continuous, ζn attains its maximum over the compact
set B[ξ0 , ε0 ], which we denote by ξbn . Note that ζn (ξ0 ) = 0 and ζn is strictly smaller than zero in the boundary
of the ball, as shown in (31); therefore, we conclude that ξbn ∈ B(ξ0 , ε0 ), so that ξbn is a local maximum for ζn .
Let ξ satisfy kξ − ξ0 k > ε0 . The convexity of Ξ implies there exists t ∈ (0, 1) such that ξe = (1 − t)ξ0 + tξ
satisfies kξe − ξ0 k = ε0 , and therefore
e ≥ tζn (ξ) + (1 − t)ζn (ξ0 ) = tζn (ξ),
ζn (ξbn ) ≥ ζn (ξ0 ) = 0 > ζn (ξ)
(32)
implying that ζn (ξ) < 0 ≤ ζn (ξbn ). Therefore, the maximum ξbn ∈ B(ξ0 , ε0 ) is global. The strict concavity
of Mn guarantees that such global maximum is unique, thus ξbn is the unique solution to the optimization
16
problem in (3). By repeating this argument for any ε < ε0 , we prove the convergence of the sequence {ξbn } to
ξ0 .
Turning to the stochastic case, the uniform convergence of Mn to M over K = B[ξ0 , ε0 ] on a set Ω1 , with
pr(Ω1 ) = 1, as assumed in (29), guarantees the deterministic result can be applied to any element of Ω1 ,
which obtains the result.
Proof of Lemma 2.3. Let {ξbn } be any (weak/strong) M-estimator sequence of the unconstrained maximization
problem. Since Mn (ξbn ) ≥ supξ∈Ξ Mn (ξ) − An with An → 0, we have
(33)
1 = lim pr sup Pn mξ < ∞ ≤ lim pr sup Pn mξ < ∞ .
n→∞
n→∞
ξ∈Ξ
Define
Ωn :=
For all n, there exists ξbnres such that
ξ∈Ξres
sup Pn mξ < ∞ .
ξ∈Ξres
1
Mn (ξbnres ) ≥ sup Mn (ξ) − 2
n
ξ∈Ξres
(34)
(35)
.
on Ωn . Let ξbnres = 0 on Ωcn . Then, since pr(Ωn ) → 1, {ξbnres } is a strong M-estimator for the criterion function
Mn over Ξres .
Proof of Proposition 2.4. In Proposition 6.1 we have established the existence of a unique maximizer ξbn for
the criterion function Mn over Ξ. We can now invoke Lemma 2.3 to guarantee the existence of ξbnres , a strong
M-estimator for the criterion function Mn over Ξres . Let {ξbnres } be any strong M-estimator for the criterion
function Mn over Ξres . We start from the deterministic case:
Mn (ξbnres ) ≥ sup Mn (ξ) − An ,
(36)
ξ∈Ξres
where Mn is defined in (2) and An is a sequence of real numbers with An → 0. As in the proof of Proposition 6.1, define ζn (ξ) = Mn (ξ) − Mn (ξ0 ) to obtain that, for ǫ0 small enough,
sup
kξ−ξ0 k=ε0
ζn (ξ) ≤
1
sup {M(ξ) − M(ξ0 )} := −δ(ε0 )
2 kξ−ξ0 k=ε0
(37)
for n large enough. Under Condition 2.2, ξ0 ∈ Ξres , and therefore, by (36),
ζn (ξbnres ) = Mn (ξbnres ) − Mn (ξ0 ) ≥ Mn (ξbnres ) − sup Mn (ξ) ≥ −An .
ξ∈Ξres
17
(38)
Since An → 0, −An > −δ(ε0 ) for n large enough. Combining this with (37) and (38) obtains
sup
kξ−ξ 0 k=ε0
ζn (ξ) < ζn (ξbnres ).
We will deduce that kξbnres − ξ0 k < ε0 , once we prove that
sup
ζn (ξ) =
sup
ζn (ξ).
(39)
kξ−ξ 0 k≥ε0
kξ−ξ 0 k=ε0
Now, let prove (39). Choose ξ with kξ − ξ0 k > ε0 , and take t ∈ (0, 1) such that ξe = (1 − t)ξbn + tξ is a distance
ε0 from ξ0 , where ξbn is the maximizer of ζn over Ξ, as defined in Proposition 6.1, which is assumed to be at
distance smaller than ε0 from ξ0 . Then,
e = ζn (1 − t)ξbn + tξ ≥ (1 − t)ζn (ξbn ) + tζn (ξ) ≥ ζn (ξ).
ζn (ξ)
Thus,
sup
kξ−ξ 0 k=ε0
e ≥ ζn (ξ) ,
ζn (ξ) ≥ ζn (ξ)
for any ξ with kξ − ξ0 k > ε0
which in turn yields (39). When An = op (1), convergence in probability of {ξbnres } to ξ0 is equivalent to the
existence of an almost everywhere convergent sub-sub-sequence for any subsequence {ξbnresk }. Therefore, by
applying the deterministic result to the set of probability one, where there exists a sub-subsequence of Ank
that converges to zero a.e., we obtain the result.
Regularity conditions for Proposition 2.7 (from Theorem 5.23, p. 53 in [15])
Condition 6.2. For each ξ in an open subset Ξ of a Euclidean space, mξ (z) is a measurable function in z
such that mξ (z) is differentiable in ξ0 for almost every z with derivative ṁξ0 (z).
Condition 6.3. There exists a measurable function φ(z) with P φ2 < ∞ such that, for any ξ1 and ξ2 in a
neighborhood of ξ0 ,
|mξ1 (z) − mξ2 (z)| ≤ φ(z)kξ1 − ξ2 k
(40)
Condition 6.4. The map ξ → P mξ admits a second order Taylor expansion at a point of maximum ξ0 with
nonsingular symmetric second derivative matrix Vξ0 .
Under regularity conditions 6.2, 6.3 and 6.4, van der Vaart proved in Theorem 5.23 of his book ([15]) that
if {ξbn } is a strong M-estimator sequence for the criterion function Pn mξ over Ξ and ξbn → ξ0 in probability,
then
√
n
1 X
√
ṁξ0 (Zi ) + op (1).
n(ξbn − ξ0 ) = −Vξ−1
0
n i=1
18
(41)
Moreover,
√
n(ξbn − ξ0 ) is asymptotically normal with mean zero and
n√
o
b
n(ξn − ξ0 ) = Vξ−1
avar
P ṁξ0 ṁTξ0 Vξ−1
.
0
0
(42)
This result will be invoked in the following proofs.
Proof of Proposition 2.7. Assume that {ξbnres } is a sequence in Ξres that converges in probability to ξ0 ∈ M,
which is assumed to be open in Ξres . Then, pr(ξbnres ∈ M) → 1. Bicontinuity of h guarantees that s∗n = h−1 (ξbnres )
converges in probability to s0 = h−1 (ξ0 ). Note that
Pn mh(s∗n ) = Pn mbξres ≥ sup Pn mξ ≥ sup Pn mξ ≥ sup Pn mh(s) ,
n
ξ ∈Ξres
ξ ∈M
(43)
s∈S
except for an op (n−1 ) term that is omitted in the last three inequalities. Therefore, {s∗n } is a strong maximizing
sequence for the criterion function Pn mh(s) (z) over S.
We next verify Conditions 6.2, 6.3 and 6.4 are satisfied for {s∗n }, s0 , mh(s) (z) and P mh(s) . Specifically,
Condition 6.2 holds since mh(s) is a measurable function in z for all s ∈ S and mh(s) (z) is differentiable in s0
for almost every z. In fact, h(s0 ) = ξ0 , mξ (z) is differentiable at ξ0 and h(s) is also differentiable. Moreover,
the derivative function is ∇h(s0 )ṁξ0 .
For all s1 and s2 in a neighborhood of s0 , by the continuity of h, h(s1 ) and h(s2 ) are in a neighborhood of
ξ0 . Then
|mh(s1 ) (z) − mh(s2 ) (z)| ≤ φ(z)kh(s1 ) − h(s2 )k
≤ φ(z)k∇hk∞,Ns0 ks1 − s2 k
where k∇hk∞,Ns0 denotes the maximum of k∇h(s)k in a neighborhood Ns0 of s0 . The first inequality holds
because such condition is valid in the unconstrained problem and the second inequality follows since h is
continuously differentiable at s0 . Thus, the Lipschitz Condition 6.3 is satisfied.
For Condition 6.4, we observe that the function s 7→ P mh(s) is twice continuously differentiable in s0
because both P mξ and h(s) satisfy the required regularity properties at ξ0 and s0 , respectively. Moreover,
since P ṁξ0 = 0, the second derivative matrix of P mh(s) at s0 , is Ws0 = ∇h(s0 )T Vξ0 ∇h(s0 ), where Vξ0 is the
second derivative matrix of P mξ at ξ0 . The matrix Ws0 is nonsingular and symmetric because ∇h(s0 ) is full
rank and Vξ0 is nonsingular and symmetric.
We can now apply Theorem 5.23 in van der Vaart (2000), and obtain
√
n(s∗n − s0 ) = − ∇h(s0 )T Vξ0 ∇h(s0 )
n
−1 1 X
√
∇h(s0 )T ṁξ0 (Zi ) + op (1),
n i=1
19
(44)
so that the first order Taylor series expansion of h(s∗n ) around s0 is
√
√
n(h(s∗n ) − h(s0 )) = ∇h(s0 ) n(s∗n − s0 )) + op (1)
n
−1
1 X
∇h(s0 ) ∇h(s0 )T Vξ0 ∇h(s0 )
∇h(s0 )T ṁξ0 (Zi ) + op (1)
= −√
n i=1
n
1 X
= √
Πξ (−V IFξ0 (Zi ) + op (1),
n i=1 0 ξ0
for Πξ0 (−Vξ0 and IFξ0 (z) defined in (6) and (5), respectively, which obtains the expansion in (7).
Proof of Theorem 3.1. Write
ηx1 = η 1 + βx = (η1 , β) f (x) = (f (x)T ⊗ Ik1 )vec (η 1 , β) ,
where f (x)T = (1, xT ) ∈ R1×(p+1) . Then, in matrix form,
!
!
f (x)T ⊗ Ik1 0
η 1 + βx
=
ηx =
0
Ik 2
η2
where
f (x)T ⊗ Ik1 0
0
Ik 2
F (x) =
!
vec (η 1 , β)
η2
!
= F (x)ξ,
(45)
∈ Rk×(k1 (p+1)+k2 ) ,
T
and ξ = η T1 , vecT (β), ηT2
is the vector of parameters of model (13). Note that F (x)ξ ∈ H for any value of
ξ with H defined in (10). This notation allows to simplify the expression for the log-likelihood function in
(15), and replace it with
mξ (z) = T (y)T F (x)ξ − ψ(F (x)ξ).
(46)
The regularity conditions required to derive consistency and asymptotic distribution of the MLE are: For any
ξ and any η and for any compact K ⊂ Ξ = Rk1 × Rk1 p × H2 .
pr (F (X)ξ = η) < 1.
T
E kT (Y ) F (X)k < ∞ , E sup |ψ(F (X)ξ)| < ∞,
(47)
(48)
ξ∈K
2
E kT (Y ) F (X)k < ∞ , E sup k∇ψ(F (X)ξ)F (X)k < ∞ ,
ξ∈K
T 2
E sup kF (X) ∇ ψ(F (X)ξ)F (X)k < ∞.
T
2
ξ∈K
20
(49)
(50)
To prove the existence, uniqueness and consistency of the MLE under the present model, ξbn , we next show
that the assumptions stated in Proposition 6.1 are satisfied.
The strict convexity of ψ implies that, for each fixed z, mξ (z) is a strictly concave function in ξ ∈ Ξ =
k1 +pk1
R
× H2 . The concavity of mξ (z) is preserved under expectation, thus M(ξ) = P mξ is concave. The
identifiability condition satisfied by the exponential family in Section 3.1 allows applying Lemma 5.35 of van
der Vaart (2000, p. 62) to conclude that
E T (Y )T F (Y )ξ − ψ(F (X)ξ) | X ≤ E T (Y )T F (X)ξ0 − ψ(F (X)ξ0) | X
(51)
Taking expectation with respect to X, we conclude that P mξ ≤ P mξ0 for any ξ. Moreover, if P mξ1 = P mξ0 ,
pr(F (X)ξ1 = F (X)ξ0) = 1, which contradicts the hypothesis (47). Finally, the integrability of (28) follows
from (48).
The conditions 6.2, 6.3 and 6.4 required by van der Vaart’s Theorem 5.23 to derive the asymptotic
distribution of M-estimators are easily verifiable under the integrability assumptions stated in (49) and (50).
The second derivative matrix of P mξ at ξ0 is
Vξ0 = −E F (X)T ∇2 ψ(F (X)ξ0 )F (X) .
(52)
Finally, observe that
h
i
P ṁξ0 ṁTξ0 = E F (X)T T (Y ) − ∇T ψ(F (X)ξ0 ) T (Y )T − ∇ψ(F (X)ξ0) F (X)
= E F (X)T ∇2 ψ(F (X)ξ0)F (X)
to deduce that, according to the general formula for the asymptotic variance of an M-estimator in (42), the
√
asymptotic variance of n(ξbn − ξ0 ) is given by (16).
Lemmas 6.5– 6.10 and Corollary 6.6 are required to prove Proposition 3.2.
1 ×r
and can be written as in (21). Let (S0 , T0 ) ∈ Rkd1 ×d × Rd×q
Lemma 6.5. Assume that β01 ∈ Rkfirst,d
with
d
d×d
S0 T0 = β01 . Then, there exists U ∈ Rd so that S0 = S0 (U) and T0 = T0 (U), with
!
U
S0 (U) :=
and T0 (U) := U −1 B0 .
(53)
A0 U
Proof. Let
S0 =
S01
S02
21
!
with S01 ∈ Rd×d and S02 ∈ R(k1 −d)×d . The matrix S01 T0 is comprised of the first d rows of β01 which are
linearly independent. Then, d = rank(S01 T0 ) ≤ rank(S01 ) ≤ d, hence S01 is invertible. Take U = S01 . From
the expression (21) for β01 , we have
S01 T0 = B0
S02 T0 = A0 B0 .
Thus, T0 = U −1 B0 , and since T0 T0T ∈ Rd×d and rank d,
S02 = A0 B0 T0T (T0 T0T )−1 = A0 B0 B0T U −1 (U −1 B0 B0T U −1 )−1 = A0 U.
1 ×r
Corollary 6.6. Let β01 ∈ Rkfirst,d
and can be written as in (21) . For U in Rd×d
and S0 (U), T0 (U) as defined
d
−1
in (53), the pre-image of ξ0 through g, g (ξ0 ), satisfies
.
(54)
g −1 (ξ0) ∼
= (η 01 , S0 (U), T0 (U), β02 , η02 ) : U ∈ Rd×d
d
Lemma 6.7. Rd×m
with d ≤ m is an open set in Rd×m .
d
Proof. We will show that the complement of Rd×m
is closed. Consider (Tn )n≥1 ∈ Rd×m , each Tn of rank
d
strictly less than d, and assume that Tn converges to T ∈ Rd×m . Note that, |Tn TnT | = 0 for all n ≥ 1, so that
|T T T | is also equal to zero. Hence, rank(T ) < d.
Lemma 6.8. Θ and S are open sets.
Proof. Up to an homeomorphism, Θ and S are equivalent to
Rk1 × Rkd1 ×d × Rd×r
× Rk1 ×(p−r) × H2
d
and Rk1 × R(k1 −d)×d × Rd×r
× Rk1 ×(p−r) × H2 ,
d
respectively, which are products of open sets by Lemma 6.7.
Lemma 6.9. h : S → M is one to one bicontinuous.
22
1 ×q
Proof. It suffices to note that h1 : R(k1 −d)×d × Rd×q
7→ Rkfirst,d
with
d
B
AB
(A, B) →
!
k1 ×q
(k1 −d)×d
satisfies the required properties for h. Let h−1
× Rd×q
with
1 : Rfirst,d 7→ R
d
B
C
!
→ (CB T BB T
−1
, B)
(55)
Then, h−1
1 (h1 (A, B)) = (A, B) and
h1
h−1
1
B
AB
!!
=
B
AB
!
,
and therefore h−1
1 is the inverse of h1 . Thus, h1 is one to one and bicontinuous.
Lemma 6.10. M is open in Ξres
1 ×r
1 ×r
is a
is an open set in Rkd1 ×r , or equivalently, that the complement of Rkfirst,d
Proof. It suffices to show Rkfirst,d
k1 ×r
k1 ×r
be a sequence such that the first d rows are not linearly independent
closed set in Rd . Let {Tn } ⊂ Rd
and Tn converges to T ∈ Rkd1 ×r . Then, if we write
!
Tn1
Tn =
Tn2
with Tn1 ∈ Rd×r and Tn2 ∈ R(k1 −d)×r , we obtain that | Tn1 TnT1 |= 0 for all n. Then | T1 T1T |= 0, where T1
comprises of the first d rows of T , and therefore the first d rows of T are not linearly independent.
Proof of Proposition 3.2. We verify that Conditions 2.2, 2.5 and 2.6 are satisfied.
Condition 2.2: By Lemma 6.8, the set Θ, defined in (20), is open and ξ0 belongs to g(Θ) = Ξres .
Condition 2.5: Since the first d rows of β01 are linearly independent, ξ0 ∈ M. Then, applying Lemma 6.10
obtains that M is an open set in Ξres .
Consider (S, h) as in (23). By Lemma 6.8, S is an open set, and h is one-to-one and bicontinuous by
Lemma 6.9. Furthermore, if
s0 = (η 01 , A0 , B0 , β02 , η02 ) ∈ S,
23
where A0 y B0 are given in (21), then h(s0 ) = (η 01 , β01 , β02 , η02 ) = ξ0 .
The function h is twice continuously differentiable and its Jacobian is full rank. In
Ik 1
0
0
0
!
!
0
Id
0 BT ⊗
I
⊗
0
r
∇h(η 1 , A, B, β2 , η 2 ) =
Ik1 −d
A
0
0
Ik1 (p−r)
0
0
0
0
0
fact, the latter is
0
0
(56)
0
Ik 2
of order (k1 p + k) × (d(k1 + r − d) + k1 (p − r) + k) with full column rank d(k1 + r − d) + k1 (p − r) + k [see
[4]; also it is a direct implication of Theorem 5 in [12]].
Condition 2.6: Consider θ0 ∈ g −1(ξ0 ), associated with U, as shown in Lemma 6.5. Since
∇g(η1 , S, T, β2 , η2 ) =
Ik 1
0 TT
0
0
0
0
0
0
⊗ Ik 1 Ir ⊗ S
0
0
0
0
Ik1 (p−r) 0
0
0
0
Ik 2
then,
∇g η 10 ,
where
U
A0 U
Ik 1
0
=
0
0
G=
!
, U −1 B0 , β20 , η20
0
B0T
0
Id
A0
⊗ Ik 1 Ir ⊗
0
0
0
0
!
!
0
0
Ik1 (p−r)
0
0
0
G.
0
Ik 2
Ik 1
0
0
0
0
0 U −T ⊗ Ik1
0
0
0
0
0
(Ir ⊗ U)
0
0
0
0
0
Ik1 (p−r) 0
0
0
0
0
Ik 2
24
(57)
Since G is invertible of order (d(k1 + r) + k1 (p − r) + k) × (d(k1 + r) + k1 (p − r) + k),
Ik 1
0
0
0
0
!
I
d
T
0 B0 ⊗ Ik1 Ir ⊗
0
0
.
span∇g(θ0 ) = span
A0
0
0
Ik1 (p−r) 0
0
0
0
0
0
Ik 2
e with
Next, since ∇h(s0 ) = ∇g(θ0 )G−1 I,
Ie = diag
Ik 1 Id ⊗
0
Ik1 −d
!
Ird Ik1 (p−r) Ik2
!
we have span∇h(s0 ) ⊂ span∇g(θ0 ). Applying again Theorem 5 in [12] obtains rank(∇g(θ0 )) = d(k1 + r −
d) + k1 (p − r) + k = rank(∇h(s0 )). Therefore, span∇h(s0 ) = span∇g(θ0 ).
Proof of Theorem 3.3. In Theorem 3.1 we verified that the conditions of Theorem 5.23 in [15] are satisfied
for the maximum likelihood estimator under model (12) satisfying (13). The asymptotic variance of the MLE
estimator is given in (16). We also showed Conditions 2.2, 2.5 and 2.6 are satisfied in the proof of Proposition
3.2. The result follows from Proposition 2.7 since −Vξ0 = Wξ−1
and
0
√
avar{ n(ξbnres − ξ0 )} = Πξ0 (W −1 ) Wξ0 ΠTξ (W −1 )
ξ0
= ∇g(θ0 )(∇g(θ0 )
= Πξ0 (W −1 ) Wξ0
0
T
ξ0
Wξ−1
∇g(θ0 ))† ∇g(θ0 )T
0
ξ0
References
[1] Anderson, T. W. (1951). Estimating linear restrictions on regression coefficients for multivariate normal
distributions. The Annals of Mathematical Statistics, 22, 327–351.
[2] Bura, E., Duarte, S. and Forzani, L. (2016). Sufficient Reductions in Regressions With Exponential Family
Inverse Predictors. Journal of the American Statistical Association 111, 1313–1329.
[3] Bura, E. and Yang, J. (2011). Dimension estimation in sufficient dimension reduction: a unifying approach.
J. Multivariate Anal., 102, 130–142.
25
[4] Cook, R. D. and Ni, L. (2005). Sufficient dimension reduction via inverse regression: a minimum discrepancy approach. Journal of the American Statistical Association, 100, 410–428.
[5] Duarte, S. L. (2016). Modelos lineales generalizados: regresión de rango reducido y reducción suficiente de
dimensiones (Tesis Doctoral). Universidad Nacional del Litoral. Argentina.
[6] Geyer, C. J. (1994). On the asymptotics of constrained M-estimation. The Annals of Statistics, 22, 1993–
2010.
[7] Haberman, S. J. (1989). Concavity and estimation. The Annals of Statistics, 17, 1631–1661.
[8] Hjort, N. L. and Pollard, D. (2011). Asymptotics for minimisers of convex processes. arXiv:1107.3806.
[9] Huber, P. J. (1967). The behavior of maximum likelihood estimates under nonstandard conditions. In
Proceedings of the fifth Berkeley symposium on mathematical statistics and probability (Vol. 1, No. 1, pp.
221–233).
[10] Izenman, A. J. (1975). Reduced-rank regression for the multivariate linear model. Journal of Multivariate
Analysis, 5, 248–264.
[11] Izenman, A. J. (2008). Modern Multivariate. Statistical Techniques: Regression, Classification and Manifold Learning. New York: Springer.
[12] Puntanen, S., Styan, G. P., and Isotalo, J. (2011). Matrix tricks for linear statistical models: our personal
top twenty. Springer Science and Business Media.
[13] Reinsel, G. C. and Velu, R. P. (1998). Multivariate Reduced rank regression. Lecture Notes in Statistics.
New York: Springer.
[14] Niemiro, W. (1992). Asymptotics for M-estimators defined by convex minimization. The Annals of Statistics, 20, 1514–1533.
[15] Van der Vaart, A. W. (2000). Asymptotic statistics. Cambridge University Press.
[16] Yee, T. W. (2015). Vector generalized linear and additive models. New York, USA: Springer.
[17] Yee, T. W. (2017). VGAM: Vector Generalized Linear and Additive Models. R package version 1.0-3.
URL https://CRAN.R-project.org/package=VGAM
[18] Yee, T. W. and Hastie, T. J. (2003). Reduced-rank Vector Generalized Linear Models. Statistical Modelling, 3, 15–41.
[19] Yee, T. W. and Wild, C. J. (1996). Vector Generalized Additive Models. Journal of Royal Statistical
Society, Series B, 58(3), 481–493.
26
| 10math.ST
|
On the Scalability of the GPU EXPLORE
Explicit-State Model Checker
Nathan Cassee
Thomas Neele
Anton Wijs∗
Eindhoven University of Technology
Eindhoven, The Netherlands
[email protected] {T.S.Neele, A.J.Wijs}@tue.nl
The use of graphics processors (GPUs) is a promising approach to speed up model checking to
such an extent that it becomes feasible to instantly verify software systems during development.
GPU EXPLORE is an explicit-state model checker that runs all its computations on the GPU. Over
the years it has been extended with various techniques, and the possibilities to further improve its
performance have been continuously investigated. In this paper, we discuss how the hash table of
the tool works, which is at the heart of its functionality. We propose an alteration of the hash table
that in isolated experiments seems promising, and analyse its effect when integrated in the tool.
Furthermore, we investigate the current scalability of GPU EXPLORE, by experimenting both with
input models of varying sizes and running the tool on one of the latest GPUs of NVIDIA.
1
Introduction
Model checking [2] is a technique to systematically determine whether a concurrent system adheres to
desirable functional properties. There are numerous examples in which it has been successfully applied,
however, the fact that it is computationally very demanding means that it is not yet a commonly used procedure in software engineering. Accelerating these computations with graphics processing units (GPUs)
is one promising way to model check a system design in mere seconds or minutes as opposed to many
hours.
GPU EXPLORE [28, 29, 33] is a model checker that performs all its computations on a GPU. Initially,
it consisted of a state space exploration engine [28], which was extended to perform on-the-fly deadlock
and safety checking [29]. Checking liveness properties has also been investigated [27], with positive
results, but liveness checking has yet to be integrated in the official release of the tool. Finally, in order
to reduce the memory requirements of GPU EXPLORE, partial order reduction has been successfully
integrated [20].
Since the first results achieved with GPU EXPLORE [28], considerable progress has been made. For
instance, the original version running on an NVIDIA K20 was able to explore the state space of the
peterson7 model in approximately 72 minutes. With many improvements to GPU EXPLORE’s algorithms, reported in [33], the GPU hardware and the CUDA compiler, this has been reduced to 16 seconds.
With these levels of speed-up, it has become much more feasible to interactively check and debug large
models. Furthermore, GPU developments continue and many options can still be investigated.
Performance is very important for a tool such as GPU EXPLORE. However, so far, the scalability of
the tool has not yet been thoroughly investigated. For instance, currently, we have access to a NVIDIA
Titan X GPU, which is equipped with 12 GB global memory, but for all the models we have been using
∗ We gratefully acknowledge the support of NVIDIA Corporation with the donation of the GeForce Titan X used for this
research.
Timo Kehrer and Alice Miller (Eds.):
Workshop on Graphs as Models 2017 (GAM ’17)
EPTCS 263, 2017, pp. 38–52, doi:10.4204/EPTCS.263.4
c N.W. Cassee, T.S. Neele & A.J. Wijs
N.W. Cassee, T.S. Neele & A.J. Wijs
39
so far, 5 GB of global memory suffices as the models used for the run-time analysis of GPU EXPLORE
do not require more than 5GB for a state space exploration. In the current paper, we report on results we
have obtained when scaling up models to utilise up to 12 GB.
In addition, we also experimentally compared running GPU EXPLORE on a Titan X GPU with the
Maxwell architecture, which was released on 2015, with GPU EXPLORE running on a Titan X GPU with
the Pascal architecture, which was released a year later. This provides insights regarding the effect recent
hardware developments have on the tool.
Finally, we analyse the scalability of a critical part of the tool, namely its hash table. This structure
is used during model checking to keep track of the progress made through the system state space. Even
a small improvement of the hash table design may result in a drastic improvement in the performance of
GPU EXPLORE. Recently, we identified, by conducting isolated experiments, that there is still potential
for further improvement [9]. In the current paper, we particularly investigate whether changing the size
of the so-called buckets, i.e., data structures that act as containers in which states are stored, can have a
positive effect on the running time.
The structure of the paper is as follows. In Section 2, we discuss related work. Next, an overview of
the inner working of GPU EXPLORE is presented in Section 3. The hash table and its proposed alterations
are discussed in Section 4. After that, we present the results we obtained through experimentation in
Section 5. Finally, conclusions and pointers to future work are given in Section 6.
2
Related work
In the literature, several different designs for parallel hash tables can be found. First of all, there is the
hash table for GPUs proposed by Alcantara et al. [1], which is based on Cuckoo hashing. Secondly,
Laarman et al. [24] designed a hash table for multi-core shared memory systems. Their implementation
was later used as a basis for the hash table underlying the LTS MIN model checker. Other lock-free hash
tables for the GPU are those proposed by Moazeni & Sarrafzadeh [19], by Bordawekar [6] and by Misra
& Chaudhuri [18]. Cuckoo hashing as implemented by Alcantara et al. is publicly available as part of the
CUDPP library 1 . Unfortunately, to the best of our knowledge, there are no implementations available of
the other hash table designs.
Besides GPU EXPLORE [33], there are several other GPU model checking tools. Bartocci et al. [5]
developed an extension for the SPIN model checker that performs state-space exploration on the GPU.
They achieved significant speed-ups for large models.
A GPU extension to the parallel model checking tool DIVINE, called DIVINE-CUDA, was developed by Barnat et al. [4]. To speed-up the model checking process, they offload the cycle detection
procedure to the GPU. Their tool can even benefit from the use of multiple GPUs. DIVINE-CUDA
achieves a significant speed-up when model checking properties that are valid.
Edelkamp and Sulewski address the issues arising from the limited amount of global memory available on a GPU. In [12], they implement a hybrid approach in a tool called C U DM O C, using the GPU
for next state computation, while keeping the hash table in the main memory, to be accessed by multiple
threads running on the Central Processing Unit (CPU). In [13], they keep part of the state space in the
global memory and store the rest on disk. The record on disk can be queried through a process they
call delayed duplicate detection. Even though disk access causes overhead, they manage to achieve a
speed-up over single-threaded tools.
1 http://cudpp.github.io/
40
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
consumers
producer
rec
p0
gen work
c0
send
p1
c1
work
c1
work
τ
rec
c0
τ
par using
send * rec * _ -> trans,
send * _ * rec -> trans
in
"producer.aut"
||
"consumer.aut"
||
"consumer.aut"
end par
Figure 1: Example of LTS network with one producer and two consumers. On the right, the communication between the LTSs is specified using the EXP syntax [14]. Here, producer.aut and consumer.aut
are files containing the specification of the producer and the consumer respectively.
Edelkamp et al. [7, 8] also applied GPU programming to probabilistic model checking. They solve
systems of linear equations on the GPU in order to accelerate the value iteration procedure. GPUs are
well suited for this purpose, and can enable a speed-up of 18 times over a traditional CPU implementation.
Wu et al. [35] have developed a tool called GPURC that performs the full state-space exploration
process on the GPU, similar to GPU EXPLORE. Their implementation applies dynamic parallelism, a
relatively new feature in CUDA that allows launching of new kernels from within a running kernel. Their
tool shows a good speed-up compared to traditional single-threaded tools, although the added benefit of
dynamic parallelism is minimal.
Finally, GPUs are also successfully applied to accelerate other computations related to model checking. For instance, Wu et al. [34] use the GPU to construct counter-examples, and state space decomposition and minimisation are investigated in [26, 31, 32]. For probabilistic model checking, Češka et al. [10]
implemented GPU accelerated parameter synthesis for parameterized continous time Markov chains.
3
GPUs and GPU EXPLORE
GPU EXPLORE [28, 29, 33] is an explicit-state model checker that practically runs entirely on a GPU
(only the general progress is checked on the host side, i.e. by a thread running on the CPU). It is written
in CUDA C, an extension of C offered by N VIDIA. CUDA (Compute Unified Device Architecture) provides an interface to write applications for N VIDIA’s GPUs. GPU EXPLORE takes a network of Labelled
Transition Systems (LTSs) [17] as input, and can construct the synchronous product of those LTSs using
many threads in a Breadth-First-Search-based exploration, while optionally checking on-the-fly for the
presence of deadlocks and violations of safety properties. A (negation of a) safety property can be added
as an automaton to the network.
An LTS is a directed graph in which the nodes represent states and the edges are transitions between
the states. Each transition has an action label representing an event leading from one state to another.
An example network is shown in Figure 1, where the initial states are indicated by detached incoming
arrows. One producer generates work and sends it to one of two consumers. This happens by means of
synchronisation of the ‘send’ and ‘rec’ actions. The other actions can be executed independently. How
the process LTSs should be combined using the relevant synchronisation rules is defined on the right in
Figure 1, using the syntax of the E XP. OPEN tool [17]. The state space of this network consists of 8 states
and 24 transitions.
The general approach of GPU EXPLORE to perform state space exploration is discussed in this sec-
N.W. Cassee, T.S. Neele & A.J. Wijs
41
SM 0
threads (exploration)
SM N
threads (exploration)
shared mem. (cache)
shared mem. (cache)
L1 & L2 cache
texture cache
global memory
(network input)
(global hash table)
Figure 2: Schematic overview of the GPU hardware architecture and GPU EXPLORE
tion, leaving out many of the details that are not relevant for understanding the current work. The
interested reader is referred to [28, 29, 33].
In a CUDA program, the host launches CUDA functions called kernels, that are to be executed many
times in parallel by a specified number of GPU threads. Usually, all threads run the same kernel using
different parts of the input data, although some GPUs allow multiple different kernels to be executed
simultaneously (GPU EXPLORE does not use this feature). Each thread is executed by a streaming processor (SP). Threads are grouped in blocks of a predefined size. Each block is assigned to a streaming
multiprocessor (SM). An SM consists of a fixed number of SPs (see Figure 2).
Each thread has a number of on-chip registers that allow fast access. The threads in a block together
share memory to exchange data, which is located in the (on-chip) shared memory of an SM. Finally, the
blocks can share data using the global memory of the GPU, which is relatively large, but slow, since it
is off-chip. The global memory is used to exchange data between the host and the kernel. The GTX
T ITAN X, which we used for our experiments, has 12 GB global memory and 24 SMs, each having 128
SPs (3,072 SPs in total).
Writing well-performing GPU applications is challenging, due to the execution model of GPUs,
which is Single Instruction Multiple Threads. Threads are partitioned in groups of 32 called warps. The
threads in a warp run in lock-step, sharing a program counter, so they always execute the same program
instruction. Hence, thread divergence, i.e. the phenomenon of threads being forced to execute different
instructions (e.g., due to if-then-else constructions) or to access physically distant parts of the global
memory, negatively affects performance.
Model checking tends to introduce divergences frequently, as it requires combining the behaviour
of the processes in the network, and accessing and storing state vectors of the system state space in
the global memory. In GPU EXPLORE, this is mitigated by combining relevant network information as
much as possible in 32-bit integers, and storing these as textures, that only allow read access and use a
dedicated cache to speed up random accesses.
Furthermore, in the global memory, a hash table is used to store state vectors (Figure 2). The currently
used hash table has been designed to optimise accesses of entire warps: the space is partitioned into
buckets consisting of 32 integers, precisely enough for one warp to fetch a bucket with one combined
memory access. State vectors are hashed to buckets, and placed within a bucket in an available slot. If
the bucket is full, another hash function is used to find a new bucket. Each block accesses the global hash
table to collect vectors that still require exploration.
To each state vector with n process states, a group of n threads is assigned to construct its successors
using fine-grained parallelism. Since access to the global memory is slow, each block uses a dedicated
42
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
state cache (Figure 2). It serves to store and collect newly produced state vectors, that are subsequently
moved to the global hash table in batches. With the cache, block-local duplicates can be detected.
4
The GPU EXPLORE Hash Table
States discovered during the search exploration phase of GPU EXPLORE are inserted into a global memory hash table. This hash table is used to keep track of the open and closed sets maintained during the
breadth first search based exploration of the state space.
Since many accesses (reads and writes) to the hash table are performed during state-space exploration, its performance is critical for our model checker. In order to allow for efficient parallel access,
the hash table should be lock-free. To prevent corruption of state vectors, insertion should be an atomic
operation, even when a state vector spans multiple 32 bit integers.
Given these requirements, we have considered several lock-free hash table implementations. One of
them, proposed by Alcantara et al. [1], uses so-called Cuckoo hashing.
With Cuckoo hashing a key is hashed to a bucket in the hash table, and in case of a collision the key
that is already in the bucket is evicted and rehashed using another hash function to a different bucket.
Re-insertions continue until the last evicted key is hashed to an empty bucket, until all hash functions are
exhausted or until the chain of re-insertions becomes too long [22].
The other hash table we considered is the one originally designed for GPU EXPLORE [33]; we refer to
its hashing mechanism as GPU EXPLORE hashing. We experimentally compared these two hash tables,
and from these comparisons we concluded that while Cuckoo hashing on average performs better, it does
not meet all the demands needed by GPU EXPLORE. However, based on the performance evaluation a
possible performance increase has been identified for GPU EXPLORE hashing [9]. This section discusses
the proposed modification, and its implementation.
4.1
GPU EXPLORE Hashing
Figure 3: Division of threads in a warp over a bucket of size 32 in GPU EXPLORE 2.0
The GPU EXPLORE hash table consists of two parts: the storage used to store the discovered vectors and
the set of hash constants used by the hash function to determine the position of a vector in the hash table.
The memory used to store vectors is divided into buckets with a size of 32 integers. Eachjbucket is addik
tionally split into two equally sized half buckets. Therefore a single bucket can store 2 ∗ vector16length
vectors. The reason for writing vectors to buckets with half-warps (a group of 16 threads) is that in
many cases, atomic writes of half-warps are scheduled in an uninterrupted sequence [33]. This results in
vectors consisting of multiple integers to be written without other write operations corrupting them. It
should be noted that the GPU EXPLORE hash table uses closed hashing, i.e., the vectors themselves are
stored in the hash table, as opposed to pointers to those vectors.
N.W. Cassee, T.S. Neele & A.J. Wijs
43
When inserting, a warp of 32 threads inserts a single vector into a bucket. The way threads are divided
over a bucket can be observed in Figure 3, this figure visualizes a single bucket of the GPU EXPLORE
hash table for a vector length of 3. Each thread in a warp is assigned to one integer of the bucket, and to
one integer of the vector. This assignment is done from left to right per half bucket. For this example the
first 3 threads, i.e., the first vector group, is assigned to the first slot in the bucket, and the first thread in
a vector group is assigned to the first integer of the vector. By assigning every thread to a single part of
the vector and of the bucket each thread has a relatively simple task, which can be executed in parallel.
The insertion algorithm first hashes the vector to insert to determine the bucket belonging to the
vector. Each thread checks its place in the bucket and compares the integer on that position to the
corresponding integer of the vector. After comparing, the insertion algorithm then uses CUDA warp
instructions to quickly exchange data between all 32 threads in the warp to determine whether a single vector group of threads has found the vector. If the vector has been found the insertion algorithm
terminates, if the vector has not been found the algorithm continues.
Figure 4: Example of inserting the vector (8, 2, 1) into the GPU EXPLORE 2.0 hash table.
Figure 4 shows an example of the vector (8, 2, 1) being inserted into the GPU EXPLORE hash table
where the first two slots are already occupied. Because the first two slots are already occupied the first
six threads compare their element of the vector to their element of the bucket. The icons above the arrows
indicate the result of these comparisons. As can be seen there is one thread that has a match, however,
because not all elements in the slot match the insertion algorithm does not report a find.
If the vector is not found in the bucket, the insertion algorithm selects the first free slot in the bucket,
in this case the third slot. This selection procedure can be done efficiently using CUDA warp instructions.
Next, the associated threads attempt to insert the vector (8, 2, 1) into the selected slot using a compare
and swap operation. If the insertion fails because another warp had claimed that slot already for another
vector, the algorithm takes the next free slot in the bucket.
If a bucket has no more free slots the next set of hash constants is used, and the next bucket is
probed. This is repeated until all hash constants have been used, and if no insertion succeeds into any of
the buckets, the insertion algorithm reports a failure and the exploration stops.
In GPU EXPLORE 2.0 the hash table is initialized using eight hash functions. After each exploration
step, blocks that have found new vectors use the insertion algorithm to insert any new vectors they found
into the global hash table. The hash table is therefore a vital part of GPU EXPLORE.
Buckets with a length of 32 integers have been chosen because of the fact that warps in CUDA
consist of 32 threads. This way, every integer in a bucket can be assigned to a single thread. Besides, this
design choice also allows for coalesced memory access: when a warp accesses a continuous block of 32
integers, this operation can be executed in a single memory fetch operation [21]. Uncoalesced accesses,
on the other hand, have to be done individually after each other. By coalescing the accesses, the available
bandwidth to global memory is used efficiently.
44
4.2
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
Configurable Bucket Size
While the current implementation of the hash table makes it possible for GPU EXPLORE to achieve a
considerable increase in performance over CPU-based explicit-state model checkers [33], it suffers from
one disadvantage. Namely, after initially scanning the bucket, only x threads, where x is the vector
length, are active at a time. The other 32 − x threads are inactive while they await the result of the atomic
insertion of the active group. If the insertion fails but there is still a free slot in the hash table, another
group of x threads becomes active to attempt an atomic insertion, while the remaining 32 − x threads
again await the result of this operation.
Figure 5: Division of threads in a warp over buckets of size 8
Therefore, for buckets with a lot of free slots where insertions fail the majority of threads in the
warp are inactive. Furthermore, the vector size generally does not exceed four integers, which means
that when attempting to atomically insert a vector, the majority of threads in a warp is inactive. Ergo,
one possible improvement over the GPU EXPLORE hash table is to reduce the bucket size, so that there
are fewer slots per bucket, and therefore, fewer threads are needed to insert a single vector. As a single
insertion still uses one thread per integer in the bucket, in turn more vectors can be inserted in parallel.
Figure 5 shows what the division of threads over a warp looks like if buckets of size 8 instead of 32
are used. As can be observed, a warp can insert four elements in parallel, as in this diagram each group
of 8 threads inserts a different vector and accesses different buckets in global memory.
The logical consequence of this improvement is that after scanning a bucket, fewer threads are inactive while the vector is being inserted into a free slot. If we suppose that the vector size for a certain
model is 3, and that the new bucket size is 8, then while inserting a vector using the GPU EXPLORE hash
table 32 − 3 = 29 threads are inactive. On the other hand, if four buckets of size 8 are simultaneously
accessed, only 32 − 3 · 4 = 20 threads are inactive, and four vectors are simultaneously processed, as
opposed to only one.
However, while more threads can be active at the same time, smaller buckets also lead to thread
divergence within a warp. First of all, of course, accessing different buckets simultaneously likely leads
to uncoalesced memory accesses. Furthermore, it is also possible that in an insertion procedure, one
group needs to do more work than another in the same warp. For instance, consider that the first group in
the warp fails to find its vector in the designated bucket, and also cannot write it to the bucket since the
latter is full. In that case, the group needs to fetch another bucket. At the same time, another group in the
warp may find its vector in the designated bucket, and therefore be able to stop the insertion procedure.
In such a situation, these two groups will diverge, and the second group will have to wait until the first
group has finished inserting. This means that the use of smaller buckets can only be advantageous if the
performance increase of the smaller buckets outweighs the performance penalty of divergence. In this
paper, we address whether this is true or not in practical explorations.
The suggested performance increase has been experimentally validated by comparing an implementation of the hash table with varying bucket size to the original GPU EXPLORE 2.0 hash table, both in
N.W. Cassee, T.S. Neele & A.J. Wijs
45
GH
G H - CBS
2,500
Runtime (ms)
2,000
1,500
1,000
500
0
0
10
20
30
40
50
60
70
80
90
100
Duplication in sequence
Figure 6: Results of inserting a sequence of 100,000,000 randomly generated integers into the hash tables
of GPU EXPLORE (G H) and GPU EXPLORE with configurable buckets (G H - CBS). For the bucketed
version a bucket size of four integers has been used.
isolation and as a part of GPU EXPLORE. The results of this comparison are presented and discussed in
section 5.
5
Experiments
In this section we discuss our experiments to evaluate the scalability of GPU EXPLORE. In Section 5.1,
we report on experiments to evaluate the effect of the bucket size on the runtimes of GPU EXPLORE. In
the next two sections, our goal is to determine whether GPU EXPLORE scales well when varying the size
of the model and the performance of the hardware, respectively. For most of the experiments, we use an
NVIDIA Titan X (Maxwell) installed on a machine running L INUX M INT 17.2. The number of blocks
is set to 6,144, with 512 threads per block. The hash table is allocated 5GB in global memory.
For our benchmarks, we selected a varied set of models from the CADP toolset [14], the mCRL2
toolset [11] and the BEEM database [23]. The models with a .1 suffix have been modified to obtain a
larger state space.
5.1
Varying the Bucket Size
To test different bucket sizes two types of experiments have been performed. First, the hash table with
varying bucket sizes has been tested in isolation, where the time taken to insert 100,000,000 elements
has been measured. Second, GPU EXPLORE has been modified such that it uses a hash table with modifiable bucket size. This bucket size can be set at compile time. The performance of this version of
GPU EXPLORE has been compared to the original GPU EXPLORE w.r.t. the exploration of several input
models.
The input data for the performance evaluation of the hash tables in isolation is a set of sequences of
46
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
randomly generated integers, each sequence consisting of 100,000,000 vectors with a length of 1 integer.
The sequences vary in how often an element occurs in the sequence. A duplication of 1 means that every
unique element occurs once in the sequence, and a duplication of 100 means that each unique element
in the sequence occurs 100 times. Therefore a sequence with a duplication of 100 has 100,000,000
unique
100
elements. Note that this experiment tries to replicate state space exploration, where many duplicate
insertions are performed when the fan-in is high, i.e., many transitions in the state space lead to the same
state. So this experiment replicates the performance of the hash table for models that vary in the average
fan-in of the states. For each sequence, we measured the total time required to insert all elements.
The results of this comparison are depicted in Figure 6. We refer to the standard GPU EXPLORE
2.0 hash table as G H and the hash table with configurable bucket size as G H - CBS. In the experiment,
G H - CBS with a bucket size of four integers has been compared to G H. G H - CBS is slower for sequences
where each element only occurs a few times. However, for sequences with a higher duplication degree
G H - CBS starts to outperform G H. After all, for the sequences with more duplication, less time is spent
on atomically inserting elements, since most elements are already in the hash table. G H - CBS performs
up to three times better than G H. We will see later why the amount of duplication is relevant for model
checking.
In addition to testing the performance of the hash tables in isolation, the performance of G H - CBS
has been compared with standard GPU EXPLORE hashing as a part of GPU EXPLORE 2.0. The hash
table underlying GPU EXPLORE, as implemented by Wijs, Neele and Bošnački [33], has been modified
to allow configuration of the bucket size at compile time. We compared the time required for state
space exploration of our implementation, GPU EXPLORE with configurable bucket size, with the original
implementation of GPU EXPLORE 2.0 [33].
Four bucket sizes have been compared to GPU EXPLORE 2.0, namely bucket sizes 4, 8, 16 and 32
integers. The relative performance with these bucket sizes has been recorded with the performance of
GPU EXPLORE 2.0 as baseline. For each model the experiment has been run five times and the average
running time of these five runs has been taken.
The result of these comparisons is illustrated in Figure 7. As can be observed the total exploration
time of GPU EXPLORE with configurable bucket size is for most models larger than the runtime of GPUEXPLORE 2.0. Only szymanski5 and lann7 show a small performance increase for bucket size 4. For the
other instances, however, the new hash table causes a slow down of up to 30%.
There are three reasons why the promising performance shown in the previous experiments is not
reflected here. First, the increased complexity of the hash table negatively affects register pressure, i.e.,
the number of registers each thread requires to execute the kernel. When the register usage in a kernel
increases, the compiler may temporarily place register contents in global memory. This effect is not
observed when the hash table is tested in isolation, as in that case, far fewer registers per thread are
required. The increase in register pressure is also the reason that GPU EXPLORE with a configurable
bucket size set to 32 is slower than GPU EXPLORE with a static bucket size of 32.
Furthermore, smaller bucket sizes result in more thread divergence and more uncoalesced memory
accesses when reading from the hash table. Therefore, the available memory bandwidth is used less
efficiently, leading to a drop in performance. Apparently, the increased potential for parallel insertions
of vectors cannot overcome this drawback.
Lastly, while exploring the state-space, GPU EXPLORE only discovers duplicates if those states have
several incoming transitions. On average, the models used for the experiments have a fan-in of 4 to
6, with some exceptions that have a higher fan-in of around 8 to 11. However, from Figure 6 it can
be concluded that the hash table in isolation only starts to outperform the static hash table when each
element is duplicated 21 times. This partly explains the performance seen in Figure 7.
Runtime relative to static bucket size of 32
N.W. Cassee, T.S. Neele & A.J. Wijs
47
wafer stepper.1
odp.1
1394.1
asyn3
lamport8
des
szymanski5
lann6
lann7
asyn3.1
1.3
1.2
1.1
1
4
8
16
32
Bucket size
Figure 7: Relative runtime of GPU EXPLORE 2.0 with variable bucket size. The runtime GPU EXPLORE
2.0 with a fixed bucket size of 32 integers is used as a reference and is normalized to 1.
5.2
Varying the Model Size
In addition to experimentally comparing the effect of different bucket sizes, we also investigated how
GPU EXPLORE 2.0 behaves when exploring state spaces of different size. We performed this experiment
with two different models. The first is a version of the Gas Station model [15] where the number of
pumps is fixed to two. We varied the number of customers between two and twelve. None of these
instances requires a state vector longer than two 32-bit integers.
The other model is a simple implementation of a ring-structured network, where one token is continuously passed forward between the nodes. Each node has two transitions to communicate with its
neighbours and a further three internal transitions. Here, we varied the number of nodes in the network.
We executed the tool five times on each instance and computed the average runtime. The results are
listed in Table 1. For the smallest instances, the performance of GPU EXPLORE (measured in states/sec)
is a lot worse compared to the larger instances. This has two main reasons. First of all, the relative
overhead suffered from initialization and work scanning is higher. Second, the parallelism offered by
the GPU cannot be fully exploited, because the size of one search layer is too small to occupy all blocks
with work.
For the gas station model, peak performance is achieved for the instance with ten customers, which
has 60 million states. For larger instances, the performance decreases slightly due to the increasing
occupancy of the hash table. This leads to more hash collisions, therefore more time is lost on rehashing.
The results of the token ring model show another interesting scalability aspect. There is a performance drop between the instances with 10 nodes and 11 nodes. This is caused by the fact that the
instance with 11 nodes is the smallest for which the state vector exceeds 32 bits in length. Longer state
vectors lead to more memory accesses throughout the state-space generation algorithm.
48
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
Table 1: Performance of GPU EXPLORE for the Gas Station and the Token Ring model while varying the
amount of processes.
Token Ring
Gas Station
5.3
N
states
time (s)
states/sec
2
3
4
5
6
7
8
9
10
11
12
165
1,197
7,209
38,313
186,381
849,285
3,680,721
15,333,057
61,863,669
243,104,733
934,450,425
0.016
0.023
0.035
0.062
0.209
0.718
1.235
3.093
11.229
44.534
178.817
10,294
51,004
206,812
621,989
892,039
1,183,246
2,981,535
4,957,437
5,509,307
5,458,810
5,225,726
N
states
time (s)
states/sec
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
12
54
216
810
2,916
10,206
34,992
118,098
393,660
1,299,078
4,251,528
13,817,466
44,641,044
143,489,070
459,165,024
0.027
0.047
0.067
0.086
0.113
0.180
0.275
0.488
1.087
6.394
8.345
8.138
22.060
68.233
215.889
449
1,138
3,212
9,402
25,702
56,571
127,142
242,225
362,294
203,159
509,462
1,697,864
2,023,649
2,102,934
2,126,853
Speed-up Due to the Pascal Architecture
The Titan X we used for most of the benchmarks is based on the Maxwell architecture, and was launched
in 2015. Since then, NVIDIA has released several other high-end GPUs. Most aspects have been improved: the architecture has been revised, there are more CUDA cores on the GPU and there is more
global memory available. To investigate how well GPU EXPLORE scales with faster hardware, we performed several experiments with a Titan X with the Maxwell architecture (TXM) and with a Titan X
with the Pascal architecture (TXP). The latter was released in 2016, and the one we used is installed in
the DAS -5 cluster [3] on a node running C ENT OS L INUX 7.2.
The TXM experiments were performed with 6,144 blocks, while for the TXP, GPU EXPLORE was
set to use 14,336 blocks. The improvements of the hardware allows for GPU EXPLORE to launch more
blocks. To evaluate the speed-ups compared to a single-core CPU approach, we also conducted experiments with the G ENERATOR tool of the latest version (2017-i) of the C ADP toolbox [14]. These have
been performed on nodes of the DAS -5 cluster, which are equipped with an I NTEL H ASWELL E5-2630v3 2.4 GHz CPU, 64 GB memory, and C ENT OS L INUX 7.2.
The results are listed in Table 2. The reported runtimes are averages after having run the corresponding tool ten times. For most of the larger models, we see a speed-up of about 2 times when running
GPU EXPLORE on a TXP compared to running it on a TXM. The average speed-up is 1.73. This indicates that GPU EXPLORE scales well with a higher memory bandwidth and a larger amount of CUDA
cores.
Comparing GPU EXPLORE on a TXP with single-core CPU analysis, the average speed-up is 183.91,
and if we only take state spaces into account consisting of at least 10 million states, the average speedup is 280.81. Considering that with multi-core model checking, linear speed-ups can be achieved [16],
this roughly amounts to using 180 and 280 CPU cores, respectively. This, in combination with the
N.W. Cassee, T.S. Neele & A.J. Wijs
49
Table 2: Performance comparison of single-core G ENERATOR of C ADP (G EN) and GPU EXPLORE running on a Titan X with the Maxwell architecture (TXM) and with the Pascal architecture (TXP).
runtime (seconds)
model
acs
odp
1394
acs.1
transit
wafer stepper.1
odp.1
1394.1
asyn3
lamport8
des
szymanski5
peterson7
lann6
lann7
asyn3.1
speed-ups
states
G EN
TXM
TXP
G EN-TXP
TXM-TXP
4,764
91,394
198,692
200,317
3,763,192
3,772,753
7,699,456
10,138,812
15,688,570
62,669,317
64,498,297
79,518,740
142,471,098
144,151,629
160,025,986
190,208,728
4.17
3.26
2.81
5.30
34.36
22.95
65.50
82.71
358.58
1048.13
477.43
1516.71
3741.87
2751.15
3396.19
4546.84
0.05
0.08
0.20
0.18
0.77
1.01
1.34
1.42
3.15
5.81
12.34
7.48
31.60
10.57
16.67
31.03
0.06
0.05
0.15
0.14
0.48
0.51
0.66
0.83
1.98
3.11
6.65
3.90
15.74
5.39
8.41
15.37
71.91
70.76
18.95
37.88
70.99
45.17
99.54
99.66
181.47
336.80
71.84
389.10
237.81
510.80
403.92
295.92
0.89
1.64
1.36
1.27
1.59
2.00
2.03
1.71
1.59
1.87
1.86
1.92
2.01
1.96
1.98
2.02
average
183.91
1.73
observation that frequently, speed-ups over 300 times and once even over 500 times are achieved, clearly
demonstrates the effectiveness of using GPUs for explicit-state model checking.
6
Conclusion and Future Work
In this paper, we have reported on a number of scalability experiments we conducted with the GPU
explicit-state model checker GPU EXPLORE. In earlier work, we identified potential to further improve
its hash table [9]. However, experiments in which we varied the bucket size in GPU EXPLORE provided
the insight that only for very specific input models, and only if the bucket size is set very small (4), some
speed-up becomes noticeable. In the context of the entire computation of GPU EXPLORE, the additional
register use per thread and the introduced uncoalesced memory accesses and thread divergence make it
not worthwile to make the bucket size configurable. This may be different for other applications, as our
experiments with the hash table in isolation point out that hashing can be made more efficient in this way.
Besides this, we have also conducted experiments with models of different sizes. We scaled up a Gas
Station model and a Token Ring model and obtained very encouraging results; for the second model,
GPU EXPLORE can generate up to 2.1 million states per second, and for the first model, at its peak,
GPU EXPLORE is able to generate about 5.5 million states per second, exploring a state space of 934.5
million states in under three minutes. We believe these are very impressive numbers that demonstrate the
potential of GPU model checking.
Finally, we reported on some experiments we conducted with new GPU hardware. The Titan X
50
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
with the Pascal architecture from 2016 provides for our benchmark set of models an average speed-up
of 1.73 w.r.t. the Titan X with the Maxwell architecture from 2015. We also compared the runtimes of
GPU EXPLORE running on the Pascal Titan X with the CPU single-core G ENERATOR tool of the C ADP
toolbox, and measured an average speed-up of 183.91 for the entire benchmark set of models, and of
280.81 for the models yielding a state space of at least 10 million states. Often speed-ups over 300 times
have been observed, and in one case even over 500 times.
Future work For future work, we will consider various possible extensions to the tool. First of all,
the ability to write explored state spaces to disk will open up the possibility to postprocess and further
analyse the state spaces. This could be done directly, or after application of bisimulation reduction on
the GPU [26].
Second of all, we will work on making the tool more user friendly. Currently, providing an input
model is quite cumbersome, since GPU EXPLORE requires a user to express system behaviour in the low
level description formalism of networks of LTSs. Specifying systems would be much more convenient if
a higher-level modelling language would be supported. We will investigate which modelling languages
would be most suitable for integration in the current tool.
Finally, we will also consider the application of GPU EXPLORE to conduct computations similar to
model checking, such as performance analysis [30]. This requires to incorporate time into the input
models, for instance by including special actions to represent the passage of time [25].
References
[1] Dan A. Alcantara, Vasily Volkov, Shubhabrata Sengupta, Michael Mitzenmacher, John D. Owens & Nina
Amenta (2012): Building an Efficient Hash Table on the GPU. In: GPU Computing Gems Jade Edition,
Morgan Kaufmann Publishers Inc., pp. 39–53, doi:10.1016/B978-0-12-385963-1.00004-6.
[2] Christel Baier & Joost-Pieter Katoen (2008): Principles of model checking. MIT Press.
[3] Henri Bal, Dick Epema, Cees de Laat, Rob van Nieuwpoort, John Romein, Frank Seinstra, Cees Snoek &
Harry Wijshoff (2016): A Medium-Scale Distributed System for Computer Science Research: Infrastructure
for the Long Term. IEEE Computer 49(5), pp. 54–63, doi:10.1109/MC.2016.127.
[4] Jiřı́ Barnat, Petr Bauch, Luboš Brim & Milan Češka (2012): Designing Fast LTL Model Checking Algorithms
for Many-Core GPUs. JPDC 72(9), pp. 1083–1097, doi:10.1016/j.jpdc.2011.10.015.
[5] Ezio Bartocci, Richard DeFrancisco & Scott A. Smolka (2014): Towards a GPGPU-parallel SPIN Model
Checker. In: SPIN 2014, ACM, New York, NY, USA, pp. 87–96, doi:10.1145/2632362.2632379.
[6] Rajesh Bordawekar (2014): Evaluation of Parallel Hashing Techniques. Presentation at GTC’14 (last
checked on 17 February 2017). http://on-demand.gputechconf.com/gtc/2014/presentations/
S4507-evaluation-of-parallel-hashing-techniques.pdf.
[7] Dragan Bošnački, Stefan Edelkamp, Damian Sulewski & Anton Wijs (2011): Parallel Probabilistic Model
Checking on General Purpose Graphics Processors. STTT 13(1), pp. 21–35, doi:10.1007/s10009-010-01764.
[8] Dragan Bošnački, Stefan Edelkamp, Damian Sulewski & Anton Wijs (2010): GPU-PRISM: An Extension of
PRISM for General Purpose Graphics Processing Units. In: PDMC, IEEE, pp. 17–19, doi:10.1109/PDMCHiBi.2010.11.
[9] Nathan Cassee & Anton Wijs (2017): Analysing the Performance of GPU Hash Tables for State Space
Exploration. In: GaM, EPTCS, Open Publishing Association.
N.W. Cassee, T.S. Neele & A.J. Wijs
51
[10] Milan Češka, Petr Pilař, Nicola Paoletti, Luboš Brim & Marta Kwiatkowska (2016): PRISM-PSY: Precise
GPU-Accelerated Parameter Synthesis for Stochastic Systems. In: TACAS, LNCS 9636, Springer, pp. 367–
384, doi:10.1007/978-3-642-54862-8.
[11] Sjoerd Cranen, Jan Friso Groote, Jeroen J. A. Keiren, Frank P. M. Stappers, Erik P. De Vink, Wieger Wesselink & Tim A. C. Willemse (2013): An Overview of the mCRL2 Toolset and Its Recent Advances. In:
TACAS, LNCS 7795, Springer, pp. 199–213, doi:10.1007/978-3-642-36742-7 15.
[12] Stefan Edelkamp & Damian Sulewski (2010): Efficient Explicit-State Model Checking on General Purpose
Graphics Processors. In: SPIN, LNCS 6349, Springer, pp. 106–123, doi:10.1007/978-3-642-16164-3 8.
[13] Stefan Edelkamp & Damian Sulewski (2010): External memory breadth-first search with delayed duplicate
detection on the GPU. In: MoChArt, LNCS 6572, Springer, pp. 12–31, doi:10.1007/978-3-642-20674-0 2.
[14] Hubert Garavel, Frédéric Lang, Radu Mateescu & Wendelin Serwe (2013): CADP 2011: A Toolbox for
the Construction and Analysis of Distributed Processes. STTT 15(2), pp. 89–107, doi:10.1007/978-3-54073368-3 18.
[15] David Heimbold & David Luckham (1985): Debugging Ada Tasking Programs. IEEE Software 2(2), pp.
47–57, doi:10.1109/MS.1985.230351.
[16] Alfons Laarman (2014): Scalable Multi-Core Model Checking.
doi:10.3990/1.9789036536561.
Ph.D. thesis, University of Twente,
[17] Frédéric Lang (2006): Refined Interfaces for Compositional Verification. In: FORTE, LNCS 4229, Springer,
pp. 159–174, doi:10.1007/11888116 13.
[18] Prabhakar Misra & Mainak Chaudhuri (2012): Performance Evaluation of Concurrent Lock-free Data Structures on GPUs. In: ICPADS, pp. 53–60, doi:10.1109/ICPADS.2012.18.
[19] Maryam Moazeni & Majid Sarrafzadeh (2012): Lock-free Hash Table on Graphics Processors. In: SAAHPC,
pp. 133–136, doi:10.1109/SAAHPC.2012.25.
[20] Thomas Neele, Anton Wijs, Dragan Bošnački & Jaco van de Pol (2016): Partial Order Reduction for GPU
Model Checking. In: ATVA, LNCS 9938, Springer, pp. 357–374, doi:10.1007/978-3-319-46520-3 23.
[21] John Nickolls, Ian Buck, Michael Garland & Kevin Skadron (2008): Scalable Parallel Programming with
CUDA. Queue 6(2), pp. 40–53, doi:10.1145/1365490.1365500.
[22] Rasmus Pagh & Flemming Friche Rodler (2001): Cuckoo Hashing. In: ESA, LNCS 2161, Springer, pp.
121–133, doi:10.1007/3-540-44676-1 10.
[23] Radek Pelánek (2007): BEEM: Benchmarks for Explicit Model Checkers. In: SPIN 2007, LNCS 4595, pp.
263–267, doi:10.1007/978-3-540-73370-6 17.
[24] Steven van der Vegt & Alfons Laarman (2011): A Parallel Compact Hash Table. In: MEMICS, LNCS 7119,
Springer, pp. 191–204, doi:10.1007/978-3-642-25929-6 18.
[25] Anton Wijs (2007): Achieving Discrete Relative Timing with Untimed Process Algebra. In: ICECCS, IEEE,
pp. 35–44, doi:10.1109/ICECCS.2007.13.
[26] Anton Wijs (2015): GPU Accelerated Strong and Branching Bisimilarity Checking. In: TACAS, LNCS
9035, Springer, pp. 368–383, doi:10.1007/978-3-662-46681-0 29.
[27] Anton Wijs (2016): BFS-Based Model Checking of Linear-Time Properties With An Application on GPUs.
In: CAV, Part II, LNCS 9780, Springer, pp. 472–493, doi:10.1007/978-3-319-41540-6 26.
[28] Anton Wijs & Dragan Bošnački (2014): GPUexplore: Many-Core On-the-Fly State Space Exploration Using
GPUs. In: TACAS, LNCS 8413, pp. 233–247, doi:10.1007/978-3-642-54862-8 16.
[29] Anton Wijs & Dragan Bošnački (2016): Many-Core On-The-Fly Model Checking of Safety Properties Using
GPUs. STTT 18(2), pp. 169–185, doi:10.1007/s10009-015-0379-9.
[30] Anton Wijs & Wan Fokkink (2005): From χt to µCRL: Combining Performance and Functional Analysis.
In: ICECCS, IEEE, pp. 184–193, doi:10.1109/ICECCS.2005.51.
52
On the Scalability of the GPU EXPLORE Explicit-State Model Checker
[31] Anton Wijs, Joost-Pieter Katoen & Dragan Bošnački (2014): GPU-Based Graph Decomposition into
Strongly Connected and Maximal End Components. In: CAV, LNCS 8559, Springer, pp. 309–325,
doi:10.1007/978-3-319-08867-9 20.
[32] Anton Wijs, Joost-Pieter Katoen & Dragan Bošnački (2016): Efficient GPU Algorithms for Parallel Decomposition of Graphs into Strongly Connected and Maximal End Components. Formal Methods in System
Design 48(3), pp. 274–300, doi:10.1007/s10703-016-0246-7.
[33] Anton Wijs, Thomas Neele & Dragan Bošnački (2016): GPUexplore 2.0: Unleashing GPU Explicit-State
Model Checking. In: FM, LNCS 9995, Springer, pp. 694–701, doi:10.1007/978-3-319-48989-6 42.
[34] Zhimin Wu, Yang Liu, Yun Liang & Jun Sun (2014): GPU Accelerated Counterexample Generation in LTL
Model Checking. In: ICFEM, LNCS 8829, Springer, pp. 413–429, doi:10.1007/978-3-319-11737-9 27.
[35] Zhimin Wu, Yang Liu, Jun Sun, Jianqi Shi & Shengchao Qin (2015): GPU Accelerated On-the-Fly Reachability Checking. In: ICECCS 2015, pp. 100–109, doi:10.1109/ICECCS.2015.21.
| 8cs.DS
|
How to Generate Pseudorandom
Permutations Over Other Groups:
Even-Mansour and Feistel Revisited
Hector B. Hougaard∗
arXiv:1707.01699v2 [cs.CR] 4 Oct 2017
Abstract
Recent results by Alagic and Russell have given some evidence that
the Even-Mansour cipher may be secure against quantum adversaries
with quantum queries, if considered over other groups than (Z/2)n .
This prompts the question as to whether or not other classical schemes
may be generalized to arbitrary groups and whether classical results
still apply to those generalized schemes.
In this paper, we generalize the Even-Mansour cipher and the Feistel cipher. We show that Even and Mansour’s original notions of secrecy are obtained on a one-key, group variant of the Even-Mansour
cipher. We generalize the result by Kilian and Rogaway, that the
Even-Mansour cipher is pseudorandom, to super pseudorandomness,
also in the one-key, group case. Using a Slide Attack we match the
bound found above. After generalizing the Feistel cipher to arbitrary
groups we resolve an open problem of Patel, Ramzan, and Sundaram
by showing that the 3-round Feistel cipher over an arbitrary group is
not super pseudorandom.
Finally, we generalize a result by Gentry and Ramzan showing that
the Even-Mansour cipher can be implemented using the Feistel cipher
as the public permutation. In this last result, we also consider the
one-key case over a group and generalize their bound.
1
Introduction
In [EM97], Even and Mansour introduced and proved security for the DES
inspired block cipher scheme we now call the Even-Mansour (EM) scheme.
Given a public permutation, P , over n-bit strings, with two different, random,
secret, n-bit keys k1 and k2 , a message x ∈ {0, 1}n could be enciphered as
EMkP1 ,k2 (x) = P (x ⊕ k1 ) ⊕ k2 ,
∗
This article is based on work done for my Master’s Thesis at the University of Copenhagen. For more details on the thesis, contact me at [email protected].
1
with an obvious decryption using the inverse public permutation. The scheme
was minimal, in the sense that they needed to XOR a key before and after
the permutation, otherwise the remaining key could easily be found. As an
improvement, Dunkelman, Keller, and Shamir [DKS12] showed that there
was only a need for a single key and the scheme would still retain an indistinguishability from random, i.e. it was pseudorandom. As another consideration of block ciphers, the Feistel cipher construction of Luby and Rackoff
[LR88] showed how to build pseudorandom permutations from pseudorandom functions.
Eventually, Kuwakado and Morii showed that both the EM scheme [KM12]
and the Feistel scheme [KM10] could be broken by quantum adversaries with
quantum queries. Rather than discard these beautiful constructions entirely,
Alagic and Russell [AR17] considered whether it would be possible to define the two-key EM scheme over Abelian groups in order to retain security
against quantum adversaries with quantum queries. What they showed was
a security reduction to the Hidden Shift Problem, over certain groups, such
as Z/2n and Sn . This result inspires us to ask whether the EM and Feistel
schemes can be generalized over all groups, and if so, whether or not we can
get pseudorandomness in some model.
1.1
Prior Work
In extension of their simplification of the EM scheme, Dunkelman, Keller, and
Shamir [DKS12] attacked the construction using variants of slide attacks in
order to show that the security bound was optimal. They further considered
other variants of the EM scheme, such as the Addition Even-Mansour with
an Involution as the Permutation (two-keyed). Also Kilian and Rogaway
[KR01] were inspired by DESX and EM to define their F X construction, of
which the EM scheme is a special case.
As referred to above, Kuwakado and Morii were able to break the EM
scheme [KM12] and the 3-round Feistel scheme [KM10] on n-bit strings, using
Simon’s algorithm, if able to query their oracle with a superposition of states.
Kaplan et al. [KLLNP16], using Kuwakado and Morii’s results, showed how
to break many classical cipher schemes, which in turn incited Alagic and
Russell [AR17].
In their work with the Hidden Shift Problem, [AR17] posit that a Feistel
cipher construction over other groups than the bit strings might be secure
against quantum adversaries with quantum queries. Many Feistel cipher variants exist, with different relaxations on the round functions, see for example
[NR99] and [PRS02], the latter of which also considered Feistel ciphers over
other groups. Vaudenay [Vau98] also considered Feistel ciphers over other
2
groups in order to protect such ciphers against differential analysis attacks
by what he called decorrelation.
Removed from the schemes considered below and with a greater degree of
abstraction, Black and Rogaway [BR02] consider ciphers over arbitrary domains. In general, on the question of the existence of quantum pseudorandom
permutations, see [Zha16].
1.2
Summary of Results
We work in the Random Oracle Model and consider groups G in the family of
finite groups, G. We consider pseudorandom permutations, given informally
as the following.
Definition 1. [Informal] A keyed permutation P on a group G is a Pseudorandom Permutation (PRP) on G if it is indistinguishable from a
random permutation for all probabilistic distinguishers having access to only
polynomially many permutation-oracle queries.
A Super Pseudorandom Permutation (SPRP) is a permutation
where the distinguisher is given access to the inverse permutation-oracle as
well.
We define the Group Even-Mansour (EM) scheme on G to be the
encryption scheme having the encryption algorithm
Ek (m) = P (m · k) · k,
where m ∈ G is the plaintext and k ∈ G is the uniformly random key.
We define two problems for the Group Even-Mansour scheme: Existential Forgery (EFP) and Cracking (CP). In EFP, the adversary must
eventually output a plaintext-ciphertext pair which satisfies correctness. In
CP, the adversary is given a ciphertext and asked to find the corresponding
plaintext.
It holds that for our Group EM scheme, the probability that an adversary
succeeds in the EFP is polynomially bounded:
Theorem 2. [Informal] If P is a uniformly random permutation on G and
k ∈ G is chosen uniformly at random. Then, for any probabilistic adversary
A, the success probability of solving the EFP is negligible, specifically, bounded
by
st
,
O
|G|
where s and t are the amount of encryption/decryption- and permutation/inverse
permutation-oracle queries, respectively.
3
By a basic reduction, and for the latter, by an inference result, we also
get that
Theorem 3. [Informal] If P is a super pseudorandom permutation on G
and k ∈ G is chosen uniformly at random. For any probabilistic adversary
A, the success probability of solving the EFP is negligible.
Corollary 4. [Informal] If P is a super pseudorandom permutation on G
and k ∈ G is chosen uniformly at random. For any polynomial-time probabilistic adversary A, the success probability of solving the CP is negligible.
With the same bound as in Theorem 2, we find that
Theorem 5. [Informal] For any probabilistic adversary A, limited to polynomially many encryption- and decryption-oracle queries and polynomially
many permutation- and inverse permutation-oracle queries, the Group EM
scheme over a group G is a super pseudorandom permutation.
We then apply a Slide Attack, to find an attack which matches the bound
given above.
Considering the Group Feistel cipher, whose encryption algorithm consists of multiple uses of the round function
Ff (x, y) = (y, x · f (y)),
where f is a pseudorandom function on G, we show that the 3-round Feistel
cipher is pseudorandom but is not super pseudorandom, regardless of the
underlying group G. We then note that the 4-round Feistel cipher is super
pseudorandom as proven in [PRS02].
Finally, we consider the Group Even-Mansour scheme instantiated
using a 4-round Feistel cipher over G2 = G×G, which uses the encryption
algorithm
Ψf,g
k (m) = Fg,f,f,g (m · k) · k,
where f and g are modelled as random functions, m ∈ G2 the plaintext, and
k ∈ G2 is a uniformly random key. We then show one of our main results:
Theorem 6. [Informal] For any probabilistic 4-oracle adversary A with at
most
• qc queries to the Ψ- and inverse Ψ-oracles (or random oracles),
• qf queries to the f -oracle, and
4
• qg queries to the g-oracle,
we have that the success probability of A distinguishing between Ψ and a
random oracle, is bounded by
q
2
2
−1
(2qc + 4qf qc + 4qg qc + 2qc − 2qc )|G| + 2 · c (2|G|−1 + |G|−2 ).
2
We may also rewrite our main theorem as the following:
Theorem 7. [Informal] For any 4-oracle adversary A, with at most q total
queries, we have that the success probability of A distinguishing between Ψ
and a random oracle, is bounded by
2(3q 2 − 2q)|G|−1 + (q 2 − q)|G|−2 .
We note that this main result is due to [GR04], however, we consider a
one-key group version and add details to their proof sketches.
1.3
Outline of Paper
In Section 2, we state the assumptions for this paper. In Section 2, we give
definitions that hold for the paper in general, leaving specialized definitions
to the various sections. In Section 3, we introduce the generalized EM scheme
over arbitrary groups, stating and proving some results about it. In Section 4,
we define the generalized Feistel cipher over arbitrary groups and prove a few
small results about it. In Section 5, we consider an implementation of the
generalized EM scheme using the generalized Feistel cipher as the public
permutation. In Section 6, we give our concluding remarks.
2
General Definitions
In the following, we work in the Random Oracle Model such that we may
assume the existence of a random permutation oracle on group elements. We
let G be the family of all finite groups, e.g. a group G ∈ G is a pair of the set
G and operation · satisfying the group axioms. We also assume that for any
group G ∈ G, |G| ≤ 2poly(n) for some n ∈ N and some polynomial poly(·).
We will need the concept of pseudorandom, which is also called indistinguishable from random, in several forms. On notation, we write x ∈R X
for an element chosen uniformly at random from a set X. In the following,
we consider the positive integer λ to be the security parameter, specified in
unary per convention. We assume that for each λ there exists a uniquely
specified group G(λ) = Gλ ∈ G with size |Gλ | ≥ 2λ .
5
Definition 8. Let Fm,n : Gλ × Gm → Gn , for Gm , Gn ∈ G, be an efficient,
keyed function. Fm,n is a pseudorandom function (PRF) if for all probabilistic distinguishers A, limited to only polynomially many queries to the
function-oracle, there exists a negligible function negl(·), such that
Pr
k∈R Gλ
AFm,n (k,·) (λ) = 1 −
Pr
π∈R FGm →Gn
π(·)
A (λ) = 1 ≤ negl(λ),
where FGm →Gn is the set of functions from Gm to Gn .
If F : G × G → G is a pseudorandom function, we say that it is a
pseudorandom function on G.
Definition 9. Let P : Gλ ×G → G be an efficient, keyed permutation. P is a
pseudorandom permutation (PRP) if for all probabilistic distinguishers
A, limited to only polynomially many queries to the permutation-oracle, there
exists a negligible function negl(·), such that
Pr
k∈R Gλ
P (k,·)
A
(λ) = 1 −
Pr
π∈R PG→G
Aπ(·) (λ) = 1 ≤ negl(λ),
where PG→G is the set of permutations on G.
Definition 10. Let P : Gλ × G → G be an efficient, keyed permutation.
P is said to be a super pseudorandom permutation (SPRP) if for all
probabilistic distinguishers A, limited to only polynomially many queries to
the permutation- and inverse permutation-oracles, there exists a negligible
function negl(·), such that
Pr
k∈R Gλ
h
AP (k,·),P
−1 (k,·)
i
(λ) = 1 −
Pr
π∈R PG→G
h
Aπ(·),π
−1 (·)
(λ) = 1
i
≤ negl(λ),
where PG→G is the set of permutations on G.
A (super) pseudorandom permutation P : G × G → G is said to be a
(super) pseudorandom permutation on G.
6
3
Even-Mansour
We first remark that the results in this section were initially proven in a
project prior to the start of the thesis but were further worked on to complement this thesis. Thus we have chosen to include parts of it, while this
inclusion accounts for the brevity in certain results. We begin by defining
the one-key Even-Mansour scheme over arbitrary groups, which we will refer
to as the Group EM scheme.
Definition 11. We define the Group Even-Mansour scheme to be the
triple of a key generation algorithm, encryption algorithm, and decryption
algorithm. The key generation algorithm takes as input the security parameter 1λ , fixes and outputs a group G ∈R G with |G| ≥ 2λ , and outputs a key
k ∈R G. The encryption algorithm Ek (m) takes as input the key k and a
plaintext m ∈ G and outputs
Ek (m) = P (m · k) · k,
where P is the public permutation. The decryption algorithm Dk (c) takes as
input the key k and a ciphertext c ∈ G and outputs
Dk (c) = P −1 (c · k −1 ) · k −1 ,
where P −1 is the inverse public permutation. This definition satisfies correctness.
3.1
Two Forms of Security for the Group EM Scheme
In this subsection, we prove classical results about our new scheme. We do so
by considering Even and Mansour’s two notions of security: the Existential
Forgery Problem and the Cracking Problem, the Cracking Problem being the
stronger of the two.
Definition 12. In the Existential Forgery Problem (EFP), we consider
the following game:
1. A group G ∈ G and a key k ∈R G are generated.
2. The adversary A gets the security parameter, in unary, and the group
G.
3. A receives oracle access to the Ek , Dk , P, and P −1 oracles.
4. A eventually outputs a pair (m, c).
7
If Ek (m) = c, and (m, c) has not been queried before, we say that A succeeds.
In the Cracking Problem (CP), we consider the following game:
1. A group G ∈ G and a key k ∈R G are generated.
2. The adversary A gets the security parameter, in unary, and the group
G.
3. A is presented with Ek (m0 ) = c0 ∈R G.
4. A receives oracle access to the Ek , Dk , P, and P −1 oracles, but the decryption oracle outputs ⊥ if A queries c = c0 .
5. A outputs a plaintext m.
If Dk (c0 ) = m, then we say that A succeeds. The success probability is the
probability that on a uniformly random chosen encryption c0 = Ek (m0 ), A
outputs m0 .
Even and Mansour show that polynomial-time EFP security infers polynomial-time CP security. There are no limiting factors prohibiting the problems and inference result from being employed on groups. In fact, there is
nothing disallowing the use of the same proof of the EFP security for the EFP
security of the one-key EM scheme, as noted in [DKS12], which we therefore
omit. Indeed, by redefining notions in the [EM97] proof to take into account
that we are working over a not necessarily abelian group, we are able to prove
that the Group EM scheme satisfies the EFP notion of security, specifically
the following.
Theorem 13. Assume P ∈R PG→G and let the key k ∈R G. For any probabilistic adversary A, the success probability of solving the EFP is bounded
by
st
,
Succ(A) = P rk,P [EF P (A) = 1] = O
|G|
where s is the number of E/D-queries and t is the number of P/P −1 -queries,
i.e. the success probability is negligible.
By the Even and Mansour inference result, we get the corollary below.
Corollary 14. Assume P ∈R PG→G and let the key k ∈R G. For any
probabilistic polynomial-time (PPT) adversary A, the success probability of
solving the Cracking Problem is negligible.
8
As Even and Mansour also note, the above results may be extended to
instances where the permutation is a pseudorandom permutation by a simple
reduction. Hence, we get the following two results.
Theorem 15. Assume P is a pseudorandom permutation on G ∈ G and let
the key k ∈R G. For any probabilistic adversary A with only polynomially
many queries to its oracles, the success probability of solving the Existential
Forgery Problem is negligible.
Corollary 16. Assume P is a pseudorandom permutation on G ∈ G and let
the key k ∈R G. For any probabilistic polynomial-time (PPT) adversary A,
the success probability of solving the Cracking Problem is negligible.
3.2
Pseudorandomness Property of the Group EM Scheme
Although the above notions of security are strong, we are more interested
in any pseudorandomness property the Group EM scheme offers us. Kilian
and Rogaway [KR01] show that the one-key EM scheme satisfies the pseudorandom permutation property, i.e. with only an encryption oracle and the
permutation oracles, the EM scheme is indistinguishable from random to any
adversary with only polynomially many queries to its oracles. We note that
they only show the pseudorandomness property, but state in their discussion
section that their proof may be adapted to include a decryption oracle, i.e.
that the one-key EM scheme satisfies the super pseudorandom permutation
property. Having done the analysis with the decryption oracle, over an arbitrary group, we concur. However, we were also able to generalize the [KR01]
proof to a one-key construction. This not entirely remarkable as the key k
will usually be different from its group inverse, hence we were able to use
the same proof, but with adjustments to the games and their analysis. The
proof is given in the appendix for posterity. For completeness, we present
the result as the following theorem.
Theorem 17. Assume P ∈R PG→G and let the key k ∈R G. For any
probabilistic adversary A, limited to polynomially many E/D- and P/P −1 oracle queries, the adversarial advantage of A is bounded by
h
i
h
i
st
def
P,P −1
P,P −1
.
Adv(A) = P r AEk ,Dk = 1 − P r Aπ,π−1 = 1 = O
|G|
where s is the number of E/D-queries and t is the number of P/P −1 -queries,
i.e. the success probability is negligible.
Stated simply,
9
Theorem 18. For any probabilistic adversary A, limited to polynomially
many E/D- and P/P −1 -oracle queries, the Group EM scheme over a group
G is a super pseudorandom permutation.
By removing the decryption oracle, we get the following corollary:
Corollary 19. For any probabilistic adversary A, limited to polynomially
many E- and P/P −1 -oracle queries, the Group EM scheme over a group G
is a pseudorandom permutation.
Remark. We see that in the group ((Z/2Z)n , ⊕), our Group EM scheme
reduces to the one-key EM scheme given in [DKS12]. The proof given in
[DKS12] proves the security of the scheme, and the proof given in [KR01]
proves the pseudorandomness, equivalently to our claims.
It can be proven that a multiple round Group EM scheme is an SPRP
because the security only depends on the last round, which is also an SPRP.
3.3
Slide Attack
We would like to show that the security bound that we have found above
is optimal, so we slightly alter the simple optimal attack on the Single-Key
Even-Mansour cipher as constructed in [DKS12]. The original version works
for abelian groups with few adjustments and [DKS12] also present another
slide attack against a modular addition DESX construction.
Consider the one-key Group Even-Mansour cipher
E(x) = P (x · k) · k,
over a group G with binary operation ·, where P is a publicly available
permutation oracle, x ∈ G, and k ∈R G. Define the following values:
x = x, y = x · k, z = P (y), w = E(x) = P (x · k) · k.
We hereby have that w · y −1 = z · x−1 . Consider the attack which follows.
p
1. For d = |G| arbitrary values xi ∈ G, i = 1, . . . , d, and d arbitrary
values yi ∈ G, i = 1, . . . , d, query the E-oracle on the xi ’s and the
P -oracle on the yi ’s. Store the values in a hash table as
(E(xi ) · yi−1 , P (yi ) · x−1
i , i),
sorted by the first coordinate.
10
2. If there exists a match in the above step, i.e. E(xi ) · yi−1 = P (yi ) · x−1
i
for some i, check the guess that k = x−1
·
y
.
i
i
It can be seen by the Birthday Problem1 , that with non-negligible probability,
there must exist a slid pair (xi , yi ) satisfying the above property, i.e. there
2
exists 1 ≤ i ≤ d such that k = x−1
i · yi . For a random pair (x, y) ∈ G it
−1
−1
holds that E(x) = P (y) · x · y with probability |G| , so we expect few, if
any, collisions in the hash table, including the collision by the slid pair where
the correct key k is found. The data complexity of the attack is d E-oracle
queries and d P -oracle queries. Hence the attack bound d2 = |G|, which
matches the lower bound given in Theorem 13 and Theorem 39. We have
therefore found that our scheme is optimal.
2
n
Considering the approximation p(n) ≈ 2m
, where p(n) is the probability of there being
a Birthday Problem
collision
from
n
randomly
chosen elements from the set of m elements,
√ 2
p
|G|
then p( |G|) ≈ 2|G| = 1/2.
1
11
4
Feistel
We now consider the Feistel cipher over arbitrary groups, which we will call
the Group Feistel cipher. The following is a complement to [PRS02] who
treat the Group Feistel cipher construction with great detail. Our main
accomplishment in this section is the settling of an open problem posed by
them.
4.1
Definitions
We define a Feistel cipher over a group (G, ·) as a series of round functions
on elements of G × G = G2 .
Definition 20. Given an efficiently computable but not necessarily invertible
function f : G → G, called a round function, we define the 1-round
Group Feistel cipher Ff to be
Ff : G × G −→ G × G,
(x, y) 7−→ (y, x · f (y)).
In the case where we have multiple rounds, we index the round functions as
fi , and denote the r-round Group Feistel cipher by Ff1 ,...,fr . We concurrently denote the input to the i’th round by (Li−1 , Ri−1 ) and having the
output (Li , Ri ) = (Ri−1 , Li−1 · fi (Ri−1 )), where Li and Ri respectively denote
the left and right parts of the i’th output.
Note that if (Li , Ri ) is the i’th round output, we may invert the i’th round
by setting Ri−1 := Li and then computing Li−1 := Ri · (fi (Ri−1 ))−1 to get
(Li−1 , Ri−1 ). As this holds for all rounds, regardless of the invertibility of the
round functions, we get that an r-round Feistel cipher is invertible for all r.
Let F : Gλ × G → G be a pseudorandom function. We define the keyed
permutation F (r) as
(r)
def
Fk1 ,...,kr (x, y) = FFk1 ,...,Fkr (x, y).
We sometimes index the keys as 1, 2, . . . , r, or omit the key index entirely.
4.2
Results
For completeness, we show some of the preliminary results for Group Feistel
ciphers, not considered in [PRS02].
12
We first note that F (1) is not a pseudorandom permutation as
(1)
Fk1 (L0 , R0 ) = (L1 , R1 ) = (R0 , L0 · Fk1 (R0 )),
such that any distinguisher A need only compare R0 to L1 .
Also F (2) is not a pseudorandom permutation: Consider a pseudorandom
function F on G. Pick k1 , k2 ∈R Gλ . Distinguisher A sets (L0 , R0 ) = (1, g)
for some g ∈ G, where 1 is the identity element of G, then queries (L0 , R0 )
to its oracle and receives,
L2 = L0 · Fk1 (R0 ) = Fk1 (g) and R2 = R0 · Fk2 (L0 · Fk1 (R0 )) = g · Fk2 (Fk1 (g)).
On its second query, the distinguisher A lets L0 ∈ G \ {1} but R0 = g, such
that it receives
L2 = L0 · Fk1 (R0 ) = L0 · Fk1 (g) and R2 = g · Fk2 (L0 · Fk1 (g)).
As A may find the inverse to elements in G, A acquires (Fk1 (g))−1 , and
by so doing, may compute L2 · (Fk1 (g))−1 = L0 . If F (2) were random, this
would only occur negligibly many times, while A may query its permutationoracle polynomially many times such that if L0 is retrieved non-negligibly
many times out of the queries, A is able to distinguish between a random
permutation and F (2) with non-negligible probability.
As one would expect, the 3-round Group Feistel cipher (see Figure 1a) is
indeed a pseudorandom permutation.
Theorem 21. If F is a pseudorandom function on G, then F (3) is a pseudorandom permutation on G.
The proof of this proposition can be generalized from the proof given in
Katz and Lindell [KL15] of the analogous result over bit-strings with XOR,
with no difficulties. We therefore omit it here.
Among the considerations in [PRS02], they showed that the 3-round Feistel cipher over abelian groups was not super pseudorandom, but left as an
open problem a proof over non-abelian groups. We present such a proof now.
Proposition 22. The 3-round Group Feistel cipher is not super pseudorandom.
Proof. The proof is a counter-example using the following procedure:
1. Choose two oracle-query pairs in G × G: (L0 , R0 ) and (L00 , R0 ) where
L0 6= L00 .
2
TikZ figure adapted from [Jea16].
13
xL
·k L
xR
·k R
g
L0
R0
f1
f
f2
f
f3
g
·k L
L3
yL
R3
·k R
yR
(b) Group EM scheme with Feistel.2
(a) 3-round Group Feistel cipher.
Figure 2: Encryption schemes.
2. Query the encryption oracle to get (L3 , R3 ) and (L03 , R30 ).
3. Query (L003 , R300 ) = (L03 , L0 · (L00 )−1 · R30 ) to the decryption oracle.
4. If R000 = L03 · (L3 )−1 · R0 , guess that the oracle is F (3) , else guess random.
For F (3) , this algorithm succeeds with probability 1. For a random permutation, this algorithm succeeds negligibly often.
For super pseudorandomness of the 4-round Group Feistel cipher, we refer
the reader to [PRS02]. In the paper, they show a strong result using certain
hash functions as round functions, from which the following is a corollary.
Corollary 23. Let G be a group, with characteristic other than 2, and let
f, g : Gλ × G → G be pseudorandom functions. Then, for any adversary
A with polynomially many queries to its E/D-oracles, the family P of permutations on G × G consisting of permutations of the form F (4) = Fg,f,f,g
are indistinguishable from random, i.e. super pseudorandom permutations
(SPRPs).
14
5
Implementing the Group Even-Mansour Scheme
Now that we have shown that both the Even-Mansour scheme and the Feistel cipher are generalizable to arbitrary groups, we might consider how to
implement one given the other. Gentry and Ramzan [GR04] considered exactly this for the two-key EM scheme over (Z/2Z)n . However, their paper
only had sketches of proofs and refer to another edition of the paper for full
details. As we are unable to find a copy in the place that they specify it to
exist, and as we generalize their result non-trivially, we have decided to fill
in the details while generalizing their proof.
In this section, we consider a generalized version of the Gentry and
Ramzan [GR04] construction, namely, the Group Even-Mansour scheme on
G2 instantiated with a 4-round Group Feistel cipher as the public permutation:
Ψf,g
k (x) = Fg,f,f,g (x · k) · k,
where k = (k L , k R ) ∈ G2 is a key consisting of two subkeys, chosen independently and uniformly at random, and f and g are round functions on G,
modelled as random function oracles, available to all parties, including the
adversary. We consider the operation x · k for x = (xL , xR ) ∈ G2 , to be the
coordinate-wise group operation, but do not otherwise discern between it and
the group operation · on elements of G. In the following, we shall follow the
proof in [GR04] closely. However, we make quite a few modifications, mostly
due to the nature of our generalization. Note that we consider a one-key
scheme, as opposed to the two-key version in [GR04] (see Figure 1b.) Our
main theorem for this section is the following.
Theorem 24. Let f, g be modelled as random oracles and let the subkeys of
k = (k L , k R ) ∈ G2 be chosen independently and uniformly at random. Let
Ψf,g
k (x) = Fg,f,f,g (x · k) · k, and let R ∈R PG2 →G2 . Then, for any probabilistic
4-oracle adversary A with at most
• qc queries to Ψ and Ψ−1 (or R and R−1 ),
• qf queries to f , and
• qg queries to g,
we have
h
i
h
i
−1
−1
P r AΨ,Ψ ,f,g = 1 − P r AR,R ,f,g = 1
≤
(2qc2
+ 4qf qc + 4qg qc +
2qc2
−1
− 2qc )|G|
15
q
+ 2 · c (2|G|−1 + |G|−2 ).
2
5.1
Definitions
Before we can begin the proof, we will need several definitions all of which
are identical to the [GR04] definitions, up to rewording.
Definition 25. Let P denote the permutation oracle (either Ψ or R), Of
and Og the f and g oracles, respectively. We get the transcripts: TP , the set
of all P queries, Tf , the set of all f queries, and Tg , the set of all g queries,
i.e. the sets
TP = {hx1 , y1 i, hx2 , y2 i, · · · , hxqc , yqc i}P ,
Tf = {hx01 , y10 i, hx02 , y20 i, · · · , hx0qf , yq0 f i}f ,
Tg = {hx001 , y100 i, hx002 , y200 i, · · · , hx00qg , yq00g i}g .
We discern between two types of oracle queries: Cipher queries (+, x) = P (x)
and (−, y) = P −1 (y); Oracle queries (Of , x0 ) and (Og , x00 ), respectively f - and
g-oracle queries.
As we have no bounds on the computational complexity of the adversary
A, we may assume that A is deterministic, as we did in the proof of Theorem 39. Hence, we may consider an algorithm CA which, given a set of A’s
queries, can determine A’s next query.
Definition 26. For 0 ≤ i ≤ qc , 0 ≤ j ≤ qf , and 0 ≤ k ≤ qg , the i+j+k+1’st
query by A is
CA {hx1 , y1 i, . . . , hxi , yi i}P , {hx01 , y10 i, . . . , hx0j , yj0 i}f , {hx001 , y100 i, . . . , hx00k , yk00 i}g
where the upper equality case on the indexes is defined to be A’s final output.
Definition 27. Let σ = (TP , Tf , Tg ) be a tuple of transcripts with length
qc , qf , qg , respectively. We say that σ is a possible A-transcript if for every
1 ≤ i ≤ qc , 1 ≤ j ≤ qf , and 1 ≤ k ≤ qg ,
CA {hx1 , y1 i, . . . , hxi , yi i}P , {hx01 , y10 i, . . . , hx0j , yj0 i}f , {hx001 , y100 i, . . . , hx00k , yk00 i}g
∈ {(+, xi+1 ), (−, yi+1 ), (Of , x0j+1 ), (Og , x00k+1 )}.
Let us define two useful ways in which we may answer A’s queries other
than what we have already defined.
Definition 28. Let Ψ̃ be the process where the Ψ- and Ψ−1 cipher query
oracles use f and g, and Of uses f , but Og is replaced by Oh for another,
independent, random function h.
16
Definition 29. Let R̃ denote the process which answers all oracle queries
using f and g, but answers the i’th cipher query as follows.
1. If A queries (+, xi ) and there exists 1 ≤ j < i, such that the j’th
query-answer pair has xj = xi , return yi := yj .
2. If A queries (−, yi ) and there exists 1 ≤ j < i, such that the j’th
query-answer pair has yj = yi , return xi := xj .
3. Otherwise, return uniformly chosen element in G2 .
The latter definition may not be consistent with any function or permutation, so we formalize exactly this event.
Definition 30. Let TP be a possible A-cipher-transcript. TP is inconsistent
if for some 1 ≤ i < j ≤ qc there exist cipher-pairs such that either
• xi = xj but yi 6= yj , or
• xi 6= xj but yi = yj .
Any σ containing such a transcript TP is called inconsistent.
Note. Assume from now on that A never repeats any part of a query if
the answer can be determined from previous queries, i.e. every possible Atranscript σ is consistent such that if i 6= j, then xi 6= xj , yi 6= yj , x0i 6= x0j ,
and x00i 6= x00j .
Note. Let TΨ , TΨ̃ , TR̃ , TR denote the transcripts seen by A when its cipher
queries are answered by Ψ, Ψ̃, R̃, R, respectively, and oracle queries by Of
and Og (noting that in the case of Ψ̃, the function in the Og has been replaced
by another random function, h.) We also note that using this notation, we
−1
have that AΨ,Ψ ,f,g = CA (TΨ ) (and likewise for Ψ̃, R̃, and R.)
5.2
Lemmas
Now, let us begin finding results that will aid us in proving our main theorem.
First, we will compare the distributions of R̃ and R, using a result by NaorReingold3 . Afterwards, we shall consider when the distributions of Ψ and Ψ̃
are equal. Lastly, we shall consider when the distributions of Ψ̃ and R̃ are
equal. Combining these results will allow us to prove our main theorem.
We remark that whenever we write k = (k L , k R ) ∈R G2 , we mean that
the subkeys are chosen independently and uniformly at random.
3
The proof of the proposition follows the argument of Proposition 3.3 in [NR99].
17
q
Lemma 31. P r [CA (TR̃ ) = 1] − P r [CA (TR ) = 1] ≤ c · |G|−2 .
2
R
R̃
Proof. Let σ be a possible and consistent A-transcript, then
2
|G|
= P r [TR̃ = σ | TR̃ is consistent] ,
P r [TR = σ] =
qc
R
R̃
simply because the only difference between TR and TR̃ is in the cipher queries,
and when TR̃ is consistent, we have no overlap on the query-answer pairs,
hence we need only consider how to choose qc elements from |G|2 many
possible elements, without replacement. Let us now consider the probability
of TR̃ being inconsistent. If TR̃ is inconsistent for some 1 ≤ i < j ≤ qc then
either xi = xj and yi 6= yj , or xi 6= xj and yi = yj . For any given i, j,
this happens with at most probability |G|−2 , because if xi = xj is queried,
then the R̃-oracle would return the corresponding yi = yj , but if xi 6= xj is
queried, then the R̃-oracle would return a uniformly random element (and
likewise if yi = yj or yi 6= yj were queried to the inverse R̃-oracle.) Hence,
q
P r [TR̃ is inconsistent] ≤ c · |G|−2 .
2
R̃
We thereby get that,
P r [CA (TR̃ ) = 1] − P r [CA (TR ) = 1]
R
R̃
≤ P r [CA (TR̃ ) = 1|TR̃ is consistent] − P r [CA (TR ) = 1] · P r [TR̃ is consistent]
R
R̃
R̃
+ P r [CA (TR̃ ) = 1|TR̃ is inconsistent] − P r [CA (TR ) = 1] · P r [TR̃ is inconsistent]
R
R̃
R̃
≤ P r [TR̃ is inconsistent]
R̃
q
≤ c · |G|−2 ,
2
as the distribution over R is independent of the (in)consistency of TR̃ .
Let us now focus on the distributions of TΨ and TΨ̃ , to show that they
are identical unless the input to g in the cipher query to Ψ is equal to the
oracle input to h in Oh . In order to do so, we first define the event BadG(k).
Definition 32. For every specific key k = (k L , k R ) ∈R G2 , we define BadG(k)
to be the set of all possible and consistent A-transcripts σ, satisfying at least
one of the following:
R
00
BG1: ∃i, j, 1 ≤ i ≤ qc , 1 ≤ j ≤ qg , such that xR
i · k = xj , or
18
BG2: ∃i, j, 1 ≤ i ≤ qc , 1 ≤ j ≤ qg , such that yiL · (k L )−1 = x00j .
Lemma 33. Let k = (k L , k R ) ∈R G2 . For any possible and consistent Atranscript σ = (TP , Tf , Tg ), we have
P r [σ ∈ BadG(k)] ≤
k
2qg qc
.
|G|
Proof. We know that σ ∈ BadG(k) if one of BG1 or BG2 occur, hence,
using the union bound,
P r [σ ∈ BadG(k)] = P r [BG1 occurs ∨ BG2 occurs |σ]
k
k
≤ P r [BG1 occurs |σ] + P r [BG2 occurs |σ]
k
k
−1
−1
≤ qg qc · |G| + qg qc · |G|
= 2qg qc · |G|−1 .
Lemma 34. Let σ be a possible and consistent A-transcript, then
P r [TΨ = σ|σ 6∈ BadG(k)] = P r [TΨ̃ = σ] .
Ψ
Ψ̃
Proof. We want to show that the query answers in the subtranscripts of the
games Ψ and Ψ̃ are equally distributed, under the condition that neither of
the events BG1 nor BG2 occur in game Ψ. Fix the key k = (k L , k R ) ∈R G2 .
Recall that the adversary does not query an oracle if it can determine the
answer from previous queries.
In both games, for any Of -oracle query x0 ∈ G, the query answer will
be equally distributed in both games as the underlying random function f is
the same in both games.
In game Ψ, an Og -oracle query, x00 ∈ G, will have a uniformly random
answer as g is a random function. Likewise, in game Ψ̃, an Og -oracle query,
x00 ∈ G, will have a uniformly random answer as h is a random function.
Consider now the permutation oracle P = Fg,f,f,g (x · k) · k. We consider
a query-answer pair hx, yi ∈ TP for x, y ∈ G2 .
In both games, xR · k R will be the input to the first round function, which
is g. In game Ψ̃ the output is always a uniformly random element, newly
selected by g. In game Ψ, if xR ·k R has already been queried to the Og -oracle,
the output of the round function is the corresponding oracle answer, else it
is a uniformly random element, newly selected by g. As the former event in
game Ψ never occurs because the event BG1 never occurs, the distributions
are equal.
19
As both games have access to the same random function f , the second
and third round function outputs will have equal distributions.
In both games, y L · (k L )−1 will be the input to the fourth round function,
which is again g. In game Ψ̃ the output is always a uniformly random element,
newly selected by g, unless y L · (k L )−1 = xR · k R , in which case the output
is equal to the output of the first round function. In game Ψ, if xR · k R has
already been queried to the Og -oracle, but not as input to the first round
function, the output of the round function is the corresponding oracle answer.
If y L · (k L )−1 = xR · k R , then the output is equal to the output of the first
round function, else it is a uniformly random element newly selected by g.
As the former event in game Ψ never occurs because the event BG2 never
occurs, the distributions are equal.
As A does not ask a query if it can determine the answer based on previous queries, we see that the inverse permutation oracle, using P −1 , yields
analogous distributions. Thus, the distributions for the two games must be
equal.
Let us show that the distributions of TΨ̃ and TR̃ are identical, unless the
same value is input to f on two separate occasions. Here we also define
when a key is "bad" as we did above, but altered such that it pertains to our
current oracles.
Definition 35. For every specific key k = (k L , k R ) ∈R G2 and function
g ∈R FG→G , define Bad(k, g) to be the set of all possible and consistent Atranscripts σ satisfying at least one of the following events:
B1: ∃1 ≤ i < j ≤ qc , such that
R
L
L
R
R
xLi · k L · g(xR
i · k ) = xj · k · g(xj · k )
B2: ∃1 ≤ i < j ≤ qc , such that
yiR · (k R )−1 · g(yiL · (k L )−1 )
−1
−1
= yjR · (k R )−1 · g(yjL · (k L )−1 )
B3: ∃1 ≤ i, j ≤ qc , such that
−1
R
R
R −1
xLi · k L · g(xR
· g(yjL · (k L )−1 )
i · k ) = yj · (k )
B4: ∃1 ≤ i ≤ qc , 1 ≤ j ≤ qf , such that
R
0
xLi · k L · g(xR
i · k ) = xj
20
B5: ∃1 ≤ i ≤ qc , 1 ≤ j ≤ qf , such that
yiR · (k R )−1 · g(yiL · (k L )−1 )
−1
= x0j
Lemma 36. Let k = (k L , k R ) ∈R G2 . For any possible and consistent Atranscript σ, we have that
q
2
P r [σ ∈ Bad(k, g)] ≤ qc + 2qf qc + 2 · c
· |G|−1 .
2
k,g
Proof. We have that σ ∈ Bad(k, g) if it satisfies a Bi for some i = {1, . . . , 5}.
Using that k L , k R are uniform and independently chosen, and g ∈R FG→G ,
we may achieve an upper bound on the individual event probabilities, and
then use the union
bound.
q
There are c many ways of picking i, j such that 1 ≤ i < j ≤ qc , also,
2
qf qc many ways of picking i, j such that 1 ≤ i ≤ qc , 1 ≤ j ≤ qf , and qc2 many
ways of picking i, j such that 1 ≤ i, j ≤ qc . The probability that two elements
chosen from G are equal is |G|−1 , so we may bound each event accordingly
and achieve, using the union bound, that
"
P r [σ ∈ Bad(k, g)] = P r
k,g
k,g
≤
5
X
i=1
5
_
#
Bi occurs |σ
i=1
P r [Bi occurs |σ]
k,g
qc
q
−1
≤
· |G| + c · |G|−1 + qc2 · |G|−1 + qf qc · |G|−1 + qf qc · |G|−1
2
2
q
= qc2 + 2qf qc + 2 c
· |G|−1 .
2
Lemma 37. Let σ be a possible and consistent A-transcript, then
P r [TΨ̃ = σ|σ 6∈ Bad(k, g)] = P r [TR̃ = σ] .
Ψ̃
R̃
The following proof is based on the proof in [GR04] which refers to [NR99]
for the first part of their argument. We need the generalization of this argument and so also include it.
Proof. Since σ is a possible A-transcript, we have for all 1 ≤ i ≤ qc , 1 ≤ j ≤
qf , 1 ≤ k ≤ qg :
CA {hx1 , y1 i, . . . , hxi , yi i}P , {hx01 , y10 i, . . . , hx0j , yj0 i}f , {hx001 , y100 i, . . . , hx00k , yk00 i}g
∈ {(+, xi+1 ), (−, yi+1 ), (Of , x0j+1 ), (Og , x00k+1 )}.
21
Therefore, TR̃ = σ if and only if ∀1 ≤ i ≤ qc , ∀1 ≤ j ≤ qf , and ∀1 ≤
k ≤ qg , the i, j, k’th respective answers R̃ gives are yi or xi , and x0j and
x00k , respectively. As A never repeats any part of a query, we have, by the
definition of R̃, that the i’th cipher-query answer is an independent and
uniform element of G2 , and as f and g were modelled as random function
oracles, so too will their oracle outputs be independent and uniform elements
of G. Hence,
P r [TR̃ = σ] = |G|−(2qc +qf +qg ) .
R̃
For the second part of this proof, we fix k, g such that σ 6∈ Bad(k, g) and
seek to compute P r [TΨ̃ = σ]. Since σ is a possible A-transcript, we have
f,h
that TΨ̃ = σ if and only if
• yi = Fg,f,f,g (xi · k) · k for all 1 ≤ i ≤ qc ,
• yj0 = f (x0j ) for all 1 ≤ j ≤ qf , and
• yk00 = g(x00k ) for all 1 ≤ k ≤ qg (note that g = h here.)
If we define
R
Xi := xLi · k L · g(xR
i ·k )
−1
Yi := yiR · (k R )−1 · g(yiL · (k L )−1 )
,
then (yiL , yiR ) = Ψ̃(xLi , xR
i ) if and only if
−1
· Yi
k R · f (Xi ) = (xR
i )
and
Xi · f (Yi ) = yiL · (k L )−1 ,
where the second equality of the latter is equivalent to (k L )−1 · (f (Yi ))−1 =
(yiL )−1 · Xi . Observe that, for all 1 ≤ i < j ≤ qc , Xi 6= Xj (by B1 ) and
Yi 6= Yj (by B2.) Similarly, 1 ≤ i < j ≤ qc , Xi 6= Yj (by B3.) Also, for
all 1 ≤ i ≤ qc and for all 1 ≤ j ≤ qf , x0j 6= Xi (by B4 ) and x0j 6= Yi (by
B5.) Hence, σ 6∈ Bad(k, g) implies that all inputs to f are distinct. This
then implies that P rf,h [TΨ̃ = σ] = |G|−(2qc +qf +qg ) as h was also modelled as
a random function, independent from g. Thus, as we assumed that k and g
were chosen such that σ 6∈ Bad(k, g),
P r [TΨ̃ = σ|σ 6∈ Bad(k, g)] = |G|−(2qc +qf +qg ) = P r [TR̃ = σ] .
Ψ̃
R̃
22
5.3
Proof of Theorem 24
To complete the proof of Theorem 24, we combine the above lemmas into
the following probability estimation.
Proof of Theorem 24. Let Γ be the set of all possible and consistent Atranscripts σ such that A(σ) = 1. In the following, we ease notation, for
the sake of the reader. We let BadG(k) be denoted by BadG and Bad(k, g)
by Bad. Furthermore, we abbreviate inconsistency as incon.. Let us consider
the cases between Ψ, Ψ̃ and R̃.
|P rΨ [CA (TΨ ) = 1] − P rΨ̃ [CA (TΨ̃ ) = 1]|
≤
X
(P rΨ [TΨ = σ] − P rΨ̃ [TΨ̃ = σ]) + P rΨ̃ [TΨ̃ incon.]
σ∈Γ
≤
X
|P rΨ [TΨ = σ | σ 6∈ BadG] − P rΨ̃ [TΨ̃ = σ]| · P rk [σ 6∈ BadG]
σ∈Γ
X
+
(P rΨ [TΨ = σ | σ ∈ BadG] − P rΨ̃ [TΨ̃ = σ]) · P rk [σ ∈ BadG]
σ∈Γ
+ P rΨ̃ [TΨ̃ incon.]
≤
X
(P rΨ [TΨ = σ | σ ∈ BadG] − P rΨ̃ [TΨ̃ = σ]) · P rk [σ ∈ BadG] + qc (qc − 1)|G|−1 ,
σ∈Γ
where we in the last estimate used Lemma 34 and a consideration of the
maximal amount of possible inconsistent pairs.
At the same time,
|P rΨ̃ [CA (TΨ̃ ) = 1] − P rR̃ [CA (TR̃ ) = 1]|
≤
X
(P rΨ̃ [TΨ̃ = σ] − P rR̃ [TR̃ = σ]) + P rR̃ [TR̃ incon.] + P rΨ̃ [TΨ̃ incon.]
σ∈Γ
≤
X
|P rΨ̃ [TΨ̃ = σ | σ 6∈ Bad] − P rR̃ [TR̃ = σ]| · P rk [σ 6∈ Bad]
σ∈Γ
+
X
(P rΨ̃ [TΨ̃ = σ | σ ∈ Bad] − P rR̃ [TR̃ = σ]) · P rk [σ ∈ Bad]
σ∈Γ
+ P rR̃ [TR̃ incon.] + P rΨ̃ [TΨ̃ incon.]
≤
X
(P rΨ̃ [TΨ̃ = σ | σ ∈ Bad] − P rR̃ [TR̃ = σ]) · P rk [σ ∈ Bad] +
σ∈Γ
qc
q
|G|−2 + 2 c |G|−1 ,
2
2
where we in the last estimate used Lemma 37 and the proof of Lemma 31.
23
Let us use the above in a temporary estimate,
|P rΨ [CA (TΨ ) = 1] − P rR [CA (TR ) = 1]|
= |P rΨ [CA (TΨ ) = 1] − P rΨ̃ [CA (TΨ̃ ) = 1]|
+ |P rΨ̃ [CA (TΨ̃ ) = 1] − P rR̃ [CA (TR̃ ) = 1]|
+ |P rR̃ [CA (TR̃ ) = 1] − P rR [CA (TR ) = 1]|
≤
X
(P rΨ [TΨ = σ | σ ∈ BadG] − P rΨ̃ [TΨ̃ = σ]) · P rk [σ ∈ BadG] + qc (qc − 1)|G|−1
σ∈Γ
qc
q
−2
|G| + 2 c |G|−1
(P rΨ̃ [TΨ̃ = σ | σ ∈ Bad] − P rR̃ [TR̃ = σ]) · P rk [σ ∈ Bad] +
+
2
2
σ∈Γ
q
+ c |G|−2 ,
(1)
2
X
where we in the last estimate also used Lemma 31.
We may assume WLOG that
X
P rΨ [TΨ = σ | σ ∈ BadG] · P rk [σ ∈ BadG] ≤
σ∈Γ
X
P rΨ̃ [TΨ̃ = σ] · P rk [σ ∈ BadG]
σ∈Γ
and likewise,
X
P rΨ̃ [TΨ̃ = σ | σ ∈ BadG] · P rk [σ ∈ BadG] ≤
σ∈Γ
X
P rR̃ [TR̃ = σ] · P rk [σ ∈ BadG] ,
σ∈Γ
such that by Lemma 33, respectively Lemma 36, we get the following
continued estimate from (1), using the triangle inequality and that |Γ| ≤
|G|2qc +qf +qg (every combination of query elements).
|P rΨ [CA (TΨ ) = 1] − P rR [CA (TR ) = 1]|
X
≤2
P rΨ̃ [TΨ̃ = σ] · P rk [σ ∈ BadG] + 2qc (qc − 1)|G|−1
σ∈Γ
+2
X
P rR̃ [TR̃ = σ] · P rk [σ ∈ Bad]
σ∈Γ
q
+ 2 c |G|−2
2
≤ 2|Γ| · |G|−(2qc +qf +qg ) · max P rk [σ ∈ BadG] + 2qc (qc − 1)|G|−1
σ∈Γ
−(2qc +qf +qg )
+ 2|Γ| · |G|
· max P rk [σ ∈ Bad]
σ∈Γ
qc
−2
+2
|G|
2
q
q
≤ 4qg qc · |G|−1 + 2qc (qc − 1)|G|−1 + 2 qc2 + 2qf qc + 2 c
|G|−1 + 2 c |G|−2
2
2
q
= (2qc2 + 4qg qc + 4qf qc + 2qc2 − 2qc )|G|−1 + 2 c 2|G|−1 + |G|−2 .
2
24
If we denote the total amount of queries as q = qc + qf + qg , then we may
quickly estimate and reword the main theorem as:
Theorem 38. Let f, g be modelled as random oracles, let k = (k L , k R ) ∈R
G2 , let Ψf,g
k (x) = Fg,f,f,g (x · k) · k, and let R ∈R PG2 →G2 . Then, for any
4-oracle adversary A, with at most q total queries, we have
h
i
h
i
−1
−1
P r AΨ,Ψ ,f,g = 1 − P r AR,R ,f,g = 1 ≤ 2(3q 2 − 2q)|G|−1 + (q 2 − q)|G|−2 .
Proof. Given Theorem 24, we get, by using that qf , qg ≥ 0,
qc2 + 2qf qc + 2qg qc + qc2 − qc
= 2(qc2 + qf qc + qg qc ) − qc
≤ 2(qc2 + qf qc + qg qc ) + (2(qf + qg )2 + 2(qf qc + qg qc ) − qf − qg ) − qc
= 2(qc2 + 2qf qc + qf2 + 2qf qg + 2qg qc + qg2 ) − (qc + qf + qg )
= 2(qc + qf + qg )2 − (qc + qf + qg )
= 2q 2 − q.
q
As 2· c = qc2 −qc ≤ q 2 −q, we get the final estimate by some reordering.
2
6
Conclusion
We generalized the Even and Mansour scheme as well as the Feistel cipher
to work over arbitrary groups and proved that classical results pertain to
the group versions. Based on the work in [AR17], we hope that this opens
avenues to proving that classical schemes may be made quantum secure by
generalizing them to certain groups. For further work, we suggest generalizing other classical schemes and using the underlying group structures to do
Hidden Shift reductions.
The author would like to thank his thesis advisor Gorjan Alagic for the
topic, enlightening questions and answers, as well as the encouragements
along the way. The author would also like to thank the Department of
Mathematical Sciences, at the University of Copenhagen, for lending their
facilities during the writing process.
25
References
[AR17] Gorjan Alagic and Alexander Russell.
Quantum-secure
symmetric-key cryptography based on hidden shifts. EUROCRYPT 2017, 2017.
[BR02] John Black and Phillip Rogaway. Ciphers with Arbitrary Finite
Domains, pages 114–130. Springer Berlin Heidelberg, 2002.
[DKS12] Orr Dunkelman, Nathan Keller, and Adi Shamir. Minimalism
in cryptography: The Even-Mansour scheme revisited. EUROCRYPT, 2012.
[DR02] Yan Zong Ding and Michael O. Rabin. Hyper-encryption and
everlasting security. In STACS 2002, 19th Annual Symposium
on Theoretical Aspects of Computer Science, Antibes - Juan les
Pins, France, March 14-16, 2002, Proceedings, pages 1–26, 2002.
[EM97] Shimon Even and Yishay Mansour. A construction of a cipher
from a single pseudorandom permutation. Cryptology, 1997.
[GR04] Craig Gentry and Zulfikar Ramzan. Eliminating random permutation oracles in the Even-Mansour cipher. ASIACRYPT,
2004.
[Jea16] Jeremy Jean. Tik Z for cryptographers. http://www.iacr.org/
authors/tikz/, 2016.
[KL15] Jonathan Katz and Yehuda Lindell. Introduction to Modern
Cryptography. CRC Press, 2 edition, 2015.
[KLLNP16] Marc Kaplan, Gaetan Leurent, Anthony Leverrier, and Maria
Naya-Plasencia. Breaking symmetric cryptosystems using quantum period finding. ArXiv, 2016.
[KM10] Hidenori Kuwakado and Masakatu Morii. Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In ISIT, pages 2682–2685. IEEE, 2010.
[KM12] Hidenori Kuwakado and Masakatu Morii. Security on the
quantum-type Even-Mansour cipher. In ISITA, pages 312–316.
IEEE, 2012.
26
[KR01] Joe Kilian and Phillip Rogaway. How to protect DES against
exhaustive key search (an analysis of DESX). J. Cryptology,
14(1):17–35, 2001.
[LR88] Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J.
Comput., 17(2):373–386, 1988.
[NR99] Moni Naor and Omer Reingold. On the construction of pseudorandom permutations: Luby-Rackoff revisited. Journal of Cryptology, 12:29–66, 1999. Preliminary version in: Proc. STOC 97.
[PRS02] Sarvar Patel, Zulfikar Ramzan, and Ganapathy S. Sundaram.
Luby-rackoff ciphers: Why XOR is not so exclusive. In Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John’s, Newfoundland, Canada, August
15-16, 2002. Revised Papers, pages 271–290, 2002.
[Vau98] Serge Vaudenay. Provable security for block ciphers by decorrelation, pages 249–275. Springer Berlin Heidelberg, Berlin, Heidelberg, 1998.
[Zha16] Mark Zhandry. A note on quantum-secure PRPs.
abs/1611.05564, 2016.
27
CoRR,
A
Super Pseudorandomness of the Group EM
Scheme
In the following, we assume that the adversary A is unbounded computationally, but may only make polynomially many queries to the E/D- and
P/P −1 -oracles, where all oracles act as black boxes and P is a truly random
permutation. We intend to play the "pseudorandom or random permutation
game": A is given an encryption oracle E (with related decryption oracle
D) which is randomly chosen with equal probability from the following two
options:
1. A random key k ∈R G is chosen uniformly and used to encrypt as
E(m) = Ek (m) = P (m · k) · k, or
2. A random permutation π ∈R PG→G is chosen and used to encrypt as
E(m) = π(m).
The adversary wins the game if it can distinguish how E was chosen, with
probability significantly better than 1/2. More explicitly, we wish to prove
the following for the group Even-Mansour scheme.
Theorem 39. Assume P ∈R PG→G and let the key k ∈R G. For any
probabilistic adversary A, limited to polynomially many E/D- and P/P −1 oracle queries, the adversarial advantage of A is bounded by
h
i
h
i
st
def
P,P −1
P,P −1
.
(2)
Adv(A) = P r AEk ,Dk = 1 − P r Aπ,π−1 = 1 = O
|G|
where s is the total number of E/D-queries and t is the total number of
P/P −1 -queries, i.e. the success probability is negligible.
Proof. We may assume that A is deterministic (in essence, being unbounded
computationally affords A the possibility of derandomizing its strategy by
searching all its possible random choices and picking the most effective choices
after having computed the effectiveness of each choice. For an example,
see [DR02].) We may also assume that A never queries a pair in Ss or Tt
more than once, where Si and Ti are the sets of i E/D- and P/P −1 -queries,
respectively. Let us define two main games, that A could play, through oracle
interactions (see next page for the explicit game descriptions.)
Note that the steps in italics have no impact on the response to A’s
queries, we simply continue to answer the queries and only note if the key
turns bad, i.e. we say that a key k is bad w.r.t. the sets Ss and Tt if
28
there exist i, j such that either mi · k = xj or ci · k −1 = yj , and k is good
2st
bad keys.
otherwise. There are at most |G|
Game R: We consider the random game which corresponds to the latter
probability in (2), i.e.
i
h
P,P −1
PR := P r Aπ,π
−1 = 1 .
From the definition of Game R, we see that, letting P rR denote the
probability when playing Game R,
h
i
−1
P rR AP,P
=
1
= PR ,
(3)
E,D
as we are simply giving uniformly random answers to each of A’s queries.
29
Notation: We let Si1 = {m|(m, c) ∈ Si }, Si2 = {c|(m, c) ∈ Si }, Ti1 = {x|(x, y) ∈ Ti }, and
Ti2 = {y|(x, y) ∈ Ti }.
GAME R: Initially, let S0 and T0 be
empty and flag unset. Choose k ∈R G,
then answer the i+1’st query as follows:
GAME X: Initially, let S0 and T0 be
empty and flag unset. Choose k ∈R G,
then answer the i+1’st query as follows:
E-oracle query with mi+1 :
1. Choose ci+1 ∈R G \ Si2 .
2.
If P (mi+1 · k) ∈ Ti2 , or
−1
P (ci+1 · k −1 ) ∈ Ti1 , then set flag to
bad.
3. Define E(mi+1 ) = ci+1 (and thereby
also D(ci+1 ) = mi+1 ) and return ci+1 .
E-oracle query with mi+1 :
1. Choose ci+1 ∈R G \ Si2 .
2. If P (mi+1 · k) ∈ Ti2 then redefine
ci+1 := P (mi+1 · k) · k and set flag to
bad. Else if P −1 (ci+1 · k −1 ) ∈ Ti1 , then
set flag to bad and goto Step 1.
3. Define E(mi+1 ) = ci+1 (and thereby
also D(ci+1 ) = mi+1 ) and return ci+1 .
D-oracle query with ci+1 :
1. Choose mi+1 ∈R G \ Si1 .
2.
If P −1 (ci+1 · k −1 ) ∈ Ti1 , or
P (mi+1 · k) ∈ Ti2 , then set flag to bad.
3. Define D(ci+1 ) = mi+1 (and thereby
also E(mi+1 ) = ci+1 ) and return mi+1 .
D-oracle query with ci+1 :
1. Choose mi+1 ∈R G \ Si1 .
2. If P −1 (ci+1 · k −1 ) ∈ Ti1 then redefine
mi+1 := P −1 (ci+1 · k −1 ) · k −1 and set
flag to bad. Else if P (mi+1 · k) ∈ Ti2 ,
then set flag to bad and goto Step 1.
3. Define D(ci+1 ) = mi+1 (and thereby
also E(mi+1 ) = ci+1 ) and return mi+1 .
P -oracle query with xi+1 :
1. Choose yi+1 ∈R G \ Ti2 .
2.
If E(xi+1 · k −1 ) ∈ Si2 , or
D(yi+1 · k) ∈ Si1 , then set flag to
bad.
3. Define P (xi+1 ) = yi+1 (and thereby
also P −1 (yi+1 ) = xi+1 ) and return yi+1 .
P -oracle query with xi+1 :
1. Choose yi+1 ∈R G \ Ti2 .
2. If E(xi+1 · k −1 ) ∈ Si2 then redefine
yi+1 := E(xi+1 · k −1 ) · k −1 and set flag
to bad. Else if D(yi+1 · k) ∈ Si1 , then
set flag to bad and goto Step 1.
3. Define P (xi+1 ) = yi+1 (and thereby
also P −1 (yi+1 ) = xi+1 ) and return yi+1 .
P −1 -oracle query with yi+1 :
1. Choose xi+1 ∈R G \ Ti1 .
2. If D(yi+1 ·k) ∈ Si1 , or E(xi+1 ·k −1 ) ∈
Si2 , then set flag to bad.
3. Define P −1 (yi+1 ) = xi+1 (and
thereby also P (xi+1 ) = yi+1 ) and return xi+1 .
P −1 -oracle query with yi+1 :
1. Choose xi+1 ∈R G \ Ti1 .
2. If D(yi+1 · k) ∈ Si1 then redefine
xi+1 := D(yi+1 · k) · k and set flag to
bad. Else if E(xi+1 · k −1 ) ∈ Si2 , then set
flag to bad and goto Step 1.
3. Define P −1 (yi+1 ) = xi+1 (and
thereby also P (xi+1 ) = yi+1 ) and return xi+1 .
30
Game X: Consider the experiment which corresponds to the game played
in the prior probability in (2) and define this probability as
i
h
−1
=
1
.
PX := P r AP,P
Ek ,Dk
We define Game X, as outlined above. Note that again the parts in italics
have no impact on the response to A’s queries, however, this time, when a
key becomes bad, we choose a new random value repeatedly for the response
until the key is no longer bad, and then reply with this value. Intuitively,
Game X behaves like Game R except that Game X checks for consistency
as it does not want A to win on some collision. It is non-trivial to see that,
letting P rX denote the probability when playing Game X,
h
i
−1
P rX AP,P
=
1
= PX .
(4)
E,D
The proof is given in Appendix B.
We have defined both games in such a way that their outcomes differ only
in the event that a key turns bad. Thus, any circumstance which causes a
difference in the instructions carried out by the games, will also cause both
games to set the flag to bad. Let BAD denote the event that the flag gets
set to bad and the case that the flag is not set to bad by ¬BAD, then the
two following lemmas follow from the previous statement.
Lemma 40. P rR [BAD] = P rX [BAD] and P rR [¬BAD] = P rX [¬BAD].
h
i
h
i
−1
P,P −1
Lemma 41. P rR AP,P
=
1|¬BAD
=
P
r
A
=
1|¬BAD
.
X
E,D
E,D
Using these two lemmas we are able to prove the lemma:
Lemma 42. Adv(A) ≤ P rR [BAD].
This is because, using (3), (4), and lemmas 40 and 41,
Adv(A) = |PX − PR |
h
i
h
i
P,P −1
P,P −1
= P rX AE,D = 1 − P rR AE,D = 1
h
i
−1
= |P rX AP,P
=
1|¬BAD
· P rX [¬BAD]
E,D
h
i
P,P −1
+ P rX AE,D = 1|BAD · P rX [BAD]
h
i
P,P −1
− P rR AE,D
= 1|¬BAD · P rR [¬BAD]
h
i
P,P −1
− P rR AE,D
= 1|BAD · P rR [BAD] |
h
i
h
i
P,P −1
P,P −1
= P rR [BAD] · P rX AE,D = 1|BAD − P rR AE,D = 1|BAD
≤ P rR [BAD] .
31
Let us now define yet another game, Game R’.
GAME
R’:
Initially,
let
S0
and
T0
be
empty
and
flag
unset.
Answer
the
i + 1’st
query
as
follows:
E-oracle query with mi+1 :
1. Choose ci+1 ∈R G \ Si2 .
2. Define E(mi+1 ) := ci+1 (and thereby also D(ci+1 ) := mi+1 ) and return ci+1 .
D-oracle query with ci+1 :
1. Choose mi+1 ∈R G \ Si1 .
2. Define D(ci+1 ) := mi+1 (and thereby also E(mi+1 ) := ci+1 ) and return mi+1 .
P -oracle query with xi+1 :
1. Choose yi+1 ∈R G \ Ti2 .
2. Define P (xi+1 ) := yi+1 (and thereby also P −1 (yi+1 ) := xi+1 ) and return yi+1 .
P −1 -oracle query with yi+1 :
1. Choose xi+1 ∈R G \ Ti1 .
2. Define P −1 (yi+1 ) := xi+1 (and thereby also P (xi+1 ) := yi+1 ) and return
xi+1 .
After all queries have been answered, choose k ∈R G. If there exists (m, c) ∈ Ss
and (x, y) ∈ Tt such that k becomes bad then set flag to bad.
This game runs as Game R except that it does not choose a key until
all of the queries have been answered and then checks for badness of the flag
(by checking whether or not the key has become bad). It can be shown that
the flag is set to bad in Game R if and only if the flag is set to bad in
Game R’ (by a consideration of cases (see Appendix C.)) Hence, we get the
following lemma.
Lemma 43. P rR [BAD] = P rR0 [BAD].
Using the above lemma, we now only have to bound P rR0 [BAD] in order
to bound Adv(A), but as the adversary queries at most s elements to the
E/D-oracles and at most t elements to the P/P −1 -oracles, and the key k is
chosen uniformly at random from G, we have that the probability of choosing
a bad key is at most 2st/|G|, i.e.
st
.
Adv(A) ≤ P rR0 [BAD] = O
|G|
Restating the theorem, we get:
Theorem 44. For any probabilistic adversary A, limited to polynomially
many E/D- and P/P −1 -oracle queries, the generalized EM scheme over a
group G is a super pseudorandom permutation.
32
B
Proof of probability of Game X
Recall the definition of Si1 , Si2 , Ti1 and Ti2 (see p. 30.) We write Ss and Tt
to denote the final transcripts. We drop the index i if it is understood. We
begin by defining Game X’.
GAME X’: Initially, let S0 and T0 be empty. Choose k ∈R G, then answer the
i + 1’st query as follows:
E-oracle query with mi+1 :
1. If P (mi+1 · k) ∈ Ti2 return P (mi+1 · k) · k
2. Else choose yi+1 ∈R G \ Ti2 , define P (mi+1 · k) = yi+1 , and return yi+1 · k.
D-oracle query with ci+1 :
1. If P −1 (ci+1 · k −1 ) ∈ Ti1 , return P −1 (ci+1 · k −1 ) · k −1 .
2. Else choose xi+1 ∈R G\Ti1 , define P −1 (ci+1 ·k −1 ) = xi+1 , and return xi+1 ·k −1 .
P -oracle query with xi+1 :
1. If P (xi+1 ) ∈ Ti2 , return P (xi+1 ).
2. Else choose yi+1 ∈R G \ Ti2 , define P (xi+1 ) = yi+1 , and return yi+1 .
P −1 -oracle query with yi+1 :
1. If P −1 (yi+1 ) ∈ Ti1 , return P −1 (yi+1 ).
2. Else choose xi+1 ∈R G \ Ti1 , define P −1 (yi+1 ) = xi+1 , and return xi+1 .
Notice that the only difference between Game X’ and the game defining PX is that the latter has defined all values for the oracles beforehand
while the former "defines as it goes." Still, an adversary cannot tell the
difference
betweeni playing the Game X’ or the game defining PX . Thus,
h
P,P −1
P rX 0 AE,D = 1 = PX .
What we wish to show is that
h
i
h
i
−1
P,P −1
0
P rX AP,P
=
1
=
P
r
A
=
1
,
X
E,D
E,D
i.e. that no adversary A may distinguish between playing Game X and
playing Game X’, even negligibly. We will do this by showing that no
adversary A may distinguish between the outputs given by the two games.
As both games begin by choosing a uniformly random key k and as we show
that for this value the games are identical, we hereby assume such a key k
to be a fixed, but arbitrary, value for the remainder of this proof.
Considering the definitions of Game X and Game X’, we see that the
two games define their E/D- and P/P −1 -oracles differently: the former defining both, while the latter defines only the P/P −1 -oracle and computes the
E/D-oracle. We show that Game X also answers its E/D-oracle queries by
referring to P/P −1 , although not directly.
33
Given the partial functions E and P in Game X, i.e. functions having
been defined for all values up to and including the i’th query, define the
partial function Pb as the following.
if P (x) is defined,
P (x)
def
−1
−1
b
P (x) = E(x · k ) · k
if E(x · k −1 ) is defined, and
undefined
otherwise.
Using the above definition, defining a value for E or P implicitly defines
a value for Pb. The first question is, whether or not Pb is well-defined, i.e.
whether there are clashes of values (that is, differences between values differing by other than ·k (or ·k −1 )) for some x for which both P (x) and E(x · k −1 )
are defined.
Lemma 45. Let E and P be partial functions arising in Game X, then the
partial function Pb is well-defined.
Proof. Proof by induction on the number of "Define" steps in Game X (i.e.
steps E −3, D −3, P −3, and P −1 −3) as these are the steps where Pb becomes
defined. The initial case of the induction proof is trivial as S0 and T0 are
empty such that no values may clash. Suppose now that in step E − 3 we
define E(m) = c. The only possibility that Pb becomes ill-defined will occur
if the new E(m) value clashes with a prior defined P (m · k) value: If P (m · k)
was not defined, then no clashes can arise. If P (m · k) was defined, then by
step E − 2, the value is E(m) · k −1 , such that there is no clash.
For D − 3, the argument is similar as E(m) will become defined as well.
Although, for the case where P (m · k) is defined, step D − 2 forces a new
uniformly random value of m to be chosen until no clash occurs.
Analogously, for P and P −1 , no clashes will arise, hence, Pb must be
well-defined.
We may also consider Pb in Game X’, in the sense that when we define a
value for P in the game, we implicitly define a value for Pb where Pb(x) = P (x)
as E(x · k −1 ) = P (x) in Game X’.
We wish now to show that the oracle query-answers of E, D, P, and P −1
in Game X, expressed in terms of Pb, correspond exactly to those in Game
X’.
Case 1: E-oracle query. Beginning with Game X, we first note that
Game X never defines E(m) unless m has been queried to the E-oracle,
or alternately, the D-oracle has been queried with a c such that E(m) = c.
However, as A never repeats a query if it can guess the answer, i.e. never
queries any part of an already defined E/D-oracle pair, we may assume that
34
E(m) is undefined when m is queried. Therefore, we see that concurrently
with m being queried, we have that Pb(m · k) will be defined if and only if
P (m · k) is defined, and Pb(m · k) = P (m · k). Let us consider the two cases:
when Pb(m · k) is defined and when it is undefined.
Case 1a: When Pb(m · k) is defined, then Game X returns c = Pb(m · k) · k.
Setting E(m) = c leaves Pb unchanged, i.e. the value Pb(m · k) remains
the same, unlike the next case.
Case 1b: When Pb(m · k) is undefined, then Game X repeatedly chooses
c ∈R G \ S 2 uniformly until P −1 (c · k −1 ) is undefined, i.e. the set
U = {c ∈ G|P −1 (c · k −1 ) 6∈ T 1 }. It follows that y = c · k −1 is uniformly distributed over G \ Tb2 .4 This can be seen by showing that
S 2 ∪ U { = Tb2 · k, where the only non-triviality in the argument follows from the definition of Pb. In this case, setting E(m) = c also sets
Pb(m · k) = y, in contrast to the prior case as it is now defined.
We now consider the same query on Game X’.
Case 1a’ : When Pb(m · k) = P (m · k) is defined, c = P (m · k) · k is returned, and
Pb is unchanged.
Case 1b’ : When Pb(m·k) = P (m·k) is undefined, we choose y ∈R G\T 2 = G\ Tb2 ,
Pb(m · k) is set to y, and c = y · k is returned.
Thus, the behaviour of Game X and Game X’ are identical on the E-oracle
queries.
We will be briefer in our arguments for the following 3 cases as the arguments are similar.
Case 2: D-oracle query. Here we again assume that no element of
an E/D-oracle pair (m, c), such that E(m) = c, has been queried before.
Like in the above case, we see that, as Pb(m · k) = P (m · k), we also have
Pb−1 (c · k −1 ) = P −1 (c · k −1 ).
Case 2a + 2a’ : When Pb−1 (c · k −1 ) = P −1 (c · k −1 ) is defined, then m = P −1 (c · k −1 ) · k −1
is returned, leaving Pb−1 (c · k −1 ) unchanged in both games.
Case 2b + 2b’ : If Pb−1 (c · k −1 ) = P −1 (c · k −1 ) is undefined, then x ∈R G \ Tb1 is chosen
uniformly and Pb−1 (c · k −1 ) = x, in both cases.
4
Tb1 and Tb2 are the corresponding sets on the query pairs of Pb.
35
Thus, the behaviour of Game X and Game X’ are identical on the D-oracle
queries.
Case 3: P -oracle query. Here we instead assume that no element of a
P/P −1 -oracle pair (x, y) such that P (x) = y, has been queried before.
Case 3a + 3a’ : Using the definition of the E- and P -oracles in Game X and the
definition of Pb we see that P (x) is defined if and only if E(x · k −1 ) is
defined, but then this also holds if and only if Pb(x) is defined (by the
assumption in the beginning of case 3). Hence, if Pb(x) is defined, then
y = E(x · k −1 ) · k −1 = Pb(x). Indeed, both games secure this value.
Case 3b + 3b’ : If Pb(x) is undefined, then y ∈R G \ Tb2 is chosen uniformly and Pb(x) is
defined to be y, in both cases.
Thus, the behaviour of Game X and Game X’ are identical on the P -oracle
queries.
Case 4: P −1 -oracle query. Again, we assume that no element of a
P/P −1 -oracle pair (x, y) such that P (x) = y, has been queried before.
Case 4a + 4a’ : Using the definition of Game X and the definition of Pb, as well as our
case 4 assumption, we see that Pb−1 (y) is defined if and only if D(y · k)
is defined. Hence, if Pb−1 (y) is defined, then x = D(y · k) · k = Pb−1 (y).
Indeed, both games secure this value.
Case 4b + 4b’ : If Pb−1 (y) is undefined, then x ∈R G\ Tb1 is chosen uniformly and Pb−1 (y)
is defined to be x, in both cases.
Thus, the behaviour of Game X and Game X’ are identical on the P −1 oracle queries. Q.E.D.
36
C
Proof that the probability of Game R and
Game R’ match
Recall the definition of Si1 , Si2 , Ti1 and Ti2 (see p. 30). We write Ss and Tt to
denote the final transcripts. We also introduce the following definition.
Definition 46. We say that two E/D-pairs (mi , ci ) and (mj , cj ) overlap
if mi = mj or ci = cj . If mi = mj and ci = cj , we say that the pairs are
identical. Likewise for P/P −1 -pairs (xi , yi ) and (xj , yj ).
If two pairs overlap, then by the definition of the E/D- and P/P −1 oracles, they must be identical. Therefore, WLOG, we may assume that all
queries to the oracles are non-overlapping. Let us now prove the lemma.
Lemma 47. P rR [BAD] = P rR0 [BAD].
Proof. We need to prove that Game R has its flag set to bad if and only if
Game R’ has its flag set to bad.
"⇒": We want to show that there exists (m, c) ∈ Ss and (x, y) ∈ Tt
such that either m · k = x or c · k −1 = y (i.e. such that k becomes bad).
We have to consider the 8 cases where the flag is set to bad. All of the
cases use an analogous argument to the following: If P (m · k) is defined then
P (m · k) = y = P (x) for some (x, y) ∈ Tt such that, as overlapping pairs are
identical, m · k = x.
"⇐": We assume that there exists (m, c) ∈ Ss and (x, y) ∈ Tt such that
k becomes bad. i.e. such that either m · k = x or c · k −1 = y. We need to
check that in all four oracle queries, the flag in Game R is set to bad, which
needs a consideration of 8 cases.
Assume that m · k = x, then
E-oracle on m : P (m · k) = P (x) = y ∈ Tt2 ,
D-oracle on c : P (m · k) = P (x) = y ∈ Tt2 ,
P -oracle on x : E(x · k −1 ) = E(m) = c ∈ Ss2 ,
P −1 -oracle on y : E(x · k −1 ) = E(m) = c ∈ Ss2 .
Assume now that c · k −1 = y, then
E-oracle on m : P −1 (c · k −1 ) = P −1 (y) = x ∈ Tt1 ,
D-oracle on c : P −1 (c · k −1 ) = P −1 (y) = x ∈ Tt1 ,
P -oracle on x : D(y · k) = D(c) = m ∈ Ss1 ,
P −1 -oracle on y : D(y · k) = D(c) = m ∈ Ss1 .
37
| 4math.GR
|
Non-constant bounded holomorphic functions of hyperbolic
numbers – Candidates for hyperbolic activation functions
arXiv:1306.1653v1 [cs.NE] 7 Jun 2013
* Eckhard Hitzer (University of Fukui)
Abstract– The Liouville theorem states that bounded holomorphic complex functions
are necessarily constant. Holomorphic functions fulfill the socalled Cauchy-Riemann
(CR) conditions. The CR conditions mean that a complex z-derivative is independent
of the direction. Holomorphic functions are ideal for activation functions of complex
neural networks, but the Liouville theorem makes them useless. Yet recently the use
of hyperbolic numbers, lead to the construction of hyperbolic number neural networks.
We will describe the Cauchy-Riemann conditions for hyperbolic numbers and show that
there exists a new interesting type of bounded holomorphic functions of hyperbolic
numbers, which are not constant. We give examples of such functions. They therefore
substantially expand the available candidates for holomorphic activation functions for
hyperbolic number neural networks.
Keywords: Hyperbolic numbers, Liouville theorem, Cauchy-Riemann conditions,
bounded holomorphic functions
1
Introduction
For the sake of mathematical clarity, we first carefully
review the notion of holomorphic functions in the two
number systems of complex and hyperbolic numbers.
The Liouville theorem states that bounded holomorphic complex functions f : C → C are necessarily constant [1]. Holomorphic functions are functions
that fulfill the socalled Cauchy-Riemann (CR) conditions. The CR conditions mean that a complex
z-derivative
df (z)
, z = x + iy ∈ C, x, y ∈ R, ii = −1,
dz
Contrary to the complex case, the hyperbolic logistic function is bounded. This is
due to the absence of singularities. Thus,
in general terms, this seems to be a suitable
activation function. Concretely, the following facts, however, might be of disadvantage. The real and imaginary part have different squashing values. Both component
functions do only significantly differ from
zero around the lines1 x = y (x > 0) and
−x = y (x < 0).
(1)
is independent of the direction with respect to which
the incremental ratio, that defines the derivative, is
taken [5]. Holomorphic functions would be ideal for
activation functions of complex neural networks, but
the Liouville theorem means that careful measures
need to be taken in order to avoid poles (where the
function becomes infinite).
Yet recently the use of hyperbolic numbers
z = x + h y, h2 = 1, x, y ∈ R, h ∈
/ R.
boundaries (hyperplanes) of the real and the unipotent h-part of the output. But Buchholz argued in
[4], p. 114, that
(2)
lead to the construction of hyperbolic number neural
networks. We will describe the generalized CauchyRiemann conditions for hyperbolic numbers and show
that there exist bounded holomorphic functions of
hyperbolic numbers, which are not constant. We give
a new example of such a function. They are therefore
excellent candidates for holomorphic activation functions for hyperbolic number neural networks [2, 3].
In [3] it was shown, that hyperbolic number neural
networks allow to control the angle of the decision
Complex numbers are isomorphic to the Clifford
geometric algebra Cl0,1 which is generated by a single
vector e1 of negative square e1 = −1, with algebraic
basis {1, e1 }. The isomorphism C ∼
= Cl0,1 is realized
by mapping i 7→ e1 .
Hyperbolic numbers are isomorphic to the Clifford
geometric algebra Cl1,0 which is generated by a single
vector e1 of positive square e1 = +1, with algebraic
basis {1, e1 }. The isomorphism between hyperoblic
numbers and Cl1,0 is realized by mapping h 7→ e1 .
2
Complex variable functions
We follow the treatment given in [5]. We assume
a complex function given by an absolute convergent
1 Note that we slightly correct the two formulas of Buchholz,
because we think it necessary to delete e1 in Buchholz’ original
x = ye1 (x > 0), etc.
power series.
w = f (z) = f (x + iy) = u(x, y) + iv(x, y),
(3)
where u, v : R2 → R are real functions of the real
variables x, y. Since u, v are obtained in an algebraic way from the complex number z = x + iy, they
cannot be arbitrary functions but must satisfy certain conditions. There are several equivalent ways
to obtain these conditions. Following Riemann, we
state that a function w = f (z) = u(x, y) + iv(x, y)
is a function of the complex variable z if its derivative is independent of the direction (in the complex
plane) with respect to which the incremental ratio is
taken. This requirement leads to two partial differential equations, named after Cauchy and Riemann
(CR), which relate u and v.
One method for obtaining these equations is the
following. We consider the expression w = u(x, y) +
iv(x, y) only as a function of z, but not of z̄, i.e. the
derivative with respect to z̄ shall be zero. First we
perform the bijective substitution
x=
1
(z + z̄),
2
1
y = −i (z − z̄),
2
(4)
based on z = x + iy, z̄ = x − iy. For computing the
derivative w,z̄ = dw
dz̄ with the help of the chain rule
we need the derivatives of x and y of (4)
x,z̄ =
1
,
2
y,z̄ =
1
i.
2
(5)
3
Hyperbolic numbers
Hyperbolic numbers are also known as split-complex
numbers. They form a two-dimensional commutative
algebra. The canonical hyperbolic system of numbers
is defined [5] by
(11)
The hyperbolic conjugate is defined as
z̄ = x − h y.
(6)
Requiring that both the real and the imaginary part
of (6) vanish we obtain the Cauchy-Riemann conditions
u,x = v,y ,
u,y = −v,x .
(7)
Functions of a complex variable that fulfill the CR
conditions are functions of x and y, but they are only
functions of z, not of z̄.
It follows from (7), that both u and v fulfill the
Laplace equation
u,xx = v,yx = v,xy = −u,yy ⇔ u,xx + u,yy = 0, (8)
and similarly
v,xx + v,yy = 0.
g(u(x, y)+iv(x, y)) = gr (u(x, y))+igi (v(x, y)). (10)
z = x + h y, h2 = 1, x, y ∈ R, h ∈
/ R.
Using the chain rule we obtain
w,z̄ = u,x x,z̄ + u,y y,z̄ + i(v,x x,z̄ + v,y y,z̄ )
1
1
1
1
= u,x + iu,y + i( v,x + iv,y )
2
2
2
2
1
!
= [u,x − v,y + i(v,x + u,y )] = 0.
2
are called harmonic functions and are important in
many fields of science, notably the fields of electromagnetism, astronomy, and fluid dynamics, because
they can be used to accurately describe the behavior
of electric, gravitational, and fluid potentials. In the
study of heat conduction, the Laplace equation is the
steady-state heat equation [6].
Liouville’s theorem [1] states, that any bounded
holomorphic function f : C → C, which fulfills the
CR conditions is constant. Therefore for complex
neural networks it is not very meaningful to use holomorphic functions as activation functions. If they
are used, special measures need to be taken to avoid
poles in the complex plane. Instead separate componentwise (split) real scalar functions for the real
part gr : R → R, u(x, y) 7→ gr (u(x, y)), and for the
imaginary part gi : R → R, v(x, y) 7→ gi (v(x, y)), are
usually adopted. Therefore a standard split activation function in the complex domain is given by
(9)
The Laplace equation is a simple example of an elliptic partial differential equation. The general theory
of solutions to the Laplace equation is known as potential theory. The solutions of the Laplace equation
(12)
Taking the hyperbolic conjugate corresponds in the
isomorphic algebra Cl1,0 to taking the main involution (grade involution), which maps 1 7→ 1, e1 7→
−e1 .
The hyperbolic invariant (corresponding to the
Lorentz invariant in physics for y = ct), or modulus,
is defined as
z z̄ = (x + h y)(x − h y) = x2 − y 2 ,
(13)
which is not positive definite.
Hyperbolic numbers are fundamentally different
from complex numbers. Complex numbers and
quaternions are division algebras, every non-zero element has a unique inverse. Hyperbolic numbers do
not always have an inverse, but instead there are
idempotents and divisors of zero.
We can define the following idempotent basis
n1 =
1
(1 + h),
2
n2 =
1
(1 − h),
2
(14)
which fulfills
1
1
(1 + h)(1 + h) = (2 + 2h) = n1 ,
4
4
n22 = n2 ,
n1 + n2 = 1,
1
1
n1 n2 = (1 + h)(1 − h) = (1 − 1) = 0,
4
4
n̄1 = n2 , n̄2 = n1 .
(15)
n21 =
The inverse basis transformation is simply
1 = n1 + n2 ,
h = n1 − n2 .
(16)
Setting
z = x + hy = ξn1 + ηn2 ,
(17)
we get the corresponding coordinate transformation
x=
1
(ξ + η),
2
y=
1
(ξ − η),
2
(18)
as well as the inverse coordinate transformation
ξ = x + y ∈ R,
η = x − y ∈ R.
(19)
Figure 1: The hyperbolic number plane [9] with horizontal x-axis and vertical yh-axis, showing: (a) Hyperbolas with modulus z z̄ = −1 (green). (b) Straight
lines with modulus z z̄ = 0 ⇔ x2 = y 2 (red), i.e. divisors of zero. (c) Hyperbolas with modulus z z̄ = 1
(blue).
The hyperbolic conjugate becomes, due to (15), in
the idempotent basis
z̄ = ξn̄1 + ηn̄2 = ηn1 + ξn2 .
(20)
In the idempotent basis, using (20) and (15), the hyperbolic invariant becomes multiplicative
z z̄ = (ξn1 + ηn2 )(ηn1 + ξn2 )
= ξη(n1 + n2 ) = ξη = x2 − y 2 .
(21)
In the following we consider the product and quotient
of two hyperbolic numbers z, z 0 both expressed in the
idempotent basis {n1 , n2 }
zz 0 = (ξn1 +ηn2 )(ξ 0 n1 +η 0 n2 ) = ξξ 0 n1 +ηη 0 n2 , (22)
due to (15). We repeat that in (24) the product is
zero, even though the factors are non-zero. The numbers ξn1 , ηn2 along the n1 , n2 axis are therefore called
divisors of zero. The divisors of zero have no inverse.
The hyperbolic plane with the diagonal lines of divisors of zero (b), and the pairs of hyperbolas with
constant modulus z z̄ = 1 (c), and z z̄ = −1 (a) is
shown in Fig. 1.
4
Hyperbolic number functions
We assume a hyperbolic number function given by
an absolute convergent power series
and
w = f (z) = f (x + hy) = u(x, y) + hv(x, y),
z
ξn1 + ηn2
z z̄ 0
= 0
= 0 0
0
0
z
ξ n1 + η n2
z z̄
(ξn1 + ηn2 )(η 0 n1 + ξ 0 n2 )
= 0
(ξ n1 + η 0 n2 )(η 0 n1 + ξ 0 n2 )
(ξη 0 n1 + ηξ 0 n2 )(η 0 n1 + ξ 0 n2 )
=
ξ0 η0
ξ
η
= 0 n1 + 0 n2 .
ξ
η
h2 = 1,
h∈
/ R.
(25)
where u, v : R2 → R are real functions of the real
variables x, y. An example of a hyperbolic number
function is the exponential function
ez = ex+hy = ex ehy = ex (cosh y + h sinh y)
= u(x, y) + hv(x, y),
(23)
(26)
with
Because of (23) it is not possible to divide by z 0 if
ξ 0 = 0, or if η 0 = 0. Moreover, the product of a
hyperbolic number with ξ = 0 (on the n2 axis) times
a hyperbolic number with η = 0 (on the n1 axis) is
(ξn1 + 0n2 )(0n1 + ηn2 ) = ξηn1 n2 = 0,
(24)
u(x, y) = ex cosh y,
v(x, y) = ex sinh y.
(27)
Since u, v are obtained in an algebraic way from the
hyperbolic number z = x + hy, they cannot be arbitrary functions but must satisfy certain conditions.
There are several equivalent ways to obtain these conditions. A function w = f (z) = u(x, y) + hv(x, y) is
a function of the hyperbolic variable z, if its derivative is independent of the direction (in the hyperbolic
plane) with respect to which the incremental ratio is
taken. This requirement leads to two partial differential equations, so called generalized Cauchy-Riemann
(GCR) conditions, which relate u and v.
To obtain the GCR conditions we consider the expression w = u(x, y) + hv(x, y) only as a function of
z, but not of z̄ = x − hy, i.e. the derivative with
respect to z̄ shall be zero. First we perform the bijective substitution
x=
1
(z + z̄),
2
1
y = h (z − z̄),
2
(28)
based on z = x + hy, z̄ = x − hy. For computing the
derivative w,z̄ = dw
dz̄ with the help of the chain rule
we need the derivatives of x and y of (28)
x,z̄ =
1
,
2
1
y,z̄ = − h.
2
w,z̄ = u,x x,z̄ + u,y y,z̄ + h(v,x x,z̄ + v,y y,z̄ )
1
1
1
1
= u,x − hu,y + h( v,x − hv,y )
2
2
2
2
1
!
= [u,x − v,y + h(v,x − u,y )] = 0.
(30)
2
Requiring that both the real and the h-part of (30)
vanish we obtain the GCR conditions
u,y = v,x .
f (z) = u(x, y) + h v(x, y),
1
.
u(x, y) = v(x, y) =
1 + e−x e−y
(31)
Functions of a hyperbolic variable that fulfill the
GCR conditions are functions of x and y, but they
are only functions of z, not of z̄. Such functions are
called (hyperbolic) holomorphic functions.
It follows from (31), that u and v fulfill the wave
equation
−1
(−e−x e−y )
(1 + e−x e−y )2
e−x e−y
=
,
(1 + e−x e−y )2
u,x =
u,y = v,x = v,y =
0<
1
1+
u,x = ex cosh y,
e−x e−y
lim
v,y = ex cosh y = u,x . (34)
< 1.
1
= 0,
1 + e−x e−y
and
lim
x,y→∞
1
1+
(38)
e−x e−y
= 1.
(39)
(40)
The function (35) is representative for how to turn
any real neural node activation function r(x) into
holomorphic hyperbolic activation function via
f (x) = r(x + y) (1 + h).
(41)
We note that in [3, 4] another holomorphic hyperbolic activation function was studied, namely
u,y = ex sinh y,
v,x = ex sinh y = u,y ,
(37)
We especially have
and similarly
The wave equation is an important second-order
linear partial differential equation for the description
of waves – as they occur in physics – such as sound
waves, light waves and water waves. It arises in fields
like acoustics, electromagnetics, and fluid dynamics.
The wave equation is the prototype of a hyperbolic
partial differential equation [7].
Let us compute the partial derivatives u,x , u,y ,
v,x , v,y for the exponential function ez of (26):
e−x e−y
.
(1 + e−x e−y )2
The GCR conditions (31) are therefore clearly fulfilled, which means that the hyperbolic function f (z)
of (35) is holomorphic. Since the exponential function e−x has a range of (0, ∞), the product e−x e−y
also has values in the range of (0, ∞). Therefore the
function 1 + e−x e−y has values in (1, ∞), and the
components of the function f (z) of (35) have values
x,y→−∞
(33)
(36)
where we repeatedly applied the chain rule for differentiation. Similarly we obtain
u,xx = v,yx = v,xy = u,yy ⇔ u,xx − u,yy = 0, (32)
v,xx − v,yy = 0.
(35)
The function u(x, y) is pictured in Fig. 2.
Let us verify that the function f of (35) fulfills the
GCR conditions
(29)
Using the chain rule we obtain
u,x = v,y ,
We clearly see that the partial derivatives (34) fulfill
the GCR conditions (31) for the exponential function
ez , as expected by its definition (26). The exponential function ez is therefore a manifestly holomorphic
hyperpolic function, but it is not bounded.
In the case of holomorphic hyperbolic functions the
GCR conditions do not imply a Liouville type theorem like for holomorphic complex functions. This can
most easily be demonstrated with a counter example
f 0 (z) =
1
,
1 + e−z
(42)
2. x2 > y 2 , x < 0:
θ = artanh (y/x),
z = −ρehθ ,
i.e. the quadrant in Fig. 1 including the negative
x-axis (to the left).
3. x2 < y 2 , y > 0:
θ = artanh (x/y),
z = hρehθ ,
i.e. the quadrant in Fig. 1 including the positive
y-axis (top).
4. x2 < y 2 , y < 0:
θ = artanh (x/y),
Figure 2: Function u(x, y) = 1/(1 + e−x e−y ). Horizontal axis −3 ≤ x ≤ 3, from left corner into paper
plane −3 ≤ y ≤ 3. Vertical axis 0 ≤ u ≤ 1. (Figure
produced with [8].)
but compare the quote from [4], p. 114, given in the
introduction. The split activation function used in
[2]
1
1
+h
,
(43)
f 00 (x, y) =
−x
1+e
1 + e−y
is clearly not holomorphic, because the real part u =
1/(1 + e−x ) depends only on x and not on y, and the
h-part v = 1/(1 + e−y ) depends only on y and not on
x, thus the GCR conditions (31) can not be fulfilled.
5
Geometric interpretation of
multiplication of hyperbolic
numbers
In order to geometrically interpret the product of two
complex numbers, it proves useful to introduce polar
coordinates in the complex plane. Similarly, for the
geometric interpretation of the product of two hyperbolic numbers, we first introduce hyperbolic polar
coordinates for z = x + hy with radial coordinate
p
p
ρ = |z z̄| = |x2 − y 2 | .
(44)
The hyperbolic polar coordinate transformation [5] is
then given as
1. x2 > y 2 , x > 0:
θ = artanh (y/x),
z = ρehθ ,
i.e. the quadrant in the hyperbolic plane of Fig.
1 limitted by the diagonal idempotent lines, and
including the positive x-axis (to the right).
z = −hρehθ ,
i.e. the quadrant in Fig. 1 including the negative
y-axis (bottom).
The product of a constant hyperbolic number (assuming a2x > a2y , ax > 0)
a = ax + hay = ρa ehθa ,
q
θa = artanh (ay /ax ),
ρa = a2x − a2y ,
(45)
with a hyperbolic number z (assuming x2 > y 2 , x >
0) in hyperbolic polar coordinates is
az = ρa ehθa ρ ehθ = ρa ρ eh(θ+θa ) .
(46)
The geometric interpretation is a scaling of the modulus ρ → ρa ρ and a hyperbolic rotation (movement
along a hyperbola) θ → θ + θa .
In the physics of Einstein’s special relativistic
space-time [11, 12], the hyperbolic rotation θ → θ+θa
corresponds to a Lorentz transformation from one
inertial frame with constant velocity tanh θ to another inertial frame with constant velocity tanh(θ +
θa ). Neural networks based on hyperbolic numbers
(dimensionally extended to four-dimensional spacetime) should therefore be ideal to compute with electromagnetic signals, including satellite transmission.
6
Conclusion
We have compared complex numbers and hyperbolic
numbers, as well as complex functions and hyperbolic
functions. We saw that according to Liouville’s theorem bounded complex holomorphic functions are necessarily constant, but non-constant bounded hyperbolic holomorphic functions exist. One such function
has already beeng studied in [3, 4]. We have studied a promising example of a hyperbolic holomorphic
function
1+h
,
(47)
f (z) =
1 + e−x−y
in some detail. The distinct notions of idempotents
and divisors of zero, special to hyperbolic numbers,
were introduced. After further introducing hyperbolic polar coordinates, a geometric interpretation of
the hyperbolic number multiplication was given.
Hyerbolic neural networks offer, compared to complex neural networks, therefore the advantage of suitable bounded non-constant hyperbolic holomorphic
activation functions. It would certainly be of interest
to study convergence, accuracy and decision boundaries of hyperbolic neural networks with the activation function (35), similar to [3, 4].
Acknowledgment
I want to acknowledge God [13]:
In the beginning was the Word2 , and the
Word was with God, and the Word was
God. He was with God in the beginning.
Through him all things were made; without
him nothing was made that has been made.
In him was life, and that life was the light
of all mankind.
I want to thank my dear family, as well as T. Nitta
and Y. Kuroe.
References
[1] K. Guerlebeck et al, Holomorphic Functions in
the Plane and n-dimensional Space, Birkhauser,
2008, chp. 7.3.3.
[2] S. Buchholz, G. Sommer, A hyperbolic multilayer perceptron, Proceedings of the International Joint Conference on Neural Networks,
Como, Italy, vol. 2, 129/133 (2000).
[3] T. Nitta, S. Buchholz, On the Decision Boundaries of Hyperbolic Neurons, Proceedings of
the International Joint Conference on Neural Networks, IJCNN’08-HongKong, June 1-6,
2973/2979(2008).
[4] S. Buchholz, PhD Thesis, A Theory of Neural
Computation with Clifford Algebras, University
of Kiel, 2005.
[5] F. Catoni et al, The Mathematics of Minkowski
Space-Time, Birkhauser, 2008.
[6] Laplace’s equation, Wikipedia, accessed 24 August 2011, http://en.wikipedia.org/wiki/
Laplace’s_equation
2 Greek term: logos. Note: A Greek philosopher named
Heraclitus first used the term Logos around 600 B.C. to designate the divine reason or plan which coordinates a changing
universe. [14]
[7] Wave equation, Wikipedia, accessed 24 August
2011, http://en.wikipedia.org/wiki/Wave_
equation
[8] Online
3D
function
grapher,
//www.livephysics.com/ptools/
online-3d-function-grapher.php?
http:
[9] Split-complex number, Wikipedia, accessed
29 August 2011, http://en.wikipedia.org/
wiki/Split-complex_number
[10] Notes of collaboration with H. Ishi, Feb. 2011,
p. 15.
[11] C. Doran and A. Lasenby, Geometric Algebra for
Physicists, Cambridge University Press, Cambridge (UK), 2003.
[12] E. Hitzer, Relativistic Physics as Application of
Geometric Algebra, in K. Adhav (ed.), Proceedings of the International Conference on Relativity 2005 (ICR2005), University of Amravati, India, January 2005, 71/90(2005).
[13] The Bible, New International Version (NIV),
The Gospel according to John, chapter 1, verses
1-4, http://www.biblegateway.com/
[14] Strong’s Bible lexicon entry G3056 for logos, available online at Blue Letter Bible.
http://www.blueletterbible.org/lang/
lexicon/lexicon.cfm?Strongs=G3056&t=KJV
| 9cs.NE
|
On Oscillations in the Social Force Model
Tobias Kretz
PTV Group, D-76131 Karlsruhe, Germany
[email protected]
arXiv:1507.02566v1 [physics.soc-ph] 9 Jul 2015
July 10, 2015
Abstract
The Social Force Model is one of the most prominent models of pedestrian dynamics. As such naturally
much discussion and criticism has spawned around it, some of which concerns the existence of oscillations in the
movement of pedestrians. This contribution is investigating under which circumstances, parameter choices, and
model variants oscillations do occur and how this can be prevented. It is shown that oscillations can be excluded
if the model parameters fulfill certain relations. The fact that with some parameter choices oscillations occur
and with some not is exploited to verify a specific computer implementation of the model.
1
Introduction
The Social Force Model of pedestrian dynamics is a model that aims at describing the movement of pedestrians
with the predominant purpose of simulating pedestrian movement on computers. The force of pedestrian β on
pedestrian α typically has the form
f~αβ = Aα w()e(−g()) êαβ
(1)
where g() is a function which grows with increasing distance between both pedestrians and can depend on the
velocities of one or both pedestrians. The function w() suppresses forces the more pedestrian β is located outside
the current walking direction of pedestrian α.
The Social Force Model has first been introduced in 1995 [1]. This variant later was called “elliptical specification I”. A second variant (circular specification) has been proposed in 2000 [2] and a third variant (elliptical
specification II) in 2007 [3]. The difference between the three variants lies mainly in the way the velocities of
two interacting pedestrians are considered in the computation of the force between them. The 1995 variant
considers only the velocity of the pedestrian who exerts the force. The 2000 variant does not at all consider
velocities (only the distance between pedestrians) and the 2007 variant considers the relative velocity between
both pedestrians (the pedestrian who exerts the force and the pedestrian on whom the force acts). For the
analytical considerations in this paper mainly the simplest variant from 2000 will be considered. Nevertheless it
will also be discussed how results will change qualitatively if the variants as of 1995 or 2007 are applied.
Under “oscillations” in this paper unrealistic artifacts in the trajectory of a pedestrian approaching another
pedestrian, his destination or a wall is understood. The occurrence of oscillations in the sense of this contribution
has been discussed in a number of contributions [4–7] and it is often claimed that oscillations cannot be avoided
in the Social Force Model, but that they just can be made small. In this paper it will be shown that this is not
correct and exact conditions for the value of the model parameter such that oscillations occur will be derived.
In the remainder of the paper first a single pedestrian approaching a destination is investigated, then a
pedestrian approaching another pedestrian who is standing still and finally two pedestrians approaching each
other. In each case the model is reduced to one dimension and the noise term is set to zero. In the first section
on approaching a destination the problem will be shown to be most severe as with certain conditions oscillations
cannot be prevented and continue infinitely long. At the same time – as will be argued – for this case it is not
very relevant, as there are simple, pragmatic solutions. The second and third case yield restrictions to the choice
of parameters which can produce realistic, oscillation-free behavior.
2
A pedestrian approaching a destination
In this section we are interested in and discuss the equations of motion and their solution of a single pedestrian
approaching a destination coordinate (i.e. a point) where he is required to come to a standstill. We assume that
in the beginning the pedestrian is walking with his desired speed v0 straight towards the destination coordinate,
so there is no tangential component of the walking velocity. Then we can describe the pedestrian as walking
from positive x coordinate into negative x direction towards the destination which is at x = 0. Since the 1995,
1
2000, and 2007 variants of the Social Force Model only differ in the force between pedestrians and not the driving
force term all results of this section hold for all three variants.
We assume for now, that the desired velocity is always some externally given v0 and is always pointing from
the pedestrians current position towards x = 0. This assumption is the simplest one and it can be questioned –
as we will do below. With it it is obvious that there will be oscillations around x = 0. Our intention here is to
investigate the quantitative details of these oscillations.
In general the equation of motion for this pedestrian reads
ẍ(t) =
−sign(x(t))v0 − ẋ(t)
τ
(2)
where τ is an external parameter which typically has values between 0.1 and 1.0 seconds.
We require the pedestrian not only to reach x = 0, but also to stand still there as arrival condition. Because
the pedestrian has a speed larger 0 (or, considering walking direction: smaller 0) he will walk over the destination
and be on the left (negative) side of x coordinates. There the desired velocity points into the direction of positive
x coordinates. So we have for the time following the moment when the pedestrian is at x = 0:
ẍ(t) =
v0 − ẋ(t)
τ
(3)
This is solved by
ẋ(t)
t
v0 − ae− τ
=
x(t)
(4)
− τt
=
b + v0 t + aτ e
(5)
where a and b are integration constants which need to be determined by initial conditions.
We choose t = 0 at the moment when the pedestrian is at x = 0. Then ẋ(t = 0) = −v0 . However, for later
usage we want to set here more general ẋ(t = 0) = −u and remember that for our particular case u = v0 . With
the two conditions x(0) = 0 and ẋ(0) = −u we can determine the values of the integration constants:
a
=
v0 + u
(6)
b
=
−(v0 + u)τ
(7)
So we have
ẋ(t)
=
x(t)
=
t
v0 − (v0 + u)e− τ
t
v0 t − (v0 + u)τ 1 − e− τ
(8)
(9)
Now we can compute the time tturn when the pedestrian stops (and turns around) ẋ(t0 ) = 0 and the position
x(t0 ) at which this happens:
tturn
=
x(tturn )
=
v0 + u
v
0
u
u
τ v0 ln 1 +
−
v0
v0
τ ln
(10)
(11)
In the initial case, when u = v0 this simplifies to tturn = τ ln(2) and x(tturn ) = τ v0 (ln(2) − 1).
This is only half the way to go. The actual question is how fast a pedestrian returns to x = 0 when he has
passed it before with speed u and how long such a loop takes.
Now we choose t = 0 for the moment when the pedestrian is standing still at x(tturn ). The time treturned
at which the pedestrian returns to x = 0 therefore has to be understood as time after tturn and not as absolute
point in time.
We begin again by determining the value of the integration constants. From equation (4) and ẋ(0) = 0
follows a = v0 . With equations (5) and (11) we have
u
u
x(0) = b + v0 τ = v0 τ ln 1 +
−
(12)
v0
v0
u
u
b = v0 τ ln 1 +
− 1+
(13)
v0
v0
t
u
t
u
x(t) = v0 τ ln 1 +
− 1+
+ + e− τ
(14)
v0
v0
τ
Because x(treturned ) = 0 we have the following equation for treturned :
treturned
u
u
treturned
τ
− 1+
+
+ e−
0 = v0 τ ln 1 +
v0
v0
τ
0
=
φreturned − α + ln(α) + e−φreturned
2
(15)
(16)
with the substitutions φreturned = treturned /τ and α = 1 + u/v0 . We do another substitution ϕ = φreturned −
α + ln(α), transforming the last equation to
0
−α
−αe
=
=
ϕ + e−(ϕ+α−ln(α))
ϕe
ϕ
Obviously one solution is ϕ = −α, but the general solution is
ϕ = W −αe−α
(17)
(18)
(19)
where W () is the Lambert W function [8–10], which by definition is the inverse relation of f (y) = yey .
Resubstituting ϕ and φreturned (for reasons of convenience we do not resubstitute α) we have:
treturned
= W −αe−α + α − ln(α)
τ
(20)
In the interval y ∈ [−1/e..0] W (y) has two branches, denoted W−1 (y) and W0 (y); and with 1 ≤ α ≤ 2 for
−αe−α we are within this interval where W (y) has two branches. It holds
W−1 −αe−α = −α
(21)
In this case it would be treturned = −tturn . Thus the W−1 branch gives the backwards in time solution which
we are not interested in here (because we already have computed it above). Therefore we have to continue with
the W0 branch for which
W0 −αe−α 6= −α
(22)
although W is the inverse relation of f (y) = yey . In the remainder we write W for W0 .
= W (−2/e2 ) + 2 − ln(2) = 0.90047.
In case u = v0 , i.e. α = 2 the numerical value of the solution is treturned
τ
Using equation (20) in equation (4) we get the speed ẋ(treturned ) at the time when the pedestrian returns to
x = 0 in dependence from u, which is the speed at the time when the pedestrian last was at x = 0:
ẋ(treturned ) = v0 1 + W −αe−α
(23)
where we have used the defining equation of the W function y = W (y)eW (y) .
From here on the properties have an index that determines the recurrence to the offspring. For example t0
is the (absolute) time when the pedestrian is for the first time at the offspring, t1 denotes the (absolute) time
when the pedestrian returns for the first time to the offspring and so on. In the case of properties that do not
describe passage of the offspring, but the loop durance and turning position the index enumerates the loops.
This means that for these two properties there is no index 0 and that tn = tn−1 + ∆tn .
Equation (23) means that for the n + 1th passage of the offspring αn+1 depends on αn like
(24)
αn+1 = 2 + W −αn e−αn
The time ∆tn+1 it takes for the n + 1th loop depends on αn like
∆tn+1
= αn + W −αn e−αn .
τ
(25)
Rewriting equation (11) in terms of α and writing |xn | for the turn around distance of the nth loop we have
|xn+1 |
= αn − 1 − ln(αn )
τ v0
(26)
Table 1 shows the results from the first 30 passages if the process begins at t = 0 and with speed v0 . Figures
(1) to (3) visualize these data.
As typical values are τ = 0.4 s and v0 = 1.5 m/s it takes about 7 passages before the amplitude |xn | gets
smaller than 1 cm. This takes about 2.1 seconds. The 7th oscillation has a period of 0.15 seconds. To resolve
this a computer implementation would have to have a time step which is at the very maximum half that value
0.075 seconds or 14 simulation steps per second.
Because αn+1 = 1 only if W (−αn e−αn ) = −1 which in turn is only the case if αn = 1 there will be infinitely
many oscillations and in A a proof is given that the sum of the ∆tn diverges, i.e. the pedestrian will oscillate
infinitely long around the destination coordinate.
At first sight this is an unsatisfactory result with regard to the Social Force Model, as such oscillations are
unrealistic. However, we have to ask how realistic our assumptions and initial conditions were. This concerns in
particular the desired velocity ~v0 . We demanded in the beginning that the pedestrian should come to a stop at
x = 0. Nevertheless we have set the desired velocity all of the time to one particular value |~v0 | > 0. This is too
simplistic. Real persons plan ahead and adjust their desired speed: if they desire to stop at a certain position
3
Passage/Loop(n)
0
1
2
3
4
5
6
7
8
9
14
19
29
|xn |
τ v0
∆tn
τ
tn
τ
un
v0
0.307
0.128
0.071
0.045
0.031
0.023
0.017
0.014
0.011
0.005
0.003
0.001
1.594
1.018
0.754
0.600
0.499
0.428
0.374
0.332
0.299
0.199
0.150
0.100
0.000
1.594
2.611
3.365
3.966
4.465
4.893
5.266
5.599
5.898
7.062
7.898
9.088
1.000
0.594
0.424
0.330
0.270
0.229
0.199
0.175
0.157
0.142
0.096
0.073
0.049
αn
2.000
1.594
1.424
1.330
1.270
1.229
1.199
1.175
1.157
1.142
1.096
1.073
1.049
Table 1: Numerical results for the first 30 passages resp. oscillations. The value for αn is understood before an
oscillation, while ∆tn /τ is the period of that oscillation, and the total time tn /τ after that same oscillation. All
values are dimensionless. The numerical values of the Lambert W function have been computed using Wolfram
Alpha [11].
Figure 1: Left: Value of αn at the beginning of oscillation n. Right: Maximum amplitude |xn |/(v0 τ ) of oscillation
n.
Figure 2: Left: Period ∆tn /τ of oscillation n. Right: Total time tn /τ at nth passage of offspring (i.e. time after
nth oscillation; t=0 is when the pedestrian reaches the offspring for the first time and with a speed v0 ).
4
Figure 3: This shows the evolution of the amplitude xn /(v0 τ ) over time in [s].
they adapt their desired velocity beforehand to just achieve that. So we have to ask how we have to modify v0
dynamically to account for that.
More precisely we ask: at which distance db does a pedestrian have to start braking in the Social Force
Model, if he sets vb as desired speed opposing his current speed u? And how long does it take before he comes
to a stand still?
For this the equation of motion reads
vb − ẋ(t)
(27)
ẋ(t) =
τ
with the following (initial) conditions:
ẋ(t = 0)
=
−u
(28)
x(t = 0)
=
d
(29)
ẋ(t0 )
=
0
(30)
x(t0 )
=
0
(31)
where we have defined the moment where the pedestrian starts to brake as t = 0 and the moment where he stops
at x = 0 as t0 ; d is the distance before stand still at which braking has to begin which we are looking for.
Solving this results in
u
t0 = τ ln 1 +
(32)
vb
u
u
db = τ vb
− ln 1 +
(33)
vb
vb
This gives finite and positive t0 and db for all vb > 0. Thus, it is not sufficient to set the desired speed to zero
for a pedestrian who wants to stop as this would imply an infinitely large braking distance and an infinitely long
time to come to a stand still. If we assume that a pedestrian for braking can at maximum have a desired speed
vb = v0 the minimum time for braking is t0 = τ ln(2) and the minimum braking distance is db = τ v0 (1 − ln(2))
to come to standstill from an initial speed u = v0 .
A different and pragmatic solution of the problem is that in real-world planning applications usually there is
no requirement set for the speed at which a pedestrian arrives at a destination. It is furthermore usual that as
destination not a point is given but that a cross section has to be crossed or the pedestrian has to move into a
specific area. If no restriction is given for the speed at arrival the problem disappears.
A third objection is that also a real person cannot comply to the request to stand still with his or her center
exactly at some given coordinate. Real people always sway a little bit when they (try to) stand still [12]. Why
then should one require this from a simulated pedestrian? The oscillations around the destination point which
were found here in their functional form surely do not match the swaying of real people when they stand “still”,
but the amplitude of the ones of the model quickly fall below those of real people. When the real swaying is not
required to be reproduced by models implicitly a required limit to precision is set and any movement of that
order of magnitude or below should be acceptable.
5
3
A pedestrian approaching a standing pedestrian
3.1
Theory
Now we want to investigate the situation when some pedestrian M is approaching another (pedestrian S) one
who is standing at a fixed position – again in one dimension, for an empirical investigation see for example [13].
Since the pedestrian who is exerting the force is not moving, the 1995 variant (elliptical specification I) of the
Social Force Model will produce the same result as the 2000 variant (circular specification) which is the one we
are investigating, but different from the 2007 variant (elliptical specification II) where the speed of the pedestrian
on whom the force acts modifies the strength of the force.
Assume pedestrian S is standing still at x = 0, facing into positive x direction and pedestrian M is approaching
from there, i.e. pedestrian M has positive x coordinate and a speed directed towards negative x, i.e. ẋ(t = 0) < 0
as well as the desired speed v0 > 0 which is constant in time. It is assumed that pedestrian M at time t=0 is far
away from pedestrian S and walking with his desired walking speed ẋ(t = 0) = −v0 .
Then the equation of motion for pedestrian M in the 1995 and 2000 variants of the Social Force Model is
ẍ(t) =
x(t)−2R
−v0 − ẋ(t)
+ Ae− B
τ
(34)
with R as radius of a pedestrian (we assume here for simplicity that all pedestrians have the same radius) and
τ , A, and B parameters of the Social Force Model.
Pedestrian M will come to a standstill at distance
Aτ
+ 2R
(35)
ds = B ln
v0
As pedestrians should not bump one into another ds must be larger than 2R. Therefore we have a first condition
for the parameters of the Social Force Model to yield realistic results:
Aτ > v0
(36)
We assume that oscillations only occur generally if they also occur close to equilibrium. Thus, if there are
no oscillations when pedestrian M is already close to x = ds then there are no oscillations at all. Expanding the
exponential function in equation (34) into a Taylor series around x = ds gives
˙
¨ + ξ(t) + v0 ξ(t) ≈ 0
ξ(t)
τ
Bτ
(37)
Equation (37) is the equation of the damped harmonic oscillator, with the known three solutions: under damped
(pedestrian M approaches the equilibrium point oscillating around it), critically damped (pedestrian M approaches the equilibrium point as quick as possible but without oscillations) and over damped (pedestrian M
approaches the equilibrium point slower than would be possible without having oscillations. Which of the three
cases is realized depends on the relation of parameters:
v0 τ
B
v0 τ
4
B
v0 τ
4
B
4
>
1 ↔ under damped
(38)
=
1 ↔ critically damped
(39)
<
1 ↔ over damped
(40)
Thus in addition to equation (36) with
4v0 τ ≤ B
(41)
we have a second condition for the parameters of the 1995 and 2000 variants of the Social Force Model to have
a chance to yield realistic results.
3.2
Implications for parameters found in literature
In the literature one can find values for some or all of the parameters A, B, τ , and v0 gained from empirical
observations or laboratory experiments. If all four parameters are given, one can use relations (36) and (41) to
test if realistic results for the scenario discussed here can be expected. If not for all four parameters values are
given those two equations allow to set limits. Table 2 shows a compilation of such data and how they relate
to or with relations (36) and (41). It can be seen that where all four parameters were taken from experiment
relation (36) easily holds while relation (41) is clearly violated. Whereas if parameters A and B (and τ ) have
been calibrated or given in a work then relations (36) and (41) require pedestrians to walk quite slowly, while if
v0 and τ are calibrated or given it needs relatively large values for A and B that relations (36) and (41) hold.
This is an indication that with the circular specification (alone) the parameter space that yields realistic results
is small.
6
Source
[3]
A in [m/s2 ]
0.42 ± 0.26
B in [m]
1.65 ± 1.01
[2]
[14]
[15]
[15]
[16]1
26.67†
> 2.25
0.16 ± 0.01
0.45 ± 0.41
12.0 ± 0.2
0.08
≥ 3.34
4.16 ± 0.65
13.5 ± 18.4
0.16 ± 0.08
τ in [s]
τ > v0 /Amax
τ ≤ Bmax /v0 /4
0.5
0.61
0.5 ‡
0.5 ‡
1.09 ± 0.35
v0 in [m/s]
< 0.67
eq. (36)
eq. (41)
0.8
1.37
< 0.087
< 0.43
1.34 ± 0.21
OK
violated
OK
violated
Table 2: Bold face marks value from literature; normal face is computed with equations (36) and (41). Where one
parameter was calculated from another one where a range is given the range was utilized such that the parameter
space for the derived parameter is as large as possible. † : from 2000N/75kg. ‡ : Assumption and input for
calibration. 1 : The simplified Nomad model discussed in said publication is identical to the circular specification
of the Social Force Model, except that the radius of pedestrians is not stated explicitly in the exponent. If – what
is not stated explicitly in said contribution – “distance” for the Nomad model means body surface to body surface
the parameter meanings are identical, while if it means center to center distance the value of parameter A would
change by a factor e−2R/B and even equation (36) could be violated.
3.3
Elliptical specification II in comparison
For elliptical specification II a rigid analysis is much more difficult than for the circular specification since the
elliptical specification II does not only depend on the distance of the two pedestrians but also on their relative
velocity. Still one can estimate the effect of the added consideration of relative velocity on the occurrence
of oscillations. In the elliptical specification II of the Social Force Model [3] the force from pedestrian β on
pedestrian α is defined as
˙
w(θαβ (d~αβ , ~r˙α ))~g (d~αβ , d~αβ )
1 + cos(θαβ (d~αβ , ~r˙α ))
λα + (1 − λα )
2
~r˙α · d~αβ
−
|~r˙α ||d~αβ |
(43)
=
~rα − ~rβ
(45)
=
~ ~ Vαβ (d~αβ , d~˙αβ )
−∇
dαβ
(46)
f~α (~rα , ~rβ , ~r˙α , ~r˙β )
=
w(θαβ (d~αβ , ~r˙α ))
=
cos(θαβ (d~αβ , ~r˙α ))
=
d~αβ
˙
~g (d~αβ , d~αβ )
˙
Vαβ (d~αβ , d~αβ )
=
˙
bαβ (d~αβ , d~αβ )
=
~
~˙
b
(d
αβ ,dαβ )
− αβ B
α
Aα Bα e
q
1
˙
˙
(|d~αβ | + |d~αβ + d~αβ ∆tα |)2 − (d~αβ ∆tα )2
2
(42)
(44)
(47)
(48)
where ~r gives the position of pedestrians and A, B, λ, and ∆t are model parameters. Pedestrians’ positions and
derived properties are time dependent, other properties are constant. In one dimension and with pedestrians
facing each other this simplifies to
cos(θαβ )
=
1
w(θαβ )
=
1
(50)
dαβ
=
(51)
fα (xα , xβ , ẋα , ẋβ )
=
xα − xβ w.l.o.g. assumed to be > 0
d
g(dαβ , d˙αβ ) = −
Vαβ (dαβ , d˙αβ )
ddαβ
Vαβ (dαβ , d˙αβ )
=
bαβ (dαβ , d˙αβ )
=
=
=
(49)
b
(d
,ḋ
)
− αβ αβ αβ
Bα
Aα Bα e
q
1
(dαβ + |dαβ + d˙αβ ∆tα |)2 − (d˙αβ ∆tα )2
2
0 for (dαβ + d˙αβ ∆tα ) ≤ 0
q
d2αβ + dαβ d˙αβ ∆tα otherwise
7
(52)
(53)
(54)
(55)
(56)
Therefore the force is either zero if (dαβ + d˙αβ ∆tα ) ≤ 0 or it is
fα (xα , xβ , ẋα , ẋβ )
=
g(dαβ , d˙αβ )
(57)
r
=
2dαβ + d˙αβ ∆tα
−
e
Aα q
2
˙
2 dαβ + dαβ dαβ ∆tα
=
d¯a − d̄g
Aα ¯ e Bα
dg
d2 +dαβ ḋαβ ∆tα
αβ
Bα
(58)
(59)
with d¯a being the arithmetic and d¯g the geometric mean of current and projected distance (dαβ resp. dαβ +
d˙αβ ∆tα ). It can directly be seen that for large distances equation (58) reduces approximately to the circular
specification from [2] which depends only on distance.
For a pedestrian α approaching another pedestrian β from positive x values d is positive and d˙ is negative.
Therefore and because of the inequality of arithmetic and geometric means it holds dαβ + d˙αβ ∆tα < d¯g < d¯a <
˙
dαβ . Then obviously as long as d > −d∆t
the force as in equation (58) is larger compared to the circular
specification and consequently pedestrian α will not overshoot for certain parameter choices where he does so
with the circular specification.
In case pedestrian α overshoots over the equilibrium point and turns around it would be desirable that the
force is not larger but smaller than with the circular specification. However, since in this case d˙ becomes positive
it holds that dαβ < d¯g < d¯a < dαβ + d˙αβ ∆tα and therefore in equation (59) the exponential factor gives a smaller
value than with the circular specification, yet the fraction factor has a value > 1 and may for large values of
parameter B outweigh the damping effect from the modification in the exponential function. There are three
indications that also in this phase of pedestrian α’s movement and in general oscillations are suppressed with
elliptical specification II: first, for large values of parameter B already in the circular specification there are no
oscillations as equation (41) tells us. This means that where in an isolated view on the “way back” the problem
is most pronounced the system may actually not even evolve to the point that it exists.
Second, one can expand equation (58) in a series for small values of d˙αβ ∆tα /dαβ :
d
dαβ d˙αβ ∆tα
− Bαβ
α
fα (xα , xβ , ẋα , ẋβ ) ≈ Aα e
1−
(60)
Bα dαβ
In the moment pedestrian α turns around it is d˙αβ = 0 and therefore circular and elliptical specification II
yield an identical force. Starting to move backward with now positive d˙αβ equation (60) tells us that elliptical
specification II yields smaller forces with the difference to circular specification leveled for Bα → ∞.
Third, with the – admittedly arguable – additional assumptions that
d˙αβ ∆tα
d˙αβ ∆tα
<<
dαβ
(61)
<<
Bα
(62)
one cannot only expand for small ξ(t), but also reduce the complexity of equation (58) with regard to d˙αβ .
Various approximate forms of that equation can be derived in this way of which one is analytically solvable and
contains parameter ∆tα (omitting the indices α):
˙ + v0 ξ(t) = 0
¨ + 1 1 + v0 ∆t ξ(t)
(63)
ξ(t)
τ
B
Bτ
˙ has changed. This leads to a less strict requirewhere in comparison to equation (37) just the factor before ξ(t)
ment for avoiding oscillations:
2
v0 ∆t
(64)
4v0 τ ≤ B 1 +
B
than equation (41).
˙ < 0 where the force is zero: if pedestrian α starts to approach β from a
Finally a note on the case d + d∆t
˙
sufficiently large distance and with a typical pedestrian walking speed it will be d + d∆t
> 0. Since equation
+
˙
(58) diverges to positive values at d + d∆t → 0 the pedestrian will slow down and eventually be at rest or turn
˙
˙ > 0. Only when a
around before d < −d∆t.
For a departing pedestrian α it is d˙ > 0 and thus always d + d∆t
˙
simulation is initiated with d + d∆t
< 0 it may yield dynamics that do not fit into this line of argumentation;
compare [17]. Such extrinsically prepared “Garden of Eden” states can be dealt with for example by a model
extension (if one does not simply want to exclude them by construction).
3.4
Simulations
For realistic applications it makes sense to choose the parameters such that no oscillations occur. However, to
verify a computer implementation of the Social Force Model it can be interesting to use parameters just around
8
the critically damped conditions and check if oscillations do and do not occur according to expectations. Model
specific validation work can amend validation tests like those in the RiMEA test cases [18] which usually are
formulated model independently. In this subsection such a model specific verification process will be carried out
exemplarily utilizing PTV Viswalk [19].
Figure 4: Simulation scenario.
Figure 4 shows how the one-dimensional setting has been implemented in the two-dimensional simulation
model. The walking area is modeled to be 0.55 m wide. A pedestrian facing into positive x direction is stopped
by a red traffic signal at x=0. Then a second pedestrian is set into the model at x=52 m moving into negative
x direction.
τ
0.7
0.8
0.9
1.0
1.2
1.5
2.0
3.0
4.0
5.0
distance
0.4556
0.4821
0.5044
0.5269
0.5645
0.6073
0.6655
0.7483
0.8044
0.8482
expected
0.4570
0.4837
0.5072
0.5283
0.5648
0.6094
0.6669
0.7480
0.8056
0.8502
difference
0.0014
0.0016
0.0028
0.0014
0.0002
0.0021
0.0014
-0.0003
0.0011
0.0020
Table 3: Stand still distance [m] in dependence of parameter τ [s], with A = 1.6 m/s2 , B = 0.2 m and v0 = 1.5
m/s. Column “expected” shows the values according to equation (35).
Parameter settings: since A soc mean controls the contribution of elliptical II specification it has been set
to zero (in the remainder ”A refers to ”A soc iso in the software; for the pedestrian on the left it has been set to
zero as well); λ = 1.0 to minimize effects from the in fact two-dimensional nature of the simulation; stochastic
noise has been set to zero . The value of the noise parameter has been set to zero for both pedestrians to not
unnecessarily blur the results.
B
0.1
0.2
0.3
0.5
1.0
2.0
distance
0.5831
0.6524
0.7240
0.8590
1.2073
1.9005
expected
0.5847
0.6540
0.7233
0.8620
1.2085
1.9017
difference
0.0016
0.0016
-0.0007
0.0029
0.0013
0.0012
B
4.0
6.0
9.0
12.0
18.0
24.0
dist.
3.2870
4.6734
6.7530
8.8326
12.9917
17.1509
exp.
3.2880
4.6743
6.7537
8.8332
12.9920
17.1509
diff.
0.0010
0.0008
0.0007
0.0005
0.0003
0.0000
Table 4: Stand still distance [m] in dependence of parameter B [m], with A = 2.0 m/s2 , τ = 1.5 s and v0 = 1.5 m/s.
Column “expected” shows the values according to equation (35). The difference between theoretical expectation
and simulation is in all cases below 3 mm.
At first we investigate where the second pedestrian comes to rest. According to equation (35) this depends
on the values of the parameters B soc iso, A soc iso, v0 , τ , and R. The latter was set to be 0.2577 m. Keeping
9
A soc iso and v0 constant and increasing the value of τ in steps of 0.1 s the second pedestrian does not pass
through the first one for the first time at a value τ = 0.6 s and both do not overlap visually for τ ≥ 0.8 s. At
τ = 0.9375 s when Aτ = v0 the distance of the central points of both pedestrians is 0.5135 m which comes 2
mm close to 2R. Table 3 and figure 5 show values for the stand still distance in dependence of some values for
parameter τ with all other parameters kept constant. The theoretical expectation is met well in all cases.
Table 4 and figure 5 show values for the stand still distance in dependence of some values for parameter
B soc iso with all other parameters kept constant. The theoretical expectation is met well in all cases.
The stand still distances of table 4 are unrealistically high for all but the smallest values for parameter B.
We have chosen the parameters in this way not to scan for realistic parameter values, but because with these
parameters one can well demonstrate that for certain cases (small values for B) there are oscillations and in
others (large values for B) there are none. Figures 6 and 7 show the time evolution of the position of the
approaching pedestrian for various values of parameter B.
Figure 5: Left: Visualization of the data of table 3. The expectation for the regression curve would be y =
0.2000 ln(x) + 0.5283. Right: Visualization of the data of table 4. The expectation for the regression curve would
be y = 0.6931x + 0.5154.
Figure 6: Left: Position of approaching pedestrian over time for various values of parameter B. Right: As A = 2.0
m/s2 , v0 = 1.5 m/s, τ = 1.5 s the system is critically damped for B = 9.0 m. For increasing B the oscillations get
smaller and vanish for B = 9.0.
Neglecting for the under damped case the damping exponential function the approximately expectated time
distance Tr between two reversal points in the under damped cases is:
Tr = q
π
v0
Bτ
−
(65)
1
4τ 2
Table 5 shows a comparison between actual and expected Tr for various values for B which generate under
damped behavior.
3.5
Two pedestrians approaching each other
If two pedestrians approach each other in one dimension they may come to a stand still at an equilibrium distance
or they might jointly (and with an equilibrium distance) move into one of the two possible directions. If all
10
Figure 7: Left: Position of approaching pedestrian vs. time for under damped and critical cases with regard to the
value of B. Right: Zoom to the region of oscillations.
parameters (v0 , A, B, and τ ) are identical for both pedestrians one can rewrite the coupled equations of motion
of both pedestrians as one equation for the movement of the center of mass and one equation for the relative
motion. Latter one can again be approximated by an oscillator equation. Compared to the case above one has
an additional factor 2 at the friction term implying that the system is critically or over damped for
8v0 τ ≤ B
(66)
which leads to the conclusion that the case of two mutually approaching pedestrians sets a stronger restriction
on parameter choice than the case when one pedestrian is approaching another who is standing, at least if
oscillations are to be avoided. The 2007 variant of the Social Force Model in this case suppresses oscillations
even more than when one of the two pedestrians is standing still.
B
0.1
0.2
0.3
0.5
1.0
1.5
2.0
3.0
number of reverses
11
7
3
3
2
2
2
2
simulation
1.035
1.442
1.800
2.250
3.100
4.000
4.850
6.550
approximate expectation
0.999
1.421
1.750
2.286
3.332
4.215
5.038
6.664
Table 5: Comparison of simulated and approximately expected time [s] between reversals.
4
Conclusions
It could be shown that the Social Force Model as proposed in 1995 (elliptical specification I) and 2000 (circular
specification) in a special and one-dimensional case and around equilibrium reduces to the equations of the
damped harmonic oscillator. This implies that indeed one has to be careful not to choose parameters with which
the pedestrians’ trajectories yield unrealistic results. However, at the same time it means that there are parts in
parameter space in which there are not only just small oscillations, but where there are exactly no oscillations.
A look at parameter values found in literature for the circular specification shows that parameters deemed to
yield realistic results in certain calibration scenarios do or may produce oscillating behavior unless the desired
walking speed(s) are set to rather small values.
The equations of the Social Force Model as of 2007 (elliptical specification II) are not as easily treated
analytically. Still in a discussion of its equations it could be argued that – compared to the circular specification
– oscillations are clearly suppressed. Elliptical specification II from 2007 therefore appears to be superior to the
two preceding variants also for the reasons discussed in this paper (this was found already in the paper from 2007
but for different reasons). It is therefore a good idea to either simply use elliptical specification II or combine it
with one of the earlier variants (e.g. by simply adding the forces) to reduce the risk of oscillations.
The phenomenon of oscillations was used to verify a specific computer implementation of the Social Force
Model. It was possible to show that it reproduces the expected results. This comparison can be seen as an
attempt to falsify either of the two – theoretical expectations and software implementation – and the attempt
11
failed, no potential issues could be found. The method can be applied to verify any implementation of the
Social Force Model variants of 1995 or 2000 and it is generally an example of model specific verification. The
tests carried out in this contribution are just examples. The phenomenon of oscillations bears the potential to
formulate further tests.
5
Acknowledgments
I thank Mohcine Chraibi and Normen Rochau for useful discussions.
6
References
References
[1] D. Helbing and P. Molnar, “Social force model for pedestrian dynamics”, Physical review E 51 no. 5,
(1995) 4282, arXiv:cond-mat/9805244.
[2] D. Helbing, I. Farkas, and T. Vicsek, “Simulating dynamical features of escape panic”, Nature 407
no. 6803, (2000) 487–490, arXiv:cond-mat/0009448.
[3] A. Johansson, D. Helbing, and P. Shukla, “Specification of the Social Force Pedestrian Model by
Evolutionary Adjustment to Video Tracking Data”, Advances in Complex Systems 10 no. 4, (2007)
271–288, arXiv:0810.4587 [physics.soc-ph].
[4] B. Steffen and A. Seyfried, “The repulsive force in continous space models of pedestrian movement”,
arXiv preprint (2008) eprint, arXiv:0803.1319 [physics.soc-ph].
[5] M. Chraibi, A. Seyfried, and A. Schadschneider, “Generalized centrifugal-force model for pedestrian
dynamics”, Physical Review E 82 no. 4, (2010) 046111, arXiv:1008.4297 [physics.soc-ph].
[6] M. Chraibi, U. Kemloh, A. Schadschneider, and A. Seyfried, “Force-Based Models of Pedestrian
Dynamics”, Networks and Heterogeneous Media 6 (2011) 425–442.
[7] G. Köster, F. Treml, and M. Gödel, “Avoiding numerical pitfalls in social force models”, Physical Review
E 87 no. 6, (2013) 063305.
[8] R. Corless, G. Gonnet, D. Hare, D. Jeffrey, and D. Knuth, “On the LambertW function”, Advances in
Computational Mathematics 5 no. 1, (1996) 329–359.
[9] R. Corless, D. Jeffrey, and D. Knuth, “A sequence of series for the Lambert W function”, in Proceedings of
the 1997 international symposium on Symbolic and algebraic computation, pp. 197–204, ACM. 1997.
[10] F. Chapeau-Blondeau and A. Monir, “Numerical evaluation of the Lambert W function and application to
generation of generalized Gaussian noise with exponent 1/2”, IEEE Transactions on Signal Processing 50
no. 9, (2002) 2160–2165.
[11] Wolfram—Alpha, 2014. Publisher: Wolfram Alpha LLC. Retrieved April 9th 2014. https:
//www.wolframalpha.com/input/?i=ProductLog%28a%29+with+a%3D-0.270670566473225&dataset=.
[12] D. Winter, “Human balance and posture control during standing and walking”, Gait & posture 3 no. 4,
(1995) 193–214.
[13] A. Gorrini, K. Shimura, S. Bandini, K. Ohtsuka, and K. Nishinari, “Experimental Investigation of
Pedestrian Personal Space”, Transportation Research Record: Journal of the Transportation Research
Board 2421 no. 1, (2014) 57–63.
[14] T. Werner and D. Helbing, “The social force pedestrian model applied to real life scenarios”, Pedestrian
and evacuation dynamics (2003) 17–26.
[15] S. Seer, C. Rudloff, T. Matyus, and N. Brändle, “Validating social force based models with comprehensive
real world motion data”, Transportation Research Procedia 2 (2014) 724–732.
[16] S. Hoogendoorn and W. Daamen, “Microscopic calibration and validation of pedestrian models:
Cross-comparison of models using experimental data”, in Traffic and Granular Flow 05, pp. 329–340.
Springer, 2007.
12
[17] A. Schadschneider and M. Schreckenberg, “Garden of Eden states in traffic models”, Journal of Physics
A: Mathematical and General 31 no. 11, (1998) L225, arXiv:cond-mat/9801061.
[18] U. Brunner, H. Kirchberger, C. Lebeda, M. Oswald, R. Könnecke, M. Kraft, A. Thoss, L. Mülli,
A. Seyfried, C. Hartnack, S. Wader, G. Spennes, and T. Kretz, RiMEA – Richtlinie für Mikroskopische
Entfluchtungs-Analysen. Initiatoren des RiMEA-Projekts: M. Schwendimann, N. Waldau, P. Gattermann,
C. Moroge, T. Meyer-König, and M. Schreckenberg, 2.2.1 ed., 2009. (eprint from http://www.rimea.de/).
(in German).
[19] PTV AG, PTV Vissim 6.0 – User Manual. PTV Group, Haid-und-Neu-Str. 15, D-76131 Karlsruhe,
Germany, 2013.
[20] Wolfram—Alpha, 2015. Publisher: Wolfram Alpha LLC. Retrieved January 18th 2015.
https://www.wolframalpha.com/input/?i=plot+2%2BLambertW%28-x*exp%28-x%29%29+for+x%3D1+to+2.
[21] Wolfram—Alpha, 2015. Publisher: Wolfram Alpha LLC. Retrieved January 18th 2015.
https://www.wolframalpha.com/input/?i=plot+%28LambertW%28-%281%2Bx%29*exp%28-%281%2Bx%29%
29%29%2C+-%28%2B+1+-+x+%2B+2%2F3*x*x+-+4%2F9*x*x*x+%2B+44%2F135*x*x*x*x+-+104%
2F405*x*x*x*x*x%29%29+for+x+from+0+to+1.
A Proof that a pedestrian heading for a destination point never
comes to rest
In this section we show that
tn =
n
X
∆t
(67)
i=1
diverges for n → ∞.
First step: We proof that αn+1 < αn : we begin with α0 = 2 and with equation (24)
αn+1 = 2 + W0 −αn e−αn
(68)
For all 1 < z ≤ 2 it holds that
− ze−z
<
0
(69)
∂
− ze−z
∂z
>
0
(70)
and for all −1/e < z < 0
W0 (z)
∂
W0 (z)
∂z
<
0
(71)
>
0
(72)
Therefore for all 1 < z < 2 it holds that
W0 (−ze−z )
<
0
(73)
∂
W0 (−ze−z ) > 0
∂z
(74)
From that and with α0 = 2 it follows that
α1 = 2 + W0 (−α0 e−α0 ) < α0
(75)
From equation (24) it follows that
αn − αn+1 = W0 (−αn−1 e−αn−1 ) − W0 (−αn e−αn )
(76)
−z
and from it that if αn−1 > αn also αn > αn+1 . See figure 8 for a plot of 2 + W0 −ze
and the visualization
of the evolution of the αn which allows to see this first step very easily.
Second step: We verify that ∆tn > 0 (physically this is obvious, mathematically it needs to be shown; this
step in effect is a check on potential errors done before): Since
αn = −W1 −αn e−αn
(77)
and because for −1/e < z < 0 it holds that
W0 (z) > W1 (z)
13
(78)
Figure 8: Plot of 2 + W0 (−xe−x ) for 1 ≤ α ≤ 2 and a visualization of the evolution of the αn ; basically created
with [20].
it results for the ∆tn according to equation (25)
∆tn+1
= αn + W0 −αn e−αn = W0 −αn e−αn − W1 −αn e−αn > 0
τ
(79)
Third step: we proof that ∆tn+1 < ∆tn . Equations (25) and (24) read
∆tn+1
τ
αn
αn + W0 (−αn e−αn )
=
=
2 + W0 (−αn−1 e
−αn−1
(80)
).
(81)
From them it follows that
∆tn+1
= αn+1 + αn − 2
(82)
τ
thus the ∆tn show the same behavior as the αn and with αn+1 < αn also ∆tn+1 < ∆tn .
Fourth step: if ∆tn+1 /∆tn for large n would approach a value smaller than 1 the sum would converge, only
if it approaches 1 it may diverge. From (82) it follows that
∆tn+1
αn−1 − αn+1
=1−
∆tn
αn−1 + αn − 2
To compute the limit for this for large n we have to expand W0 (−αn e−αn ) into a series.
For convenience we write
βn = αn − 1
(83)
(84)
knowing that this is βn = un /v0 and that these βn will approach 0 with increasing n.
By computing the right side limit towards 0 of
W0 (−αn e−αn ) = W0 (−(1 + βn )e−(1+βn ) )
(85)
and its derivatives one can write
W0 (−(1 + βn )e−(1+βn ) ) = −1 + βn −
2 2 4 3
44 4 104 5
βn + βn −
βn +
βn + O(βn6 )
3
9
135
405
(86)
compare figure 9.
Considering only terms to second order
βn
≈
βn+1
≈
2 2
βn−1
3
4 2
βn−1 − βn−1
3
βn−1 −
(87)
(88)
Using these approximations in equation (83) gives for large n
∆tn+1
2βn−1
≈1−
∆tn
3 − βn−1
which approaches 1 with n → ∞ where βn−1 → 0.
14
(89)
Thus, like with the harmonic series hm the ratio of subsequent terms approaches 1. We note that equation
∆t
(82) implies n+1
= βn+1 + βn and therefore
τ
∞
X
tn→∞
= α0 − 1 + 2
βn
τ
n=1
(90)
the sum of the ∆tn depends trivially on the sum of the βn and especially their convergence behavior is the same.
In the last step we prove that if βn > hm then also βn+1 > hm+1 and therefore beyond some n, m the harmonic
series is a lower estimate of the βn implying that with the harmonic series also the sum of βn diverges.
Assume that for some n, βn can be written as
βn =
q
m
(91)
with m ∈ N, m >> 1 and 1 ≤ q < m/(m − 1), i.e. βn is placed between two elements of the harmonic series.
This requires just that there is some 0 < βn < 1. This is obviously the case.
So, can there be a βn+1 < 1/(m + 1)?
βn+1 −
1
q
2 q2
1
=
−
−
m+1
m
3 m2
m+1
(92)
A lower estimate of the right side is if at the positive term q is replaced by its minimum value q = 1 and at the
negative term by its upper limit q = m/m − 1:
βn+1 −
1
m+1
>
>
>
1
2
1
1
−
−
m
3 (m − 1)2
m+1
m2 − 8m + 3
3m(m − 1)2 (m + 1)
0∀(m ≥ 8)
(93)
(94)
(95)
Thus, if there is a βn0 < 1/8 – it is, as can be seen in table 1) – it will hold for all βn>n0 that if βn > hm then
also βn+1 > hm+1 . Therefore the harmonic series is a lower estimate for the series of βn . Thus the series of the
βn diverges and with it the series of the ∆tn .
Figure 9: Plot comparing W (−(1 + y) exp(−(1 + y))) and its approximation [21].
15
| 5cs.CE
|
1
Robust Computer Algebra, Theorem Proving, and Oracle AI
arXiv:1708.02553v2 [cs.AI] 31 Dec 2017
Gopal P. Sarma
School of Medicine, Emory University, Atlanta, GA USA
[email protected]
Nick J. Hay
Vicarious FPC, San Francisco, CA USA
[email protected]
Keywords: Oracle AI, AI safety, CAS, theorem proving, math oracles
Received: June 24, 2013
In the context of superintelligent AI systems, the term “oracle” has two meanings. One
refers to modular systems queried for domain-specific tasks. Another usage, referring
to a class of systems which may be useful for addressing the value alignment and AI
control problems, is a superintelligent AI system that only answers questions. The
aim of this manuscript is to survey contemporary research problems related to oracles
which align with long-term research goals of AI safety. We examine existing question
answering systems and argue that their high degree of architectural heterogeneity makes
them poor candidates for rigorous analysis as oracles. On the other hand, we identify
computer algebra systems (CASs) as being primitive examples of domain-specific
oracles for mathematics and argue that efforts to integrate computer algebra systems
with theorem provers, systems which have largely been developed independent of one
another, provide a concrete set of problems related to the notion of provable safety
that has emerged in the AI safety community. We review approaches to interfacing
CASs with theorem provers, describe well-defined architectural deficiencies that have
been identified with CASs, and suggest possible lines of research and practical software
projects for scientists interested in AI safety.
1
Introduction
Recently, significant public attention has been
drawn to the consequences of achieving humanlevel artificial intelligence. While there have
been small communities analyzing the long-term
impact of AI and related technologies for decades,
these forecasts were made before the many recent
breakthroughs that have dramatically accelerated the pace of research in areas as diverse
as robotics, computer vision, and autonomous
vehicles, to name just a few [1–3].
Most researchers and industrialists view
advances in artificial intelligence as having
the potential to be overwhelmingly beneficial
to humanity.
Medicine, transportation, and
fundamental scientific research are just some of
the areas that are actively being transformed
by advances in artificial intelligence. On the
other hand, issues of privacy and surveillance,
access and inequality, or economics and policy
are also of utmost importance and are distinct
from the specific technical challenges posed by
most cutting-edge research problems [4, 5].
In the context of AI forecasting, one set of
issues stands apart, namely, the consequences
of artificial intelligence whose capacities vastly
exceed that of human beings. Some researchers
have argued that such a “superintelligence”
poses distinct problems from the more modest
AI systems described above. In particular, the
emerging discipline of AI safety has focused on
2
issues related to the potential consequences of
mis-specifying goal structures for AI systems
which have significant capacity to exert influence
on the world. From this vantage point, the
fundamental concern is that deviations from
“human-compatible values” in a superintelligent
agent could have significantly detrimental consequences [1].
One strategy that has been advocated for
addressing safety concerns related to superintelligence is Oracle AI, that is, an AI system
that only answers questions. In other words,
an Oracle AI does not directly influence the
world in any capacity except via the user of the
system. Because an Oracle AI cannot directly
take physical action except by answering questions posed by the system’s operator, some have
argued that it may provide a way to bypass the
immediate need for solving the “value alignment
problem” and would itself be a powerful resource
in enabling the safe design of autonomous,
deliberative superintelligent agents [1, 6–9].
A weaker notion of the term oracle, what we
call a domain-specific oracle, refers to a modular component of a larger AI system that is
queried for domain-specific tasks. In this article,
we view computer algebra systems as primitive
domain-specific oracles for mathematical computation which are likely to become quite powerful
on the time horizons on which many expect superintelligent AI systems to be developed [10,11].
Under the assumption that math oracles prove to
be useful in the long-term development of AI systems, addressing well-defined architectural problems with CASs and their integration with interactive theorem provers provides a concrete set of
research problems that align with long-term issues in AI safety. In addition, such systems may
also be useful in proving the functional correctness of other aspects of an AI architecture. In
Section 2, we briefly discuss the unique challenges
in allocating resources for AI safety research. In
Section 3, we briefly summarize the motivation
for developing oracles in the context of AI safety
and give an overview of safety risks and control
strategies which have been identified for superintelligent oracle AIs. In Section 4 we analyze contemporary question answering systems and argue
Sarma and Hay
that in contrast to computer algebra systems, current consumer-oriented, NLP-based systems are
poor candidates for rigorous analysis as oracles.
In Section 5, we review the differences between
theorem provers and computer algebra systems,
efforts at integrating the two, and known architectural problems with CASs. We close with a list
of additional research projects related to mathematical computation which may be of interest to
scientists conducting research in AI safety.
2
Metascience of AI Safety
Research
From a resource allocation standpoint, AI safety
poses a unique set of challenges. Few areas of
academic research operate on such long and
potentially uncertain time horizons. This is not
to say that academia does not engage in longterm research. Research in quantum gravity, for
example, is approaching nearly a century’s worth
of effort in theoretical physics [12]. However, the
key difference between open-ended, fundamental
research in the sciences or humanities and AI
safety is the possibility of negative consequences,
indeed significant ones, of key technological
breakthroughs taking place without corresponding advances in frameworks for safety [1, 13] .
These issues have been controversial, largely
due to disagreement over the time-horizons for
achieving human-level AI and the subsequent
consequences [10, 11]. Specifically, the notion of
an “intelligence explosion,” whereby the intelligence of software systems dramatically increases
due their capacity to model and re-write their
own source code, has yet to receive adequate
scientific scrutiny and analysis [14].
We affirm the importance of AI safety research
and also agree with those who have cautioned
against proceeding down speculative lines of
thinking that lack precision. Our perspective
in this article is that it is possible to fruitfully
discuss long-term issues related to AI safety while
maintaining a connection to practical research
problems. To some extent, our goal is similar
in spirit to the widely discussed manuscript
“Concrete Problems in AI Safety” [15]. However,
we aim to be a bit more bold. While the authors
3
Robust Computer Algebra, Theorem Proving, and Oracle AI
of “Concrete Problems” state at the outset that
their analysis will set aside questions related to
superintelligence, our goal is to explicitly tackle
superintelligence related safety concerns. We
believe that there are areas of contemporary research that overlap with novel ideas and concepts
that have arisen among researchers who have
purely focused on analyzing the consequences of
AI systems whose capacities vastly exceed those
of human beings.
To be clear, we do not claim that the strategy
of searching for pre-existing research objectives
that align with the aims of superintelligence
theory is sufficient to cover the full spectrum of
issues identified by AI safety researchers. There
is no doubt that the prospect of superintelligence
raises entirely new issues that have no context
in contemporary research. However, considering
how young the field is, we believe that the perspective adopted in this article is a down-to-earth
and moderate stance to take while the field is
in a critical growth phase and a new culture is
being created.
This article focuses on one area of the AI safety
landscape, Oracle AI. We identify a set of concrete
software projects that relate to more abstract,
conceptual ideas from AI safety, to bridge the gap
between practical contemporary challenges and
longer term concerns which are of an uncertain
time horizon. In addition to providing concrete
problems for researchers and engineers to tackle,
we hope this discussion will be a useful introduction to the concept of Oracle AI for newcomers to
the subject. We state at the outset that within
the context of Oracle AI, our analysis is limited
in scope to systems which perform mathematical computation, and not to oracles in general.
Nonetheless, considering how little effort has been
directed at the superintelligence control problem,
we are confident that there is low-hanging fruit
in addressing these more general issues which are
awaiting discovery.
3
Brief Overview of Oracle AI
As described above, an Oracle AI is a system
which only answers questions. Although the term
has traditionally been used to denote fully general
AI systems, we can also imagine oracles whose
capabilities are more limited. The latter systems
are what we refer to as domain-specific oracles.
AI safety researchers have argued that superintelligent oracles have the potential to help address
safety concerns of autonomous, deliberative superintelligent AI systems, as an Oracle AI’s only
ability to influence the world is through the user
of the system. Consequently, an Oracle AI itself
may be in a position to assist researchers in solving difficult technical and conceptual problems related to the design of independent, deliberative
agents. Yet superintelligent oracle AIs pose their
own distinct set of safety concerns. The problems
identified in [6], for example, presume a superintelligent AI system, which while limited in its
ability to interact with the world, may nonetheless have the potential to negatively impact the
world by manipulating the user of the system. As
Armstrong, Bostrom, and Sandberg write:
We are all vulnerable to the OAI’s social engineering. An advanced OAI can literally
offer us the world. Genuine altruism is no
defence against this; it can offer a world free
of poverty, hunger, war, disease or death, as
well as all personal trinkets we could want.
It could guess the weaknesses of each individual, and find the right arguments to convince us that granting it power or liberty
is the moral and profitable thing to do. It
will be able to play on rivalries, institutional
weaknesses and ethical dilemmas with more
virtuosity than any human could. [6]
Given the potential dangers of human manipulation by an OAI, researchers have searched for
control strategies to mitigate such risks. A few
examples of control methods that have been proposed are:
• Physical security- physically containing
the OAI system
• Limiting or eliminating external manipulators- like the previous security measure, precluding the OAI from physically manipulating the world in any direct manner
• Epistemic capability control- the OAIs
output could be restricted even further beyond question answering, for example, restricting it to answer “yes / no ” questions
4
Sarma and Hay
• Virtual worlds- the OAI could be run in
a simulated world so that even if the system’s capabilities were expanded, its behavior could be observed and modeled.
• Resetting the OAI after each questionthis would prevent the OAI from engaging in
long-term social engineering by manipulating
the answers to the users’ questions
Although the capacities of domain-specific oracles are more limited, they can nonetheless pose
safety risks. Architectural deficiencies in such
oracles might be exploited by a larger AI system
to manipulate the human user. It could give
answers which are difficult to verify and which
allow the OAI to execute complex and intricate
plans unbeknownst to the user. Therefore, while
flaws in domain-specific oracles are not inherently
risky if used solely in their domain of applicability, they may very well be dangerous as part of
a larger system with more general capabilities.
Though not a “control strategy” in the narrowest
sense, creating “robust” domain-specific oracles
is an important objective in designing safe
OAIs. Furthermore, ensuring the robustness of
domain-specific subsystems might mitigate the
need for stronger control strategies, as the OAI
would have fewer weaknesses to exploit.
It should go without saying that the arguments
presented above are highly schematic and do not
dependent on specific technologies. To our knowledge, there is very limited work on translating
analyses of superintelligent oracle AIs into the
concrete language of modern artificial intelligence
[8, 9, 16]. Our goal in this manuscript is in this
spirit, that is, to anchor schematic, philosophical
arguments in practical, contemporary research.
To do so, we will narrow our focus to the mathematical domain. In the remainder of the article,
we will use the term oracle in the more limited
sense of a domain-specific subsystem, and in particular, oracles for performing mathematical computations. We hope that the analysis presented
here will be of intrinsic value in developing robust
math oracles, as well as provide some intuition
and context for identifying concrete problems relevant to developing safe, superintelligent oracle
AI systems.
4
Are there contemporary
systems which qualify as
oracles?
The obvious class of contemporary systems which
would seem to qualify as oracles are question
answering systems (QASs). As we stated above, a
basic criterion characterizing oracles is that their
fundamental mode of interaction is answering
questions posed by a user, or for domain-specific
queries as part of a larger AI system.
Contemporary QASs are largely aimed at using
natural language processing techniques to answer
questions pertaining to useful facts about the
world such as places, movies, historical figures,
and so on. An important point to make about
QASs is the highly variable nature of the underlying technology. For instance, IBM’s original
Watson system which competed in Jeopardy, was
developed prior to the recent advances in deep
learning which have fundamentally transformed
areas ranging from computer vision, to speech
recognition, to natural language processing [17].
In this particular task, the system was nonetheless able to perform at a level beyond that of
the most accomplished human participants. The
introduction of “info panes” into popular search
engines, on the other hand, have been based
on more recent machine learning technology,
and indeed, these advances are also what power
the latest iterations of the Watson system [18].
On the other end of the spectrum is Wolfram |
Alpha, which is also a question answering system,
but which is architecturally centered around a
large, curated repository of structured data,
rather than datasets of unstructured natural
language [19].
While these systems are currently useful for
humans in navigating the world, planning social
outings, and arriving at quick and useful answers
to ordinary questions, it is not clear that they will
remain useful in quite the same capacity many
years from now, or as standalone components
of superintelligent AI systems. Although the
underlying techniques of deep learning or NLP
are of fundamental interest in their own right,
the fact that these systems are QASs at all seems
to be more of an artifact of their utility for
Robust Computer Algebra, Theorem Proving, and Oracle AI
consumers.
Another important observation about contemporary QASs is that much of their underlying
NLP-based architecture can be replaced by taking advantage of structured data, as the example of Wolfram — Alpha demonstrates. For the
other NLP or machine learning based systems,
the underlying technology can be used as part of
larger, semi-automated pipelines to turn unstructured data from textual sources into structured
data. Once again, this fact simply underscores
that contemporary QASs are not particularly appealing model systems to analyze from the Oracle
AI safety perspective.1
4.1
Computer Algebra and
Domain-Specific Oracles for
Mathematical Computation
The question answering systems described above
all rely on natural language processing to varying
degrees. In addition, their domain of applicability has tended towards “ordinary” day-to-day
knowledge useful to a wide array of consumers.
Another type of question answering system is
a computer algebra system (CAS). Computer
algebra has traditionally referred to systems for
computing specific results to specific mathematical equations, for example, computing derivatives
and integrals, group theoretic quantities, etc. In
a sense, we can think of computer algebra as a
1
We emphasize that our argument that contemporary
QASs are not good candidates for analysis as Oracle AIs
is not an argument against the traditional formulation of
Oracle AI as a tool for AI safety. We fully expect significant breakthroughs to be made in advancing the theory
and practice of oracle-based techniques for AI safety and
we hope that this manuscript will provide some motivation
to pursue such research. Rather, our point is that when
viewing contemporary systems from the lens of superintelligence, there seems little reason to believe that current
NLP-based QASs will remain sufficiently architecturally
stable to be used as standalone components in AI systems
many years from now. On the other hand, there are certainly important present-day problems to examine when
evaluating the broader impact of QASs, such as bias in
NLP systems, overgeneralization, and privacy, to name just
a few. Some of these issues overlap with the set of problems identified in [15] as examples of concrete problems in
AI safety. In addition, we are beginning to see conferences
devoted to contemporary ethical issues raised by machine
learning. See, for example, the workshop Ethics in Natural
Language Processing.
5
set of algorithms for performing what an applied
mathematician or theoretical physicist might
work out on paper and pencil. Indeed, some of
the early work in computer algebra came from
quantum field theory—one of the first computer
algebra systems was Veltman’s Schoonschip for
performing field theoretic computations that led
to the theory of electroweak unification [20].
As computer algebra systems have grown in
popularity, their functionality has expanded
substantially to cover a wide range of standard
computations in mathematics and theoretical
physics, including differentiation, integration,
matrix operations, manipulation of symbolic
expressions, symbolic substitution, algebraic
equation solving, limit computation, and many
others. Computer algebra systems typically run
in a read, evaluate, print loop (repl), and
in the research and education context, their popularity has also grown as a result of the notebook
model pioneered by the Mathematica system,
allowing for computations in CASs to closely
mimic the sequential, paper and pencil work of
mathematicians and theoretical physicists.
In assessing the long-term utility of CASs, it
is important to note that there is little reason to
believe that computer algebra will be subsumed
by other branches of AI research such as machine
learning. Indeed, recent research has demonstrated applications of machine learning to both
computer algebra and theorem proving (which we
discuss in more detail below), via algorithm selection in the former case [21] and proof assistance
in the latter [22, 23]. While certainly not as visible as machine learning, computer algebra and
theorem proving are very much active and deep
areas of research which are also likely to profit
from advances in other fields of artificial intelligence, as opposed to being replaced by them [24].
On the time horizons on which we are likely to
see human-level artificial intelligence and beyond,
we can expect that these systems will become
quite powerful, and possess capabilities that may
be useful in the construction of more general AI
systems. Therefore, it is worth examining such
systems from the perspective of AI safety.
6
4.2
Sarma and Hay
Briefly Clarifying Nomenclature
Before proceeding, we want to explicitly describe
issues relating to nomenclature that have arisen
in the discussion thus far, and state our choices
for terminology. Given that the phrase “Oracle
AI” has become common usage in the AI safety
community, we will continue to use this phrase,
with the first word capitalized, as well as the
acronym OAI. Where clarification is needed, we
may also use the full phrase “superintelligent
oracle AI,” without capitalization.
For more modest use cases of the word oracle,
we will either refer to “domain-specific oracles,”
or state the domain of knowledge where the oracle is applicable. We can, at the very least in
the abstract, consider extending this terminology
to other domains such as “physics oracles,” “cell
biology oracles,” or “ethics oracles” and so on.
Therefore, the remainder of the article will be
concerned with safety and robustness issues in the
design of “math oracles.”
5
Robust Computer Algebra
and Integrated Theorem
Proving
Today we should consider as a standard feature much closer interaction between proof
assistance and computer algebra software.
Several areas can benefit from this, including specification of interfaces among components, certification of results and domains
of applicability, justification of optimizations
and, in the other direction, use of efficient
algebra in proofs.
- Stephen Watt in On the future
of computer algebra systems at the
threshold of 2010
As we described above, computer algebra
systems can be thought of as question answering
systems for a subset of mathematics. A related
set of systems are interactive proof assistants
or interactive theorem provers (ITPs). While
ITPs are also systems for computer-assisted
mathematics, it is for a different mathematical
context, for computations in which one wishes to
construct a proof of a general kind of statement.
In other words, rather than computing specific
answers to specific questions, ITPs are used to
show that candidate mathematical structures (or
software systems) possess certain properties.
In a sense, the distinction between theorem
proving and computer algebra should be viewed
as a historical anomaly. From the perspective
of philosophical and logical efforts in the early
20th century that led to the “mechanization of
mathematics” the distinction between computing
the nth Laguerre polynomial and constructing
a proof by induction might have been viewed
as rather artificial, although with the benefit of
hindsight we can see that the two types of tasks
are quite different in practice [25].
The role of ITPs in the research world is very
different from that of CASs. Whereas CASs allow
researchers to perform difficult computations
that would be impossible with paper and pencil,
constructing proofs using ITPs is often more
difficult than even the most rigorous methods of
pure mathematics. In broad terms, the overhead
of using ITPs to formalize theorems arises from
the fact that proofs in these systems must
proceed strictly from a set of formalized axioms
so that the system can verify each computation.
Consequently, ITPs (and related systems, such as
automatic theorem provers) are largely used for
verifying properties of mission-critical software
systems which require a high-degree of assurance,
or for hardware verification, where mistakes can
lead to costly recalls [26–30].
As the quotation above suggests, many
academic researchers view the integration of
interactive proof assistants and computer algebra
systems as desirable, and there have been numerous efforts over the years at exploring possible
avenues for achieving this objective [31–34] (a
more complete list is given below). By integrating theorem proving with computer algebra,
we would be opening up a wealth of potentially
interoperable algorithms that have to date
remained largely unintegrated. To cite one such
example, in [35], the authors have developed a
framework for exchange of information between
the Maple computer algebra system and the
Isabelle interactive theorem prover. They show
Robust Computer Algebra, Theorem Proving, and Oracle AI
a simple problem involving the proof of an
elementary polynomial identity that could be
solved with the combined system, but in neither
system alone (see Fig. 1).
We cite this example to demonstrate how
a simply stated elementary problem cannot
be solved in existing environments for either
computer algebra or proof assistance. The computer algebra system does not have the capacity
for structural induction and theorem provers
generally have rather weak expression simplifiers.
There are numerous examples such as this one in
the academic literature.
Another key difference between CASs and ITPs
is the architectural soundness of the respective
systems. As we will discuss below, computer algebra systems have well-defined architectural deficiencies, which while not a practical issue for
the vast majority of use cases, pose problems for
their integration with theorem provers, which by
their nature, are designed to be architecturally
sound. In the context of superintelligent AI systems, the architectural problems of CASs are potential points of weakness that could be exploited
for malicious purposes or simply lead to unintended and detrimental consequences. Therefore,
we use the phrase “robust computer algebra” to
refer to CASs which lack the problems that have
been identified in the research literature. In the
section below, we combine the discussion of robust computer algebra and integration with interactive theorem provers, as there is a spectrum
of approaches which address both of these issues
to varying degrees.
5.1
A Taxonomy of Approaches
There are many possible avenues to tackle the integration of theorem provers with computer algebra systems. We give 4 broad categories characterizing such integration efforts2 :
1. Theorem provers built on top of computer algebra systems: These include Analytica, Theorema, RedLog, and logical extensions to the Axiom system [34, 36–39] .
2
This classification was first described by Kaliszyk and
Wiedijk [32] in a paper arguing for an architecture which
we list as the fourth category given above.
7
2. Frameworks for mathematical exchange between the two systems:
This category includes MathML, OpenMath, OMSCS, MathScheme, and Logic
Broker [40–44].
3. “Bridges” or “ad-hoc” information exchange solutions: The pairs of systems
in this category include bridges combining
PVS, HOL, or Isabelle with Maple, NuPRL
with Weyl, Omega with Maple/GAP, Isabelle with Summit, and most recently, Lean
with Mathematica [35, 45–51]. The example
given above, bridging Isabelle and Maple, is
an example of an approach from this category.
4. Embedding a computer algebra system
inside a proof assistant: This is the approach taken by Kaliszyk and Wiedijk in the
HOLCAS system. In their system, all expressions have precise semantics, and the proof
assistant proves the correctness of each simplification made by the computer algebra system [32].
One primary aspect of integration that differentiates these approaches is the degree of trust
the theorem prover places in the computer algebra system. Computer algebra systems give
the false impression of being monolithic systems
with globally well-defined semantics. In reality,
they are large collections of algorithms which are
neatly packaged into a unified interface. Consequently, there are often corner cases where the
lack of precise semantics can lead to erroneous
solutions. Consider the following example:
The system incorrectly gives 1 as a solution,
even though the given polynomial has an indeterminate value for x = 1. However, because the
expression is treated as a fraction of polynomials,
it is first simplified before the solve operation
is applied. In other words, there is an unclear
semantics between the solver module and the
simplifier which leads to an incorrect result.
Another simple example is the following integral:
Making the substitution n = −1 gives an indeterminate result, while it is clear by inspection
that the solution to the integral for n = −1 is
simply ln(x). This belongs to a class of problems
2
3
4
INDUCT
8
Sarma and Hay
1
1 : T H ` I n5 5 n
2 : T H `I 5 5 5 5
3 : T H `I n 5
4 : T H `I 8x : [x 2 N ^ 5 x ^ x5 5x ] =) (x + 1)5 5(x+1)
5 : x 2 N `M (x + 1)5 ⌘ x5 + 5x4 + 10x3 + 10x2 + 5x + 1
6 : T H `I 8x : [x 2 N ^ 5 x ^ x5 5x ] =)
x5 + 5x4 + 10x3 + 10x2 + 5x + 1 5(x+1)
7 : x 2 N `M 5(x+1) ⌘ 5 ⇤ 5x
8 : T H `I 8x : [x 2 N ^ 5 x ^ x5 5x ] =)
x5 + 5x4 + 10x3 + 10x2 + 5x + 1 5 ⇤ 5x
Circles represent object nodes, whose labels are reported in the table; rectangles
Figure 1: Example of a polynomial identity proven by integrating the Maple computer algebra system
represent link nodes, and contain their labels. The complex series of steps corwith Isabelle. Maple’s simplifier is used for expanding polynomials—a powerful complement to the
responding
the final ofphase
ofwhich
the proof
arethe
folded
triangular REST
theorem
provingtoarchitecture
Isabelle
allows for
setup within
of a proofthe
by induction.
node. Link nodes labelled with SIMPLIFY identify the points where the systems
cooperate to the solution of the problem; namely, where Maple is invoked to exAI safety,
decision-theoretic
research
pand some polynomial power. Note that the
RESTconsider
folded the
node
hides away several
agenda
for
the
development
of
safe,
superintelliadditional Maple calls, meant to perform evaluations of disequalitites.
Figure 2: Example of an incorrect solution to a
simple polynomial equation by a computer algebra system.
gent AI systems outlined in [52–56]. If we require
formal guarantees of correctness at any point in a
sequence of computations in which computer algebra is used, current systems would be unable to
provide the necessary framework for constructing
such a proof.
5.1.1
Figure 3: A problem arising in symbolic integration due to the non-commutativity of evaluation
and substitution.
known as the specialization problem, namely that
expression evaluation and variable substitution do
not commute [31]. So while we have seen above
that theorem proving can benefit tremendously
from the wealth of algorithms for expression simplification and mathematical knowledge in computer algebra, there is the potential cost of compromising the reliability of the combined system.
As a possible application to current research in
Qualitatively Certified
Computations
In our taxonomy of approaches to bridging
theorem provers with computer algebra, we
described how a key distinction was the degree of
trust that the theorem prover places in the computer algebra system. For instance, approaches
which build theorem provers on top of computer
algebra systems do not address the architectural
issues with CASs. They are integrative, but not
more sound. On the other extreme, building a
computer algebra system on top of a theorem
prover allows for a degree of trust that is on par
with that of the theorem prover itself. However,
this approach has the distinct disadvantage
that computer algebra systems represent many
hundred man-years worth of effort.
The more intermediate approaches involving
common languages for symbolic exchange or adhoc bridges, bring to light an important notion
in the spectrum of provable safety, namely the
9
Robust Computer Algebra, Theorem Proving, and Oracle AI
ability to assign probabilities for the correctness
of computations. In [57], the authors present an
algorithm for assigning probabilities to any statement in a formal language. We might ask what
strategies might look like that have a similar goal
in mind, but are significantly weaker. Interfaces
between theorem provers and computer algebra
systems provide a concrete example where we
can ask a question along these lines. Fundamentally, in such an interface, the computer algebra
system is the weaker link and should decrease
our confidence in the final result. But by how
much? For instance, in the example given in
Figure 1, how should we revise our confidence in
the result knowing that polynomial simplification
was conducted within a computer algebra system?
It is worth asking for simple answers to this
question that do not require major theoretical
advances to be made. For instance, we might
imagine curating information from computer
algebra experts about known weaknesses, and
use this information to simply give a qualitative
degree of confidence in a given result. Or, for
example, in a repository of formal proofs generated using integrated systems, steps of the proof
that require computer algebra can be flagged and
also assigned a qualitative measure of uncertainty.
The relationship that this highly informal
method of giving qualitative certification to
computations has with the formal algorithm
developed in [57] can be compared to existing
techniques in the software industry for ensuring
correctness. On the one hand, unit testing is a
theoretically trivial, yet quite powerful practice,
something along the lines of automated checklists for software. The complexities of modern
software would be impossible to handle without
extensive software testing frameworks [58–62].
On the other hand, formal verification can
provide substantially stronger guarantees, yet
is a major undertaking, and the correctness
proofs are often significantly more demanding to
construct than the software itself. Consequently,
as discussed in Section 5, formal verification is
much less frequently used in industry, typically
only in exceptional circumstances where high
guarantees of correctness are required, or for
hardware verification [26–30].
Integrated systems for computer algebra and
theorem proving give rise to a quite interesting
(and perhaps ironic) opportunity to pursue simple
strategies for giving qualitative estimates for the
correctness of a computation.
5.1.2
Logical Failures and Error
Propagation
As the examples described above demonstrate,
errors in initial calculations may very well propagate and give rise to non-sensical results. As
AI systems capable of performing mathematical
computation become increasingly sophisticated
and embedded as part of design workflows for
science and engineering (beyond what we see
today), we could imagine such errors being quite
costly and difficult to debug. In the case of
a superintelligent AI system, more concerning
scenarios would be if systematic errors in computer algebra could be exploited for adversarial
purposes or if they led to unintentional accidents
on a large scale.
The issue of error propagation is another example of a concrete context for pursuing simple strategies for assigning qualitative measures
of certainty to computations performed by integrated theorem proving / computer algebra systems. For instance, we may be less inclined to
trust a result in which the computer algebra system was invoked early on in a computation as
opposed to later. With curated data from computer algebra experts on the reliability or failure modes of various algorithms, we might also
chain together these informal estimates to arrive
at a single global qualitative estimate. If multiple systems were to be developed independently,
or which were based on fundamentally different
architectures, we might also be significantly more
confident in a result which could be verified by
two separate systems.
5.1.3
Additional Topics
Some related ideas merit investigation in the
broader context of mathematical computation:
• Integrating SMT solvers with interactive theorem provers: Satisfiability
10
Sarma and Hay
modulo theories (SMT) solvers are an important element of automated reasoning and
there have been efforts analogous to those
described above to bridge SMT solvers with
interactive theorem provers [63, 64].
• Identifying the most important /
widely used algorithms in computer
algebra: Computer algebra systems have
grown to become massive collections of
algorithms extending into domains well
outside of the realm of mathematics. If
the purely mathematical capacities of CASs
prove to be useful in future AI systems, it
would be valuable to rank order algorithms
by their popularity or importance.
One approach would be to do basic textual
analysis of the source code from GitHub or
StackExchange. This would also allow for
more targeted efforts to directly address the
issues with soundness in core algorithms
such as expression simplification or integration. In the context of the HOLCAS system
described above, for example, it would be
valuable to have rough estimates for the
number of man-hours required to implement
a minimal CAS with the most widely used
functionality on top of a theorem prover.
• Proof checkers for integrated systems:
Proof checkers are important tools in the
landscape of formal verification and theorem
proving. Indeed, as it is often much less
computationally expensive to verify the correctness of a proof than to generate it from
scratch, the availability of proof checkers for
the widely used interactive theorem provers
is one reason we can be confident in the
correctness of formal proofs [65, 66].
As we described above, strategies for integrating computer algebra with theorem
provers can potentially result in a combined
system which is less trustworthy than
the theorem prover alone. Therefore, the
availability of proof checkers for combined
systems would be a valuable resource in
verifying proof correctness, and in certain
mathematical domains, potentially provide
an avenue for surmounting the need to
directly make the CAS itself more architecturally robust.
The development of integrated proof checkers
is likely to be a substantial undertaking and
require novel architectures for integrating
the core CAS and ITP systems distinct from
what has been described above. However,
it is a largely unexplored topic that merits
further investigation.
• Analyzing scaling properties of algorithms for computer algebra and
theorem proving as a function of
hardware resources: The premise of the
analysis presented above is that CASs (and
integrated theorem proving) are likely to
remain sufficiently architecturally stable
and useful on a several decade time-horizon
in the construction of AI systems. On
the other hand, as we argued earlier, it is
much less clear that the same will be true
of the most visible, NLP-based, consumeroriented question answering systems. To
make these arguments more rigorous, it
would be valuable to develop quantitative
predictions of what the capabilities will be
of existing algorithms for computer algebra
and theorem proving when provided with
substantially expanded hardware resources.
For instance, we might examine problems in
mathematics or theoretical physics for which
naı̈ve solutions in CASs are intractable with
current resources, but which may be feasible
with future hardware.
• The cognitive science of computer
algebra: What role has computer algebra
played in theoretical physics and mathematics? How has it influenced the thinking
process of researchers?
Has computer
algebra simply been a convenience that has
shifted the way problems are solved, or has
it fundamentally enabled new problems to
be solved that would have been completely
intractable otherwise?
Robust Computer Algebra, Theorem Proving, and Oracle AI
The cognitive science of mathematical
thought is a substantial topic which overlaps
with many established areas of research [67–
71]. However, a systematic review of research
in mathematics and theoretical physics since
the advent of computer algebra and its role
in the mathematical thought process is an
underexplored topic. It would be an interesting avenue to pursue in understanding the
role that CASs, ITPs, and integrated systems
may come to play in superintelligence, particularly in the case of neuromorphic systems
that have been modeled after human cognition. These questions also relate to understanding the scaling properties of CAS and
theorem proving algorithms as well as cataloguing the most widely used algorithms in
computer algebra.
6
Conclusion
The aim of this article has been to examine preexisting research objectives in computer science
and related disciplines which align with problems
relevant to AI safety, thereby providing concrete,
practical context for problems which are otherwise of a longer time horizon than most research.
In particular, we focused on the notion of “Oracle
AI” as used in the AI safety community, and
observed that the word oracle has two meanings
in the context of superintelligent AI systems.
One usage refers to a subsystem of a larger AI
system queried for domain-specific tasks, and the
other to superintelligent AI systems restricted to
only answer questions.
We examined contemporary question answering systems (QASs) and argued that due to their
architectural heterogeneity, consumer-oriented,
NLP-based systems do not readily lend themselves to rigorous analysis from an AI safety
perspective. On the other hand, we identified
computer algebra systems (CASs) as concrete, if
primitive, examples of domain-specific oracles.
We examined well-known architectural deficiencies with CASs identified by the theorem proving
community and argued that the integration of
interactive theorem provers (ITPs) with CASs,
an objective that has been an area of research in
the respective communities for several decades,
11
provides a set of research problems and practical
software projects related to the development of
powerful and robust math oracles on a multidecade time horizon. Independent of their role as
domain-specific oracles, such systems may also
prove to be useful tools for AI safety researchers
in proving the functional correctness of other
components of an AI architecture.
Natural
choices of systems to use would be interfaces
for the Wolfram Language, the most widely
used computer algebra system, with one of the
HOL family of theorem provers or Coq, both of
which have substantial repositories of formalized
proofs [72–75], or a more modern ITP such as
Lean [51, 76].
Rather than representing a bold and profound
new agenda, we view these projects as being
concrete and achievable goals that may pave
the way to more substantial research directions.
Because the topics we have discussed have a
long and rich academic history, there are a
number of “shovel-ready” projects appropriate
for students anywhere from undergraduates to
PhD students and beyond. Good undergraduate
research projects would probably start with some
basic data science to catalogue core computer
algebra algorithms by their usage and popularity.
From there, it would be useful to have an
estimate of what certified implementations of
these algorithms would entail, whether formally
verified implementations, or along the lines of
Kaliszyk and Wiedijk’s HOLCAS system where
the CAS is built on top of a theorem prover.
Also useful would be a systematic study of role
that computer algebra has played in mathematics
and theoretical physics. This would have some
interesting overlap with cognitive psychology, and
these three projects together would make for an
approachable undergraduate thesis, or a beginning project for a graduate student. A solid PhD
thesis devoted to the topic of Oracle AI might
involve tackling approaches to oracles stemming
from reinforcement learning (RL) [8, 16], as
well as more advanced theorem proving and
CAS related topics such as investigating the
development of a hybrid architecture that would
allow for proof-checking. A student who worked
on these projects for several years would develop
a unique skill set spanning philosophy, machine
12
learning, theorem proving, and computer algebra.
In the context of superintelligent oracle AIs
which may possess the ability to manipulate a
human user, we differentiate between addressing
architectural or algorithmic deficiencies in subsystems versus general control methods or containment strategies. Given that strong mathematical
capabilities are likely to be useful in the construction of more general AI systems, designing robust
CASs (and any other domain-specific oracle) is an
important counterpart to general control strategies, as the top-level AI system will have fewer
loopholes to exploit. Controlling OAIs poses
a distinct set of challenges for which concrete
mathematical analysis is in its infancy [8, 9, 16].
Nonetheless, considering how little attention has
been given to the superintelligence control problem in general, we are optimistic about the potential to translate the high-level analyses of OAIs
that have arisen in the AI safety community
into the mathematical and software frameworks
of modern artificial intelligence.
Acknowledgements
We would like to thank Stuart Armstrong,
David Kristoffersson, Marcello Herreshoff, Miles
Brundage, Eric Drexler, Cristian Calude, and several anonymous reviewers for insightful discussions and feedback on the manuscript. We would
also like to thank the guest editors of Informatica,
Ryan Carey, Matthijs Maas, Nell Watson, and
Roman Yampolskiy, for organizing this special issue.
References
[1] N. Bostrom, Superintelligence: Paths, Dangers, Strategies. Oxford University Press,
2014.
[2] M. Shanahan, The Technological Singularity.
MIT Press, 2015.
Sarma and Hay
Artificial Intelligence (Future of Life Institute),” 2015.
[5] S. Russell, D. Dewey, and M. Tegmark, “Research Priorities for Robust and Beneficial
Artificial Intelligence,” AI Magazine, vol. 36,
no. 4, pp. 105–114, 2015.
[6] S. Armstrong, A. Sandberg, and N. Bostrom,
“Thinking inside the box: Controlling and
Using an Oracle AI,” Minds and Machines,
vol. 22, no. 4, pp. 299–324, 2012.
[7] B. Fallenstein, J. Taylor, and P. F. Christiano, “Reflective oracles: A foundation for
game theory in artificial intelligence,” in
Logic, Rationality, and Interaction, pp. 411–
415, Springer, 2015.
[8] S. Armstrong, “Value and policy networks as
Oracle AIs.” in preparation, 2017.
[9] S. Armstrong, “Good and safe uses of AI Oracles,” ArXiv e-prints, Nov. 2017.
[10] V. C. Müller and N. Bostrom, “Future
Progress in Artificial Intelligence: A survey
of expert opinion,” in Fundamental Issues of
Artificial Intelligence, pp. 553–570, Springer,
2016.
[11] K. Grace, J. Salvatier, A. Dafoe, B. Zhang,
and O. Evans, “When Will AI Exceed Human Performance? Evidence from AI Experts,” ArXiv e-prints, May 2017.
[12] C. Rovelli, “Quantum gravity,” Scholarpedia,
vol. 3, no. 5, p. 7117, 2008.
[13] S. Russell, “Should We Fear Supersmart
Robots?,” Scientific American, vol. 314,
no. 6, pp. 58–59, 2016.
[14] A. H. Eden, J. H. Moor, J. H. Soraker,
and E. Steinhart, Singularity Hypotheses:
A Scientific and Philosophical Assessment.
Springer Verlag, 2012.
[3] D. Chalmers, “The Singularity: A Philosophical Analysis,” Journal of Consciousness
Studies, vol. 17, no. 9-10, pp. 7–65, 2010.
[15] D. Amodei, C. Olah, J. Steinhardt, P. Christiano, J. Schulman, and D. Mané, “Concrete
Problems in AI Safety,” ArXiv e-prints, June
2016.
[4] M. Tegmark et al., “An Open Letter: Research Priorities for Robust and Beneficial
[16] S. M. Armstrong and L. Orseau, “Safely Interruptible Agents.” submitted, 2016.
Robust Computer Algebra, Theorem Proving, and Oracle AI
[17] D. Ferrucci, E. Brown, J. Chu-Carroll,
J. Fan, D. Gondek, A. A. Kalyanpur,
A. Lally, J. W. Murdock, E. Nyberg,
J. Prager, et al., “Building Watson: An
overview of the DeepQA project,” AI magazine, vol. 31, no. 3, pp. 59–79, 2010.
[18] W. Knight, “IBM Pushes Deep Learning
with a Watson Upgrade,” MIT Technology
Review, 7 2015.
[19] S. Wolfram, “Jeopardy, IBM, and Wolfram
— Alpha,” Stephen Wolfram — Blog, 1 2011.
13
Conference on Computer Aided Verification,
pp. 414–429, Springer, 2009.
[28] L. Fix, “Fifteen years of formal property verification in Intel,” in 25 Years of Model Checking, pp. 139–144, Springer, 2008.
[29] C. Kern and M. R. Greenstreet, “Formal verification in hardware design: a survey,” ACM
Transactions on Design Automation of Electronic Systems, vol. 4, no. 2, pp. 123–193,
1999.
[20] S. Weinzierl, “Computer Algebra in Particle
Physics,” ArXiv High Energy Physics - Phenomenology e-prints, Sept. 2002.
[30] T. Kropf, Introduction to Formal Hardware
Verification. Springer Science & Business
Media, 2013.
[21] Z. Huang, “Machine Learning and Computer
Algebra,” tech. rep., University of Cambridge, Computer Laboratory, 2016.
[31] C. Ballarin, Computer Algebra and Theorem
Proving. PhD thesis, University of Cambridge, Computer Laboratory, 1999.
[22] G. Irving, C. Szegedy, A. A. Alemi, F. Chollet, and J. Urban, “DeepMath—Deep Sequence Models for Premise Selection,” in
Advances in Neural Information Processing
Systems, pp. 2235–2243, 2016.
[32] C. Kaliszyk and F. Wiedijk, “Certified computer algebra on top of an interactive theorem prover,” in Towards Mechanized Mathematical Assistants, pp. 94–105, Springer,
2007.
[23] E. Komendantskaya, J. Heras, and G. Grov,
“Machine Learning in Proof General: Interfacing Interfaces,” ArXiv e-prints, Dec. 2012.
[33] S. M. Watt, “On the future of Computer Algebra Systems at the Threshold of 2010,”
Proceedings ASCM-MACIS, pp. 422–430,
2009.
[24] A. Bundy, D. Hutter, C. B. Jones, and J. S.
Moore, “AI meets Formal Software Development (Dagstuhl Seminar 12271),” Dagstuhl
Reports, vol. 2, no. 7, pp. 1–29, 2012.
[25] M. J. Beeson, “The Mechanization of Mathematics,” in Alan Turing: Life and Legacy of
a Great Thinker, pp. 77–134, Springer, 2004.
[26] G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe,
K. Engelhardt, R. Kolanski, M. Norrish,
et al., “seL4: Formal verification of an
OS kernel,” in Proceedings of the ACM
SIGOPS 22nd Symposium on Operating Systems Principles, pp. 207–220, ACM, 2009.
[27] R. Kaivola, R. Ghughal, N. Narasimhan,
A. Telfer, J. Whittemore, S. Pandav, A. Slobodová, C. Taylor, V. Frolov, E. Reeber,
et al., “Replacing Testing with Formal Verification in Intel CoreTM i7 Processor Execution Engine Validation,” in International
[34] W. Windsteiger, “Theorema 2.0: a system
for mathematical theory exploration,” in International Congress on Mathematical Software, pp. 49–52, Springer, 2014.
[35] P. G. Bertoli, J. Calmet, F. Giunchiglia, and
K. Homann, “Specification and integration of
theorem provers and computer algebra systems,” in International Conference on Artificial Intelligence and Symbolic Computation,
pp. 94–106, Springer, 1998.
[36] E. Clarke and X. Zhao, “Analytica—A theorem prover in Mathematica,” in International Conference on Automated Deduction,
pp. 761–765, Springer, 1992.
[37] A. Dolzmann and T. Sturm, “Redlog: Computer algebra meets computer logic,” ACM
SIGSAM Bulletin, vol. 31, no. 2, pp. 2–9,
1997.
14
[38] R. D. Jenks and R. S. Sutor, AXIOM: The
Scientific Computation System. Springer,
2013.
[39] E. Poll and S. Thompson, “Adding the axioms to Axiom,” tech. rep., Computing Laboratory, University of Kent, 1998.
[40] R. Miner, “The importance of MathML to
mathematics communication,” Notices of the
AMS, vol. 52, no. 5, pp. 532–538, 2005.
[41] S. Buswell, O. Caprotti, D. P. Carlisle, M. C.
Dewar, M. Gaetano, and M. Kohlhase, “The
Open Math Standard,” tech. rep., The Open
Math Society, 2004.
[42] J. Calmet and V. Lefevre, “Toward the Integration of Numerical Computations into the
OMSCS Framework,” in 7th International
Workshop on Computer Algebra in Scientific
Computing-CASC, pp. 71–79, 2004.
[43] J. Carette, W. M. Farmer, and R. O’Connor,
“MathScheme: project description,” in International Conference on Intelligent Computer Mathematics, pp. 287–288, Springer,
2011.
[44] A. Armando and D. Zini, “Towards Interoperable Mechanized Reasoning Systems:
the Logic Broker Architecture,” in AI*IATABOO Workshop: From Objects to Agents:
Evolutionary Trends of Software Systems,
pp. 70–75, 2000.
[45] A. Adams, M. Dunstan, H. Gottliebsen,
T. Kelsey, U. Martin, and S. Owre, “Computer algebra meets automated theorem
proving: Integrating Maple and PVS,” in International Conference on Theorem Proving
in Higher Order Logics, pp. 27–42, Springer,
2001.
[46] J. Harrison and L. Théry, “A skeptic’s approach to combining HOL and Maple,” Journal of Automated Reasoning, vol. 21, no. 3,
pp. 279–294, 1998.
[47] C. Ballarin, K. Homann, and J. Calmet,
“Theorems and algorithms: An interface between Isabelle and Maple,” in Proceedings
of the International Symposium on Symbolic
Sarma and Hay
and Algebraic Computation, pp. 150–157,
ACM, 1995.
[48] P. Jackson, “Exploring abstract algebra
in constructive type theory,” in International Conference on Automated Deduction,
pp. 590–604, Springer, 1994.
[49] J. Siekmann, C. Benzmüller, V. Brezhnev,
L. Cheikhrouhou, A. Fiedler, A. Franke,
H. Horacek, M. Kohlhase, A. Meier, E. Melis,
et al., “Proof development with OMEGA,” in
International Conference on Automated Deduction, pp. 144–149, Springer, 2002.
[50] C. Ballarin and L. C. Paulson, “A pragmatic approach to extending provers by computer algebra—with applications to coding
theory,” Fundamenta Informaticae, vol. 39,
no. 1, 2, pp. 1–20, 1999.
[51] R. Y. Lewis, “An extensible ad hoc interface
between Lean and Mathematica.” in preparation, 2017.
[52] E. Yudkowsky and M. Herreshoff, “Tiling
agents for self-modifying AI, and the Löbian
obstacle,” tech. rep., Machine Intelligence
Research Institute, 2013.
[53] P. LaVictoire, “An Introduction to Löbs
Theorem in MIRI Research,” tech. rep., Machine Intelligence Research Institute, 2015.
[54] M. Barasz, P. Christiano, B. Fallenstein,
M. Herreshoff, P. LaVictoire, and E. Yudkowsky, “Robust Cooperation in the Prisoner’s Dilemma: Program Equilibrium via
Provability Logic,” ArXiv e-prints, Jan.
2014.
[55] B. Fallenstein and N. Soares, “Problems
of self-reference in self-improving spacetime embedded intelligence,” in International Conference on Artificial General Intelligence, pp. 21–32, Springer, 2014.
[56] N. Soares and B. Fallenstein, “Toward Idealized Decision Theory,” ArXiv e-prints, July
2015.
[57] S. Garrabrant, T. Benson-Tilsen, A. Critch,
N. Soares, and J. Taylor, “Logical Induction,” ArXiv e-prints, Sept. 2016.
Robust Computer Algebra, Theorem Proving, and Oracle AI
[58] K. Beck, Test Driven Development: By Example. Addison Wesley, 2002.
[59] R. Osherove, The Art of Unit Testing: with
examples in C#. Manning Publications,
2013.
[60] E. M. Maximilien and L. Williams, “Assessing test-driven development at IBM,” in Proceedings of the 25th International Conference
on Software Engineering, pp. 564–569, IEEE,
2003.
[61] H. Erdogmus, “On the effectiveness of
test-first approach to programming,” IEEE
Transactions on Software Engineering,
vol. 31, no. 1, 2005.
[62] G. P. Sarma, T. W. Jacobs, M. D. Watts,
S. V. Ghayoomie, S. D. Larson, and R. C.
Gerkin, “Unit testing, model validation,
and biological simulation,” F1000Research,
vol. 5, 2016.
[63] C. Keller, A Matter of Trust: Skeptical
Communication Between Coq and External
Provers. PhD thesis, École Polytechnique,
2013.
[64] M. Armand, G. Faure, B. Grégoire, C. Keller,
L. Théry, and B. Werner, “A modular integration of SAT/SMT solvers to Coq through
proof witnesses,” in International Conference on Certified Programs and Proofs,
pp. 135–150, Springer, 2011.
[65] J. Harrison, “Towards self-verification of
HOL Light,” in International Joint Conference on Automated Reasoning, pp. 177–191,
Springer, 2006.
[66] R. Pollack, “How to believe a machinechecked proof,” Twenty Five Years of Constructive Type Theory, vol. 36, p. 205, 1998.
[67] G. Hardy and J. Hadamard, “The Psychology of Invention in the Mathematical Field,”
1946.
[68] S. Dehaene, The Number Sense: How the
Mind Creates Mathematics. Oxford University Press, 2011.
15
[69] P. Drijvers and K. Gravemeijer, “Computer
Algebra as an Instrument: Examples of Algebraic Schemes,” in The Didactical Challenge of Symbolic Calculators, pp. 163–196,
Springer, 2005.
[70] P. Drijvers, “Learning mathematics in a computer algebra environment: obstacles are opportunities,” Zentralblatt für Didaktik der
Mathematik, vol. 34, no. 5, pp. 221–228,
2002.
[71] G. Lakoff and R. Núñez, Where mathematics
comes from: How the embodied mind brings
mathematics into being. Basic books, 2000.
[72] S. Wolfram, An Elementary Introduction to
the Wolfram Language. Wolfram Media,
2015.
[73] L. C. Paulson, “The foundation of a generic
theorem prover,” Journal of Automated Reasoning, vol. 5, no. 3, pp. 363–397, 1989.
[74] L. C. Paulson, Isabelle: A generic theorem
prover, vol. 828. Springer Science & Business
Media, 1994.
[75] Y. Bertot and P. Castéran, Interactive
theorem proving and program development:
Coq‘Art: The Calculus of Inductive Constructions. Springer Science & Business Media, 2013.
[76] L. de Moura, S. Kong, J. Avigad,
F. Van Doorn, and J. von Raumer,
“The Lean Theorem Prover,” in International Conference on Automated Deduction,
pp. 378–388, Springer, 2015.
| 2cs.AI
|
arXiv:1702.08050v3 [math.GR] 26 Jun 2017
Hyperbolic actions and 2nd bounded cohomology
of subgroups of Out(Fn)
Part II: Finite lamination subgroups
Michael Handel and Lee Mosher
∗
March 16, 2018
Abstract
This is the second part of a two part work in which we prove that for every
finitely generated subgroup Γ < Out(Fn ), either Γ is virtually abelian or its
second bounded cohomology Hb2 (Γ; R) contains an embedding of ℓ1 . Here in
Part II we focus on finite lamination subgroups Γ — meaning that the set of
all attracting laminations of elements of Γ is finite — and on the construction
of hyperbolic actions of those subgroups to which the general theory of Part I
is applicable.
1
Introduction
This is the second part of a two part work, the main theorem of which is an alternative
for the second bounded cohomology of finitely generated subgroups of Out(Fn ), the
outer automorphism group of a free group of finite rank n:
Theorem A. For every finitely generated subgroup Γ < Out(Fn ), either Γ is virtually
abelian or Hb2 (Γ; R) has an embedded copy of ℓ1 and so is of uncountable dimension.
For background on Hb2 (Γ; R) see Part I [HM15]. In that paper, Theorem A was
reduced to Theorem C which is the main result of this paper. Theorem C explains how
to produce useful hyperbolic actions for a certain class of finite lamination subgroups
of Out(Fn ). To fully state Theorem C we shall first define the properties that arise
in its hypotheses.
Consider a group action G y S on a hyperbolic space. Recall that γ ∈ G is
loxodromic if its action on the Gromov boundary ∂S has north–south dynamics with
∗
The first author was supported by the National Science Foundation under Grant No. DMS1308710 and by PSC-CUNY under grants in Program Years 46 and 47. The second author was
supported by the National Science Foundation under Grant No. DMS-1406376.
1
a unique repeller-attractor pair (∂− γ, ∂+ γ) ∈ ∂S × ∂S − ∆. Recall also that G y S
is nonelementary if there exist independent loxodromic elements δ, γ ∈ G, meaning
that the sets {∂− δ, ∂+ δ}, {∂− γ, ∂+ γ} are disjoint. Given a loxodromic element γ ∈ Γ,
we say that γ satisfies WWPD ([BBF15], and see Proposition 2.6 of Part I [HM15])
if the G-orbit of the ordered pair (∂− γ, ∂+ γ) is a discrete subset of the space of distinct
ordered pairs ∂S × ∂S − ∆.
Let IAn (Z/3) < Out(Fn ) denote the finite index normal subgroup consisting of
all outer automorphisms whose induced action on H1 (Fn ; Z/3) is trivial. A subgroup
Γ < IAn (Z/3) has (virtually) abelian restrictions (Definition 2.1) if for each proper
free factor A < Fn whose conjugacy class [A] is fixed by each element of Γ, the natural
restriction homomorphism Γ 7→ Out(A) (virtually) abelian image. As explained in
Part I [HM15], the property of Γ < IAn (Z/3) having (virtually) abelian restrictions
plays a role in our theory analogous to the role played by irreducible subgroups of
mapping class groups in the theory of Bestvina and Fujiwara [BF02].
The decomposition theory of Bestvina, Feighn and Handel [BFH00] associates to
each φ ∈ Out(Fn ) a finite set L(φ) of attracting laminations. Associated to a subgroup
Γ < Out(Fn ) is the set L(Γ) = ∪φ∈Γ L(Γ). If L(Γ) is finite then Γ is a finite lamination
subgroup, otherwise Γ is an infinite lamination subgroup. In Part I we proved two
theorems for application to Theorem A, namely: Theorem B of Part I which is about
infinite lamination subgroups with virtually abelian restrictions, their actions on the
free splitting complex of Fn , and their WWPD elements; and Theorem D of Part I
which is a general result for determining second bounded cohomology of a group
possessing a hyperbolic action with a sufficiently rich collection of WWPD elements.
Also in Part I, by combining Theorem B with Theorem D we reduced the proof of
Theorem A to the following result which is the main theorem of the present paper.
Theorem C. For any finitely generated, finite lamination subgroup Γ < IAn (Z/3)
such that Γ is not abelian but Γ has virtually abelian restrictions, there exists a finite
index normal subgroup N ⊳ Γ and an action N y S on a hyperbolic space, such that
the following hold:
(1) Every element of N acts either elliptically or loxodromically on S;
(2) The action N y S is nonelementary;
(3) Every loxodromic element of the commutator subgroup [N, N] satisfies WWPD
with respect to the action N y S.
Remarks: WPD versus WWPD. In lectures on this topic we stated a stronger
version of Theorem C (3), saying that in the group Image(N 7→ Isom(S)), loxodromic
elements of the commutator subgroup satisfy WPD. That requires a stronger hypothesis, saying roughly that “virtually abelian restrictions” holds not just for free factors
but for a broader class of subgroups of Fn . That also makes the proof and application
2
of Theorem C considerably more intricate. In the interests of keeping the paper from
growing ever longer, we have settled for the version of Theorem C presented here.
Methods of proof of Theorem C
The first step of Theorem C will be to reduce it to a statement about subgroups
of automorphism groups of free groups, stated in Theorem F below. The key step
of this reduction, proved in Proposition 2.3 of Section 2, is the construction of an
“automorphic lift” of each Γ satisfying the hypotheses of Theorem C: there exists a
free factor A < Fn having rank k for some 2 ≤ k ≤ n − 1, such that its conjugacy
class [A] is Γ-invariant, and such that the natural homomorphism Γ 7→ Out(A) lifts
to a homomorphism Γ 7→ Aut(A) whose image in Aut(A) is not virtually abelian. In
Section 2.4 we shall show, by minimizing the rank of the free factor A, how to reduce
Theorem C to the following statement, in which we have identified A ≈ Fk and then
rewritten k as n. Recall the canonical isomorphism Fn ≈ Inn(Fn ) which associates to
each γ ∈ Fn the inner automorphism iγ (δ) = γδγ −1 .
b < Aut(Fn ) with n ≥ 2, and denote H =
Theorem F. Consider a subgroup H
b 7→ Out(Fn )) and J = Kernel(H
b 7→ H) = H
b ∩ Inn(Fn ), giving the following
Image(H
commutative diagram of short exact sequences:
1
/
⊂
J
/
⊂
1
/
//
H
⊂
Fn ≈ Inn(Fn )
b
H
⊂
/
Aut(Fn )
/
1
⊂
//
Out(Fn )
/
1
b is finitely generated and not virtually abelian, and
Suppose that H is abelian, that H
b on the set of
that no proper, nontrivial free factor of Fn is fixed by the action of H
b and an
subgroups of Fn . Then there exists a finite index normal subgroup N < H
action N y S on a hyperbolic space such that the following properties hold:
(1) Every element of N acts either elliptically or loxodromically on S;
(2) The action N y S is nonelementary;
(3) Every loxodromic element of J ∩ N satisfies WWPD with respect to the action
N y S.
The proof of Theorem F begins in Section 2.6 by assuming H < IAn (Z/3), which
we may do by replacing H by its intersection with IAn (Z/3); note that the conclusion
of Theorem F holds for H if and only if it holds for some (any) finite index subgroup
of H. Then we consider a maximal, proper, H-invariant free factor system B in Fn .
The proof breaks into cases depending on the “co-edge number” of B, which is the
3
minimum integer k ≥ 1 such that B is represented by a subgraph H ⊂ G of a marked
graph G for which the complement G \ H has k edges. The “one-edge” case, where
b on
the co-edge number of B equals 1, is handled in Section 2.6 using an action of H
a simplicial tree that is naturally associated to the free factor system B.
The “multi-edge” case, where the co-edge number of B is ≥ 2, takes up the
majority of the paper from Section 3 to the end. For a full introduction to the
multi-edge case, see Section 3. In brief, one uses the dynamics of EG strata to
produce a certain hyperbolic suspension space S, applying the Mj-Sardar combination
theorem [MS12] to prove hyperbolicity. The construction of S, including the flaring
properties needed to apply the combination theorem, is found in Sections 4 and 5.
The construction of the action on S, based on abelian subgroup methods, is found
in Sections 6, 7 and 8.1. The pieces are put together, and the multi-edge case of
Theorem F is proved, in Section 8.2.
Prerequisites from the theory of Out(Fn ). We will assume that the reader is
familiar with certain basic concepts of Out(Fn ) that have already been reviewed in
Part I of this paper [HM15], in particular:
[HM15, Section 3.1] Marked graphs and topological representatives; free factor
systems; relative train track maps; attracting laminations.
[HM15, Section 4.1] Properties of IAn (Z/3) = Kernel Out(Fn ) 7→ GL(n, Z/3) .
[HM15, Section 4.1] The co-edge number of a free factor system A in Fn ; elements
and subgroups of Out(Fn ) which are fully irreducible relative to a free factor
system A of Out(Fn ).
Where needed in this paper, we will conduct reviews of other basic concepts.
Contents
1 Introduction
1
2 Lifting to an automorphism group
2.1 Definition of automorphic lifts. . . . . . . . . . . . . . .
2.2 A sufficient condition to be abelian. . . . . . . . . . . . .
2.3 Constructing automorphic lifts: proof of Proposition 2.3
2.4 Proof that Theorem F implies Theorem C . . . . . . . .
2.5 Automorphic extensions of free splitting actions . . . . .
2.6 Case analysis of Theorem F. Proof of the one-edge case. .
.
.
.
.
.
.
6
6
8
9
12
13
18
3 Introduction to the multi-edge case of Theorem F.
3.1 Outline of the multi-edge case. . . . . . . . . . . . . . . . . . . . . . .
3.2 Motivation: Suspension actions and combination theorems. . . . . . .
20
20
23
4
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
4 Flaring in a top EG stratum
4.1 The path functions Lu and LPF . . . . . . . . . . . .
4.2 Flaring of the path functions Lu and LPF . . . . . .
4.3 Negative flaring of Lu . . . . . . . . . . . . . . . . .
4.4 Positive flaring and other properties of Lu . . . . .
4.5 Proof of Lemma 4.11: the Special Flaring Condition
4.6 Appendix: The graph homotopy principle . . . . .
. .
. .
. .
. .
for
. .
. .
. .
. .
. .
Lu
. .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5 Flaring in T ∗ and hyperbolicity of S.
5.1 The free splitting Fn y T and its role in flaring. . . . . . . . . . .
e and T . A piecewise Riemannian metric on T .
5.2 Path functions on G
5.3 Constructing T ∗ by coning off Nielsen axes of T . . . . . . . . . . .
5.4 Geometry and dynamics on T ∗ . . . . . . . . . . . . . . . . . . . .
5.5 Construction of S. . . . . . . . . . . . . . . . . . . . . . . . . . .
5.6 Proof of hyperbolicity of S. . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
25
26
31
35
37
41
45
.
.
.
.
.
.
47
47
50
52
55
60
62
6 Abelian subgroups of Out(Fn )
6.1 Background review . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.1.1 More about CTs . . . . . . . . . . . . . . . . . . . . . . . . .
6.1.2 Principal automorphisms and rotationless outer automorphisms.
6.1.3 Rotationless abelian subgroups . . . . . . . . . . . . . . . . .
6.2 Disintegration subgroups . . . . . . . . . . . . . . . . . . . . . . . . .
6.2.1 QE-paths and QE-splittings . . . . . . . . . . . . . . . . . . .
6.2.2 Almost invariant subgraphs . . . . . . . . . . . . . . . . . . .
6.2.3 Admissible S-tuples; quasi-exceptional families . . . . . . . . .
6.2.4 Xs paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.2.5 The disintegration subgroup D(f ) . . . . . . . . . . . . . . .
6.2.6 The coordinate homomorphism of a disintegration group D(f )
66
66
66
68
71
72
72
73
73
74
75
76
7 A train track semigroup action
7.1 A “homotopy semigroup action” of D+ on G. . . . . . . . . . . . . .
b+ on T and T ∗ . . . . . . . . . . . . . . . . .
7.2 Semigroup actions of D
b0 y T ∗ . . . . . . . . . . . . . . . . .
7.3 Dynamics of the group action D
77
79
82
84
8 The suspension action.
b y S. . . . . . . . . . . . . . . . . . . . . . .
8.1 The suspension action D
8.2 Proof of Theorem F: The multi-edge case. . . . . . . . . . . . . . . .
5
86
86
88
2
Lifting to an automorphism group
In this section, the first thing we do is to study the structure of finitely generated, finite
lamination subgroups Γ < IAn (Z/3) which are not abelian but have virtually abelian
restrictions. The motivating question of that study is this: If Γ fixes the conjugacy
class [A] of a proper, nontrivial free factor A < Fn , can the natural restriction map
Γ 7→ Out(A) be lifted to a homomorphism Γ 7→ Aut(A)? Sections 2.1–2.3 are devoted
to constructions of such “automorphic lifts”. Using this construction, in Section 2.4
we prove the implication Theorem F =⇒ Theorem C.
After that, in Section 2.5, we consider any free splitting Fn y T , and we study a
natural subgroup of Aut(Fn ) to which the free splitting action extends. That study
is used in Section 2.6 to prove one of the two major cases of Theorem F.
2.1
Definition of automorphic lifts.
Recall [HM17a, Fact 1.4] that for any group and subgroup H < G which is its own
normalizer (e.g. a free factor), letting Stab[H] < Out(G) be the stabilizer of the
conjugacy class of H, the natural restriction homomorphism Stab[H] 7→ Out(H),
denoted φ 7→ φ H, is well-defined by choosing Φ ∈ Aut(G) representing φ and
preserving H and taking φ H to be the outer automophism class of Φ H ∈ Aut(H).
Throughout the paper we use the theorem that virtually abelian subgroups of
IAn (Z/3) are abelian [HM17e]. We sometimes write “(virtually) abelian” as a reminder that one may freely include or ignore the adverb “virtually” in front of the
adjective “abelian” in the context of a subgroup of IAF (Z/3) for any finite rank free
group F . One has this freedom, for example, in the following definition (see [HM15,
Corollary 4.1]):
Definition 2.1 ((Virtually) Abelian restrictions). A subgroup Γ < IAn (Z/3) has
(virtually) abelian restrictions if for any proper free factor A < Fn such that Γ <
Stab[A], the restriction homomorphism Γ 7→ Out(A) has (virtually) abelian image.
Definition 2.2. Let Γ < IAn (Z/3) be a finitely generated, finite lamination subgroup
which is not (virtually) abelian and which has (virtually) abelian restrictions. An
automorphic lift of Γ is a homomorphism ρ : Γ 7→ Aut(A), where A < Fn is a proper
b = Image(ρ) is not virtually
free factor and Γ < Stab[A], such that the group H
abelian, and such that the following triangle commutes
Aut(A)
<
②②
②
②②
②②
②②
/ Out(A)
ρ
Γ
In this diagram the horizontal arrow is the natural restriction homomorphism Stab[A] 7→
Out(A) with domain restricted to Γ, and the vertical arrow is the natural quotient
6
Γ✾
✾✾
✾✾
✾✾
✾✾
✾✾
/H
b
//H
✾✾
✾✾
⊂
✾✾ ⊂
✾
/ Aut(A)
/ / Out(A)
ρ
1
/
⊂
J
⊂
1
/
A ≈ Inn(A)
⊂
/
/
1
1
b
Figure 1: Notation associated to an automorphic lift ρ : Γ → Aut(A) with image H.
b is not virtually abelian, the quotient H is virtually abelian, and the
The group H
kernel J is free of rank ≥ 2 (possibly infinite). The horizontal rows are exact.
homomorphism. To emphasize the role of A we will sometimes refer to an automorb = Image(ρ), H =
phic lift of Γ rel A. Adopting the notation of Theorem F, we set H
b 7→ Out(A)) = Image(Γ 7→ Out(A)), and J = Kernel(H
b 7→ H) = H
b ∩ Inn(A),
Image(H
thus obtaining the commutative diagram shown in Figure 1. We note two properties
which follow from the definition:
• H is abelian;
• The free group J has rank ≥ 2.
The first holds because A < Fn is proper and Γ has virtually abelian restrictions
(see Definition 2.1). The second is a consequence of the first combined with the
b is not virtually abelian, for otherwise the free group J is
defining requirement that H
b is virtually solvable, but Aut(A) injects into Out(Fn ) and solvable
abelian and so H
subgroups of Out(Fn ) are virtually abelian by [BFH04]. We put no further conditions
on the rank of J, it could even be infinite. When referring to J, each of its elements
will be thought of ambiguously as an element of the free factor A < Fn or as the
corresponding element of the inner automorphism group Inn(A); this ambiguity should
cause little trouble, by using the canonical isomorphism A ↔ Inn(A) given by δ ↔ iδ
where iδ (γ) = δγδ −1 .
The rank of the automorphic lift Γ 7→ Aut(A) is defined to be rank(A), and
note that rank(A) ≥ 2 because otherwise Aut(A) is finite in which case each of its
subgroups is virtually abelian.
This completes Definition 2.2.
Here is the first of two main results of Section 2.
Proposition 2.3. If Γ < IAn (Z/3) is a finitely generated, finite lamination subgroup
which is not (virtually) abelian but which has (virtually) abelian restrictions, then
there exists an automorphic lift Γ 7→ Aut(A).
7
The proof is found in Section 2.3, preceded by Lemma 2.4 in Section 2.2.
When n = 2, one recovers from Proposition 2.3 the simple fact that every finite
lamination subgroup of Out(F2 ) is virtually abelian, for otherwise the intersection with
IAn (Z/3) would have an automorphic lift to Aut(A) for some proper free factor A, from
which it would follow that 2 ≤ rank(A) ≤ n − 1 = 1. Of course this fact has a simple
proof, expressed in terms the isomorphism Out(F2 ) 7→ Aut(H1 (F2 ; Z)) ≈ GL(2, Z),
which we leave to the reader.
2.2
A sufficient condition to be abelian.
In this section we prove Lemma 2.4 which gives a sufficient condition for a finitely
generated, finite lamination subgroup Γ < IAn (Z/3) to be abelian. The negation of
this condition then becomes a property that must hold when Γ is not abelian.
Lemma 2.4. Let Γ < IAn (Z/3) be a finitely generated, finite lamination subgroup.
If A = {[A1 ], . . . , [AI ]} is a maximal proper Γ-invariant free factor system, if each
restriction Γ Ai < Out(Ai ) is abelian for i = 1, . . . , I, and if A has co-edge number
≥ 2 in Fn , then Γ is abelian.
Proof. By [HM17d, Theorem C], there exists η ∈ Γ which is fully irreducible rel A.
±
By relative train track theory, there is a unique lamination pair Λ±
η ∈ L (η) for η
which is not carried by A. By [HM17c, ], the nonattracting subgroup system of Λ±
η
±
has one of two forms, either Ana (Λ±
η ) = A or Ana (Λη ) = A ∪ {[C]} where C is a
maximal infinite cyclic group not carried by A (see [HM17c, Definition 1.2]). For
every nonperiodic line ℓ that is not carried by A, evidently ℓ is not carried by [C],
and so ℓ is not carried by Ana (Λ±
η ); by applying [HM17c, Theorem H] it then follows
−1
−
that ℓ is weakly attracted to either Λ+
η by iteration of η or to Λη by iteration of η .
+
−
+
From this it follows that the two laminations Λη , Λη−1 = Λη are the unique elements
of L(Γ) not carried by A, for if there existed ψ ∈ Γ with attracting lamination
+
±
Λ+
ψ ∈ L(Γ) − {Λη } not supported by A then the generic lines of Λψ would be weakly
−
−1
attracted either to Λ+
η by iteration of η or to Λη by iteration of η , and in either
+
case the set of laminations η k (Λ+
ψ ) = Ληk ψη−k ∈ L(Γ), k ∈ Z, would form an infinite
set, contradicting that Γ is a finite lamination group.
Since L(Γ) is finite, for each φ ∈ Γ each element of L(Γ) has finite orbit under
the action of of φ. Since Γ < IAn (Z/3), it follows by [HM15, Lemma 4.8] that each
element of L(Γ) is fixed by φ. In particular, Γ < Stab(Λ+
η ). By [BFH00, Corollary
+
3.3.1], there exists a homomorphism PFΛ+η : Stab(Λη ) → R having the property that
(φ) 6= 0 holds if and only if Λ+
for each φ ∈ Stab(Λ+
η ∈ L(φ).
η ), the inequality PFΛ+
η
Consider the following homomorphism, the range of which is abelian:
Ω:Γ →
R
⊕ Γ A1 ⊕ · · · ⊕ Γ AI
Ω(φ) = P FΛ+η (φ) ⊕ φ A1 ⊕ · · · ⊕ φ AI
8
We claim that that the kernel of Ω is also abelian. This claim completes the proof of
the lemma, because every solvable subgroup of Out(Fn ) is virtually abelian [BFH04],
and every virtually abelian subgroup of IAn (Z/3) is abelian [HM17e].
To prove the claim, by Proposition 5.2 of [HM], every subgroup of Kernel P FΛ+η (φ)
consisting entirely of UPG elements is abelian, and so we need only check that each
element of Kernel(Ω) is UPG. By [BFH00, Corollary 5.7.6], every PG element of
IAn (Z/3) is UPG, and so we need only check that each φ ∈ Kernel(Ω) is PG, equivalently L(φ) = ∅. Suppose to the contrary that there exists Λ+
φ ∈ L(φ), with dual
−
−1
repelling lamination Λφ ∈ L(φ ). Since φ Ai is trivial in Out(Ai ) for each component [Ai ] of A, neither of the laminations Λ±
φ is supported by A. Since L(φ) ⊂ L(Γ),
+
−
−
(φ) 6= 0 a contrait follows as shown above that {Λφ , Λφ } = {Λ+
η , Λη }, and so P FΛ+
η
diction.
2.3
Constructing automorphic lifts: proof of Proposition 2.3
Let Γ < IAn (Z/3) be a finitely generated, finite lamination subgroup that is not
(virtually) abelian and has (virtually) abelian restrictions. Choose a maximal proper
Γ-invariant free factor system A = {[A1 ], . . . , [AI ]}, and so each restricted group
denoted Hi = Γ [Ai ] < Out(Ai ) is abelian. Since Γ < IAn (Z/3), it follows that each
component [Ai ] of A is fixed by Γ [HM17b, Lemma 4.2].
The group Γ is not abelian by [HM17e], and so applying by Lemma 2.4 the extension A ⊏ {[Fn ]} is a one-edge extension. We may therefore choose a marked graph
pair (G, H) representing A so that G \ H = E is a single edge, and we may choose H
so that its components are roses, with each endpoint of E being the rose vertex of a
component of H. The number of components of A equals the number of components
of H, that number being either one or two, and we cover those cases separately.
Case 1: A has two components, say A = {[A1 ], [A2 ]} where Fn = A1 ∗ A2 . We
construct a commutative diagram as follows:
q
/ Out(A1 ) ⊕ Out(A2 )
O
❯❯❯❯
❯❯❯❯
❯❯❯❯
ρ=ρ1 ⊕ρ2
❯❯❯❯
α=α1 ⊕α2
❯❯❯❯
r
✐✐✐ Γ
✐✐✐✐
ω✐✐✐✐✐✐
⊂
✐✐✐
t✐✐✐✐
/ Out(Fn )
Aut(Fn , A1 , A2 )
Aut(A1 ) ⊕O Aut(A
)
j 2
Aut(Fn , A1 , A2 ) is the subgroup of Aut(Fn ) that preserves both A1 and A2 . The
homomorphism r is induced by restricting Aut(Fn , A1 , A2 ) to Aut(A1 ) and to Aut(A2 ).
Evidently r is injective, since an automorphism of Fn is determined by its restrictions
to the complementary free factors A1 , A2 . The homomorphisms denoted by the top
and bottom arrows of the diagram are induced by canonical homomorphisms from
9
automorphism groups to outer automorphism groups. For i = 1, 2 the homomorphism
ρi is the composition Γ ֒→ Stab[Ai ] 7→ Out(Ai ) where the latter map is the natural
restriction homomorphism.
We must construct ω, α1 , α2 . We may choose the marked graph pair (G, H)
representing the free factor system A to have the following properties: the two rose
components H1 , H2 of the subgraph H have ranks equal to rank(A1 ), rank(A2 ) respectively; the edge E is oriented and decomposes into oriented half-edges E = E 1 E2 ;
the common initial point of E1 , E2 is denoted w; their respective terminal vertices are
the rose vertices vi ∈ Hi ; and there is an isomorphism π1 (G, w) ≈ Fn which restricts
to isomorphisms π1 (Ei ∪ Hi , w) ≈ Ai for i = 1, 2. Given φ ∈ Γ, let f : G → G
be a homotopy equivalence that represents φ, preserves H1 and H2 , and restricts
to a locally injective path on E = E 1 E2 . By Corollary 3.2.2 of [BFH00] we have
f (E) = ū1 E ±1 u2 for possibly trivial paths closed paths ui in Hi , i = 1, 2, and in
fact the plus sign occurs and so f (E) = ū1 Eu2 , because φ ∈ Γ < IAn (Z/3). After
pre-composing f with a homeomorphism of G isotopic to the identity that restricts
to the identity on H1 ∪ H2 and that moves the point w ∈ E to f −1 (w) ∈ E, we
may also assume that f (w) = w, and so f (E1 ) = E1 u1 and f (E2 ) = E2 u2 . Define
αi (φ) ∈ Aut(Ai ) ≈ Aut(π1 (Ei ∪Hi , vi )) to be the automorphism induced by f Ei ∪Hi ,
and then use the isomorphism Fn = A1 ∗ A2 to define ω(φ). Note that ω(φ) is the
unique lift of φ ∈ Out(Fn ) to Aut(Fn ) which preserves A1 and A2 , because any two
such lifts differ by an inner automorphism ic that preserves both A1 and A2 , implying
by malnormality that c ∈ A1 ∩ A2 and so is trivial. It follows from uniqueness that ω,
α1 , and α2 are homomorphisms, and hence so is α. Commutativity of the diagram is
straightforward from the construction. The homomorphism ω is injective because it
is a lift of the inclusion Γ ֒→ Out(Fn ). Since r and ω are injective, by commutativity
of the diagram α is also injective.
At least one of the two maps αi : Γ → Aut(Ai ) is an automorphic lift because
bi = Image(αi ) < Aut(Ai ) is not virtually
at least one of the corresponding images H
b1 ⊕ H
b2 would be virtually
abelian: if both were virtually abelian, then α(Γ) < H
abelian, but α is injective and so Γ would be virtually abelian, a contradiction.
Case 2: A has a single component, say A = {[A]}, and so Fn = A ∗ hbi for some
b ∈ Fn . The proof in this case is similar to Case 1, the main differences being that in
place of direct sum we use fiber sum, and the marked graph pair (G, H) representing
A will have connected subgraph H.
10
We shall construct the following commutative diagram:
Aut2 (A, Ab )
q
/ Out(A)
O
i❚❚❚❚
❚❚❚❚
ρ
❚
❚
❚❚❚❚
α
❚❚❚❚
r
H
❥❥❥❥
❥
❥
❥
❥❥
⊂
❥❥❥❥
u❥❥❥❥ ω
/ Out(Fn )
Aut(Fn , A, Ab )
O
In this diagram we use the following notations: the conjugate Ab = bAb−1 ; the
restricted inner automorphism ib : A → Ab where ib (a) = bab−1 ; the adjoint isomorphism Adb : Aut(A) → Aut(Ab ) where Adb (Φ) = ib ◦ Φ ◦ i−1
b ; the canonical epimorphism qA : Aut(A) → Out(A); and the epimorphism qAb = qA ◦ Ad−1
:
b
b
Aut(A ) → Out(A). Also, the fiber sum of qA and qAb is the following subgroup of
Aut(A) ⊕ Aut(Ab ):
Aut2 (A, Ab ) = {(Φ, Φ′ ) ∈ Aut(A) ⊕ Aut(Ab ) qA (Φ) = qAb (Φ′ )}
Define the homomorphism q by q(Φ, Φ′ ) = qA (Φ) = qAb (Φ′ ). Define Aut(Fn , A, Ab ) <
Aut(Fn ) to be the subgroup that preserves both A and Ab . The homomorphism r is
jointly induced by the two restriction homomorphisms rA , rAb from Aut(Fn , A, Ab ) to
Aut(A), Aut(Ab ) because the two compositions qA ◦ rA , qAb ◦ rAb : Aut(Fn , A, Ab ) →
Out(A) are evidently the same. Note that r is injective, for if Φ ∈ Aut(Fn , A, Ab )
restricts to the identity on each of A and Ab , then Φ(a) = a and Φ(ab ) = ab for all
a ∈ A, and it follows that b−1 Φ(b) commutes with all a ∈ A; since rank(A) ≥ 2, we
have Φ(b) = b, and hence Φ is trivial.
To construct the homomorphism ω, we may in this case choose the marked graph
pair (G, H) representing A so that: H is a rose whose rank equals rank(A) = n−1; as
before E = E 1 E2 with w the common initial point of E1 , E2 ; the terminal endpoints of
both E1 and E2 equal the rose vertex v ∈ H; and there is an isomorphism π1 (G, w) ≈
Fn which restricts to π1 (E1 ∪H, w) ≈ A and E2 E 1 ≈ b. It follows that π1 (E2 ∪H, w) ≈
Ab . For each φ ∈ H, applying Corollary 3.2.2 of [BFH00] as in the previous case,
we find Φ = ω(φ) ∈ Aut(Fn , A, Ab ) that represents φ and that is represented by a
homotopy equivalence fφ : G → G that preserves H, fixes w, and takes Ei 7→ Ei ui
for possibly trivial paths u1 , u2 in H based at v. The map ω is a homomorphism
because Φ is the unique element of Aut(Fn , A, Ab ) that represents φ, for if c ∈ Fn
and if the inner automorphism ic preserves both A and Ab then by malnormality of
A and Ab we have c ∈ A ∩ Ab , and again by malnormality we have that c is trivial.
It follows that ω is injective. Since r is injective it follows that α = r ◦ ω is injective.
Denote α(φ) = (αA (φ), αAb (φ)) ∈ Aut2 (A, Ab ). Obviously the compositions qA ◦ αA ,
qAb ◦ αAb : H → Out(A) are the same, and hence there is an induced homomorphism
ρ : H → Out(A) which is topologically represented by fφ H. This completes the
construction of the above diagram, and commutativity is evident.
11
As in the previous case, we will be done if we can show that at least one of the
two homomorphisms αA : Γ0 → Aut(A) or αAb : Γ0 → Aut(Ab ) has image that is not
virtually abelian, but if both are virtually abelian then Image(α) is contained in a
virtually abelian subgroup of Aut2 (A, Ab ), which by injectivity of α implies that Γ is
virtually abelian, a contradiction.
2.4
Proof that Theorem F implies Theorem C
Let Γ < IAn (Z/3) be a finitely generated, finite lamination subgroup which is not
(virtually) abelian and which has (virtually) abelian restrictions. By applying Proposition 2.3, there exists a free factor A < Fn such that Γ < Stab[A], and there exists an
automorphic lift ρ : Γ 7→ Aut(A); we may assume that rank(A) is minimal amongst all
choices of A and ρ. We adopt the notation of Figure 1 in Section 2.1, matching that
notation with Theorem F by choosing an isomorphism A ≈ Fk where k = rank(A).
b = Image(ρ) < Aut(A)
Most of the hypotheses of Theorem F are now immediate: H
is finitely generated, and it is not virtually abelian by definition of automorphic lifts;
b 7→ Out(A)) is abelian.
also H = Image(H
We must check the one remaining hypothesis of Theorem F, namely that no
b Assuming
proper, nontrivial free factor B < A is preserved by the action of H.
b consider the restriction homomorphism
by contradiction that B is preserved by H,
b
σ : H 7→ Aut(B). We claim that the composition σρ : Γ → Aut(B) is an automorphic lift of Γ. Since rank(B) < rank(A), once this claim is proved, it contradicts
the assumption that ρ : Γ → Aut(A) is an automorphic lift of minimal rank. The
canonical isomorphism Inn(Fk ) ↔ Fk , denoted iδ ↔ δ, restricts to an isomorphism
b ∩ Inn(Fk ) and some subgroup of Fk . If iδ ∈ J then iδ preserves
between J = H
B, and since B is malnormal in A it follows that δ ∈ B. Thus σ restricts to an
injection from J to Inn(B). Also, the group J is a free group of rank ≥ 2, for if
b would be virtually solvable and hence, by [BFH04],
it were trivial or cyclic then H
ρ
σ
b−
virtually abelian, a contradiction. Since the image of the map σρ : Γ −
→H
→ Aut(B)
b preserves
contains σ(J), it follows that Image(σρ) is not virtually abelian. Since H
the A-conjugacy class of B, and since B is malnormal in Fn , it follows Γ preserves
the Fn -conjugacy class of B. Tracing through the definitions one easily sees that the
σρ
composed homomorphism Γ −→ Aut(B) 7→ Out(B) is equal to the composition of
Γ ֒→ StabOut(Fn ) [B] 7→ Out(B), where the latter map is the natural restriction homomorphism. Thus σρ : Γ → Aut(B) is an automorphic lift of Γ, completing the proof
of the claim.
b <
Applying the conclusions of Theorem F using the free group A ≈ Fk and H
b and a hyperbolic action
Aut(Fk ), we obtain a finite index normal subgroup N < H
N y S satisfying conclusions (1), (2) and (3) of that theorem. The subgroup N =
ρ−1 (N ) < Γ is a finite index normal subgroup of Γ, and by composition we have
an action N 7→ N y S. By Theorem F (1), each element of N acts elliptically
or loxodromically on S, and so the same holds for each element of N, which is
12
Theorem C (1). By Theorem F (2), the action N y S is nonelementary, and so
the same holds for the action N y S, which is Theorem C (2). Since the image
b 7→ H is abelian, it follows that the image in
of the homomorphism N 7→ N ֒→ H
b of the commutator subgroup [N, N] is contained in J = Kernel(H
b 7→ H), and
H
hence the image of [N, N] in N is contained in J ∩ N . By Theorem F (3), each
loxodromic element of J ∩ N is a WWPD element with respect to the action N y S.
By [HM15, Corollary 2.8], which says that WWPD is preserved under pullback, it
follows that every loxodromic element of [N, N] satisfies WWPD with respect to the
action N y S, which is Theorem C (3).
2.5
Automorphic extensions of free splitting actions
From the hypothesis of Theorem F, our interest is now transferred to the context of
a finite rank free group Fn — perhaps identified isomorphically with some free factor
b < Aut(Fn ) that has the following
of a higher rank free group — and of a subgroup H
b To
irreducibility property: no proper, nontrivial free factor of Fn is preserved by H.
b on hyperbolic spaces. In this
prove Theorem F one needs actions of such groups H
section we focus on a natural situation which produces actions on trees.
Free splittings. Recall that a free splitting of Fn is a minimal, simplicial action
Fn y T on a simplicial tree T such that the stabilizer of each edge is trivial. Two
free splittings Fn y S, T are simplicially equivalent if there exists an Fn -equivariant
simplicial isomorphism S 7→ T ; we sometimes use the notation [T ] for the simplicial
equivalence class of a free splitting Fn y T . Formally the action Fn y T is given by
a homomorphism α : Fn 7→ Isom(T ), which we denote more briefly as α : Fn y T .
In this formal notation, Isom(T ) refers to the group of simplicial self-isomorphisms
of T , equivalently the self-isometry group of T using the geodesic metric given by
barycentric coordinates on simplices of T . We note that an element of Isom(T ) is
determined by its restriction to the vertex set, in fact it is determined by its restriction
to the subset of vertices of valence ≥ 3. Two free splittings are equivalent if there
is an Fn -equivariant simplicial isomorphism between them, the equivalence class of a
free splitting Fn y T is denoted [T ], and the group Out(Fn ) acts naturally on the set
of equivalence classes of free splittings.
Given a free splitting Fn y T , the set of conjugacy classes of nontrivial vertex
stabilizers of a free splitting is a free factor system of Fn called the vertex group system
of T denoted as A(T ). The function which assigns to each free splitting T its vertex
group system A(T ) induces a well-defined, Out(Fn )-equivariant function
[T ] 7→ A(T )
from the set of simplicial equivalence classes of free splittings to the set of free factor
systems.
13
Every free splitting Fn y T can be realized by some marked graph pair (G, H) in
e where each
the sense that T is the Fn -equivariant quotient of the universal cover G
e
e
component of the total lift H ⊂ G is collapsed to a point. One may also assume that
each component of H is noncontractible, in which case the same marked graph pair
(G, H) topologically represents the vertex group system of T .
Twisted equivariance (functional notation). Given two free splittings Fn y
S, T and an automorphism Φ ∈ Aut(Fn ), a map h : S → T is said to be Φ-twisted
equivariant if
h(γ · x) = Φ(γ) · h(x) for all x ∈ S, γ ∈ Fn .
The special case when Φ = Id is simply called equivariance.
A twisted equivariant map behaves well with respect to stabilizers, as shown in
the following simple fact:
Lemma 2.5. For any free splittings Fn y S, T , for each Φ ∈ Aut(Fn ), and for each
Φ-twisted equivariant map f : S → T , we have
(1) Φ(Stab(x)) < Stab(f (x)) for all x ∈ S.
(2) If in addition the map f : S → T is a simplicial isomorphism, then the inclusion
of item (1) is an equality: Φ(Stab(x)) = Stab(f (x)). Furthermore, γ ∈ Fn acts
loxodromically on S if and only if Φ(γ) acts loxodromically on T , in which case
their axes ASγ ⊂ S and ATΦ (γ) ⊂ T satisfy ATΦ(γ) = f (ASγ ).
Remark. One could approach this proof by first working out the equivariant case
(Φ = Id), and then reducing the twisted case to the equivariant case by conjugating
the action Fn y T using Φ. We instead give a direct proof.
Proof. To prove (1), for each x ∈ S and γ ∈ Fn we have
γ ∈ Φ(Stab(x)) ⇐⇒
=⇒
⇐⇒
⇐⇒
⇐⇒
Φ−1 (γ) ∈ Stab(x) ⇐⇒ Φ−1 (γ) · x = x
f (Φ−1 (γ) · x) = f (x)
Φ(Φ−1 (γ)) · f (x) = f (x) (by twisted equivariance)
γ · f (x) = f (x)
γ ∈ Stab(f (x))
and so Φ(Stab(x)) < Stab(Φ · x).
To prove (2), consider the inverse simplicial automorphism f −1 : T → S. The
implication in the second line may be inverted by applying f −1 to both sides of the
equation in the second line. For the rest of (2), it suffices to prove the “only if”
direction, because the “if” direction can then be proved using that f −1 is Φ−1 -twisted
equivariant. Assuming γ is loxodromic in S with axis ASγ , consider the line f (ASγ ) ⊂ T .
14
Calculating exactly as above one shows that the equation Φ(Stab(ASγ )) = Stab(f (ASγ ))
holds. We may assume that γ is a generator of the infinite cyclic group Stab(ASγ ),
and so hΦ(γ)i = Φhγi = Stab(f (ASγ )). Since the stabilizer of the line f (ASγ ) is the
infinite cyclic group hΦ(γ)i, it follows that Φ(γ) is loxodromic and its axis ATΦ(γ) is
equal to f (ASγ ).
Free splittings of co-edge number 1. Recall the co-edge number of a free factor
system A of Fn (see for example [HM15, Section 4.1]), which is the minimal number of
edges of G \ H amongst all marked graph pairs (G, H) such that H is a representative
of A. There is a tight relationship between free splittings with a single edge orbit and
free factor systems with co-edge number 1. To be precise:
Fact 2.6. [HM13, Section 4.1] When the Out(Fn )-equivariant function [T ] 7→ A =
A(T ) is restricted to free splittings T with one edge orbit and free factor systems A
with co-edge number 1, the result is a bijection, and hence
Stab[T ] = Stab(A)
whenever T and A correspond under this bijection.
Under the bijection in Fact 2.6, the number of components of A equals the number
of vertex orbits of T which equals 1 or 2. If A = {[A]} has a single component then
rank(A) = n − 1, there is a free factorization Fn = A ∗ B where rank(B) = 1, and
the quotient graph of groups T /Fn is a circle with one edge and one vertex. On the
other hand if A = {[A1 ], [A2 ]} has two components then rank(A1 ) + rank(A2 ) = n,
A1 , A2 can be chosen in their conjugacy classes so that there is a free factorization
Fn = A1 ∗ A2 , and the quotient graph of groups T /Fn is an arc with one edge and
two vertices.
The stabilizer of a free splitting and its automorphic extension Consider
a free splitting α : Fn y T and its stabilizer subgroup Stab[T ] < Out(Fn ). Let
g ] < Aut(Fn ) be the preimage of Stab[T ] under the standard projection homoStab[T
morphism Aut(Fn ) 7→ Out(Fn ), and so we have a short exact sequence
g ] 7→ Stab[T ] 7→ 1
1 7→ Fn ≈ Inn(Fn ) ֒→ Stab[T
g ] y T which
From this setup we shall define in a natural way an action of Stab[T
extends the given free splitting action α : Fn y T . We proceed as follows.
For each Φ ∈ Aut(Fn ) we have the composed action α ◦ Φ : Fn y T . Assuming in
g ], in other words that Φ is a representative of some element
addition that Φ ∈ Stab[T
of Stab[T ], it follows the actions α and α ◦ Φ : Fn y T are equivalent, meaning that
there exists a simplicial automorphism h ∈ Isom(T ) such that h ◦ α(γ) = α(Φ(γ)) ◦ h.
When this equation is rewritten in action notation it simply says that h satisfies Φtwisted equivariance: h(γ · x) = Φ(γ) · h(x) for all γ ∈ Fn , x ∈ S. Suppose conversely
15
that for some Φ ∈ Aut(Fn ) there exists a Φ-twisted equivariant h ∈ Isom(T ). Since
h conjugates the action α : Fn y T to the action α ◦ Φ : Fn y T , it follows that
g ]. This proves the equivalence of (1), (2) and (3) in
φ ∈ Stab[T ] and Φ ∈ Stab[T
the following lemma, which also contains some uniqueness information regarding the
conjugating maps h.
Lemma 2.7. For each free splitting α : Fn y T and each φ ∈ Out(Fn ) the following
are equivalent:
(1) φ ∈ Stab[T ]
(2) For each Φ ∈ Aut(Fn ) representing φ, there exists a Φ-twisted equivariant isomorphism h : T → T .
(3) For some Φ ∈ Aut(Fn ) representing φ, there exists a Φ-twisted isomorphism
h : T → T.
Furthermore,
g ]
(4) If φ satisfies the equivalent conditions (1), (2), (3) then for each Φ ∈ Stab[T
representing φ, the Φ-twisted equivariant isomorphism of hΦ is uniquely determined by Φ, and is denoted
hΦ : T → T
(5) For each γ ∈ Fn with corresponding inner automorphism iγ (δ) = γδγ −1 , the
two maps hiγ : T → T and α(γ) : T → T are equal.
g ].
Remark: In item (5), note that hiγ is defined because iγ ∈ Inn(Fn ) < Stab[T
The uniqueness statement (4) is a special case of a more general uniqueness statement that we will make use of later:
Lemma 2.8. For any two free splittings Fn y S, T and any Φ ∈ Aut(Fn ), there exists
at most one Φ-equivariant simplicial isomorphism h : S 7→ T . In particular, taking
Φ = Id, there exists at most one equivariant simplicial isomorphism h : S 7→ T .
Proof. Suppose that a Φ-twisted equivariant simplicial isomorphism h : S 7→ T exists.
For each γ ∈ Fn , it follows by Φ-twisted equivariance that γ acts loxodromically on S
with axis ASγ if and only if Φ(γ) acts loxodromically on T with axis ATγ = f (AS γ) (by
Lemma 2.5). The map that h induces on the set of axes of loxodromic elements is
therefore uniquely determined. It follows that the restriction of h to the set of vertices
v ∈ T of valence ≥ 3 is uniquely determined by Φ, because v may be expressed in the
form {v} = ASβ ∩ ASγ ∩ ASδ for a certain choice of β, γ, δ ∈ Fn , and hence
{h(v)} = h(ASβ ) ∩ h(ASγ ) ∩ h(ASδ )
= ATΦ(β) ∩ ATΦ(γ) ∩ ATΦ(δ)
Since h is uniquely determined by its restriction to the vertices of valence ≥ 3, it
follows that h is uniquely determined amongst simplicial isomorphisms.
16
Proof of Lemma 2.7. The uniqueness clause (4) is an immediate consequence of
Lemma 2.8. Item (5) follows from the uniqueness clause (4), because for each γ ∈ Fn
the map h = α(γ) clearly satisfies iγ twisted equivariant: α(γ)◦α(δ) = α(iγ (δ))◦α(γ)
for all δ ∈ Fn .
g ] 7→ Isom[T ] defined by α̃(Φ) = hΦ as
Consider now the function α̃ : Stab[T
g ] y T , because for each
given by Lemma 2.7. This defines an action α̃ : Stab[T
g ] both sides of the action equation hΦ ◦ hΨ = hΦΨ clearly satisfy ΦΨΦ, Ψ ∈ Stab[T
twisted equivariance, and hence the equation holds by application of the uniqueness
clause (4) of Lemma 2.7.
The following lemma summarizes this discussion together with the evident geng ], and rewrites the twisted equivariance property
eralization to subgroups of Stab[T
using action notation instead of functional notation.
Lemma 2.9. Associated to each free splitting Fk y T there is a unique isometric
g ] y T which assigns to each Φ ∈ Stab[T
g ] the unique simplicial isomoraction Stab[T
phism T 7→ T as stated in Lemma 2.7, denoted in action notation as x 7→ Φ · x,
satisfying the following:
Twisted equivariance (action notation): For all Φ ∈ Aut(Fn ), γ ∈ Fn , x ∈ T ,
Φ · (γ · x) = Φ(γ) · (Φ · x)
g ] of the action Stab[T
g ]yT
More generally, the restriction to any subgroup K < Stab[T
is the unique isometric action K y T such that satisfies twisted equivariance.
Remark: In the twisted equivariance equation Φ · (γ · x) = Φ(γ) · (Φ · x), the
action dot “·” is used ambiguously for both the action of Fn on T and the action of
Aut(Fn ) on T . The meaning of any particular action dot should be clear by context.
Furthermore, in contexts where the two meanings overlap they will always agree.
For example, Lemma 2.7 (5) says that the action dots always respect the standard
isomorphism Fn ≈ Inn(Fn ) given by δ ≈ iδ .
The next lemma will be a key step of the proof of the loxodromic and WWPD
portions of Theorem F (see remarks after the statement). In brief, given a free
splitting Fn y T and a certain subgroup J ⊂ Fn , the lemma gives a criterion for
verifying that the restriction of a free splitting action Fn y T to a certain group
J ⊂ Fn is nonelementary. To understand the statement of the lemma, the reader
may note that by applying Lemma 2.9, the entire setup in the first paragraph of the
g ].
b < Stab[T
lemma is satisfied for any free splitting Fn y T and any subgroup H
Lemma 2.10. Let Fn y T be a free splitting with vertex set V , and let V nt be the
b < Aut(Fn ) be a subgroup
subset of all v ∈ V such that Stab(v) is nontrivial. Let H
b ∩ Inn(Fn ). Let H
b y V nt be an action such that for each
with normal subgroup J = H
b the map v 7→ Φ · v is Φ-twisted equivariant.
Φ∈H
17
b and if the
If no subgroup StabFn (v) (v ∈ V nt (T )) is fixed by the whole group H,
free group J has rank ≥ 2, then the action J y T is nonelementary.
Remarks. Lemma 2.10 will be applied in Section 2.6 where we prove the oneg ] for which
b < Stab[T
edge case of Theorem F. In that first case we will have a group H
assumptions of the first paragraph of the lemma hold automatically (by Lemma 2.9).
Lemma 2.10 will also be applied in Section 8 where we prove the multi-edge case
of Theorem F. In the place where Lemma 2.10 is applied in that case, the group
g ], and H
b < Aut(Fn ) will not be contained in Stab[T
b will not act on T . Nonetheless
H
b will have a kind of “semi-action” on T which will be enough to give an action
H
b y V nt (T ) satisfying the assumptions of the first paragraph of the lemma.
H
Proof. The action J y T has trivial edge stabilizers because it is the restriction of
a free splitting action. Clearly also each point of V − V nt has trivial stabilizer. It
follows that for each nontrivial α ∈ J, either α is elliptic and its fixed point set
Fix(α) ⊂ T is a single point of V nt , or α is loxodromic with repeller–attractor pair
(∂− α, ∂+ α) ⊂ ∂T × ∂T and StabJ (∂− α) = StabJ (∂+ α) = StabJ {∂− α, ∂+ α} is an
infinite cyclic group.
We claim that there is no point v ∈ V nt (T ) which is fixed by every element
of J. Otherwise that point v is unique, and its stabilizer Bv = StabFn (v) is the
unique nontrivial vertex stabilizer fixed by the action of J, because the bijection
b also fixes Bv ,
v ↔ Bv is J-equivariant (by Lemma 2.5). It follows that each Φ ∈ H
−1
because J = ΦJΦ fixes Φ(Bv ) which is also a nontrivial vertex stabilizer, namely
the stabilizer of Φ · v; by uniqueness of Bv we therefore have Φ(Bv ) = Bv . Since this
b we have contradicted the hypothesis of the lemma, thus proving
holds for all Φ ∈ H,
the claim.
The proof that the action J y T is nonelementary now follows a standard argument. Some γ ∈ J is loxodromic, for otherwise by applying the claim it follows that
J has nontrivial elliptic elements α, β with Fix(α) 6= Fix(β) ∈ T but in that case
γ = αβ is loxodromic (see for example [CM87, Proposition 1.5]). Since rank(J) ≥ 2,
there exists δ ∈ J − StabJ {∂− γ, ∂+ γ}. It follows that γ and δγδ −1 are independent
loxodromic elements of J.
2.6
Case analysis of Theorem F. Proof of the one-edge case.
Adopting the notation of Theorem F, we may assume that H < IAn (Z/3). Choose
B to be a maximal, proper, H-invariant free factor system of Fn , and so H is fully
irreducible relative to the extension B ⊏ {[Fn ]}, meaning that there is no free factor
system A with strict nesting B ⊏ A ⊏ {[Fn } such that A is invariant under any finite
index subgroup of H, equivalently (since H < IAn (Z/3)) such that A is invariant
under H.
The proof of Theorem F breaks into two cases:
The one-edge case: The co-edge number of B equals 1.
18
The multi-edge case: The co-edge number of B is ≥ 2.
Proof of Theorem F in the one-edge case. Assuming that B ⊏ {[Fn ]} is a
one-edge extension, using that H < Stab(B), and applying Fact 2.6, there exists a
free splitting Fn y T with one edge orbit whose vertex stabilizer system forms the
free factor system B, and we have equality of stabilizer subgroups Stab(B) = Stab[T ].
It follows that H < Stab[T ]. Applying Lemma 2.9, consider the resulting action
g ] y T . We show that the restricted action H
b y T satisfies the conclusions
Stab[T
b Since every isometry of a tree is either
of Theorem F (using S = T and N = H).
elliptic or loxodromic, Conclusion (1) of Theorem F holds.
For proving Conclusion (2) of Theorem F we wish to apply Lemma 2.10 to the
b y T , so we must check its hypotheses. All the assumptions in the first
action H
g ].
b < Stab[T
paragraph of Lemma 2.10 hold by applying Lemma 2.9 to the subgroup H
b < Aut(Fn ) does not preserve
Also, by the hypothesis of Theorem F, the subgroup H
any proper, nontrivial free factor of Fn , in particular it does not preserve any nontrivial vertex stabilizer of the free splitting Fn y T . Finally, using the hypotheses of
b is not virtually abelian, it follows that
Theorem F saying that H is abelian and H
b
J has rank ≥ 2, for otherwise the group H < Aut(Fn ) < Out(Fk+1 ) would be solvable and hence virtually abelian (by [HM17c]), a contradiction. The conclusion of
Lemma 2.10 therefore holds, saying that the restricted action J y T is nonelemenb y T is therefore nonelementary, which verifies conclusion (2) of
tary. The action H
Theorem F.
Conclusion (3) of Theorem F says that each loxodromic element of J is a WWPD
b y T , and this is an immediate consequence of the next
element for the action H
lemma (will also be used in the multi-edge case of Theorem F):
Lemma 2.11. If G y T is a group action on a simplicial tree, and if J ⊳ G is a
normal subgroup such that the restricted action J y T has trivial edge stabilizers,
then each loxodromic element of J is a WWPD element of the action G y T .
Proof. We work with the simplicial metric on T that assigns length 1 to each edge.
Given an oriented line A ⊂ T , let the stabilizers of A under the actions of G and of
J be denoted
StabG (A) = {γ ∈ G γ(A) = A}
StabJ (A) = J ∩ StabG (A)
Consider a loxodromic µ ∈ J. Let Aµ ⊂ T denote its axis oriented so that µ translates in the positive direction, with repelling/attracting endpoints ∂− Aµ , ∂+ Aµ ∈ ∂T .
Since J y T has trivial edge stabilizers, the group StabJ (∂− Aµ ) = StabJ (∂+ Aµ ) =
StabJ (∂− Aµ , ∂+ Aµ ) is infinite cyclic.
To prove that µ satisfies WWPD with respect to the action G y T , it suffices
to prove that the ordered pair ∂± Aµ = (∂− Aµ , ∂+ Aµ ) is an isolated point in its orbit
G · (∂± Aµ ) ⊂ ∂T × ∂T − ∆ [HM15, Proposition 2.6]. We may assume that µ is a
19
generator for the infinite cyclic group StabJ (∂± Aµ ); if this is not already true then,
without affecting the WWPD property for µ, we may replace µ with a generator.
Letting ℓµ > 0 denote the integer valued length of a fundamental domain for the
action of µ on Aµ , it follows that any edge path in Aµ of length ℓµ is a fundamental
domain for the StabJ (∂± Aµ ) on Aµ . Choose a subsegment α ⊂ Aµ of length ℓµ + 1.
There is a corresponding neighborhood Uα ⊂ ∂T × ∂T − ∆ consisting of all endpoint
pairs of oriented lines in T containing α as an oriented subsegment. Consider γ ∈ G
such that γ(∂± Aµ ) ⊂ Uα . It follows that µ′ = γ −1 µγ ∈ J has axis Aµ′ = γ(Aµ ) and
that Aµ ∩ Aµ′ contains α, and hence Aµ ∩ Aµ′ has length ≥ ℓµ + 1. Also, the map
γ : Aµ′ → Aµ takes the restricted orientation of the subsegment Aµ ∩ Aµ′ ⊂ Aµ′ to
the restricted orientation on the subsegment γ(Aµ ∩ Aµ′ ) ⊂ Aµ . Let the edges of
the oriented segment Aµ ∩ Aµ′ be parameterized as E0 E1 E2 . . . EJ , J ≥ ℓµ . Since µ
and µ′ both have translation number ℓµ it follows that µ(E0 ) = µ′ (E0 ) = Eℓµ , and
so µ−1 µ′ ∈ StabJ (E). Since J has trivial edge stabilizers it follows that µ = µ′ and
so γ ∈ StabJ {∂− Aµ , ∂+ Aµ } = hµi. And having shown that γ preserves orientation,
it follows that γ(∂± Aµ ) = (∂± Aµ ). This shows that ∂± Aµ is isolated in its orbit
G · ∂± Aµ , being the unique element in the intersection Uα ∩ (G · ∂± Aµ ).
This completes the proof of Theorem F in the one-edge case.
3
Introduction to the multi-edge case of Theorem F.
The proof of Theorem F in the multi-edge case will take up the rest of the paper.
In this section, we give a broad outline of the methods of proof, followed by some
motivation coming from well-known constructions in geometric group theory.
3.1
Outline of the multi-edge case.
We will make heavy use of the theory of abelian subgroups of Out(Fn ) developed by
Feighn and Handel [FH09]. In very brief outline here are the main features of that
theory we will need.
Disintegration groups. ([FH09], and see Section 6.2) Any element of Out(Fn )
has a uniformly bounded power which is rotationless, meaning roughly that each of
various natural finite permutations induced by that element are trivial. Any rotationless φ ∈ Out(Fn ) has a particularly nice relative train track representative called
a CT. For any CT f : G → G there is an associated abelian subgroup D(f ) < Out(Fn )
that contains φ and is called the “disintegration subgroup” of f . The idea of the disintegration group is to first disintegrate or decompose f into pieces, one piece for
each non-fixed stratum Hr , equal to f on Hr and to the identity elsewhere. Then one
re-integrates those pieces to form generators of the group D(f ), by choosing a list
of non-negative exponents, one per non-fixed stratum, and composing the associated
powers of the pieces of f . However, in order for this composition to be continuous and
20
a homotopy equivalence, and for D(f ) to be abelian, the exponents in that list cannot
be chosen independently. Instead two constraints are imposed: the non-fixed strata
are partitioned into a collection of “almost invariant subgraphs” on each of which the
exponent must be constant; and certain linear relations are required amongst strata
that wrap around a common twist path of f .
The following key theorem about disintegration groups lets us study an abelian
subgroup of Out(Fn ) (up to finite index) by working entirely in an appropriate disintegration group:
Disintegration Theorem ([FH09, Theorem 7.2]). For every rotationless abelian
subgroup H < Out(Fn ) there exists φ ∈ H such that for every CT f : G → G
representing φ, the intersection H ∩ D(f ) has finite index in H.
The proof of Theorem F in the multi-edge case. The detailed proof is
carried out in Section 8.2, based on material whose development we soon commence.
Here is a sketch.
By a finite index argument we may assume that the abelian group H is rotationless
abelian. Let B be a maximal, proper, H-invariant free factor system of Fn . Being in
the multi-edge case means that B has co-edge number ≥ 2. From the Disintegration
Theorem we obtain φ ∈ H, and we apply the conclusions of that theorem to a CT
representative f : G → G of φ having a proper core filtration element Gt representing
B. We may assume that H < D(f ), by replacing H with its finite index subgroup
H ∩ D(f ). From the construction of the disintegration group D(f ), any core filtration
element properly contained between Gt and G would represent a free factor system
which is D(f )-invariant, hence H-invariant, contradicting maximality of B. Thus Gt
is the maximal proper core filtration element. Since B has co-edge number ≥ 2,
the top stratum Hu is an EG stratum. By maximality of Gt , every stratum strictly
between Gt and G is either an NEG-linear edge with terminal endpoint attached to
Gt or a zero stratum enveloped by Hu .
The hard work of the proof breaks into two major phases, the first of which is:
Sections 4, 5: Construction and hyperbolicity of S.
The hyperbolic metric space S needed for verifying the conclusions of Theorem F
is constructed in terms of the CT f : G → G (see Section 3.2 for further motivation
of the construction). First we describe S in the simpler case that f has no height u
indivisible Nielsen path. Starting with f : G → G, lift to the universal cover to
e → G.
e Let G
eu−1 ⊂ G
e be the total lift of Gu−1 . Collapse to a point each
obtain f˜ : G
e
e →G
e induces a
component of Gu−1 , obtaining a simplicial tree T . The map f˜ : G
map fT : T → T . Let S be the bi-infinite mapping cylinder of fT , obtained from
T × Z × [0, 1] by identifying (x, n, 1) ∼ (fT (x), n + 1, 0) for each x ∈ T and n ∈ Z.
The construction of S is more complex when Hu is geometric, meaning that f
has a unique (up to inversion) height u indivisible Nielsen path ρ, and ρ is closed,
21
e obtained by
forming a circuit c in G ([BFH00], and see [HM17a]). Each line c̃ ⊂ G
lifting c projects to a line in T called a geometric axis, and the projections to T of
the lifts of ρ in c̃ are fundamental domains for that axis. In the bi-infinite mapping
cylinder as defined above, the portion of the mapping cylinder corresponding to each
geometric axis is a quasiflat, contradicting hyperbolicity. Thus we do not take S to
be the bi-infinite mapping cylinder itself, instead S is constructed from the bi-infinite
mapping cylinder by coning off each geometric axis in T × n for each n ∈ Z, using
one cone point per geometric axis, attaching arcs that connect the cone point to the
endpoints of the fundamental domains of that axis.
In Section 5.5, we use the Mj-Sardar combination theorem [MS12] to prove hyperbolicity of S. The Mj-Sardar theorem, a generalization of the Bestvina-Feighn
Combination Theorem [BF92], requires us to verify a flaring hypothesis. To do this,
in Section 4 we study relative flaring properties of CT f : G → G, specifically: how
f flares relative to the lower filtration element Gu−1 ; and in the geometric case, how
f flares relative to the Nielsen path ρ. Then in Section 5, we study flaring properties
of the induced map fT : T → T (and, in the geometric case, flaring properties of the
induced map obtained by coning off each geometric axis of T ). The required flaring
hypothesis on S itself can then be verified in Section 5.5, allowing application of the
Mj-Sardar theorem to deduce hyperbolicity of S.
The other major phase of the proof is:
Sections 7, 8.1: Use the theory of disintegration groups to obtain an isometric acb y S with appropriate WWPD elements.
tion H
To do this, one uses that there is a number λ > 0 and a homomorphism
P FΛ : D(f ) → Z
such that for each ψ ∈ D(f ), the lamination Λ is an attracting lamination for ψ if
and only if P F (ψ) > 0, in which case the stretch factor is λPF(ψ) . One would like to
think of Hu as an EG stratum for ψ having Perron-Frobenius eigenvalue λPF(ψ) , but
this does not yet make sense because we do not yet have an appropriate topological
representative of ψ on G. We define a subgroup and sub-semigroup
D0 (f ) = Kernel(P FΛ )
D+ (f ) = P FΛ−1[0, ∞)
and we then lift the sequence of inclusions D0 (f ) ⊂ D+ (f ) ⊂ D(f ) < Out(Fn ) to a
sequence of inclusions to
b 0 (f ) ⊂ D
b + (f ) ⊂ D(f
b ) < Aut(Fn )
D
The hard work in Section 7 is to use the theory of disintegration groups to construct
b+ (f ) on T , in which each element Ψ ∈ D
b+ (f )
a natural action of the semigroup D
22
acts on T by stretching each edge by a uniform factor equal to λPF(ψ) , and such that
b+ (f ) the resulting map x 7→ Ψ · x of T is Ψ-twisted equivariant.
for each Ψ ∈ D
b0 we obtain an action on T by twisted equivariant
When restricted to the subgroup D
b0 y T with the one described in
isometries, which allows us to identify the action D
Lemma 2.9.
b+ (f )
Then what we do in Section 8.1 is to suspend the semigroup action of D
on T (and, in the geometric case, on the graph obtained by coning off geometric
b ) y S. By restriction we obtain the required
axes), obtaining an isometric action D(f
b y S.
action H
Finally,
Section 8.2: Put the pieces together and verify the conclusions of Theorem F.
The basis of the WWPD conclusions in the multi-edge case of Theorem F is Lemma 2.11,
which has already played the same role for the one-edge case.
3.2
Motivation: Suspension actions and combination theorems.
b ) y S may be motivated
The construction of the hyperbolic suspension action D(f
by looking at some familiar examples in a somewhat unfamiliar way.
Example: Mapping torus hyperbolization after Thurston. Consider a
pseudo-Anosov homeomorphism f : S → S of a closed, oriented hyperbolic surface
S of genus ≥ 2 with associated deck action π1 S y Se = H2 . The map f uniquely
determines an outer automorphism φ ∈ Out(π1 S). The associated extension group
Γ < Aut(π1 S) is the inverse image of the infinite cyclic group hφi < Out(π1 S) under the natural homomorphism Aut(π1 S) 7→ Out(π1 S). A choice of Φ ∈ Aut(π1 S)
representing φ naturally determines a semidirect product structure Γ ≈ π1 (S) ⋊Φ Z.
The deck transformation action π1 S y H2 extends naturally to an action Γ y H2 ,
whereby if Ψ ∈ Γ projects to ψ = φk then the action of Ψ on H2 , denoted FΨ : H2 →
H2 , is the lift of f k whose induced action on the circle at infinity ∂H2 agrees with the
induced action of γ. Equivalently, FΨ is the unique Ψ-twisted equivariant lift of f k .
Although the deck action π1 S y H2 is by isometries, the extended action Γ y H2 is
not by isometries.
However, there is a way to suspend the action Γ y H2 obtaining an isometric
action Γ y S, as follows. The suspension space S is the bi-infinite mapping cylinder obtained as the quotient of H2 × Z × [0, 1] under the identifications (x, n, 1) ∼
(FΦ (x), n+1, 0). One may check (and we shall do in Section 8.1 in a different context)
that there is an action Γ y S which is generated by letting π1 S act as the deck group
on H2 ≈ H2 × {0} ⊂ S and extending naturally over the rest of S, and by letting
Φ according to the formula Φ · (x, n, t) = (x, n − 1, t). One may also check that the
hyperbolic metrics on the slices H2 × n × 0 extend to a path metric on S, uniquely
up to quasi-isometry, such that the action Γ y S is by isometries.
23
Returning to the land of the familiar, the group Γ may be identified with the fundamental group of the 3-dimensional mapping torus Mf of the surface homeomorphism
f : S → S. By Thurston’s hyperbolization theorem applied to Mf , the suspension
space S may be identified up to Γ-equivariant quasi-isometry with the universal cover
ff ≈ H3 equipped with its deck transformation action by the group Γ ≈ π1 Mf .
M
Example: Mapping torus hyperbolization after [BFH97]. Consider now
an irreducible train track representative f : G → G of a nongeometric, fully irreducible outer automorphism φ ∈ Out(Fn ). Again we have a natural extension group
Γ < Aut(Fn ) of hφi ∈ Out(Fn ), with a semidirect product structure Γ = Fn ⋊Φ Z
determined by a choice of Φ ∈ Aut(Fn ) representing φ.
Unlike in the previous situation where we started with a surface homeomorphism,
here we have started with a non-homeomorphic topological representative f : G → G
e does not extend to an action Γ y G.
e But it does
of φ, and so the deck action Fn y G
extend to an action of the semigroup Γ+ which is the inverse image under Aut(Fn ) 7→
Out(Fn ) of the semigroup hφi+ = hφi i ∈ {0, 1, 2, . . .}i: for each Ψ ∈ Γ+ mapping to
e→G
e is the unique Ψ-twisted equivariant
φi with i ≥ 0, the associated map FΨ : G
e is by isometries, the semigroup action
lift of f i . Although the deck action Fn y G
e
Γ+ y G is not by isometries.
e to an isometric action
But there is a way to suspend the semigroup action Γ+ y G
e → G,
e defined exactly as
Γ y S where S is the bi-infinite mapping cyclinder of FΦ : G
e
above, namely the quotient space S of G × Z × [0, 1] where (x, n, 1) ∼ (FΦ (x), n + 1, 0)
with an appropriate metric. What is done in [BFH97, Theorem 5.1] is to apply
properties of the train track map f : G → G to prove a flaring hypothesis, allowing
one to apply Bestvina–Feighn combination theorem [BF92] to conclude that S is
Gromov hyperbolic, thus proving that Γ is a hyperbolic group.
Flaring methods. Our proof of the multi-edge case will use the combination
theorem of Mj and Sarder [MS12], a generalization of the Bestvina and Feighn combination theorem [BF92]. A common feature of the above examples that is shared
in the construction of this paper is that S is a “metric bundle over R”: there is a
Lipschitz projection map π : S 7→ R such that the minimum distance from π −1 (s) to
π −1 (t) equals s − t for all s, t ∈ R, and each point x ∈ S is contained in the image
of a geodesic section σ : R → S of the map π. In studying the large scale geometry
of S it is important to study quasigeodesic sections σ : R → S and their flaring
properties. In our context it is convenient to translate these concepts into dynamical
systems parlance: each such quasigeodesic section turns out to be a “pseudo-orbit”
of a suspension semiflow on S whose true orbits are the geodesic sections (see the
closing paragraphs of Section 8.2). The combination theorems of [MS12] and its predecessor [BF92] share key hypotheses regarding the asymptotic “flaring” behavior of
such pseudo-orbits (see Definition 4.9). We remark, though, that those combination
theorems hold in much more general settings, e.g. certain kinds of metric bundles over
more general metric base spaces.
24
In Section 4 we study flaring of pseudo-orbits in the context of a relative train
track map, which is then used in Section 5 to extend to further contexts building up
to the suspension space S, its metric bundle S 7→ R, and its pseudo-orbits, allowing
application of the Mj-Sardar combination theorem.
4
Flaring in a top EG stratum
We will assume that the reader is familiar with the basic concepts of Out(Fn ) that
are laid out in Section 3.1 of the first part of this paper [HM15], in particular the
terminology and notation of a CT having a top EG stratum occurring there under
the heading EG properties of CTs. Here is a brief review, in order to fix notations
for what follows in the rest of this paper; see [HM15, Section 3.1] for detailed citations drawn primarily from [FH11]. At present we need no more about CTs than is
described here; when needed in Section 6.1.1 we will give a more thorough review of
CTs.
Notations 4.1. We fix φ ∈ Out(Fn ) and a relative train track representative f : G → G
with associated f -invariant filtration ∅ = G0 ⊂ G1 ⊂ · · · ⊂ Gu = G satisfying the
following:
(1) The top stratum Hu is EG with Perron-Frobenius transition matrix Mu having
top eigenvalue λ > 1. The attracting lamination of φ corresponding to Hu is
denoted Λ+ or just Λ, and its dual repelling lamination is Λ− .
(2) There exists (up to reversal) at most one indivisible periodic Nielsen path ρ
of height u, meaning that ρ is not contained in Gu−1 . In this case ρ and its
inverse ρ̄ are Nielsen paths, and the following hold. It decomposes as ρ = αβ
where α, β are u-legal paths with endpoints at vertices, and (α, β) is the unique
illegal turn in Hu . At least one endpoint of ρ is disjoint from Gu−1 ; we assume
that ρ is oriented with initial point p 6∈ Gu−1 and terminal point q. The initial
and terminal directions are distinct fixed directions in Hu . The stratum Hu is
geometric if and only if ρ exists and is a closed path in which case p = q.
(3) From the matrix Mu one obtains an eigenlength function lPF (σ) defined on all
paths σ in G having endpoints at vertices, and having the following properties:
(a) for each edge E ⊂ G we have lPF (E) = 0 if and only if E ⊂ Gu−1 ;
(b) in general if σ = E1 . . . EK then lPF (σ) = lPF (E1 ) + · · · + lPF (EK );
(c) for all edges E ⊂ G we have lPF (f (E)) = λ lPF(E).
(d) If ρ = αβ exists as in (2) then lPF (α) = lPF (β) = 21 lPF (ρ).
(4) If γ is a path with endpoints at vertices of Hu or a circuit crossing an edge of
Hu then for all sufficiently large i the path f#i (γ) has a splitting with terms in
the set {edges of Hu } ∪ {ρ, ρ̄} ∪ {paths in Gu−1 with endpoints in Hu }.
25
In what follows, there are three cases to consider: the ageometric case where ρ does
not exist; the parageometric case where ρ exists but is not closed; and the geometric
case where ρ exists and is closed. Occasionally we will need to consider these cases
separately. But for the most part we will attempt to smoothly handle all three cases
simultaneously, using the following conventions:
• In the ageometric case, where ρ does not exist, the notation ρ should simply
be ignored (for an exception see the “Notational Convention” following Corollary 4.4);
• In the parageometric case, where ρ exists but is not closed, the notations ρn for
n ≥ 2 should be ignored.
This completes Notations 4.1.
The main result of this section is Proposition 4.10, a uniform flaring property for
the top EG stratum Hu of f . This result generalizes [BFH97, Theorem 5.1 and Lemma
5.6] which covers the special case that f is a nongeometric train track map, that is,
u = 1 and if ρ exists then it is not closed. There are two features which distinguish
our present general situation from that special case. First, our flaring property is
formulated relative to the penultimate filtration element Gu−1 of G. Second, if the
height u indivisible Nielsen path ρ exists then our flaring property is formulated
relative to ρ. Taken together, these two features require very careful isolation and
annihilation of the metric effects of paths in Gu−1 and of the path ρ. This task
is particularly tricky in the geometric case where ρ exists and is closed, in which
situation we must also annihilate the effects of all iterates ρn .
4.1
The path functions Lu and LPF .
Throughout this paper, and following standard terminology in the literature of relative
train track maps, a (finite) path in a graph G is by definition a locally injective
continuous function σ : [0, 1] → G. We often restrict further by requiring that the
endpoints σ(0), σ(1) be vertices in which case σ is a concatenation of edges without
backtracking. A more general concatenation of edges in which locally injectivity may
fail, hence backtracking may occur, will be called an “edge path”.
Generalizing the eigenlength function lPF of Notations 4.1 (3), a path function on
a graph is simply a function l(·) which assigns, to each finite path σ having endpoints
at vertices, a number l(σ) ∈ [0, ∞), subject to two metric-like properties:
• l(·) is symmetric, meaning that l(σ) = l(σ̄).
• l(·) assigns length zero to any trivial path.
We do not require that l(σ) > 0 for all nontrivial paths σ. We also do not generally
require any version of the triangle inequality, but see Lemma 4.7 and the preceding
26
discussion regarding coarse triangle inequalities for the path functions of most interest
to us.
Henceforth in this section we adopt adopt Notations 4.1.
The “big L” path functions Lu , LPF are defined in terms of auxiliary “little l”
path functions lu , lPF by omitting certain terms. The function lPF is already defined
in Notations 4.1 (3).
Consider a path σ in G with edge path decomposition σ = E1 . . . EK . Define
lu (σ) to be the number of terms Ek contained in Hu . Now define Lu (σ) and LPF (σ)
by summing lu (Ek ) and lPF (Ek ) (respectively) only over those terms Ek which do
not occur in any ρ or ρ̄ subpath of σ. Note that for each edge E ⊂ G the “little l”
eigenvector equation lPF (f (E)) = λ lPF (E) implies:
“Big L” eigenvector equation:
LPF (f (E)) = λ LPF (E) for all edges E ⊂ G.
To see why this holds, if E ⊂ Gu−1 both sides are zero. For E ⊂ Hu this follows from
the fact that f (E) is Hu -legal and hence has no ρ or ρ̄ subpath.
The following “quasicomparability” result is an obvious consequence of the fact
that the Perron-Frobenius eigenvector of the transition matrix Mu has positive entries:
Lemma 4.2. There is a constant K = K4.2 (f ) ≥ 1 such that for all edges E of Hu
we have K1 LPF (E) ≤ Lu (E) ≤ K · LPF (E).
The next lemma says in part that ρ and ρ̄ subpaths never overlap.
Lemma 4.3 (Isolation of ρ). For any path σ in G with endpoints, if any, at vertices,
there is a unique decomposition σ = . . . σi . . . σj . . . with the following properties:
(1) Each term σi is an edge or a copy of ρ or ρ̄.
(2) Every subpath of σ which is a copy of ρ or ρ̄ is a term in the decomposition.
Note that we do not assume σ is finite in this statement.
Leaving the proof of Lemma 4.3 for the end of Section 4.1, we give applications.
For a path σ in G with endpoints at vertices, let Kρ (σ) denote the number of ρ or ρ̄
subpaths in the Lemma 4.3 decomposition of σ.
Corollary 4.4 (Some formulas for Lu and LPF ). For any finite path σ with endpoints
at vertices, letting its Lemma 4.3 decomposition be σ = σ1 . . . σB , we have
(
lu (σ) − Kρ (σ) · lu (ρ) in general
Lu (σ) =
lu (σ)
if ρ does not exist
27
and similarly
LPF (σ) =
(
lPF (σ) − Kρ (σ) · lPF (ρ) in general
lPF (σ)
if ρ does not exist
Notational convention when ρ does not exist: Motivated by Corollary 4.4, we
extend the meaning of the notations lu (ρ) and lPF (ρ) to the case that ρ does not exist
by defining
lu (ρ) = lPF (ρ) = 0
Corollary 4.5. For any finite path σ in G with endpoints at vertices, there is a
unique decomposition σ = µ0 ν1 µ1 . . . νA µA with the following properties:
(1) If ρ does not exist then A = 0 and σ = µ0 .
(2) If ρ exists then each νa is an iterate of ρ or ρ̄ (the iteration exponent equals 1
if ρ is not closed), and each µa contains no ρ or ρ̄ subpath.
(3) If ρ exists, and if 1 ≤ a < a + 1 ≤ A − 1, then at least one of the subpaths
µa , µa+1 contains an edge of Hu ; if in addition ρ is closed then each µa subpath
contains an edge of Hu .
Note that in the context of Corollary 4.5 the subpaths µa are nondegenerate for
1 ≤ a ≤ A − 1, but the subpaths µ0 and µA are allowed to be degenerate.
Proof. Everything is an immediate consequence of Lemma 4.3 except perhaps
item (3), which follows from the fact that at least one endpoint of ρ is disjoint
from Gu−1 (Notations 4.1 (2)).
The following is an immediate consequence of Lemma 4.3 and Corollary 4.5, with
Lemma 4.2 applied term-by-term for the “Furthermore” part:
Corollary 4.6 (More formulas for Lu and LPF ). For any finite path σ with endpoints
at vertices, and using the Corollary 4.5 decomposition of σ, we have
Lu (σ) =
A
X
a=1
Lu (µa ) =
A
X
lu (µa ),
LPF (σ) =
a=1
A
X
a=1
LPF (µa ) =
A
X
lPF (µa )
a=1
Furthermore, letting K = K4.2 (f ) ≥ 1, we have
1
LPF (σ) ≤ Lu (σ) ≤ K · LPF (σ)
K
The latter inequality of Corollary 4.6 gives us the freedom to switch back and forth
between LPF and Lu , using Lu in more combinatorial situations and LPF in more
geometric situations through much of the rest of the paper.
28
Coarse triangle inequalities for Lu and LPF . The path functions lu and lPF
satisfy a version of the triangle inequality: for any two paths γ, δ with endpoints at
vertices such that the terminal vertex of γ equals the initial vertex of δ we have
lu [γδ] ≤ lu (γ) + lu (δ),
lPF [γδ] ≤ lPF (γ) + lPF (δ)
where [·] denotes the operation that straightens an edge path rel endpoints to obtain
a path. For Lu and LPF the best we can get are coarse triangle inequalities:
Lemma 4.7. There exists a constant C = C4.7 such that for any finite paths γ, δ in G
with endpoints at vertices such that the terminal point of γ coincides with the initial
point of δ we have
Lu [γδ] ≤ Lu (γ) + Lu (δ) + C
LPF [γδ] ≤ LPF (γ) + LPF (δ) + C
Proof. Consider the Lemma 4.3 decompositions of γ and δ. We may write γ = γ1 γ2 γ3 ,
δ = δ1 δ2 δ3 so that [γδ] = γ1 γ2 δ2 δ3 and so that the following hold: γ1 is a concatenation
of terms of the Lemma 4.3 decomposition of γ, and γ2 is either degenerate or an initial
subpath of a single ρ or ρ̄ term of that decomposition; δ2 is either degenerate or a
terminal subpath of a single ρ or ρ̄ term of the Lemma 4.3 decomposition of δ, and
δ3 is a concatenation of terms of that decomposition. It follows that
Lu [γδ] ≤ Lu (γ1 ) + lu (γ2 ) + lu (δ2 ) + Lu (δ3 )
≤ Lu (γ) + Lu (δ) + 2lu (ρ)
and similarly
LPF [γδ] ≤ LPF (γ) + LPF (δ) + 2lPF (ρ)
Quasi-isometry properties of f . The next lemma describes quasi-isometry properties of the relative train track map f : G → G with respect to the path functions Lu
and LPF .
Lemma 4.8. There exist constants D = D4.8 > 1, E = E4.8 > 0 such that for any
finite path γ in G with endpoints at vertices, the following hold:
Lu (f# (γ)) ≤ D · Lu (γ) + E
LPF (f# (γ)) ≤ D · LPF (γ) + E
and Lu (γ) ≤ D · Lu (f# (γ)) + E
and LPF (γ) ≤ D · LPF (f# (γ)) + E
(1)
(2)
Proof. Once D, E are found satisfying (1), by applying Corollary 4.6 we find D, E
satisfying (2), and by maximizing we obtain D, E satisfying both.
29
If ρ exists let P be its endpoint set, a single point if Hu is geometric and two
points otherwise; and if ρ does not exist let P = ∅. Each point of P is fixed by f . By
elementary homotopy theory (see e.g. Lemma 4.14 (1) in Section 4.6), the map of pairs
f : (G, P ) → (G, P ) has a homotopy inverse f¯ : (G, P ) → (G, P ) in the category of
topological pairs. By homotoping f¯ rel vertices, we may assume that f¯ takes vertices
to vertices and edges to (possibly degenerate) paths. If ρ exists then, using that
ρ = f# (ρ), and applying f¯# to both sides, we obtain f¯# (ρ) = f¯# (f# (ρ)) = ρ.
We prove the following general fact: if g : (G, P ) → (G, P ) is a homotopy equivalence of pairs which takes vertices to vertices and takes edges to paths, and if g# (ρ) = ρ
assuming ρ exists, then there exist D ≥ 1, E ≥ 0 such that for each path δ with endpoints at vertices we have
Lu (g# (δ)) ≤ D · Lu (δ) + E
(3)
This obviously suffices for the first inequality of (1) taking g = f and δ = γ. It also
suffices for the second inequality of (1) taking g = f¯ and δ = γ because in that case
we have g# (ρ) = f¯# (ρ) = f¯# (f# (ρ)) = ρ.
To prove (3), consider the Corollary 4.5 decomposition γ = µ0 ν1 µ1 . . . νA µA .
Applying Corollary 4.6 we have
Lu (γ) = lu (µ0 ) + · · · + lu (µA )
We also have
g# (γ) = [g# (µ0 ) ν1 g# (µ1 ) . . . νA g# (µA )]
By inductive application of Lemma 4.7 combined with the fact that each Lu (νa ) = 0,
it follows that
Lu (g# (γ)) ≤ Lu (g# (µ0 )) + · · · + Lu (g# (µA )) + 2 A C4.7
≤ lu (g# (µ0 )) + · · · + lu (g# (µA )) + 2 A C4.7
≤ D ′ (lu (µ0 ) + · · · + lu (µA )) + 2 A C4.7
where D ′ is the maximum number of Hu edges crossed by g(E) for any edge E ⊂ G.
If ρ does not exist then A = 0 and we are done. If ρ exists then, by Corollary 4.6 (3),
if 1 ≤ a ≤ a + 1 ≤ A − 1 then at least one of lu (µa ), lu (µa+1 ) is ≥ 1. It follows that
A ≤ 2(lu (µ0 ) + · · · + lu (µA )) + 3 and therefore
Lu (g# (γ)) ≤ (D ′ + 4 C4.7 )Lu (γ) + 6 C4.7
Proof of Lemma 4.3. The lemma is equivalent to saying that two distinct ρ or
e this is
ρ̄ subpaths of σ cannot overlap in an edge. Lifting to the universal cover G
e if µ̃ and µ̃′ are subpaths of σ̃ each of
equivalent to saying that for any path σ̃ ⊂ G,
30
which projects to either ρ or ρ̄, and if µ̃ and µ̃′ have at least one edge in common,
then µ̃ = µ̃′ .
As a first case, assume that µ̃ and µ̃′ both project to ρ or both project to ρ̄; up
to reversal we may assume the former. Consider the decomposition ρ = αβ where
α, β are legal and the turn (ᾱ, β) is illegal and contained in Hu . There are induced
decompositions µ̃ = α̃β̃ and µ̃′ = α̃′ β̃ ′ . If the intersection µ̃ ∩ µ̃′ contains the height
u illegal turn of µ̃ or µ̃′ then µ̃ = µ̃′ so assume that it does not. After interchanging
µ̃ and µ̃′ we may assume that µ̃ ∩ µ̃′ ⊂ β̃. Projecting down to ρ we see that β = β1 β2
and α = α1 α2 where β2 = α1 is the projection of µ̃ ∩ µ̃′ . This implies the initial
directions of ᾱ1 and of β2 (which are respectively equal to the terminal and initial
directions of ρ) are fixed, distinct, and in Hu , and so for all k ≥ 0 the initial directions
of f#k (ᾱ1 ) and of f#k (β2 ) are also fixed, distinct, and in Hu . Using the eigenlength
function lPF (Notations 4.1 (3)) we have lPF (α) = lPF (β) and lPF (α1 ) = lPF (β2 ) and
so lPF (α2 ) = lPF (β1 ). Thus when the path f#k (α1 )f#k (α2 )f#k (β1 )f#k (β2 ) is tightened to
form f#k (ρ) = ρ for large k, the subpaths f#k (α2 ) and f#k (β1 ) cancel each other out,
and so the concatenation f#k (α1 )f#k (β2 ) tightens to ρ. But this contradicts that the
two terms of the concatenation are u-legal and that the turn {f#k (ᾱ1 ), f#k (β2 )} taken
at the concatenation point is also u-legal as seen above.
The remaining case is that orientations on the projections of µ̃ and µ̃′ do not
agree. In this case there is either an initial or terminal subpath of ρ that is its own
inverse, which is impossible.
4.2
Flaring of the path functions Lu and LPF
In this section we continue to adopt Notations 4.1.
For each path function l on G and each η ≥ 0 we define a relation β ∼ γ on paths
β, γ in G with endpoints at vertices: this relation means that there exist paths α, ω
with endpoints at vertices such that γ = [αβω] and such that l(α), l(γ) ≤ η. Note
that this relation is symmetric because β = [ᾱγ ω̄]. When we need to emphasize the
η
dependence of the relation on l and η we will write more formally β ∼l γ.
Definition 4.9. A path function l on G is said to satisfy the flaring condition with
respect to f : G → G if for each µ > 1, η ≥ 0 there exist integers R ≥ 1 and
A ≥ 0 such that for any sequence of paths β−R , β−R+1 , . . . , β0 , . . . , βR−1 , βR in G with
endpoints at vertices, the flaring inequality
µ · l(β0 ) ≤ max{l(β−R ), l(βR )}
holds if the following two properties hold:
Threshold property: l(β0 ) ≥ A;
Pseudo-orbit property: βr
η
∼
l
f# (βr−1 ) for each −R < r ≤ R.
31
Remark. These two properties are translations into our present context of two
requirements in the original treatment of flaring by Bestvina and Feighn [BF92]: the
threshold property corresponds to the requirement of large “girth”; and the “pseudoorbit property” corresponds to the “ρ-thin” requirement.
Proposition 4.10 (General Flaring). The path functions Lu and LPF each satisfy
the flaring condition with respect to f : G → G, with constants R = R4.10 (µ, η) and
A = A4.10 (µ, η).
Much of the work is to prove the following, which is a version of Proposition 4.10
under the special situation of Definition 4.9 where l = LPF and η = 0. Note that
η = 0 implies that βr = f# (βr−1 ), and so the choice of γ = β−R determines the whole
sequence up to βR .
Lemma 4.11 (Special Flaring for Lu ). For any ν > 1 there exist positive integers
N ≥ 1 and A = A4.11 ≥ 0 so that if γ is a finite path in G with endpoints at vertices
and if Lu (f#N (γ)) ≥ A then
νLu (f#N (γ)) ≤ max{Lu (γ), Lu (f#2N (γ))}
The proof of this special flaring condition, which takes up Sections 4.3–4.5, is
similar in spirit to [BFH97, Theorem 5.1], and is based on two special cases: a
“negative flaring” result, Lemma 4.12 in Section 4.3; and a “positive flaring” result,
Lemma 4.13 (4) in Section 4.4. These two special cases are united in Section 4.5,
using the uniform splitting property given in Lemma 3.1 of [HM15], in order to prove
the Special Flaring Condition.
Before embarking on all that, we apply Lemma 4.11 to:
Proof of Proposition 4.10. Applying Corollary 4.6 it is easy to see that Lu satisfies
a flaring condition if and only if LPF satisfies a flaring condition. Thus it suffices to
assume that the special flaring condition for Lu holds, and use it to prove the general
flaring condition for Lu . The idea of the proof is standard: the exponential growth
η
given by Proposition 4.10 swamps the constant error represented by the relation L∼
u
which we will denote in shorthand as ∼. The hard work is to carefully keep track of
various constants and other notations.
η
Fixing µ > 1 and η ≥ 0, consider the relation ∼ given formally as L∼ . Fix an
u
integer R ≥ 1 whose value is to be determined — once an application of Lemma 4.11
has been arranged, R will be set equal to the constant N of that lemma.
Consider a sequence of paths
β−R , β−R+1 , . . . , β0 , . . . , βR−1 , βR
in G with endpoints at vertices, such that we have
βr ∼ f# (βr−1 ) for
32
−R < r ≤R
Choose a vertex V ∈ G which is f -periodic, say f K (V ) = V for some integer K ≥ 1.
We may assume that β0 has endpoints at V : if not then there are paths α0′ , ω0′ of
uniformly bounded length such that β0′ = [α0′ β0 ω0′ ] has endpoints at V , and replacing
β0 with β0′ reduces the flaring property as stated to the flaring property with uniform
changes to the constants µ, η, and A.
We choose several paths with endpoints at vertices, denoted αr , ωr , γr , αr′ , ωr′ , as
follows. First, using that f# (βr−1 ) ∼ βr , there exist αr , ωr so that Lu (αr ), Lu (ωr ) ≤ η
and βr = [αr f# (βr−1 ) ωr ] and hence f# (βr−1 ) = [ᾱr βr ω̄r ]. Next, anticipating an
application of Lemma 4.11, choose γ−R so that f#R (γ−R ) = β0 , and then for −R ≤
r ≤ R let γr = f#r+R (γ−R ), hence γ0 = β0 . Finally, choose αr′ , ωr′ so that γr = [αr′ βr ωr′ ]
and hence βr = [ᾱr′ γr ω̄r′ ] (in particular α0′ , ω0′ are trivial paths). We also require αr′ , ωr′
to be chosen so that if r > −R then we have
′
′
f# (βr−1 ) = f# (ᾱr−1
γr−1 ω̄r−1
)
′
′
= [f# (ᾱr−1
) γr f# (ω̄r−1
)]
′
′
′
′
= [f# (ᾱr−1 ) αr βr ωr f# (ω̄r−1
)]
′
′
)]
= [f# (ᾱr−1
) αr′ ] βr [ωr′ f# (ω̄r−1
{z
}
{z
}
|
|
= ᾱr
= ω̄r
from which we record the following identities:
(∗)
′
ᾱr = [f# (ᾱr−1
)αr′ ]
′
ω̄r = [ωr′ f# (ω̄r−1
)]
To see why these choices of γr , αr′ , ωr′ are possible, we work with a lift to the universal
e → G.
e First choose any lift β̃−R . By induction for −R < r ≤ R the lifts
cover f˜ : G
α̃r , ω̃r , β̃r are determined by the equation β̃r = [α̃r f˜# (βr−1 )ω̃r ]. Using f -periodicity
of V , the f˜R -preimages of the initial and terminal vertices of β̃0 contain vertices of
e amongst which we choose the initial and terminal vertices of γ̃−R , respectively; it
G
follows that f˜#R (γ̃−R ) = β̃0 . Then define γ̃r = f˜#r+R (γ̃−R ), define α̃r′ to be the path
from the initial vertex of γ̃r to the initial vertex of β̃r , and define ω̃r′ to be the path
e
from the terminal vertex of β̃r to the terminal vertex of γ̃r . Projecting down from G
to G we obtain the paths γr , αr′ , ωr′ . The identities (∗) follow from the evident fact
that the paths α̃r′ , α̃r may be concatenated to form a path α̃r′ α̃r , that the two paths
′
′
α̃r′ α̃r and f# (α̃r−1
) have the same initial endpoint as f# (γr−1
) = γr , and that those
two paths have the same terminal endpoint as the initial endpoint of f˜# (β̃r−1 ); and
similarly for the ω’s.
We need new upper bounds on the quantities Lu (αr′ ) and Lu (ωr′ ) which represent
the difference between Lu (βr ) and Lu (γr ). These bounds will be expressed in terms
of the known upper bound η on Lu (αr ) and Lu (ωr ), and will be derived by applying
applying Lemmas 4.7 and 4.8 inductively, starting from Lu (α0′ ) = Lu (ω0′ ) = 0 and
applying (∗) in the induction step. These new upper bounds will then be used to
derive an expression for the threshold constant A4.10 , which will be so large so that
the differences Lu (αr′ ), Lu (ωr′ ) become insignificant.
33
The new upper bounds have the form
Lu (αr′ ), Lu (ωr′ ) ≤ Fr (C, D, E, η) for −R ≤ r ≤ R
where for each r the expression Fr (C, D, E, η) represents a certain polynomial with
integer coefficients in the variables C, D, E, η and where we substitute
C = C4.7 ,
D = D4.8 ,
E = E4.8
The proofs of these inequalities are almost identical for α′ and for ω ′ ; we carry out
the proof for the latter. To start the induction, since γ0 = β0 the path ω0′ degenerates
to a point and so Lu (ω0′ ) = 0 ≡ F0 (C, D, E, η). Inducting in the forward direction on
the interval 1 ≤ r ≤ R, and using from (∗) that
′
ωr′ = [ω̄r f# (ωr−1
)]
we have
′
Lu (ωr′ ) ≤ Lu (ωr ) + Lu (f# (ωr−1
)) + C
≤ η + D · Fr−1 (C, D, E, η) + E + C
≡ Fr (C, D, E, η)
Inducting in the backward direction on the interval −R ≤ r ≤ −1, and using from
(∗) that
′
f# (ωr′ ) = [ωr+1 ωr+1
]
we have
Lu (ωr′ ) ≤ D · Lu (f# (ωr′ )) + E
′
≤ D · (Lu (ωr+1 ) + Lu (ωr+1
) + C) + E
≤ D(η + Fr+1 (C, D, E, η) + C) + E
≡ Fr (C, D, E, η)
To summarize, we have proved
′
′
Lu (α−R
), Lu (ω−R
) ≤ F−R (C, D, E, η)
′
′
Lu (αR ), Lu (ωR ) ≤ FR (C, D, E, η)
From this it follows that
′
′
Lu (γ−R ) ≤ Lu (α−R
) + Lu (β−R ) + Lu (ω−R
) + 2C
≤ Lu (β−R ) + 2F−R (C, D, E, η) + 2C
34
and similarly
Lu (γR ) ≤ Lu (βR ) + 2FR (C, D, E, η) + 2C
Let M = 2 max{F−R (C, D, E, η) + FR (C, D, E, η)} + 2C, which we use below in
setting the value of the threshold constant A4.10 .
Now apply Lemma 4.11, the special flaring condition for Lu , with the constant
ν = 2µ − 1 > 1, to obtain integers N ≥ 1 and A4.11 . Setting R = N, from the
threshold requirement Lu (β0 ) ≥ A4.11 it follows that
νLu (β0 ) = νLu (γ0 )
≤ max{Lu (γ−R ), Lu (γR )}
≤ max{Lu (β−R ), Lu (βR )} + M
With the additional threshold requirement Lu (β0 ) ≥
2M
ν−1
we have:
νLu (β0 ) ≤ max{Lu (β−R ), Lu (βR )} +
µLu (β0 ) =
ν +1
Lu (β0 ) ≤ max{Lu (β−R ), Lu (βR )}
2
ν−1
Lu (β0 )
2
Thus we have proved the (general) flaring condition for Lu given any µ ≥ 1, η ≥ 0,
2M
}.
using R4.10 = N and A4.10 = max{A4.11 , ν−1
4.3
Negative flaring of Lu
We continue to adopt Notations 4.1.
In the context of Lemma 4.11 on Special Flaring for Lu , the next lemma establishes
flaring in the “negative direction”.
For any path σ ⊂ G, define lu− (σ) to be the maximum of lu (τ ) over all paths τ in G
such that that τ is a subpath both of σ and of some leaf ℓ of Λ− realized in G. In this
definition we may always assume that ℓ is a generic leaf of Λ− , because every finite
subpath of every leaf is a subpath of every generic leaf. Notice that if σ is already a
subpath of a leaf of Λ− then lu− (σ) = lu (σ).
Lemma 4.12. There exists L4.12 ≥ 1 such that for each L ≥ L4.12 and each a > 0
there exists an integer N ≥ 1, so that the following holds: for each n ≥ N, for each
finite subpath τ of a generic leaf ℓ of Λ− realized in G such that τ has endpoints at
vertices and such that lu− (τ ) = lu (τ ) = L, and for each finite path σ in G, if f#n (σ) = τ
then lu− (σ) ≥ aL.
Intuitively, at least in the nongeometric case (see the proof of Proposition 6.0.8
of [BFH00], page 609), the point of this lemma is that in any leaf of Λ− , the illegal
turns have a uniform density with respect to the path function lu , and those turns
die off at an exponential rate under iteration of f# .
35
Proof. For the proof, a height u illegal turn in a path σ is said to be out of play if it
is the illegal turn in some ρ or ρ̄ subpath of σ, otherwise that turn is in play.
The generic leaf ℓ of Λ− , as realized in G, is birecurrent, is not periodic, and is
not weakly attracted to Λ+ under iteration of f# . It follows that ℓ does not split as
a concatenation of u-legal paths and copies of ρ and ρ̄. By applying Lemma 4.3 it
follows that ℓ has an illegal turn that is in play. In addition, ℓ is quasiperiodic with
respect to edges of Hu [BFH00, Lemma 3.1.8]: for any integer L > 0 there exists an
integer L′ > 0 such that for any finite subpaths α, β of ℓ, if lu (α) = L and lu (β) ≥ L′
then β contains a subpath which is a copy of α. It follows that there exists an integer
L4.12 > 0 so that if τ is a subpath of ℓ such that lu (τ ) ≥ L4.12 , then τ has at least
three height u illegal turns that are in play.
Arguing by contradiction, if the lemma fails using the value of L4.12 just given
then there exist L ≥ L4.12 , a > 0, positive integers ni → +∞, finite paths τi in G
with endpoints at vertices, and paths σi in G, such that τi is a subpath of ℓ, and
lu (τi ) = L, and f#ni (σi ) = τi , and lu− (σi ) < aL. We derive contradictions in separate
cases.
+
Case 1: lu (σi ) has an upper bound B. Decompose σi as σi = ǫ−
i ηi ǫi where
ǫ±
i are each either partial edges or trivial, and where ηi is a path with endpoints at
vertices. By [HM17a, Lemma 1.53] there exists a positive integer d depending only
on B such that for each i the path f#d (ηi ) has a splitting into terms each of which
is either a single edge in Hu , a copy of ρ or ρ̄, or a subpath of Gu−1 , and therefore
each height u illegal turn in the interior of f#d (ηi ) is out of play. For each i such
that ni ≥ d the paths f#ni (ǫ±
i ) are each u-legal, and each height u illegal turn of
ni
ni −d
ni +
d
n
f# (ηi ) = f# (f# (ηi )) is out of play. Since τi is obtained from f#ni (ǫ−
i )f# (ηi )f# (ǫi )
by tightening, at most two illegal turns of τi are in play, a contradiction to our choice
of L4.12 .
Case 2: lu (σi ) has no upper bound. Consider a line M in G which is a weak
limit of a subsequence σim such that M crosses at least one edge of Hu . We apply to
each such M the weak attraction results of [HM17c] as follows. If Hu is non-geometric
then there are two options for M: either the closure of M contains Λ− ; or M is weakly
attracted to Λ+ [HM17c, Lemma 2.18]. If Hu is geometric — and so a height u closed
indivisible Nielsen path ρ exists — then there is a third option, namely that M is a
bi-infinite iterate of ρ or ρ̄ [HM17c, Lemma 2.19].
Since no σi contains a subpath of a leaf of Λ− that crosses aL edges of Hu , neither
does M. This shows that the closure of M does not contain Λ− . If M were weakly
attracted to Λ+ then for any K > 0 there would exist l > 0 such that f#l (M), and
hence f#l (σim ) for all sufficiently large m, contains a u-legal subpath that crosses
2K + 1 edges of Hu . By [BFH00] Lemma 4.2.2 we can choose K so that f#l (σim )
splits at the endpoints of the middle Hu edge of that subpath, and hence the number
n −l
of edges of Hu crossed by τim = f#im (f#l (σim )) goes to infinity with m, contradicting
that lu (τi ) = L.
We have shown that each of the first two options leads to a contradiction for any
36
choice of M as above. This concludes the proof if Hu is nongeometric.
It remains to show that if Hu is geometric then the third option can also be avoided
by careful choice of M, and hence the desired contradiction is achieved. That is, we
show that there exists a weak limit M of a subsequence of σi such that M contains at
least one edge of Hu and M is not a bi-infinite iterate of the closed path ρ or ρ̄. This
may be done by setting up an application of [HM17c, Lemma 1.11], but it is just as
simple to give a direct proof. Lift σi to the universal cover of G and write it as an edge
ei1 E
ei2 . . . E
eiJ ⊂ G;
e the first and last terms are allowed to be partial edges.
path σ̃i = E
i
Let b equal twice the number of edges in ρ. Given j ∈ {1 + b, . . . , Ji − b}, we say that
eij is well covered if E
ei,j−b, E
ei,j+b are full edges and there is a periodic line ρ̃ij ⊂ G
e
E
ei,j−b . . . E
eij . . . E
ei,j+b as a subpath. Since
that projects to ρ or to ρ̄ and that contains E
the intersection of distinct periodic lines cannot contain two fundamental domains of
eij and E
ei,j+1 are well covered
both lines, ρ̃ij is unique if it exists. Moreover, if both E
eij is well covered then we can inductively move
then ρ̃ij = ρ̃i,j+1. It follows that if E
forward and backward past other well covered edges of σ̃i all in the same lift of ρ,
until either encountering an edge that is not well covered, or encountering initial and
terminal subsegments of σ̃i of uniform length. After passing to a subsequence, one of
the following is therefore satisfied:
(1) There exists a sequence of integers Ki such that 1 < Ki < Ji , and Ki → ∞,
eiK ⊂ H
e u is not well covered.
and Ji − Ki → ∞, and such that E
i
(2) σi = αi ρpi βi where the number of edges crossed by αi and βi is bounded independently of i and pi → ∞.
If subcase (1) holds then the existence of a weak limit that crosses an edge of Hu
and is not a bi-infinite iterate of ρ or ρ̄ follows immediately. If subcase (2) holds, τi
is obtained from f#ni (αi )ρpi f#ni (βi ) by tightening. Since the number of illegal turns
of height u in the first and last terms is uniformly bounded, the number of edges
that are cancelled during the tightening is uniformly bounded, and it follows that τi
contains ρqi as a subpath where |qi | → ∞, a contradiction to the fact that ρ is not a
leaf of Λ− .
4.4
Positive flaring and other properties of Lu
In this section we continue to adopt Notations 4.1.
In the context of Lemma 4.11 on Special Flaring for Lu , item (4) of Lemma 4.13
establishes flaring in the “positive direction”. Lemma 4.13 also includes several useful
metrical/dynamical properties of Lu , which will be used in Section 4.5 where we tie
together the negative and positive flaring results to prove Lemma 4.11.
The lemma and its applications make use of the path map f## and its properties as
laid out in [HM17a] Section 1.1.6, particularly the “## Lemma” [HM17a, Lemma 1.6].
Roughly speaking, the path f## (σ) is defined for any finite path σ in G as follows:
37
for any finite path τ that contains σ the straightened image f# (τ ) contains a subpath
of f# (σ) that is obtained by deleting initial and terminal subpaths of f# (σ) that are
no longer than the bounded cancellation constant of f ; the path f## (σ) is the longest
such subpath of f# (σ) which survives this deletion operation for all choices of τ .
Lemma 4.13. The following conditions hold:
(1) For each path σ with endpoints at vertices and any decomposition into subpaths
σ = σ0 σ1 . . . σK with endpoints at vertices we have
PK
PK
0 Lu (σk )
0 Lu (σk ) − K lu (ρ) ≤ Lu (σ) ≤
and similarly with LPF and lPF in place of Lu and lu respectively.
(2) For all positive integers d there exist B = B4.13 (d) > 0 and b = b4.13 (d) > 0
so that for all finite paths σ with endpoints at vertices, if Lu (σ) ≥ B then
d
Lu (f##
(σ)) ≥ b Lu (σ).
(3) There exist constants A > 0 and κ ≥ 1 so that for all subpaths τ of leaves of
Λ− in G, if lu (τ ) ≥ A then
lu (τ ) ≤ Lu (τ ) ≤ κ lu (τ )
(4) There exists a positive integer A = A4.13 and a constant 0 < R = R4.13 < 1, so
that if a path α ⊂ G splits as a concatenation of u-legal paths and copies of ρ
or ρ̄, and if Lu (α) ≥ A, then for all m ≥ 1 we have
m
Lu (f##
(α)) ≥ R λm/2 Lu (α)
where λ is the expansion factor for f and Λ+ .
m
Remark: The notation f##
is disambiguated by requiring that the exponent binds
m
more tightly than the ##-operator, hence f##
= (f m )## — this is how items (2)
and (4) are applied in what follows. Note that this makes the statements of (2)
m
and (4) weaker than if f##
were intepreted as (f## )m , because (f## )m (α) is a subpath
of (f m )## (α).
Proof. We prove (1) for Lu when K = 1; the proof for general K follows by an easy
induction, and the statement for LPF is proved in the exact same manner. If there are
non-trivial decompositions σ0 = σ0′ σ0′′ and σ1 = σ1′ σ1′′ such that σ0′′ σ1′ is a copy of ρ or
ρ̄ then Hu -edges in σ0′′ σ1′ contribute to Lu (σ0 ) + Lu (σ1 ) but not to Lu (σ), and all other
Hu -edges contribute to Lu (σ0 )+Lu (σ1 ) if and only if they contribute to Lu (σ). In this
case Lu (σ) = Lu (σ0 ) + Lu (σ1 ) − lu (ρ). If there are no such non-trivial decompositions
then concatenating the decompositions of σ0 and σ1 given by Lemma 4.3 produces
the decomposition of σ given by Lemma 4.3 and Lu (σ) = Lu (σ0 ) + Lu (σ1 ). This
completes the proof of (1).
38
d
We next prove (2). Fix the integer d ≥ 1. The path f##
(σ) is obtained from
d
f# (σ) by removing initial and terminal segments that cross a number of edges that is
bounded above, independently of σ, by the bounded cancellation constant of f d . It fold
lows that Lu (f##
(σ))−Lu (f#d (σ)) is bounded above independently of σ, so it suffices
to find B, b > 0 depending only on d so that if Lu (σ) > B then Lu (f#d (σ)) > bLu (σ).
Applying Lemma 4.8 (1) we obtain D > 1, E > 0 so that Lu (γ) ≤ D Lu (f# (γ)) + E
for all finite paths γ with endpoints at vertices, from which it follows by induction
that
1
1
1
d
Lu (f# (γ)) ≥ d Lu (γ) − E
+···+ d
D
D
D
E
1
≥ d Lu (γ) −
D
D−1
and so if Lu (γ) ≥
2D d E
D−1
then
Lu (f#d (γ)) ≥
1
1
1
Lu (γ) −
Lu (γ) =
Lu (γ)
d
d
D
2D
2D d
The first inequality of (3) follows immediately from Corollary 4.4, for any subpath
τ of a leaf of Λ− . To prepare for proving the second inequality, given a positive integer
C let ΣC be the set of paths in G that do not contain a subpath of the form ρǫC where
ǫ = ±1. Since ρ has an endpoint that is not contained in Gu−1 [HM17a, Fact 1.43],
each maximal subpath of σ of the form ρk or ρ̄k that is neither initial nor terminal in
σ is adjacent in σ to an Hu -edge that contributes to Lu (σ). Applying Corollary 4.4
it follows that
(∗) For any fixed C, amongst those paths σ ∈ ΣC for which Lu (σ) > 0, the ratio
lu (σ)/Lu (σ) has a positive lower bound that is independent of σ.
For proving (3), the key observation is that there exists a positive integer C so that
each subpath τ of Λ− is contained in ΣC — this is equivalent to saying that ρ∞ is not
a weak limit of lines in Λ− , which is equivalent to saying that ρ∞ is not a leaf of Λ− ,
which follows from Lemma 3.1.15 of [BFH00] and the fact that Λ− 6= ρ∞ . Item (3)
therefore follows by combining this observation with (∗).
For proving (4), we focus primarily on an analogue for LPF , connecting it with Lu
version stated in (4) by applying Corollary 4.6. From the assumption on a splitting
of α we have
LPF (f#m (α)) = λm LPF (α)
m
We shall show how to replace f#m by f##
, at the expense of replacing λ by its square
root, and of requiring LPF (α) to exceed some threshold constant. To be precise, we
have:
39
Claim: There exists A′ ≥ 0 such that if LPF (α) ≥ A′ then for all m ≥ 0 we have
m
LPF (f##
(α)) ≥ λm/2 LPF (α)
This suffices to prove (4), because if Lu (α) ≥ K4.2 (f ) · A′ = A then from Corollary 4.6
m
it follows that LPF (α) ≥ A′ , from which using the Claim we obtain LPF (f##
(α)) ≥
m/2
λ LPF (α), and then by two more applications of Corollary 4.6 we obtain
m
Lu (f##
(α)) ≥
1
1
1
LPF (α) ≥
λm/2 LPF (α) ≥
λm/2 Lu (α)
K4.2 (f )
K4.2 (f )
(K4.2 (f ))2
To prove the claim, the case m = 0 is evident, so suppose by induction that
m−1
LPF (f##
(α)) ≥ λ(m−1)/2 LPF (α)
m−1
Since f##
(α) is a subpath of f#m−1 (α), and since the latter splits into terms each of
m−1
which is an edge of Hu , a copy of ρ or ρ̄, or a path in Gu−1 , it follows that f##
(α)
may be deconcatenated in the form
m−1
f##
(α) = ζ α̂ω
such that α̂ splits into terms exactly as above, and such that either ζ, ω are both
trivial, or ρ exists and ζ, ω are both proper subpaths of ρ or ρ̄; it follows that
lPF (ζ), lPF(ω) ≤ lPF (ρ). Applying item (1) it follows that
m−1
LPF (f##
(α)) ≤ LPF (α̂) + 2lPF (ρ)
LPF (α̂) ≥ λ(m−1)/2 LPF (α) − 2lPF (ρ)
Using the splitting of α̂ we obtain
LPF (f# (α̂)) = λLPF (α̂) ≥ λ(m+1)/2 LPF (α) − 2 λ lPF(ρ)
The path f## (α̂) is obtained from f# (α̂) by truncating initial and terminal segments
no longer than the bounded cancellation constant of f , and since this is a finite number
of paths their LPF -values have a finite upper bound C2 , so by applying item (1) it
follows that
LPF (f## (α̂)) ≥ λ(m+1)/2 LPF (α) − 2 λ lPF(ρ) − 2C2
m−1
Now we apply the ## Lemma: since α̂ is a subpath of f##
(α) it follows that f## (α̂)
m−1
m
is a subpath of f## (f## (α)) [HM17a, Lemma 1.6 (3)], which is a subpath of f##
(α)
m
[HM17a, Lemma 1.6 (4)]. Thus we have f## (α) = ηf## (α̂)θ for some paths η, θ, and
hence by item (1) we have
m
LPF (f##
(α)) ≥ λ(m+1)/2 LPF (α) − 2 λ lPF(ρ) − 2C2 − 2 lPF(ρ)
40
To complete the induction we show that with appropriate threshold constant the
quantity on the right is ≥ λm/2 LPF (α), equivalently
(m+1)/2
m/2
λ
LPF (α) ≥ λ
LPF (α) + 2 (λ + 1) lPF(ρ) + 2C2
{z
}
|
C1
λ1/2 ≥ 1 +
λm/2
C1
LPF (α)
Since λ > 1 is suffices to show
λ1/2 ≥ 1 +
C1
LPF (α)
⇐⇒
LPF (α) ≥
C1
λ1/2 − 1
Taking the threshold constant to be
A′ =
C1
λ1/2 − 1
the induction is complete.
4.5
Proof of Lemma 4.11: the Special Flaring Condition
for Lu
Once this proof is complete, the proof of the General Flaring Condition stated in
Proposition 4.10 will also be complete, as shown in Section 4.2.
If the Special Flaring Condition for Lu fails then there exists a sequence nk → ∞,
and there exist paths γk ⊂ G with endpoints at vertices, such that Lu (f#nk (γk )) → ∞
as k → ∞, and such that
(∗)
ν Lu (f#nk (γk )) ≥ max{Lu (γk ), Lu (f#2nk (γk ))}
Assuming this, we argue to a contradiction.
Consider the integer L4.12 ≥ 1 satisfying the conclusions of Lemma 4.12. By
Lemma 4.13 (3) there is an integer L2 so that if µ is a subpath of Λ− that crosses
≥ L2 edges of Hu then Lu (µ) ≥ 1. Let L1 = max{L4.12 , L2 }. Choose an integer d ≥ 1
satisfying the conclusion of [HM15, Lemma 3.1], the “uniform splitting lemma”, with
respect to the constant L1 . This conclusion says that for any finite path σ in G with
d
endpoints at vertices of Hu , if ℓ−
u (σ) < L1 then the path f# (σ) splits into terms each
of which is u-legal or a copy of ρ or ρ̄. In this context we shall refer to d as the
“uniform splitting exponent”.
Let {µik } be a maximal collection of subpaths of f#nk (γk ) with endpoints at vertices
that have disjoint interiors, that are subpaths of Λ− , and that cross ≥ L1 edges of Hu .
The complementary subpaths {νjk } of f#nk (γk ) all satisfy lu− (νjk ) < L1 and all have
endpoints at vertices as well.
41
Our first claim is that
P
Lu (µik )
=0
n
k→∞ Lu (f#k (γk ))
(i)
lim
i
If not, then after passing to a subsequence we may assume that
X
Lu (µik ) > ǫ1 Lu (f#nk (γk ))
i
for some ǫ1 > 0 and all k. Choose subpaths σik of γk with disjoint interiors such
that f#nk (σik ) = µik . Since lu (µik ) ≥ L1 ≥ L4.12 , and since nk → +∞, we may apply
′
“Negative Flaring”, Lemma 4.12, to obtain subpaths σik
of σik which have endpoints
−
at vertices and which are also subpaths of Λ such that for all i we have
′
lu (σik
)
=∞
k→∞ lu (µik )
lim
′
′
The ratios lu (σik
)/Lu (σik
) and lu (µik )/Lu (µik ) have positive upper and lower bounds
independent of i and k: the upper bound of 1 follows from Corollary 4.4; and the
lower bound comes from Lemma 4.13 (3). For all i we therefore obtain
′
Lu (σik
)
=∞
lim
k→∞ Lu (µik )
Using this limit, and using that Lu (µik ) ≥ 1, it follows that for all sufficiently large k
we have
X
ν X
′
Lu (γk ) ≥
(Lu (σik
)−2 ρ )>
Lu (µik ) > ν Lu (f#nk (γk ))
ǫ
1 i
i
where the first inequality follows by applying Lemma 4.13 (1) to the subdivision of γk
′
into the paths σik
and their complementary subpaths. This contradicts (∗), verifying
the first claim.
Our second claim is that for any constant A (on which constraints will be placed
below when this claim is applied) we have
X
Lu (νjk ) Lu (f#nk (γk )) = 1
(ii)
lim
k→∞
Lu (νjk )≥A
To see why, let Ik be the number of µik subpaths of f#nk (γk ), let Jk be the number
of νjk subpaths, and let Kk = Ik + Jk , and so Jk ≤ Ik + 1 and Kk ≤ 2Ik + 1. By
42
Lemma 4.13 (1) applied to f#nk (γk ) we obtain
Lu (f#nk (γk )) ≤
X
Lu (νjk ) +
j
1≤
P
Lu (νjk )≥A Lu (νjk )
Lu (f#nk (γk ))
X
Lu (µik )
i
≤ Lu (f#nk (γk )) + Kk lu (ρ)
P
Lu (µik )
Lu (νjk )<A Lu (νjk )
+
+
nk
Lu (f# (γk ))
Lu (f#nk (γk ))
{z
} |
{z
}
|
P
i
ǫk
δk
Kk lu (ρ)
≤ 1+
Lu (f#nk (γk ))
{z
}
|
ζk
From (i) it follows that δk → 0 as k → +∞. Multiplying the inequality Kk ≤ 2Ik + 1
by lu (ρ)/Lu (f#nk (γk )), and using that Lu (µik ) ≥ 1, it follows that
0 ≤ ζk ≤ 2 lu (ρ) δk +
lu (ρ)
Lu (f#nk (γk ))
and so ζk → 0 as k → +∞. Multiplying the inequality Jk ≤ Ik + 1 by A/Lu (f#nk (γk )),
it follows that
A
0 ≤ ǫk ≤ Aδk +
nk
Lu (f# (γk ))
and so ǫk → 0 as k → +∞. This proves the second claim.
In what follows we will be applying Lemma 4.13 (4), and we will use the constants
A4.13 , R4.13 involved in that statement.
By definition of L1 and by the choice of the uniform splitting exponent d, since
−
ℓu (νjk ) < L1 it follows that f#d (νjk ) splits into terms each of which is either u-legal
or a copy of ρ or ρ̄. Consider the constants B = B4.13 (d) > 0 and b = b4.13 (d) > 0
of Lemma 4.13. Constraining A ≥ B, we may combine (ii) with Lemma 4.13 (2) to
obtain
P
P
d
Lu (νjk )≥A Lu (f## (νjk ))
Lu (νjk )≥A Lu (νjk )
(iii)
≥
b
·
> 3b/4
Lu (f#nk (γk ))
Lu (f#nk (γk ))
for sufficiently large values of k.
By construction, the paths {νjk } occur in order of the subscript j as subpaths of
nk
f# (γk ) with disjoint interiors. By applying the ## Lemma [HM17a, Lemma 1.6 (5)]
nk
(νjk ) occur in order as subpaths of the
using f nk , it follows that the the paths f##
2nk
path f# (γk ) with disjoint interiors. By applying [HM17a, Lemma 1.6 (4)] it follows
nk −d d
nk
(νjk ). Putting these together we see that the
that f##
f## (νjk ) is a subpath of f##
43
nk −d d
paths f##
f## (νjk ) occur in order as subpaths of the path f#2nk (γk ) with disjoint
interiors. These subpaths being Jk in number, together with their complementary
subpaths one has a decomposition of f#2nk (γk ) into at most 2Jk + 1 paths. Ignoring
the complementary subpaths, Lemma 4.13 (1) therefore implies
X
nk −d d
Lu (f##
f## (νjk )) − 2 Jk lu (ρ)
Lu (f#2nk (γk )) ≥
≥
X
nk −d d
Lu (f##
f## (νjk ))
−
2 Jk lu (ρ)
nk −d d
Lu (f##
f## (νjk ))
−
lu (ρ) Lu (f#nk (γk ))
Lu (νjk )≥A
≥
X
Lu (νjk )≥A
where the last inequality follows for sufficiently large k by applying (i) and the inequality Lu (µik ) ≥ 1 to conclude that
X
Lu (µik ) + 2 ≥ 2Ik + 2 ≥ 2Jk
Lu (f#nk (γk )) ≥ 2
i
For sufficiently large k we therefore have
P
nk −d d
Lu (f#2nk (γk ))
Lu (νjk )≥A Lu (f## f## (νjk ))
>
− lu (ρ)
(iv)
Lu (f#nk (γk ))
Lu (f#nk (γk ))
We have already constrained A so that A ≥ B, and we now put one more constraint on A. Applying Lemma 4.13 (2) to f d it follows that if Lu (νjk ) ≥ B then
d
Lu (f##
(νjk )) ≥ b Lu (νjk ), and so if Lu (νjk ) ≥ A = max{B, 1b A4.13 } it follows that
d
Lu (f##
(νjk )) ≥ A4.13 . This allows us to apply “Positive Flaring”, Lemma 4.13 (4),
with the conclusion that, letting R = R4.13 ,
nk −d d
d
(v) Lu (f##
f## (νjk )) ≥ R λ(nk −d)/2 Lu (f##
(νjk ))
as long as Lu (νjk ) ≥ A and as long as k is sufficiently large. Combining (iv) and (v),
if k is sufficiently large we obtain
P
d
Lu (f#2nk (γk ))
Lu (νjk )≥A Lu (f# (νjk ))
(nk −d)/2
> Rλ
− lu (ρ)
Lu (f#nk (γk ))
Lu (f#nk (γk ))
and combining this with (iii) we obtain
Lu (f#2nk (γk ))
3bR (nk −d)/2
>
λ
− lu (ρ)
nk
Lu (f# (γk ))
4
>ν
where the second inequality holds for sufficiently large k. This gives us the final
contradiction to (∗), which completes the proof of Lemma 4.11.
44
4.6
Appendix: The graph homotopy principle
Lemma 4.14 in this section was used earlier in the proof of Lemma 4.8, and it will be
used later in the construction of the “homotopy semigroup action” in Section 7.1. It
is an elementary result in homotopy theory; for precision we state the result in the
language of category theory, and we give the complete proof.
Define the graph-point category, a subcategory of the standard homotopy category
of pairs, as follows. The objects are pairs (G, P ) where G is a finite graph and P ⊂ G is
a finite subset. Each morphism, denoted [f ] : (G, P ) 7→ (H, Q), is the homotopy class
rel P of a homotopy equivalence f : G → H that restricts to a bijection f : P → Q.
Define the fundamental group functor from the graph-point category to the category
of indexed groups as follows. To each pair (G, P ) we associate the indexed family of
groups π1 (G, P ) = π1 (G, p) p∈P , and to each morphism [f ] : (G, P ) → (H, Q) we
associate the indexed family of group isomorphisms
[f ]∗ : π1 (G, P ) → π1 (H, Q) = f∗ : π1 (G, p) → π1 (H, f (p)) p∈P
The category and functor axioms implicit in this discussion are easily checked.
Let Autgp (G, P ) denote the group of automorphisms of (G, P ) in the graph-point
gp
category. Let Autgp
0 (G, P ) < Aut (G, P ), which we call the pure automorphism group
of (G, P ) in the graph-point category, denote the finite index subgroup consisting of
those [f ] ∈ Autgp (G, P ) such that f : P → P is the identity.
45
Lemma 4.14 (The graph homotopy principle).
(1) The graph-point category is a groupoid: every morphism [f ] : (G, P ) → (H, Q)
has an inverse morphism [g] : (H, Q) → (G, P ), meaning that g ◦ f : (G, P ) →
(G, P ) is homotopic to the identity rel P and f ◦ g : (H, Q) → (H, Q) is homotopic to the identity rel Q.
(2) The fundamental group functor is faithful: for any pair of morphisms
[f ], [f ′ ] : (G, P ) → (H, Q), we have [f ] = [f ′ ] if and only if the restricted
maps f, f ′ : P 7→ Q are equal and the induced isomorphisms f∗ , f∗′ : π1 (G, p) →
π1 (H, f (p)) are equal for all p ∈ P .
(3) Two morphisms [f ] : (G, P ) → (H, Q) and [g] : (H, Q) → (G, P ) are inverses
if and only if their restrictions f : P → Q and g : Q → P are inverses and the
isomorphisms f∗ : π1 (G, p) → π1 (H, f (q)) and g∗ : π1 (H, f (q)) → π1 (G, p) are
inverses.
(4) The fundamental group functor restricts to an injective homomorphism defined
on the pure automorphism group Autgp
0 (π1 (G, P )) 7→ ⊕p∈P Aut(π1 (G, p)).
Proof. Once (1) and (3) are proved, (2) and (4) follow immediately.
To prove (3), the “only if” direction is obvious, and for the “if” direction it suffices
to prove this special case: for any self-morphism [f ] : (G, P ) → (G, P ), if f fixes each
p ∈ P and induces the identity π1 (G, p) for each p ∈ P , then f is homotopic to the
identity rel P . For the proof, we know that f is freely homotopic to the identity
map IdG , because G is an Eilenberg-MacClane space and f induces the identity on
its fundamental group. Choose a homotopy h : G × [0, 1] → G from f to IdG .
We claim that for each p ∈ P the closed path γp (t) = h(p, t) (0 ≤ t ≤ 1) is trivial in
π1 (G, p). Applying this claim, we alter the homotopy h as follows: using the homotopy
extension property, for each p ∈ P we may homotope the map h : G × [0, 1] → G,
keeping it stationary on G×0, stationary on G×1, and stationary outside of Up ×[0, 1]
for an arbitrarily small neighborhood Up of p, to arrange that h(p × [0, 1]) = p; note
that for a homotopy X × [0, 1] → Y to be “stationary on A ⊂ X” means that the
restricted map {a} × [0, 1] → Y is constant for each a ∈ A. Doing this independently
for each p ∈ P , we obtain a homotopy rel P from f to the identity and we are done,
subject to the claim.
To prove the claim, consider a closed path δ : [0, 1] → G based at p, representing
an arbitrary element [δ] ∈ π1 (G, p). We obtain a path homotopy Ht : [0, 1] → G from
the path H0 = f ◦ δ to the concatenated path H1 = γp ∗ δ ∗ γ̄p as follows:
if 0 ≤ s ≤ t/3
γp(3s)
Ht (s) = h δ 33s−−2tt , t
if t/3 ≤ s ≤ 1 − t/3
γ (3 − 3s)
if 1 − t/3 ≤ s ≤ 1
p
46
Since for all [δ] ∈ π1 (G, p) we have [δ] = [f ◦ δ] = [γp ] · [δ] · [γp ]−1 , it follows that [γp ]
is in the center of π1 (G, p) ≈ Fn , hence is trivial, completing the proof of (3).
To prove (1), start with any homotopy inverse g ′ : H → G of f . We may assume
that the maps f : P → Q and g ′ : Q → P are inverses, because by the homotopy
extension property we may homotope g ′ to be stationary outside of a small neighborhood of P so that for each p ∈ P the track of the homotopy on the point g ′ (f (p))
moves it back to p. Since g ′ ◦ f : G → G fixes each point in P and is homotopic to
the identity, for each p ∈ P the induced map (g ′ ◦ f )∗ : π1 (G, p) → π1 (G, p) is an
inner automorphism represented by some closed curve γp based at p, and so for each
element of π1 (G, p) having the form [δ] for some closed curve δ based at p we have
(g ′ ◦ f )∗ (δ) = [γp ∗ δ ∗ γ̄p ]. Let h : (G, p) → (G, p) be the morphism obtained from
the identity by a homotopy that is stationary outside a small neighborhood of P and
such that the track of the homotopy on each p ∈ P is the closed curve γ̄p ; again we
are applying the homotopy extension property. Letting g = h ◦ g ′ we may apply (3)
to conclude that the morphism [f ] is an isomorphism with inverse [g].
Remark. Note that the proof of (3) depends heavily on the fact that the center
of Fn is trivial. The proof breaks down, for instance, if G is replaced by a torus;
in fact the analogue of Lemma 4.14, where a graph is replaced by a torus and P is
a two-point subset of the torus, is false. On the other hand the analogue for any
K(π, 1) space whose fundamental group has trivial center is true.
5
Flaring in T ∗ and hyperbolicity of S.
Throughout this section we continue with Notations 4.1 (1)–(4) regarding an outer
automorphism φ ∈ Out(Fn ) and a relative train track representative f : G → G
having penultimate filtration element Gu−1 and top EG stratum Hu .
The main result of this section is the construction, carried out in Section 5.5, of the
Gromov hyperbolic space S that is used in later sections for proving the multi-edge
case of Theorem F. The construction of S is based on results found in Sections 5.1–
5.4, in particular Proposition 5.10 which is a re-interpretation of the flaring result
of Proposition 4.10 expressed in the context of a certain natural free splitting. The
statement of Proposition 5.10 is found in Section 5.4, after preliminary work carried
out in Sections 5.1–5.3.
5.1
The free splitting Fn y T and its role in flaring.
We begin with a description of the free splitting Fn y T associated to the marked
graph G and its subgraph Gu−1 , together with a description of some features of T
associated to height u Nielsen paths in G, after which we will explain some intuition
behind the flaring result Proposition 5.10.
47
Let F denote the free factor system corresponding to the subgraph Gu−1 , having the form F = {[A1 ], . . . , [AK ]} where Gu−1 has noncontractible components
C1 , . . . , CK and Ak < Fn is in the conjugacy class of the image of the injection
π1 (Ck ) ֒→ π1 (G) ≈ Fn (that injection determined up to inner automorphism of Fn by
appropriate choices of base points and paths between them).
Definition 5.1 (The free splitting Fn y T ). Let Fn y T denote the free splitting
corresponding to the subgraph Gu−1 ⊂ G. What this means is that, starting from
e associated to the universal covering map G
e 7→ G, the tree
the deck action Fn y G
e
eu−1
T is obtained from G by collapsing to a point each component of the total lift G
e → T denote the Fn -equivariant collapse map. Since G
eu−1 is
of Gu−1 . Let p : G
e induces via p an action Fn y T which is evidently
Fn -invariant, the action Fn y G
a free splitting, i.e. a minimal action on a simplicial tree with trivial edge stabilizers.
Note that the set of conjugacy classes of nontrivial vertex stabilizers of this action
is precisely the free factor system F — indeed the stabilizer of a vertex v ∈ T equals
e which is nontrivial if and only if p−1 (v) is a component
the stabilizer of p−1 (v) ⊂ G
eu−1 covering some noncontractible component Ck ⊂ Gu−1 , in which case the
of G
stabilizer of v is conjugate to Ak .
e and projecting down to T ). Fixing a
Definition 5.2 (Lifting f : G → G up to G
standard isomorphism between the deck transformation group of the universal covere 7→ G and the group Fn ≈ π1 (G), recall from covering space theory that the
ing map G
e→G
e of f : G → G are in bijective correspondence with the automorphisms
lifts G
Φ ∈ Aut(Fn ) that represent φ, where the bijection Φ ↔ f˜Φ is given by the following
relation:
e
Φ-twisted equivariance in G:
e
f˜Φ (γ · x) = Φ(γ) · f˜Φ (x) for all γ ∈ Fn , x ∈ G
Φ-twisted equivariance in T :
fTΦ (γ · x) = Φ(γ) · fTΦ (x) for all γ ∈ Fn , x ∈ T
eu−1 , and hence f˜Φ induces a
Since f preserves Gu−1 , any of its lifts f˜Φ preserves G
e implies a corresponding
map fTΦ : T → T . The Φ twisted equivariance property in G
property in T :
When the automorphism Φ is understood or is not important to the discussion, we
will often drop it from the notations f˜Φ and fTΦ , writing simply f˜ and fT instead.
In the next section we will impose an additional metric constraint on fT ; see under
the heading “Stretch properties of fT ”.
Definition 5.3 (Nielsen paths, the Nielsen set, and ρ∗ paths in T ). In the geometric
and parageometric cases, where ρ, ρ̄ exist and are the unique inverse pair of Nielsen
e is any lift of ρ or ρ̄, and a Nielsen path in T
paths of height u, a Nielsen path in G
e In the geometric case, where ρ is
is any projection to T of any Nielsen path in G.
e is a line
closed and has distinct initial and terminal directions, a Nielsen line in G
48
which projects to a bi-infinite iterate of ρ, and a Nielsen line in T is the projection
e
of a Nielsen line in G.
The Nielsen set N , a collection of subsets of T , is defined as follows. In the
ageometric case, N = ∅; in the geometric case, N is the set of Nielsen lines in T ;
and in the parageometric case, N is the set of Nielsen paths in T . Furthermore, for
each N ∈ H its basepoint set, denoted Z(N), is defined as follows. In the geometric
case, the Nielsen line N has a unique decomposition as a bi-infinite concatenation
of Nielsen paths, and Z(N) is defined to be the set of concatenation points. In the
parageometric case, where N is a Nielsen path, Z(N) is its endpoint set.
Note that in the geometric case, basepoint sets of distinct Nielsen lines are disjoint
— for all N 6= N ′ ∈ N we have Z(N) ∩ Z(N ′ ) = ∅. This follows from two facts about
e lying over p is an endpoint of exactly
the base point p of ρ. First, each point p̃ ∈ G
e both contained in the same Nielsen line in G.
e Second, p is
two Nielsen paths in G,
eu−1 , and
not contained in Gu−1 [FH11, Corollary 4.19], so no lift p̃ is contained in G
e 7→ T is locally injective on the complement of G
eu−1 .
the projection map G
e with endpoints at vertices, with projections σG in
Consider a finite path σGe in G
i
i
G and σT in T . If σG = ρ or ρ̄ for some integer i 6= 0 — in the parageometric case
where ρ is not closed, i must equal 1 — then we say that σT is a ρ∗ -path in T , the
superscript ∗ representing the exponent. Note that ρ∗ paths in T are precisely the
paths of the form QQ′ for which there exists N ∈ N such that Q, Q′ ∈ Z(N).
We now give an intuitive explanation of Proposition 5.10, which is a flaring result
expressed in the context of the free splitting Fn y T . Any path function l(·) on G
e which
which vanishes on paths in Gu−1 can be lifted to a path function ˜l(·) on G
eu−1 , and it can then be projected to a path function lT (·)
vanishes on paths in G
on T , which can in turn be re-interpreted as a function dl (·, ·) on pairs of vertices
e → G
e which then induces a
of T . Choose a lift of f : G → G to a map f˜ : G
map fT : T → T . We wish to intepret dl (·, ·) as a “metric” on T , in which case
Proposition 5.10 expresses flaring of the “metric” dl with respect to the action of fT .
If we attempt to carry out this process using either of the “little l” path functions
lu or lPF we do indeed obtain metrics du , dPF on vertices of T . However, in the case
that Hu is geometric, the desired flaring condition fails: for any Nielsen line N ⊂ T ,
iteration of fT = fTΦ produces a sequence of Nielsen lines Ni = (fTk )# (N) (k ∈ Z),
and furthermore the map fTk takes the base lattice Z(N) to the base lattice Z(Nk )
preserving path distance. Since the base lattice of a Nielsen line has infinite diameter
in any invariant path metric on T , this demonstrates the failure of flaring.
If instead we carry out this process starting with either of the “big L” path
functions Lu or LPF , obtaining “metrics” Du , DPF , then base lattices of Nielsen lines
have uniformly bounded diameter, and so we may hope to avert failure of flaring.
However, Du and DPF are not actually metrics, in that they satisfy only a coarse
version of the triangle inequality (c.f. Lemma 4.7).
In order to work with actual path metrics, not just some kind of fuzzy “coarse
49
metrics”, we use a relative hyperbolicity construction. In the geometric case we cone
off the base lattice of each Nielsen axis of T , embedding T naturally in a graph T ∗
that is equipped with a path metric d∗ that is closely related to DPF , and extending
fT naturally to fT ∗ : T ∗ → T ∗ . In the ageometric case we simply set T ∗ = T and
d∗ = dPF . In the parageometric case we will for consistency construct T ∗ by coning
off the endpoint pair of each Nielsen path in T . In all cases fT extends naturally
to fT ∗ . Thus the statement of Proposition 5.10 will unify all cases, expressing flaring
of d∗ with respect to fT ∗ .
Along the way we will state and prove two important properties of T ∗ , which are
almost trivial in the ageometric and parageometric cases but have some significant
content in the geometric case: Proposition 5.8 which gives quasicomparability of the
coarse metric DPF and the true metric d∗ ; and Proposition 5.9 which proves Gromov
hyperbolicity of T ∗ with the metric d∗ .
5.2
e and T . A piecewise Riemannian
Path functions on G
metric on T .
In a tree, a finite path with initial and terminal endpoints V, W is determined by
those endpoints and is denoted V W .
Both of the path functions lPF , LPF vanish on paths in Gu−1 . Both of them lift
e → G to an Fn -invariant path function on G
e that
via the universal covering map G
e
e
vanishes on paths in Gu−1 , and hence projects via q : G → T to a well-defined and
Fn -invariant path function on T . We re-use the notations lPF , LPF for these path
e and on T . For any path β e in G
e with endpoints at vertices, letting
functions on G
G
βG be its projection to G and βT its projection to T , it follows from the definitions
that l(βG ) = l(βGe ) = l(βT ) for l = lPF or LPF .
Remark. The point of “well-definedness” of LPF on T is that for any vertices
e both map to V and W1 , W2 both map to W then each of
V, W ∈ T , if V1 , V2 ∈ G
eu−1 , and hence
the paths V1 V2 and W1 W2 is either degenerate or is contained in G
LPF (V1 W1 ) = LPF (V2 W2 ) = LPF (V W ).
e and on T , we have Fn Associated to the path functions lPF (·), LPF (·) on G
e and in T ,
equivariant functions dPF (·, ·), LPF (·, ·) on pairs of vertices V, W in G
given by
dPF (V, W ) = lPF (V W ), DPF (V, W ) = LPF (V W )
Furthermore, for each edge E ⊂ T we have lPF (E) = LPF (E) ≥ η > 0, which is an
immediate consequence of the fact that as E varies over the finite set of edges of Hu ,
the finite set of positive numbers lPF (E) has a positive minimum. We record this fact
for later use:
Lemma 5.4. There exists η = η5.4 > 0 such that for all vertices V 6= W ∈ T we have
DPF (V, W ) = LPF (V W ) ≥ η.
50
Using the inequality lPF (E) > 0 we may construct an Fn -equivariant piecewise
Riemannian metricR on the tree T , denoted ds, such that for vertices V, W ∈ T we
have dPF (V, W ) = V W ds. From this it follows that the function dPF (·, ·) is a metric
on the vertex set of T .
Next we translate into the context of T several results on path functions in Section 4.1.
Proposition 5.5. For any vertices V 6= W ∈ T there is a unique decomposition of
the path V W = µ0 ν1 µ1 · · · νA µA such that the following properties hold:
(1) If ρ does not exist then A = 0.
(2) If ρ exists then the νa ’s are precisely all of the maximal ρ∗ paths of V W , and
so each µa contains no ρ∗ subpath.
(3) If ρ exists and if 1 ≤ a < a+ 1 ≤ A−1 then at least one of the subpaths µa , µa+1
is nondegenerate; in the geometric case, all µa -subpaths are nondegenerate.
(4) DPF (V, W ) = lPF (µ0 ) + · · · + lPF (µA )
Furthermore, given any path γ in T — finite, singly infinite, or bi-infinite — whose
endpoints, if any, are at vertices, and assuming that ρ exists, there is a unique decomposition of γ as an alternating concatenation of its maximal ρ∗ paths (the ν-subpaths)
and paths that contain no ρ∗ subpath (the µ-subpaths) such that for any two consecutive µ-subpaths at least one is nondegenerate, all µ-subpaths being nondegenerate in
the geometric case.
Proof. Items (1)–(3) are translations of Corollary 4.5, and item (4) is a translation
of Corollary 4.6; the proofs are immediate from those results combined with the
definitions.
The “Furthermore. . . ” clause is a quick consequence of the following observations
that hold for any nested pair of finite subpaths V W ⊂ V ′ W ′ in T . First, every ρ∗
subpath of V W is a ρ∗ subpath of V ′ W ′ . Also, every maximal ρ∗ subpath of V W
whose dPF distances from V and from W are greater than lPF (ρ) is a maximal ρ∗
subpath of V ′ W ′ .
Remark on item (3). Consider the paths µa for 1 ≤ a ≤ A−1. In the geometric
case each such µa is nondegenerate, and this can be used to improve the constants
in some applications of (3) (underlying nondegeneracy of µa is the fact that the base
point of the closed Nielsen path ρ is disjoint from Gu−1 ). In the parageometric case,
on the other hand, one of the paths µa , µa+1 may be degenerate. This happens for µa
only if, up to orientation reversal, the Nielsen path ρ has initial vertex p ∈ Gu−1 (the
terminal vertex is necessarily disjoint from Gu−1 , the fact which underlies item (3)),
e that projects
in which case µa is degenerate if and only if νa µa νa−1 lifts to a path in G
to a path in G of the form ρ̄µρ where µ is a nondegenerate closed path in Gu−1 based
at p.
51
5.3
Constructing T ∗ by coning off Nielsen axes of T .
Embed the tree T into a graph denoted T ∗ , and extend the action Fn y T to an
action Fn y T ∗ , as follows. Index the Nielsen set as N = {Nj }j∈J , letting Zj be
the basepoint set of Nj (Definition 5.1). For each j ∈ J we cone off Zj by adding
a new vertex Pj = P (Nj ) and attaching a unique edge Pj Q for each Q ∈ Zj . The
points Pj are called cone points and the edges Pj Q are called cone edges. Since the
simplicial action Fn y T takes Nielsen paths to Nielsen paths and hence induces a
basepoint preserving permutation of the Nielsen set N , this action extends uniquely
to Fn y T ∗ permuting the cone points and the cone edges.
Let V ∞ ⊂ T ∗ be the set of vertices v ∈ T ∗ whose stabilizer subgroup Stab(v) is
infinite.
Lemma 5.6. The formula v 7→ Stab(v) defines an injection from V ∞ to the set
of nontrivial subgroups of Fn . A subgroup S < Fn is equal to Stab(v) for some
v ∈ V ∞ if and only if S is conjugate to the fundamental group of some noncontractible
component of Gu−1 in π1 (G) ≈ Fn , or Hu is a geometric stratum and S is conjugate
to the infinite cyclic subgroup hρi < Fn .
Proof. This fact may be extracted from [HM17c, Theorem F]. But a direct proof is
easy; here is a sketch.
We have a partition
a
∞
∞
V ∞ = Vu−1
VN∞ where Vu−1
= V ∞ ∩ T and VN∞ = {cone points} = {Pj }
e 7→ T induces an equivariant and hence stabilizer preserving
The collapse map G
∞
eu−1 having nontrivial stabilizer.
bijection between Vu−1 and the set of components of G
Using covering space theory, the stabilizers of the latter components are precisely
those subgroups of Fn conjugate to the fundamental group of some noncontractible
eu−1 are disjoint
component of Gu−1 . Furthermore, since distinct components of G
e the intersections of their stabilizers are trivial, and so the stabilizers
subtrees of G,
are unequal if they are nontrivial. This completes the proof of Hu is nongeometric.
If Hu is geometric then we have equivariant and hence stabilizer preserving bijecej ↔ Nj ↔ Pj where N
ej is the Nielsen line in G
e mapping to Nj under the
tions N
e 7→ T . By definition the N
ej are precisely those lines in G
e that cover
collapse map G
the closed Nielsen path ρ. The element of π1 (G) represented by ρ (and denoted by ρ)
is root free in π1 (G) because ρ has a unique u-illegal turn (Notations 4.1 (2)), and so
ej are precisely the infinite cyclic
by covering space theory the stabilizers of the lines N
subgroups in the conjugacy class of the group hρi < π1 (G) ≈ Fn . And as before, two
different such lines have distinct stabilizers.
The proof is completed by noting that hρi is not conjugate in Fn to the fundamental group of a noncontractible component of Gu−1 , because ρ is a circuit not contained
in Gu−1 (Notations 4.1 (2)).
52
The piecewise Riemannian metric ds∗ on T ∗ . The piecewise Riemannian metric
ds on T extends to an Fn -equivariant piecewise Riemannian metric denoted ds∗ on
T ∗ as follows. In the nongeometric case there is nothing to do. In the geometric case
the group Fn acts freely and transitively on the set of cone edges {Pj Q j ∈ J, Q ∈
Z(Nj )}; extend ds over a single cone edge Pj Q, then extend
it over all other cone
R
∗
edges equivariantly to obtain ds ; note that the length Pj Q ds∗ is independent of j
and Q. In the parageometric case, the group Fn acts freely on the set of cone edges,
and there are two orbits of cone edges corresponding to the two endpoints of ρ; we
extend ds over a single cone edge in each of
orbits, then extend equivariantly
R the two
∗
∗
to obtain ds ; also, we require that length Pj Q ds be the same on both orbits of cone
edges. Define the cone height to be the length of any cone edge in the metric ds∗ .
The path metric d∗ on T ∗ . Define a metric d∗ (·,
·) on vertices of T ∗ by minimizing
R
path length: d∗ (V, W ) equals the minimum of γ ds∗ over all continuous paths in
the graph T ∗ having endpoints V, W . The infimum is evidently minimized by some
embedded edge path in T ∗ having endpoints V, W . Note that since T ∗ is not a tree,
embedded edge paths need not be determined by their endpoints.
d′ denote the path QP (N)∗P (N)Q′ in
Bypasses in T ∗ . For any ρ∗ path QQ′ we let QQ
∗
′
T , called the bypass of QQ . Note that a path in the graph T ∗ is a bypass if and only
if it is a two-edge path having a cone point as its midpoint, and furthermore a bypass
is completely determined by its endpoints. We thus have a one-to-one correspondence
ν ↔ νb between the set of ρ∗ paths and the set of bypasses.
Extending the map fTΦ : T → T to fTΦ∗ : T ∗ → T ∗ . Following Definition 5.2, and
e and project to T obtaining
choosing Φ ∈ Aut(Fn ) representing φ, lift f : G → G to G
Φ-twisted equivariant maps
e→G
e
f˜ = f˜Φ : G
fT = fTΦ : T → T
With respect to the inclusion T ֒→ T ∗ we extend fTΦ to a Φ-twisted equivariant map
fT ∗ = fTΦ∗ : T ∗ → T ∗
as follows. As noted, for convenience we will often suppress Φ from the notation for
these maps.
The action of fT on T induces a well-defined action on the Nielsen set N , and
so we can extend fT over the set of cone points by setting fT ∗ (P (N)) = P (fT (N))
for each N ∈ N . Furthermore, for each N ∈ N the map fT restricts to a bijection
of basepoint sets fT : Z(N) → Z(fT (N)), and so for each Q ∈ Z(N) we can extend
the endpoint map (P (N), Q) 7→ (P (fT (N)), fT (Q)) uniquely to an isometry between
cone edges fT ∗ : P (N), Q → P (fT (N)), fT (Q).
For each edge E ⊂ T we have the following equation that follows from the “big
L” eigenlength equation in Section 4.1:
Z
Z
Eigenlength equation in T :
ds = λ ds
fT (E)
E
53
It follows that by equivariantly homotoping fT relative to endpoints of edges we may
arrange that fT stretches each edge of T by a uniform factor λ. Since its extension fT ∗
is an isometry on edges of T ∗ \ T , it follows that fT ∗ is λ-Lipschitz. These conditions
constitute additional constraints on the maps fT and fT ∗ which we record here:
Stretch properties of fT and fT ∗ :
• The maps fT , fT ∗ stretch each edge E ⊂ T by a constant factor λ over the path
fT (E) = fT ∗ (E).
• The map T ∗ permutes cone edges, taking each cone edge isometrically to its
image.
These stretch properties are the first step of Lemma 5.7 to follow.
We recall here some basic definitions. Given constants k ≥ 1, c ≥ 0, a map of
metric spaces f : X → Y is a (k, c)-quasi-isometric embedding if for all p, q ∈ X we
have
1
d(p, q) − c ≤ d(f (p), f (q)) ≤ k d(p, q) + c
k
If in addition each point of Y has distance ≤ c from some point of f (X) then f is
a (k, c)-quasi-isometry. If the domain X is a subinterval of R then we say that f is
a (k, c)-quasigeodesic. Sometimes we conflate the constants k, c by setting k = c and
using terminology like “k-quasi-isometries” etc. Sometimes we ignore k, c altogether
and use terminology like “quasi-isometries” etc.
Lemma 5.7. The map fT ∗ : T ∗ → T ∗ is a quasi-isometry.
Proof. Let Φ ∈ Aut(Fn ) be the representative of φ corresponding to fT ∗ , and so fT ∗
satisfies the Φ-twisted equivariance equation (see Definition 5.2).
The map fT ∗ is Lipschitz, by the “Stretch properties” noted above. To complete
the proof it suffices to show that there is a Lipschitz map f¯T ∗ : T ∗ → T ∗ such that
fT ∗ and f¯T ∗ are coarse inverses, meaning that each of the composed maps f¯T ∗ ◦ fT ∗
and fT ∗ ◦ f¯T ∗ moves each point of T ∗ a uniformly bounded distance. We construct f¯T ∗
by taking advantage of twisted equivariance of fT ∗ combined with the fact that the
action Fn y T ∗ has finitely many vertex and edge orbits (this is a kind of “twisted
equivariant” version of the Milnor-Svarc lemma []).
`
Consider the vertex set V ∗ of T ∗ and its partition V ∗ = V 0 V ∞ into points
whose Fn -stabilizers are trivial and infinite, respectively. Using Φ-twisted equivariance it follows that for any vertex v ∈ V we have a subgroup inclusion Φ(Stab(v)) ⊂
Stab(fT ∗ (v)). It follows that fT ∗ (V ∞ ) ⊂ V ∞ . Furthermore, that subgroup inclusion
is an equation Φ(Stab(v)) = Stab(fT ∗ (v)) — this is a consequence of Lemma 5.6 combined with the fact that f : G → G restricts to a homotopy equivalence of the union
of noncontractible components of Gu−1 and with the fact that f# (ρ) = ρ. It follows
that the restricted map fT ∗ : V ∞ → V ∞ is a bijection of the set V ∞ .
54
Define the restriction f¯T ∗ V ∞ to equal the inverse of the restriction fT ∗ V ∞ ;
this map f¯T ∗ V ∞ is automatically Φ−1 -twisted equivariant. Define the restriction
f¯T ∗ V 0 as follows: choose one representative v ∈ V 0 of each orbit of the action
Fn y V 0 , choose f¯T ∗ (v) ∈ V 0 arbitrarily, and extend over all of V 0 by Φ−1 -twisted
equivariance. Having defined a Φ−1 -twisted equivariant map f¯T ∗ : V ∗ → V ∗ , extend
f¯T ∗ over each edge to stretch distance by a constant factor, and hence we obtain a
Φ−1 -twisted equivariant map f¯T ∗ : T ∗ → T ∗ . Since there are only finitely many orbits
of edges, f¯T ∗ is Lipschitz. Since fT ∗ is Φ-twisted equivariant and f¯T ∗ is Φ−1 -twisted
equivariant, it follows that the two compositions fT ∗ ◦ f¯T ∗ and f¯T ∗ ◦fT ∗ are equivariant
in the ordinary untwisted sense. Each of these compositions therefore moves each
point a uniformly bounded distance, hence fT ∗ and f¯T ∗ are coarse inverses.
5.4
Geometry and dynamics on T ∗.
In this section we prove several propositions regarding T ∗ , including Proposition 5.10
which is our interpretation of flaring in T ∗ . The proofs will follow after the statement
of all the propositions.
Proposition 5.8 (Quasicomparibility in T ∗ ). The inclusion of the vertex set of T
into the vertex set of T ∗ is a quasi-isometry from the coarse metric DPF (·, ·) to the
metric d∗ (·, ·), meaning that there exist constants K = K5.8 ≥ 1, C = C5.8 ≥ 0 such
that for all vertices V, W ∈ T we have
1 ∗
d (V, W ) − C ≤ DPF (V, W ) ≤ K d∗ (V, W ) + C
K
Proposition 5.9 (Hyperbolicity of T ∗ ). The graph T ∗ with the metric d∗ is Gromov
hyperbolic. Furthermore, geodesics in T are stable in T ∗ in the following sense: there
exists C = C5.9 ≥ 0 such that for any vertices V, W ∈ T , the path V W ⊂ T is
∗
C-Hausdorff close to any geodesic V W ⊂ T ∗ with endpoints V, W .
We now state our re-interpretation of the earlier flaring result Proposition 4.10 in
the setting of T ∗ . Given η > 0, and given a sequence of vertices Vr ∈ T ∗ defined for r
in some interval of integers a ≤ r ≤ b, we say that this sequence is an η-pseudo-orbit
of fT ∗ if d∗ (fT ∗ (Vr ), Vr+1 ) ≤ η for all a ≤ r < r + 1 ≤ b.
Proposition 5.10 (Flaring in T ∗ ). For each µ > 1, η ≥ 0 there exist integers R ≥ 1
and A ≥ 0 such that for any pair of η-pseudo-orbits Vr and Wr of fT ∗ defined on the
integer interval −R ≤ r ≤ R, if d∗ (V0 , W0 ) ≥ A then
µ · d∗ (V0 , W0 ) ≤ max{d∗ (V−R , W−R ), d∗ (VR , WR )}
55
Proof of Proposition 5.8: Quasicomparibility in T ∗ . In the ageometric case
where ρ does not exist then T = T ∗ and DPF = d∗ and we are done. Henceforth we
assume that ρ exists.
Letting h denote the cone height, it follows that each bypass has length 2h.
Given vertices V, W ∈ T , using Proposition 5.5 we obtain a decomposition of the
path V W and an accompanying formula for DPF (V, W ):
V W = µ0 ν1 µ1 . . . νA−1 µA−1 νA µA
DPF (V, W ) = lPF (µ0 ) + · · · + lPF (µA )
Each νi is a subpath of some element N ∈ N of the Nielsen set and the endpoints
of νi are distinct points in Z(N), and so the corresponding bypass νbi is defined. We
thus obtain a path in T ∗ and a length calculation as follows:
Vd
W = µ0 νb1 µ1 . . . νbA−1 µA−1 νbA µA
Length(Vd
W ) = lPF (µ0 ) + · · · + lPF (µA ) + 2hA
Applying Proposition 5.4 with its constant η = η5.4 , and applying Proposition 5.5 (3),
it follows that if 0 ≤ a < a + 1 ≤ A then at least one of lPF (µa ), lPF (µa+1 ) is ≥ η, and
hence
lPF (µ0 ) + · · · + lPF (µA ) ≥ (A − 1) η/2
We therefore have
d∗ (V, W ) ≤ Length(Vd
W)
≤ lPF (µ0 ) + · · · + lPF (µA ) + 2h
= 1 + 4h/η DPF (V, W ) + 2h
2(lPF (µ0 ) + · · · + lPF (µA ))
+1
η
This proves the first inequality using any K ≥ 1 + 4h/η and C = 2h/K.
We turn to the opposite inequality. Before starting, we shall normalize the choice
of cone height to be h = 12 lPF (ρ) and so each bypass νb has length lPF (ρ). Proving
Proposition 5.8 with h normalized in this fashion implies the proposition for any
value of h, because the normalized version of d∗ is bi-Lipschitz equivalent to any
other version.
Given vertices V, W ∈ T , choose an embedded edge path γ ∗ ⊂ T ∗ with endpoints
V, W satisfying two optimization conditions:
R
R
(i) γ ds∗ is minimal, and so d∗ (V, W ) = γ ds∗ .
R
R
(ii) Subject to (i), γ∩T ds∗ = γ∩T ds is minimal.
56
There is a unique decomposition of γ as an alternating concatenation of subpaths in
T and bypasses:
γ ∗ = µ0 νb1 µ1 . . . µA−1 νbA µA
from which we obtain the formula
d∗ (V, W ) = lPF (µ0 ) + · · · + lPF (µA ) + A lPF (ρ)
We claim that each µa has no ρ∗ -subpath. Otherwise we can decompose µa = µ′ ν ′ µ′′
where ν ′ is a Nielsen path in T . In the case that each of µ′ , µ′′ is nondegenerate, or
that a = 0 and µ′′ is nondegenerate, or that a = A and µ′ is nondegenerate, construct
a path γ ′ from γ by replacing
ν ′ Rwith the corresponding
R
R
R bypass; from the choice of
∗
∗
normalization we have γ ′ ds = γ ds but γ ′ ∩T ds < γ∩T ds, a contradiction. The
other cases all lead to a path γ ′ exhibiting the same contradiction, and are described
as follows. In the case that a ≥ 1 and µ′ is degenerate, replace the subpath νba ν ′ of γ
with the unique bypass having the same endpoints. And in the case that a ≤ A − 1
and µ′′ is degenerate, replace the subpath ν ′ νba+1 with the unique bypass having the
same endpoints. And in the last remaining case, where a = A = 0 and µ′, µ′′ are both
degenerate, we have ν ′ = γ ∗ and we let γ ′ = νb′ be the corresponding bypass.
Consider the concatenated edge path in T denoted
µ0 ν1 µ1 . . . µA−1 νA µA
which is obtained from γ ∗ by replacing each bypass νba with the corresponding ρ∗ subpath νa ⊂ T . Straightening this concatenation in T produces the path V W
to which we may inductively apply the coarse triangle inequality for LPF given in
Lemma 4.7, with the conclusion that
DPF (V, W ) = LPF (V W )
≤ LPF (µ0 ) + LPF (ν1 ) + LPF (µ1 ) + · · ·
+ LPF (µA−1) + LPF (νA ) + LPF (µA ) + (2A − 1)C4.7
Since µa has no ρ±i subpath we have LPF (µa ) = lPF (µa ), and since LPF (ρ±i ) = 0 we
have LPF (νa ) = 0, and therefore
DPF (V, W ) ≤ lPF (µ0 ) + · · · + lPF (µA ) + 2AC4.7
2C4.7
· AlPF (ρ)
≤ lPF (µ0 ) + · · · + lPF (µA ) +
lPF (ρ)
≤ Kd∗ (V, W )
for any K ≥ max{1, 2C4.7/lPF (ρ)}. This completes the proof of Proposition 5.8.
57
Proof of Proposition 5.9: Hyperbolicity of T ∗ . If ρ does not exist, i.e. in the
ageometric case, since T ∗ = T is a tree we are done. The parageometric case is
similarly easy, but it is also subsumed by the general proof when ρ does exist for
which purpose we will apply a result of Kapovich and Rafi [KR14, Proposition 2.5].
Let T ∗∗ be the graph obtained from T by attaching an edge Q Q′ for each unordered
pair Q 6= Q′ ∈ Z(N) for each element N ∈ N of the Nielsen set. We put the
simplicial metric on T ∗∗ , assigning length 1 to each edge. We have a map T ∗∗ → T ∗
extending the inclusion T ֒→ T ∗ , defined to take each attached edge Q Q′ ⊂ T ∗∗ to the
d′ . This map is evidently a quasi-isometry from the vertices
corresponding bypass QQ
∗∗
of T to the vertices of T ∗ , and this quasi-isometry commutes with the inclusions
of T into T ∗ and into T ∗∗ . The conclusions of Proposition 5.9, namely hyperbolicity
of T ∗ and stability in T ∗ of geodesics in T , will therefore follow once we demonstrate
the same conclusions with T ∗∗ in place of T ∗ . Those conclusions for T ∗∗ are identical
to the conclusions of [KR14, Proposition 2.5] applied to the inclusion map T ֒→ T ∗∗ :
the graph T ∗∗ is hyperbolic; and each arc V W ⊂ T is uniformly Hausdorff close in
T ∗∗ to each geodesic in T ∗∗ with the same endpoints V, W . So we need only verify
that the inclusion map T ֒→ T ∗∗ satisfies the hypotheses of [KR14, Proposition 2.5]
with respect to the simplicial path metrics on T and T ∗∗ that assign length 1 to each
edge.
One hypothesis [KR14, Proposition 2.5] is that T be hyperbolic, which holds for
all path metrics on trees. Another hypothesis is that the inclusion T ֒→ T ∗∗ be a
Lipschitz graph map which means that it takes each edge of T to a bounded length
edge path of T ∗ , but this is immediate since the inclusion is an isometry onto its
image.
The remaining hypotheses of [KR14, Proposition 2.5] are numbered (1), (2), (3),
the first two of which are trivially satisfied using that the inclusion map from vertices
of T to vertices T ∗∗ is surjective (this is why we use T ∗∗ instead of T ∗ ). The last
hypothesis (3) says that there exists an integer M > 0 so that for any vertices
V 6= W ∈ T , if V, W are connected by an edge in T ∗∗ then the diameter in T ∗∗
of the path V W ⊂ T is uniformly bounded. The only case that needs attention is
when V W is not a single edge in T but V, W are connected by an edge in T ∗∗ . This
happens only if V W is a ρ∗ subpath of some element N ∈ N of the Nielsen set, and
so V W is a concatenation of a sequence of Nielsen paths Qk−1 Qk in N, where the
concatenation points form a consecutive sequence in Z(N) ∩ V W of the form
V = Q0 , Q1 , . . . , QK = W
Each pair Qi , Qj is connected by an edge Qi Qj ⊂ T ∗∗ (i ≤ j = 0, . . . , K). Since each
vertex of T along V W is contained in one of the Nielsen paths Qk−1 Qk and hence its
distance to one of Qk−1 or Qk is at most lu (ρ)/2, it follows that the diameter of V W
in T ∗∗ is bounded above by M = 1 + lu (ρ).
58
Proof of Proposition 5.10: Flaring in T ∗ . We denote the constants of Proposition 5.8 in shorthand as K = K5.8 , C = C5.8 .
Fix µ > 1 and η ≥ 0. Consider R ≥ 1, to be specified, and a pair of η-pseudofr ∈ G
e projecting
orbits Vr , Wr for fT ∗ defined for −R ≤ r ≤ R. Choose vertices Ver , W
e
to Vr , Wr respectively. In G denote the path β̃r = Vr Wr , and let βr be its projection
to G. Also, for −R < r ≤ R denote α̃r = Vr , f˜(Vr−1 ) and ω̃r = f˜(Wr−1 ), Wr , which
are the unique paths such that β̃r = [α̃r f˜# (β̃r−1 )ω̃r ]. Let αr , ωr be their projections
to G. By assumption we have d∗ (fT ∗ (Vr−1 ), Vr ) ≤ η and d∗ (fT ∗ (Wr−1 ), Wr ) ≤ η, and
applying Proposition 5.8 it follows that
LPF (αr ), LPF (ωr ) ≤ K η + C ≡ η ′
and so f# (βr−1 )
η′
∼
LPF
2
βr .
Let µ′ = 2K µ. By Proposition 4.10 the path function LPF satisfies the flaring
condition of Definition 4.9 with respect to f , from which using µ′ and η ′ we obtain
constants R′ ≥ 1, A′ ≥ 1. We now specify R = R′ . Also let
A = max{KA′ + C, 2K 2 C +
2C
}
µ
Applying Proposition 5.8 it follows that if d∗ (V0 , W0 ) ≥ A then LPF (β0 ) ≥ A′ . The
flaring condition of LPF therefore applies with the conclusion that
µ′ LPF (β0 ) ≤ max{LPF (β−R ), LPF (βR )}
and so
µ d∗ (V0 , W0 ) ≤ Kµ LPF (β0 ) + KCµ
Kµ
≤ ′ max{LPF (β−R ), LPF (βR )} + KCµ
µ
Applying Proposition 5.8 again we have
∗
µ d (V0 , W0 ) ≤
≤
≤
1 ∗
µ d (V0 , W0 ) ≤
2
K 2µ
max{d∗ (V−R , W−R ), d∗ (VR , WR )} + K 2 Cµ + C
′
µ
1
1
max{d∗ (V−R , W−R ), d∗(VR , WR )} + µ A
2
2
1
1
max{d∗ (V−R , W−R ), d∗(VR , WR )} + µ d∗ (V0 , W0 )
2
2
1
max{d∗ (V−R , W−R ), d∗(VR , WR )}
2
which completes the proof.
59
5.5
Construction of S.
We continue to fix the choice of Φ ∈ Aut(Fn ) representing φ, and we consider the
corresponding Φ-twisted equivariant map fT ∗ = fTΦ∗ : T ∗ → T ∗ . Our definition of the
suspension space S will formally depend on this choice (but see remarks at the end
of the section regarding dependence on Φ of the constructions to follow).
Definition 5.11 (The suspension space S, its slices, fibers, and semiflow). We define
S to be the suspension space of T ∗ , namely the quotient of T ∗ × Z × [0, 1] modulo
the gluing identification (x, k, 1) ≈ (fT ∗ (x), k + 1, 0) for each k ∈ Z and x ∈ T ∗ .
Let [x, k, r] ∈ S denote the equivalence class of (x, k, r). We have a well-defined and
continuous projection map p : S → R given by p[x, k, r] = k + r. For each closed
connected subset J ⊂ R we denote SJ = p−1 (J) which we refer to as a slice of S. In
the special case of a singleton s ∈ R we refer to Ss = p−1 (s) as a fiber. Each fiber
may be regarded as a copy of T ∗ , in the sense that if k = ⌊s⌋ and r = s − k then we
obtain a homeomorphism js : T ∗ → Ss given by js (x) = [x, k, r]; in the special case
that s is an integer we have js (x) = [x, s, 0].
We have an action Fn y S which is induced by the action Fn y T ∗ as follows:
for each γ ∈ Fn and each [x, k, r] ∈ S we have
γ · [x, k, r] = [Φk (γ) · x, k, r]
This action is well-defined because, using Φ-twisted equivariance of fT ∗ : T ∗ → T ∗ ,
we have
γ · [x, k, 1] = [Φk (γ) · x, k, 1] = [fT ∗ (Φk (γ) · x), k + 1, 0] =
= [Φ(Φk (γ)) · fT ∗ (x), k + 1, 0]
= [Φk+1 (γ) · fT ∗ (x), k + 1, 0]
= γ · [fT ∗ (x), k + 1, 0]
Note that the homeomorphism j0 : T ∗ → S0 is equivariant with respect to Fn actions.
For generally, for each integer k the homeomorphism jk : T ∗ → Sk is Φ−k -twisted
equivariant, because
jk (γ · x) = [γ · x, k, 0] = Φ−k (γ) · [x, k, 0] = Φ−k (γ) · jk (x)
We have a semiflow S × [0, ∞) → S, which is partially defined by the formula
[x, k, s] · t = [x, k, s + t]
(x ∈ T ∗ , k ∈ Z, 0 ≤ s ≤ 1, 0 ≤ t ≤ 1 − s)
and which uniquely extends to all t ≥ 0 by requiring the semiflow equation (p · t) · u =
p · (t + u) to hold for all t, u ≥ 0. In particular Ss · t = Ss+t for all s ∈ R, t ≥ 0. For
each b ∈ R we define the first hitting map hb : S(−∞,b] 7→ Sb by letting ξ ∈ S(−∞,b] flow
forward from ξ ∈ Sp(ξ) to Sb along the flow segment ξ · [0, b − p(ξ)], thus obtaining
the formula hb (ξ) = ξ · (b − p(ξ)).
This completes Definition 5.11.
60
Definition 5.12 (Piecewise Riemannian metric and geodesic metric on S). We define
a piecewise Riemannian metric on S. Recall the piecewise Riemannian metric ds∗
on T ∗ (see the beginning of Section 5.3). For each edge E ⊂ T ∗ and each integer n
we define a Riemannian metric dE on E × n × [0, 1] (≈ E × [0, 1] and not depending
on n), in two cases. In the case E ⊂ T , use the metric d2E = λ2t (ds∗ )2 + dt2 ; note
that fT ∗ stretches the length of E by a constant factor λ, and hence the gluing map
(x, n, 1) 7→ (fT ∗ (x), n+ 1, 0) takes E ×n×1 isometrically onto fT ∗ (E) ×(n+ 1) ×0. In
the case where E ⊂ T ∗ \T , equivalently we are in the geometric or parageometric case
and E is a cone edge, use the metric d2E = (ds∗ )2 +dt2 ; note that E ′ = fT ∗ (E) is also a
cone edge and that fT ∗ maps E isometrically to E ′ , and so once again the gluing map
(x, n, 1) 7→ (fT ∗ (x), n + 1, 0) takes E × n × 1 isometrically onto fT ∗ (E) × (n + 1) × 0.
These metrics on all of the rectangles E × n × [0, 1] glue up isometrically along their
common boundaries in S, as follows. First, for any two edges E, E ′ ⊂ T ∗ having a
common endpoint x = E∩E ′ = ∂E∩∂E ′ , the restrictions to [0, 1] ≈ x×n×[0, 1] of the
metric dE on E ×[0, 1] ≈ E ×n×[0, 1] and the metric dE ′ on E ′ ×[0, 1] ≈ E ′ ×n×[0, 1]
are both equal to dt. Fixing n and letting E ⊂ T ∗ vary, this allows us to glue up all
of the rectangles E × n × [0, 1] to get a well-defined piecewise Riemannian metric on
T ∗ ×n×[0, 1]. Next, as noted above the gluing map from T ∗ ×n×1 to T ∗ ×(n+ 1) ×0
maps each E × n × 1 isometrically onto fT ∗ (E) × (n + 1) × 0; letting n vary this allows
us to glue up T ∗ × n × [0, 1] to get the desired piecewise Riemannian metric on S.
By minimizing path lengths using the above piecewise Riemannian metric on S,
we obtain a geodesic metric dS (·, ·) on S. We may similarly define a geodesic metric
dJ (·, ·) on any slice SJ , by minimizing path length with respect to the restricted
piecewise Riemannian metric on SJ . In the special case of a fiber Ss , letting n = ⌊s⌋,
for each edge E ⊂ T ∗ with image edge js (E) ⊂ Ss the metrics d∗ on E and ds in js (E)
are related so that if E ⊂ T then js stretches the metric by a factor of λs−n , whereas
if E ⊂ T ∗ \ T then js preserves the metric. In particular the map js : T ∗ → Ss is a
λs−n bilipschitz homeomorphism; it is therefore an isometry if s is an integer, and a
λ-bilipschitz homeomorphism in general.
This completes Definition 5.12.
For use at the very end of the proof of Theorem F, when verifying the WWPD
conclusions, we shall need the following metric property of S:
Lemma 5.13. For any two fibers Ss , St ⊂ S and any x ∈ Ss , y ∈ St we have
dS (x, y) ≥ s − t .
Proof. The lemma follows by noting that for each edge E ⊂ T ∗ , the projection
function p : E × [0, 1] → [0, 1] has the property that for each tangent vector v ∈
T (E × [0, 1]) we have Dp(v) ≥ v , using the Riemannian metric dE on the right
hand side of the inequality.
The following metric property will be used later to study how the inclusion map
of fibers Si ֒→ S can distort distance.
61
Lemma 5.14. For each integer m there exist constants km ≥ 1, cm ≥ 0 such that for
each integer a and each s ∈ J = [a, a + m] the inclusion map i : Ss ֒→ SJ is a km , cm
quasi-isometry.
Proof. We construct a cycle of equivariant Lipschitz maps as follows:
i
SO s
/
SJ
ha+m
hr
Sa o
h̄
Sa+m
The inclusion map i is 1-Lipschitz. The equivariant maps ha+m and hr are first hitting
maps, each of which is λm Lipschitz. The map h̄ will be an equivariant coarse inverse
to the equivariant map ha+m : Sa → Sa+m , for the construction of which we consider
the commutative diagram
4
f¯Tm∗
T∗
ja
/
Sa j
fTm∗
ha+m
T∗
/
ja+m
h̄
Sa+m
In this diagram the map fTm∗ is Φm -twisted equivariant, and the map ha+m is (untwisted) equivariant. The top and bottom maps are the instances k = a and k = a+m
of the Φ−k -twisted equivariant isometry jk : T ∗ → Sk , whose inverse jk−1 : Sk → T ∗
is Φk twisted equivariant. By Lemma 5.7 the map fT ∗ has a Φ−1 -twisted equivariant
Lipschitz coarse inverse f¯T ∗ . It follows that fTm∗ has a Φ−m -twisted equivariant Lipschitz coarse inverse f¯Tm∗ whose Lipschitz and coarse inverse constants depend on m.
−1
We may therefore fill in the diagram with the map h̄ = ja ◦ f¯Tm∗ ◦ ja+m
which makes
the diagram commute and which is an untwisted equivariant Lipschitz coarse inverse
for ha+m , with Lipschitz and coarse inverse constants depending on m.
Going round the cycle from Ss to itself and from SJ to itself we obtain two equivariant self-maps both of which move points uniformly bounded distances depending
on m. The maps i : Ss → SJ and hr ◦ h̄ ◦ ha+m : SJ → Ss are therefore Lipschitz
coarse inverses and hence quasi-isometries with constants depending on m.
Remark. The definition of the suspension space S depends ostensibly on the choice
of representative Φ ∈ Aut(Fn ) of φ, but in fact different choices of Φ produces suspension spaces which are Fn -equivariantly isometric, as can easily be checked using
the fact that distinct choices of Φ differ by an inner automorphism of Fn .
5.6
Proof of hyperbolicity of S.
We prove that S is a hyperbolic metric space by applying the Mj-Sardar combination
theorem [MS12], a descendant of the Bestvina–Feighn combination theorem [BF92].
62
The hypotheses of the Mj-Sardar theorem consist of an opening hypothesis and four
numbered hypotheses which we must check. The last of those four is the “flaring
condition” which we prove by application of Proposition 5.10.
Opening hypothesis of [MS12, Theorem 4.3]: A metric bundle. This hypothesis
says that S is a metric bundle over R with respect to the map p : S → R. We
must therefore verify that the map p : S → R satisfies the definition of a metric
bundle as given in [MS12, Definition 1.2]. First, p must be Lipschitz map, and each
fiber Ss must be a geodesic metric space with respect to the path metric induced
from S, each of which we have already verified. Also, item 2) of [MS12, Definition
1.2], when translated into our setting, requires that for each interval [a, b] ⊂ R such
that b − a ≤ 1, and for each s ∈ [a, b] and ξ ∈ Ss , there exists a path in S of uniformly
bounded length that passes through ξ and has endpoints on Sa and Sb respectively.
To obtain this path choose η ∈ Sa so that η · (s − a) = ξ and take the path t 7→ η · t
defined on a ≤ t ≤ b, whose length equals b − a ≤ 1.
The remaining verification needed for S to be a metric bundle is that the set of
inclusions Ss ֒→ S (s ∈ R) is uniformly proper, meaning that these inclusions are
uniformly Lipschitz — in fact they are all 1-Lipschitz by construction — and that
there exists a single nondecreasing “gauge” function δ : [0, ∞) → [0, ∞) for these
inclusions, having the following property:
(∗) for any s ∈ R, any x, y ∈ Ss , and any D ≥ 0, if dS (x, y) ≤ D then ds (x, y) ≤
δ(D).
To define δ consider x, y ∈ Ss connected by a geodesic path γ in S with Length(γ) =
dS (x, y) ≤ D. The projection p ◦ γ in R has length ≤ D and so, letting m =
⌊D + 2⌋, there are integers a and b = a + m such that Image(p ◦ γ) ⊂ [a, b], implying
that Image(γ) ⊂ S[a,b] which implies in turn that dS (x, y) = d[a,b] (x, y). Applying
Lemma 5.14 we have k1m ds (x, y) − cm ≤ d[a,b] (x, y) and hence ds (x, y) ≤ km dS (x, y) +
km cm . We may assume that km and cm are nondecreasing functions of m and hence
k⌊D⌋ and c⌊D⌋ are nondecreasing functions of D, and so using δ(D) = k⌊D⌋ (D + c⌊D⌋ )
we are done.
Hypotheses (1), (2) of [MS12, Theorem 4.3]: Base and fiber hyperbolicity. These
hypotheses require that the base space R is hyperbolic which is evident, and that the
fibers Ss are hyperbolic with uniform hyperbolicity constant. Proposition 5.9 gives
us a constant δ ′ ≥ 0 such that T ∗ is δ ′ -hyperbolic. Since each fiber Ss is λ-bilipschitz
homeomorphic to T ∗ , it follows that Ss is hyperbolic with a uniform hyperbolicity
constant δ depending only on δ ′ and λ.
Hypothesis (3) of [MS12, Theorem 4.3]: Barycenters. This hypothesis says that
the barycenter maps ∂ 3 Ss → Ss are uniformly coarsely surjective as s varies. We
review what this means from [MS12, Section 2 around the heading “The barycenter
map”]. Given a δ-hyperbolic geodesic metric space X with Gromov boundary ∂X,
consider the triple space
∂ 3 X = {(ξ1 , ξ2 , ξ3) ∈ (∂X)3 ξi 6= ξj if i 6= j}
63
The barycenter map ∂ 3 X → X is a coarsely well-defined map as follows. There
exists constants K ≥ 1, C ≥ 0 depending only on δ such that for any two points
ξ1 6= ξ2 ∈ ∂X there exists a K, C-quasigeodesically embedded line in X having
endpoints ξ1 , ξ2 ; we use the notation ξ1 ξ2 for any such quasigeodesic line. By [MS12,
Lemma 2.7] there exist constants D, L ≥ 0 depending only on δ such that for each
triple ξ = (ξ1 , ξ2, ξ3 ) ∈ ∂ 3 X there exists a point bξ ∈ X which comes within distance
D of any of the lines ξi ξj , i 6= j ∈ {1, 2, 3}, and for any other such point b′ξ the
distance between bξ and b′ξ is ≤ L. Once the constants K, C, D, L have been chosen,
any such point bξ is called a barycenter of ξ, and any map ∂ 3 X → X taking each
triple ξ to a barycenter bξ is called a barycenter map for X.
To say that the barycenter maps ∂ 3 Ss → Ss are uniformly coarsely surjective
means that there exists a “coboundedness constant” E ≥ 0 such that for each s ∈ R
the image of each barycenter map ∂ 3 Ss → Ss comes within distance E of each point
of Ss . For the hyperbolic space T ∗ , the action Fn y T ∗ has a fundamental domain τ ⊂
T ∗ of bounded diameter, and so E ′′ = Diam(τ ) is a coboundedness constant for any
Fn -equivariant barycenter map ∂ 3 T ∗ → T ∗ , hence there is a uniform coboundedness
constant E ′ for all barycenter maps ∂ 3 T ∗ → T ∗ . Since each of the fibers Ss comes
equipped with a λ-bilipschitz homeomorphism js : T ∗ → Ss , their barycenter maps
have a uniform coboundedness constant E = λE ′ .
Hypothesis (4) of [MS12, Theorem 4.3] aka [MS12, Definition 1.12]. Here is a
slight restatement of the hypothesis specialized to our present context.
Flaring 1: For all k1 ≥ 1, ν1 > 1, there exist integers A1 , R ≥ 0 such that for
any s ∈ R and any two k1 -quasigeodesics
γ1 , γ2 : [s − R, s + R] → S
which are sections of the projection map p — meaning that p ◦ γi is the identity
on the interval [s − R, s + R] — the following implication holds:
(F1 ) if ds (γ1 (s), γ2 (s)) ≥ A1 then
ν1 · ds γ1 (s), γ2(s) ≤ max{ds−R γ1 (s−R), γ2 (s−R) , ds+R γ1 (s+R), γ2(s+R) }
This statement tautologically implies the flaring hypothesis given in [MS12, Definition
1.12], the difference being that in the latter statement the quantifier order starts out
as “For all k ≥ 1 there exist µ > 1 and integers A, r ≥ 0 such that. . . ” with
the remainder of the statement unchanged (a simple geometric estimation argument
yields the converse implication, but we will not need this).
For proving Flaring 1 we first reduce it to a “discretized” version taking place
solely in the fibers Sr for integer values of r, as follows:
Flaring 2: For all k2 ≥ 1, ν2 > 1, there exist integers A2 , R ≥ 0 such that for any
integer m ∈ Z and any two k2 -quasigeodesic maps
δ1 , δ2 : {m − R, . . . , m, . . . , m + R} → S
64
which are sections of the projection map p, the following implication holds:
ν2 · dm
(F2 ) if dm (δ1 (m), δ2 (m)) ≥ A2 then
δ1 (m), δ2 (m) ≤ max{dm−R δ1 (m−R), δ2 (m−R) , dm+R δ1 (m+R), δ2 (m+R) }
To show that Flaring 2 implies Flaring 1, choose k1 , ν1 . Consider any integer R ≥ 0,
any s ∈ R, and any pair γ1 , γ2 : [s − R, s + R] → S of k1 -quasigeodesic sections of
the projection map p. Let m = ⌊s⌋ and let t = s − m. The semiflow restricts to
λ-bilipschitz homeomorphisms hr : Sr 7→ Sr+t defined by hr [x, r, 0] = [x, r, t] for any
integer r, having the property that the distance from each [x, r, 0] to its hr -image
[x, r, t] in S is at most 1. It follows that the functions
δj (r) = h−1
r (γj (r + t))
δj : {m − R, . . . , m + R} → S,
are k2 -quasi-isometric sections of p, where the constant k2 depends only on k1 and λ.
Applying Flaring 2, for any ν2 > 1 there exist integers A2 , R ≥ 0 such that the implication (F2 ) holds. Again using that the maps hr are λ-bilipschitz homeomorphisms, if
we take ν2 = ν1 · λ2 and A1 = A2 · λ then the hypothesis of (F1 ) implies the hypothesis
of (F2 ) and the conclusion of (F2 ) implies the conclusion of (F1 ).
It remains to verify Flaring 2 by applying Proposition 5.10 which we restate here
for convenience in a form matching that of Flaring 2:
Flaring 3: For each µ > 1, η ≥ 0 there exist integers A2 ≥ 0, R ≥ 1 such that for
any pair of η-pseudo-orbits Vr and Wr of fT ∗ : T ∗ → T ∗ defined for integers
−R ≤ r ≤ R, the following implication holds:
(F3 ) if d∗ (V0 , W0 ) ≥ A2 then
µ · d∗ (V0 , W0 ) ≤ max{d∗ (V−R , W−R ), d∗ (VR , WR )}
For the proof that Flaring 3 =⇒ Flaring 2, for each r ∈ Z we have a commutative
diagram
T∗
fT ∗
T∗
/
jr−1
jr
Sr−1
hr
/
Sr
where hr is the first hitting map. Note that in this diagram the bottom is equivariant,
the top is Φ-twisted equivariant, the left is a Φ1−r -twisted equivariant isometry, and
the right is Φ−r -twisted equivariant isometry.
Choose k2 ≥ 1, ν2 > 1, consider integers R ≥ 0 and m, and consider a pair of
k2 -quasigeodesic maps δi : {m − R, . . . , m + R} → S which are sections of p, for
i = 1, 2. It follows that if m − R ≤ r − 1 < r ≤ m + R then dS (δi (r − 1), δi (r)) ≤ 2k2
(recall that “k2 -quasigeodesic” is synonymous with “(k2 , k2 )-quasigeodesic”). For each
x ∈ Sr−1 we have dS (hr (x), x)) ≤ 1 and hence dS (hr (δi (r − 1)), δi (r)) ≤ 2k2 + 1. For
65
−1
−1
r ∈ {−R, . . . , +R} denote Vr = jm+r
(δ1 (m + r)), Wr = jm+r
(δ2 (m + r)). It follows
that d∗ (fT ∗ (Vr−1 ), Vr ), d∗ (fT ∗ (Wr−1 , Wr ) ≤ 2k2 + 1, and so the sequences (Vr ) and
(Wr ) are both η-pseudo-orbits of fT ∗ , defined for m − R ≤ r ≤ m + R and with
η = 2k2 + 1. Since jm is an isometry we have dm (δ1 (m), δ2 (m)) = d∗ (V0 , W0 ), and so
the hypothesis of (F2 ) implies the hypothesis of (F3 ). Similarly since jm−R and jm+R
are isometries, the conclusion of (F3 ) implies the conclusion of (F2 ) using µ = ν2 .
We have therefore proved that Flaring 3 =⇒ Flaring 2.
This completes the verification of the hypotheses of the Mj-Sardar combination
theorem, and so the space S is therefore hyperbolic.
6
Abelian subgroups of Out(Fn)
This section reviews some background material needed for the rest of the paper.
Section 6.1 contains basic material from [FH11] regarding automorphisms and outer
automorphisms (see also [HM17a] for a comprehensive overview). Section 6.2 reviews
elements of the theory of abelian subgroups of Out(Fn ) developed in [FH09], focussing
on disintegration subgroups.
6.1
6.1.1
Background review
More about CTs
In Notations 4.1 we reviewed features of a CT f : G → G with associated f -invariant
filtration G1 ⊂ · · · ⊂ Gu under the assumption that the top stratum Hu is EG. In
studying disintegration groups we shall need some further defining properties and
derived properties of CTs (for this section only the reader may ignore the assumption
that the top stratum is EG). We shall refer to [FH11] for material specific to CTs, to
[BFH00] for more general material, and to [HM17a] for certain “compilation” results
with multiple sources in [FH11] or [BFH00]. One may also consult [HM17a] for a
comprehensive overview.
General properties of strata. [FH11, Section 2.6] Each stratum Hi = Gi \Gi−1
is either an irreducible stratum meaning that its transition matrix Mi is an irreducible
matrix, or a zero stratum meaning that Mi is a zero matrix. Each irreducible stratum
satisfies one of the following:
Hi is an EG stratum: [FH11, Remark 3.20] The matrix Mi is a k × k PerronFrobenius matrix for some k ≥ 2, having eigenvalue λ > 1; or
Hi is an NEG stratum: [FH11, Section 4.1] Hi = Ei is a single edge with an
orientation such that f (Ei ) = Ei u where u is either trivial or a closed path in Gi−1
having distinct initial and terminal directions. An NEG stratum Hi is a fixed stratum
66
if u is trivial, a linear stratum if u is a Nielsen path (equivalently u is a periodic
Nielsen path), and a superlinear stratum otherwise.
Properties of NEG-linear strata: An NEG-linear stratum Hi = Ei will also be
referred to as a linear edge of G. The linear edges of G have the following features:
Twist path and twist coefficient: [FH11, Section 4.1] For each linear edge Ei we
have f (Ei ) = Ei widi for a unique closed Nielsen path wi which is root free meaning
that wi is not an iterate of any shorter closed path (equivalently, if p is the base point
of wi , then the element of the group π1 (G, p) represented by wi is root free). We say
that wi is the twist path of Ei and that the integer di 6= 0 is its twist coefficient. If
Ej 6= Ei is another linear edge having twist path wj , and if wi and wj determine the
same conjugacy class up to inversion, then wi = wj and di 6= dj .
NEG Nielsen paths: [FH11, Definition 4.7] For each NEG edge Ei , if there is an
indivisible Nielsen path contained in Gi but not in Gi−1 then Ei is a linear edge, and
every such Nielsen path has the form Ei wik E i for some k 6= 0.
Exceptional paths: [FH11, Definition 4.1] These are paths of the form Ei w k E j
where Ei 6= Ej are linear edges having the same twist path w = wi = wj and having
twist coefficients di , dj of the same sign.
Properties of EG strata: These properties were stated in Notations 4.1 with
respect to the top EG stratum Hu , but we go over them again here for an arbitrary
EG-stratum Hi , and with a somewhat different emphasis.
Lines: [BFH00, Section 2.2] Recall the spaces of lines in Fn and in G and the
canonical homeomorphism between them:
B(Fn ) = {2 point subsets of ∂Fn }/Fn
B(G) = {bi-infinite paths in G}/reparameterization
where the topology on B(Fn ) is induced by the Hausdorff topology on compact subsets
of ∂Fn , and the topology on B(G) has a basis element for each finite path γ consisting
of all bi-infinite paths having γ as a subpath. The homeomorphism B(Fn ) ↔ B(G)
e → G and the natural bijection ∂Fn ≈
is induced by the universal covering map G
e
∂ G. We refer to this homeomorphism by saying that a line in Fn is realized by the
corresponding line in G.
Attracting laminations: [BFH00, Section 3.1], [FH11, Remark 3.20] Associated
to Hi is its attracting lamination Λi ⊂ B(Fn ) which is the set of all lines in Fn whose
realization ℓ in G has the property that for each finite subpath γ of ℓ and each edge
E ⊂ Hi there exists k ≥ 1 such that γ is a subpath of f#k (E). For distinct EG
strata Hi , Hj (i 6= j) the corresponding laminations Λi , Λj are distinct. The set of
laminations L(φ) = {Λi } is independent of the choice of CT representative f : G → G.
EG Nielsen paths: [BFH00, Corollary 4.19], [HM17a, Fact 1.42] Up to inversion
there exists at most one indivisible periodic Nielsen path ρ contained in Gi but not
67
in Gi−1 . Its initial and terminal directions are distinct, and at least one endpoint of
ρ is not contained in Gi−1 .
Geometricity: [HM17a, Fact 2.3] Hi is a geometric stratum if ρ exists and is a
closed path.
Properties of zero strata: [FH11, Definition 2.18, Definition 4.4, Definition 4.7]
Each zero stratum Hi ⊂ G has the following properties:
Envelopment: There exist indices s < i < r such that Hs is an irreducible stratum,
Hr is an EG stratum, each component of Gr is noncontractible, and each Hj with
s < j < r is a zero stratum and a contractible component of Gr−1 . We say that the
zero strata Hj with s < j < r are enveloped by Hr , and we denote Hrz to be the union
of Hr with its enveloped zero strata. The filtration element Gs is the union of the
noncontractible components of Gr−1 , and Hrz = Gr \ Gs .
Taken paths. These are the paths µ in Hi for which there exists an edge E of some
irreducible stratum Hq with q > i, and there exists k ≥ 1, such that µ is a maximal
subpath in Hi of the path f#k (E); we say more specifically that the path µ is q-taken.
If Hr is the EG stratum that envelopes Hi then every edge E ⊂ Hi is an r-taken
path, from which it follows that the endpoints of E are vertices of Hr not contained
in Gr−1 .
Properties of complete splittings: [BFH00, Section 4], [FH11, Definition 4.4]
A splitting of a path γ in G is a concatenation expression γ = γ1 · . . . · γJ such
that for all k ≥ 1 we have f#k (γ) = f#k (γ1 ) · . . . · f#k (γJ ). The characteristic property
of a CT — short for “completely split relative train track map” — is the following:
Complete splitting: For each edge E there is a unique splitting f (E) = σ1 · . . . · σn
which is complete, meaning that each term σi is either an edge in an irreducible stratum, an EG indivisible Nielsen path, an NEG indivisible Nielsen path, an exceptional
path, or a taken path in a zero stratum.
6.1.2
Principal automorphisms and rotationless outer automorphisms.
Consider an automorphism Φ ∈ Aut(Fn ), with induced boundary homeomorphism
b : ∂Fn → ∂Fn , and with fixed subgroup denoted Fix(Φ) < Fn . Denote the
denoted Φ
b as Per(Φ)
b and Fix(Φ)
b ⊂ ∂Fn , respectively.
sets of periodic points and fixed points of Φ
b of period k ≥ 1. We say ξ is an attractor for Φ
b if it has a
Consider ξ ∈ Per(Φ)
k
ki
b (U) ⊂ U and the collection {Φ
b (U) i ≥ 0}
neighborhood U ⊂ ∂Fn such that Φ
b if it is an attractor for Φ
b −1 .
is a neighborhood basis of ξ. Also, ξ is a repeller for Φ
b and Fix(Φ)
b denote the sets of attracting, repelling, and nonrepelling
Within Per(Φ)
68
points, respectively, as
b Per− (Φ),
b PerN (Φ)
b ⊂ Per(Φ)
b
Per+ (Φ),
b Fix− (Φ),
b FixN (Φ)
b ⊂ Fix(Φ)
b
Fix+ (Φ),
For each c ∈ Fn associated inner automorphism ic (a) = cac−1 we use the following
special notations
∂c = Fix( bic ) = {∂− c, ∂+ c},
{∂− c} = Fix− ( bic ),
{∂+ c} = Fix+ ( bic )
The following equivalences are collected in [FH11, Lemma 2.1] based on results from
[GJLL98] and [BFH04].
Fact 6.1. For each Φ ∈ Aut(Fn ) and each nontrivial c ∈ Fn we have
b is invariant under îc
Φ ∈ Stab(c) ⇐⇒ ic commutes with Φ ⇐⇒ Fix(Φ)
b
⇐⇒ ∂c ⊂ Fix(Φ)
Principal automorphisms. [FH11, Definition 3.1]. We say that Φ is a principal
automorphism if FixN (Φ) ≥ 2, and furthermore if FixN (Φ) = 2 then FixN (Φ) is
neither equal to ∂c for any nontrivial c ∈ Fn , nor equal to the set of endpoints of a lift
of a generic leaf of an attracting lamination of the outer automorphism representing Φ.
For each φ ∈ Out(Fn ) let P (φ) ⊂ Aut(Fn ) denote the set of principal automorphisms
representing φ.
For each φ ∈ Out(Fn ) let P ± (φ) denote1 the set of all Φ ∈ Aut(Fn ) representing φ
such that either Φ or Φ−1 is principal, equivalently,
P ± (φ) = P (φ) ∪ (P (φ−1 ))−1
The symmetry equation P ± (φ−1 ) = (P ± (φ))−1 is useful in situations where one is
trying to prove a certain property of Φ ∈ P ± (φ) that is symmetric under inversion
of Φ: one may reduce to the case that Φ is principal by replacing φ ∈ Out(Fn ) and Φ
by their inverses in the case where Φ is not already principal. We use this reduction
argument with little comment in many places.
Rotationless outer automorphisms. [FH09, Definition 3.1 and Remark 3.2].
The concept of forward rotationless outer automorphisms is defined in [FH11], where
it is proved that the forward rotationless outer automorphisms are precisely those
outer automorphisms which have CT representatives. Here we use the stricter property of rotationless defined in [FH09], which is symmetric under inversion, and which
is better adapted to the study of abelian subgroups.
In [FH09] the definition of P ± (φ) was incorrectly stated as P (φ) ∪ P (φ−1 ). The definition given
here should replace the one in [FH09]. No further changes are required in [FH09], because the
arguments there which use P ± (φ) are all written using the current, correct definition.
1
69
We say that φ ∈ Out(Fn ) is rotationless if two conditions hold. First, for each
Φ ∈ P (φ) we have Per(Φ) = Fix(Φ) (in “forward rotationless” this condition is
replaced by the weaker PerN (Φ) = FixN (Φ)). Second, for each integer k ≥ 1 the map
Φ 7→ Φk is a bijection between P ± (φ) and P ± (φk ) — recall from [FH09, Remark 3.2]
that injective is always true, and so bijective holds if and only if surjective holds.
Expansion factor homomorphisms. [BFH00, Section 3.3] Consider φ ∈ Out(Fn )
and an attracting lamination Λ ∈ L(φ). Under the action of Out(Fn ) on the set of lines
B(Fn ), consider the subgroup Stab(Λ) < Out(Fn ) that stabilizes Λ. The expansion factor homomorphism of Λ is the unique surjective homomorphism PFΛ : Stab(Λ) → Z
such that for each ψ ∈ Stab(Λ) we have PFΛ (ψ) ≥ 1 if and only if Λ ∈ L(ψ). Furthermore, there exists µ > 1 such that if ψ ∈ Stab(Λ) and if PFΛ (ψ) > 1 then any
relative train track representative f : G → G of ψ has an EG-aperiodic stratum corresponding to Λ on which the Perron-Frobenius eigenvalue of the transition matrix
equals µPFΛ (ψ) .
Twistors (aka Axes). [FH11, Lemma 4.40 and the preceding page]. Recall that
two elements a, b ∈ Fn are said to be unoriented conjugate if a is conjugate to b or
to b−1 . The ordinary conjugacy class of a is denoted [a] and the unoriented conjugacy
class is denoted [a]u . For any marked graph G, nontrivial conjugacy classes of Fn
correspond bijectively with circuits S 1 7→ G up to orientation preserving homeomorphisms of the domain S 1 . Note that a is root free in Fn if and only if the oriented
circuit S 1 7→ G representing [a] does not factor through a nontrivial covering map of
S 1 , and a, b are unoriented conjugate if and only if the oriented circuits representing
[a], [b] differ by an arbitrary homeomorphism of S 1 .
Consider φ ∈ Out(Fn ) and a nontrivial, unoriented, root free conjugacy class
µ = [c]u , c ∈ Fn . For any two representatives Φ1 6= Φ2 ∈ Aut(Fn ) of φ, the following
are equivalent:
b 1 ) ∩ Fix(Φ
b 2)
Φ1 , Φ2 ∈ Stab(c) ⇐⇒ ∂c = Fix(Φ
d
Furthermore, if these equivalent conditions hold then Φ−1
2 Φ1 = ic for some integer
d 6= 0. If there exists a pair Φ1 6= Φ2 ∈ P (φ) such that the above equivalent conditions
hold, then µ is said to be a twistor for φ, and the number of distinct elements of the
set P (φ) ∩ Stab(c) is called the multiplicity of µ as a twistor for φ; these properties
are independent of the choice of c ∈ Fn representing µ.
The number of twistors of φ and the multiplicity of each twistor is finite, as follows.
First, for any CT f : G → G representing φ, for µ to be a twistor it is equivalent that
some NEG linear edge E twists around µ, meaning that E has twist path w such that
either w or w −1 represents µ. Furthermore, the multiplicity of µ is one more than the
number of linear edges that twist around µ [FH11, Lemma 4.40].
70
6.1.3
Rotationless abelian subgroups
Principal sets for rotationless abelian subgroups.
[FH11, Definition 3.9,
Corollary 2.13]. An abelian subgroup A < Out(Fn ) is rotationless if each of its elements is rotationless, equivalently A has a rotationless generating set. Every abelian
subgroup contains a rotationless subgroup of index bounded uniformly by a constant
depending only on n, namely the subgroup of k th powers where k ≥ 1 is an integer
such that the k th power of every element of Out(Fn ) is rotationless [FH11, Lemma
4.42].
Assuming A < Out(Fn ) is rotationless, a subset X ⊂ ∂Fn with ≥ 3 elements
is a principal set for A if each ψ ∈ A is represented by Ψ ∈ Aut(Fn ) such that
b (which determines Ψ uniquely amongst representatives of Ψ) and such
X ⊂ Fix(Ψ)
that Ψ ∈ P ± (ψ). When the principal set X is fixed, the map ψ 7→ Ψ defines a
homomorphism s : A → Aut(Fn ) that is a section of the canonical map Out(Fn ) →
Aut(Fn ) over the subgroup A. Also, the set
d
Y = ∩ψ∈A Fix(s(ψ))
is the unique principal set which is maximal up to inclusion subject to the property
that Y contains X ; this set Y defines the same section s : A → Aut(Fn ) as X [FH11,
Remark 3.10].
Comparison homomorphisms of rotationless abelian subgroups. [FH09,
Definition 4.1 and Lemma 4.3].
Consider a rotationless abelian subgroup A. Consider also two principal sets X1 , X2
for A that define lifts s1 , s2 : A → Aut(Fn ). Let Y1 , Y2 be the maximal principal
sets containing X1 , X2 respectively, and so s1 , s2 are also the lifts defined by Y1 , Y2 .
Suppose that s1 6= s2 : A → Aut(Fn ) (this if and only if Y1 6= Y2 ), and suppose also
that X1 ∩ X2 6= ∅ and hence Y1 ∩ Y2 6= ∅. It follows that the set Y1 ∩ Y2 is fixed by
distinct automorphisms representing the same element of A, and so Y1 ∩ Y2 = Tc± for
some nontrivial root free c ∈ Fn . In this situation there is an associated comparison
homomorphism ω : A → Z which is characterized by the equation
s2 (ψ) = iω(ψ)
s1 (ψ) for all ψ ∈ A.
c
The number of distinct comparison homomorphisms A → Z is finite.
The coordinate homomorphism. [FH09, Lemma 4.4, Definition 4.5, Lemma 4.6].
Every abelian subgroup A < Out(Fn ) is a finite lamination group, that is, the set
L(A) = ∪φ∈A L(φ) is finite. If in addition A is rotationless then each Λ ∈ L(A) is
ψ-invariant for all ψ ∈ A, and so
\
A<
Stab(Λ)
Λ∈L(A)
71
We thus obtain a finite collection of expansion factor homomorphisms defined on A,
namely
PFΛ : A → Z, Λ ∈ L(A)
Choosing an enumeration Ω1 , . . . , ΩN of the expansion homomorphisms and the comparison homomrophisms, we obtain the coordinate homomorphism
Ω : A → ZN
which is injective.
6.2
Disintegration subgroups
In this section we fix a rotationless φ ∈ Out(Fn ) and a CT representative f : G → G
with corresponding f -invariant filtration G1 ⊂ · · · ⊂ Gu = G (that is all we need
from Notations 4.1 for this section).
Using the CT structure of f (see Section 6.1.1) we build up to the definition of the
disintegration subgroup associated to f , a certain abelian subgroup D(f ) < Out(Fn )
constructed in [FH09, Section 6] by an explicit combinatorial procedure that we review
here, using which we also obtain a description of the coordinate homomorphism Ω :
D(f ) → ZN (see Section 6.1.3). Noting that D(f ) depends on the choice of f , all
definitions in this section depend on f .
6.2.1
QE-paths and QE-splittings
We describe structures associated to the collection of linear edges of G, augmenting the structures described under the heading “Properties of NEG-linear strata” in
Section 6.1.1.
[FH11, Def. 4.7] Two linear edges Ei , Ej ⊂ G with a common twist path w are
said to be linearly equivalent, abbreviated to LIN-equivalent, and the associated LINequivalence class is denoted LINw . Recall that distinct elements Ei 6= Ej ∈ LINw
have distinct twist coefficients di 6= dj .
[FH09, Lemma 6.1 and Def. 6.2] Given a twist path w and distinct linear
edges Ei 6= Ej ∈ LINw , a path of the form Ei w p E j is called a quasi-exceptional path
or QE-path (it is an exceptional path if and only if the twist coefficients di , dj have
the same sign). For every completely split path σ, any QE-subpath Ei w p E j of σ is a
concatenation of terms of the complete splitting of σ: either di , dj have the same sign
and Ei w p E j is an exceptional path and hence a single term; or the terms consist of
the initial Ei , the terms of the complete splitting of w p , and the terminal Ej . No two
QE-subpaths can overlap in an edge, and so there is a uniquely defined QE-splitting of
σ which is obtained from the complete splitting by conglomerating each QE-subpath
of σ into a single term.
72
Consider a twist path w. For each Ei , Ej ∈ LINw , the associated quasi-exceptional
family is the set of paths
Ei w ∗ E j = {Ei w p E j p ∈ Z}
Also, associated to w itself is its linear family, the set
[
LINw ∪
Ei w ∗ E j
Ei 6=Ej ∈LINw
Every quasi-exceptional path belongs to a unique quasi-exceptional family, and every
NEG linear edge or quasi-exceptional path belongs to a unique linear family.
6.2.2
Almost invariant subgraphs
The intuition behind the “almost invariant subgraphs” of G is that they are a partition
of the collection of non-fixed strata determined by the following requirement: if one
perturbs f : G → G by letting its restrictions f Hi to non-fixed strata be replaced
by iterates f ai Hi with varying integer exponents ai ≥ 0, and if one wishes to do
this perturbation so that the resulting outer automorphisms commute with the outer
automorphism represented by f , then the exponents ai should be constant on the
edges contained in each almost invariant subgraph.
[FH09, Def. 6.3] Define an equivalence relation on the non-fixed irreducible strata
{Hi } of G as follows. Given Hi , a path µ is a short path for Hi if µ an edge in Hi ,
or if Hi is EG and µ is a taken connecting path in a zero stratum enveloped by Hi .
Define a relation amongst the non-fixed irreducible strata denoted Hi → Hj , meaning
that there exists a short path µ for Hi such that some term of the QE-splitting of
f# (µ) is an edge of Hj ; note that if Hi → Hj → · · · → Hk then i ≥ j ≥ · · · ≥ k.
Let B be the directed graph whose vertex set is the set of non-fixed irreducible
strata, with a directed edge for each relation Hi → Hj . Let B1 , . . . , BS denote the
connected components of the graph B. For each s = 1, . . . , S define the almost
invariant subgraph Xs ⊂ G to be the union of the strata Hi comprising the vertices of
Bs , together with any zero stratum enveloped by one of these Hi . Note that the set
of almost invariant subgraphs {X1 , . . . , XS } partitions the set of the nonfixed strata.
6.2.3
Admissible S-tuples; quasi-exceptional families
[FH09, Defn. 6.6, Lemma 6.7, Defn. 6.8] For each S-tuple a = (a1 , . . . , aS ) of
non-negative integers define f a : G → G on each edge E ⊂ G as follows:2 if E ⊂ Xs
for some s then f a (E) = f#as (E); otherwise E is fixed by f and then f a (E) = E. Each
such f a is a homotopy equivalence representing an outer automorphism denoted φa .
By construction f a preserves the given filtration G1 ⊂ · · · ⊂ Gu = G.
2
In [FH09] the notation fa was used for what we here denote f a .
73
One would like to arrange (among other things) that (f a )k# (E) = f#as k (E) for all
k ≥ 1, all s = 1, . . . , S, and all edges E ⊂ Xs . This need not hold for general S-tuples,
but it does hold when a certain relation amongst linear edges and QE-splitting terms
is satisfied.
Given an almost invariant subgraph Xr and linear edges Ei , Ej , we say that the
triple (Xr , Ei , Ej ) is quasi-twist related if there exists a stratum Hk ⊂ Xr , a short
path µ for Hk , a twist path w, and an integer p ≥ 1 such that Ei , Ej ∈ LINw , and
such that Ei w p E j is a term in the QE-splitting of f# (µ).
We say that an S-tuple a is admissible if for all quasi-twist related triples (Xr , Ei , Ej ),
letting di , dj be the twist coefficients of Ei , Ej respectively, and letting Xs , Xt be
the almost invariant subgraphs containing Ei , Ej respectively, the following equation
holds:
ar (di − dj ) = as di − at dj
[FH09, Notation 6.12] Consider an almost invariant graph Xr . For each pair of
linear edges Ei , Ej such that the triple (Xr , Ei , Ej ) is quasi-twist related, the associated quasi-exceptional family is defined to be the set of all paths of the form Ei w ∗ E j .
We let Qr denote the set of all quasi-exceptional families associated to quasi-twist
related triples (Xr , Ei , Ej ).
QE-equivalence of linear edges. We say that a pair of linear edges Ei , Ej is
QE-related if there exists an almost invariant subgraph Xr such that (Xr , Ei , Ej ) is
quasi-twist related. Equivalently Ei , Ej are QE-related if and only if they are in the
same linear family and, letting w be the unique twist path for which Ei , Ej ∈ LINw ,
there exists r such that the family Ei w ∗ E j is in the set Qr .
The equivalence relation on linear edges generated by being QE-related is called
QE-equivalence and is written ∼QE . Note that the QE-equivalence relation amongst
linear edges is a refinement of the LIN-equivalence relation.
Note that if an exceptional path Ei w p E j occurs as a term in the complete splitting
of some iterate of some short path in Xr then the quasi-exceptional family Ei w ∗ E j is
an element of Qr and the linear edges Ei and Ej are QE-related.
6.2.4
Xs paths.
[FH09, Notation 6.12, Corollary 6.14] For each almost invariant subgraph Xs ,
we use the terminology Xs -paths to refer to the subpaths of G which form the elements
of the set Ps that is defined in [FH09, Notation 6.12] — namely, the completely split
paths γ such that each term of the QE-splitting of γ is one of the following:
(1) a Nielsen path; or
(2) a short path in a stratum contained in Xs , for example any edge in Hiz for any
EG stratum Hi ⊂ Xs ; or
(3) a quasi-exceptional path in the family Qs .
74
Furthermore, for any admissible S-tuple a, any almost invariant subgraph Xs , and
any Xs path γ, we have the following:
(4) Each iterate f#k (γ) is also an Xs path;
(5) f#a (γ) = f#as (γ).
6.2.5
The disintegration subgroup D(f )
Here we recall the definition of the disintegration subgroup D(f ) < Out(Fn ). We also
recall the “admissible semigroup” S(f ), which we will use as an aid to understanding
properties of D(f ).
The subgroup D(f ). [FH09, Defn. 6.10, Cor. 6.16, Lem. 6.18, Cor. 3.13]
This is the subgroup of Out(Fn ) generated by the set of elements
{φa
a is an admissible S-tuple}
The subgroup D(f ) is abelian and rotationless. The dependence of D(f ) on f rather
than just φ was suppressed in [FH09, Definition 6.10] where the notation D(φ) was
used; see [FH09, Example 6.11].
The admissible semigroup S(f ). [FH09, Corollary 7.6 and its proof]
Let S(f ) ⊂ ZS denote the set of admissible S-tuples, which forms a sub-semigroup
of ZS . Let L(f ) < ZS be the subgroup generated by S(f ). The map S(f ) 7→ D(f )
defined by a 7→ φa is an injective semigroup homomorphism, and it extends to an
isomorphism L(f ) 7→ D(f ). Every element of L(f ) can be written as the difference
a − b of two elements a, b ∈ S(f ), and so every ψ ∈ D(f ) can be written in the form
ψ = (φb )−1 φa for some a, b ∈ S(f ).
We record here a simple consequence of these definitions for later use:
Fact 6.2. The function which assigns to each a ∈ S(f ) the map f a : G → G satisfies
the following “homomorphic” property:
f#a (f#b (E)) = f#a+b (E) for each a, b ∈ S(f ) and each edge E ⊂ G
Proof. If E is a fixed edge of f then both sides equal E. Otherwise E is an edge in
some almost invariant graph Xs , hence E is an Xs -path, hence f#b (E) = (f bs )# (E) is
an Xs path, hence both sides equal (f as +bs )# (E).
We repeat here the theorem cited in Section 3:
Disintegration Theorem ([FH09, Theorem 7.2]). For every rotationless abelian
subgroup H < Out(Fn ) there exists φ ∈ H such that for every CT f : G → G
representing φ, the intersection H ∩ D(f ) has finite index in H.
75
Remark. In this statement of the Disintegration Theorem we have made explicit
the fact that [FH09, Theorem 7.2] holds for any choice of CT representing φ. This
was already implicit in the notation D(φ) used for disintegration groups in [FH09,
Definition 6.10] where any representative CT is allowed.
6.2.6
The coordinate homomorphism of a disintegration group D(f )
The disintegration group D(f ), being rotationless and abelian, has an injective coordinate homomorphism Ω : D(f ) 7→ ZN as defined at the end of Section 6.1.3, whose
coordinate functions are all expansion factor homomorphisms and comparison homomorphisms of D(f ). We review here how one may use the structure of the CT f
to pick out a subset of the coordinate functions of Ω — consisting of all the expansion factor homomorphisms but only a subset of the comparison homomorphisms —
and, after scaling the expansion factor homomorphisms, to obtain a homomorphism
denoted Ωf : D(f ) → ZI which is still injective.
[FH09, Lemmas 7.4 and 7.5 and preceding paragraphs].
Let I = {i Hi is either EG or NEG linear}. The homomorphism Ωf : D(f ) → ZI
will have coordinate functions denoted ωi : D(f ) → Z (i ∈ I), defined in two cases
depending on whether Hi is EG or NEG linear. Let Xs be the almost invariant
graph containing Hi . In the case that Hi = Ei is NEG linear with twist path w
and twist coefficient di , and so f (Ei ) = Ei w di , then we set ωi : D(f ) → Z to be the
homomorphism whose value on φa for each admissible S-tuple a is given by
ωi (φa ) = as di
In the case that Hi is EG then, letting λ be the Perron-Frobenius eigenvalue of
the transition matrix of f on Hi , the homomorphism ωi : D(f ) → Z is the unique
homomorphism such that ωi (φa ) = λas for each admissible S-tuple a. Letting Λi ∈
L(φ) be the attracting lamination of φ associated to the EG stratum Hi , we note
that ωi is a scaled copy of PFΛi , meaning that ωi (ψ) = m · PFΛ (ψ) for all ψ ∈ D(f ),
where m = PFΛi (φ).
We also define comparison homomorphisms ωi,j : D(f ) → Z, one for each LINequivalent pair of linear edges Ei , Ej , using the following formula:
ωi,j = ωi − ωj
The following properties hold, in particular the first two which relate the functions
Ωf : D(f ) → ZI and Ω : D(f ) → ZN :
• The coordinate functions ωi of Ωf for which Hi is an EG stratum correspond
one-to-one with the expansion factor coordinate functions PFΛ of Ω. Under this
correspondence, ωi is a scaled copy of PFΛ as explained above.
• The set consisting of the coordinate functions ωi of Ωf for which Hi is an NEG linear
stratum together with the functions ωi,j for all LIN-equivalent pairs of NEG linear
76
strata Hi , Hj is exactly the set of comparison homomorphism coordinate functions
of Ω.
• The homomorphism Ωf is injective.
• For each i ∈ I and each admissible S-tuple a we have ωi (φa ) = as ωi (φ).
7
A train track semigroup action
Throughout this section we continue to adopt Notations 4.1 regarding a rotationless
φ ∈ Out(Fn ) with a CT representative f : G → G whose top stratum Hu is EG with
associated attracting lamination Λ.
Consider the disintegration group D = D(f ), reviewed in Section 6.2. Recall
that each element of D stabilizes Λ. We shall focus on the subsemigroup D+ < D
consisting of all ψ ∈ D for which the value of top coordinate homomorphism ω(ψ) is
non-negative, meaning that the asymptotic stretch factor of ψ on Λ is ≥ 1, and so
either ψ does not stretch Λ or Λ is an attracting lamination of ψ.
Using the theory of disintegration groups, for each ψ ∈ D+ we construct a topological representative f ψ : G → G whose action on the edges of Hu agrees with the
ω(ψ)
action of the appropriate iterate of the CT f : G → G, namely f# . Then, by lifting
e projecting to the tree T ,
these topological representatives to the universal cover G,
∗
and extending to the coned off graph T , we obtain semigroup actions of D+ on T
and on T ∗ , detailed properties of which are described in Section 7.2. An important
feature of the action D+ y T is that it is not an isometric action, in fact the action
of each Ψ ∈ D+ will lengths in T by a uniform amount depending on the appropriate
value of the coordinate homomorphism ω (see Section 7.2 (4)). On the other hand,
by restricting the semigroup actions D+ y T, T ∗ to the subgroup D0 we obtain true
isometric actions D0 y T, T ∗ , some properties of which are studied in Section 7.3.
The actions constructed in this section will be the basis for the construction in
Section 8 of an isometric group action of D on the hyperbolic suspension complex S.
For use throughout Sections 7 and Section 8 we establish some further notations.
Notations 7.1. Given a rotationless φ ∈ Out(Fn ) with CT representative f : G → G
having associated filtration G1 ⊂ · · · ⊂ Gu with its top stratum Hu being EG, and
with all associated objects and notations as described in Notations 4.1, we have the
following additional objects and notations:
(1) [Section 6.1.1, “Properties of zero strata”] Huz is the union of Hu with all zero
strata enveloped by Hu . For some t ≤ u − 1 this set of zero strata has the form
{Hi t + 1 ≤ i ≤ u − 1} (which is empty if t = u − 1), where
(a) Ht is the highest irreducible stratum below Hu ,
(b) Gt is the union of noncontractible components of Gu−1 , the contractible
components being the zero strata Hi , t + 1 ≤ i ≤ u − 1.
77
(2) [Definitions 5.1, 5.3] Fn y T denotes the free splitting corresponding to the
marked graph pair (G, Gu−1 ), with associated Nielsen set {Nj }j∈J , each Nj
having basepoint set Zj ⊂ Nj . Also, Fn y T ∗ denotes the action obtained
from Fn y T by coning off each basepoint set Zj to a cone point Pj with edges
Pn Q (Q ∈ Zj ).
(3) [Definition 5.2] Associated to each automorphism Φ ∈ Aut(Fn ) representing φ
are unique Φ-twisted equivariant maps as follows:
e → G,
e a lift of f ;
(a) f˜Φ : G
e→
(b) fTΦ : T → T , induced by f˜Φ with respect to the collapse map G
7 T.
(c) fT ∗ : T ∗ → T ∗ , an extension of fTΦ that permutes cone points and cone
edges.
The maps fTΦ , fTΦ∗ satisfy the “Stretch properties” recorded in Section 5.3.
(4) The disintegration group of f is denoted D = D(f ). Its full pre-image in Aut(Fn )
b and is called the extended disintegration group.
is denoted D
(5) Associated to the top EG stratum Hu we have the following objects:
• The almost invariant subgraph Xs ⊂ G containing Huz ;
• The coordinate homomorphism ω : D → Z associated to Xs , which is a
scaled copy of the expansion factor homomorphism PFΛ ;
b → Z, obtained by pre-composing
• The lifted coordinate homomorphism ω
b:D
b 7→ D.
ω with the projection map D
• The kernels of these homomorphisms denoted
b0 = ker(b
D
ω)
D0 = ker(ω)
We thus have a commutative diagram with short exact rows:
1
/
b0
ker(b
ω) = D
b
D
/
O
⊂
Fn ≈ Inn(Fn )
1
/
/
ω
b
/Z
O
ω
b
D
/
D
⊂
1
/
Fn ≈ Inn(Fn )
/
Aut(Fn )
/
1
/
⊂
Out(Fn )
(6) Letting [0, ∞) = {0, 1, 2, . . .} we have subsemigroups D+
as follows:
D0 = ω −1 (0) < D+ = ω −1 [0, ∞) <
b0 = ω
b+ = ω
D
b −1 (0) < D
b −1 [0, ∞) <
78
1
/
/
1
b+ and inclusions
and D
D
b
D
7.1
A “homotopy semigroup action” of D+ on G.
b+ y T , in this section we
To prepare for the construction of the semigroup action D
work downstairs in G and construct a “homotopy semigroup action” of D+ on T .
What this means will be clear from the construction, but the intuitive idea is we
associate a topological representative f ψ : G → G to each ψ ∈ D+ so that although
′
′
the action equation f ψ ◦f ψ = f ψψ does not hold exactly, it does hold “up to homotopy
relative to Gt ”. The values of f ψ on edges of Hnz are determined by appropriate
iterates of f itself, and the values on Gt are determined, up to homotopy, by the
“graph homotopy principle” of Section 4.6.
Letting Vert(G) denote the set of vertices of G, we define subsets
P ⊂ F ix ⊂ V ⊂ Vert(G)
as follows. First, V = Vert(G) ∩ Hu = Vert(G) ∩ Huz , the latter equation holding
because each edge E ⊂ Huz \ Hu has both endpoints in Hu [FH11, Definition 4.10
(Zero Strata)]. Next, P = Huz ∩ Gt = Hu ∩ Gt ; note that P ⊂ G because Huz and Gt
are subgraphs having no edges in common; also P is the frontier both of Huz and of
Gt in G, G = Huz ∪ Gt . Finally, F ix denotes the set of points in V fixed by f , and
the inclusion P ⊂ F ix follows from [FH11, Remark 4.9].
Here is a summary of the construction of the “homotopy semigroup action”:
(1) For each ψ ∈ D+ we define a topological representative f ψ : G → G such that
the following hold:
(a) We have f IdD+ = IdG (where IdD+ ∈ D+ denotes the identity group element, and IdG : G → G the identity map).
(b) f ψ (Gu−1 ) ⊂ Gu−1 and f ψ (Gt ) ⊂ Gt .
ω(ψ)
(c) For each edge E ⊂ Huz we have f ψ (E) = f#
then f ψ Huz is the identity.
(E). In particular, if ψ ∈ D0
(d) f ψ V = f ω(ψ) V . In particular f ψ (V ) ⊂ V and f ψ fixes each point of
F ix and of its subset P .
(e) If a height u indivisible Nielsen path ρ exists then f ψ fixes each endpoint
of ρ and f#ψ (ρ) = ρ.
′
(2) For each ψ, ψ ′ ∈ D+ we define a homotopy hψ,ψ : G × [0, 1] → G between
′
′
f ψ ◦ f ψ and f ψψ such that the following hold:
′
(a) For each edge E ⊂ Hu the homotopy hψ,ψ straightens the edge path
′
′
f ψ ◦f ψ E relative to its endpoints to form the path f ψψ E by cancelling
only edges of Gu−1 , without ever cancelling any edges of Hu .
′
(b) hψ,ψ is stationary on V .
79
′
(c) hψ,ψ preserves Gt .
Recall that a homotopy h : A × [0, 1] → A “preserves” a subset B ⊂ A means that
h(B × [0, 1]) ⊂ B, and for h to be “stationary” on B means that h(x × [0, 1]) is
constant for each x ∈ B.
′
First we will construct the maps f ψ and then the homotopies hψ,ψ , along the way
proving the various requirements of (1) and (2).
Constructing f ψ . We being with the construction of ftψ = f ψ Gt : Gt → Gt
by applying the graph homotopy principle Lemma 4.14. Recall from Section 6.2.5
the abelian semigroup of admissible S-tuples S(f ). Recall also the injection S(f ) ≈
L(f ) < D defined by a 7→ φa with topological representative f a : G → G; this injection is a semigroup homomorphism whose image L(f ) generates D. Since the
restricted map fta = f a
Gt : Gt → Gt is a homotopy equivalence that fixes
each point of P , by Lemma 4.14 (1) the map of pairs fta : (Gt , P ) → (Gt , P )
is a homotopy equivalence in the category of pairs, and hence its homotopy class
rel P is an element [fta ] of Autgp
0 (Gt , P ), the pure automorphism group of (Gt , P )
in the graph point category (Lemma 4.14 (4)). By Fact 6.2, for each a, b ∈ S(f )
the maps fta ◦ ftb and fta+b : (Gt , P ) → (Gt , P ) are homotopic rel P , and so the
a
a
map A : L(f ) 7→ Autgp
0 (Gt , P ) defined by A(φ ) = [ft ] is a semigroup homomorphism. Since the commutative group D is generated by its subsemigroup L(f ), a
simple semigroup argument shows that A extends uniquely to a group homomorψ
phism A : D → Autgp
0 (Gt , P ). For each ψ ∈ D choose ft : (Gt , P ) → (Gt , P ) to be
a representative of A(ψ); if ψ = φa is already in L(f ) then we choose ftψ = fta , and
so if ψ is the identity then ftψ is the identity. Notice that no straightening is carried
out when ftψ is applied, and so there is no need for the “#” operator in the definition
of ftψ .
(φa )−1
: (Gt , P ) → (Gt , P ), which
For later use, for each a ∈ S(f ) we denote f¯ta = ft
is the homotopy inverse of fta that represents A((φa )−1 ) = A(φa )−1 ∈ Autgp
0 (Gt , P ).
ψ
For each ψ ∈ D+ we may now define f : G → G as follows:
ω(ψ)
f ψ (E) = f#
(E) for each E ⊂ Huz , and
f ψ Gt = ftψ
If ψ ∈ D is the identity then clearly f ψ : G → G is the identity, verifying (1a). By
construction f ψ satisfies (1b) and (1c). For item (1d), note first that for each x ∈ V
there exists an oriented edge E ⊂ Hu with initial vertex x, and for each such E the
ω(ψ)
initial vertex of the path f ψ (E) = f# (E) equals f ω(ψ) (x); and if in addition x ∈ P
then both of f ω(ψ) and ftψ fix x. This shows that f ψ is well-defined on V , and that it
restricts to f ω(ψ) on V , completing the proof of item (1d); it also follows that f ψ is
continuous.
The proof that f ψ is a homotopy equivalence and is a topological representative
of ψ will be delayed to the very end.
80
Xs -paths under f ψ . Item (1e) is encompassed in the following generalization
of (1c), which will also be used for item (2):
ω(ψ)
(3) For each ψ ∈ D+ and each Xs -path γ with endpoints in V we have f#ψ (γ) = f#
(γ).
To see why this holds, the general Xs -path γ with endpoints in V is a concatenation
of three special types, and it suffices to check (3) only for these types:
Type (a): edges in Huz ;
Type (b): Xs -paths in Gt having endpoints in the set P .
Type (c): a height u indivisible Nielsen path of f ;
Type (a) is the special case handled already in item (1c).
If γ is of type (b), first note that for a ∈ S(f ) and ψ = φa ∈ L(f ) we have
ω(ψ)
f#ψ (γ) = (ftψ )# (γ) = (fta )# (γ) = f#a (γ) = f#as (γ) = f#
(γ)
where the second-to-last equation follows from Section 6.2.4 (5). For more general
ψ ∈ D+ , choose a, b ∈ S(f ) so that ψ = (φb )−1 φa , and note that as − bs = ω(φa ) −
ω(φb) = ω(ψ) ≥ 0. In the group Autgp (Gt , P ) we have the equation [ftψ ] = [f¯tb ] [fta ]
and so we may calculate
f#ψ (γ) = (ftψ )# (γ) = (f¯tb ◦ fta )# (γ) = (f¯tb )# ((fta )# (γ))
= (f¯tb )# (f#a (γ)) = (f¯tb )# (f#as (γ))
ω(ψ)
(γ)))
= (f¯b )# (f bs (f as −bs (γ))) = (f¯b )# (f b (f
t
#
t
#
#
#
ω(ψ)
ω(ψ)
= (f¯tb )# ((ftb)# (f# (γ))) = (f¯tb ◦ ftb )# (f# (γ))
ω(ψ)
= f#
(γ)
where the second equations of the second and third lines follow from Section 6.2.4 (4)
and (5).
For type (c), let γ be a height u indivisible Nielsen path of f . We may write γ as
an alternating concatenation of nontrivial paths of the form
γ = η0 µ1 η1 · · · ηK−1 µK ηK
where each ηk is a path in Huz and each µk is a Nielsen path of f in Gt with endpoints
in P [FH11, Lemma 4.24]. By definition of f ψ we have
ω(ψ)
f#ψ (γ) = [f#
ω(ψ)
(E1 ) (ftψ )# (µ1 ) f#
ω(ψ)
(η1 ) · · · f#
ω(ψ)
(ηK−1 ) (ftψ )# (µK ) f#
(ηK )]
We claim that each µk is a Nielsen path of ftψ for each ψ ∈ D, and so (ftψ )# (µk ) = µk .
To prove this claim, it holds if ψ = φa ∈ L(f ) for some a ∈ S(f ), because in that case
81
the left hand side equals (f a )# (µk ) = µk . Using that [f¯tψ ] = [ftψ ]−1 ∈ Autgp (G, P ),
we have µk = (f¯tψ )# (ftψ (µk )) = (f¯tψ )# (µk ), and so the claim holds if ψ = (φa )−1 for
some a ∈ S(f ). The general case holds because ψ = (φb )−1 φa for some a, b ∈ S(f ).
Applying the claim we have:
ω(ψ)
(E1 ) µ1 f#
ω(ψ)
(E1 ) f#
f#ψ (γ) = [f#
= [f#
=
ω(ψ)
ω(ψ)
ω(ψ)
(η1 ) · · · f#
ω(ψ)
(µ1 ) f#
ω(ψ)
(ηK−1) µK f#
ω(ψ)
(η1 ) · · · f#
(ηK )]
ω(ψ)
(ηK−1 ) f#
ω(ψ)
(µK ) f#
(ηK )]
ω(ψ)
f# (γ)
This complete the proof of (3).
This also completes the construction of f ψ : G → G and the proof of (1) for each
ψ ∈ D+ , except that we will delay further the proof that f ψ is a homotopy equivalence
and a topological representative of ψ.
′
Constructing hψ,ψ . Given ψ, ψ ′ ∈ D+ we turn to the construction of the ho′
′
′
motopy hψ,ψ : G × [0, 1] → G from f ψ ◦ f ψ to f ψψ . Let θ = ψψ ′ ∈ D+ . First,
gp
using the homomorphism A : D → Aut0 (G, P ) we have A(ψψ ′ ) = A(ψ)A(ψ ′) which
′
′
′
translates to [ftψψ ] = [ftψ ] [ftψ ] and so there exists a homotopy rel P from ftψ ◦ ftψ to
′
′
ftψψ denoted hψ,ψ
: Gt × [0, 1] → Gt . Second, for each E ⊂ Huz we have
t
′
ω(ψ′ )
f#ψ (f#ψ (E)) = f#ψ (f#
ω(ψ)
(E)) = f#
ω(ψ′ )
(f#
ω(ψψ′ )
(E)) = f#
′
(E) = f#ψψ (E)
ω(ψ′ )
where the second equation holds by applying (3) together with the fact that f# (E)
′
is an Xs -path (Section 6.2.4 (4)). Putting these together, we may define hψ,ψ so that
for each edge E ⊂ Huz its restriction to E × [0, 1] is a homotopy rel endpoints from
′
′
′
f ψ ◦ f ψ E to f ψψ E, and its restriction to Gt × [0, 1] is equal to hψ,ψ
. Items
t
(2b) and (2c) are evident from the construction. Item (2a) follows the definition of a
relative train track map, which tells us that for each edge E ⊂ Hu and each integer
i ≥ 0 the path f#i (E) is u-legal, and that for each u-legal path γ the homotopy that
straightenes f i (γ) to produce f#i (γ) cancels no edges of Hu .
Topological representatives. For each ψ ∈ D+ , since L(f ) generates D we
may choose a, b ∈ S(f ) so that ψ = (φb )−1 φa , and hence φb ψ = φa . Since all three
b
of φb , ψ, φa are in D+ , we have a homotopy hφ ,ψ from f b ◦ f ψ to f a . Since f a , f b
are homotopy equivalences it follows that f ψ is also, and since f a , f b are topological
representatives of φa , φb respectively it follows that f ψ is a topological representative
of (φb )−1 φa = ψ.
7.2
b+ on T and T ∗
Semigroup actions of D
b+ y T , deriving various properties
We turn now to the construction of the action D
b+ y T ∗ .
of the construction, and then we extend the action to D
82
b+ we define a map f Ψ : T → T by carrying out the
Associated to each Ψ ∈ D
following steps. First let ψ ∈ D+ be the image of Ψ under the homomorphism
Aut(Fn ) 7→ Out(Fn ), and consider the map f ψ : (G, Gu−1 ) → (G, Gu−1 ), part of the
e G
eu−1 ) →
“homotopy semigroup action” constructed in Section 7.1. Let f˜Ψ : (G,
e G
eu−1 ) be the unique Ψ-twisted equivariant lift of f ψ to G.
e Let f Ψ : T → T be the
(G,
eu−1
Ψ-twisted equivariant map induced from f˜Ψ by collapsing each component of G
Ψ
to a point and then straightening on each edge E ⊂ T so that f
E stretches length
by a constant factor.
We record several properties of this semigroup action:
(1) Twisted equivariance: The map f Ψ is Ψ-twisted equivariant.
′
′
b+ .
(2) Semigroup action property: f Ψ ◦ f Ψ = f ΨΨ for all Ψ, Ψ′ ∈ D
′
′
Property (2) follows from the fact that f Ψ (f Ψ (E)) = f ΨΨ (E) for each edge E ⊂ T ,
which is a consequence of Section 7.1 item (2a) applied to edges of Hu .
(3) Vertex Action Property: f Ψ takes vertices to vertices, and it restricts to a
bijection of the set of vertices having nontrivial stabilizer.
For the proof, denote vertex sets by V (G) ⊂ G and V (T ) ⊂ T , and let V nt (T ) denote
the subset of all v ∈ V (T ) such that StabFn (v) is nontrivial. By Section 7.1 items (1d)
and (1b), the map f ψ takes the set Gu−1 ∪ V (G) to itself, and since f ψ is a topological
representative it follows that f ψ restricts further to a homotopy equivalence amongst
eu−1 ⊂ G
e and V (G)
e ⊂G
e
the noncontractible components of Gu−1 ∪ V (G). Letting G
e→G
e restricts to a self-map
be the total lifts of Gu−1 and V (G), it follows that f˜Ψ : G
eu−1 ∪ V (G),
e and it restricts further to a bijection amongst
of the components of G
e → T , the set
the components having nontrivial stabilizer. Under the quotient map G
e
e
of components of Gu−1 ∪ V (G) corresponds bijectively and Fn -equivariantly to the
vertex set V (T ). It follows that f Ψ : T → T restricts to a self map of V (T ), and that
it restricts further to a bijection of V nt (T ), proving property (3).
(4) Stretch Property: f Ψ maps each edge E ⊂ T to an edge path f Ψ (E) ⊂ T ,
stretching length by a uniform factor of λωb(Ψ) .
This follows from the definition of the piecewise Riemannian metric on T in Section 5.2, the eigenlength equation in T in Section 5.3, and Section 7.1 item (1c).
b and each edge E of T , the restriction
(5) Train Track Property: For each Ψ, Ψ′ ∈ D
Ψ
Ψ′
of f to the edge path f (E) is injective.
This follows from property (2) together with property (4) as applied to ΨΨ′ .
For the statement of property (6), recall from Section 2.5 the subgroup Stab[T ] <
g ] < Aut(Fn ). Recall particularly Lemma 2.5 of that
Out(Fn ) and its pre-image Stab[T
g ] containing Inn(Fn ) has a unique
section, which says that each subgroup of Stab[T
action on T extending the given action of the free group Fn ≈ Inn(Fn ) such that each
element of the action satisfies a twisted equivariance property.
83
g ].
b0 : We have D0 < Stab[T ] and hence D
b0 < Stab[T
(6) Restricted action of D
b0 of the semi-action D
b+ y T is identical to
Furthermore, the restriction to D
b0 y T given by Lemma 2.5: the unique isometric action of D
b0 on T
the action D
b
such that each Ψ ∈ D0 satisfies Ψ-twisted equivariance.
b0 with projected image ψ ∈ D0 . The map f ψ : G → G
For the proof, consider Ψ ∈ D
restricts to the identity on each edge E ⊂ Hu , by Section 7.1 item (1c). The map
e→G
e therefore permutes the edges of H
e u , mapping each isometrically to its
f˜Ψ : G
image. It follows that the map f Ψ : T → T is an isometry. Since f Ψ satisfies Ψtwisted equivariance (property (1)), it follows that ψ ∈ Stab[T ] (Lemma 2.7). Since
g ]. Applying,
b0 < Stab[T
ψ ∈ D0 is arbitrary, we have proved D0 < Stab[T ] and that D
Ψ
Lemma 2.9 we have also proved that the map Ψ 7→ f is the same as the restriction
g ] y T given in that lemma, namely the unique action
to D0 of the action Stab[T
assigning to Ψ the unique Ψ-twisted equivariant isometry of T .
b and each j ∈ J there exists j ′ ∈ J
(7) Invariance of Nielsen data: For each Ψ ∈ D
such that Nj ′ = (f Ψ )# (Nj ), and f Ψ restricts to an order preserving bijection of
fΨ
basepoint sets Zj −→ Zj ′ . In particular f#Ψ induces a bijection of the Nielsen
paths in T (Definition 5.3).
This follows immediately from Section 7.1 item (1e).
Finally, as an immediate consequence of property (7) we have:
b+ y T ∗ : The semigroup action D
b+ y T extends uniquely to
(8) Extension to D
b+ ,
b+ y T ∗ , denoted f Ψ = f Ψ∗ : T ∗ → T ∗ for each Ψ ∈ D
a semigroup action D
∗
T
Ψ
Ψ
such that f∗ permutes the cone points Pj , and f∗ permutes the cone edges Pj Q
by isometries. In particular, for each j ∈ J and Q ∈ Zj , letting Nj ′ = f#Ψ (Nj )
and Q′ = f Ψ (Q), we have f∗Ψ (Pj ) = Pj ′ and Ψ Pj Q = Pj′Q′ .
7.3
b0 y T ∗
Dynamics of the group action D
Isometries of a simplicial tree equipped with a geodesic metric satisfy a dichotomy:
each isometry is either elliptic or loxodromic. This dichotomy does not hold for all
isometries of Gromov hyperbolic spaces — in general, there is a third category of
isometries, namely the parabolics. In this section we prove Lemma 7.2 which says in
b0 y T ∗ .
part that the dichotomy does hold for the action D
b0 y T ∗ , each element ∆ ∈ D
b0
Lemma 7.2 (Dynamics on T ∗ ). Under the action D
b0 acts loxodromically
acts either loxodromically or elliptically on T ∗ . More precisely, D
b0 acts loxodromically on T and its axis A ⊂ T is not a Nielsen
on T ∗ if and only if D
line (Definition 5.3), in which case A is a quasi-axis for ∆ in T ∗ . Furthermore, the
b0 have “uniform uniformly positive stable translation length”
loxodromic elements of D
84
b0 acting
in the following sense: there exist constants η, κ > 0 such that for each ∆ ∈ D
∗
∗
loxodromically on T , and for each x ∈ T and each integer k ≥ 0, we have
d∗ (∆k (x), x) ≥ k η − κ
Remarks. In this lemma, the terminology “uniform uniformly positive stable
translation length” refers to the corollary that the stable translation length
1
d∗ (∆k (x), x))
k→∞ k
lim
has a uniform positive lower bound η > 0 independent of the choice of a loxodromic
b0 , and the rate at which this positive lower bound is approached is
element ∆ ∈ D
uniform. This property will be applied in Section 8.2, for purposes of characterizing
b y S that is described in Section 8.1.
the loxodromic elements of the action D
Lemma 7.2 and proof could already have been presented almost word-for-word
back in Section 5.4 for the restricted action Inn(Fn ) ≈ Fn y T ∗ . Other than the
methods available in Section 5.4, the additional things needed to prove the lemma
b0 y T ∗ , like its restriction, satisfies twisted equivariance
are that the larger action D
and preserves Nielsen paths and associated objects (Section 7.2 (7), (8)).
Proof. Throughout the proof we will apply Section 7.2 (7), (8) regarding the action
b0 on Nielsen paths, elements of the Nielsen set {Ni }, the basepoint sets Zi ⊂ Ni ,
of D
the cone points Pi , and the cone edges Pi Q, Q ∈ Zi . In particular, because the action
b0 on T preserves Nielsen paths, it takes maximal ρ∗ -subpaths of any
of each ∆ ∈ D
path α to maximal ρ∗ -subpaths of the path ∆(α).
b0 . If ∆ acts elliptically on T then it fixes a vertex of T ; and if in
Consider ∆ ∈ D
the geometric case ∆ acts loxodromically on T and its axis is a Nielsen line Nj , then
∆ fixes the corresponding cone point Pj ; in either case ∆ acts elliptically on T ∗ .
Suppose that ∆ acts loxodromically on T and its axis A ⊂ T is not a Nielsen
line (this always happens in the nongeometric case, but the terminology of our proof
applies to all cases). For each vertex x ∈ T and each integer k ≥ 1 consider the Proposition 5.5 decomposition of the path [x, ∆k (x)] into “ν-subpaths” meaning maximal
ρ∗ subpaths, alternating with “µ-subpaths” each having no ρ∗ subpath. Since the
intersection [x, ∆k (x)] ∩ A contains a concatenation of k fundamental domains for the
action of ∆ on A, it follows that if [x, ∆k (x)] ∩ A contains a ν-subpath of [x, ∆k (x)]
then it must contain k − 1 distinct ν-subpaths of [x, ∆k (x)], between which there are
k − 2 distinct µ-subpaths of [x, ∆k (x)]; here we are applying the fact that ∆ takes
maximal ρ∗ paths to maximal ρ∗ paths. As a consequence, the collection of µ-subpaths
of [x, ∆k (x)] contains at least k − 2 distinct edges of T . Applying Proposition 5.5 (4)
we obtain DPF (x, ∆k (x)) ≥ (k − 2)η ′ where η ′ = min{lPF (E) E is an edge of T }.
85
Applying Proposition 5.8, in T ∗ we have
′
2η
η′
−
+C
d∗ (x, ∆ (x)) ≥ k
K
|{z}
|K {z }
k
=η
= κ′
It immediately follows that ∆ acts loxodromically on T ∗ . This estimate is for vertices
of T , but a similar estimate holds for arbitrary points x ∈ T ∗ , replacing κ′ by κ =
κ′ + 2δ where δ is an upper bound for the distance in T ∗ from an arbitrary point of
T ∗ to the vertex set of T .
8
The suspension action.
In this section we complete the proof of the multi-edge case of Theorem F.
Throughout this section we adopt Notations 4.1 and 7.1 concerning a rotationless
φ ∈ Out(Fn ) and a CT representative f : G → G with top EG stratum Hu , with
disintegration group D = D(f ) < Out(Fn ), and with free splitting Fn y T associated
to the pair (G, Gu ). In particular, in Section 5 we used the coned off free splitting
Fn y T ∗ to construct the suspension space S, proving that S is Gromov hyperbolic by
using flaring properties of the action Fn y T ∗ . In Section 7 we studied the extended
b < Aut(Fn ) and its subsemigroup D
b+ < D,
b and we constructed
disintegration group D
b+ y T ∗ .
the train track semigroup action D
b+ y T ∗ to
In Section 8.1 we shall show how to suspend the semigroup action D
b y S (this is a completely general construction that applies to
an isometric action D
the disintegration group of any CT having top EG stratum).
In Section 8.2 we put the pieces together to complete the proof.
8.1
b y S.
The suspension action D
Recall from Notations 7.1 the short exact sequence
ω
bu
b0 7→ D
b−
1 7→ D
→Z→1
b representing φ ∈ D, and so ω
Choose an automorphism Φ ∈ D
bu (Φ) = 1. It follows
that Φ determines a splitting of the above short exact sequence, and hence a semidirect
b≈D
b0 ⋊Φ Z expressed in terms of the inner automorphism on D
b
product structure D
b may be
determined by Φ, namely I(Ψ) = IΦ (Ψ) = ΦΨΦ−1 . Thus each element of D
b0 and m ∈ Z, and the group operation in
written in the form ∆Φm for unique ∆ ∈ D
this notation is defined by
(∆1 Φm1 )(∆2 Φm2 ) = (∆1 I m1 (∆2 ))Φm1 +m2
Recall from Definition 5.11 the construction of S: using the chosen automorphism
Φ representing φ, the corresponding Φ-twisted equivariant map of T ∗ is denoted in
86
abbreviated form as f∗ = fTΦ∗ , and S is the suspension space of f∗ , namely the quotient
of T × Z × [0, 1] with identifications [x, k, 1] ∼ [f∗ (x), k + 1, 0]. Recall also various
other notations associated to S that are introduced in Definitions 5.11 and 5.12.
b it suffices to carry
To define the action on S of each element Ψ = ∆Φk ∈ D
b
out the following steps: first we define the group action D0 y S; next we define
the action of the element Φ y S; then we define the action of each element ∆Φk
by composition; and finally we verify that the two sides of the semidirect product
relation Φ∆ = I(∆)Φ act identically.
b0 act on [x, k, t] ∈ S by the equation
Let each ∆ ∈ D
∆ · [x, k, t] = [f∗I
k (∆)
(x), k, t] = [f∗Φ
k ∆Φ−k
(x), k, t]
and note that this formula is well defined because, using the properties of the semib+ y T from Section 7.2, we have
group action D
∆ · [x, k, 1] = [f∗Φ
k ∆Φ−k
(x), k, 1] = [f∗Φ ◦ f∗Φ
Φk+1 ∆Φ−(k+1)
= [f∗
k ∆Φ−k
(x), k + 1, 0]
◦ f∗Φ (x), k + 1, 0]
= ∆ · [f∗Φ (x), k + 1, 0]
= ∆ · [f∗ (x), k + 1, 0]
b0 evidently acts by an isometry. Again using the semigroup action
Each ∆ ∈ D
b0 :
properties, the action equation is satisfied for each ∆′ , ∆ ∈ D
∆′ · (∆ · [x, k, t]) = [f∗I
=
k (∆′ )
◦ f∗I
k (∆)
(x), k, t]
k
′
k
[f∗I (∆ )◦I (∆) (x), k, t]
k
′
= [f∗I (∆ ∆) (x), k, t]
= ∆′ ∆ · [x, k, t]
b0 y S.
This completes the definition of the isometric action D
b0 y S agrees with
We note that the restriction to Fn ≈ Inn(Fn ) of the action D
the action Fn y S given in Definition 5.11, defined in general by γ · [x, k, r] =
[Φk (γ) · x, k, r] for each γ ∈ Fn . In the special case k = 0, r = 0, the equation
i
γ · x = f∗γ (x) holds by Lemma 2.7 (5). The extension to the general case follows
easily.
Next, let Φ act by shifting downward,
Φ · [x, k, t] = [x, k − 1, t]
which is evidently a well-defined isometry.
87
b0 the two sides of the semidirect product equation act
As required, for each ∆ ∈ D
in the same way:
Φ · ∆ · [x, k, t] = Φ · [f∗I
k (∆)
(x), k, t]
I k (∆)
= [f∗
(x), k − 1, t]
I(∆) · Φ · [x, k, t] = I(∆) · [x, k − 1, t]
= [f∗I
k−1 (I(∆))
I k (∆)
= [f∗
(x), k − 1, t]
(x), k − 1, t]
b0 preserves each “horizontal level set” Ss ,
Notice that since the action of each ∆ ∈ D
and since the action of Φ has “vertical translation” equal to −1 = −b
ω (Φ) meaning
b
that Φ(Ss ) = Ss−bω(Φ) , it follows that for each Ψ ∈ D the integer −b
ω (Ψ) is the “vertical
translation length” for the action of Ψ in S. We record this for later use as:
b and each fiber Ss (s ∈ R), we have
Lemma 8.1. For each Ψ ∈ D
Ψ(Ss ) = Ss−bω(Ψ)
8.2
for any s ∈ R
Proof of Theorem F: The multi-edge case.
First we set up the notation, based on the formulation of the multi-edge case in
Section 2.6 and the outline of the proof in Section 3.1, and we apply the results of
b y S. After that, Conclusions (1), (2)
Section 8.1 to obtain a hyperbolic action H
and (3) of Theorem F are proved in order.
b < Aut(Fn ) with image H < Out(Fn )
Setup of the proof. We have a subgroup H
b 7→
under the quotient homomorphism Aut(Fn ) 7→ Out(Fn ), and with J = Kernel(H
b is finitely generated
H), satisfying the hypotheses of Theorem F: H is abelian; H
b
and not virtually abelian; and no proper, nontrivial free factor of Fn is H-invariant.
The conclusion of Theorem F is about the existence of a certain kind of hyperbolic
b and so we are free to replace H
b with
action of a finite index normal subgroup of H,
b ′ < H,
b because once the conclusion is proved using some
any finite index subgroup H
′
b ′ , the same
hyperbolic action N y S of some finite index normal subgroup N ′ ⊳ H
conclusion follows for the restriction of N ′ y S to the action N y S where N
b conjugates of N ′ ; one need only observe that the
is the intersection of all of its H
conclusions of Theorem F for the action N ′ y S imply the same conclusions when
restricted to any finite index subgroup of N ′ .
We may therefore assume that H is a rotationless abelian subgroup, using the
existence of an integer constant k such that the k th power of each element of Out(Fn )
88
1
/
b∩D
b0
K=H
O
b
H
/
⊂
1
/
b ∩ Inn(Fn )
J =H
⊂
ZO
/
H
⊂
/
/D
⊂
1
/
Fn ≈ Inn(Fn )
/
Aut(Fn )
/
1
⊂
b
D
1
/
ωu
Fn ≈ Inn(Fn )
/
/
b
H
/
1
ω
bu
1
/
/
⊂
Out(Fn )
/
1
b and associated objects in a commutative diagram with short
Figure 2: The group H
exact rows.
is rotationless, and replace the abelian group H by its finite index subgroup of k th
powers.
We have a maximal, proper, H-invariant free factor system B of co-edge number
≥ 2 in Fn . Applying the Disintegration Theorem, we obtain φ ∈ H such that for
any CT representative f : G → G of φ with disintegration group D = D(f ), the
subgroup H ∩ D has finite index in H. We choose f so that the penultimate filtration
element Gu−1 represents the free factor system B. Since the co-edge number of B
is ≥ 2, the top stratum Hu is EG. Replacing H with H ∩ D, we may thus assume
H < D.
We now adopt Notations 4.1 and 7.1, regarding the free splitting Fn y T associated to the marked graph pair (G, Gu−1 ), the action Fn y T ∗ obtained by coning off
the elements of the Nielsen set, the disintegration group D = D(f ), and its associated
b Using that H < D it follows that H
b < D.
b Setting
extended disintegration group D.
ω
b
u
b 7→ H) and K = Kernel(H
b −→
J = Kernel(H
Z) we may augment the commutative
diagram of Notations 4.1 (4) to obtain the commutative diagram with short exact
rows shown in Figure 8.2.
From Notations 7.1 (6) we also have the subgroups and subsemigroups D0 < D+ <
b0 < D
b+ < D.
b
D and D
∗
b+ y T be the semigroup action described in Section 7.2, associating to each
Let D
b<D
b to be any pre-image of φ ∈ H < D.
b
Ψ ∈ D+ a map fTΨ∗ : T ∗ → T ∗ . Pick Φ ∈ H
Let S be the suspension space of fTΦ∗ : T ∗ → T ∗ as constructed in Definition 5.11. Let
b y S be the isometric action constructed in Section 8.1. We will make heavy use
D
b0 -equivariant identification S0 ↔ T ∗ .
of the integer sections Sj (j ∈ Z) and of the D
We turn to the proof of the three conclusions of Theorem F for the action of
b on S.
N =H
89
b acts either elliptically or
Proof of Conclusion (1): Every element of H
b acts either
loxodromically on S. We show more generally that every element of D
b has the
elliptically or loxodromically on S. From Section 8.1 the general element of D
b0 , and Ψ(Sj ) = Sj−m for any j ∈ Z. If m 6= 0 then,
form Ψ = ∆Φm for some ∆ ∈ D
by Lemma 5.13, for each k ∈ Z and each x ∈ S we have d(x, Ψk (x)) ≥ km , and so
Ψ is loxodromic. Suppose then that m = 0 and so Ψ = ∆ preserves Sj for each j ∈ Z.
Consider in particular the restriction ∆ S0 ≈ T ∗ and the further restriction ∆ T .
If ∆ is elliptic on T then it fixes a point of T , hence ∆ fixes a point of T ∗ ≈ S0 ⊂ S,
and so ∆ is elliptic on T ∗ and on S. If ∆ is loxodromic on T with axis L∆ ⊂ T , and if
L∆ is a Nielsen line Nj then ∆ fixes the corresponding cone point Pj ∈ T ∗ ∈ S0 ⊂ S,
and so ∆ is elliptic on T ∗ and on S.
b0 which act loxodromically on T and whose
It remains to consider those ∆ ∈ D
axes in T are not Nielsen lines. Applying Lemma 7.2, each such ∆ acts loxodromically
on T ∗ and for each x ∈ T ∗ and each integer k ≥ 1 we have
(∗)
d∗ (x, ∆k (x)) ≥ k η − κ
where the constants η, κ > 0 are independent of ∆ and x.
Consider the function which assigns to each integer k the minimum translation
distance of vertices v ∈ S under the action of ∆k :
σ(k) = inf dS (v, ∆k (v))
v∈S
To prove that ∆ acts loxodromically on S we apply the classification of isometries
of Gromov hyperbolic spaces [Gro87], which says that every isometry is elliptic,
parabolic, or loxodromic. But if ∆ is elliptic or parabolic then the function σ(k)
is bounded. Thus it suffices to prove that limk→∞ σ(k) = ∞.
b0 . Consider also the Φ−i -twisted
For each integer i, consider ∆′i = Φi ∆Φ−i ∈ D
∗
equivariant map ji : T = S0 → Si given by ji [x, 0, 0] = [x, i, 0], which is an isometry
from the metric d∗ = d0 to the metric di . This map ji conjugates the action of ∆k on
b0 on S0 , because
Si to the action of (∆′i )k = Φi ∆k Φ−i ∈ D
i
∆k ji [x, 0, 0] = ∆k [x, i, 0] = [f∗Φ ∆
k Φ−i
(x), i, 0]
∆′i
∆′i
= [f∗ (x), i, 0] = ji [f∗ (x), 0, 0]
= ji ∆′i [x, 0, 0]
Applying the inequality (∗) to ∆′i , and then applying the twisted equivariant isometric
conjugacy ji between ∆k and (∆′i )k , for each vertex p ∈ Si we have
(∗∗)
di (p, ∆k (p)) ≥ k η − κ
As seen earlier, the uniformly proper maps Si ֒→ S have a uniform gauge function
δ : [0, ∞) → [0, ∞) (see (∗) in Section 5.6). If σ(k) does not diverge to ∞ then there
90
is a constant M and arbitrarily large values of k such that dS (p, ∆k (p)) ≤ M holds for
some i and some vertex p ∈ Si , implying by that di (p, ∆k (p)) ≤ δ(M), contradicting
(∗∗) for sufficiently large k.
This completes the proof of Conclusion (1).
Furthermore, we have proved the following which will be useful later:
b0 the following are equivalent: ∆ acts loxodromically on S;
• For each ∆ ∈ D
∆ acts loxodromically on T ∗ ; ∆ acts loxodromically on T and its axis is not a
Nielsen line.
b y S is nonelementary. We shall focus
Proof of Conclusion (2): The action H
on the restricted actions of the subgroup J, proving first that J has nonelementary
action on T , then on T ∗ , and then on S; from the latter it follows that the whole
b y S is nonelementary.
action H
We shall apply Lemma 2.10 and so we must check the hypotheses of that lemma.
Let V nt be the set of vertices v ∈ T having nontrivial stabilizer under the action
b+ y T restricts to a
of Fn . As shown in Section 7.2 (3), the semigroup action D
nt
b+ y V having the property that each element of Ψ ∈ D
b+
semigroup action D
nt
acts by a Ψ-twisted equivariant bijection of V , and it follows immediately that
b y V nt having the same
this semigroup action extends uniquely to a group action D
b we obtain an action H
b y V nt satisfying the hypotheses in
property. Restricting to H
the first paragraph of Lemma 2.10. By hypothesis of Theorem F, no proper nontrivial
b and in particular no subgroup StabFn (v) (v ∈ V nt )
free factor of Fn is fixed by H,
b Finally, the free group J has rank ≥ 2 because otherwise, since H
is fixed by H.
b is a solvable subgroup of Aut(Fn ) < Out(Fn+1 )
is abelian, it would follow that H
b is
and hence is virtually abelian by [HM17c], contradicting the hypothesis that H
not virtually abelian. Having verified all the hypotheses of Lemma 2.10, from its
conclusion we have that the action J y T is nonelementary.
Since the action J y T is nonelementary, its minimal subtree T J is not a line, and
so T J contains a finite path α which is not contained in any Nielsen line. Furthermore,
α is contained in the axis of some loxodromic element γ ∈ J whose axis Lγ is therefore
not a Nielsen line. Applying Lemma 7.2, the action of γ on T ∗ is loxodromic and Lγ
is a quasi-axis for γ. Choosing δ ∈ J − StabFn (Lγ ) and letting γ ′ = δγδ −1 , it follows
that γ ′ also acts loxodromically on T and on T ∗ , and that its axis Lγ ′ in T is also a
quasi-axis in T ∗ . By choice of δ the intersection Lγ ∩ Lγ ′ is either empty or finite.
Since neither of the lines Lγ , Lγ ′ is a Nielsen axis, each ray in each line has infinite
DPF diameter and so goes infinitely far away from the other line in T ∗ -distance. It
follows that γ, γ ′ are independent loxodromic elements on T ∗ , proving that J y T ∗
is nonelementary.
Finally, using the same γ, γ ′ as in the previous paragraph whose axes Lγ , L′γ in
T are not Nielsen lines, we showed in the proof of Conclusion (1) that γ, γ ′ act
loxodromically on S. Furthermore, since the lines Lγ , L′γ have infinite Hausdorff
91
distance in T ∗ , it follows by they also have infinite Hausdorff distance in S, as shown
in item (∗) of Section 5.6. This proves that γ, γ ′ are independent loxodromics on S
and hence the action J y S is nonelementary.
Proof of Conclusion (3): Each element of J acting loxodromically on S is
b y S.
a WWPD element of H
b∩D
b0 acting loxodromically on S. As shown earlier
Consider γ ∈ J < K = H
under the proof of Condition (1), this is equivalent to γ acting loxodromically on T ∗ ,
and to γ acting loxodromically on T with an axis Lγ ⊂ T that is not a Nielsen line.
We shall show first that γ is a WWPD element of the action K y T , then of the
b y S. Let Stab(Lj ) denote the subgroup
action K y T ∗ , and finally of the action H
of K that stabilizes Lj ; we may say that Lj is the axis of Stab(Lj ), meaning that Lj
is the common axis for all the elements of Stab(Lj ) that act loxodromically on T .
b∩D
b0 y T as shown in SecThe action J y T extends to the action K = H
tion 7.2 (6). Since J is normal in K, and since J y T is the restriction of the free
splitting action Inn(Fn ) ≈ Fn y T , we may apply Lemma 2.11 with the conclusion
that γ is a WWPD element of the action K y T . To express this conclusion, let
LK = {Ψ(Lγ ) Ψ ∈ K}; equivalently, LK is the set of axes for all of the conjugate
subgroups Ψ Stab(Lγ )Ψ−1 , Ψ ∈ K; and more explicitly, letting {Ψi }i∈I be a bijectively indexed set of left coset representatives of Stab(Lγ ) in the group K, we may
index LK bijectively as LK = {Li }i∈I where Li = Ψi · Lγ . Using the geodesic metric
du on T , the WWPD property for γ as an element of the action K y T says that the
lengths of the segments Li ∩ Lj for i 6= j in the metric du are uniformly bounded by
some constant B independent of i, j. For all x, y ∈ Li ∩ Lj ∩ V we obtain lu (x, y) ≤ B
(by definition of lu ). By applying Corollary 4.4 we obtain Lu (x, y) ≤ B, proving that
(∗)
Diamu (Li ∩ Lj ) ≤ B
for all i 6= j
where Diamu (X) denotes the Du -diameter of X ∩ V .
Next we use (∗) to show that γ is a WWPD element of the action K y T ∗ . For
this purpose we may work entirely in T using the coarse metric Du on the set V . To
say what this means, first recall from Lemma 4.7 that Du satisfies the metric axioms
except that the triangle inequality is replaced by the “coarse triangle inequality” with
respect to a constant C = C4.7 ,
Du (x, z) ≤ Du (x, y) + Du (y, z) + C
for all x, y, z ∈ V .
For any subtree τ ⊂ T and any R > 0 let
NR (τ ) = ∪{xy
x ∈ τ ∩ V, y ∈ V, Du (x, y) ≤ R}
By Lemma 4.2 and Corollary 4.4, the Du and DPF coarse metrics on V are quasicomparable, and by Proposition 5.8 the inclusion V ֒→ T ∗ is a quasi-isometry from
92
the DPF coarse metric to the d∗ metric. Also, for any x, y ∈ V the path xy is
a uniform quasigeodesic in the d∗ metric, and in particular the lines Li ∈ LK are
uniform quasigeodesics in d∗ . To prove that γ is a WWPD element of K y T ∗ it
suffices to prove that for each R > 0 there exists M > 0 such that
(∗∗)
Diamu (NR (Li ) ∩ NR (Lj )) ≤ M
for all i 6= j
This inequality (∗∗) is actually all we shall need below when we prove that γ is a
b y S. But just to complete the train of ideas,
WWPD element of the action H
the reason that (∗∗) implies γ is a WWPD element of K y T ∗ is that if not then,
using that the quasi-axes in LK are uniformly quasigeodesic in T ∗ , there exists a
constant R > 0 and a sequence Li1 , Li2 , . . . ∈ LK such that as k → ∞ the intersection
NR (Lγ ) ∩ NR (Lik ) contains a subpath αk ⊂ Lγ such that the αk ’s are nested and their
union equals Lγ , and hence Diamu (NR (Li ) ∩ NR (Lj )) → ∞.
We prove (∗∗). Letting p = pi (x) ∈ Li ∩ V be a point that minimizes Du (x, p), we
assume that Du (x, pi (x)) ≤ R; let pj (x), pi (y), pj (y) by similarly defined with similar
distance bounds. Let xi ∈ Li ∩ V be the projection of x through T to Li , meaning
the unique point xi ∈ Li ∩ V such that [x, xi ] = {xi }, and let xj , yi , yj be similarly
defined. Since Du (x, xi ) ≥ Du (x, pi (x)), and since [x, pi (x)] is the concatenation of
[x, xi ] and [xi , pi (x)], it follows from Lemma 4.13 (1) that
Du (xi , pi (x)) ≤ Du (x, pi (x)) − Du (x, xi ) + lu (ρ)
≤ lu (ρ)
and combining with the coarse triangle inequality we obtain
Du (x, xi ) ≤ Du (x, pi (x)) + Du (pi (x), xi ) + C
≤ R + lu (ρ) + C
and similarly for Du (x, xj ), Du (y, yi ), and Du (y, yj ). Of the two points xi , xj , at least
one of them, denoted xk , is contained in Li ∩Lj ; similarly at least one of yi , yj , denoted
yk , is in Li ∩ Lj . It follows from the coarse triangle inequality that
Du (x, y) ≤ Du (x, xk ) + Du (xk , yk ) + Du (yk , y) + 2C
≤ (R + lu (ρ) + C) + Diamu (Li ∩ Lj ) + (R + lu (ρ) + C) + 2C
≤ B + 6C + 2R + 2lu (ρ) = M
which completes the proof that γ is a WWPD element of the action K y T ∗ .
b y S. Let
Finally we show that γ is a WWPD element of the action H
b =
LS = {Ψ(Lγ ) Ψ ∈ H}
93
[
{Φ−j (L) L ∈ LK }
|
{z
}
j∈Z
Lj
which is a set of uniform quasi-axes for all subgroups of H conjugate in H to hγi; and
note that Lj = {L ∈ LS L ⊂ Sj }. If γ fails to be WWPD then there is a sequence
of lines
(#)
Li1 , Li2 , Li3 , . . . ∈ LS
and there exists a constant R > 0 and sequences wk , xk ∈ Lγ , yk , zk ∈ Lik defined
for k ≥ 1, such that [wk , xk ] is nested sequence of subpaths of Lγ whose union equals
Lγ , and such that dS (wk , yk ), dS (xk , zk ) ≤ R for all k. The lines in LS are uniform
quasigeodesics in the hyperbolic space S, and so there exist constants ǫ > 0, M > 0
such that for any lines L, L′ ∈ LS and points w, x ∈ L, y, z ∈ L′ , if dS (w, y), dS (x, z) ≤
R, and if dS (w, x) ≥ M, then the minimum distance in S between the subsegments
[w, x] and [y, z] is ≤ ǫ.
Throwing away finitely many terms of the sequence (#), we may assume that
dS (wk , xk ) ≥ M for all k = 1, 2, . . . Applying Lemma 5.13 it immediately follows
that if j > ǫ then no line in the sequence (#) is in the set Lj . Thus there exists
some integer j with j ≤ ǫ such that the set Lj contains infinitely many lines in the
sequence (#), and so passing to a subsequence we may assume that all of the lines
Li1 , Li2 , Li3 , . . . are in Lj .
Under the semiflow between S0 and Sj (flowing from S0 to Sj if 0 ≤ j and from
Sj to S0 of j ≤ 0), which is a quasi-isometry between S0 and Sj , let L′γ ⊂ Sj be
the line corresponding to Lγ ⊂ S0 , and so Lγ and L′γ have finite Hausdorff distance
in S. Choose sequences wk′ , x′k ∈ L′γ so that the distances dS (wk , wk′ ), dS (xk , x′k )
are uniformly bounded. Passing to a further subsequence we may assume that the
subsegments [wk′ , x′k ] are nested; their union is L′γ . The distances dS (wk′ , yk ), dS (x′k , zk )
are also uniformly bounded, and hence by uniform properness of the inclusion Sj ֒→ S
the distances dj (wk′ , yk ), dj (x′k , zk ) are uniformly bounded. It follows that for each M
there exists N such that if i1 , i2 ≥ N then the lines L′i1 , L′i2 ∈ Lj are uniformly close
on subsegments whose dj length is > M, and hence there exists a constant R such
that
Diamdj (NR (L′i1 ) ∩ NR (L′i2 )) > M for all i1 , i2 ≥ N
But this contradicts (∗∗), because under the isometry Φj : Sj → S0 ≈ T ∗ the set of
lines Lj corresponds to the set of lines L0 = LK .
References
[BBF15] M. Bestvina, K. Bromberg, and K. Fujiwara, Constructing group actions
on quasi-trees and applications to mapping class groups, Publ. Math. Inst.
Hautes Études Sci. 122 (2015), 1–64.
[BF92]
M. Bestvina and M. Feighn, A combination theorem for negatively curved
groups, J. Diff. Geom. 35 (1992), no. 1, 85–101.
94
[BF02]
M. Bestvina and K. Fujiwara, Bounded cohomology of subgroups of mapping
class groups, Geom. Topol. 6 (2002), 69–89 (electronic).
[BFH97] M. Bestvina, M. Feighn, and M. Handel, Laminations, trees, and irreducible automorphisms of free groups, Geom. Funct. Anal. 7 (1997), 215–
244.
[BFH00]
, The Tits alternative for Out(Fn ). I. Dynamics of exponentiallygrowing automorphisms., Ann. of Math. 151 (2000), no. 2, 517–623.
[BFH04]
, Solvable subgroups of Out(Fn ) are virtually Abelian, Geometriae
Dedicata 104 (2004), 71–96.
[CM87]
M. Culler and J. W. Morgan, Group actions on R-trees, Proc. London
Math. Soc. (3) 55 (1987), no. 3, 571–604.
[FH09]
M. Feighn and H. Handel, Abelian subgroups of Out(Fn ), Geometry and
Topology 13 (2009), 1657–1727.
[FH11]
, The recognition theorem for Out(Fn ), Groups Geom. Dyn. 5
(2011), 39–106.
[GJLL98] D. Gaboriau, A. Jaeger, G. Levitt, and M. Lustig, An index for counting
fixed points of automorphisms of free groups, Duke Math. J. 93 (1998),
no. 3, 425–452.
[Gro87]
M. Gromov, Hyperbolic groups, Essays in group theory (S. Gersten, ed.),
MSRI Publications, vol. 8, Springer, 1987.
[HM]
M. Handel and L. Mosher, Relative free splitting and free factor complexes
II: Loxodromic outer automorphisms, In preparation.
[HM13]
, Lipschitz retraction and distortion for subgroups of Out(Fn ),
Geom. Topol. 17 (2013), no. 3, 1535–1579.
[HM15]
, Hyperbolic actions and 2nd bounded cohomology of subgroups of
Out(Fn ) Part I: Infinite lamination subgroups, arXiv:1511.06913, Nov.
2015.
[HM17a]
, Subgroup decomposition in Out(Fn ), Part I: Geometric models,
Memoirs AMS (2017), to appear. arXiv:1302.2378.
[HM17b]
, Subgroup decomposition in Out(Fn ), Part II: A relative Kolchin
theorem, Memoirs AMS (2017), to appear. arXiv:1302.2379.
[HM17c]
, Subgroup decomposition in Out(Fn ), Part III: Weak attraction theory, Memoirs AMS (2017), to appear. arXiv:1306.4712.
95
[HM17d]
, Subgroup decomposition in Out(Fn ), Part IV: Relatively irreducible
subgroups, Memoirs AMS (2017), to appear. arXiv:1306.4711.
[HM17e]
, Virtually abelian subgroups of IAn (Z/3) are abelian, In preparation., 2017.
[KR14]
I. Kapovich and K. Rafi, On hyperbolicity of free splitting and free factor
complexes, Groups Geom. Dyn. 8 (2014), no. 2, 391–414.
[MS12]
M. Mj and P. Sardar, A combination theorem for metric bundles, Geom.
Funct. Anal. 22 (2012), no. 6, 1636–1707.
96
| 4math.GR
|
A PROBABILISTIC DEMAND SIDE MANAGEMENT APPROACH BY CONSUMPTION
ADMISSION CONTROL
Lorant Kovacs, Rajmund Drenyovszki, Andras Olah, Janos Levendovszky, Kalman Tornai, Istvan Pinter
New generation electricity network called Smart Grid is a recently conceived vision for a cleaner, more efficient and cheaper electricity system. One of the major
challenges of electricity network is that generation and consumption should be balanced at every moment. This paper introduces a new concept for controlling the demand
side by the means of automatically enabling/disabling electric appliances to make sure that the demand is in match with the available supplies, based on the statistical
characterization of the need. In our new approach instead of using hard limits we estimate the tail probability of the demand distribution and control system by using the
principles and the results of statistical resource management.
Keywords: Smart grid, Demand Side Management, Admission Control
1
Introduction
The main issue in electricity networks is keeping an
almost perfect balance between electricity generation and
consumption all the time. Balance between demand and
supply is crucial since oversupply means waste of energy,
while undersupply causes performance degradation of the
grid parameters (e.g. phase, voltage level, etc.).
Unfortunately the control of the supply side is almost
impossible because of the large time constants of the
fossil and nuclear plants; the only possibility is applying
cost ineffective auxiliary generators. Additionally, in
smart grids the percentage of renewable resources should
be increased which gives rise to uncertainty in the
generation side. Hence, the best way to keep the balance
is to manage the demand side. Demand Side Management
(DSM) means a new kind of challenge: system operators
should control the power grid in local scale, which is
possible by installing intelligent measurement devices
(smart meters). However, as a new perspective,
households can be controlled with the intelligent devices.
The residential sector accounts for about 30% of total
energy consumption [1] and contains time shiftable
appliances in high number. The amount of consumption
involved in direct control can eliminate the error between
daily prediction based generation and actual demand. The
spread of electric vehicles could mean an additional
opportunity. In average cars are parked in Europe for
more than 90% of the time [2]; hence, batteries of electric
vehicles can serve as an extra storage capacity for the
power grid.
In this paper we propose a new approach for shorttime demand side management. The introduced method
takes into account the probabilistic nature of the load by
the aid of a consumption admission control. The
algorithm enables/disables shiftable appliances and
reshapes the probability density function (pdf) of the
aggregate consumption.
1.1 Related work
Influencing the demand side in the context of Smart
Grid electricity networks is usually referred to as Demand
Side Management (DSM) or Demand Response (DR).
Demand Response is a mechanism managing customer
consumption in response to supply side conditions while
Demand Side Management covers all the activities or
programs undertaken by service providers to influence the
amount or timing of electricity use. There are many
solutions proposed to DR and DSM like direct control of
smart appliances, pricing and load scheduling. Good
references can be found about different DSM approaches
in [3], [4] and [5]. With direct control system operators
can remove the extreme values in electricity consumption
(peak shaving) and encourage additional energy use
during periods of lowest system demand (valley filling).
The load control as a demand response strategy is
presented in [6], where simulating (summer period, airconditioning units) is conducted with two control
algorithms. It takes into account users’ comfort (via
heuristic consumer utility metric) and uses binary on-off
policies. Fairness is maintained by two scheduling
algorithms: priority based and round robin. Results show
that significant energy and cost savings can be achieved
with the proposed algorithms.
To minimize the operating cost of a residential
microgrid, a MILP model is proposed in [7]. Decision
variables are used to model demand and also supply of
both electrical and thermal energy. It covers solar energy,
distributed generators, energy storages, and loads. A
model predictive control scheme is proposed to iteratively
produce a control sequence for the microgrid. The case
study reveals the performance of minimum cost control
by comparison with benchmark control policies. Results
show savings in annual operating cost.
A DSM model with three layers is introduced in [8].
This model consists of admission controller, load
balancer, and demand response with load forecaster
modules. Whenever a user turns on an appliance, a
request is sent to the admission controller. If the capacity
is available and we are not in peak hours, then it accepts
the request and initiates the operation of the appliance. If
the appliance operation exceeds the capacity, then the
request is rejected and forwarded to the load balancer.
The task of the load balancer is to solve an optimization
problem and to assign a future timeslot for the appliance
to start later. A game-theoretic approach for residential
energy consumption scheduling is proposed in [9]. It
introduces a pricing mechanism which is based on a
convex and increasing cost function. The authors present
a distributed algorithm for optimization problem. Most of
the proposed techniques in the literature consider fixed
load curves. However most of the papers do not deal with
randomness on the load side, an exception is [10], where
uncertainty is considered as well. The authors propose a
MILP optimization model, which performs scheduling.
The adopted DSM model forecasts the load curve of the
user from the previous knowledge of their energy usage.
Additionally, real time pricing and inclining block rates
are combined in the model for effective pricing. The
optimization is multi-stage, as the information of the
appliances is revealed over time, the schedule of the
appliances is updated accordingly. Simulation results
show efficiency by reducing total peak-to-average ratio
and energy expenses of users.
The rest of this paper is organized as follows. The
problem formulation and system model is described in
Section 3. The concept of our proposed Consumption
Admission Control algorithm is introduced in Section 4.
The results are presented with discussion in Section 5.
Finally the paper is concluded in Section 6.
Figure 1 The applied model
2
Problem formulation and system model
A large number of appliances can tolerate some delay
(e.g. executing the program of a washing machine at a
later time). Additionally in the near future the spread of
electric vehicles will mean a huge amount of elastic
demand in the power system. As a result, there are (time)
shiftable and non-shiftable demands in the system. On
the other hand most of the devices show stochastic
consumption behaviour (neither the start of use nor time
of operation is known a priori), hence, only a statistical
approach can efficiently solve the control task. The
foundation of our approach is that, the new Consumption
Admission Control algorithm can modify the pdf of a
consumption unit (e.g. a household, street, city etc.) by
the temporary enabling/disabling of shiftable appliances.
From the system operators’ perspective pdf close to Dirac
delta function (meaning constant load) is ideal. However,
we cannot reach the optimum, as a more realistic goal, we
can keep the probability density function as narrow as
possible, i.e. the mass of the pdf lies between a lower and
an upper limit. For the sake of an even more realistic
model, we allow the tail probabilities to be non-zero but
smaller than a predefined probability.
In this paper, we assume that the service provider
calculates and communicates these parameters governing
the behaviour of a customer. Using these parameters, the
subscriber’s Smart Meter (SM) can enable/disable the
appliances at a local level, resulting in a fully distributed
solution to the problem. The parameters coming from the
service provider that govern the CAC algorithm are as
follows: a capacity upper limit (𝐶𝑚𝑎𝑥 ) in every time slot,
which is allowed to be exceeded by a small probability 𝑝.
(In this paper we will concentrate on the upper limit 𝐶𝑚𝑎𝑥
and oversonsumption probability, however we plan to
extend our approach by a lower limit 𝐶𝑚𝑖𝑛 and an
underconsumption probality 𝑟 in our future work). The
tail probability will be referred to as Quality of Service
(QoS) parameter, because it can satisfy the overload of
the grid to keep under a certain limit, and hence, the
stability of the grid parameters such as frequency, voltage
level, etc. The task of the SM is the admission control
(enabling/disabling) of the appliances by such a way, that
the probability distribution function (pdf) of the aggregate
consumption satisfies the prescription of the service
provider. (The cooperative attitude of the subscriber can
be motivated by rewards.) The underlying model is
depicted in Figure 1.
In the model all subscribers are assumed to have a
Smart Meter. The SM has the following properties:
the SM can communicate with the service provider
and with the smart appliances;
the SM can register the consumption statistics of the
appliances (both smart and traditional ones);
the SM can temporarily enable/disable appliances.
In the model stochastic and deterministic, shiftable
and non-shiftable appliances are taken into consideration.
(The devices executing a fixed program can be seen as
deterministic). The defined categories and some examples
of appliances are listed in Table 1.
Table 1 Device categories used in the model
shiftable
nonshiftable
stochastic
electric heating,
air conditioner,
refrigerator
lighting,
vacuum cleaner
deterministic
washing machine,
dishwasher
circulation pump
In Figure 2 the measures used in the model are
depicted. The admission control algorithm uses discrete
time slots (denoted by k in Figure 3), in which the
enabled/disabled status of the appliances and the system
parameters (capacity limits and QoS) are supposed to be
unchanged. (New consumption requests are supposed to
be handled instantaneously). In all time slots there is a
deterministic component of the consumption and as well
as a stochastic one.
Figure 2 Illustration of the original and modified pdf of the aggregate
consumption and the free parameters that govern the algorithm
The stochastic part is described by its estimated (or
calculated) probability distribution function. The
maximum (Cmax ) and minimum (Cmin ) capacity limits can
be changed in every time instant by the service provider.
Csys builds a natural upper limit (i.e. lines and fuses) on
Cmax .
𝑛𝑖
𝑀
𝑓𝑋 (𝑥) = 𝑃𝑟 (∑ ∑ 𝑋𝑖𝑗 = 𝑥 ) =
𝑖=1 𝑗=1
(3)
= 𝑓𝑋11 (𝑥) ∗ 𝑓𝑋12 (𝑥) ∗ 𝑓𝑋13 (𝑥) ∗ … ∗ 𝑓𝑋𝑀𝑛 (𝑥)
𝑖
where 𝑀 is the number of appliance classes, and 𝑛𝑖 is
the number of appliances in class 𝑗, and ∑𝑀
𝑖=1 𝑛𝑖 is the
total number of enabled appliances (An appliance class
means a set of appliances that have the same statistical
descriptors). Considering deterministic (𝑋𝑑𝑒𝑡 ) and
stochastic (𝑋𝑠𝑡𝑜𝑐ℎ ) appliances in the model, we can write
the inequality:
𝑃𝑟(𝑋 𝑠𝑡𝑜𝑐ℎ + 𝑋 𝑑𝑒𝑡 ≥ 𝐶𝑚𝑎𝑥 ) ≤ 𝑝,
(4)
Figure 3 Measures used in the model
3
𝑋𝑑𝑒𝑡 is a constant value so the probability can be
expressed as
Consumption Admission Control Algorithm
The decision to enable or disable an appliance in the
system is carried out by the Consumption Admission
Control (CAC) algorithm. As mentioned in Section 2 the
aim of the algorithm is to sharpen the shape of the pdf of
the aggregate consumption of a customer resulting near
constant load in the time domain. The Smart Meter
calculates the aggregate pdf from the individual pdf-s of
the appliances. The individual pdf can be communicated
to the SM by smart appliances, or it can be measured in
the case of traditional ones. This concept was originally
applied for Call Admission Control for ATM
communication networks [11].
In this paper the following mathematical model will
be used: Let 𝑋𝑗 denote the random variable of the
consumption of the jth appliance, while
𝑁
𝑋 = ∑ 𝑋𝑗
(1)
𝑗=1
is the aggregate consumption random variable and 𝑁 is
the number of enabled appliances.
In the case of a new incoming consumption demand,
the CAC checks whether the inequality (2) holds for the
enabled plus the incoming appliance
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤ 𝑝
(2)
where 𝑃𝑟 denotes probability of an event, and 𝑝 is the
probability limit of overconsumption. Therefore, CAC
keeps the upper tail probability of the aggregate
consumption under the limit 𝑝.
The probability of overconsumption 𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 )
can be calculated based on the probability density
function 𝑓𝑋 (𝑥) of the aggregate consumption. The pdf of
the aggregate consumption can be calculated analytically
by the convolution of the individual pdfs of all
appliances:
𝑃𝑟(𝑋 𝑠𝑡𝑜𝑐ℎ ≥ 𝐶𝑚𝑎𝑥 − 𝑋 𝑑𝑒𝑡 ) ≤ 𝑝;
(5)
The lower limit can be checked by the same manner
as the upper limit. If the probability of underload is higher
than 𝑟, the goal can be expressed as
𝑃𝑟(𝑋 < 𝐶𝑚𝑖𝑛 ) ≤ 𝑟;
(6)
3.1 Estimation of the probability of overconsumption
The convolution operation in (3) can be very time
consuming in the case of high number of appliances
and/or classes, so it is suggested to estimate the
probability in terms of inequalities [12] of Large
Deviation Theory (LDT) bounds, such as Markov,
Chebisev, Bennett, Hoeffding and Chernoff upper
bounds. The estimation of overconsumption can be
derived from the calculation of the following upper
bound:
̂(𝑋, 𝐶𝑚𝑎𝑥 ) ≤ 𝑝
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤ 𝑈
(7)
̂ (𝑋, 𝐶𝑚𝑎𝑥 ) is the bounding method on the tail
where 𝑈
probability. Because of the independence of the 𝑋𝑖𝑗
random variables, the expected value can be expressed as
𝑛𝑖
𝑀
𝜇 = 𝐸{𝑋} = ∑ ∑ 𝜇𝑖𝑗
(8)
𝑖=1 𝑗=1
and variance as
𝑀
2
2}
𝜎 = 𝐸{(𝑋 − 𝜇)
𝑛𝑖
= ∑ ∑ 𝜎𝑖𝑗2
(9)
𝑖=1 𝑗=1
The most widely known, Markov's inequality needs only
expected value to give an upper bound for the probability
that the non-negative X random variable is greater than or
equal to some positive constant (𝐶𝑚𝑎𝑥 in our case) :
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤
𝜇
𝐶𝑚𝑎𝑥
(10)
Inevitably the advantage of Markov’s inequality is its
simplicity, but it is not a tight upper bound.
Chebysev’s inequality
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤
𝜎2
(𝐶𝑚𝑎𝑥 − 𝜇)2
(11)
is also simple, but it is also not a tight upper bound.
Hoeffding’s inequality is an exponentially decreasing
upper bound, which results in a tighter estimation even far
from the expected value compared to Markov’s and
Chebysev’s inequalities. It is also based on the
expectation that 𝑋𝑖𝑗 random variables are independent and
additionally 𝑋𝑖𝑗 variables have upper and lower bounds:
𝑥𝑖𝑗𝑚𝑖𝑛 ≤ 𝑋𝑖𝑗 ≤ 𝑥𝑖𝑗𝑚𝑎𝑥 . Hoeffding’s inequality [13] can be
expressed as:
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤ 𝑒𝑥𝑝 (
−2(𝐶𝑚𝑎𝑥 − 𝜇)2
2)
∑𝑖 ∑𝑗(𝑥𝑖𝑗𝑚𝑎𝑥 − 𝑥𝑖𝑗𝑚𝑖𝑛 )
(12)
From (12) it is clear that with the increase of Cmax , the
upper bound decreases in an exponential rate.
Bennett’s inequality gives exponentially decreasing upper
bound like Hoeffding’s, which assumes bounded input
random variables |𝑋𝑖𝑗 | ≤ 𝑥𝑚𝑎𝑥 , and it is formulated in
the following form [14]:
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤
𝑒𝑥𝑝 (−
𝜎2
(𝐶𝑚𝑎𝑥 − 𝜇) ∙ 𝑥𝑚𝑎𝑥
∙ℎ(
))
2
𝑥𝑚𝑎𝑥
𝜎2
(13)
where ℎ(𝑢) = (1 + 𝑢) 𝑙𝑜𝑔(1 + 𝑢) − 𝑢. Bennett’s
inequality needs additional statistical information
compared to Hoeffding’s, the standard deviation of
appliances (σij ) and maximum value (𝑥𝑖𝑗𝑚𝑎𝑥 ).
Chernoff’s inequality is also an exponentially decreasing
upper bound [15]:
here X is the aggregate consumption random variable
containing the consumption of all enabled (both shiftable
and non-shiftable) appliances plus the incoming one.
Another approach for estimating an aggregate pdf is
based on the Central Limit Theorem (CLT)
𝑃𝑟(𝑋 > 𝐶𝑚𝑎𝑥 ) ≤ 1 − 𝐹𝑋 (𝐶𝑚𝑎𝑥 )
(17a)
𝐶𝑚𝑎𝑥 − 𝜇
𝐹𝑋 (𝐶𝑚𝑎𝑥 ) → 𝛷 (
)
√𝜎 2
(17b)
where 𝐹(𝑥) denotes the cdf of 𝑥 and 𝛷(. ) is the
standard normal cdf. We must emphasize that CLT is not
an upper bound on the tail probability. The speed of
convergence of F(x) → Φ(x) is the main question
regarding the estimations based on the Central Limit
Theorem. The absolute error of the CLT estimation
|F(x) − Φ(x)| is decreasing towards the tails, but the
relative error |F(x) − Φ(x)|/Φ(x) is increasing [16].
4
Results and discussion
In order to have a clear picture about the performance
of the Consumption Admission Control algorithm a
simulation environment was established in MATLAB.
We investigated the following aspects of the CAC
algorithm:
Relation of QoS (𝑝) and empirical probability of
overconsumption (𝑝̃) in the case of different LDT
bounds;
Model complexity of load time series;
Load shape modification made by CAC;
Number of enabled appliances in the case of different
LDT bounds and CLT;
Throughout our simulations we used stationary load time
series to explore the statistical behaviour of the CAC
algorithm. It is clear that the real benefit of the new
algorithm comes to the fore in a nonstationary
environment such a day or longer consumption period.
4.1 Relation of QoS and empirical probability of
overconsumption
𝑁
𝑃𝑟(𝑋 ≥ 𝐶𝑚𝑎𝑥 ) ≤ 𝑒𝑥𝑝 (∑ 𝜇𝑗 (𝑠 ∗ ) − 𝑠 ∗ Cmax )
(14)
𝑗=1
where μj (s) = lgE{esXj } are the so called logarithmic
momentum generating functions and s∗ is the parameter
that satisfies the possibly tightest bound:
𝐽
∗
𝑠 : 𝑖𝑛𝑓 ∑ 𝜇𝑗 (𝑠) − 𝑠𝐶𝑚𝑎𝑥
𝑠>0
(15)
𝑗=1
When a new demand of a shiftable appliance appears,
enabling or disabling will be calculated using one of the
upper-bounds:
−1, 0 𝐴𝑐𝑐𝑒𝑝𝑡
̂ (𝑋, 𝐶𝑚𝑎𝑥 )} = {
𝑠𝑔𝑛{𝑝 − 𝑈
+1 𝑅𝑒𝑗𝑒𝑐𝑡
(16)
In this section we present our investigation regarding
the relation of predefined QoS and empirical probability
of overconsumption. The ratio of predefined QoS and
empirical probability of overconsumption will be denoted
by
𝑘=
𝑝̃
𝑝
(18)
Using an upper bound on the tail probability leads to
underestimation of the number of appliances to be
enabled which results in 𝑝̃ < 𝑝, i.e. 𝑘 < 1; and vice-versa
a lower bound results in 𝑘 > 1. From the point of view of
the service provider, 𝑘 < 1 means guaranteed QoS, but
causes spare capacities.
The following assumptions were made in the
simulations:
Load of appliances were modelled by two-state
Bernoulli iid series of 50000 time instants;
-
There is only one appliance class. (All appliances
have the same statistical descriptors.)
Number of appliances in the class is 400;
The consumption demand of the temporarily disabled
appliances are deleted.
The aim of the investigation was to measure the
performance of different tail probability estimation
methods plugged into the CAC in the case of different
probability of ON state of the appliances (p ON). Figure 4
and 6 depict the results in the case of pON=0,1 and
pON=0,5, respectively.
The results in Figure 4 and 5 show that the empirical
probability can almost meet QoS (𝑘 = 1) when the tail
probability is exactly calculated from the analytical
aggregate pdf (see (3)). There is only a small deviation,
𝑘 = 0,4 … 0,6 in the case of small probabilities
(10−5 … 10−4 ) due to the difficulty of measuring rare
events in the case of Monte Carlo simulations.
p~ vs p N= 400 len= 50000 pON = 0; 1 h = 1 Cmax = mean
0
10
analytic
clt
chernoff
-1
10
bennett
hoeffding
chebisev
-2
p
~
10
-3
10
-4
10
4.2 Model complexity of load time series
The CAC algorithm needs appliance level statistical
information, therefore, load time series in our simulations
are generated with the bottom-up approach, i.e. the
aggregate time series are built up from appliance level
consumption time series. We used different appliancelevel models in the simulations:
Bernoulli iid;
First Order Markovian;
Higher Order Markovian.
In all the tree cases two-state (ON/OFF) models were
used. Bernoulli iid is not a realistic consumption model,
its aim is to prove the CAC concept. It requires only
measuring the probability of the ON state and the
maximum value of the consumption. A more realistic,
widely used model is the First Order Markovian model
[17]. This model can be described by a transition
probability matrix. As the most realistic model among the
three approaches we applied the distributions of the
holding times for ON and OFF states separately which
leads generally to a Higher Order Markovian (HOM)
model. The benefit of HOM models is the capability to
model long range dependence between samples, which is
a usual property of real load time series. In Figure 6
examples of iid and HOM time series can be seen. In all
the cases our models were fitted to measured data coming
from the REDD DataSet [18]. The DataSet contains
appliance level power data for 6 homes for several weeks
with sampling time of 3 seconds.
-5
10
-5
-4
10
10
-3
-2
10
10
-1
10
0
10
200
p
150
Figure 4 𝑝̃ vs 𝑝 for different bounds (pON=0,1)
Using Chernoff’s and Bennett’s inequalities the CAC
algorithm sets with one order of magnitude lower the ratio
𝑘 regardless of 𝑝𝑂𝑁 , which results only in an acceptable
decrease of the number of accepted appliances (for details
see Section 4.4).
Applying Hoeffding bound leads to results which
highly depend on the pON value. Applying Chebisev and
Markov bound lead to poor results regardless of the p ON
values. The performance of CLT based CAC is close to
the analytic calculation (𝑘 = 1 … 3). Note that CLT is not
an upper bound on the tail probability. As a consequence
𝑘 > 1 values can occur.
100
50
0
0
50
100
150
200
250
0
50
100
150
200
250
0
50
100
150
200
250
200
150
100
50
0
250
200
150
100
p~ vs p N= 400 len= 50000 pON = 0; 5 h = 1 Cmax = mean
0
10
50
analytic
0
clt
chernoff
-1
10
Figure 6 iid Bernoulli (top) and HOM (middle) model and original
measurement of a refrigerator (bottom)
bennett
hoeffding
chebisev
-2
p
~
10
-3
10
-4
10
-5
10
-5
10
-4
10
-3
-2
10
10
-1
10
p
Figure 5 𝑝̃ vs 𝑝 for different bounds (pON=0,5)
0
10
The CAC algorithm descripted by equations (3), (10)(14) assumes iid appliance load time series. It is an
important question, how complex time series models
affect CAC. Figure 7 demonstrates that there is only a
slight performance degradation even with the HOM
model (400 pieces of microwave ovens with ON
probability of 0,0160; simulation length is 50000 time
instances).
p~ vs p N= 400 len= 50000 pON = 0; 01608 h = 1 Cmax = mean
0
10
6500
original time series
modified time series
6000
analytic
clt
chernoff
bennett
chebisev
markov
hoeffding
-1
10
-2
5000
p
~
Load [W]
10
5500
-3
10
4500
4000
3500
3000
-4
10
2500
2000
-5
10
-5
10
-4
10
-3
-2
10
10
-1
10
1500
0
10
0
50
However, in the case of small probabilities (10−5 … 10−4)
CLT results in a higher ratio (𝑘 = 10 … 20), Chernoff and
Bennett remains almost in the same range (𝑘 = 0,1) like
in Figure 5 and 6.
4.3 Load shape modification made by CAC
However the basic mathematical idea of our CAC is
to limit the over- and underconsumption probability, the
direct objective of DSM methods is expressed as load
shape modification in the time domain (for instance by
valley filling and peak clipping). The CAC algorithm, as
stated before, forms the pdf of the aggregate consumption
towards the Dirac-delta function, which is equivalent to
constant load in the time domain. In this section we
demonstrate the effectiveness of the CAC algorithm
regarding load shaping. Assumptions are:
The consumption demand of the temporarily disabled
appliances is deleted;
Selection of the appliances to be temporarily disabled
is based on random selection which guarantees
fairness;
One appliance class;
All appliances are of shiftable stochastic type.
In Figure 8 the original aggregate consumption time series
and the modified one can be seen. From the figure one
can see, that this form of the algorithm does not yield
almost any load shaping. Our hypothesis was that the
treatment of consumption demand of the temporarily
disabled appliances (which is referred to as scheduling
strategy) plays key role in the algorithm to perform load
curve modification. To prove this, we changed the
scheduling strategy in the CAC to a so-called one-step
strategy.
150
200
250
Figure 8 Load shape modification ability of the CAC algorithm
The one-step scheduler (Figure 9) is an alternative
method to handle the disabled appliances. In this case our
assumptions are:
The one-step scheduler shifts the consumption of
temporarily disabled appliance with one time instant;
It guarantees that the sum of the consumed energy
remains the same after the modification of the load
curve;
Selection of the appliances to be temporarily disabled
is based on random selection which guarantees
fairness;
One appliance class;
All appliances are of schiftable stochastic type.
9000
original time series
modified time series
8000
7000
Load [W]
Figure 7 𝑝̃ vs 𝑝 with microwave oven HOM model
100
Time instances
p
6000
5000
4000
3000
0
50
100
150
200
250
Time instances
Figure 9 Load shape modification with one-step scheduling
It is clear that the CAC with one-step scheduler is
able to modify the load shape (red curve on Figure 9,
which is closer to constant). The Load Factor (LF) is
increased from 0,6718 to 0,8463 (LF is a widely used
measure of the efficiency of electric energy usage, and
𝑎𝑣𝑒𝑟𝑎𝑔𝑒 𝑙𝑜𝑎𝑑
calculated as 𝐿𝐹 =
). Based on the results,
𝑚𝑎𝑥𝑖𝑚𝑢𝑚 𝑙𝑜𝑎𝑑
we are planning to investigate more sophisticated
scheduling methods in our future work.
4.4 Number of enabled appliances in the case of
different LDT bounds and CLT
In the CAC algorithm the scheduler disables shiftable
appliances if the aggregate consumption exceeds the
Cmax upper limit with a higher probability than it is
allowed by 𝑝. The task in this step is to determine the
number of appliances to be enabled in each appliance
class so that the QoS must be satisfied. Figure 10 depicts
the number of enabled appliances in the case of different
LDT bounds and CLT, assuming:
One appliance class modelled with Bernoulli iid
model (𝑝𝑂𝑁 = 0,1);
400 appliances.
N= 400 len= 50000 pON = 0; 1 h = 1 Cmax = mean
400
analytic
clt
chernoff
bennett
hoeffding
chebisev
markov
Number of enabled appliances
350
300
250
200
Figure 11 Number of enabled appliances, one class (ℎ2 = 5)
150
Figure 11 shows that the decision curve is slightly
nonlinear and convex, but with other parameters (Figure
12) it can be highly nonlinear and even non-convex. We
can state that the two decision regions are generally not
linearly separable.
100
50
0
-5
10
-4
10
-3
-2
10
10
-1
0
10
10
p
Figure 10 Number of enabled appliances vs 𝑝
The number of enabled appliances is a monotonously
increasing function of 𝑝 in the case of one appliance class
(Figure 10). Estimation of the probability of
overconsumption applying LDT bounds lead to lower
number of enabled appliances compared to the
analytically calculated value for all 𝑝 values. Applying
LDT bounds, as stated before, causes spare capacities in
the system. CLT is not a bound, so it can lead to values
higher than 100%, which means breach of contract. The
exact percentages of enabled appliances (with analytically
calculated value as the reference) are collected in Table 2.
Table 2 Percentage of enabled appliances
Analytic
CLT
Chernoff
Bennett
Hoeffding
Chebisev
Markov
𝒑 < 𝟏𝟎−𝟑
𝒑 > 𝟏𝟎−𝟐
100%
(reference)
105%
92%
91%
80%
0%
0%
100%
(reference)
101%
88%
88%
75%
50-80%
10-50%
QoS
guaranteed
no
yes
yes
yes
yes
yes
In the case of two or more appliance classes, the CAC
algorithm can decide to enable different combinations of
appliances (Figure 11 and 12, where green colour
indicates the allowable set of appliances, red colour
indicates the combinations when the QoS is not satisfied).
Assumptions are:
Two appliance classes modelled with Bernoulli iid
model (100 appliances in each classes);
The tail probability is exactly calculated from the
analytical aggregate pdf;
Figure 12 Number of enabled appliances, one class (ℎ2 = 10)
The separator curve depends on the different LDT bounds
and CLT applied in CAC. The next two figures (Figure
13, 14) depict the investigations regarding the number of
enabled appliances in the case of different tail probability
estimation methods. Assumptions are:
Two appliance classes modelled with Bernoulli iid
model (100 appliances in each classes);
As a reference, the tail probability is exactly
calculated from the analytical aggregate pdf.
In the first experiment (Figure 13) pON1=0,2 and
pON2=0,001; and ON values h1=1W and h2=5W. In the
second experiment (Figure 14) the difference is only
ℎ2 = 10𝑊. The performance degradation is smaller in the
first case when the difference between ON values ratio
ℎ2 /ℎ1 is not too large. In the case of higher ℎ2 /ℎ1 ratio
(Figure 14) the separator curves lie far to each other
causing severe performance degradation.
100
Num. of en. apps to satisfy QoS p = 0; 0001 Cmax = 1; 5 $ mean
90
analytic
clt
N 2 (pON 2 = 0; 001 h2 = 5)
80
chernoff
bennett
70
hoeffding
60
50
40
30
20
10
10
20
30
40
50
60
70
80
90
100
N 1 (pON 1 = 0; 2 h1 = 1)
Figure 13 Number of enabled appliances, two classes (𝒉𝟐 = 𝟓)
In the latter case (Figure 14) the exact separator is
non-linear and non-convex but this fact is not reflected by
the estimation methods.
100
Num. of en. apps to satisfy QoS p = 0; 0001 Cmax = 1; 5 $ mean
90
analytic
clt
chernoff
bennett
N 2 (pON 2 = 0; 001 h2 = 10)
80
70
60
50
40
30
20
10
10
20
30
40
50
60
70
80
90
100
N 1 (pON 1 = 0; 2 h1 = 1)
Figure 14 Number of enabled appliances, two classes (𝒉𝟐 = 𝟏𝟎)
In Table 3 and 4 the number of enabled appliances
can be seen for certain parameters.
Table 3 Percentage of enabled appliances ℎ2 = 5
N2=100
N2=50
N2=0
Analytic
64*
100%
(reference)
71
100%
(reference)
80
100%
(reference)
CLT
80
110%
Chernoff
50
91%
Bennett
35
82%
82
109%
58
89%
38
72%
85
106%
72
90%
42
53%
*N1
Table 4 Percentage of enabled appliances ℎ2 = 10
N2=100
N2=50
N2=0
Analytic
11*
CLT
69
reference
38
reference
76
reference
152%
77
144%
88
116%
Chernoff
0
(N2=60)
54%
10
68%
60
79%
Bennett
0
(N2=60)
54%
6
64%
21
28%
* N1
The performance decrease caused by the different
LDT bounds is the smallest in the case of Chernoff bound
but it is highly sensitive to the ℎ2 /ℎ1 ratio. In the case of
ℎ2 /ℎ1 = 5 the utilization loss caused by Chernoff bound
is 9-11%. In the case of ℎ2 /ℎ1 = 10 it is 21-46%. CLT
has near the same performance but in the experiments the
number of enabled appliances is higher than the reference
which causes breach of contract regarding the QoS
criterion 𝑝. At the same time the computational
complexity of CLT is substantially lower than of Chernoff
bound and analytical convolution. As a result we
recommend using analytical computation when it is
possible. In the case of lack of time and importance of
satisfying QoS, Chernoff bound comes to the fore. CLT
has the lowest computational need and has quite good
performance but cannot guarantee QoS criterion.
5
Conclusions and future work
In this paper a new statistical approach was proposed
for managing the balance between demand and available
supplies in smart grids. The smart meter of the subscriber
performs the task of enabling/disabling of shiftable
appliances based on two parameters, obtained from the
supplier: upper capacity limit and allowable probability of
overconsumption (QoS). The smart meter influences the
probability distribution function of the aggregate
consumption in order to keep the tail probabilities under a
given threshold 𝑝. The new approach takes the
uncertainty of the consumption into account, and
furthermore it can work in a fully distributed manner,
since the calculations can be performed in the smart
meter. We conducted several simulations to evaluate the
performance of the CAC. As a result the introduced
Consumption Admission Control method is a promising
candidate for demand side management in smart grid
environment.
6
Acknowledgement
Our research was supported by the European Union
and the Hungarian Republic through the project TÁMOP4.2.2.A-11/1/KONV-2012-0072
–
Design
and
optimization of modernization and efficient operation of
energy supply and utilization systems using renewable
energy sources and ICTs.
7
References
[1] Lukas G. Swan, V. Ismet Ugursal, Modeling of end-use
energy consumption in the residential sector: A review of
modeling techniques, Renewable and Sustainable Energy
Reviews, Volume 13, Issue 8, October 2009, Pages 18191835, ISSN 1364-0321
[2] Pasaoglu G.; Fiorello D.; Martino A.; Scarcella G.;
Alemanno A.; Zubaryeva A.; Thiel C.; "Driving and
parking patterns of European car drivers – a mobility
survey", European Commission, DG JRC, Institute for
Energy and Transport, Petten, the Netherlands, 2012,
http://publications.jrc.ec.europa.eu/repository/handle/JRC7
7079
[3] Khan, M.A.; Javaid, N.; Arif, M.; Saud, S.; Qasim, U.; Khan,
Z.A., "Peak Load Scheduling in Smart Grid
Communication Environment," Advanced Information
Networking and Applications (AINA), 2014 IEEE 28th
International Conference on , vol., no., pp.1025,1032, 13-16
May 2014
[4] Ullah, M. N.; Mahmood, A.; Razzaq, S.; Ilahi, M.; Khan, R.
D.; Javaid, N. (2013). A Survey of Different Residential
Energy Consumption Controlling Techniques for
Autonomous DSM in Future Smart Grid Communications.
J. Basic. Appl. Sci. Res., 3(3)1207-1214, 2013
[5] Fang, Xi; Misra, Satyajayant; Xue, Guoliang; Yang, Dejun,
"Smart Grid — The New and Improved Power Grid: A
Survey," Communications Surveys & Tutorials, IEEE,
vol.14, no.4, pp.944,980, Fourth Quarter 2012
[6] Koutitas, G., "Control of Flexible Smart Devices in the
Smart Grid," Smart Grid, IEEE Transactions on, vol.3,
no.3, pp.1333,1343, Sept. 2012
[7] Phillip Oliver Kriett, Matteo Salani, “Optimal control of a
residential microgrid”, Energy, Volume 42, Issue 1, June
2012, Pages 321-330, ISSN 0360-5442
[8] G. T. Costanzo, Zhu Guchuan, M. F. Anjos, and G.
Savard,“A System Architecture for Autonomous Demand
Side Load Management in Smart Buildings,” IEEE
Transactions on Smart Grid, vol. 3, no. 4, pp. 2157–2165,
Dec. 2012.
[9] A. H. Mohsenian-Rad, V. W. S. Wong, J. Jatskevich, R.
Schober, and A. Leon-Garcia, “Autonomous Demand-Side
Management Based on Game-Theoretic Energy
Consumption Scheduling for the Future Smart Grid,” IEEE
Transactions on Smart Grid, vol.1, no. 3, pp. 320–331, Dec.
2010.
[10] P. Samadi, A. H. Mohsenian-Rad,V. W. S. Wong, and R.
Schober,“Tackling the Load Uncertainty Challenges for
Energy Consumption Scheduling in Smart Grid,” IEEE
Transactions on Smart Grid, vol. 4, no. 2, pp. 1007–1016,
June 2013.
[11] Levendovszky, J, E.C. van der Meulen,: "Tail Distribution
Estimation for Call Admission Control in ATM Networks",
Proccedings of IFIP, Third Workshop on Performance
Modelling and Evaluation of ATM Networks, Ilkley, West
Yorkshire, UK, 2-6th July 1995.
[12] Z. Lin; Z. Bai, Probability inequalities. Springerverlag
Berlin Heidelberg, 2010.
[13] W. Hoeffding, "Probability inequalities for sums of
bounded random variables", Journal of the American
statistical association, vol 58, sz 301, o 13–30, 1963.
[14] G. Bennett, „Probability inequalities for the sum of
independent random variables”, Journal of the American
Statistical Association, vol 57, sz 297, o 33–45, 1962.
[15] H. Chernoff, „A measure of asymptotic efficiency for tests
of a hypothesis based on the sum of observations”, The
Annals of Mathematical Statistics, vol 23, sz 4, o 493–507,
1952.
[16] DasGupta, Anirban. Asymptotic theory of statistics and
probability. Springer, 2008.
[17] O. Ardakanian, S. Keshav, and C. Rosenberg, “Markovian
models for home electricity consumption,” Proc. 2nd ACM
SIGCOMM Work. Green Netw. - GreenNets ’11, p. 31,
2011.
[18] J. Zico Kolter and Matthew J. Johnson. REDD: A public
data set for energy disaggregation research. In proceedings
of the SustKDD workshop on Data Mining Applications in
Sustainability, 2011.
Authors’ addresses
Lorant Kovacs, PhD
Kecskemet College, Faculty of Mechanical Engineering and
Automation (GAMF)
Izsaki ut 10, Kecskemet, H-6000, Hungary
[email protected]
Rajmund Drenyovszki, MSc
Kecskemet College, Faculty of Mechanical Engineering and
Automation (GAMF)
Izsaki ut 10, Kecskemet, H-6000, Hungary
[email protected]
Andras Olah, PhD
Pázmány Péter Catholic University, Faculty of Information
Technology
Práter utca 50/a, H-1083 Budapest, Hungary
[email protected]
Janos Levendovszky, PhD
Budapest University of Technology and Economics, Deptartment
of Telecommunications,
Egry József u. 18, H-1111 Budapest, Hungary
[email protected]
Kalman Tornai,PhD
Pázmány Péter Catholic University, Faculty of Information
Technology
Práter utca 50/a, H-1083 Budapest, Hungary
[email protected]
Istvan Pinter, PhD
Kecskemet College, Faculty of Mechanical Engineering and
Automation (GAMF)
Izsaki ut 10, Kecskemet, H-6000, Hungary
[email protected]
| 3cs.SY
|
Logical Methods in Computer Science
Vol. 2 (3:4) 2006, pp. 1–42
www.lmcs-online.org
Submitted
Published
Jan. 25, 2006
Sep. 13, 2006
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS ∗
NAOKI KOBAYASHI a , KOHEI SUENAGA b , AND LUCIAN WISCHIK c
a
6-3-09, Aoba, Aramaki-aza, Aoba-ku, Sendai, Miyagi, Japan
e-mail address: [email protected]
b
6-3-09, Aoba, Aramaki-aza, Aoba-ku, Sendai, Miyagi, Japan
e-mail address: [email protected]
c
1 Microsoft Way, Redmond, WA 98052, USA
e-mail address: [email protected]
Abstract. We propose a type-based resource usage analysis for the π-calculus extended
with resource creation/access primitives. The goal of the resource usage analysis is to
statically check that a program accesses resources such as files and memory in a valid
manner. Our type system is an extension of previous behavioral type systems for the πcalculus. It can guarantee the safety property that no invalid access is performed, as well as
the property that necessary accesses (such as the close operation for a file) are eventually
performed unless the program diverges. A sound type inference algorithm for the type
system is also developed to free the programmer from the burden of writing complex type
annotations. Based on our algorithm, we have implemented a prototype resource usage
analyzer for the π-calculus. To the authors’ knowledge, this is the first type-based resource
usage analysis that deals with an expressive concurrent language like the π-calculus.
1. Introduction
Computer programs access many external resources, such as files, library functions,
device drivers, etc. Such resources are often associated with certain access protocols; for
example, an opened file should be eventually closed and after the file has been closed,
no read/write access is allowed. The aim of resource usage analysis [11] is to statically
check that programs conform to such access protocols. Although a number of approaches,
including type systems and model checking, have been proposed so far for the resource
usage analysis or similar analyses [5, 6, 7, 11, 1], most of them focused on analysis of
sequential programs, and did not treat concurrent programs, especially those involving
dynamic creation/passing of channels and resources.
In the present paper, we propose a type-based method of resource usage analysis for
concurrent languages. Dealing with concurrency is especially important because concurrent
2000 ACM Subject Classification: D.2.4, D.3.1, F.3.1, F.3.2.
Key words and phrases: Type System, π-Calculus, Verification of Concurrent Programs, Resource Usage
Analysis.
∗
A preliminary version appeared in 7th International Conference on Verification, Model Checking, and
Abstract Interpretation (VMCAI 2006), Charleston, SC, USA, January 8–10, 2006.
l
LOGICAL METHODS
IN COMPUTER SCIENCE
c
DOI:10.2168/LMCS-2 (3:4) 2006
CC
N. Kobayashi, K. Suenaga, and L. Wischik
Creative Commons
2
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
programs are hard to debug, and also because actual programs accessing resources are often
concurrent. We use the π-calculus (extended with resource primitives) as a target language
so that our analysis can be applied to a wide range of concurrency primitives (including
those for dynamically creating and passing channels) in a uniform manner.
A main new difficulty in dealing with concurrent programs is that control structures are
more complex in concurrent programs than in sequential programs. For example, consider
the following process P1 :
(νc) (read(x).ch i | c( ). close(x))
Here, read(x).ch i reads x and then sends a signal on channel c, and in parallel to that,
c( ). close(x) waits for a signal on channel c and then closes x. Because of the synchronization through channel c, x is closed only after being read. To capture this kind of causal
dependency between communications and resource access, we use CCS processes as extra
type information (which are called behavioral types). For example, the above process is
given the behavioral type (νc) (xR .c | c. xC ).
Using the behavioral types introduced above, we can construct a type system for resource usage analysis in a manner similar to previous behavioral type systems for the πcalculus [10, 3]. A type judgment is of the form Γ ⊲ P : A, where Γ is the usual type
environment and A is a behavioral type approximating the behavior of P on the free channels and resources. For example, the above process P1 is typed x : res⊲P1 : (νc) (xR .c | c. xC ).
Behavioral types are also used to augment channel types. The judgment for s(x). P1 is given
by:
Γ ⊲ s(x). P1 : s
R
where Γ = s:chanh(x:res)(νc) (x .c | c. xC )i. Here, the behavioral type of s(x). P1 is simply
a single input command s: the characteristic feature of this kind of type system is that the
behavior of the input continuation is accounted for at output, not at input. The channel
s has argument type (x:res)(νc) (xR .c | c. xC ), which specifies that the resource sent along
channel s will be read first and then closed. Using the same type environment, the output
process shri is typed as:
Γ, r:res ⊲ shri : s. (νc) (r R .c | c. r C )
Here the behavioral type is an output followed by a continuation. The continuation
(νc) (r R .c | c. r C ) has been obtained by substituting r for x in the argument type of s. In this
way, the types propagate information about how resources and channels passed thorough
channels are accessed.
An important property of our type system is that types express abstract behavior of
processes, so that certain properties of processes can be verified by verifying the corresponding properties of their types, using, for example, model checking techniques. The
latter properties (of behavioral types) are more amenable to automatic verification techniques like model checking than the former ones, because the types do not have channel
mobility and also because the types typically represent only the behavior of a part of the
entire process.
The technical contributions of the present work are summarized as follows.
• Formalization of type systems for resource usage analysis for the π-calculus, and
proof of their soundness. We have augmented previous behavioral types for the πcalculus with hiding and renaming constructors, and adapted them to the problem
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
3
of resource usage analysis. CCS-like processes have been used as types also in previous work on type systems for the π-calculus [10, 3]. Igarashi and Kobayashi [10],
however, used a fragment without hiding and renaming, and Chaki et al. [3] used a
fragment without renaming, while the present paper uses both hiding and renaming. The inclusion of hiding and renaming is important both for accuracy and for
automatic inference (see Remark 3.12).
• Realization of fully automatic verification (while making the analysis more precise
than [10]). Igarashi and Kobayashi [10] gave only an abstract type system, without
giving a concrete type inference algorithm. Chaki et al. [3] requires type annotations.
The full automation was enabled by a combination of a number of small ideas, like
inclusion of hiding and renaming as type constructors, and approximation of a CCSlike type by a Petri net (to reduce the problem of checking conformance of inferred
types to resource usage specification).
• Verification of not only the usual safety property that an invalid resource access
does not occur, but also an extended safety (which we call partial liveness) that
necessary resource accesses (e.g. closing of a file) are eventually performed unless
the whole process diverges. The partial liveness is not guaranteed by Chaki et al.’s
type system [3]. A noteworthy point about our type system for guaranteeing the
partial liveness is that it is parameterized by a mechanism that guarantees deadlockfreedom (in the sense of Kobayashi’s definition [14]). So, our type system can be
combined with any mechanism (model checking, abstract interpretation, another
type system, or whatever) to verify deadlock-freedom for deadlock- or lock-freedom
(e.g., Yoshida’s graph type system [25]).
• Implementation of a prototype resource usage analyzer based on the proposed
method. The implementation can be tested at http://www.yl.is.s.u-tokyo.ac.jp/~kohei/usage-p
The rest of this paper is structured as follows. Section 2 introduces an extension of
the π-calculus with primitives for creating and accessing resources. Section 3 introduces a
type system for resource usage analysis, which guarantees that well-typed processes never
perform an invalid resource access. Section 4 gives a type inference algorithm for the type
system. Section 5 extends the type system to guarantee that necessary resource accesses
(such as closing of opened files) are eventually performed (unless the program diverges).
Section 6 describes a prototype resource usage analyzer we have implemented based on the
present work. Section 7 discusses related work. Section 8 concludes.
2. Processes
This section introduces the syntax and the operational semantics of our target language.
2.1. Syntax.
Definition 2.1 (processes). The set of processes is defined by the following syntax.
P (processes) ::= 0 | xhv1 , . . . , vn i. P | x(y1 , . . . , yn ). P
| (P | Q) | if v then P else Q
| (νx) P | ∗P | accξ (x).P | (NΦ x)P
::= x | true | false
v (values)
4
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
Here, x, y, and z range over a countably infinite set Var of variables. ξ ranges over a set of
labels called access labels. Φ, called a trace set, denotes a set of sequences of access labels
that is prefix-closed. The prefixes (like (νx) and (NΦ x)) bind tighter than the parallel
composition | .
An access label specifies the kind of an access operation. Typical access labels that we
are going to use in this paper are: I for initialization, R for read, W for write, and C for
close.
Process accξ (x).P accesses the resource x, and then behaves like P . We will often write
init(x).P , read(x).P , write(x).P , and close(x).P for accI (x).P , accR (x).P , accW (x).P ,
accC (x).P . Process (NΦ x)P creates a new resource with the bound name x that should be
accessed according to Φ, and then behaves like P . Φ specifies a set of acceptable sequences
∗
#
of operations that are allowed for the new resource x. For example, (N(I(R+W ) C) x)P
creates a resource that should be first initialized, read or written an arbitrary number of
times, and then closed. Here, (S)# is the prefix closure of S, i.e., {s | ss′ ∈ S}. We write ǫ
for the empty sequence.
v i. P and x(e
y ). P for
We often abbreviate a sequence v1 , . . . , vn to ve, and write xhe
xhv1 , . . . , vn i. P and x(y1 , . . . , yn ). P . We often omit trailing 0 and write xhe
v i and accξ (x)
v i. 0 and accξ (x).0 respectively.
for xhe
The bound and free variables of P are defined in a customary manner; also (NΦ x)P
binds x. We identify processes up to α-conversion, and assume that α-conversion is implicity
applied so that bound variables are always different from each other and from free variables.
2.2. Operational Semantics. We now formally define the operational semantics of our
process calculus The operational semantics is almost the same as the standard reduction
semantics for the π-calculus, except that trace sets Φ (which represent how resources should
be accessed in future) may change during reduction.
Definition 2.2. The structural preorder is the least reflexive and transitive relation
closed under the rules in Figure 1 (P ≡ Q stands for (P Q) ∧ (Q P )).
Remark 2.3. As in our previous behavioural type systems for the π-calculus [10, 14, 15],
the structural relation is asymmetric. If the standard, symmetric structural relation were
used, the type preservation property would not hold: Γ ⊲ ∗P | P : A does not necessarily
imply Γ ⊲ ∗P : A) for the type system introduced in the next section.
Definition 2.4. The set of reduction labels, ranged over by L, is {xξ | x ∈ Var} ∪ {τ }. We
define target(L) by:
target (xξ ) = {x}
target (τ ) = ∅
Definition 2.5. Let Φ be a set of sequences of access labels. Φ−ξ is defined by:
{s | ξs ∈ Φ}.
Φ−ξ =
L
Definition 2.6. The reduction relation −→ is the least relation closed under the rules in
Figure 2.
L
We write P −→ Q when P −→ Q for some L. We write −→∗ for the reflexive and
transitive closure of −→.
Notice that when an invalid access to a resource occurs (i.e. when the program accesses
ξ but the specification Φ has no ξ-prefixes), then resource specification Φ is set to ∅ by
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
P |0 ≡ P
5
(SP-Zero)
P |Q ≡ Q|P
(SP-Commut)
P | (Q | R) ≡ (P | Q) | R
(SP-Assoc)
∗P ∗P | P
(SP-Rep)
(νx) P | Q (νx) (P | Q)(if x not free in Q)
(SP-New)
(NΦ x)P | Q (NΦ x)(P | Q)(if x not free in Q)
(SP-NewR)
P P′
Q Q′
P | Q P ′ | Q′
(SP-Par)
P Q
(νx) P (νx) Q
(SP-CNew)
P Q
(N x)P (NΦ x)Q
(SP-CNewR)
Φ
Figure 1: Structural Preorder
L
P −→ Q
τ
z /e
y]Q (R-Com)
z i. P | x(e
y ). Q −→ P | [e
xhe
xξ
(R-New)
(νx) P −→ (νx) Q
(R-Acc)
accξ (x).P −→ P
x 6∈ target(L)
L
xξ
P −→ Q
τ
−ξ
(NΦ x)P −→ (NΦ x)Q
(R-NewR1)
L
P −→ Q
(R-Par)
L
P | R −→ Q | R
L
P −→ Q
x 6∈ target (L)
L
(NΦ x)P −→ (NΦ x)Q
τ
if true then P else Q −→ P
τ
(R-NewR2)
(R-IfT)
if false then P else Q −→ Q (R-IfF)
P P′
L
P ′ −→ Q′
L
Q′ Q
(R-SP)
P −→ Q
Figure 2: Reduction Relation
(R-NewR1). On the other hand Φ ⊇ {ǫ} indicates a resource that has been correctly used
so far, and Φ = {ǫ} indicates one that has been correctly and completely used.
Definition 2.7. A process P is resource-safe if it does not contain a sub-expression of the
form (N∅ x)Q.
6
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
We give a type system guaranteeing that any resource-safe, well-typed process cannot
be reduced to a non-safe process (in other words, any resource-safe, well-typed process never
performs an invalid access) in Section 3.
Example 2.8. The following process first creates a resource x that should be first initialized,
read an arbitrary number of times, and then closed. It then spawns four processes; they
synchronize through channels c1 and c2 , so that x is accessed in a valid order.
∗
2
#
(N(IR C) x)(νc1 ) (νc2 )
init(x).(c1 h i | c1 h i) /* initialize x, and send signals */
| c1 ( ). read(x).c2 h i /* wait for a signal on c1 ,
then read x, and signal on c2 */
| c1 ( ). read(x).c2 h i /* wait for a signal on c1 ,
then read x, and signal on c2 */
| c2 ( ). c2 ( ). close(x) /* wait on c2 , then close x */
Example 2.9. The following program is prototypical of recursive functions. There is a
replicated service which listens on channel s; it either terminates the recursion by sending a
message back on the reply channel r, or it recursively invokes a sub-instance of itself which
will reply on a private channel r ′ . In this example each recursive step does a read(x). The
following program use an integer to decide whether or not to recurse. Though our language
does not have integers and operations on them as primitives, it is trivial to extend our
language and type system with those primitives.
(νs) ∗(s(n, x, r). if n = 0 then rhi
else (νr ′ ) (shn − 1, x, r ′ i | r ′ (). read(x).rhi)
∗
#
| (N(IR C) x)(νr) (init(x).sh100, x, ri | r(). close(x))
2 The above program corresponds to the following higher-level program:
init(x); parbegin read(x); read(x) parend; close(x)
Example 2.10. Consider the following producer/consumer program:1
(νproducer ) (νconsumer )
∗(producer (b, p, c). p(). accP (b).(chi | producer hb, p, ci)) |
∗(consumer (b, p, c). c(). acc G (b).(phi | producer hb, p, ci)) |
∗ #
(N((P G) ) buf )(νx) (νy)
∗(producer hbuf , x, yi) | ∗(consumer hbuf , x, yi) | xhi
The first two processes ∗(producer (b, p, c). · · · ) and
∗(consumer (b, p, c). · · · ) define the behavior of producers and consumers. A producer repeatedly waits to receive a signal on p, performs a put on the buffer b (by accP (b)), and
then sends a signal on c. A consumer repeatedly waits to receive a signal on c, performs a
get on the buffer b (by accP (b)), and then sends a signal on p. The third process creates a
new buffer on which put and get should be applied only alternately, creates two channels x
and y used for synchronization, and runs infinitely many producers and consumers.
Remark 2.11. We treat resources as primitives in this paper, but we could alternatively
express a resource as a tuple of channels, each of which corresponds to each access operation. For example, the resource in Example 2.8 can be expressed as a tuple consisting of
1This is an example taken from an ealier version of [20] and modified.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
7
three channels init, read, and close. If we did so, we could directly reuse the previous type
systems [10, 3] to infer some of the properties discussed in this paper (with different precision). Treating resources as primitives, however, simplifies the type systems introduced in
later sections and clarifies the essence: if we expressed a resource as a tuple of channels, we
would need primitives for simultaneous creation of multiple channels as in [10], and need to
care about whether communications on the resource access channels succeed or not. On the
other hand, our resource access primitives are non-blocking, which simplifies in particular
the extended type system discussed in Section 5.
3. Type System
This section introduces a type system that prevents invalid access to resources. The type
system in this section does not guarantee a liveness property that all the necessary accesses
are eventually made; extensions to guarantee that property are discussed in Section 5.
3.1. Types. We first introduce the syntax of types. We use two categories of types: value
types and behavioral types. The latter describes how a process accesses resources and
communicates through channels. As mentioned in Section 1, we use CCS processes for
behavioral types.
Definition 3.1 (types). The sets of value types σ and behavioral types A are defined by:
σ ::= bool | res | chanh(x1 : σ1 , . . . , xn : σn )Ai
A ::= 0 | α | a.A | xξ .A | τ.A | (A1 | A2 ) | A1 ⊕ A2 | ∗A
| hy1 /x1 , . . . , yn /xn iA | (νx) A | µα.A | A↑S | A↓S
a (communication labels) ::= x | x
A behavioral type A, which is a CCS process, describes what kind of communication
and resource access a process may perform. 0 describes a process that performs no communication or resource access. The types x. A, x. A, xξ .A and τ.A describe processes that
first perform an action and then behave according to A; the actions are, respectively, an
input on x, an output on x, an access operation ξ on x, and the invisible action. A1 | A2
describes a process that performs communications and resource access according to A1 and
A2 , possibly in parallel. A1 ⊕A2 describes a process that behaves according to either A1 or
A2 . ∗A describes a process that behaves like A an arbitrary number of times, possibly in
parallel. hy1 /x1 , . . . , yn /xn iA, abbreviated to he
y /e
xiA, denotes simultaneous renaming of x
e
with ye in A. (νx) A describes a process that behaves like A for some hidden channel x. For
example, (νx) (x. y | x) describes a process that performs an output on y after the invisible
action on x. The type µα.A describes a process that behaves like a recursive process de△
fined by α = A.2 The type A↑S describes a process that behaves like A, except that actions
whose targets are in S are replaced by the invisible action τ , while A↓S describes a process
that behaves like A, except that actions whose targets are not in S are replaced by τ . The
formal semantics of behavioral types is defined later using labeled transition semantics.
As for value types, bool is the type of booleans. res is the type of resources. The
type chanh(x1 : σ1 , . . . , xn : σn )Ai, abbreviated to chanh(e
x:σ
e)Ai, describes channels carrying tuples consisting of values of types σ1 , . . . , σn . Here the type A approximates how a
2The replication ∗A and µα.(A | α) have the same semantics in this section, but they are differentiated
in Section 5 by the predicate disabled.
8
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
receiver on the channel may use the elements x1 , . . . , xn of each tuple for communications
and resource access. For example, chanh(x : res, y : res)xR .y C i describes channels carrying
a pair of resources, where a party who receives the actual pair (x′ , y ′ ) will first read x′ and
then close y ′ . We sometimes omit σ
e and write chanh(e
x)Ai for chanh(e
x:σ
e)Ai. When x
e is
empty, we also write chanhi.
Note that he
y /e
xi is treated as a constructor rather than an operator for performing the
actual substitution. We write [e
y /e
x] for the latter throughout this paper. he
y /e
xiA is slightly
different from the relabeling of the standard CCS [19]: hy/xi(x | y) allows the communication
on y, but the relabeling of CCS does not. This difference calls for the introduction of a
special transition label {x, y} in Section 3.2.
Definition 3.2. The set of free variables of A, written FV(A), is defined by:
FV(0)
FV(α)
FV(x. A)
FV(x. A)
FV(xξ .A)
FV(τ.A)
FV(A1 | A2 )
FV(A1 ⊕ A2 )
FV(∗A)
FV(he
y /e
xiA)
FV((νx) A)
FV(µα.A)
FV(A↑S )
FV(A↓S )
=
=
=
=
=
=
=
=
=
=
=
=
=
=
∅
∅
{x} ∪ FV(A)
{x} ∪ FV(A)
{x} ∪ FV(A)
FV(A)
FV(A1 ) ∪ FV(A2 )
FV(A1 ) ∪ FV(A2 )
FV(A)
(FV(A)\{e
x}) ∪ {e
y}
FV(A)\{x}
FV(A)
FV(A)\S
FV(A) ∩ S
As defined above, (νx) A, he
y /e
xiA, and A↑S bind x, x
e, and the variables in S respectively.
We identify behavioral types up to renaming of bound variables. In the rest of this paper,
we require that every channel type chanh(x1 : σ1 , . . . , xn : σn )Ai must satisfy FV(A) ⊆
{x1 , . . . , xn }. For example, chanh(x:res)xR i is a valid type but chanh(x:res)y R i is not.3
l
3.2. Semantics of behavioral types. We give a labeled transition relation −→ for behavioral types. The transition labels l (distinct from the reduction labels L of Definition 2.4)
are
l ::= x | x | xξ | τ | {x, y}
The label {x, y} indicates the potential to react in the presence of a substitution that
identifies x and y. We also extend target to the function on transition labels by:
target (x) = target (x) = {x}
target({x, y}) = {x, y}
l
The transition relation −→ on behavioral types is the least relation closed under the rules
τ
l
in Figure 3. We write =⇒ for the reflexive and transitive closure of −→. We also write =⇒
l
for =⇒−→=⇒.
3This constraint can be removed if we assume that the free variables in codom(Γ) never clash with the
bound variables of P in the judgment form Γ⊲P : A given later. In particular, we need an implicit assumption
{e
y }∩FV(Γ)=∅ in Figure 4, (T-In).
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
xξ
a
τ
xξ .A → A
a.A→A
(Tr-Act)
τ.A→A
l
A1 →A′1
A2 →A′2
l
A1 |A2 →A1 |A′2
l
y
x
(Tr-Par1)
l
A1 |A2 →A′1 |A2
y
A2 →A′2
A1 →A′1
9
x
A2 →A′2
A1 →A′1
{x,y}
(Tr-Par2)
{x,y}
A1 |A2 −→ A′1 |A′2
A1 |A2 −→ A′1 |A′2
{x,x}
A −→ A′
(Tr-Com)
τ
A −→ A′
l
l
A2 →A′2
A1 →A′1
l
(Tr-Or)
l
A1 ⊕A2 →A′1
A1 ⊕A2 →A′2
l
A | ∗A −→ A′
(Tr-Rep)
l
∗A −→ A′
l
[µα.A/α]A −→ A′
(Tr-Rec)
l
µα.A −→ A′
l
A −→ A′
(Tr-Rename)
[e
y /e
x]l
he
y /e
xiA −→ he
y /e
xiA′
l
A −→ A′
target (l)∩{x} = ∅
(Tr-Hiding)
l
(νx) A −→ (νx) A′
l
A→A′
target (l)⊆S
τ
′↑
A↑S →A
l
A→A′
target(l)∩S=∅
l
A↑S →A′ ↑S
S
target (l)⊆S
l
l
A→A′
l
A→A′
target(l)∩S=∅
τ
A↓S →A′ ↓S
′
A↓S →A ↓S
(Tr-Exclude)
(Tr-Project)
Figure 3: Transition semantics of behavioral types
Remark 3.3. (νx) A should not be confused with A↑{x} . (νx) A is the hiding operator
of CCS, while A↑{x} just replaces any actions on x with τ [10]. For example, (νx) (x. y ξ )
τ
yξ
cannot make any transition, but (x. y ξ )↑{x} −→−→ 0↑{x} .
The set tracesx (A) defined below is the set of possible access sequences on x described
by A.
Definition 3.4 (traces).
xξ1
xξn
tracesx (A) = {ξ1 . . . ξn | A↓{x} =⇒ · · · =⇒ A′ }
Note that tracesx (A) is prefix-closed (hence a trace set) by definition.
10
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
We define the subtyping relation A1 ≤ A2 below. Intuitively, A1 ≤ A2 means that
a process behaving according to A1 can also be viewed as a process behaving according to
A2 . To put in another way, A1 ≤ A2 means that A2 simulates A1 .We define ≤ for only
closed types, i.e., those not containing free type variables.
Definition 3.5 (subtyping). The subtyping relation ≤ on closed behavioral types is the
l
l
largest relation such that A1 ≤ A2 and A1 −→ A′1 implies A2 =⇒ A′2 and A′1 ≤ A′2 for
some A′2 .
We often write A1 ≥ A2 for A2 ≤ A1 , and write A1 ≈ A2 for A1 ≤ A2 ∧ A2 ≤ A1 .
Remark 3.6. Note that the subtyping relation defined here is the converse of the one used
in Igarashi and Kobayashi’s generic type system [10]. This is due to two different, dual
views on behavioral types. Here, we think of behavioral types as describing the behavior
of processes. On the other hand, Igarashi and Kobayashi [10] think of behavioral types as
describing the assumption on the environment about what kind of process is accepted by
the environment. Because of this difference, they write behavioral types on the lefthand
side of ⊲, and write A1 &A2 for non-deterministic choice instead of A1 ⊕ A2 .
Remark 3.7. Depending on what property the type system should guarantee, a finer
subtyping relation may need to be chosen. For example, the above definition allows
(xW .0) | (xW .0) ≤ xW .xW .0. We may want to disallow this relation if we want to infer a
property like “no simultaneous writes on x can occur.”
The following properties are satisfied by ≤ . For proofs, see Appendix A.
Lemma 3.8.
(1) ≤ is a precongruence, i.e., ≤ is closed under any behavioral type constructor.
(2) If A1 ≤ A2 , then tracesx (A1 ) ⊆ tracesx (A2 ) for any x.
(3) B1 ⊕ B2 ≤ A if and only if B1 ≤ A and B2 ≤ A .
(4) If [B/α]A ≤ B, then µα.A ≤ B.
3.3. Typing. We consider two kinds of judgments, Γ ⊲ v : σ for values, and Γ ⊲ P : A for
processes. Γ is a mapping from a finite set of variables to value types. In Γ ⊲ P : A, the type
environment Γ describes the types of the variables, and A describes the possible behaviors
of P . For example, x : chanh(b : bool)0i ⊲ P : x | x implies that P may send booleans along
the channel x twice. The judgment y : chanh(x : chanh(b : bool)0i)xi ⊲ Q : y means that Q
may perform an input on y once, and then it may send a boolean on the received value.
Note that in the judgment Γ ⊲ P : A, the type A is an approximation of the behavior of P
on free channels. P may do less than what is specified by A, but must not do more; for
example, x : chanh( )0i ⊲ xh i : x | x holds but x : chanh( )0i ⊲ xh i. xh i : x does not. Because
of this invariant, if A does not perform any invalid access, neither does P .
We write dom(Γ) for the domain of Γ. We write ∅ for the empty type environment,
and write x1 : τ1 , . . . , xn : τn (where x1 , . . . , xn are distinct from each other) for the type
environment Γ such that dom(Γ) = {x1 , . . . , xn } and Γ(xi ) = τi for each i ∈ {1, . . . , n}.
When x 6∈ dom(Γ), we write Γ, x : τ for the type environment ∆ such that dom(∆) =
dom(Γ) ∪ {x}, ∆(x) = τ , and ∆(y) = Γ(y) for y ∈ dom(Γ). We define the value judgment
relation Γ ⊲ v:σ to be the least relation closed under
Γ, x:σ ⊲ x:σ
Γ ⊲ true:bool
Γ ⊲ false:bool.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
11
We write Γ ⊲ ve:e
σ as an abbreviation for (Γ ⊲ v1 :σ1 ) ∧ · · · ∧ (Γ ⊲ vn :σn ).
Definition 3.9. The type judgment relation Γ ⊲ P : A is the least relation closed under the
rules given in Figure 4.
We explain key rules below.
In rule (T-Out), the first premise Γ ⊲ P : A2 implies that the continuation of the output process behaves like A2 , and the second premise Γ ⊲ x : chanh(e
y :σ
e)A1 i implies that
the tuple of values ve being sent may be used by an input process according to he
v /e
y iA1 .
v /e
y iA1 | A2 ). Here,
Therefore, the whole behavior of the output process is described by x. (he
hv1 /x1 , . . . , vn /xn iA stands for hvi1 /xi1 , . . . , vik /xik iA where
{vi1 , . . . , vik } = {v1 , . . . , vn }\{true, false}. For example,htrue/x, y/ziA stands for hy/ziA.
Note that, as in previous behavioral type systems [10, 3], the resource access and communications made on ve by the receiver of ve are counted as the behavior of the output process
(see Remark 3.13).
In rule (T-In), the first premise implies that the continuation of the input process
behaves like A2 . Following previous behavioral type systems [10, 3], we split A2 into two
parts: A2 ↓{ey} and A2 ↑{ey } . The first part describes the behavior on the received values
ye and is taken into account in the channel type. The second part describes the resource
access and communications performed on other values, and is taken into account in the
behavioral type of the input process. The condition A2 ↓{ey } ≤ A1 requires that the access
and communication behavior on ye conforms to A1 , the channel arguments’ behavior.
In (T-New), the premise implies that P behaves like A, so that (νx) P behaves like
(νx) A. Here, we only require that x is a channel, unlike in the previous behavioral type
systems for the π-calculus [10, 15]. That is because we are only interested in the resource access behavior; the communication behavior is used only for accurately inferring the resource
access behavior.
In (T-NewR), we check that the process’s behavior A conforms to the resource usage
specification Φ.
Rule (T-Sub) allows the type A′ of a process to be replaced by its approximation A.
We remark that weakening of Γ can be derived (Appendix B, Lemma B.1) and so is
not needed as a rule.
The following example shows how information about the usage of resources by an input
process is propagated to an output process.
Example 3.10. Let us consider (NΦ x)P , where
Φ = (R∗ C)#
P = (νy) (yhx, xi | y(z1 , z2 ). read(z1 ).close(z2 )).
Let Γ = y : chanh(z1 , z2 )z1R .z2C i, x : res. Then, the following judgment holds for the
output and input processes.
Γ ⊲ yhx, xi : y. xR .xC
Γ ⊲ y(z1 , z2 ). read(z1 ).close(z2 ) : y. 0
Here, we have used subtyping relations hx/z1 , x/z2 iz1R .z2C ≈ xR .xC and z1R .z2C ↑{z1 ,z2 } ≈ 0.
By using (T-Par) and (T-New), we obtain
x : res ⊲ P : (νy) (y. xR .xC | y)
12
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
Γ ⊲ 0:0
(T-Zero)
Γ ⊲ P : A2 Γ ⊲ x : chanh(e
y:σ
e )A1 i Γ ⊲ ve : σ
e
Γ ⊲ xhe
v i. P : x. (he
v /e
yiA1 | A2 )
(T-Out)
Γ, ye : σ
e ⊲ P : A2
Γ ⊲ x : chanh(e
y:σ
e)A1 i A2 ↓{ey} ≤ A1
Γ ⊲ x(e
y ). P : x. (A2 ↑{ey} )
(T-In)
Γ ⊲ P1 : A1
Γ ⊲ P2 : A2
Γ ⊲ P1 | P2 : A1 | A2
(T-Par)
Γ ⊲ P :A
Γ ⊲ ∗P : ∗A
(T-Rep)
Γ ⊲ v : bool
Γ ⊲ P :A
Γ ⊲ Q:A
Γ ⊲ if v then P else Q : A
(T-If)
Γ, x : chanh(e
y:σ
e )A1 i ⊲ P : A2
Γ ⊲ (νx) P : (νx) A2
(T-New)
Γ ⊲ P :A
Γ ⊲ x : res
Γ ⊲ accξ (x).P : xξ .A
(T-Acc)
Γ, x : res ⊲ P : A
tracesx (A) ⊆ Φ
Φ
Γ ⊲ (N x)P : A↑{x}
Γ ⊲ P : A′
A′ ≤ A
Γ ⊲ P :A
(T-NewR)
(T-Sub)
Figure 4: Typing Rules
Using (T-Sub) with (νy) (y. xR .xC | y) ≈ xR .xC we get
x : res ⊲ P : xR .xC
Since tracesx (xR .xC )) ⊆ (R∗ C)# , we obtain ∅ ⊲ (NΦ x)P : 0 by using (T-NewR) and
(T-Sub). 2
Example 3.11. Recall Example 2.9:
P = (νs) (∗s(n, x, r). P1 | (NΦ x)P2 )
P1 = if n = 0 then rhi
else (νr ′ ) (shn − 1, x, r ′ i | r ′ (). read(x).rhi)
P2 = (νr) (init(x).sh100, x, ri | r(). close(x))
Φ = (IR∗ C)#
Let A1 = µα.(r ⊕ (νr ′ ) (hr ′ /riα|r ′ . xR .r) and
let Γ = s:chanh(n:int, x:res, r:chanhi) A1 i. Then
Γ, n:int, x:res, r:chanhi ⊲ P1 : A1
Γ ⊲ ∗s(n, x, r). P1 : ∗s. (A1 ↑{n,x,r} ) ≈ ∗s
Γ ⊲ P2 : (νr) (xI .A1 |r. xC )
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
13
So long as tracesx ((νr) (xI .A1 |r. xC )) ⊆ Φ, we obtain ∅ ⊲ P : 0. See Section 4.3 for the
algorithm that establishes tracesx (·) ⊆ Φ. 2
Remark 3.12. The type A1 in the example above demonstrates how recursion, hiding, and
renaming are used together. In general, in order to type a recursive process of the form
∗s(x). (νy) (· · · shyi · · · ), we need to find a type that satisfies (νy) (· · · hy/xiA · · · ) ≤ A.
Moreover, for the type inference (in Section 4), we must find the least such A. Thanks to
the type constructors for recursion, hiding, and renaming, we can always do that: A can be
expressed by µα.(νy) (· · · hy/xiα · · · ) (recall Lemma 3.8.4).
Remark 3.13. A reader may wonder why the rules (T-Out) and (T-In) are asymmetric,
in the sense that information about the continuation of a receiver process is transferred
to a sender process but not vice versa. That design choice comes from the observation
that a channel or resource exchanged between a sender and a receiver are, in general,
statically known only to the sender, so that we have to put information about the behavior
on the channel or resource into the type of the sender. For example, consider the process
((νy) (xhyi | · · · ) | x(z). z h i. Since the receiver x(z). z h i is not in the scope of y, we have
to put the information that y will be used for output into the type of the sender xhyi (as
x. y). It is still useful and possible to recover the symmetry in the treatment of senders and
receivers to some extent: see Section 8 of our previous paper [10].
The following theorem states that no well-typed process performs an invalid access to
a resource.
Theorem 3.14 (type soundness (safety)). Suppose that P is safe. If Γ⊲P : A and P −→∗ Q,
then Q is safe.
Proof. We make use of the following lemma:
L
L
• Subject-reduction. If P −→ P ′ and Γ ⊲ P : A then A =⇒ A′ and Γ ⊲ P ′ : A′ . Proof:
see Appendix B.
For the proof of the theorem, we focus on just a single reduction step. By the Lemma we
know that judgements are preserved by reduction; we must show that safety is also preserved, by induction on the derivation of reduction. The only interesting case is (R-NewR1),
−ξ
τ
(NΦ x)P → (NΦ x)P ′ , since the other rules do not alter trace-sets Φ. In this case, we are
xξ
xξ
given Γ ⊲ P : A, tracesx (A) ⊆ Φ, and P → P ′ . By the Lemma, A =⇒ A′ for some Γ ⊲ P ′ : A′ .
Assume (NΦ x)P is safe; hence so is P ; by the induction hypothesis so is P ′ . From the
xξ
conditions tracesx (A) ⊆ Φ and A =⇒ A′ , we get ξ ∈ tracesx (A) ⊆ Φ, so that ǫ ∈ Φ−ξ 6= ∅.
−ξ
So, (NΦ x)P ′ is safe.
4. Type Inference Algorithm
This section discusses an algorithm which takes a closed process P as an input and
checks whether ∅ ⊲ P : 0 holds. As in similar type systems [11, 15], the algorithm consists
of the following steps.
(1) Extract constraints on type variables based on the (syntax-directed version of) typing rules.
(2) Reduce constraints to trace inclusion constraints of the form
{tracesx1 (A1 ) ⊆ Φ1 , . . . , tracesxn (An ) ⊆ Φn }
14
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
∅ ⊲sd 0 : 0
Γi ⊲ vi : σi (for each i ∈ {1, . . . , n})
Γ0 ⊲sd P : A2
e ∪ (x : chanh(e
Γ0 ∪ Γ
y:σ
e)A1 i) ⊲sd xhe
v i. P : x. (he
v /e
yiA1 | A2 )
Γ ⊲sd P : A2
A2 ↓{ey} ≤ A1
wd(Γ ∪ ye : σ
e)
(Γ\{e
y}) ∪ x : chanh(e
y :σ
e)A1 i ⊲sd x(e
y ). P : x. A2 ↑{ey}
Γ1 ⊲sd P1 : A1
Γ2 ⊲sd P2 : A2
Γ1 ∪ Γ2 ⊲sd P1 | P2 : A1 | A2
Γ ⊲sd P : A
Γ ⊲sd ∗P : ∗A
Γ0 ⊲ v : bool
Γ1 ⊲sd P : A1
Γ2 ⊲sd Q : A2
A1 ≤ A
A2 ≤ A
Γ0 ∪ Γ1 ∪ Γ2 ⊲sd if v then P else Q : A
Γ ⊲sd P : A2
wd(Γ ∪ (x : chanh(e
x : τe)A1 i))
Γ\{x} ⊲sd (νx) P : (νx) A2
Γ ⊲sd P : A
Γ ∪ (x : res) ⊲sd accξ (x).P : xξ .A
Γ ⊲sd P : A
tracesx (A) ⊆ Φ
wd(Γ ∪ (x : res))
Γ\{x} ⊲sd (NΦ x)P : A′ ↑{x}
(T-SD-Zero)
(T-SD-Out)
(T-SD-In)
(T-SD-Par)
(T-SD-Rep)
(T-SD-If)
(T-SD-New)
(T-SD-Acc)
(T-SD-NewR)
Figure 5: Syntax Directed Typing Rules
(3) Decide whether the constraints are satisfied.
The algorithm for Step 3 is sound but not complete.
We give an overview of each step below. The first two steps are almost the same as
those in the previous work.
4.1. Step 1: Extracting Constraints. The typing rules presented in Section 3 can be
transformed to the syntax-directed typing rules shown in Figure 5. In the figure, Γ1 ∪ Γ2 is
the type environment obtained by merging both bindings, and defined only if Γ1 (x) = Γ2 (x)
for every x ∈ dom(Γ1 )∩dom(Γ2 ). Type equality here is syntactic equality up to α-renaming.
And wd(Γ1 ∪ Γ2 ) means that Γ1 ∪ Γ2 is well-defined. The two sets of typing rules are
equivalent in the following sense: If Γ ⊲ P : A is derivable, then there exists A′ such that
A′ ≤ A holds and Γ ⊲sd P : A′ is derivable. Conversely, if Γ ⊲sd P : A is derivable, so is
Γ ⊲ P : A.
Based on the syntax-directed rules, we obtain the algorithm in Figure 6, which takes
a process P and outputs a triple consisting of a type environment Γ, a behavioral type A,
and a set C of constraints. In Figure 6, Γ1 ⊗ · · · ⊗ Γn is defined to be (Γ, C) where Γ and
C are given by:
dom(Γ) = dom(Γ1 ) ∪ · · · ∪ dom(Γn )
Γ(x) = Γi (x) where x ∈ dom(Γi )\(dom(Γ1 ) ∪ · · · ∪ dom(Γi−1 ))
C = {Γi (x) = Γj (x) | x ∈ dom(Γi ) ∩ dom(Γj )}
The triple (Γ, A, C) output by PT satisfies the following properties:
• θΓ ⊲ P : θA holds for any substitution θ such that |= θC.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
15
• If Γ′ ⊲ P : A′ , then there exists a substitution θ such that θΓ ⊆ Γ′ and θA ≤ A′ .
Here, Γ and A may contain variables representing unknown behavioral types and value
types. C is a set of constraints on them, and the substitution θ above replaces them with
closed behavioral types and value types. Intuitively, the triple (Γ, A, C expresses a set of
type judgments for P . The first property above says that the triple contains only valid
judgments, while the second property says that every valid judgment is subsumed by the
triple.
We do not give a formal proof of the above properties; As usual, they can be proved by
induction on the structure of P .
4.2. Step 2: Reducing Constraints. Given a closed process P , PT(P ) produces a triple
(∅, A, C). The set C of constraints consists of unification constraints on value types (where
all the behavioral types occurring in them are variables), constraints of the form isChan(σ)
(which means that σ is a channel type), subtype constraints on behavioral types of the form
α ≥ A, and constraints of the form tracesx (A) ⊆ Φ. We can remove the first two kinds of
constraints (unification constraints on value types and isChan(σ)) by applying the standard
unification algorithm. Thus, we obtain the following constraints:
{α1 ≥ A1 , . . . , αn ≥ An ,
tracesx1 (B1 ) ⊆ Φ1 , . . . , tracesxm (Bm ) ⊆ Φm }
Here, we can assume that α1 , . . . , αn are different from each other, since α ≥ A1 and
α ≥ A2 can be replaced with α ≥ A1 ⊕ A2 by Lemma 3.8. We can also assume that
{α1 , . . . , αn } contains all the type variables in the constraint, since otherwise we can always
add the tautology α ≥ α. Each subtype constraint α ≥ A can also be replaced by
α ≥ µα.A, by using Lemma 3.8. Therefore, the above constraints can be further reduced,
by Lemma 3.8, to:
e′ /e
e′ /e
{tracesx1 ([A
α]B1 ) ⊆ Φ1 , . . . , tracesxm ([A
α]Bm ) ⊆ Φm }
Here, A′1 , . . . , A′n are the least solutions for the subtype constraints.
Thus, we have reduced type checking to the validity of trace inclusion constraints of
the form tracesx (A) ⊆ Φ.
Example 4.1. Recall Example 2.9. By applying the algorithm PT and the first part of
Step 2, we obtain the following constraints:
tracesx ((νr) (xI .s. α1 | r. xC )) ⊆ (IR∗ C)#
α1 ≥ r. α2 ⊕ (νr ′ ) (s. hr ′ /riα1 | r ′ . xR .r. α2 )↓{n,x,r}
α2 ≥ α2
By applying the second part of Step 2, we obtain tracesx (A1 ) ⊆ (IR∗ C)# where
A1 = (νr) (xI .s. A2 | r. xC )
A2 = µα1 .r. A3 ⊕ (νr ′ ) (s. hr ′ /riα1 | r ′ . xR .r. A3 )↓{n,x,r}
A3 = µα2 .α2 .
16
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
PTv(x) = (x : ρ, ρ) (where ρ fresh)
PTv(b) = (∅, bool) if b ∈ {true, false}
PT(0) =(∅, 0, ∅)
v i. P0 ) =
PT(xhe
let (Γi , σi ) = PTv(vi )
(Γ0 , A0 , C0 ) = PT(P0 )
(Γ, C) = Γ0 ⊗ (x : chanh(e
y :σ
e)αi) ⊗ Γ1 ⊗ · · · ⊗ Γn
v /e
y]α | A0 ), C) (where α fresh)
in (Γ, x. ([e
PT(x(e
y ). P0 ) =
let (Γ0 , A0 , C0 ) = PT(P0 )
(Γ1 , C1 ) = Γ0 ⊗ (x : chanh(e
y : ρe)αi) ⊗ (e
y : ρe)
in (Γ\e
y, x. A0 ↑{ey} , C0 ∪ C1 ∪ {α ≥ A0 ↓{ey} })
(where α, ρe fresh)
PT(P0 | P1 ) =
let (Γ0 , A0 , C0 ) = PT(P0 )
(Γ1 , A1 , C1 ) = PT(P1 )
(Γ2 , C2 ) = Γ0 ⊗ Γ1
in (Γ2 , A0 | A1 , C0 ∪ C1 ∪ C2 )
P T (if v then P0 else P1 ) =
let (Γ0 , A0 , C0 ) = P T (P0 )
(Γ1 , A1 , C1 ) = PT(P1 )
(Γ2 , σ) = PTv(v)
(Γ, C2 ) = Γ0 ⊗ Γ1 ⊗ Γ2
in (Γ, A0 ⊕ A1 , C0 ∪ C1 ∪ C2 ∪ {σ = bool})
P T ((νx) P0 ) =
let (Γ0 , A0 , C0 ) = P T (P0 )
C1 = if x ∈ dom(Γ0 )then {isChan(Γ0 (x))}else ∅
in (Γ0 \{x}, (νx) A0 , C0 ∪ C1 )
P T (∗P0 ) =
let (Γ0 , A0 , C0 ) = P T (P0 )
in (Γ0 , ∗A0 , C0 )
P T (accξ (x).P0 ) =
let (Γ0 , A0 , C0 ) = P T (P0 )
(Γ1 , C1 ) = Γ0 ⊗ (x : res)
in (Γ1 , xξ .A0 , C0 ∪ C1 )
P T ((NΦ x)P0 ) =
let (Γ0 , A0 , C0 ) = P T (P0 )
(Γ1 , C1 ) = Γ0 ⊗ (x : res)
in (Γ1 \{x}, A0 ↑{x} , C0 ∪ C1 ∪ {tracesx (A0 ) ⊆ Φ})
Figure 6: A Type Inference Algorithm
4.3. Step 3: Constraint Solving. We present an approximation algorithm for checking
a trace inclusion constraint tracesx (A) ⊆ Φ when the trace set Φ is a regular language.
(Actually, we can extend the algorithm to deal with the case where Φ is a deterministic
Petri net language: see Remark 4.6.)
We first describe the algorithm with an example. In Example 4.1 above, we have
reduced the typability of the process to the equivalent constraint tracesx (A1 ) ⊆ Φ where
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
17
Φ = (IR∗ C)# and
A1 ↓{x} ≈ (νr) (xI .A′′2 | r. xC )
A′′2 = r ⊕ (νr ′ ) (hr ′ /riA′′2 | r ′ . xR .r)
Here, we have removed A3 = µα.α since A3 ≈ 0.
Step 3-1. Approximate the behavior of A1 ↓{x} by a Petri net [22] NA1 ,x . This part
is similar to the translation of usage expressions into Petri nets in Kobayashi’s previous
work [16, 15, 12]. Since the behavioral types are more expressive (having recursion, hiding,
and renaming), however, we need to approximate the behavior of a behavioral type unlike
in the previous work. In this case A1 ↓{x} is infinite. To make it tractable we make a sound
approximation A′1 by pushing (ν) to top level, and we eliminate hr ′ /ri:
A′1 = (νr, r ′ ) (xI .A′2 | r. xC )
A′2 = r ⊕ (A′3 | r ′ . xR .r)
A′3 = r ′ ⊕ (A′3 | r ′ . xR .r ′ )
Then NA′1 ,x is as pictured. (Here we treat A1 ⊕ A2 as τ.A1 ⊕ τ.A2 for clarity. We also use
a version of Petri nets with labeled transitions.)
B10
B1
xI :A02
r:xC
xI
B2
¿
B5
¿
¿:r © ¿:(A03jr0:xR:r)
¿
xC
r
B8
¿:r 0 © ¿:(A03jr0 :xR:r0)
B9
¿
B4
¿
¿
r0
B6
r0 :xR :r 0
xC
xR
r0 :xR :r
B3
B11
xR:r
xR
¿
B7
xR:r 0
The rectangles are the places of the net, and the dots labeled by τ, xR , etc. are the
transitions of the net. Write ix for the number of tokens at node Bx . The behavior
e together
A′1 corresponds to the initial marking {i1 =1, i10 =1}. We say that the nodes B
′
′
with the restricted names (r, r ) constitute a basis for A1 . Note here that tracesx (A1 ) ⊆
tracesx (A′1 ) = ptraces(NA′1 ,x ) where ptraces(NA′1 ,x ) is the set of traces of the Petri net.
Thus, ptraces(NA′1 ,x ) ⊆ Φ is a sufficient condition for tracesx (A1 ) ⊆ Φ . The key point
here is that A′1 still has infinite states, but all its reachable states can be expressed in the
form (νr, r ′ ) (i1 B1 | · · · | i11 B11 ) (where ik Bk is the parallel composition of ik copies of Bk ),
e That is why we could express A′ by the
a linear combination of finitely many processes B.
1
Petri net as above.
18
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
Step 3-2. Construct a deterministic, minimized automaton MΦ that accepts the language Φ. Here the initial marking is {i12 =1}.
B11
I.R∗.C
xR
B12
xI
R∗ .C
xC
Step 3-3. Construct another Petri net NA′1 ,x k MΦ from NA′1 ,x and MΦ , which simulates the behavior of PA and MΦ simultaneously, so that the problem of tracesx (A′1 )(=
ptraces(NA′1 ,x )) ⊆ Φ is equivalent to a reachability problem of NA′1 ,x k MΦ . In the example, NA′1 ,x k MΦ has the initial marking {i1 =1, i10 =1, i12 =1} and transitions such as
I
B1 |B12 −→ B2 |B13 . ptraces(NA′1 ,x ) ⊆ Φ if and only if the following unsafe state is unreachable.
(i1 >0 ∧ i12 =0) ∨ (i7 >0 ∧ i13 =0) ∨ (i9 >0 ∧ i13 =0) ∨ (i11 >0 ∧ i13 =0)
To explain, if i1 > 0 ∧ i12 =0 then the behavior is able to make an R transition but the
specification automaton MΦ is not able.
Step 3-4. Use an approximation algorithm to decide the reachability problem of
′
NA1 ,x k MΦ , in a manner similar to Kobayashi’s type-based analyzer TyPiCal [12] for the
π-calculus.
The above steps 3-1, 3-2, and 3-3 are described in more detail below. See Section 6 for
Step 3-4.
4.3.1. Step 3-1: Construction of NA,x . We first introduce the notion of a basis. The basis
is analogous to that of a vector space; Each state is expressed as a linear combination of
elements of the basis.
Definition 4.2. A pair ({y1 , . . . , ym }, {B1 , . . . , Bn }) is a basis of A if all of the following
conditions are satisfied:
• A ≈ (νy1 ) · · · (νym ) (i1 B1 | · · · | in Bn ) for some i1 , . . . , in ∈ Nat.
l
• If Bj −→ C, then there exist i1 , . . . , in ∈ Nat such that C ≈ i1 B1 | · · · | in Bn .
l
• For each Bj , there are only finitely many C (up to ≈) such that Bj −→ C.
Note that if ({e
y }, {B1 , . . . , Bn }) is a basis of A, then whenever A =⇒ A′ , there exist
i1 , . . . , in such that A′ ≈ (ν ye) (i1 B1 | · · · | in Bn ). Let us write Index(C) for (i1 , . . . , in ) such
that C ≈ i1 B1 | · · · in Bn . (If there are more than one such tuple, Index(C) picks one among
them.) Therefore, if A↓{x} has a basis, the behavior of A↓{x} is simulated by the (labeled)
Petri net NA,x,({ey},{B})
given below. Here, we use a process-like syntax to represent the
e
elements of a Petri net rather than the standard tuple notation (P, T, F, W, M0 ). A marking
state m which has ik tokens for each place pk (k ∈ {1, . . . , n}) is written i1 p1 | · · · | in pn . A
γ
transition that consumes a marking m1 and produces m2 is expressed by m1 −→ m2 , where
γ is the label of the transition.
• The set P of places is {pB1 , . . . , pBn }.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
19
• The initial marking mI is i1 pB1 | · · · | in pBn
where A↓{x} ≈ (ν ye) (i1 B1 | · · · | in Bn ).
• The set of transitions consists of:
τ
– pBj −→ i1 pB1 | · · · | in pBn
τ
where Index(C) = (i1 , . . . , in ), for each Bj −→ C.
ξ
– pBj −→ i1 pB1 | · · · | in pBn
xξ
where Index(C) = (i1 , . . . , in ), for each Bj −→ C.
τ
– pBj | pBj′ −→ (i1 + i′1 )pB1 | · · · | (in + i′n )pBn where Index(C) = (i1 , . . . , in ) and
z
z
Index(C ′ ) = (i′1 , . . . , i′n ), for each pair of transitions Bj −→ C and Bj ′ −→ C ′
such that z ∈ {e
y }.
From now on we omit the basis and just write NA,x for NA,x,({ey},{B})
e . Let us write
ptraces(NA,x ) for the set:
ξ1
ξ
k
{ξ1 · · · ξk | mI =⇒ · · · =⇒
m′ }
ξ
τ ∗ ξ
τ ∗
where =⇒ means −→ −→−→ . By the construction of NA,x , ptraces(NA,x ) = tracesx (A).
The construction of NA,x outlined above can be applied only when a basis of A↓x
can be found (by some heuristic algorithm). If A↓x has no basis or cannot be found,
we approximate A↓x by moving all the ν-prefixes to the top-level; for example, y. (νx) A,
∗(νx) A and µα.(νx) A are replaced by (νx) (y. A), (νx) ∗A, and (νx) µα.A respectively. Let
A′ be the approximation of A↓{x} . It is easy to prove that A′ is a sound approximation of
A↓{x} , in the sense that tracesx (A) ⊆ tracesx (A′ ).
We can compute a basis of A′ as follows (see Appendix D for more details). Since
ν-prefixes do not appear inside recursion, we can first eliminate the constructors ·↑S , ·↓S ,
and he
y /e
xi. Let (ν ye) A′′ be the resulting expression, where A′′ does not contain ·↑S , he
y /e
xi, or
(νx) . Let B be the set of behavioral types that are subexpressions of the behavioral types
obtained from A′′ by expanding recursive types and do not contain “unnecessary” unfolding
[µα.A/α]A. Then, B is a finite set, and ({e
y }, B) is a basis of A′ . We can therefore construct
a Petri net NA′ ,x . By the construction, ptraces(NA′ ,x ) = tracesx (A′ ) ⊇ tracesx (A), so
that ptraces(NA′ ,x ) ⊆ Φ is a sufficient condition for tracesx (A) ⊆ Φ.
4.3.2. Steps 3-2 and 3-3: Construction of NA,x k MΦ and reduction of tracesx (A) to a
reachability problem. Let PNA,x and TNA,x be the sets of places and transitions of NA,x
respectively. Let MΦ be a minimized deterministic automaton4 that accepts Φ, and let QΦ
be its set of states and δΦ be its transition function.
Definition 4.3. The composition of NA,x and MΦ , written NA,x k MΦ , is defined as follows:
• The set of places is PNA,x ∪ QΦ
• The set of transitions is:
ξ
ξ
{(m|q) −→ (m′ |q ′ ) | (m→m′ ) ∈ TNA,x ∧ δΦ (q, ξ) = q ′ }
τ
τ
∪{m −→ m′ | (m→m′ ) ∈ TNA,x }
• Initial state is mI | qI where mI is the initial state of NA,x and qI is the initial state
of MΦ .
4Note that since Φ is prefix-closed, all the states of the minimized automaton are accepting states.
20
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
Now, ptraces(NA,x ) ⊆ Φ can be reduced to the reachability problems of NA,x k MΦ .
Theorem 4.4. ptraces(NA,x ) ⊆ Φ if and only if no marking m | q that satisfies the following conditions is reachable:
ξ
• m −→ m′ for some m′ and ξ in NA,x .
• δΦ (q, ξ) is undefined.
Thus, we can reduce ptraces(NA,x ) ⊆ Φ to a finite set of reachability problems of
NA,x k MΦ . Hence ptraces(NA,x ) ⊆ Φ is decidable [18].
Corollary 4.5. ptraces(NA,x ) ⊆ Φ if and only if for every transition rule of the form
ξ
m1 −→ m2 of NA,x and q such that δΦ (q, ξ) is undefined, no marking m such that m ≥ m1 | q
is reachable by NA,x k MΦ .
Remark 4.6. We can actually extend the above algorithm for checking tracesx (A) ⊆ Φ to
deal with the case where Φ belongs to the class of deterministic Petri net languages (more
precisely, the class of P-type languages of λ-free, deterministic Petri nets [22, 21]). If Φ is
the P-type language of a λ-free, deterministic Petri net, then its complement Φ is a Petri net
language [21]. Therefore, we can construct a Petri net that accepts the intersection of the
language of NA,x and Φ [22]), so that ptraces(NA,x ) ⊆ Φ can be reduced to the emptiness
problem of the Petri net, which is decidable due to the decidability of the reachability
problem.
Some of the useful resource usage specifications are not regular languages but are deterministic Petri net language. For example, consider a stack-like resource on which, at any
point of program execution, the number of times the operation pop has been performed is
less than the number of times push has been performed. Such specification is expressible
as a deterministic Petri net language.
5. Extensions
The type system given so far guarantees that no invalid resource access is performed,
but not that any necessary access is performed eventually; for example, the type system
does not guarantee that a file is eventually closed. We discuss extensions of the type system
to guarantee such properties.
We are interested in type systems that satisfy either partial liveness 5 or the stronger
liveness property:
• partial liveness: If P −→∗ Q and Q 6−→, then Q does not contain any resource to
which some access must be performed.
• liveness: In any fair reduction sequence P −→ P1 −→ P2 −→ · · ·, P eventually
performs all the necessary resource access. (Here, a reduction sequence is fair if an
input or output action that is infinitely enabled will eventually succeed. Without
the fairness assumption, no process can satisfy the liveness property in the presence
of a divergent process (νx) (xh i | ∗x( ). xh i, which is too restrictive.)
5This is not a standard term; actually, the partial liveness here can be viewed as the safety property that
no ‘bad’ state is reachable such that the necessary accesses have not yet been performed but the system
cannot make any move.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
21
Our idea is to take the resource type system from the previous sections, and combine it
with some existing system that annotates those communications that eventually succeed.
Specifically, this existing system might be (1) deadlock-freedom [16, 15], which guarantees
that the annotated communications eventually succeed unless the process diverges; the
combination would then guarantee partial liveness. Or the existing system could be (2) lockfreedom [14, 15], which guarantees that the annotated communications eventually succeed
even in the presence of divergence (assuming a strongly fair scheduler); the combination
would then guarantee full liveness.
To formally state which resource access must be performed, we extend the trace sets.
Definition 5.1. An extended trace set is a set of sequences of access labels, possibly ending
with a special label ↓, that is closed under the prefix operation.
Intuitively, the special label ↓ means that no further resource access need to be performed. For example, the trace set ({C ↓, RC ↓})# means that the close operation needs
to be performed, while ({↓, R ↓, C ↓, RC ↓})# means that the close operation need not be
performed.
e for a
Now we can state the partial liveness property more formally. We write (e
ν N)
(possibly empty) sequence of ν- and N-binders.
Φ x)Q 6−→.
e
Definition 5.2. A process P is partially live if ↓ ∈ Φ whenever P −→∗ (e
ν N)(N
5.1. A Type System for the Partial Liveness Property. We extend the syntax of
processes to allow each input and output prefix to be annotated with information about
whether the communication is guaranteed to succeed.
Definition 5.3 ((extended) processes). The set of (extended) processes is given by:
t (attributes)
P
::= c | ∅
::= xt hy1 , . . . , yn i. P | xt (y1 , . . . , yn ). P | · · ·
The attribute c indicates that when the annotated input or output operation appears
at the top-level, the operation will succeed unless the whole process diverges, while ∅ does
not give such a guarantee. We often omit tag ∅.
We assume that there exists a type system guaranteeing that any well-typed process
is well-annotated in the sense of Definition 5.4 below. There are indeed such type systems [13, 16, 15]. Moreover, the static analysis tool TyPiCal [12] can automatically infer
the annotations.
Definition 5.4. P is active, written active(P ), if
e c (e
e c he
v i. Q | R) or P (e
ν N)(x
y ). Q | R). Additionally, P is well-annotated, writP (e
ν N)(x
′
ten well annotated (P ), if for any P such that P −→∗ P ′ and active(P ′ ), there exists P ′′
such that P ′ −→ P ′′ .
For example, xc h i. 0 | xc ( ). y ∅ h i. 0 is well-annotated, but
xc h i. 0 | xc ( ). y c h i. 0 is not. Note that x∅ ( ). xc h i. 0 is well-annotated since, although the
output never succeeds, it does not appear at the top-level.
Now we introduce the type system that guarantees the partial liveness. We extend the
behavioral types by extending each input, output, or τ -action with an attribute to indicate
whether the action is guaranteed to succeed.
A ::= xt . A | xt . A | τt .A | · · ·
22
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
disabled(0, S)
disabled(xξ .A, S)
if disabled(A, S) and x 6∈ S
disabled(ac .A, S)
disabled(a∅ .A, S)
if disabled(A, S)
disabled(τc .A, S)
disabled(τ∅ .A, S)
if disabled(A, S)
disabled(A1 | A2 , S) if disabled(A1 , S) and disabled(A2 , S)
disabled(A1 ⊕ A2 , S) if disabled(A1 , S) or disabled(A2 , S)
disabled(∗A, S)
if disabled(A, S)
disabled((νx) A, S) if disabled(A, S\{x})
disabled(A↑S ′ , S) if disabled(A, S\S ′ )
disabled(A↓S ′ , S) if disabled(A, S ∩ S ′ )
disabled(he
y /e
xiA, S) if disabled(A, {z | [e
y /e
x]z ∈ S})
disabled(µα.A, S)
if disabled([µα.A/α]A, S)
Figure 7: The definition of disabled(A, S)
For example, a process having type xc . x∅ . 0 implies that the process may send values on x
twice, and that the first send is guaranteed to succeed (i.e., the sent value will be received
by some process), while there is no such guarantee for the second send.
The transition semantics of behavioral types is unchanged; The attribute t is just
ignored.
We revise the definitions of the subtype relation and the traces by using the following
predicate disabled(A, S). Intuitively, this means that A describes a process that may get
blocked without accessing any resources in S.
Definition 5.5. disabled(A, S) is the least binary relation between extended behavioral
types and sets of variables closed under the rules in Figure 7.
Definition 5.6. The set etracesx (A) of extended traces is:
xξ1
xξn
{ξ1 · · · ξn ↓ |∃B.A↓{x} =⇒ · · · =⇒ B ∧ disabled(B, {x})}
xξ1
xξn
∪{ξ1 · · · ξn |∃B.A↓{x} =⇒ · · · =⇒ B}
xξ1
xξn
Here, A↓{x} =⇒ · · · =⇒ B ∧ disabled(B, {x}) means that ξn may be the last access to x,
so that ↓ is attached to the sequence ξ1 · · · ξn . By definition, etracesx (A) is prefix-closed.
Definition 5.7. A1 ≤ A2 is the largest relation on closed behavioral types that satisfies
the following properties:
l
l
• If A1 −→ A′1 then there exists A′2 such that A2 =⇒ A′2 and A′1 ≤ A′2 .
• disabled(A1 , S) implies disabled(A2 , S) for any set S of variables.
Note that by the definition, A1 ≤ A2 implies etracesx (A1 ) ⊆ etracesx (A2 ).
The typing rules are the same as those in Section 3, except for the rules shown in
Figure 8. The only changes are that attributes have been attached to (ET-Out) and
(ET-In), and that tracesx (A↓{x} ) has been replaced by etracesx (A↓{x} ) in (ET-NewR).
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
23
Γ ⊲pl x : chanh(e
y :σ
e)A1 i
Γ ⊲pl ve : σ
e
Γ ⊲pl xt he
v i. P : xt . (he
v /e
y iA1 | A2 )
Γ ⊲pl P : A2
(ET-Out)
Γ, ye : σ
e ⊲pl P : A2
Γ ⊲ x : chanh(e
y:σ
e)A1 i
A2 ↓{ey} ≤ A1
(ET-In)
Γ ⊲pl xt (e
y ). P : xt . (A2 ↑{ey} )
Γ, x : res ⊲pl P : A
etracesx (A) ⊆ Φ
Φ
Γ ⊲pl (N x)P : A↑{x}
(ET-NewR)
Figure 8: Typing Rules for Partial Liveness
An important invariant maintained by the typing rules is that the type of an input/output
process is annotated with c only if the process itself is annotated with c. For example, we
cannot derive x : chanhi ⊲pl x∅ h i : xc .
The following theorem states the soundness of the extended type system.
Theorem 5.8. If well annotated (P ) and ∅ ⊲pl P : A, then P is partially live.
Proof. We make use of three lemmas. The first two show that typing and well-annotatedness
are preserved by reduction. The third means that the type of a process properly captures
the possibility of the process being blocked.
L
• Subject reduction. If Γ ⊲pl P : A and P −→ Q, then there exists some B such
L
that Γ ⊲pl Q : B and A =⇒ B. Proof: See Appendix B.
• Well-annotatedness. If well annotated (P ) and P −→∗ Q,
then well annotated (Q). Proof: trivial by definition of
well annotated (P ).
• Disabled. If well annotated (P ) and Γ ⊲pl P : A with bool 6∈ codom(Γ), then P −→
6
implies disabled(A, S) for any S. Proof: See Appendix C.
Φ x)Q −→
e
Now we are ready to prove the theorem. Suppose that P −→∗ (e
ν N)(N
6
and
well annotated (P ), ∅ ⊲pl P : A. We have to show ↓ ∈ Φ. By subject-reduction we obΦ x)Q : A′ for some A′ . By the inversion of the typing rules, we get
e
tain ∅ ⊲pl (e
ν N)(N
ye : rg
es, ze : σ
e, x : res ⊲pl Q : B and tracesx (B) ⊆ Φ for some sequence σ
e of channel types.
(Here, ye and ze are the variables bound by N.) By well-annotatedness we also have
Φ x)Q), which implies well annotated (Q). Thus, by Disabled, we get
e
ν N)(N
well annotated ((e
disabled(B, S) for any S, which implies disabled(B↓{x} , {x}). So, we have ↓ ∈ etracesx (B) ⊆
Φ as required.
Example 5.9. An annotated version of Example 3.11:
P = (νs) (∗sc (n, x, r). P1 | (NΦ x)P2 )
P1 = if n = 0 then r c hi
else (νr ′ ) (sc hn − 1, x, r ′ i. | r ′ c (). read(x).r c hi)
P2 = (νr) (init(x).sc h100, x, ri | rc (). close(x))
Φ = (IR∗ C ↓)#
24
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
is well-annotated. Suppose
A1 = µα.(r c ⊕ (νr ′ ) (hr ′ /riα|r ′ c . xR .r c )
Γ = s:chanh(b:int, x:res, r:chanhi) A1 i.
Then
Γ ⊲ P1 : A1
Γ ⊲ ∗sc (n, x, r). P1 : ∗sc . (A1 ↑{n,x,r} ) ≈ ∗sc
Γ ⊲ P2 : (νr) (xI .A1 |rc . xC ).
So long as etracesx ((νr) (xI .A1 | rc . xC .)) ⊆ Φ, we obtain ∅ ⊲ P : 0. 2
5.2. Type Inference. The type inference algorithm for the extended type system is almost
the same as the algorithm for the basic type system discussed in Section 4. The only changes
are:
• In the constraint generaltion algorithm PT, attribute annotations for input and
ouptut processes are propagated to types. For example, the case for output processes
becomes:
v i. P0 ) =
PT(xt he
let (Γi , σi ) = PTv(vi )
(Γ0 , A0 , C0 ) = PT(P0 )
(Γ, C) = Γ0 ⊗ (x : chanh(e
y :σ
e)αi) ⊗ Γ1 ⊗ · · · ⊗ Γn
v /e
y ]α | A0 ), C) (where α fresh)
in (Γ, xt . ([e
• The constraint tracesx (A) ⊆ Φ is replaced by etracesx (A) ⊆ Φ.
The second change forces us to adjust the reduction of the constraint to the reachability problem of Petri nets (recall step 3 of the algorithm in Section 4). First, we
need to use eptraces(NA,x ) defined below, which corresponds to etracesx (A), instead
of ptraces(NA,x ) in the reduction.
Definition 5.10. eptraces(NA,x ) is the set
ξ1
ξ
ξ1
ξ
k
k
{ξ1 · · · ξk | mI =⇒ · · · =⇒
m′ } ∪ {ξ1 · · · ξk ↓| mI =⇒ · · · =⇒
m′ ∧ pdisabled(m′ , {x})}
where mI is the initial marking of NA,x . pdisabled(m, S) means that disabled(A, S) holds
for the behavioral type A expressed by m.
Second, the construction of an automaton needs to be adjusted so that it accepts
extended traces. For example, the automaton used in the explanation of Step 3-2 in Section 4
is replaced by the one that accepts IR∗ C ↓.
With these changes, the validity of a constraint etracesx (A) ⊆ Φ is reduced to the
reachability problem of a Petri net NA,x k MΦ where composition of a Petri net NA,x and
an automaton MΦ is defined in the same manner as Definition 4.3.
Theorem 5.11. eptraces(NA,x ) ⊆ Φ if and only if no marking m | q that satisfies the
following conditions is reachable:
• pdisabled(m, {x}).
• δΦ (q, ↓) is undefined.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
25
6. Implementation
We have implemented a prototype resource usage analyzer based on the extended type
system described in Section 5. We have tested all the examples given in the present paper.
The implementation can be tested at http://www.yl.is.s.u-tokyo.ac.jp/~kohei/usage-pi/.
The analyzer takes a pi-calculus program as an input, and uses TyPiCal[12] to annotate
each input or output action with an attribute on whether the action is guaranteed to succeed
automatically (recall the syntax of extended processes in Section 5). The annotated program
is then analyzed based on the algorithm described in Section 4.
The followings are some design decisions we made in the current implementation. We
restrict the resource usage specification (Φ) to the regular languages, although in future we
may extend it based on Remark 4.6. In Step 3-1 of the algorithm for checking etracesx (A) ⊆
Φ, we blindly approximate A by pushing all of its ν-prefixes to the top-level. In future we
might utilize an existing model checker to handle the case where A is already finite. In Step
3-4 for solving the reachability problems of Petri nets, we approximate the number of tokens
in each place by an element of the finite set {0, 1, 2, “3 or more”}. That approximation
reduces Petri nets to finite state machines, so we can use BDD to compute an approximation
of the reachable states.
Figure 9 shows a part of a successful run of the analyzer. The first process (on the second
line) of the input program runs a server, which returns a new, initialized resource. We write
! and ? for output and input actions. The resource access specification is here expressed
by the number 1 of newR 1, x, which refers to the built-in specification (I(R + W )∗ C ↓)# .
The second process runs infinitely many client processes, each of which sends a request for
a new resource, and after receiving it, reads and closes it. The third process (on the 6th
line) is a tail-recursive version of the replicated service in Example 2.9. Here, a boolean is
passed as the first argument of s instead of an integer, as the current system is not adapted
to handle integers; it does not affect the analysis, since the system ignores the value and
simply inspects both branches of the conditional. Note that the program creates infinitely
many resources and has infinitely many states. The first output is the annotated version
of the input program produced by TyPiCal, where !! and ?? are an output and an input
with the attribute c (recall Section 5).
The remaining part shows the trace inclusion constraint and the constructed Petri net.
The final line reports that the verification has succeeded, which implies that both the safety
property (in Section 3) and the partial liveness property (in Section 5) are satisfied.
7. Related Work
Resource usage analysis and similar analyses have recently been studied extensively,
and a variety of methods from type systems to model checking have been proposed [5, 6,
7, 11, 1, 17, 24]. However, only a few of them deal with concurrent languages. To our
knowledge, none of them deal with the partial liveness property (or the total liveness property) that we discussed in Section 5. Nguyen and Rathke [20] propose an effect-type system
for a kind of resource usage analysis for functional languages extended with threads and
monitors. In their language, neither resources nor monitors can be created dynamically. On
the other hand, our target language is π-calculus, so that our type system can be applied
to programs that may create infinitely many resources (due to the existence of primitives
for dynamic creation of resources: recall the example in Figure 9), and also to programs
26
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
Input:
new create,s in
*(create?(r).newR 1,x in acc(x,init).r!(x))
| *(new r in create!(r)
| r?(y).new c in s!(false,y,c) | s!(false,y,c)
| c?().c?().acc(y,close))
| *(s?(b,x,r).if b then r!()
else acc(x,read).s!(b,x,r))
Output:
(*** The result of lock-freedom analysis ***)
new create, s in
*create??(r). newR 1,x in acc(x, I). r!!(x)
| *(new r in create!!(r)
| r??(y).new c in s!!(false,y,c) | s!!(false,y,c)
| c??().c??().acc(y,close))
...
(*** Constraints ***)
etrace(x,acc(x, init).(c!! & acc(x, read). $16 | $16 |
c??. c??. acc(x, close). O)) is included in 1
...
(*** initial marking ***)
1 * 11 | 1 * 7
(*** 14 Places ***)
0: c!!. O
...
(*** 9 Transitions ***)
(x,close): 1*12 | 1*10 -> -1*12 | 1*13 | -1*10 | 1*1
...
No error found
Figure 9: A Sample Run of the Analyzer.
that use a wide range of communication and synchronization primitives. Capability-based
type systems can deal with concurrency to a certain degree ([5], Section 4.2), by associating
each resource with a unique capability to access the resource. The type system can control
the resource access order, by ensuring the uniqueness of the capability and keeping track
of what access is currently allowed by each capability. In this approach, however, resource
accesses are completely serialized and programmers have to care about appropriately passing capabilities between threads. Capability-based type systems [5, 6] also require rather
complex type annotations. Igarashi and Kobayashi’s type system for resource usage analysis for λ-calculus [11] can be extended to deal with threads, by introducing the following
typing rule:
Γ1 ⊲ M1 : τ1
Γ2 ⊲ M2 : τ2
Γ1 ⊗ Γ2 ⊲ spawn(M1 ); M2
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
27
Here, Γ1 ⊗ Γ2 describes resources that are used according to Γ1 and Γ2 that are used in
an interleaving manner. However, it is not obvious how to accurately capture information
about possible synchronizations between M1 and M2 .
Model checking technologies [2] can of course be applicable to concurrent languages, but
they suffer from the state explosion problem, especially for expressive concurrent languages
like π-calculus, where resources and communication channels can be dynamically created
and passed around. Appropriate abstraction must be devised for effectively performing
the resource usage analysis for the π-calculus with model checking. Actually, our typebased analysis can be considered a kind of abstract model checking. The behavioral types
extracted by (the first two steps of) the type inference algorithm are abstract concurrent
programs, each of which captures the access behavior on each resource. Then, conformance
of the abstract program with respect to the resource usage specification is checked as a model
checking problem. It would be interesting to study a relationship between the abstraction
through our behavioral type and the abstraction techniques for concurrent programs used
in the model checking community. From that perspective, an advantage of our approach is
that our type, which describes a resource-wise behavior, has much smaller state space than
the whole program. In particular, if infinitely many resources are dynamically created, the
whole program has infinite states, but it is often the case that our behavioral types are still
finite (indeed so for the example in Figure 9). The limitation of our current analysis is that
programs can be abstracted in only one way; on the other hand, the usual abstract model
checking techniques refine abstraction step by step until the verification succeeds.
Technically, closest to our type system are that of Igarashi and Kobayashi [10] and that
of Chaki, Rajamani, and Rehof [3]. Those type systems are developed for checking the
communication behavior of a process, but by viewing a set of channels as a resource, it is
possible to use those type systems directly for the resource usage analysis. We summarize
below similarities and differences between those type systems [10, 3] and the type system
in the present paper.
(1) Whether types are supplied by the programmer or inferred automatically: Types are
inferred automatically in Igarashi and Kobayashi’s generic type [10] and the type system of
the present paper, but the type of each channel must be annotated with in Chaki et al.’s
type system. The annotated type contains information about how the values (channels, in
particular) sent along the channel are used by senders and receivers, and that information
is used to make the type checking process compositional. For the purpose of the resource
usage analysis discussed here, we think that it is a burden for programmers to declare how
channels are going to be used, since their primary concern is how resources are accessed,
not channels. Ideal would be to allow the user to specify some types and infer the others,
like in ML. For that purpose, we need to develop an algorithm to check the conformance
A ≤ B of an inferred type A to a declared type B. That seems generally harder to decide
than the trace inclusion constraint tracesx (A) ⊆ Φ, but we expect to be able to develop a
sound algorithm by properly restricting the language of declared types.
(2) The languages used as behavioral types: All the three type systems use a fragment
of CCS as the language of types to check cross-channel dependency of communications. The
types in Igarashi and Kobayashi’s generic type system for the π-calculus [10], however, lacks
hiding, so that their type system cannot be applied to obtain precise information about
resource usage. In fact, their analysis would fail even for the program in Example 2.8.
Chaki et al.’s type system does use hiding, but lacks renaming as a constructor. Without
28
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
the renaming constructor, the most general type does not necessarily exist, which hinders
automatic type inference (recall Remark 3.12).
(3) Algorithms for checking the conformance of inferred types with respect to specifications: In Igarashi and Kobayashi’s generic type system, how to check conformance of
inferred types with respect to the user-supplied specifications was left open, and only suggested that it could be solved as a model checking problem. In Chaki et al.’s type system [3],
the conformance is expressed as A |= F (for checking the global behavior, where F is an
LTL-formula) and A ≤ A′ (for checking the conformance of declared types with respect to
inferred types). In their type checker PIPER [3], those conditions are verified using SPIN,
so that A is restricted to a finite-state process. Corresponding to the conformance check of
the above work is the check of trace inclusion constraints tracesx (A) ⊆ Φ. Our algorithm
based on the reduction to Petri nets works even when A has infinite states.
(4) The guaranteed properties: Both Igarashi and Kobayashi’s generic type [10] and the
extended type system of the present paper can guarantee a certain lock-freedom property,
that necessary communications or resource accesses are eventually performed (unless the
whole process diverges), while Chaki et al.’s type system and the type system in Section 3 of
the present paper do not. The guaranteed properties depend on the choice of the language
of behavioral types and the subtyping relation. In the latter type systems, the ordinary
simulation relation is used, so that a process’s type describes only an upper-bound of the
possible behavior of the process, not a lower-bound of the behavior like a certain resource
access is eventually performed. Rajamani et al. [8, 23] recently introduced a more elaborate
notion of simulation relation called “stuck-free conformance.” Even with the stuck-free
conformance relation, however, their type system [3] still cannot guarantee the lack of
deadlock-freedom of a process. On the other hand, by relying on an external analysis to
check deadlock-freedom, the extension in Section 5 keeps the typing rules and the subtyping
relation simple, while achieving the guarantee that necessary resource accesses are eventually
performed unless the whole process diverges.
Kobayashi’s type systems for deadlock-freedom and livelock-freedom [16, 14, 15] and its
implementation [12] form the basis of the extended type systems for partial and total liveness
properties discussed in Section 5, and are used for producing well-annotated programs.
Conversely, the behavioral types introduced in this paper can be used to refine the type
systems for deadlock-freedom and livelock-freedom. Yoshida and Honda have also studied
type systems that can guarantee certain lock-freedom properties [25, 9, 26]. So, their type
systems can also be used for checking whether programs are well-annotated in the sense of
Section 5.
In Section 5, we have utilized the existing analysis for deadlock-freedom to enhance the
result of the resource usage analysis. Other type systems for concurrent languages may also
be useful. For example, the type system for atomicity [4] can be used to infer the atomicity
of a sequence of actions in a source program. By using the atomicity information, we may
be able to reduce the state space of behavioral types and check the trace inclusion relation
etracesx (A) ⊆ Φ more efficiently.
8. Conclusion
We have formalized a type system for resource usage analysis and proved its soundness.
We have also developed a sound (but incomplete because of the last phase for deciding
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
29
the trace inclusion relation tracesx (A) ⊆ Φ) algorithm for it in order to liberate programmers from the burden of writing complex type annotations. We have also implemented a
prototype resource usage analyzer based on the algorithm.
There remains much future work. It is necessary to assess the effectiveness of our
analysis, including the design of the type system and the algorithm for deciding the trace
inclusion relation tracesx (A) ⊆ Φ, in more detail, and refine the analysis if necessary. It is
also necessary to make the analyzer more user-friendly, by devising a method for generating
comprehensive explanation of the verification result; currently, the analyzer gives only a
yes/no answer. Extensions of the type system to deal with other typical synchronization
primitives like join-patterns and internal choice is also left for future work.
References
[1] T. Ball, B. Cook, V. Levin, and S. K. Rajamani. Slam and static driver verifier: Technology transfer of
formal methods inside microsoft. In Integrated Formal Methods 2004, volume 2999 of Springer-Verlag,
pages 1–20, 2004.
[2] T. Ball and S. K. Rajamani. The SLAM project: Debugging system software via static analysis. In
Proceedings of ACM SIGPLAN/SIGACT Symposium on Principles of Programming Languages, pages
1–3, 2002.
[3] S. Chaki, S. Rajamani, and J. Rehof. Types as models: Model checking message-passing programs. In
Proceedings of ACM SIGPLAN/SIGACT Symposium on Principles of Programming Languages, pages
45–57, 2002.
[4] S. Q. Cormac Flanagan. A type and effect system for atomicity. In Proceedings of ACM SIGPLAN
Conference on Programming Language Design and Implementation, pages 338–349, 2003.
[5] R. DeLine and M. Fähndrich. Enforcing high-level protocols in low-level software. In Proceedings of ACM
SIGPLAN Conference on Programming Language Design and Implementation, pages 59–69, 2001.
[6] R. DeLine and M. Fähndrich. Adoption and focus: Practical linear types for imperative programming.
In Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation,
2002.
[7] J. S. Foster, T. Terauchi, and A. Aiken. Flow-sensitive type qualifiers. In Proceedings of ACM SIGPLAN
Conference on Programming Language Design and Implementation, pages 1–12, 2002.
[8] C. Fournet, T. Hoare, S. K. Rajamani, and J. Rehof. Stuck-free conformance. In CAV’04, volume 3114
of Lecture Notes in Computer Science, pages 242–254. Springer-Verlag, 2004.
[9] K. Honda and N. Yoshida. A uniform type structure for secure information flow. In Proceedings of ACM
SIGPLAN/SIGACT Symposium on Principles of Programming Languages, pages 81–92, 2002.
[10] A. Igarashi and N. Kobayashi. A generic type system for the pi-calculus. Theoretical Computer Science,
311(1-3):121–163, 2004.
[11] A. Igarashi and N. Kobayashi. Resource usage analysis. ACM Transactions on Programming Languages
and Systems, 27(2):264–313, 2005. Preliminary summary appeared in Proceedings of POPL 2002.
[12] N. Kobayashi. Typical: A type-based static analyzer for the pi-calculus. Tool available at
http://www.kb.ecei.tohoku.ac.jp/~koba/typical/.
[13] N. Kobayashi. A partially deadlock-free typed process calculus. ACM Transactions on Programming
Languages and Systems, 20(2):436–482, 1998.
[14] N. Kobayashi. A type system for lock-free processes. Information and Computation, 177:122–159, 2002.
[15] N. Kobayashi. Type-based information flow analysis for the pi-calculus. Acta Informatica, 42(4-5):291–
347, 2005.
[16] N. Kobayashi, S. Saito, and E. Sumii. An implicitly-typed deadlock-free process calculus. In Proceedings
of CONCUR2000, volume 1877 of Lecture Notes in Computer Science, pages 489–503. Springer-Verlag,
August 2000.
[17] K. Marriott, P. J. Stuckey, and M. Sulzmann. Resource usage verification. In Proceedings of the First
Asian Symposium on Programming Languages and Systems (APLAS 2003), volume 2895 of Lecture
Notes in Computer Science, pages 212–229, 2003.
30
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
[18] E. W. Mayr. An algorithm for the general petri net reachability problem. SIAM Journal on Computing,
13(3):441–461, 1984.
[19] R. Milner. Communication and Concurrency. Prentice Hall, 1989.
[20] N. Nguyen and J. Rathke. Typed static analysis for concurrent, policy-based, resource access control.
draft.
[21] E. Pelz. Closure properties of deterministic petri nets. In STACS 87: 4th Annual Symposium on Theoretical Aspects of Computer Science, volume 247 of Lecture Notes in Computer Science, pages 371–382.
Springer-Verlag, 1987.
[22] J. L. Peterson. Petri Net Theory and the Modeling of Systems. Prentice-Hall, 1981.
[23] S. K. Rajamani and J. Rehof. Models for contract conformance. In ISOLA2004, First International
Symposium on Leveraging Applications of Formal Methods, 2004.
[24] C. Skalka and S. Smith. History effects and verification. In Proceedings of the First Asian Symposium
on Programming Languages and Systems (APLAS 2004), volume 3302 of Lecture Notes in Computer
Science, pages 107–128, 2004.
[25] N. Yoshida. Graph types for monadic mobile processes. In FST/TCS’16, volume 1180 of Lecture Notes
in Computer Science, pages 371–387. Springer-Verlag, 1996.
[26] N. Yoshida. Type-based liveness guarantee in the presence of nontermination and nondeterminism.
Technical Report 2002-20, MSC Technical Report, University of Leicester, April 2002.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
31
Appendix
Appendix A. Properties of the Subtyping Relation
This section states and proves the properties of the subtyping relation, which are used
in the proof of type soundness (Theorems 3.14 and 5.8, in particular the proofs of the
lemmas in Appendices B and C), and in the type inference algorithm described in Section 4
(in particular, for transforming constraints on behavioral types).
Actually, there are two subtyping relations; the basic one in Definition 3.5 and the
extended one in Definition 5.7. Since the proofs are almost the same, we state and prove
the properties of the basic and extended ones simultaneously. In a few places, we have
an additional condition to check for the extended case. Such places will be marked by
“Extended case only.” When we are discussing the basic case, attributes attached to
actions should be ignored. We also omit them even for the extended case when they are
not important.
Lemma A.1 (Simulation relation).
(1) The subtyping relation is reflexive and transitive.
(2) (Simulation-up-to) Let R be a relation on behavioral types such that whenever A1 RA2
then
l
l
(i) A1 → A′1 implies A2 =⇒ A′2 and A′1 R ≤ A′2 for some A′2 and
(ii) disabled(A1 , S) implies disabled(A2 , S).
Then R ⊆ ≤ . Condition (ii) is required only for the extended case.
Proof. Part 1 is trivial by the definition. To show Part 2, suppose R is a simulation up to.
l
We show that R′ = (R ≤ ) ∪ R is a simulation, i.e., whenever A1 R′ A2 , (i) A1 −→ A′1 implies
l
A2 =⇒ A′2 and A′1 R′ A′2 for some A′2 and (Extended case only) (ii) disabled(A1 , S) implies
disabled(A2 , S). Suppose A1 R′ A2 . The case where A1 RA2 is trivial by the definition of the
simulation-up-to. To check the other case, suppose A1 RA3 ≤ A2 . To show (i), suppose
l
l
also that A1 −→ A′1 . Since R is a simulation up to, there exists A′3 such that A3 =⇒ A′3 and
l
l
A′1 R ≤ A′3 . By A3 =⇒ A′3 and A3 ≤ A2 , we have A′2 such that A2 =⇒ A′2 and A′3 ≤ A′2 .
Since ≤ is transitive, we have A′1 R ≤ A′2 , which implies A′1 R′ A′2 .
Extended case only: To show (ii), suppose disabled(A1 , S). Since R is a simulation up
to, we have disabled(A3 , S), which implies disabled(A2 , S).
Lemma A.2 (Structural congruence).
(1) A|0 ≈ A
(2) A|B ≈ B|A
(3) A|(B|C) ≈ (A|B)|C
(4) A⊕B ≈ B⊕A
(5) A⊕(B⊕C) ≈ (A⊕B)⊕C
(6) ∗A ≈ A|∗A
(7) (νx)(A|B) ≈ (νx)A | B if x ∈
/ FV(B)
(8) (νx)(A⊕B) ≈ (νx)A ⊕ B if x ∈
/ FV(B)
(9) [µα.A/α]A ≈ µα.A
Proof. These proofs are all standard.
32
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
We next show that ≤ is a precongruence. We first show it for some basic type constructors.
Lemma A.3 (Precongruence, simple cases). If A ≤ A′ then
(1) A|B ≤ A′ |B ′ if B ≤ B ′
(2) hx/yiA ≤ hx/yiA′
(3) (νx)A ≤ (νx)A′
(4) A↑S ≤ A′ ↑S
(5) A↓S ≤ A′ ↓S
Proof. These follow from the fact that the following relations are all simulations-up-to.
R1 = {(A | B, A′ | B ′ ) | A ≤ A′ , B ≤ B ′ }
R2 = {(he
y /e
xiA, he
y /e
xiA′ ) | A ≤ A′ }
R3 = {((νx) A, (νx) A′ ) | A ≤ A′ }
R4 = {(A↑S , A′ ↑S ) | A ≤ A′ }
R5 = {(A↓S , A′ ↓S ) | A ≤ A′ }
We now show that ≤ is closed under arbitrary type constructors. FTV(B) below is
the set of free (i.e., not bound by µ) behavioral type variables.
Lemma A.4 (Precongruence, general cases). If A ≤ A′ and FTV(B) ⊆ {α}, then
[A/α]B ≤ [A′ /α]B.
l
l
Proof. Let R= {([A/α]B, [A′ /α]B)}. We will prove (i) if [A/α]B −→ B1 then [A′ /α]B =⇒
l
B1′ with B1 R ≤ B1′ , by induction on the derivation of [A′ /α]B −→ B1′ . We will also prove
(ii) disabled([A/α]B, S) implies disabled([A′ /α]B, S), by induction on the structure of B in
the extended case. In other words, R is a simulation-up-to. Hence (Lemma A.1.2) it is in
≤.
We start with (i), with case analysis on the last rule used. If B = α, then the required
condition follows immediately from A ≤ A′ . So we consider the case B 6= α below.
(1) Case (TR-Act). In this case, B = l.Bx , so
l
[A/α]B = l.[A/α]Bx −→ [A/α]Bx = B1 .
We also have
l
[A′ /α]B = l.[A/α]Bx −→ [A′ /α]Bx = B1′ .
By construction of R, we have B1 R B1′ ≤ B1′ as required.
(2) Case (Tr-Par1). We show only the left case. B = Bx |By and we assumed
l
[A/α]Bx −→ Bx1 to make
l
[A/α]B = [A/α]Bx |[A/α]By −→ Bx1 |[A/α]By = B1 .
l
′ with B
′
By the induction hypothesis, [A′ /α]Bx =⇒ Bx1
x1 R ≤ Bx1 . (Note that α is
′
not free in Bx1 or Bx1 . ) That gives
l
′
[A′ /α]B = [A′ /α]Bx |[A′ /α]By =⇒ Bx1
|[A′ /α]By = B1′ .
′ , there exists C such
It remains to prove B1 R ≤ B1′ . By the condition Bx1 R ≤ Bx1
that
′
Bx1 = [A/α]C
[A′ /α]C ≤ Bx1
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
33
So, we get:
B1 = [A/α](C | By ) R [A′ /α](C | By )
′ | [A′ /α]B = B ′ .
= [A′ /α]C | [A′ /α]By ≤ Bx1
y
1
Here, we have used Lemma A.3, Part 1.
(3) Case (Tr-Par2). We show only the left case.
B = Bx |By and we assumed
y
x
[A/α]Bx −→ Bx1 and [A/α]By −→ By1 to make
{x,y}
[A/α]B = [A/α]Bx |[A/α]By −→ Bx1 |By1 = B1 .
x
x
′ and [A′ /α]B =⇒ B ′ with B
By the induction hypothesis, [A′ /α]Bx =⇒ Bx1
x1 R ≤
y
y1
′
′
Bx1 and By1 R ≤ By1 . That gives
{x,y}
′
′
[A′ /α]B = [A′ /α]Bx | [A′ /α]By =⇒ Bx1
| By1
= B1′ .
′
′ and B
It remains to prove B1 R ≤ B1′ . From Bx1 R ≤ Bx1
y1 R ≤ By1 , there exist
Cx and Cy such that
′
[A′ /α]Cx ≤ Bx1
′
′
[A /α]Cy ≤ By1
Bx1 = [A/α]Cx
By1 = [A/α]Cy
Hence, B1 = [A/α](Cx | Cy ) R [A′ /α](Cx | Cy ) ≤ B1′ .
(4) Cases (Tr-Com) and (Tr-Or). These cases follow immediately from the induction
hypothesis.
l
l
(5) Case (Tr-Rep). Then B = ∗Bx and [A/α]B = ∗[A/α]Bx −→. [A/α]B −→ B1
must have been derived from
l
[A/α](Bx | ∗Bx ) = [A/α]Bx | ∗[A/α]Bx −→ B1 .
By the induction hypothesis, there exists B1′ such that
B1 R ≤ B1′
and
l
[A′ /α](Bx | ∗Bx ) =⇒ B1′ .
l
Using (Tr-Rep), we get [A′ /α]B =⇒ B1′ as required.
(6) Case (Tr-Rec). Then, we have B = µβ.Bx to make
l
[A/α]B = µβ.[A/α]Bx −→ B1
l
where we assumed [µβ.[A/α]Bx /β][A/α]Bx −→ B1 . But β does not clash with A
or α so these two substitutions swap around, giving
l
[A/α][µβ.Bx /β]Bx −→ B1 .
By the induction hypothesis,
l
[A′ /α][µβ.Bx /β]Bx =⇒ B1′
with B1 R ≤ B1′ . Hence
l
[A′ /α]B = µβ.[A′ /α]Bx =⇒ B1′
as required.
34
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
[e
y /e
x]l
(7) Case (Tr-Rename). Then, B = he
y /e
xiBx . [A/α]B −→ he
y /e
xiBx1 = B1 must have
l
been derived from [A/α]Bx −→ Bx1 . From the induction hypothesis, we get
l
′
[A′ /α]Bx −→ Bx1
′
Bx1 R ≤ Bx1
.
′
′ . It remains to prove B R ≤ B ′ . By B
y /e
xiBx1
Let B1′ = he
x1 R ≤ Bx1 , there exists
1
1
C such that
′
Bx1 = [A/α]C
[A′ /α]C ≤ Bx1
.
So, we have:
B1 = [A/α]he
y /e
xiC R [A′ /α]he
y /e
xiC
′ = B′ .
= he
y /e
xi[A′ /α]C ≤ he
y /e
xiBx1
1
Here, we used the fact that ≤ is preserved by he
y /e
xi (Lemma A.3, Part 2).
(8) Cases (Tr-Hiding), (Tr-Exclude), and (Tr-Project): Similar to (Tr-Rename).
We use the fact that ≤ is preserved by ν, ·↓S , and ·↑S (Lemma A.3).
Extended case only: In addition we need to show that disabled([A/α]B, S) implies
disabled([A′ /α]B, S). This follows by straightforward induction on the structure of B.
Lemma A.5 (Substitution).
(1) he
y /e
xi0 ≈ 0
(2) he
y /e
xi(a.A) ≈ ([e
y /e
x]a).he
y /e
xiA
(3) he
y /e
xi(z ξ .A) ≈ ([e
y /e
x]z)ξ .he
y /e
xiA
(4) he
y /e
xi(A|B) ≈ he
y /e
xiA | he
y /e
xiB
(5) he
y /e
xi(A⊕B) ≈ he
y /e
xiA ⊕ he
y /e
xiB
(6) he
y /e
xi(∗A) ≈ ∗(he
y /e
xiA)
(7) he
y /e
xihb/aiA ≈ h[e
y /e
x]b/aihe
y /e
xiA if target(a)∩{e
x, ye}=∅
(8) he
y /e
xi(νz)A ≈ (νz)(he
y /e
xiA) if {z}∩{x, y}=∅
(9) he
y /e
xi(A↑S ) ≈ (he
y /e
xiA)↑S , and
he
y /e
xi(A↓S ) ≈ he
y /e
xiA↓S ≈ A↓S ,
if S∩{x, y}=∅
(10) he
y /e
xi(A↑S ) ≈ A↑S , if {e
x} ⊆ S
Proof. Most parts are straightforward, although Part 4 is non-obvious in the case of labels
y /e
xi(A|B), he
y /e
xiA|he
y /e
xiB)} and prove
{x, y}. For Part 4, we construct a relation S = {(he
−1
S and S are simulations. The interesting case is when we infer
τ
he
y /e
xiA|he
y /e
xiB → he
y /e
xiA′ |he
y /e
xiB ′
from
z
1
A→
A′
z
2
B′
B→
[e
y /e
x]z1 = [e
y /e
x]z2 .
This gives
A|B
Hence
he
y /e
xi(A|B)
And hence as required
{z1 ,z2 }
→
A′ |B ′ .
{[e
y /e
x]z1 ,[e
y /e
x]z2 }
−→
τ
he
y /e
xi(A′ |B ′ ).
he
y /e
xi(A|B) → he
y /e
xi(A′ |B ′ ).
Part 9. Here we construct S = {( he
y /e
xi(A↑S ), (he
y /e
xiA)↑S )} where S does not clash
with {e
x, ye}, and we prove that S and S −1 are simulations. We focus on two cases.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
35
[e
y /e
x]l
(1) Suppose (he
y /e
xiA)↑S −→ (he
y /e
xiA′ )↑S is inferred from
l
A → A′
and
target ([e
y /e
x]l)∩S = ∅.
[e
y /e
x]l
We must infer that he
y /e
xi(A↑S ) −→ he
y /e
xi(A′ ↑S ). This requires target (l)∩S = ∅,
which we prove as follows. It is assumed that S does not clash, so {e
x, ye}∩S = ∅. We
also have target ([e
y /e
x]l)∩S = ∅, and so [e
y /e
x](target (l))∩S = ∅. Let T = target (l).
Suppose z ∈ T . Then either z ∈ x
e so z ∈
/ S, or z ∈ ye so z ∈
/ S, or z ∈
/ {e
x, ye} so
z ∈ [e
y /e
x]T so z ∈
/ S. In all cases z ∈
/ S, so T ∩S = ∅ as required.
l
τ
y /e
xiA′ )↑S is inferred from A → A′ and target ([e
y /e
x]l) ⊆ S.
(2) Suppose (he
y /e
xiA)↑S → (he
τ
We must infer he
y /e
xi(A↑S ) → he
y /e
xi(A′ ↑S ). This requires target(l) ⊆ S, which
we prove as follows. Once again let T = target (l). We have {e
x, ye}∩S = ∅ and
[e
y /e
x]T ⊆ S. Suppose z ∈ T . Then [e
y /e
x]z ∈ [e
y /e
x]T , and [e
y /e
x]z ∈ S. Either z ∈ x
e
so y ∈ S, which is a contradiction. Or z 6∈ x
e, so [e
y /e
x]z = z ∈ S. Hence T ⊆ S as
required.
Lemma A.6 (Exclusion and
(1) 0↑S ≈0
(2) (at .A)↑S ≈at .(A↑S )
(3) (at .A)↑S ≈τt .A↑S
(4) (z ξ .A)↑S ≈z ξ .(A↑S )
(5) (z ξ .A)↑S ≈τc .A↑S
(6) (A|B)↑S ≈A↑S | B↑S
(7) (A⊕B)↑S ≈A↑S ⊕B↑S
(8) (∗A)↑S ≈∗(A↑S )
(9) (A↑S )↑T ≈A↑S∪T
(10) A↑S ≈A
(11) A↑S ≤ 0
Projection).
0↓S ≈0
(at .A)↓S ≈τt .(A↓S )
(at .A)↓S ≈at .A↓S
(z ξ .A)↓S ≈τc .A↓S
(z ξ .A)↓S ≈z ξ .(A↓S )
(A|B)↓S ≈A↓S | B↓S
(A⊕B)↓S ≈A↓S ⊕B↓S
(∗A)↓S ≈∗(A↓S )
(A↓S )↓T ≈A↓S∩T
A↓S ≤ 0
A↓S ≈A
if
if
if
if
target(a)∩S=∅
target(a)⊆S
target(z ξ )∩S=∅
target(z ξ )⊆S
if FV(A)∩S=∅
if FV(A)⊆S
Proof. Straightforward.
Lemma A.7 (Simulation).
(1) If A1 ≤ A2 then tracesx (A1 ) ⊆ tracesx (A2 ) for any x.
(2)
(3)
(4)
(5)
(6)
(7)
{x,y}
x y
If A −→ A′ then A →→ A′ .
A ≤ A⊕B
A⊕A ≤ A
A ≤ A↑S | A↓S
If [B/α]A ≤ B then µα.A ≤ B
B1 ⊕B2 ≤ A if and only if B1 ≤ A and B2 ≤ A
Proof. These proofs are largely standard.
Part 1 follows immediately from the definitions of subtyping and traces.
Part 6. Suppose [B/α]A ≤ B. Let R be
{([µα.A/α]A′ , [B/α]A′ ) | FTV(A′ ) = {α}}.
By Lemma A.3.2, It suffices to prove that R is a simulation up to.
l
Suppose that [µα.A/α]A′ R [B/α]A′ and [µα.A/α]A′ −→ A′′ . We show that there
l
exists B ′ such that [B/α]A′ =⇒ B ′ and A′′ R ≤ B ′ by induction on the derivation of
36
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
l
[µα.A/α]A′ −→ A′′ , with case analysis on the last rule used. We show main cases; the other
cases are similar or straightforward.
l
• Case (TR-Act): [µα.A/α]A′ −→ A′′ is derived from
l
l. [µα.A/α]A1 −→ [µα.A/α]A1 where A′ = l. A1 and A′′ = [µα.A/α]A1 . Thus,
l
[B/α]A′ = l. [B/α]A1 −→ [B/α]A1 .
l
• Case (TR-Par1): [µα.A/α]A′ −→ A′′ is derived from
l
[µα.A/α]A1 −→ A′1 where A′ = A1 | A2 and A′′ = A′1 | [µα.A/α]A2 . By the induction
l
hypothesis, there exists B1′ such that [B/α]A1 =⇒ B1′ and A′1 R ≤ B1′ . Thus, we
l
have [B/α]A′ =⇒ B1′ | [B/α]A2 . It remains to show A′′ = A′1 | [µα.A/α]A2 R ≤
B1′ | [B/α]A2 . From A′1 R ≤ B1′ , we get
A′1 = [µα.A/α]C
[B/α]C ≤ B1′
for some C. So,
A′′ = A′1 | [µα.A/α]A2 = [µα.A/α](C | A2 )
R [B/α](C | A2 ) = [B/α]C | [B/α]A2 ≤ B1′ | [B/α]A2
{x,y}
x
• Case (TR-Par2): [µα.A/α]A′ −→ A′′ is derived from [µα.A/α]A1 −→ A′1 and
y
[µα.A/α]A2 −→ A′2 where A′ = A1 | A2 and A′′ = A′1 | A′2 . From the induction
x
hypothesis, there exist B1′ and B2′ such that [B/α]A1 =⇒ B1′ and A′1 R ≤ B1′ and
{x,y}
y
[B/α]A2 =⇒ B2′ and A′2 R ≤ B2′ . Thus, we have [B/α]A′ =⇒ B1′ | B2′ . From
A′1 R ≤ B1′ and A′2 R ≤ B2′ , we get A′1 | A′2 R ≤ B1′ | B2′ as required.
• Case (TR-Rec):
l
– Case A′ = µβ.A1 : [µα.A/α]A′ −→ A′′ is derived from
[µα.A/α][µβ.A1 /β]A1
l
= [µβ.[µα.A/α]A1 /β][µα.A/α]A1 −→ A′′ .
Here, we assumed without loss of generality that β is not free in A and B.
Thus, by the induction hypothesis, there exists B ′ such that
l
[µβ.[B/α]A1 /β][B/α]A1 = [B/α][µβ.A1 /β]A1 =⇒ B ′
l
and A′′ R ≤ B ′ . Using (Tr-Rec), we obtain [B/α]A′ = µβ.[B/α]A1 =⇒ B ′
as required.
– Case A′ = α: [µα.A/α]A′ is equal to µα.A. From µα.A ≤ B, there exists B ′
l
such that B =⇒ B ′ and A′′ ≤ B ′ as required.
Extended case only: We also need to prove that
disabled([µα.A/α]A′ , S)
implies
disabled([B/α]A′ , S)
for any
A′ .
This is proved by induction on the derivation of disabled([µα.A/α]A′ , S). We show the only
non-trivial case, where disabled([µα.A/α]A′ , S) has been derived by using the last rule in
Figure 7. The other cases follow immediately from the induction hypothesis.
There are two cases to consider.
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
37
• Case where A′ = α: Then, [µα.A/α]A′ = µα.A and disabled(µα.A, S) must have
been deduced from
disabled([µα.A/α]A, S). By the induction hypothesis, we have disabled([B/α]A, S).
By the assumption [B/α]A ≤ B, we have disabled(B, S) as required (note that
[B/α]A′ = B in this case).
• Case where A′ = µβ.C. Let C ′ be [µα.A/α]C. Then, [µα.A/α]A′ = µβ.C ′ , and
disabled(µβ.C ′ , S) must have been derived from disabled([µβ.C ′ /β]C ′ , S). Here, we
note
[µβ.C ′ /β]C ′ = [µα.A/α][µβ.C/β]C.
So, from the induction hypothesis, we get
disabled([B/α][µβ.C/β]C, S), i.e.,
disabled([µβ.[B/α]C/β][B/α]C, S).
By using the last rule of Figure 7, we get disabled([B/α]A′ , S) as required.
Appendix B. Proof of the Subject Reduction Property
In this section, we prove the subject reduction property used in the proofs of Theorems 3.14 and 5.8. As in Appendix A, we prove it for the basic and extended cases
simultaneously.
Lemma B.1 (Weakening).
(1) If Γ ⊲ v : σ and x 6∈ dom(Γ), then Γ, x : σ ′ ⊲ v : τ .
(2) If Γ ⊲ P : A and x ∈
/ FV(P ) and x not in dom(Γ) or FV(A) then Γ, x : σ ⊲ P : A.
Proof. Part 1 is straightforward. Part 2 is proved by straightforward induction on the
derivation of Γ ⊲ P : A.
Lemma B.2 (Judgement substitution).
(1) (For values) If Γ, x
e:σ
e ⊲ y : σ and Γ ⊲ ve : σ
e then Γ ⊲ [e
v /e
x]y : σ.
(2) (For processes) If Γ, x
e:σ
e ⊲ P : A and Γ ⊲ ve : σ
e then Γ ⊲ [e
v /e
x]P : he
v /e
xiA.
Proof. Part 1. Either y = xi for some i, in which case [e
v /e
x]y = vi and σ = σi , so that the
result follows from Γ ⊲ ve : σ
e. Or y ∈
/x
e, in which case [e
v /e
x]y = y and y : σ is in Γ. We remark
that types σ never have free names.
Part 2. By induction on the derivation of Γ⊲P : A. Most cases follow straightforwardly
on Lemma A.5. We consider four particular cases.
(1) Case (T-Sub), where Γ, x
e : τe ⊲ P : A is inferred from
Γ, x
e : τe ⊲ P : A′
A′ ≤ A
From the induction hypothesis, Γ ⊲ [e
v /e
x]P : he
v /e
xiA′ . By Lemma A.3.2 and assump′
′
tion A ≤ A we get he
v /e
xiA ≤ he
v /e
xiA, and hence as required Γ ⊲ [e
v /e
x]P : he
v /e
xiA.
(2) Case (T-NewR), where Γ, x
e : τe ⊲ (NΦ z)P : A↑{z} is inferred from
Γ, x
e : τe, z : res ⊲ P : A
tracesz (A) ⊆ Φ
Assume by alpha-renaming that z does not clash with x
e or ve. From Lemma A.5.9
we get A↓{z} ≈ (he
v /e
xiA)↓{z} , giving tracesz (A) = tracesz (he
v /e
xiA) and hence
tracesz (he
v /e
xiA) ⊆ Φ. From Γ ⊲ e
v : τe and Lemma B.1, we get Γ, z : res ⊲ ve : τe. So, by
the induction hypothesis, Γ, z : res ⊲ [e
v /e
x]P : he
v /e
xiA. These two together give
Γ ⊲ (NΦ z)[e
v /e
x]P : (he
v /e
xiA)↑{z} .
38
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
For the process (NΦ z)[e
v /e
x]P , we can push the substitution out by definition of the
substitution operator and because z 6∈ {e
x, ve}. For the behavior (he
v /e
xiA)↑{z} we use
Lemma A.5.9 to push it out. Hence as required,
Γ ⊲ [e
v /e
x](NΦ z)P : he
v /e
xi(A↑{z} ).
Extended case only: Just replace traces with etraces in the above reasoning.
e y iA1 |A2 ) is inferred from
(3) Case (T-Out), where Γ, x
e : τe ⊲ zhwi. P : z. (hw/e
Γ, x
e : τe ⊲ P : A2
Γ, x
e : τe ⊲ w
e:σ
e
Γ, x
e : τe ⊲ z : chanh(e
y:σ
e)A1 i
Part 1 implies Γ ⊲ [e
v /e
x]w
e:σ
e and Γ ⊲ [e
v /e
x]z : chanh(e
y:σ
e)A1 i. From the induction
hypothesis, we get Γ ⊲ [e
v /e
x]P : he
v /e
xiA2 . These three give
Γ ⊲ [e
v /e
x]zh[e
v /e
x]wi.
e [e
v /e
x]P : [e
v /e
x]z. (h[e
v /e
x]w/e
e y iA1 |he
v /e
xiA2 )
For the process we push the substitution out by definition of the substitution operator. For the behavior we push it out using several parts of Lemma A.5.
(4) Case (T-In), where Γ, x
e : τe ⊲ z(e
y ). P : z. (A2 ↑{ey} ) is inferred from
Γ, ye : σ
e, x
e : τe ⊲ P : A2
Γ, x
e : τe ⊲ z : chanh(e
y:σ
e)A1 i
A2 ↓{ey } ≤ A1
We use three deductions. First from Part 1 we get Γ ⊲ [e
v /e
x]z : chanh(e
y:σ
e)A1 i.
Second, from assumption A2 ↓{ey} ≤ A1 and Lemma A.3.2 we get he
v /e
xi(A2 ↓{ey} ) ≤
he
v /e
xiA1 . The substitution on the right disappears because FV(A1 ) ⊆ {e
y } and we
can assume by alpha-renaming that ye does not clash with {e
x, ve}. The substitution on
the left can be pushed inside by Lemma A.5.9. These together give (he
v /e
xiA2 )↓{ey} ≤
A1 . And third, from the induction hypothesis we get Γ, ye : σ
e ⊲[e
v /e
x]P : he
v /e
xiA2 . These
three give
Γ ⊲ [e
v /e
x]z(e
y ). [e
v /e
x]P : [e
v /e
x]z. ((he
v /e
xiA2 )↑{ey } )
As in the previous case we push the substitution out in the process and the behavior
to get, as required,
Γ ⊲ [e
v /e
x](z(e
y ). P ) : he
v /e
xi(z. (A2 ↑{ey} )).
Lemma B.3 (Subject-reduction).
(1) If Γ ⊲ P : A and P Q then Γ ⊲ Q : A.
L
L
(2) (Subject-reduction) If P → P ′ and Γ ⊲ P : A then A =⇒ A′ and Γ ⊲ P ′ : A′ for some
A′ .
Proof. Part 1. By induction on the derivation of P Q. Most cases use Lemma A.2.
The case for (νx) P |Q (νx) (P |Q) uses Lemma B.1. The only interesting case is that for
(NΦ x)P |Q (NΦ x)(P |Q) with x ∈
/ FV(Q). The judgement Γ ⊲ (NΦ x)P |Q : A must have
been inferred from
Γ, x : res ⊲ P : A3
tracesx (A3 ) ⊆ Φ
A3 ↑{x} ≤ A1
Γ ⊲ Q : A2
A1 |A2 ≤ A
From these and Lemma B.1, we infer
Γ, x : res ⊲ P |Q : A3 |A2 .
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
39
By alpha-renaming assume x ∈
/ FV(A2 ). By Lemmas A.6.6 and A.6.11 we get (A3 |A2 )↓{x} ≈
A3 ↓{x} |A2 ↓{x} ≤ A3 ↓{x} , and then by Lemma A.7.1 we get tracesx (A3 |A2 ) ⊆ tracesx (A3 ),
and so tracesx (A3 |A2 ) ⊆ Φ. This gives
Γ ⊲ (NΦ x)(P |Q) : (A3 |A2 )↑{x} .
Finally (A3 |A2 )↑{x} ≤ A3 ↑{x} |A2 ≤ A1 | A2 ≤ A. This gives as required
Γ ⊲ (NΦ x)(P |Q) : A.
Extended case only: Just replace traces with etraces in the above reasoning.
L
Part 2. By induction on the derivation of P −→ P ′ . We show main cases. The other
cases are straightforward.
• Case (R-Com): We are given
Γ ⊲ xhe
v i. P1 | x(e
y ). P2 : A.
This must have been deduced from
v i. P1 : A1
Γ ⊲ xhe
Γ ⊲ x(e
y ). P2 : A2
A1 |A2 ≤ A.
(B.1)
Γ ⊲ xhe
v i. P1 : A1 and Γ ⊲ x(e
y ). P2 : A2 must have been deduced from
Γ ⊲ P1 : A3
(B.2)
Γ ⊲ x : chanh(e
y:σ
e)A4 i
(B.3)
Γ ⊲ vi : σi
(B.4)
x. (he
v /e
y iA4 | A3 ) ≤ A1
(B.5)
Γ, ye : σ
e ⊲ P2 : A5
(B.6)
and
Γ ⊲ x : chanh(e
y:σ
e)A4 i
A5 ↓{ey } ≤ A4
(B.7)
x. (A5 ↑{ey } ) ≤ A2
A′
(B.8)
: A′
A′ .
respectively. We must show A ⇒
and Γ ⊲ P1 |[e
v /e
y ]P2
for some
We pick
′
′
′
some A such that A ⇒ A and A ≥ he
v /e
y iA4 |A3 |A5 ↑{ey } . The existence of such
A′ is guaranteed by A ≥ x. (he
v /e
y iA4 |A3 )|x. (A5 ↑{ey} ) −→ he
v /e
y iA4 |A3 |A5 ↑{ey } , which
follows from (B.1) and (B.5) and (B.8), and the definition of the subtyping relation
(Definition 3.5). It remains to prove Γ ⊲ P1 |[e
v /e
y ]P2 : A′ . We start with the judgment
(B.6),
Γ, ye : σ
e ⊲ P2 : A5 .
By Lemma B.2.2,
Γ ⊲ [e
v /e
y ]P2 : he
v /e
y iA5 .
Hence
Γ ⊲ P1 |[e
v /e
y ]P2 : A3 |he
v /e
y iA5 .
40
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
Therefore, the required result Γ ⊲ P1 | [e
v /e
y ]P2 : A′ follows by (T-Sub), if we show
′
A3 | he
v /e
y iA5 ≤ A . It follows by:
A3 | he
v /e
y iA5
≤
≤
≤
≤
≤
A3 | he
v /e
y i(A5 ↓{ey } | A5 ↑{ey } )
(Lemma A.7.5)
A3 | he
v /e
y i(A5 ↓{ey } ) | he
v /e
y i(A5 ↑{ey } )
(Lemma A.5.4)
A3 | he
v /e
y i(A5 ↓{ey } ) | A5 ↑{ey }
(Lemma A.5.10)
A3 | he
v /e
y iA4 |A5 ↑{ey }
(assumption B.7 above)
A′
(the definition of A′ ).
• Case (R-Acc): We are given Γ ⊲ accξ (x).P1 : A. This must have been derived from
– Γ ⊲ P1 : A1
– Γ ⊲ x : res
– xξ .A1 ≤ A.
We have to show that
– Γ ⊲ P1 : A′
xξ
– A =⇒ A′ .
xξ
Let A′ be a behavioral type that satisfies A =⇒ A′ and A′ ≥ A1 . Such A′ is
xξ
guaranteed to exist by A ≥ xξ .A1 −→ A1 . Then, Γ ⊲ P1 : A′ follows from Γ ⊲ P1 : A1
and A′ ≥ A1 .
• Case (R-NewR1): We are given Γ ⊲ (NΦ x)P1 : A This must have been derived from
– Γ, x : res ⊲ P1 : A1
– tracesx (A1 ) ⊆ Φ
– A ≥ A1 ↑{x} .
We have to show that there exists A′ such that
−ξ
– Γ ⊲ (NΦ x)P1′ : A′
– A =⇒ A′
xξ
where P1 −→ P1′ .
By the induction hypothesis, there exists A′1 that satisfies Γ, x : res ⊲ P1′ : A′1
xξ
xξ
and A1 =⇒ A′1 . Using (Tr-Project), we get A1 ↓{x} =⇒ A′1 ↓{x} . So, from the
definition of traces and tracesx (A1 ) ⊆ Φ, we get tracesx (A′1 ) ⊆ Φ−ξ . By using
−ξ
(T-NewR), we get Γ ⊲ (NΦ x)P1′ : A′1 ↑{x} .
It remains to show there exists A′ such that A′1 ↑{x} ≤ A′ and A =⇒ A′ . That
xξ
follows from A ≥ A1 ↑{x} =⇒ A′1 ↑{x} . Here, the latter relation follows from A1 =⇒
A′1 and rule (Tr-Exclude).
Extended case only: Just replace traces with etraces in the above reasoning.
• Case (R-SP): This follows immediately from Part 1 and the induction hypothesis.
Appendix C. Proofs of the Lemma for Theorem 5.8
This section gives a proof of the lemma “Disabled” used in the proof of Theorem 5.8.
Lemma C.1 (Disabled). If well annotated (P ) and Γ ⊲pl P : A with bool 6∈ codom(Γ), then
P −→
6
implies disabled(A, S) for any S.
6
imply ¬active(P ) by the definition
Proof. We first note that well annotated (P ) and P −→
of well annotated (P ). So, it is sufficient to show (i)Γ ⊲pl P : A, (ii)P −→,
6
(iii)¬active(P ),
RESOURCE USAGE ANALYSIS FOR THE π-CALCULUS
41
and (iv) bool 6∈ codom(Γ) imply disabled(A, S) for any S. We prove this by induction on
the derivation of Γ ⊲pl P : A, with case analysis on the last rule.
• Case (T-Zero): In this case, A = 0, so we have disabled(A, S) for any S.
v i. P1 and
• Case (T-Out): In this case, P = xt he
v /e
y iA1 | A2 ). Since ¬active(P ), t = ∅. So, we have disabled(A, S) for any
A = xt . (he
S.
• Case (T-In): In this case, P = xt (e
y ). P1 and A = xt . (A2 ↑{ey } ). Since ¬active(P ),
t = ∅. So, we have disabled(A, S) for any S.
• Case (T-Par): In this case, P = P1 | P2 and A = A1 | A2 with Γ ⊲pl P1 : A1 and
Γ ⊲pl P2 : A2 . Note that P −→
6
implies P1 −→
6
and P2 −→.
6
¬active(P ) implies
¬active(P1 ) and ¬active(P2 ). So, by the induction hypothesis, we get disabled(A1 , S)
and disabled(A2 , S) for any S, which implies disabled(A, S).
• Case (T-Rep): In this case, P = ∗P1 and A = ∗A1 , with Γ ⊲pl P1 : A1 . ¬active(P )
and P −→
6
imply ¬active(P1 ) and P1 −→.
6
So, by the induction hypothesis, we get
disabled(A1 , S) for any S, which also implies disabled(A, S) as required.
• Case (T-If): This case cannot happen; by the condition (iv), P must be of the form
if true then P1 else P2
or if false then P1 else P2 , which contradicts with P −→.
6
• Case (T-New): In this case, P = (νx) P1 , A = (νx) A2 , and Γ, x : chanh(e
y:σ
e)A1 i ⊲
P1 : A2 . ¬active(P ) and P −→
6
imply ¬active(P1 ) and P1 −→.
6
So, by the induction
hypothesis, we get disabled(A2 , S) for any S. By the definition of disabled(·, S), we
get disabled(A, S).
• Case (T-Acc): This case cannot happen, since P must be of the form accξ (x).P1 ,
which contradicts with P −→.
6
• Case (T-NewR): Similar to the case for (T-New).
• Case (T-Sub): Γ⊲pl P : A must be derived from Γ⊲pl P : A′ for some A′ ≤ A. By the
induction hypothesis, for any S, we get disabled(A′ , S). By the condition A′ ≤ A,
we have disabled(A, S) for any S.
Appendix D. Computing a Basis of Behavioral Type
This section is an appendix for Section 4.3.1. Let A be a behavioral type of the form
(ν ye) B, where B does not contain any ν-prefix. Such A can be obtained by pushing all the
ν-prefixes out to the top-level, as described in Section 4.3.1. We show how to compute a
basis of A below.
42
N. KOBAYASHI, K. SUENAGA, AND L. WISCHIK
The constructor ·↑S can be eliminated by running the algorithm ElimUp∅,∅ (B, ∅) below.
ElimUpF,D (0, S) = 0
F,D
ElimUp
(α, S) =
A
if F (α, S) = A
F {(α,S)7→β},D
µβ.ElimUp
(D(α), S) if (α, S) 6∈ dom(F )
ElimUpF,D (l.A, S) = (l\S).ElimUpF,D (A, S)
ElimUpF,D (A1 | A2 , S) = ElimUpF,D (A1 , S) | ElimUpF,D (A2 , S)
ElimUpF,D (A1 ⊕ A2 , S) =
ElimUpF,D (A1 , S) ⊕ ElimUpF,D (A2 , S)
ElimUpF,D (∗A, S) = ∗ElimUpF,D (A, S)
ElimUpF,D (he
y /e
xiA, S) = ElimUpF,D (A, {z | [e
y /e
x]z ∈ S})
F,D
F {(α,S)7→α},D{α7→A}
ElimUp (µα.A, S) = µα.ElimUp
(A, S)
ElimUpF,D (A↑S1 , S) = ElimUpF,D (A, S ∪ S1 )
ElimUpF,D (A↓S1 , S) = ElimUpF,D (A, S)↓S1
Here, l\S is τ if target (l) ⊆ S and l otherwise. D keeps recursive definitions and F is a
cache for avoiding repeated computation. If A does not contain ν-prefixes, ElimUp∅,∅ (B, ∅)
always terminates since S can range over a finite set (which is the powerset of FV(B)).
The constructor ·↓S can be removed in the same manner.
We can further eliminate the renaming constructor he
y /e
xi by using the following algorithm.
ElimRenF,D (0, θ) = 0
F,D
ElimRen
(α, θ) =
A
if F (α, θ) = A
F {(α,θ)7→β},D
µβ.ElimRen
(D(α), θ) if (α, θ) 6∈ dom(F )
ElimRenF,D (l.A, θ) = θl.ElimRenF,D (A, θ)
ElimRenF,D (A1 | A2 , θ) = ElimRenF,D (A1 , θ) | ElimRenF,D (A2 , θ)
ElimRenF,D (A1 ⊕ A2 , θ) =
ElimRenF,D (A1 , θ) ⊕ ElimRenF,D (A2 , θ)
ElimRenF,D (∗A, θ) = ∗ElimRenF,D (A, θ)
ElimRenF,D (he
y /e
xiA, θ) = ElimRenF,D (A, θ ◦ [e
y /e
x])
F,D
F {(α,θ)7→α},D{α7→A}
ElimRen (µα.A, θ) = µα.ElimRen
(A, θ)
By applying the above algorithms to A = (ν ye) B, we obtain an equivalent type A′ =
(ν ye) B ′ , where B ′ does not contain any ν-prefixes, ·↓S , ·↑S , or he
y /e
xi. So, only elements
of Atoms(B ′ ) defined below (modulo folding/unfolding of recursive types) can appear in
transitions of B. So, ({e
y }, Atoms(B ′ )) forms a basis of A.
Definition D.1. Let A be a behavioral type that does not contain any ν-prefix, ·↓S , ·↑S ,
or he
y /e
xi. The set of atoms Atoms(A) is the least set that satisfies the following conditions.
Atoms(l.A) ⊇ {l.A} ∪ Atoms(A)
Atoms(A1 | A2 ) ⊇ Atoms(A1 ) ∪ Atoms(A2 )
Atoms(A1 ⊕ A2 ) ⊇ {A1 ⊕ A2 } ∪ Atoms(A1 ) ∪ Atoms(A2 )
Atoms(∗A) ⊇ {∗A} ∪ Atoms(A)
Atoms(µα.A) ⊇ {µα.A} ∪ Atoms([µα.A/α]A)
| 6cs.PL
|
F R ÉCHET A NALYSIS OF VARIANCE FOR R ANDOM O BJECTS
Paromita Dubey1 and Hans-Georg Müller2
Department of Statistics, University of California, Davis
Davis, CA 95616 USA
arXiv:1710.02761v2 [math.ST] 19 Oct 2017
October 2017
ABSTRACT
Fréchet mean and variance provide a way of obtaining mean and variance for general metric
space valued random variables and can be used for statistical analysis of data objects that lie in
abstract spaces devoid of algebraic structure and operations. Examples of such spaces include
covariance matrices, graph Laplacians of networks and univariate probability distribution functions. We derive a central limit theorem for Fréchet variance under mild regularity conditions,
utilizing empirical process theory, and also provide a consistent estimator of the asymptotic
variance. These results lead to a test to compare k populations based on Fréchet variance for
general metric space valued data objects, with emphasis on comparing means and variances.
We examine the finite sample performance of this inference procedure through simulation studies for several special cases that include probability distributions and graph Laplacians, which
leads to tests to compare populations of networks. The proposed methodology has good finite
sample performance in simulations for different kinds of random objects. We illustrate the proposed methods with data on mortality profiles of various countries and resting state Functional
Magnetic Resonance Imaging data.
KEY WORDS: Functional Data Analysis; Fréchet mean; Fréchet variance; Central Limit Theorem; Two sample test; Samples of probability distributions; Wasserstein metric; Samples of
networks; Graph Laplacians; fMRI
1 Corresponding
2 Research
author; email: [email protected]
supported by National Science Foundation grants DMS-1407852 and DMS-172864
1.
INTRODUCTION
With an increasing abundance of complex non-Euclidean data in multiple disciplines there is a
need for statisticians to develop techniques suitable for the analysis of such data. Settings where
data objects take values in a metric space that is devoid of vector space structure are common,
and occur for example when only pairwise distances between the observed data objects are
available. It is then natural to assume that observed samples of random objects are drawn from
a distribution in a metric space. The standard problem of K-sample testing, with the most
important case concerning the two sample case with K = 2, is of basic interest in statistics
and becomes more challenging when data objects lie in general metric spaces. For the case
of Euclidean data this is the classical K sample comparison problem. For Gaussian data it
corresponds to the classical analysis of variance (ANOVA), if comparing means is of primary
interest, which uses comparisons of summary variation measures between and within groups.
For general metric space valued random variables, Fréchet (1948) provided a direct generalization of the mean which implies a corresponding generalization of variance that may be used
to quantify the spread of the distribution of metric space valued random variables or random
objects around their Fréchet mean. The Fréchet mean resides in the object space and thus is
not amenable to algebraic operations, which implies that a central limit theorem cannot be directly applied to obtain limit distributions for Fréchet means. In contrast, the Fréchet variance
is always a scalar, which makes it more tractable. A key result of this paper is a central limit
theorem for the empirical Fréchet variance of data objects in general metric spaces under weak
assumptions. While this result is of interest in itself, we demonstrate how it can be applied
to derive a k-sample test based on groupwise Fréchet variances for testing the null hypothesis
of equal population distributions for random objects, with emphasis on testing the equality of
Fréchet means or of the Fréchet variances. In recent years the study of nonparametric tests for
the equality of two distributions for Euclidean data has expanded to cover non-Euclidean data,
which are increasingly encountered in frameworks that feature large and complex data. Tests
that are suitable for random objects in metric spaces are typically based on pairwise distances.
1
Major approaches have been based on nearest neighbors, graphs, energy statistics and kernels.
Nearest neighbor based tests (Henze, 1988; Henze and Penrose, 1999; Schilling, 1986)
count the number of K-nearest neighbor comparisons for which the observations and their
neighbors belong to the same sample. The choice of the tuning parameter K impacts the resulting inference. For graph-based two sample tests (Friedman and Rafsky, 1979), pairwise
distances of the pooled sample are used to form an edge-weighted graph and its minimum spanning tree. The test statistic is the number of subtrees formed by the removal of the edges for
which the defining nodes belong to different samples. Recently, modified versions of this test
were proposed (Chen and Friedman, 2017; Chen et al., 2017) also based on a similarity graph
of the pooled observations and a weighted edge count test in order to deal with the problem of
unequal sample sizes. Since it is more difficult to form within sample edges for samples with
smaller sizes, weights proportional to the reciprocal of sample sizes are assigned to the within
sample edges. A related approach is minimum distance non-bipartite pairing (Rosenbaum,
2005), where the dataset is split into disjoint pairs by minimizing the total distance within the
pairs and the test statistic is the number of cross matches.
The class of statistics popularly known as energy statistics, initially proposed for the case
of a multivariate two sample test (Baringhaus and Franz, 2004; Székely and Rizzo, 2004) and
based on the fact that for independent d-dimensional random vectors X1 , X2 ,Y1 and Y2 where X1
and X2 have the same distribution F and Y1 and Y2 have same distribution G, both with finite
expectations, the inequality
1
1
EkX1 −Y1 k − EkX1 − X2 k − EkY1 −Y2 k ≥ 0
2
2
holds, with equality if and only if F = G, where F and G are the two distributions to be compared. This framework was extended to the case of metric space valued random variables in
Lyons (2013) for metric spaces of strong negative type, leading to the distinction of measures
that have finite first moments with respect to the underlying metric. An extension of the energy
2
statistics approach for spaces admitting a manifold stratification (Patrangenaru and Ellingson,
2015) has been explored recently (Guo and Patrangenaru, 2017). A recent review is Székely
and Rizzo (2017).
Kernel based two sample testing (Gretton et al., 2012) aims at finding the the maximum
mean discrepancy (MMD) which is the largest difference in expectations over functions in the
unit ball of a reproducing kernel Hilbert space (RKHS) and corresponds to distances between
embeddings of distributions in the RKHS. Distribution free tests can be obtained based on large
deviation bounds of empirical estimates and also the asymptotic distribution of MMD, and the
energy statistics approach can be linked to the kernel method for two sample testing, as the
distance based energy statistic computed using a semi-metric of negative type is equivalent to
the MMD statistic obtained from a special type of kernel induced by the semi-metric (Sejdinovic et al., 2013). For every positive definite kernel, the MMD statistic corresponds to the energy statistic obtained from a semi-metric derived from the kernel used to compute the MMD.
Connections between kernel methods, energy statistics and Wasserstein distance between the
distributions to be compared are explored in Ramdas et al. (2017). Commonly used kernels in
the kernel framework, like the Gaussian kernel, might be sensitive to the choice of the tuning
parameter needed to scale the kernel and determining a good scaling factor can be challenging
when the goal is inference for complex data. We confirm in our simulations that this can be
problematic when adopting the kernel method to obtain inference.
Empirically, these tests have good power performance for either location type alternatives
or scale type alternatives, but usually not for both simultaneously. A major challenge for some
of these tests is the choice of the required tuning parameters, which often has a major impact on
the resulting inference. The challenges associated with existing inference procedures motivate
our proposed test, which is simple and is based on a test statistic that mimics the statistics on
which t tests and classical ANOVA are based, replacing between and within sums of squares
with the corresponding Fréchet variances for separate and combined samples, and is easy to
compute for k- sample comparisons.
3
Fréchet mean based testing and corresponding large sample theory including laws of large
numbers and central limit theorems for empirical Fréchet means have been explored previously for data objects that lie in special metric spaces, such as smooth Riemannian manifolds
(Bhattacharya and Patrangenaru, 2003, 2005; Bhattacharya and Bhattacharya, 2012) and topologically stratified spaces under certain restrictions, like phylogenetic trees (Kendall and Le,
2011; Barden et al., 2013; Bhattacharya and Lin, 2017). Virtually all of these results depend on
local linear tangent or similar approximations that are specific to these manifold spaces but do
not apply for random objects in more general metric spaces as they require local Euclidean approximation. The central limit theorem for Fréchet means was recently applied to the space of
graph Laplacians (Ginestet et al., 2017), which are of interest to obtain inference for networks.
This required choosing a high dimension for the approximating space, thus leading to problems
with small sample high dimensional data and the ensuing complications for inference.
Since Fréchet mean based testing exploits the local Euclidean approximation property of
the underlying space, it does not extend to data in general metric spaces such as the space of
univariate probability density functions, which will serve as one of our examples to illustrate the
proposed approach. Another drawback of these methods is that they lose power when the data
is high dimensional as large covariance matrices and their inverses need to be estimated. For
a network with as few as 20 nodes, the Fréchet mean of the graph Laplacians has a covariance
matrix of dimension 36100. To address this issue, strong assumptions, such as sparsity, have
been invoked for the estimation of these large covariance matrices and their inverses in order
to implement the corresponding tests. This provides additional motivation for our approach,
which is very simple and where dimension of the data enters only indirectly through properties
of the metric. To obtain asymptotic properties, we draw on empirical process theory, in a similar
spirit as a recent study of regression relationships between general metric space valued random
objects as responses and real valued predictors (Petersen and Müller, 2017).
Our goal in this paper is to develop a simple and straightforward extension of ANOVA,
which is one of the very basic tools for inference in statistics, to the case of metric space valued
4
random objects. Our starting point is a totally bounded metric space Ω equipped with a metric
d. We show that consistency of the sample Fréchet mean can be derived by using results of
Petersen and Müller (2017) concerning Fréchet regression estimators under mild assumptions
on Ω. We derive a central limit theorem for Fréchet variance under mild assumptions and
provide a consistent estimator of its asymptotic variance. Our method is applicable to a wide
class of objects including correlation matrices, univariate probability distributions, manifolds
and also the space of graph Laplacians. Making use of the central limit theorem, we derive a new
k-sample test for random objects and study the asymptotic distribution of the test statistic under
the null hypothesis of equality of the population distributions, as well as its power function.
It is customary to test for heteroscedasticity of the population groups prior to the F-test of
classical ANOVA to evaluate the assumption of equal variances across the populations that are
compared. One popular test for this purpose was proposed by Levene (1960), where the test
statistic is of the form of the usual ANOVA F-test, but applied to pseudo-observations which
could in principle be any monotonic function of the absolute deviations of the observations
from their group ‘centers’. Our proposed test unifies Levene’s test and the classical ANOVA for
testing inequality of population means for data objects in general metric spaces and therefore
aims at both location and scale type alternatives instead of only location alternatives which is the
objective of classical ANOVA. Our test statistic is a sum of two components. One component is
proportional to the squared difference of the pooled sample Fréchet variance and the weighted
average of the groupwise Fréchet variances, with weights proportional to the sample sizes of
the groups. For the special case of Euclidean data, this part of our statistic is proportional to
the squared F-ratio as in the usual ANOVA and is useful to detect differences in the Fréchet
means of the populations. A key auxiliary result is that this statistic converges to zero at rate
oP ( 1n ) under the null hypothesis of equality of Fréchet means of population distributions and
is bounded away from zero otherwise. The other component of our test statistic accounts for
differences in the Fréchet variances of the population groups and under the Euclidean setting
simplifies to a generalization of the Levene’s test applied to squared absolute deviations of
5
the observations from their group Fréchet means. When the assumptions of the central limit
theorem hold, the asymptotic distribution of this component of our test statistic is χ2(k−1) where
k is the number of populations to be compared.
The paper is organized as follows: The basic set up is defined in Section 2 and the theory
regarding the asymptotic behavior of Fréchet variance is provided in Section 3. The k-sample
test is introduced in Section 4, followed by empirical studies to study its power performance
in Section 5. Our data applications in Section 6 include samples of univariate probability distributions for which we employ the L2 Wasserstein metric and samples of graph Laplacians of
networks, for which we use the Frobenius metric. In Section 6.1 we illustrate the proposed
tests with human mortality records of 31 countries over the time period 1960-2009 to analyze
the evolution of age at death distributions of the countries over the years. In Section 6.2 we
analyze a resting state fMRI dataset where we compare the probability distribution of positive
correlations between fMRI signals in the posterior cingulate area of the brain of Alzheimer’s
Disease patients to those of similarly aged normal subjects. Finally, in Section 6.3 we analyze
brain connectivity networks of patients with dementia that are derived from fMRI signals of certain brain regions (Buckner et al., 2009) and compare the connectivity networks of demented
patients for three different age groups.
2.
PRELIMINARIES
The Fréchet mean is a generalization of centroids to metric spaces and for the special case of
Euclidean data it includes the arithmetic mean, median and geometric mean under different
choices of distance functions. The Fréchet variance is the corresponding generalized measure
of dispersion around the Fréchet mean. More formally, in all of the following, (Ω, d, P) is a
totally bounded metric space with metric d and probability measure P. Random objects in the
following are random variables Y that take values in Ω. The (population) Fréchet mean of Y is
µF = argmin E(d 2 (ω,Y )),
ω∈Ω
6
(1)
while for a random sample Y1 ,Y2 , . . . ,Yn of i.i.d. random variables with the same distribution as
Y , the corresponding sample Fréchet mean is
1 n 2
µ̂F = argmin ∑ d (ω,Yi ).
ω∈Ω n i=1
(2)
The sample Fréchet mean is an M-estimator as it is obtained by minimizing a sum of functions of the data objects. The population Fréchet variance quantifies the spread of the random
variable Y around its Fréchet mean µF ,
VF = E(d 2 (µF ,Y )),
(3)
with corresponding sample based estimator
V̂F =
1 n 2
∑ d (µ̂F ,Yi).
n i=1
(4)
Note that µF , µ̂F ∈ Ω, while VF , V̂F ∈ R .
The asymptotic consistency of the sample Fréchet mean µ̂F follows from results in Petersen
and Müller (2017), under the following assumption:
(P0) The objects µ̂F and µF exist and are unique, and for any ε > 0, infd(ω,µF )>ε E(d 2 (ω,Y )) >
E(d 2 (µF ,Y )).
Assumption (P0) is instrumental to establish the weak convergence of the empirical process Hn
to the population process H, where
1 n 2
Hn (ω) = ∑ d (ω,Yi ),
n i=1
H(ω) = E(d 2 (ω,Y )),
which in turn implies the consistency of µ̂F ,
d(µ̂F , µF ) = oP (1).
7
(5)
Consistency of µ̂F then implies the consistency of V̂F since
|V̂F −VF | ≤ 2 diam(Ω) d(µ̂F , µF ),
(6)
where diam(Ω) = sup{d(ω1 , ω2 ) : ω1 , ω2 ∈ Ω} is finite, since Ω is totally bounded. For the
central limit theorem (CLT) to hold for empirical Fréchet variance we need an assumption on
the entropy integral of the space Ω (Wellner and van der Vaart, 1996),
J(δ) =
Z 1p
0
1 + log(N(εδ/2, Bδ (µF ), d)) dε,
(7)
where Bδ (µF ) is the δ-ball in the metric d, centered at µF and N(εδ/2, Bδ (µF ), d) is the covering
number for Bδ (µF ) using open balls of radius εδ/2. Specifically, for our CLT we assume that
(P1) δ J(δ) → 0 as δ → 0.
For our results on the power of the proposed test in Section 4, we need an additional assumption
on the entropy integral of the whole space Ω,
(P2) The entropy integral of Ω is finite,
R1p
0
1 + log N(ε, Ω, d)dε < ∞.
Random objects that satisfy assumptions (P0)-(P2) include the space of univariate probability distributions on R with finite second moments equipped with the Wasserstein metric dW
and the spaces of correlation matrices and graph Laplacians of fixed dimensions equipped with
the Frobenius metric dF . For two univariate distributions F and G with finite variances, the
L2 -Wasserstein distance, also known as earth movers distance and closely related to optimal
transport (Villani, 2003),
2
dW
(F, G) =
Z 1
(F −1 (t) − G−1 (t))2 dt,
(8)
0
where F −1 and G−1 are the quantile functions corresponding to F and G, respectively. For two
8
matrices A and B of the same dimension, we consider the Frobenius metric,
dF2 (A, B) = trace((A − B)0 (A − B)).
(9)
To better characterize the space of graph Laplacians, we denote a weighted undirected graph
by G = (V, E), where V is the set of its vertices and E the set of its edges. Given an adjacency
matrix W , where wi j = w ji ≥ 0 and equality with zero holds if and only if {i, j} ∈
/ E, the graph
Laplacian is defined as L = D −W , where D is the diagonal matrix of the degrees of the vertices,
i.e. d j j = ∑i wi j . Under the assumption that the graphs are simple (i.e., there are no self loops
or multi edges), there is a one to one correspondence between the space of graphs and the graph
Laplacians and therefore the graph Laplacians can be used to characterize the space of networks
(Ginestet et al., 2017). The following results imply that the spaces described above provide
examples of spaces that satisfy assumptions (P0) and (P1). Our inference methods therefore
will apply to compare samples of univariate distributions, correlation matrices and networks.
Proposition 1. The space (Ω, dW ) satisfies assumptions (P0)-(P2) when the set Ω consists
of univariate probability distributions on R with finite second moments and dW is the L2 Wasserstein metric.
Proposition 2. The space (Ω, dF ) satisfies assumptions (P0)-(P2) when the set Ω consists of
graph Laplacians of connected, undirected and simple graphs of a fixed dimension r or correlation matrices of a fixed dimension r and dF is the Frobenius metric.
All proofs are in the Supplementary Materials.
3.
CENTRAL LIMIT THEOREM FOR FRÉCHET VARIANCE
The following Proposition lays the foundations for proving the Central Limit Theorem for the
empirical Fréchet variance V̂F .
9
Proposition 3. Suppose assumptions (P0)-(P1) hold. Then
1
1 n 2
{d (µ̂F ,Yi ) − d 2 (µF ,Yi )} = oP ( √ ).
∑
n i=1
n
Proposition 3 makes it possible to deal with the sum of dependent random variables
∑ni=1 d 2 (µ̂F ,Yi ), by replacing it with the sum of i.i.d. random variables ∑ni=1 d 2 (µF ,Yi ), a crucial
step in the derivation of the Central Limit Theorem for V̂F . Since Ω is totally bounded, the
population Fréchet variance Var(d 2 (µF ,Y )) is always finite. The Central Limit Theorem for
Fréchet variance is as follows.
Theorem 1. Under the assumptions of Proposition 3,
√
D
n(V̂F −VF ) −→ N(0, σ2F ),
where σ2F = Var(d 2 (µF ,Y )).
An intuitive sample based estimator for σ2F is
1 n
σ̂2F = ∑ d 4 (µ̂F ,Yi ) −
n i=1
and this estimator is
!2
1 n 2
∑ d (µ̂F ,Yi) ,
n i=1
(10)
√
n-consistent as the following result shows.
Proposition 4. Under the assumptions of Proposition 3,
D
√
b2F − σ2F −→ N(0, A),
n σ
where A = a0 Da with a0 = 1, −2E d 2 (µF ,Y ) and
Cov d 4 (µF ,Y ), d 2 (µF ,Y )
D=
4
2
2
Cov d (µF ,Y ), d (µF ,Y )
Var d (µF ,Y ) .
Var d 4 (µF ,Y )
10
(11)
b2F is a
Therefore σ
√
n-consistent estimator of σ2F .
Proposition 4 is a variant of Proposition 3 and follows from a simple application of the delta
method. The quantity A is finite by the boundedness of Ω. Combining Theorem 1, Proposition
3 and Slutsky’s Theorem leads to
1 √
D
n(V̂F −VF ) −→ N(0, 1).
σ̂F
(12)
A simple application of the delta method gives the asymptotic distribution of the Fréchet standard deviation which is the square root of Fréchet variance,
√
σ2
D
1/2
n(V̂F −VF 1/2 ) −→ N(0, F )
4VF
(13)
and since both σ̂F and V̂F are consistent estimators,
1/2
2V̂F √
D
1/2
n(V̂F −VF 1/2 ) −→ N(0, 1).
σ̂F
(14)
One can use (12) and (14) to construct asymptotic confidence intervals for Fréchet variance and standard deviation, which depend on the quality of the large sample approximations.
The bootstrap provides an alternative that often has better finite sample properties under weak
assumptions (Bickel and Freedman, 1981; Beran, 2003). Under fairly general assumptions,
resampling methods like bootstrapping and permutation tests work whenever a central limit
theorem holds (Janssen and Pauls, 2003). A basic criterion for bootstrap confidence sets to
have correct coverage probability asymptotically is convergence of the bootstrap distribution
√
of the root, in our case n(V̂F −V )/σ̂F . Then Monte Carlo approximations of the bootstrap
distribution of the root provide approximate quantiles for the construction of confidence sets.
For the empirical measure Pn generated by Y1 ,Y2 , . . . ,Yn which puts mass
11
1
n
to each of
Y1 , . . . ,Yn , where P is the underlying measure and any measurable set A we have
Pn (A) =
1 n
P
1A (Yi ) −→ P(A),
∑
n i=1
(15)
where 1A (·) is the indicator function for the set A, by the weak law of large numbers. Given
a sample Y1∗ ,Y2∗ , . . . ,Ym∗ of size m drawn with replacement from Y1 ,Y2 , . . . ,Yn , the bootstrap ap√
proximation of the root is R∗m,n = m(V̂m∗ − V̂F )/σ̂∗m , where V̂m∗ and σ̂∗m are the sample based
estimators of the Fréchet variance and its asymptotic variance, obtained from the bootstrap
sample Y1∗ ,Y2∗ , . . . ,Ym∗ . If the Fréchet mean µ̂∗m of the bootstrap sample Y1∗ ,Y2∗ , . . . ,Ym∗ exists and
is unique almost surely conditionally on Y1 ,Y2 , . . . ,Yn , then by applying the central limit theoD
rem in Theorem 1 conditionally on Y1 ,Y2 , . . . ,Yn , R∗m,n −→ N(0, 1) as m → ∞. Since N(0, 1)
has a continuous distribution function on the real line we have for each ε > 0, as m → ∞,
Pn sup |HR∗m,n (x) − Φ(x)| > ε → 0
(16)
x
where HR∗m,n (·) is the distribution function of R∗m,n conditional on Y1 ,Y2 , . . . ,Yn and Φ(·) is the
standard normal distribution function. From (15) for each ε > 0 we have as both m, n → ∞
P sup |HR∗m,n (x) − Φ(x)| > ε → 0,
x
which establishes asymptotic consistency of the bootstrap distribution. Therefore non-parametric
bootstrapping is a viable option for the construction of confidence intervals for Fréchet variance.
4.
COMPARING POPULATIONS OF RANDOM OBJECTS
Assume we have a sample of n Ω-valued random data objects Y1 ,Y2 , . . . ,Yn that belong to k
different groups G1 , G2 , . . . , Gk , each of size n j , j = 1, . . . , k, such that ∑kj=1 n j = n. We wish to
test the null hypothesis that the population distributions of the k groups are identical versus the
alternative that at least one of the groups has a different population distribution compared to the
12
others. Consider sample Fréchet means µ̂ j in Ω, which are random objects computed just from
the data falling into group j and the corresponding real-valued sample Fréchet variances V̂ j and
variance estimates (10) σ̂2j , j = 1, . . . , k,
µ̂ j = argmin
ω∈Ω
σ̂2j =
1
∑ d 2(ω,Yi),
n j i∈G
j
V̂ j =
1
∑ d 2(µ̂ j ,Yi),
n j i∈G
j
!2
1
∑ d 2(µ̂ j ,Yi)
n j i∈G
j
1
∑ d 4(µ̂ j ,Yi) −
n j i∈G
j
,
as well as the pooled sample Fréchet mean µ̂ p and the corresponding pooled sample Fréchet V̂p ,
µ̂ p = argmin
ω∈Ω
1
n
k
∑∑
d 2 (ω,Yi ),
V̂p =
j=1 i∈G j
1
n
k
∑ ∑ d 2(µ̂ p,Yi),
(17)
j=1 i∈G j
as well as weights
λ j,n =
nj
,
n
k
j = 1, . . . , k,
such that
∑ λ j,n = 1.
j=1
We will base our inference procedures on the auxiliary statistics
k
Fn = V̂p − ∑ λ j,nV̂ j ,
(18)
j=1
and
λ j,n λl,n
(V̂ j − V̂l )2 ,
2
2
j<l σ̂ j σ̂l
Un = ∑
(19)
where Fn is almost surely non-negative and is equal to the numerator of the F-ratio in classical
Euclidean ANOVA. Specifically, Fn corresponds to the weighted variance of the group means,
with weights proportional to the group sizes, and correspond to the between group variance in
the classical ANOVA setting. Hence Fn can be regarded as a generalization of the F-ratio in
classical ANOVA to the more general setting of metric space valued data. Under the Euclidean
13
setting, simple algebra shows that in this special case Fn is also proportional to the weighted
average of the squared pairwise distances between the group Fréchet means. Analogous to
ANOVA, the numerator of Fn is expected to be small under the null hypothesis of equality of
the population distributions, which is indeed the case as the following Proposition demonstrates.
Proposition 5. Suppose µ̂ p and µ̂ j exist and are unique almost surely for all j = 1, . . . , k. Let
0 < λ j,n < 1 for all j = 1, . . . , k and λ j,n → λ j as n → ∞, where λ j is such that 0 < λ j < 1 for
each j = 1, . . . , k, with ∑kk=1 λ j = 1. Then under the null hypothesis of equality of population
distributions and under assumptions (P0) and (P1) for each of the groups, as n → ∞,
√
nFn = o p (1).
(20)
Inference in classical ANOVA requires Gaussianity and equality of the population variances
and hence targets only differences in the group means to capture differences in the population
distributions. These assumptions are obviously too restrictive. We employ the statistics Un in
(19) to account for differences among the population variances, where in the Euclidean case, Un
turns out to be a slightly modified version of the traditional Levene’s test, substituting squared
distances of the observations from their group Fréchet means instead of just distances. The
following result provides the asymptotic distribution of Un under the null hypothesis.
Proposition 6. Under the assumptions of Proposition 5, we have under the null hypothesis, as
n → ∞,
nUn
λ j,n
k
∑ j=1 σ̂2
j
D
−→ χ2(k−1) .
(21)
We construct our test statistic Tn by combining Fn and Un in such a way that the distribution
of Tn under the null hypothesis is the same as that given in Proposition 6 while gaining power
against alternatives by ensuring that the asymptotic mean of Tn diverges when departing from
14
the null hypothesis,
Tn =
nUn
∑kj=1
λ j,n
σ̂2j
+
nFn2
.
∑kj=1 λ2j,n σ̂2j
(22)
For constructing Tn , we scale Fn by the estimated standard deviation of ∑kj=1 λ j,nV̂ j , which is
q
equal to ∑kj=1 λ2j,n σ̂2j , so that Fn is suitably scaled with respect to the variability of ∑kj=1 λ j,nV̂ j .
The second term on the r.h.s. of (22) is scaled such that both terms in Tn are of the same order
in n. Under the null hypothesis, consistency of σ̂2j for j = 1, 2, · · · , k and Proposition 5 imply
nFn2
k
∑ j=1 λ2j,n σ̂2j
= oP (1).
Theorem 2. Under the null hypothesis and the assumptions of Proposition 5,
D
Tn −→ χ2(k−1) .
(23)
For a level α test, we accordingly reject the null hypothesis of equality of population distributions if the test statistic Tn turns out to be bigger than χ2k−1,α , which is the (1 − α)th quantile
of the χ2(k−1) distribution, i.e., the rejection region that defines the test is
Rn,α = {Tn > χ2k−1,α }.
(24)
To study the consistency of the proposed test (24) we consider contiguous alternatives that capture departures from the null hypothesis of equal population distributions in terms of differences
in their Fréchet means and variances. We begin by defining the following population quantities,
k
k
µ p = argmin ∑ λ j E j (d 2 (ω,Y j )),
ω∈Ω
Vp =
j=1
∑ λ j E j (d 2(µ p,Y j ))
(25)
j=1
and
k
F = Vp − ∑ λ j V j ,
U=
j=1
λ j λl
∑ σ2σ2 (V j −Vl )2,
j<l
(26)
j l
where E j (·) denotes expectation under the probability distribution for the jth population and
15
λ j,n is as defined in Proposition 5, and the Y j are random objects distributed according to the
jth population distribution. In the Euclidean setting, µ p and Vp are analogous to the pooled
population Fréchet mean and pooled population Fréchet variance, respectively, and in the general case can be interpreted as generalizations of these quantities. While in the Euclidean case
F is proportional to the weighted sum of the differences between the groupwise population
Fréchet means and the pooled population Fréchet mean, by simple algebra it can be seen that
this property still holds in the general metric case.
Proposition 7 below states that under mild assumptions on the existence and uniqueness of
the pooled and the groupwise Fréchet means, the statistics µ̂ p and Fn are consistent estimators
of the population quantities µ p and F. By our assumptions, F is zero only under the equality of
the population Fréchet means and positive otherwise. The population quantity U is proportional
to the weighted average of the pairwise differences between the groupwise Fréchet variances,
which is nonnegative and is zero only if the population groupwise Fréchet variances are all
equal.
Proposition 7. Suppose µ̂ p , µ̂ j , µ p and µ j exist and are unique, the sample based estimators
almost surely for all j = 1, . . . , k. Assume for any ε > 0 , infd(ω,µ p )>ε ∑kj=1 λ j E j (d 2 (ω,Y j )) >
∑kj=1 λ j E j (d 2 (µ p ,Y j )) and also infd(ω,µ j )>ε E j (d 2 (ω,Y j )) > E j (d 2 (µ j ,Y j )) for all j = 1, . . . , k.
Let 0 < λ j,n < 1 for all j = 1, . . . , k and λ j,n → λ j as n → ∞, where λ j is such that 0 < λ j < 1
for each j = 1, . . . , k, with ∑kk=1 λ j = 1, as defined in Proposition 5. Then, as n → ∞,
P
µ̂ p −→ µ p
and
P
Fn −→ F.
(27)
The population quantity F is nonnegative and is zero iff the population Fréchet means µ j are all
equal.
To study the power performance of the proposed test (24), we consider sequences of alternatives Hn where Hn = {(U, F) : U ≥ an or F ≥ bn } for non negative sequences {an } or {bn }
with either an or bn strictly greater than 0. The case where either an → 0 or bn → 0, as n → ∞
16
reflects contiguous alternatives. Of interest is the asymptotic behavior of the power function
βHn , where
βHn =
inf
(U,F)∈Hn
P (Rn,α ) .
(28)
For the following result we require assumption (P2). The examples considered here satisfy this
assumptions, as shown in Propositions 1 and 2. The following result provides sufficient conditions for the consistency of the proposed test (24) under this family of contiguous alternatives,
i.e., where its asymptotic power is 1 under these alternatives, for any choice of the level α.
Theorem 3. Under the assumptions of Proposition 7 and assumption (P3), for sequences of
contiguous alternatives {Hn } for which either F ≥ an or U ≥ bn , where an → 0 and bn → 0 as
n → ∞, for all α > 0 the power function (28) satisfies
√
(A) If nan → ∞, then βHn → 1.
(B) If nbn → ∞ , then βHn → 1.
Asymptotic tests may not work very well for common situations where the group sample
sizes are modest. By arguments similar to those provided at the end of Section 3, resampling
methods like bootstrapping and permutation tests using the proposed test statistic Tn can be
adopted to obtain more accurate level α tests. In our empirical experiments, which are presented
in the next section, we found that when sample sizes of the groups are large the asymptotic test
is stable and accurate, but for small sample sizes, using bootstrap or permutation based critical
values for the test statistic Tn instead of the asymptotic critical values leads to more accurate
inference.
5.
SIMULATION STUDIES
In order to gauge the performance of the proposed test (24), we performed simulation experiments under various settings. The random objects we consider include samples of univariate
distributions equipped with the L2 -Wasserstein metric, samples of graph Laplacians of scale
17
free networks from the Barabási-Albert model (Barabási and Albert, 1999) with the Frobenius
metric and samples of multivariate data with the usual Euclidean metric. In each case we considered two groups of equal size n1 = n2 = 100 and constructed the empirical power functions
of the proposed test against departures from the null hypothesis of equality of population distributions of the two groups at level 0.05. The empirical power was computed by finding the
proportion of rejections for 1000 Monte Carlo runs. For comparing the performance of the
proposed test against existing tests we used the bootstrap version of the proposed test, where
the critical value for the test was obtained from the bootstrap distribution of Tn in 1000 Monte
Carlo simulations. The performance of the bootstrap version was found to have the correct level
for all sample sizes while the asymptotic version of the test did not always produce the correct
level of the test for very small sample sizes. We also investigated the finite sample power of
the asymptotic test for increasing sample sizes by comparing power functions for group sizes
n1 = n2 = 100, 250, 450.
In the simulations we explored not only location differences but also differences in shape
and scale of the population distributions. We compared the proposed test (24) with the graph
based test (Chen and Friedman, 2017), the energy test based on pairwise distances (Székely
and Rizzo, 2004) and a kernel based test (Gretton et al., 2012). For the graph based test, we
constructed the similarity graph of the pooled observations of the two groups by constructing
a 5−MST (minimal spanning tree) graph from the pooled pairwise distance matrix, following
the suggestion in Chen and Friedman (2017). Here a k−MST is the union of the 1st , . . . , kth
MSTs, where a kth MST is a spanning tree connecting all observations that minimizes the sum
of distances across edges subject to the constraint that this spanning tree does not contain any
edge in the 1st , . . . , (k − 1)th MST. For computing the statistic of the energy test of Székely and
Rizzo (2004), we used the pairwise distance matrix obtained from the specified metric in the
space of random objects. For the kernel based method, we chose a Gaussian kernel with the
kernel width as the median of the pairwise distances, as suggested in Gretton et al. (2012). In the
multivariate Euclidean setting, for the two sample case we additionally compared the proposed
18
test with Hotelling’s T 2 test.
0.8
0.6
power
0.0
0.2
0.4
0.6
0.4
0.0
0.2
power
0.8
1.0
Power Functions
1.0
Power Functions
−1.0
−0.5
0.0
0.5
1.0
0.5
1.0
δ
1.5
2.0
2.5
3.0
r
Figure 1: Empirical power as function of δ for N(µ, 1) probability distributions with µ from N(0, 0.5) for
group G1 and N(δ, 0.5) for group G2 (left), and empirical power as function of r for N(µ, 1) probability
distributions with µ from N(0, 0.2) for G1 and N(0, 0.2r) for G2 (right). The solid red curve corresponds
to the bootstrapped version of the proposed test with test statistic (22), the dashed blue curve to the graph
based test of Chen and Friedman (2017) , the dot-dashed black curve to the energy test of Székely and
Rizzo (2004) and the dotted green curve corresponds to the kernel test of Gretton et al. (2012). The level
of the tests is α = 0.05 and is indicated by the line parallel to the x-axis. Sample sizes of the groups are
fixed at n1 = n2 = 100.
0.8
0.6
power
0.0
0.2
0.4
0.6
0.4
0.0
0.2
power
0.8
1.0
Power Functions
1.0
Power Functions
−1.0
−0.5
0.0
0.5
1.0
0.5
δ
1.0
1.5
2.0
2.5
3.0
r
Figure 2: Empirical power as function of δ for N(µ, 1) probability distributions with µ from N(0, 0.5) for
group G1 and N(δ, 0.5) for group G2 (left), and empirical power as function of r for N(µ, 1) probability
distributions with µ from N(0, 0.2) for G1 and N(0, 0.2r) for G2 (right), for the proposed test at different
sample sizes. The tests are at level α = 0.05, indicated by the line parallel to the x-axis. The solid curve
corresponds to sample sizes n1 = n2 = 450, the dashed curve to n1 = n2 = 250 and the dotted curve to
n1 = n2 = 100.
The first type of random objects we study are random samples of univariate probability
distributions. Each datum is a N(µ, 1) distribution where µ is random. As distance between two
19
probability distributions we choose the L2 -Wasserstein metric. In the first scenario, for group
G1 , we generate µ to be distributed as N(0, 0.5) and for group G2 as N(δ, 0.5) and compute
the empirical power function of the tests for −1 ≤ δ ≤ 1. In the second scenario µ is drawn
randomly from N(0, 0.2) for group G1 and from N(0, 0.2r) for group G2 and empirical power
is evaluated for 0.125 ≤ r ≤ 3. The first scenario emphasizes location differences between the
populations and the second emphasizes scale differences. The results are presented in Figure 1.
We find that in the first scenario of mean differences, the proposed test and the graph based test
perform similarly. Both of them are outperformed by the energy test but perform better than the
kernel based test. In the second scenario of scale differences the proposed test outperforms all
other tests. Figure 2 indicates that the proposed test is consistent for large sample sizes in both
scenarios, and Figure 3 indicates that for insufficient sample sizes, the bootstrap version of the
proposed test has more stable rejection regions and overall is more reliable than the asymptotic
version of the test (24). As sample sizes increase, the asymptotic test becomes more reliable
and yields results that are similar to the bootstrap test.
−1.0
−0.5
0.0
δ
0.5
1.0
0.8
0.0
0.2
0.4
power
0.6
0.8
0.6
power
0.4
0.2
0.0
0.0
0.2
0.4
power
0.6
0.8
1.0
Power Functions
1.0
Power Functions
1.0
Power Functions
−1.0
−0.5
0.0
δ
0.5
1.0
−1.0
−0.5
0.0
0.5
1.0
δ
Figure 3: Empirical power as function of δ for N(µ, 1) probability distributions with µ from N(0, 0.5) for
group G1 and N(δ, 0.5) for group G2 . The leftmost panel corresponds to group sample sizes n1 = n2 = 10,
the middle panel corresponds n1 = n2 = 30 and the rightmost panel to n1 = n2 = 90. The solid curve
corresponds to the asymptotic version of the proposed test in (22) and the dashed curve corresponds to
the bootstrap version. The level of the test is α = 0.05 and is indicated by the line parallel to the x-axis.
Next we consider samples of graph Laplacians of scale free networks from the BarabásiAlbert model with the Frobenius metric. These popular networks have power law degree distri20
butions and are commonly used for networks related to the world wide web, social networks and
brain connectivity networks. For scale free networks the fraction P(c) of nodes in the network
having c connections to other nodes for large values of c is approximately c−γ , with γ typically
in the range 2 ≤ γ ≤ 3. Specifically, we used the Barabási-Albert algorithm to generate samples
of scale free networks with 10 nodes, as one might encounter in brain networks. For group G1 ,
we set γ = 2.5 and for group G2 we selected a fixed γ in the interval 2 ≤ γ ≤ 3, studying the
empirical power as a function of γ. The left panel in Figure 4 indicates that in this scenario
the proposed test has better power behavior than both the graph based test and the kernel based
test. The kernel based test with automatic scaling parameter choice (Gretton et al., 2012) in the
published software has very low power, while the graph based test has a high false positive rate.
The right panel in Figure 4 shows empirical evidence that the proposed test is also consistent
in this scenario as sample size increases, and Figure 5 that especially for small samples, bootstrapping the test statistic leads to the correct empirical level of the test. With increasing sample
size, the asymptotic and the bootstrap versions of the test perform similarly.
0.8
0.6
power
0.0
0.2
0.4
0.6
0.4
0.0
0.2
power
0.8
1.0
Power Functions
1.0
Power Functions
2.0
2.2
2.4
2.6
2.8
3.0
2.0
γ
2.2
2.4
2.6
2.8
3.0
γ
Figure 4: Empirical power functions of γ for scale-free networks from the Barabási-Albert model with
parameter 2.5 for G1 and γ for G2 . In the left panel, the solid red curve corresponds to the bootstrapped
version of our proposed test with test statistic (22), the blue dashed curve to the graph based test in Chen
and Friedman (2017), the dot-dashed black curve to the energy test of Székely and Rizzo (2004) and the
green dotted curve to the kernel test in Gretton et al. (2012). Sample sizes are fixed at n1 = n2 = 100. In
the right panel, the solid power function corresponds to the proposed asymptotic test (24) for n1 = n2 =
450, the dashed power function to the test for n1 = n2 = 250 and the dotted power function to the test for
n1 = n2 = 100. The level of the tests is α = 0.05 and is indicated by the line parallel to the x-axis.
21
2.0
2.2
2.4
2.6
2.8
0.8
0.0
0.2
0.4
power
0.6
0.8
0.6
power
0.4
0.2
0.0
0.0
0.2
0.4
power
0.6
0.8
1.0
Power Functions (n=90)
1.0
Power Functions (n=30)
1.0
Power Functions (n=10)
3.0
2.0
2.2
γ
2.4
2.6
2.8
3.0
2.0
2.2
2.4
γ
2.6
2.8
3.0
γ
Figure 5: Empirical power as function of γ for scale-free networks from the Barabási-Albert model, with
the model parameter 2.5 for G1 and γ for G2 . The leftmost panel corresponds to group sample sizes
n1 = n2 = 10, the middle panel to n1 = n2 = 30 and the rightmost panel to n1 = n2 = 90. The solid curve
corresponds to the proposed asymptotic test (24) and the dashed curve to the bootstrap version of the
proposed test at level α = 0.05. The level is indicated by the line parallel to the x-axis.
0.8
0.6
power
0.0
0.2
0.4
0.6
0.4
0.0
0.2
power
0.8
1.0
Power Functions
1.0
Power Functions
0.6
0.8
1.0
1.2
1.4
0
β
10
20
30
40
50
m
Figure 6: Empirical power as function of β for 5-dimensional vectors, where each component is distributed independently as Beta(1, 1) for group G1 and as Beta(β, β) with β varying between 0.5 ≤ β ≤ 1.5
for group G2 (left). Empirical power as function of degrees of freedom m for 5-dimensional vectors
which are distributed independently as truncated N(0, I5 ) for group G1 and as truncated multivariate
t-distribution tm (0, I5 ) with varying degrees of freedom between 1 ≤ m ≤ 50 for group G2 with each
component of the vectors truncated to lie between [−5, 5] (right). Sample sizes are n1 = n2 = 100 and
level α = 0.05. Solid red curves correspond to the bootstrapped version of our proposed test with test
statistic (22), dashed blue curves to the graph based test of Chen and Friedman (2017), dotted green
curves corresponds to the kernel test of Gretton et al. (2012), dot-dashed black curves to the energy test
of Székely and Rizzo (2004) and long-dashed magenta curves to Hotelling’s T 2 test.
22
In the multivariate setting we considered 5-dimensional vectors distributed as truncated multivariate normal distributions N(0, I5 ) for group G1 where each of the components was truncated
to lie between [−5, 5]. For group G2 , we chose a 5-dimensional t-distribution tm (0, I5 ), m indicating the degrees of freedom. As the degrees of freedom m increases, the shape of the
distribution of G2 becomes more similar to that of group G1 . We obtained the empirical power
as functions of m, for 1 ≤ m ≤ 50. In a second scenario, we took the five components of the
vectors to be distributed independently as Beta(1, 1) for group G1 , while for group G2 , the five
components were assumed to be distributed independently as Beta(β, β). Empirical power was
then obtained as a function of β for 0.5 ≤ β ≤ 1.5. Figure 6 illustrates that for these cases, the
proposed test overwhelmingly outperforms the comparison tests.
6.
6.1.
DATA ILLUSTRATIONS
Mortality Data
The Human Mortality Database provides data in the form of yearly lifetables differentiated by
countries and gender. Presently it includes yearly mortality data for 37 countries, available at
<www.mortality.org>. These can be converted to a density of age-at-death for each country,
gender and calendar year, by first converting the available lifetables into histograms and then
applying local least squares smoothing, for which we used the Hades package at <http://www.
stat.ucdavis.edu/hades/> with bandwidth h = 2. The random objects we consider are the
resulting densities of age-at-death. Considering the time period 1960-2009 and the 31 countries
in the database for which records are available for this time period, we obtained the densities of
age at death for the age interval [0, 80].
From these densities we obtained quantile functions to compute the Wasserstein distance,
which is the metric we choose for this distribution space. The Fréchet standard deviations were
computed as a function of calendar year, and are shown along with pointwise 95 % bootstrap
confidence bands in Figure 7, separately for males and females. One finds that there is a small
peak in variance of mortality between 1980-1985 for males followed by a larger peak between
23
Female
4.5
Standard Deviation
4
3.5
3
2.5
2
1.5
1
1960
1965
1970
1975
1980
1985
Time
1990
1995
2000
2005
2010
1990
1995
2000
2005
2010
Male
5.5
Standard Deviation
5
4.5
4
3.5
3
2.5
2
1960
1965
1970
1975
1980
1985
Time
Figure 7: Yearly Fréchet standard deviations (solid line) along with 95 % pointwise bootstrap confidence
limits (dashed lines) for females (top) and males (bottom).
Female (Group1)
Male (Group1)
5
Standard Deviation
Standard Deviation
4.5
4
3.5
3
2.5
2
1.5
1
1960
1970
1980
1990
2000
4
3
2
1
0
1960
2010
1970
Time
Female (Group 2)
2000
2010
Male (Group 2)
4
Standard Deviation
Standard Deviation
1990
Time
5
4
3
2
1
0
1960
1980
1970
1980
1990
2000
2010
Time
3
2
1
0
1960
1970
1980
1990
2000
2010
Time
Figure 8: Yearwise Fréchet standard deviations (solid line) along with 95% pointwise bootstrap confidence limits (dashed lines) for females in group 1, females in group 2, males in group 2 and males in
group 1 (counter clockwise starting from top left)
24
1993-1996. For females, this later peak is also quite prominent. These peaks might possibly
be attributed to major political upheaval in Central and Eastern Europe during that period since
several countries in the dataset belong to these regions. The countries in the dataset that experienced some turmoil associated with the end of Communist role are Belarus, Bulgaria, Czech
Republic, Estonia, Hungary, Latvia, Poland, Lithuania, Russia, Slovakia and Ukraine.
Females
0.07
0.06
Group 1
Group 2
Density
0.05
0.04
0.03
0.02
0.01
0
0
10
20
30
40
50
60
70
80
90
60
70
80
90
Age
Males
0.06
0.05
Group 1
Group 2
Density
0.04
0.03
0.02
0.01
0
0
10
20
30
40
50
Age
Figure 9: Wasserstein-Fréchet mean age-at-death densities for the years 1960-2009 for groups 1 (red)
and 2 (blue) and for females (top) and males (bottom)
To check whether it is indeed these countries that are responsible for the variance peak
around 1990-1995, we split our dataset into two groups, group 1 consisting of the above Eastern European countries and group 2 of all other countries and repeated the earlier analysis.
Figure 8 shows that for group 2 the variance of age-at-death distributions indeed has a decreasing trend over the years for both males and females, while the variance shows distinct
25
Females
p−values
1
0.5
0
1960
1970
1980
1990
2000
2010
1990
2000
2010
Years
Males
p−values
1
0.5
0
1960
1970
1980
Years
Figure 10: p-values for testing the differences in population age-at-death distributions of Groups 1 and 2
over the years for females (top) and males (bottom) with the proposed test.
fluctuations for both males and females in group 1. Figure 9 illustrates the group-wise Wasserstein Fréchet mean densities of the countries for the various calendar years. There seems to be a
clear difference between the mean densities of the two groups for both males and females, and
implementing the bootstrap version of the proposed test to compare the distributions of age-atdeath between groups 1 and 2. For obtaining the p-values we carried out the bootstrap version
of the proposed test due to the relatively small sample sizes. Figure 10 illustrates the p-values
obtained for each year. The null hypothesis that the populations are identical is rejected for both
males and females at the 5% level for most years between 1990-1995.
6.2.
Analyzing intra-hub connectivities using fMRI data for Alzheimer’s Disease
Alzheimers disease (AD) is an irreversible, progressive neuro-degenerative brain disorder that
slowly destroys memory and thinking skills, eventually leading to severe dementia. AD has
been found to have associations with abnormalities in functional integration of brain regions.
Recent studies as in Sui et al. (2015) have indicated that AD selectively targets regions of highconnectivity (so-called hubs) in the brain. The posterior midline, in particular the posterior
26
cingulate/precuneus (PCP) as described in Buckner et al. (2009) is a nexus or hub of high
cortical connectivity and functional connectivity in this region could be a potential biomarker
for AD. For each hub, a so-called seed voxel is identified as the voxel with the signal that has
the highest correlation with the signals of nearby voxels. To quantify intra-hub connectivity,
following Petersen and Müller (2016), we analyze the distribution of the correlations between
the signal at the seed voxel of the PCP hub and the signals of all other voxels within an 11 ×
11 × 11 cube of voxels that is centered at the seed voxel.
The subjects in our analysis consisted of cognitively normal elderly patients and demented
elderly patients diagnosed with AD (after removal of outliers), each of whom underwent an
fMRI scan at the UC Davis Imaging Research Center. Preprocessing of the recorded BOLD
(blood-oxygenation-level-dependent) signals was implemented by adopting the standard procedures of slice-timing correction, head motion correction and normalization, in addition to linear
detrending to account for signal drift and band-pass filtering to include only frequencies between 0.01 and 0.08 Hz. The signals for each subject were recorded over the interval [0, 470]
(in seconds), with 236 measurements available at 2 second intervals. The study actually had 171
normal subjects but since AD is a disease that is known to progress with age, for fair comparison, only 87 out of these 171 were selected, by matching their ages with that of the demented
patients. To check that the age matching worked, the age distributions of the 87 normal elderly
subjects in our analysis and the 65 AD patients were compared with the Wilcoxon rank sum
test for the null hypothesis of equal age distributions of the two groups, which yielded a p-value
of 0.84. For each subject, the target is the density function of positive correlations within the
PCP hub, where this density was estimated from the observed correlations with a kernel density
estimator, utilizing the standard Gaussian kernel and bandwidth h = 0.08. As negative correlations are commonly ignored in connectivity analyses, the densities were estimated on [0, 1].
The resulting sample of densities is then an i.i.d. sample across subjects. Figure 11 shows the
Wasserstein Fréchet mean probability distribution functions. To compare the two populations of
distributions, we applied the asymptotic and the bootstrap version of the proposed test to these
27
Wasserstein mean probability distribution functions
Probability Distribution Function
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
Demented Subjects
Normal Subjects
0.1
0
0
0.2
0.4
0.6
0.8
1
Correlation
Figure 11: Wasserstein mean probability distribution functions of positive correlations in the PCP hub for normal subjects (blue) and demented patients (red)
samples of density functions, which yielded a p-value of p = 0.002 (bootstrap p-value=0.001),
indicating that significant differences exist between in terms of intra-hub connectivity between
AD patients and age-matched normal subjects.
6.3.
Comparing brain networks of Alzheimer’s patients
Recent advances in neurological studies have revealed that brain hubs, being regions of high
connectivity in the brain, interconnect with each other for functional integration of their specialized roles. Studying interconnections between hubs can reveal important insights about
brain diseases like AD. Disorders of cognition can be associated with disrupted connectivity
between cortical hubs as discussed in Buckner et al. (2009). One question of interest is whether
the interconnections change with aging in patients having dementia. We consider connections
between 10 cortical hubs that are listed in Table 3 of Buckner et al. (2009).
In order to analyze the cognitively impaired patients we considered the 65 demented subjects
that were discussed in the preceding subsection. For each subject, a 10 × 10 connectivity matrix
was obtained whose entries are the correlations between average fMRI signals (with the same
pre-processing as described in subsection 6.2) from 3 × 3 × 3 cubes around the seed voxels of
the 10 hubs. These subject-specific connectivity matrices were thresholded at 0.25 as discussed
in Buckner et al. (2009) to obtain adjacency matrices of networks with the hubs as the nodes,
28
so that the presence of an edge indicates a correlation greater than 0.25. Subject-specific graph
Laplacians were then formed from these adjacency matrices.
These cognitively impaired patients were split into three groups based on their ages. Subjects were assigned to groups G1 , G2 or G3 based on whether they were aged 70 or below,
between age 70 and 80 or 80 and above. The left panel in Figure 12 shows the difference of the
average graph Laplacians of subjects in group G2 and subjects in group G1 and the right panel
the difference of the average graph Laplacians of subjects in group G3 and subjects in group
G1 .
Since the group sample sizes of G1 , G2 and G3 are small we applied the bootstrap version of
the proposed test to see if the differences are significant in the populations of graph Laplacians
of the three different groups of cognitively impaired patients. The null hypothesis of equality
of population distributions of the graph Laplacians was rejected with a bootstrap p-value of
0.032. The conclusion of the test indicates that there is evidence to support that the inter hub
connections do show changes with age for patients having Alzheimer’s disease.
2
2
1
4
0.5
HUBS
HUBS
4
1
6
0.5
6
0
0
8
8
−0.5
−0.5
10
10
2
4
6
HUBS
8
10
2
4
6
HUBS
8
10
Figure 12: The left panel shows the difference between the average graph Laplacians of demented patients aged between 70 and 80 and demented patients aged 70 or below. The right panel shows the
difference between the average graph Laplacians of demented patients aged 80 or above and demented
patients aged 70 or below.
REFERENCES
Barabási, A.-L. and Albert, R. (1999), “Emergence of scaling in random networks,” Science,
286, 509–512.
29
Barden, D., Le, H., and Owen, M. (2013), “Central limit theorems for Fréchet means in the
space of phylogenetic trees,” Electronic Journal of Probability, 18, 1–25.
Baringhaus, L. and Franz, C. (2004), “On a new multivariate two-sample test,” Journal of Multivariate Analysis, 88, 190–206.
Beran, R. (2003), “The impact of the bootstrap on statistical algorithms and theory,” Statistical
Science, 18, 175–184.
Bhattacharya, A. and Bhattacharya, R. (2012), Nonparametric Inference on Manifolds: With
Applications to Shape Spaces, no. 2, Cambridge University Press.
Bhattacharya, R. and Lin, L. (2017), “Omnibus CLTs for Fréchet means and nonparametric
inference on non-Euclidean spaces,” Proceedings of the American Mathematical Society,
145, 413–428.
Bhattacharya, R. and Patrangenaru, V. (2003), “Large sample theory of intrinsic and extrinsic
sample means on manifolds. I,” Annals of Statistics, 31, 1–29.
— (2005), “Large sample theory of intrinsic and extrinsic sample means on manifolds: II,”
Annals of Statistics, 33, 1225–1259.
Bickel, P. J. and Freedman, D. A. (1981), “Some asymptotic theory for the bootstrap,” Annals
of Statistics, 9, 1196–1217.
Buckner, R. L., Sepulcre, J., Talukdar, T., Krienen, F. M., Liu, H., Hedden, T., Andrews-Hanna,
J. R., Sperling, R. A., and Johnson, K. A. (2009), “Cortical hubs revealed by intrinsic functional connectivity: mapping, assessment of stability, and relation to Alzheimer’s disease,”
The Journal of Neuroscience, 29, 1860–1873.
Chen, H., Chen, X., and Su, Y. (2017), “A weighted edge-count two-sample test for multivariate
and object data,” Journal of the American Statistical Association.
Chen, H. and Friedman, J. H. (2017), “A new graph-based two-sample test for multivariate and
object data,” Journal of the American Statistical Association, 112, 397–409.
Fréchet, M. (1948), “Les éléments aléatoires de nature quelconque dans un espace distancié,”
10, 215–310.
Friedman, J. H. and Rafsky, L. C. (1979), “Multivariate generalizations of the Wald-Wolfowitz
and Smirnov two-sample tests,” Annals of Statistics, 7, 697–717.
Ginestet, C. E., Li, J., Balachandran, P., Rosenberg, S., Kolaczyk, E. D., et al. (2017), “Hypothesis testing for network data in functional neuroimaging,” The Annals of Applied Statistics,
11, 725–750.
Gretton, A., Borgwardt, K. M., Rasch, M. J., Schölkopf, B., and Smola, A. (2012), “A kernel
two-sample test,” Journal of Machine Learning Research, 13, 723–773.
Guo, R. and Patrangenaru, V. (2017), “Testing for the Equality of two Distributions on High
30
Dimensional Object Spaces,” arXiv preprint arXiv:1703.07856.
Henze, N. (1988), “A multivariate two-sample test based on the number of nearest neighbor
type coincidences,” Annals of Statistics, 16, 772–783.
Henze, N. and Penrose, M. D. (1999), “On the multivariate runs test,” Annals of Statistics, 27,
290–298.
Janssen, A. and Pauls, T. (2003), “How do bootstrap and permutation tests work?” Annals of
Statistics, 31, 768–806.
Kendall, W. S. and Le, H. (2011), “Limit theorems for empirical Fréchet means of independent and non-identically distributed manifold-valued random variables,” Brazilian Journal of
Probability and Statistics, 25, 323–352.
Levene, H. (1960), “Robust tests for equality of variances,” Contributions to Probability and
Statistics, 1, 278–292.
Lyons, R. (2013), “Distance covariance in metric spaces,” Annals of Probability, 41, 3284–
3305.
Patrangenaru, V. and Ellingson, L. (2015), Nonparametric statistics on manifolds and their
applications to object data analysis, CRC Press.
Petersen, A. and Müller, H.-G. (2016), “Functional data analysis for density functions by transformation to a Hilbert space,” Annals of Statistics, 44, 183–218.
— (2017), “Fréchet Regression for Random Objects with Euclidean predictors,” Annals of
Statistics, to appear (arXiv preprint arXiv:1608.03012), xx, xxx–xxx.
Ramdas, A., Trillos, N. G., and Cuturi, M. (2017), “On Wasserstein Two-Sample Testing and
Related Families of Nonparametric Tests,” Entropy, 19, 47.
Rosenbaum, P. R. (2005), “An exact distribution-free test for comparing two multivariate distributions based on adjacency,” Journal of the Royal Statistical Society: Series B (Statistical
Methodology), 67, 515–530.
Schilling, M. F. (1986), “Multivariate two-sample tests based on nearest neighbors,” Journal of
the American Statistical Association, 81, 799–806.
Sejdinovic, D., Sriperumbudur, B., Gretton, A., and Fukumizu, K. (2013), “Equivalence of
distance-based and RKHS-based statistics in hypothesis testing,” Annals of Statistics, 41,
2263–2291.
Sui, X., Zhu, M., Cui, Y., Yu, C., Sui, J., Zhang, X., Liu, J., Duan, Y., Zhang, Z., Wang, L.,
Zhang, X., and Jiang, T. (2015), “Functional connectivity hubs could serve as a potential
biomarker in Alzheimers disease: a reproducible study,” Current Alzheimer Research, 12,
974–983.
Szarek, S. J. (1998), “Metric Entropy of Homogeneous Spaces,” Quantum Probability, 43, 395–
31
410.
Székely, G. J. and Rizzo, M. L. (2004), “Testing for equal distributions in high dimension,”
InterStat, 5, 1–6.
— (2017), “The Energy of Data,” Annual Review of Statistics and Its Application, 4, 447–479.
Villani, C. (2003), Topics in Optimal Transportation, American Mathematical Society.
Wellner, J. A. and van der Vaart, A. W. (1996), Weak Convergence and Empirical Processes:
With Applications to Statistics, Springer Series in Statistics.
S UPPLEMENTARY M ATERIALS
S.1 Main Proofs
Proof of Proposition 1. Let QΩ be the space of quantile functions corresponding to the space
Ω of univariate distribution functions on R with finite second moments. For a random object Y
taking values in Ω, let QY denote the corresponding quantile function. By the convexity of the
space QΩ and the properties of the L2 -Wasserstein distance, the population and sample Fréchet
−1
thereby
means exist and are unique and given by µF = (E(QY (·)))−1 and µ̂F = n1 ∑ni=1 QYi (·)
proving (P0). For proving (P1) and (P2) observe that quantile functions are a part of a bigger
class M comprising of monotone functions and under L2 metric dL2 (the Wasserstein metric
corresponds to the L2 metric on the space of quantile functions) the metric entropy of the space
M is upper bounded as log N(ε, M, dL2 ) ≤
a
ε
for some constant a > 0 as per Theorem 2.7.5 in
Wellner and van der Vaart (1996). Therefore,
J(δ) ≤
Z 1r
1
1 + dε ≤
εδ
0
Z 1
0
2
1
dε = 1 + √ ,
1+ √
εδ
δ
and so δ J(δ) → 0 as δ → 0, thus establishing (P1). The entropy integral of the whole space is
Z 1p
0
1 + log N(ε, Ω, dW ) ≤
which establishes (P2).
32
Z 1r
0
1
1 + dε = 3,
ε
Proof of Proposition 2. The space of graph Laplacians for graphs considered in this Proposition
is convex (Ginestet et al., 2017) and so is the space of correlation matrices. The properties of
Frobenius distance imply that µF = E(Y ) and µ̂F = n−1 ∑ni=1 Yi , which exist and are unique by
the convexity of Ω proving (P0). (P1) and P(2) hold as both the space of graph Laplacians and
the space of correlation matrices are bounded subsets of a finite-dimensional Euclidean space
2
Rr of r × r matrices and under the Euclidean metric dE , which is equivalent to the Frobenius
metric for the matrices. The metric entropy of this space is seen to be bounded above by
2
log N(ε, Rr , dE ) ≤ ar2 log 1 + 1ε for some constant a > 0, due to a simple volume comparison
argument (Szarek, 1998), so that
J(δ) ≤
Z 1
0
s
s
!
Z 1
√
√
1
1
2
1 + ar2 log 1 +
dε ≤
1 + ar log 1 +
dε ≤ 1+ ar(1+ √ ),
εδ
εδ
0
δ
implying δ J(δ) → 0 as δ → 0 and establishing (P1). Using similar upper bounds for the entropy
integral of the whole space,
Z 1p
0
1 + log N(ε, Ω, dF ) ≤
Z 1
s
1 + ar2 log
0
√
1
dε ≤ 1 + 3 ar,
1+
ε
establishing (P2).
Proof of Proposition 3. Define
Mn (ω) =
1 n 2
∑ {d (ω,Yi) − d 2(µF ,Yi) − E(d 2(ω,Yi)) + E(d 2(µF ,Yi))}.
n i=1
In a first step we control the behavior of Mn (ω) uniformly for small d(ω, µF ). Define functions
gω : Ω → R as gω (y) = d 2 (y, ω) and the function class Mδ = {gω − gµF : d(ω, µF ) < δ}. An
envelope function for Mδ is G(δ) = 2diam(Ω)δ. Let J = J(δ) be the integral in (P1) so that
δ J(δ) → 0 as δ → 0. Theorems 2.7.11 and 2.14.2 of Wellner and van der Vaart (1996) and (P1)
33
imply that for small δ > 0,
!
E
sup
|Mn (ω)|
≤
d(ω,µF )<δ
therefore
J(δ)G(δ)
√
,
n
!
E
sup
|Mn (ω)|
≤
d(ω,µF )<δ
aδ J(δ)
√
n
(29)
for some a > 0. We want to show that for any ε > 0, γ > 0, there exists N = N(ε, γ) such that
for all n ≥ N,
P
!
1 n 2
√ ∑ {d (µ̂F ,Yi ) − d 2 (µF ,Yi )} > ε < γ.
n i=1
For any small δ > 0,
n
1
√ ∑ {d 2 (µ̂F ,Yi ) − d 2 (µF ,Yi )} > ε
n i=1
P
!
!
n
1
ε
{d 2 (µ̂F ,Yi ) − d 2 (µF ,Yi )} < − √ , d(µ̂F , µF ) ≤ δ + P (d(µ̂F , µF ) > δ)
∑
n i=1
n
!
ε
1 n 2
≤P − inf
{d (ω,Yi ) − d 2 (µF ,Yi )} > √
+ P (d(µ̂F , µF ) > δ)
∑
n
d(ω,µF )<δ n i=1
!
ε
+ P (d(µ̂F , µF ) > δ) ,
≤P
sup |Mn (ω)| > √
n
d(ω,µF )<δ
≤P
since
sup
|Mn (ω)|
d(ω,µF )<δ
=
sup
d(ω,µF )<δ
≥
inf
d(ω,µF )<δ
1 n 2
{d (ω,Yi ) − d 2 (µF ,Yi ) − E(d 2 (ω,Yi )) + E(d 2 (µF ,Yi ))}
∑
n i=1
E(d 2 (ω,Yi )) − E(d 2 (µF ,Yi )) −
1 n 2
∑ {d (ω,Yi) − d 2(µF ,Yi)}
d(ω,µF )<δ n i=1
1 n 2
{d (ω,Yi ) − d 2 (µF ,Yi )},
= − inf
∑
d(ω,µF )<δ n i=1
34
inf
(30)
using
{E(d 2 (ω,Yi )) − E(d 2 (µF ,Yi ))} = 0
inf
d(ω,µF )<δ
from assumption (P0).
By using Markov’s inequality and the bound in equation (29), for any small δ > 0 such that
δ J(δ) <
γε
2a ,
the expression in (30) can be bounded above by
!
ε
P
sup |Mn (ω)| > √
+ P (d(µ̂F , µF ) > δ)
n
d(ω,µF )<δ
!√
n
≤E
sup |Mn (ω)|
+ P (d(µ̂F , µF ) > δ)
ε
d(ω,µF )<δ
≤
aδ J(δ)
γ
+ P (d(µ̂F , µF ) > δ) < + P (d(µ̂F , µF ) > δ) .
ε
2
For any such δ, using the consistency of Fréchet mean µ̂F it is possible to choose N such that
P (d(µ̂F , µF ) > δ) <
γ
2
for all n ≥ N. This completes the proof.
Proof of Theorem 1.
√
n(V̂F −VF )
√
= n
!
√
1 n 2
{d (µ̂F ,Yi ) − d 2 (µF ,Yi )} + n
∑
n i=1
!
1 n 2
∑ {d (µF ,Yi) − E(d 2(µF ,Y1))} ,
n i=1
where the first term is oP (1) by Proposition 3 and the second term converges in distribution to
N(0, σ2F ) by applying Central Limit Theorem to i.i.d random variables d 2 (µF ,Y1 ), . . . , d 2 (µF ,Yn ).
Theorem 1 then follows directly from Slutsky’s Theorem.
Proof of Proposition 4. Observe that
!
1 n 4
1 n 4
∑ d (µ̂F ,Yi) − n ∑ d (µF ,Yi) ≤ 2diam2(Ω)
n i=1
i=1
35
!
1 n 2
1 n 2
∑ d (µ̂F ,Yi) − n ∑ d (µF ,Yi) (31)
n i=1
i=1
4 (µ ,Y )
E
d
√
F
which is o p √1n by Proposition 3. Hence n
−
1 n
2
2
E d (µF ,Y )
∑i=1 d (µ̂F ,Yi )
n
1 n
1 n
4 (µ̂ ,Y )
4 (µ ,Y )
d
d
∑
∑
√
F i
F i
i=1
− n i=1
can be decomposed into two components, n n
1 n
1 n
2
2
n ∑i=1 d (µ̂F ,Yi )
n ∑i=1 d (µF ,Yi )
1 n
4
4
E d (µF ,Y )
∑i=1 d (µF ,Yi )
√
−
which is oP (1) by equation (31) and Proposition 3 and n n
1 n
2
2
E d (µF ,Y )
n ∑i=1 d (µF ,Yi )
which converges
in
distribution to N(0, D) by applying Central Limit Theorem to i.i.d random
1 n
∑ d 4 (µ̂F ,Yi )
n i=1
d 4 (µF ,Yi )
, i = 1, 2, . . . , n, with
vectors
d 2 (µF ,Yi )
Cov d 4 (µF ,Y ), d 2 (µF ,Y )
.
D=
4
2
2
Cov d (µF ,Y ), d (µF ,Y )
Var d (µF ,Y )
Var d 4 (µF ,Y )
Observing
σ̂2F
=g
!
1 n 4
1 n 2
∑ d (µ̂F ,Yi), n ∑ d (µ̂F ,Yi) ,
n i=1
i=1
where g(x1 , x2 ) = x1 − x22 is a differentiable function with gradient function Og = (1, −2x2 ), a
simple application of the delta method establishes the asymptotic normality of σ̂2F . The asymp
4
E d (µF ,Y )
totic variance is given by a0 Da, where a is the gradient function Og evaluated at
.
2
E d (µF ,Y )
Proof of Proposition 5. Under the null hypothesis the groupwise means are all equal,
µ1 = µ2 = · · · = µk = µ.
36
Then, under assumptions (P0) and (P1),
k
√
√
nFn = n(V̂ − ∑ λ j,nV̂ j )
j=1
k √n
1 n 2
j 1
2
= √ ∑ {d (µ̂,Yi ) − d (µ,Yi )} − ∑ √ √ ∑ {d 2 (µ̂ j ,Yi ) − d 2 (µ,Yi )}
n i=1
n n j i∈G j
j=1
(32)
=o p (1),
(33)
where (33) follows from (32) by applying Proposition 3 to all observations and also for the
√
p
n
individual groups and noting that √nj → λ j for all j = 1, 2, ..., k. Slutsky’s theorem completes
the proof.
Proof of Proposition 6. Under the null hypothesis, let µ1 = µ2 = · · · = µk = µ and V1 = V2 =
· · · = Vk = V . Using Proposition 4 and since λ j,n → λ j as n → ∞ we find for the denominator
k
λ j,n P
∑ σ̂2 −→
j=1
j
k
λj
∑ σ2 .
j=1
(34)
j
Simple algebraic manipulation shows that the numerator of nUn is
λ j,n λl,n
(V̂ j − V̂l )2
2
2
j<l σ̂ j σ̂l
!2
k λ
k λ
k λ
j,n
j,n
j,n
=n ∑ 2 Ṽ j2 ∑ 2 − ∑ 2 Ṽ j
j=1 σ̂ j
j=1 σ̂ j
j=1 σ̂ j
!
k λ
˜ nλ
˜0
λ
j,n
n
=n ∑ 2 Ṽ 0 Λn −
Ṽ
λ
j,n
k
j=1 σ̂ j
∑
2
n∑
j=1 σ̂
j
37
(35)
under the null hypothesis. Here Ṽ j = V̂ j −V and
λ1,n
Ṽ1
σ̂21
Ṽ2
0
Ṽ = . , Λn = .
..
..
Ṽk
0
λ1
σ21
0
Λ= .
..
0
···
0
λ2,n
σ̂22
.
···
..
.
0
..
.
0
···
λk,n
σ̂2k
..
···
0
0
√
λ1,n
σ̂21
λ2,n
2
σ̂2
˜
, λn = . , sn = .
..
..
√
λk,n
σ̂k
λk,n
σ̂2k
λ1
σ21
λ1,n
√σ̂1
λ2,n
σ̂2
,
√
λ1
√σ1
λ
λ
22
2
0
˜ σ2
σ2
,
λ
=
,
s
=
. .
..
..
..
.
.
√
λ2
σ22
···
.. ..
.
.
λk
σ2k
···
0
0
λk
σ2k
λk
σk
Applying Theorem 1 to the individual groups we find
Zn =
Continuing from (35), we see that
√ 21
D
nΛn Ṽ −→ N(0, Ik ).
nUn
λ j,n
k
∑ j=1 2
σ̂ j
is Zn0 An Zn with An = Ik − sn (s0n sn )−1 s0n , and
P
An −→ A = Ik − s(s0 s)−1 s0 .
(36)
Here A is a symmetric idempotent matrix and is an orthogonal projection into the space orthogonal to the column space of s. The rank of A is same as its trace and equals k − 1 by the property
of orthogonal projector matrices. Applying the continuous mapping theorem, Slutsky’s theorem
and (36),
nUn
λ j,n
∑kj=1 σ̂2
j
D
−→ Z 0 AZ,
(37)
where the limiting distribution is a quadratic form of normal random variables and is therefore
distributed as a χ2 distribution with degrees of freedom equal to rank of A, which is k − 1.
38
Proof of Proposition 7. For proving consistency of the pooled Fréchet mean µ̂ p , the arguments
are essentially the same as those in the proof of Lemma 1 in Petersen and Müller (2017). Consider
1
Mn (ω) =
n
k
k
∑ ∑d
2
(ω,Yi j ),
M(ω) =
j=1 i∈G j
∑ λ j E j (d 2(ω,Y j )).
j=1
For each ω ∈ Ω,
k
Mn (ω) =
1
P
∑ λ j,n n j ∑ d 2(ω,Yi j ) −→ M(ω),
j=1
i∈G j
by the weak law of large numbers applied to the individual groups, using lim λ j,n = λ j for each
n→∞
j = 1, . . . , k. From |Mn (ω1 ) − Mn (ω2 )| ≤ 2 diam(Ω)d(ω1 , ω2 ) we find that Mn is asymptotically
equicontinuous in probability, as
sup
|Mn (ω1 ) − Mn (ω2 )| = O p (δ),
d(ω1 ,ω2 )<δ
which allows us to use Theorem 1.5.4 in Wellner and van der Vaart (1996) to conclude that
Mn converges weakly to M in l ∞ (Ω). By applying 1.3.6 of Wellner and van der Vaart (1996)
we have that supω∈Ω |Mn (ω) − M(ω)| converges to zero in probability. By our assumptions and
Corollary 3.2.3 in Wellner and van der Vaart (1996) this implies that
P
µ̂ p −→ µ p .
(38)
For proving consistency of Fn it is enough to prove the consistency of V̂p as the consistency of
the groupwise Fréchet variances follows from our earlier results. Observe that
V̂p −
1
n
k
∑ ∑ d 2(µ p,Yi j )
≤ 2 diam(Ω) d(µ̂ p , µ p ) = oP (1),
j=1 i∈G j
39
(39)
which implies
V̂p −Vp ≤ V̂p −
1
n
k
∑∑
d 2 (µ p ,Yi j ) +
j=1 i∈G j
1
n
k
∑ ∑ d 2(µ p,Yi j ) −Vp
= oP (1).
j=1 i∈G j
Here the first term is oP (1) by (39) and the second term is also oP (1) by the weak law of large
numbers applied to the individual groups, whence V̂ converges in probability to Vp . Clearly Vp −
∑kj=1 λ jV j = ∑kj=1 λ j E j (d 2 (µ p ,Y j )) − E j (d 2 (µ j ,Y j )) is nonnegative, as for each individual
group we have
E j (d 2 (µ p ,Y j )) − E j (d 2 (µ j ,Y j )) ≥ 0,
with equality with zero holding only if µ p = µ j for all j = 1, . . . , k. Therefore F is always
nonnegative and is zero if and only of µ p = µ j for all j = 1, . . . , k.
Proof of Theorem 3. This proof relies on the following auxiliary result on uniform consistency
of estimators V̂p , V̂ j and σ̂2j for all j = 1, 2, . . . , k, under the assumption of boundedness of the
entropy integral for the space Ω.
Lemma 1. Under the assumptions of Theorem 3, it holds for all ε > 0 and for all j = 1, 2, . . . , k,
where we denote any of the V̂ j and V j by V̂ and V respectively and any of the σ̂ j and σ j by σ̂
and σ respectively, that
(A) lim supP∈P P( V̂ −V > ε) = 0;
n→∞
(B) lim supP∈P P( σ̂2 − σ2 > ε) = 0;
n→∞
(C) lim supP∈P P( V̂p −Vp > ε) = 0.
n→∞
In all of the above statements the supremum is taken with respect to the underlying true probability measure P of Y1 ,Y2 , . . . ,Yn , over the class P of possible probability measures which
generate random observations from Ω.
40
The proof of Lemma 1 can be found in the following subsection titled Additional Proofs.
With similar notation as in the proof of Proposition 6, define
Ṽ j = V̂ j −V j
for j = 1, . . . , k. The statistic Un then can be represented as
λ j,n λl,n
(V̂ j − V̂l )2 = Ũn + ∆n ,
2
2
j<l σ̂ j σ̂l
Un =
∑
λ j,n λl,n
(Ṽ j − Ṽl )2
σ̂2j σ̂2l
where Ũn = ∑ j<l
and ∆n = ∑ j<l
λ j,n λl,n
(V j −Vl )2 +
σ̂2j σ̂2l
2 ∑ j<l
Ṽl ). By replicating the steps in the proof of Proposition 6 we find that
λ j,n λl,n
(V j −Vl )(Ṽ j −
σ̂2j σ̂2l
nŨn
∑kj=1
λ j,n
σ̂2j
converges in
distribution to χ2(k−1) asymptotically. Moreover as a consequence of Lemma 1 and by continuity
we have that
∆n
λ j,n
∑kj=1 2
σ̂ j
+
Fn2
k
∑ j=1 λ2j,n σ̂2j
is a uniformly consistent estimator of
U
λj
∑kj=1 2
σj
+
F2
.
∑kj=1 λ2j σ2j
For sets {An } defined as
An =
∆n
+
λ
∑kj=1 j,n2
σ̂ j
the uniform consistency of
σj
∆n
∑kj=1
Fn2
1 U
<
k
2
2
2 ∑k λ j
∑ j=1 λ j,n σ̂ j
j=1 2
λ j,n
σ̂2j
+
Fn2
k
∑ j=1 λ2j,n σ̂2j
F2
+ k
∑ j=1 λ2j σ2j
implies that as n → ∞,
sup P(An )
P∈P
≤ sup P
P∈P
∆n
∑kj=1
λ j,n
σ̂2j
+
Fn2
U
F2
F2
1 U
−
−
>
+
→ 0.
k
k
k
2
2
2
2
2
2
λ
λ
j
j
2 ∑k
λ
σ
∑ j=1 λ j,n σ̂ j ∑kj=1 2 ∑ j=1 λ j σ j
∑
j=1
j
j
2
j=1
σj
σj
Writing cα for the (1 − α)-th quantile of χ2(k−1) distribution, we can now represent the limiting
41
power function as
cα
Fn2
Ũn + ∆n
P(Rn,α ) =P
>
+
k
2
2
λ
j,n
n
∑ j=1 λ j,n σ̂ j
∑kj=1 σ̂2
j
≥P
Ũn
∑kj=1
λ j,n
σ̂2j
1 U
+
2 ∑k
λj
j=1 σ2
j
≥P
∑kj=1
λ j,n
σ̂2j
λj
j=1 σ2
j
+
nŨn
∑kj=1
n U
> cα −
2 ∑k
λ j,n
σ̂2j
F2
cα C
> , An
k
2
2
n
∑ j=1 λ j σ j
n U
> cα −
2 ∑k
nŨn
≥P
+
λj
j=1 σ2
j
+
F2
− P (An )
k
2
2
∑ j=1 λ j σ j
F2
− sup P (An ) .
k
2
2
∑ j=1 λ j σ j
P∈P
This implies for the sequence of hypotheses {Hn },
lim βHn
n→∞
= lim inf P (Rn,α )
n→∞ Hn
≥ lim P
n→∞
nŨn
∑kj=1
λ j,n
σ̂2j
n→∞
Since
that
nŨn
∑kj=1
λ j,n
σ̂2j
n bn
> cα −
2 ∑k
+ a2n − lim
λj
n→∞
j=1 σ2
j
nŨn
λ j,n
∑kj=1 σ̂2
j
sup P (An )
P∈P
= lim P
n bn
> cα −
2 ∑k
λj
j=1 σ2
j
+ a2n .
converges in distribution to a χ2(k−1) random variable, we find that if an is such
√
nan → ∞ or if bn is such that nbn → ∞, then lim βHn = 1, completing the proof.
n→∞
42
S.2 Additional Proofs
Proof of Lemma 1. (A). Since the proof is similar for all j = 1, 2, . . . , k, we ignore the index j
for the proof. Observe that
P( V̂ −V > ε) = P
!
1 n 2
1 n 2
1 n 2
∑ d (µ̂,Yi) − n ∑ d (µ,Yi) + n ∑ d (µ,Yi) − E(d 2(µ,Y )) > ε
n i=1
i=1
i=1
≤ An + Bn
with An and Bn being respectively equal to P
and P
1 n
2
2
n ∑i=1 d (µ,Yi ) − E(d (µ,Y ))
1 n
1 n
2
2
n ∑i=1 d (µ̂,Yi ) − n ∑i=1 d (µ,Yi )
> ε/2
> ε/2 .
Observing that infω∈Ω E(d 2 (ω,Y ) − d 2 (µ,Y )) = 0 we have,
n
n
n
!
n
1
1
1
1
d 2 (µ̂,Yi ) − ∑ d 2 (µ,Yi ) = inf
d 2 (ω,Yi ) − ∑ d 2 (µ,Yi )
∑
∑
ω∈Ω n i=1
n i=1
n i=1
n i=1
!
1 n 2
d (ω,Yi ) − d 2 (µ,Yi ) − inf E(d 2 (ω,Y ) − d 2 (µ,Y ))
= inf
∑
ω∈Ω
ω∈Ω n i=1
≤ sup
ω∈Ω
1 n 2
d (ω,Yi ) − d 2 (µ,Yi ) − E(d 2 (ω,Y ) + E(d 2 (µ,Y )) = sup |Mn (ω)| ,
∑
n i=1
ω∈Ω
with Mn (ω) = 1n ∑ni=1 d 2 (ω,Yi ) − d 2 (µ,Yi ) − E(d 2 (ω,Y ) + E(d 2 (µ,Y )). Replicating the
2
√ (Ω) , where J as
steps in proof of Proposition 3, one obtains E (supω∈Ω |Mn (ω)|) ≤ 2Jdiam
n
R1p
given by J = 0 1 + log N(ε, Ω, d)dε is the finite entropy integral of Ω and 2diam2 (Ω)
is the envelope for the function class {d 2 (ω, ·) − d 2 (µ, ·) : ω ∈ Ω} which indexes the
empirical process Mn (ω). By Markov’s inequality,
An ≤
4Jdiam2 (Ω)
√
.
nε
43
(40)
Next we observe that
1 n 2
1 n 2
2
d
(µ,Y
)
−
E(d
(µ,Y
))
≤
sup
d (ω,Yi ) − E(d 2 (ω,Y )) = sup |Hn (ω)| ,
i
∑
∑
n i=1
n
ω∈Ω
ω∈Ω
i=1
where Hn (ω) = 1n ∑ni=1 d 2 (ω,Yi ) − E(d 2 (ω,Y )). By similar arguments as before we can
see that E (supω∈Ω |Hn (ω)|) ≤
2
Jdiam
√ (Ω) ,
n
where J is the finite entropy integral of Ω and
diam2 (Ω) is the envelope of the function class {d 2 (ω, ·) : ω ∈ Ω}, which indexes the
empirical process Hn (ω). Again by Markov’s inequality,
B≤
2Jdiam2 (Ω)
√
.
nε
(41)
From equations (40) and (41),
sup P(|V̂ −V | > ε) ≤
P∈P
6Jdiam2 (Ω)
√
→0
nε
as n → ∞,
(42)
completing the proof of (A).
(B). Since the proof is similar for all j = 1, 2, . . . , k, we ignore the index j for the proof. For
proving the uniform consistency of σ̂2 it is enough to prove just the uniform consistency
of n1 ∑ni=1 d 4 (µ̂,Yi ) to E(d 4 (µ,Y )) and the rest follows from Lemma 1 (A) by continuity.
Similarly to the proof of (A), we find
P
=P
!
1 n 4
∑ d (µ̂,Yi) − E(d 4(µ,Y )) > ε
n i=1
!
1 n 4
1 n 4
1 n 4
∑ d (µ̂,Yi) − n ∑ d (µ,Yi) + n ∑ d (µ,Yi) − E(d 4(µ,Y )) > ε
n i=1
i=1
i=1
≤An + Bn ,
where
44
An = P
Bn = P
!
1 n 4
1 n 4
∑ d (µ̂,Yi) − n ∑ d (µ,Yi) > ε/2 ,
n i=1
i=1
!
n
1
4
4
∑ d (µ,Yi) − E(d (µ,Y )) > ε/2 .
n i=1
Observe that in analogy to the proof of (A),
1 n 4
1 n 4
1 n 2
1 n 2
2
d
(µ̂,Y
)
−
d
(µ,Y
)
≤
2diam
(Ω)
d
(µ̂,Y
)
−
i
i
i
∑
∑
∑
∑ d (µ,Yi)
n i=1
n i=1
n i=1
n i=1
implies
An ≤
8Jdiam4 (Ω)
√
.
nε
(43)
Next we observe
1 n 4
1 n 4
4
d
(µ,Y
)
−
E(d
(µ,Y
))
≤
sup
d (ω,Yi ) − E(d 4 (ω,Y )) = sup |Kn (ω)| ,
i
∑
∑
n i=1
n
ω∈Ω
ω∈Ω
i=1
(44)
where Kn (ω) = n1 ∑ni=1 d 4 (ω,Yi ) − E(d 4 (ω,Y )). Similar arguments as in proof of (A)
imply E (supω∈Ω |Kn (ω)|) ≤
4
Jdiam
√ (Ω) ,
n
where J is the finite entropy integral of Ω and
diam4 (Ω) is the envelope of the function class {d 4 (ω, ·) : ω ∈ Ω}, which indexes the
empirical process Kn (ω). By Markov’s inequality,
Bn ≤
2Jdiam4 (Ω)
√
,
nε
(45)
and from equations (43) and (45),
sup P
P∈P
!
1 n 4
10Jdiam4 (Ω)
4
√
d
(µ̂,Y
)
−
E(d
(µ,Y
))
>
ε
≤
→0
i
∑
n i=1
nε
This completes the proof.
45
as n → ∞.
(46)
(C). Note that
P V̂p −Vp > ε
1
n
=P
k
1
∑ ∑ d 2(µ̂ p,Yi) − d 2(µ p,Yi) + n
j=1 i∈G j
≤ An + Bn ,
k
!
d 2 (µ p ,Yi ) − ∑ λ j E j d 2 (µ p ,Y j ) > ε
k
∑∑
j=1 i∈G j
j=1
with
1
n
An = P
1
n
Bn = P
k
1
k
∑ ∑ d 2(µ̂ p,Yi) − n ∑ ∑ d 2(µ p,Yi)
j=1 i∈G j
>
j=1 i∈G j
k
k
ε
2
!
ε
∑ ∑ d 2(µ p,Yi) − ∑ λ j E j d 2(µ p,Y j ) > 2
j=1 i∈G j
j=1
,
!
.
Since infω∈Ω ∑kj=1 λ j E j (d 2 (ω,Y j ) − d 2 (µ p ,Y j )) = 0,
1
n
k
∑ ∑ d 2(µ̂ p,Yi) − d 2(µ p,Yi)
= inf
ω∈Ω
j=1 i∈G j
= inf
ω∈Ω
1
n
1
n
∑ ∑ d 2(ω,Yi) − d 2(µ p,Yi)
j=1 i∈G j
!
k
∑ ∑d
2
2
!
k
k
λ j E j (d 2 (ω,Y j ) − d 2 (µ p ,Y j ))
∑
ω∈Ω
(ω,Yi ) − d (µ p ,Yi ) − inf
j=1 i∈G j
j=1
≤ sup |Hn (ω)| ,
ω∈Ω
where
1
Hn (ω) =
n
k
k
∑ ∑ {d
j=1 i∈G j
2
2
(ω,Yi ) − d (µ p ,Yi )} − ∑ λ j {E j (d 2 (ω,Y j )) − E j (d 2 (µ p ,Y j ))}
j=1
k
k
= ∑ λ j,n Mn j (ω) + ∑ λ j,n − λ j {E j (d 2 (ω,Y j )) − E j (d 2 (µ p ,Y j ))}
j=1
j=1
46
and
1
∑ {d 2(ω,Yi) − d 2(µ p,Yi) − E j (d 2(ω,Y j )) + E j (d 2(µ p,Y j ))}.
n j i∈G
j
Mn j (ω) =
Using similar arguments as in the proofs of (A) and (B) for the individual groups, we
control the behavior of Hn (ω) by defining function classes {d 2 (ω, y) − d 2 (µ p , y) : ω ∈ Ω},
to obtain for some constants a1 , a2 > 0,
E
sup |Hn (ω)|
ω∈Ω
k
≤
∑ λ j,nE
ω∈Ω
j=1
k
≤
∑ λ j,n
j=1
k
sup |Mn j (ω)| + ∑ λ j,n − λ j E j (d 2 (ω,Y j )) − E j (d 2 (µ p ,Y j ))
j=1
k
k
a1
2Jdiam2 (Ω)
+ 2diam2 (Ω) ∑ λ j,n − λ j ≤ √ + a2 ∑ λ j,n − λ j .
√
nj
n
j=1
j=1
By Markov’s inequality,
2
An ≤
ε
k
a1
√ + a2 ∑ λ j,n − λ j
n
j=1
!
.
(47)
Next observe that
1
n
k
∑∑
j=1 i∈G j
k
d 2 (µ p ,Yi ) − ∑ λ j E j d 2 (µ p ,Y j )
k
k
≤
j=1
∑ λ j,nKn j (µ p) +
j=1
∑ (λ j,n − λ j )E j
d 2 (µ p ,Y j )
j=1
k
k
≤ ∑ λ j,n sup Kn j (ω) + ∑ (λ j,n − λ j ) diam2 (Ω),
j=1
where Kn j (ω) =
1
nj
ω∈Ω
j=1
∑i∈G j d 2 (ω,Yi ) − E j (d 2 (ω,Y j )).
By similar arguments as before, E supω∈Ω |Kn j (ω)| ≤
47
Jdiam2 (Ω)
√
.
nj
By Markov’s inequal-
ity, for some constants b1 , b2 > 0,
2
Bn ≤
ε
k
b
√1 + b2 ∑ λ j,n − λ j
n
j=1
!
.
(48)
From equations (47) and (48),
2
sup P V̂p −Vp > ε ≤
ε
P∈P
k
(a1 + b1 )
√
+ (a2 + b2 ) ∑ λ j,n − λ j
n
j=1
which completes the proof of (C).
48
!
→0
as n → ∞,
| 10math.ST
|
arXiv:1709.04066v1 [math.GR] 12 Sep 2017
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED
ARTIN GROUPS
NOEL BRADY AND IGNAT SOROKO
Abstract. We show that for each positive integer k there exist right-angled
Artin groups containing free-by-cyclic subgroups whose monodromy automorphisms grow as nk . As a consequence we produce examples of right-angled
Artin groups containing finitely presented subgroups whose Dehn functions
grow as nk`2 .
Contents
1. Introduction
2. Preliminaries on growth
3. Bounding the Dehn function of the Bieri double
4. Cube complexes
4.1. Special cube complexes
4.2. Morse theory for cube complexes
5. Groups Gm,k
5.1. LOG definition
5.2. CATp0q structure for Gm,k
5.3. Free-by-cyclic structure
6. Constructing a special cover for Gm,m
6.1. The permutation representation
6.2. A p2m ` 1q–torus cover
6.3. Exploring hyperplane pathologies
7. Proof of Main Theorems
8. Growth of φ and φ´1
8.1. Upper bounds for the growth of φ, φ´1
8.2. Lower bounds for the growth of φ, φ´1
8.3. Lower bounds for the growth of φab
9. Open questions
References
1
4
8
12
12
13
14
14
15
16
19
19
23
25
28
30
31
35
36
37
38
1. Introduction
There has been intense interest in subgroups of right-angled Artin groups (RAAGs)
in recent years. This is due largely to the work of Ian Agol, Dani Wise and others
on the virtual fibering question in 3–manifold topology.
Date: September 14, 2017.
2010 Mathematics Subject Classification. Primary 20E05, 20F65, 20F67, 57M20.
1
2
NOEL BRADY AND IGNAT SOROKO
In [1] Agol showed that if M 3 is a compact, oriented, irreducible 3–manifold with
χpM q “ 0 and π1 pM q is a subgroup of a RAAG, then M virtually fibers. In [21]
Haglund and Wise showed that fundamental groups of special cubical complexes
are subgroups of RAAGs. Building on this machinery, Agol went on to solve the
virtual fibering conjecture in [2]. The fundamental result in [2] is that non-positively
curved cubical complexes with hyperbolic fundamental groups are virtually special.
In this paper we consider two questions about subgroups of RAAGs.
The first question asks which free-by-cyclic groups virtually embed in RAAGs.
In [19, 20] Hagen and Wise show that hyperbolic free-by-cyclic groups virtually
embed in RAAGs. It is also known that F2 ¸ Z groups virtually embed in RAAGs.
The hyperbolic free-by-cyclic examples all have exponentially growing monodromy
automorphisms and the F2 ¸ Z groups have exponential or linear monodromy automorphisms. In [18], Gersten gives an explicit example of an F3 ¸ Z group which
does not virtually embed in a RAAG. The group considered by Gersten is not a
CAT(0) group, and this prompts the following open question. Does every CAT(0)
free-by-cyclic group virtually embed in a RAAG? The family of the so-called Hydra
groups considered in [17] provides a test case for this question where the monodromy
automorphisms grow polynomially with arbitrary degree. While we haven’t proved
that Hydra groups virtually embed in RAAGs (this is a topic of an ongoing research
of the second-named author), we construct analogues of the Hydra groups (where
the base Z2 subgroup is replaced by a more complicated RAAG) which are CAT(0)
free-by-cyclic with polynomially growing monodromy automorphisms of arbitrary
degree and which are virtually special.
Theorem A. For each positive even integer m there exist virtually special free-bycyclic groups Gm,m – F2m ¸φ Z with growth function grφ pnq „ nm and Gm,m´1 –
F2m´1 ¸φ1 Z with growth function grφ1 pnq „ nm´1 .
Since finite index subgroups of free-by-cyclic groups are again free-by-cyclic and
since special groups embed into RAAGs we obtain the following corollary.
Corollary A. For each positive integer k there exist a right-angled Artin group
containing a free-by-cyclic subgroup whose monodromy automorphism has growth
function „ nk .
The second question asks what kinds of functions arise as Dehn functions of
finitely presented subgroups of RAAGs. Recall that Dehn functions capture the
isoperimetric behavior of Cayley complexes of groups. A lot is known about Dehn
functions of arbitrary finitely presented groups (see [8, 5, 26]). For example, a
group is hyperbolic if and only if its Dehn function is linear. CAT(0) groups and, in
particular, RAAGs, have Dehn functions which are either quadratic or linear. In [6]
there are examples of CAT(0) groups which contain finitely presented subgroups
whose Dehn functions are of the form nα for a dense set of α P r2, 8q. Restricting
to the case where the ambient groups are RAAGs it gets harder to find examples
of subgroups with a wide variety of Dehn functions. In [7] there are examples of
finitely presented Bestvina–Brady kernels of RAAGs which have polynomial Dehn
functions of degree 3 or 4. In [16] it is shown that the Dehn function of such kernels
of RAAGs are at most quartic. In [11] Bridson provides an example of a RAAG
containing a finitely presented group with exponential Dehn function. Our second
result shows that there are finitely presented subgroups of RAAGs whose Dehn
functions are polynomial of arbitrary degree.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
3
Theorem B. For each positive integer k there exists a right-angled Artin group
which contains a finitely presented subgroup with Dehn function » nk .
This is the extent of what is currently known about the isoperimetric behavior
of subgroups of RAAGs; it would be very interesting if one could produce examples
with other types of Dehn functions.
Our paper is organized as follows.
In section 2 we introduce the growth functions of automorphisms and prove
a folklore result (Proposition 2.4) that the growth of an automorphism of a free
group is invariant under taking powers of the automorphism and under passing to
a subgroup of finite index. In doing that, we rely on the Gilbert Levitt’s Growth
Theorem [24] (whose proof uses train-track machinery). We also provide an example
due to Yves Cornulier which demonstrates that for arbitrary groups the invariance
of the growth function under passing to a subgroup of finite index does not hold.
Section 3 is devoted to providing estimates for the Dehn function of the Bieri
double of a free-by-cyclic group in terms of the growth of the monodromy automorphism. We use Bridson’s lower bound from [12] (Proposition 3.3) and adapt the
proof of the upper bound, given in [15] for the abelian-by-cyclic setting, to the case
of free-by-free groups needed for our construction (Proposition 3.4). Using these
estimates, we show later in section 7 that for the polynomially growing monodromy
automorphisms involved in our construction, the upper and lower bounds on the
Dehn function of the Bieri double actually coincide. If the monodromy automorphism has polynomial growth of order nk , then the Dehn function of the Bieri
double grows like nk`2 .
In section 4 we recollect all the relevant definitions related to the Morse theory
on groups and special cubical complexes, which will be used in sections 5 and 6.
In section 5 we introduce the free-by-cyclic groups Gm,k , which play the central
role in our construction. We define these groups through LOG notation, which is
a graphical tool to encode conjugation relations. We prove that the group Gm,k is
CAT(0) and free-by-cyclic, and exhibit explicit formulas for its monodromy automorphism (Proposition 5.4). We defer until section 8 the proof that this automorphism has growth „ nk .
The goal of section 6 is to exhibit a finite special cover for the presentation
complex Km,m of the group Gm,m , for arbitrary even m. The construction is done
in several stages. First, for arbitrary m, we engineer a certain right action of
Gm,m on a set of cardinality 22m`1 , which may be thought of as the 0–skeleton
pm Ñ
of a p2m ` 1q–dimensional torus T2m`1 . This action defines a finite cover K
Km,m , which cellularly embeds into the 2–skeleton of T2m`1 (Proposition 6.2).
p m is a subcomplex of a product of graphs, it is free from three out of four
Since K
hyperplane pathologies in the definition of a special cube complex (Proposition 6.4).
To eliminate the fourth hyperplane pathology we observe that for even values of m,
the complex Km,m is a V H-complex in the terminology of [21]. It follows that there
p m , such that K m is a special square complex
exist another finite cover K m Ñ K
(Proposition 6.6).
In section 7 we bring all the pieces together and prove Theorems A and B. For
even values of m, groups Gm,m are virtually special free-by-cyclic with the monodromy automorphism growing as nm . To obtain growth functions of odd degree,
we observe that the presentation 2–complex Km,m´1 of the free-by-cyclic group
4
NOEL BRADY AND IGNAT SOROKO
Gm,m´1 is a combinatorial subcomplex of Km,m´1 and it is obtained by deleting
the hyperplane corresponding to the last generator a2m`1 . Thus the pullback of
Km,m´1 in K m is a finite special square complex covering Km,m´1 . This makes
Gm,m´1 a virtually special free-by-cyclic group with the monodromy automorphism
growing as nm´1 .
To prove theorem B, we look at the Bieri double of the special (free-by-cyclic)
finite index subgroups H of Gm,m (Gm,m´1 ), and prove that the lower and the
upper bounds for its Dehn function coincide, and are of the order nm`2 (resp.,
nm`1 ). This Bieri double naturally embeds into a RAAG, whose underlying graph
is the join of the underlying graph for the RAAG containing H and the empty
graph on two vertices.
In section 8 we provide the computation of the growth function for the monodromy automorphism of Gm,k and its abelianization.
Finally, in section 9 we list two open questions related to the study in this paper.
2. Preliminaries on growth
In what follows we will consider functions up to the following equivalence relations.
Definition 2.1. Two functions f, g : r0, 8q Ñ r0, 8q are said to be „ equivalent if
f ĺ g and g ĺ f , where f ĺ g means that there exist constants A ą 0 and B ě 0
such that f pnq ď Agpnq ` B for all n ě 0.
Definition 2.2. Two functions f, g : r0, 8q Ñ r0, 8q are said to be » equivalent
if f ă
“ g and g ă
“ f , where f ă
“ g means that there exist constants A, B ą 0 and
C, D, E ě 0 such that f pnq ď AgpBn ` Cq ` Dn ` E for all n ě 0.
We extend these equivalence relations to functions N Ñ r0, 8q by assuming them
to be constant on each interval rn, n ` 1q.
Remark 2.3. Notice that f ĺ g implies f ă
“ g and f „ g implies f » g. However,
the relation „ is strictly finer than », as the latter identifies all single exponential
functions, i.e. k n » K n for k, K ą 1, whereas the relation „ does not. We will use
the relations „, ĺ when dealing with growth functions of automorphisms and the
relations », ă
“ when discussing Dehn functions of groups (as is done traditionally).
The term Dn in the above definition of ă
“ is essential for proving the equivalence
of Dehn functions under quasi-isometries.
Let F be a free group of finite rank k with a finite generating set A. Let dA px, yq
be the associated word metric on F . If ψ : G Ñ G is an automorphism, we define
grψ,A pnq :“ max }ψ n paq}A ,
aPA
where }g}A is equal to dA p1, gq for g P F .
The following properties of grψ,A will be used in the sequel.
Proposition 2.4. Let F be a free group of finite rank with a finite generating set
A, and let ψ be an automorphism of F . Then
(i) for each finite generating set B of F , grψ,B „ grψ,A ;
(ii) for each d P N, grψ,A „ grψd ,A ;
(iii) for each finite index subgroup H ď F invariant under ψ with a finite generating set B Ă H, we have grψ,A „ grψ|H ,B .
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
5
Proof. Let A “ ta1 , . . . , aN u, B “ tb1 , . . . , bM u. Since both sets A and B generate F , there exist words wi and vj such that ai “ wi pb1 , . . . , bM q and bj “
vj pa1 , . . . , aN q, for all 1 ď i ď N , 1 ď j ď M . Let constants K and L denote the maximal lengths of wi , vj , respectively, i.e. K “ max1ďiďN }wi }B ,
L “ max1ďjďM }vj }A . Then, obviously, for all i, j, n, one has:
}ψ n pai q}B ď K ¨ }ψ n pai q}A
}ψ n pbj q}A ď L ¨ }ψ n pbi q}B .
and
Now fix arbitrary 1 ď j ď M and assume without loss of generality that
vj pa1 , . . . , aN q “ aεi11 . . . aεiLL , for values 1 ď i` ď N and ε` “ ˘1 or 0. Then
}ψ n pbj q}B “ }ψ n paεi11 . . . aεiLL q}B ď }ψ n pai1 q}B ` ¨ ¨ ¨ ` }ψ n paiL q}B ď
K}ψ n pai1 q}A ` ¨ ¨ ¨ ` K}ψ n paiL q}A ď KL max }ψ n pai q}A “ KL grψ,A pnq.
1ďiďN
n
Therefore, grψ,B pnq “ max1ďjďM }ψ pbj q}B ď KL grψ,A pnq, and, by symmetry,
grψ,A pnq ď LK grψ,B pnq. This proves (i).
Before proving parts (ii) and (iii), we state following remarkable result of Gilbert
Levitt:
Levitt’s Growth Theorem ([24, Cor. 6.3]). Let F be a free group of finite rank
with a free generating set A. Given α P AutpF q and g P F , there exist λ ě 1, an
integer m ě 0 and constants A, B ą 0 such that the word length }αn pgq}A satisfies:
@n P N,
Aλn nm ď }αn pgq}A ď Bλn nm .
Consider a sequence of growth parameters pλi , mi q from the Levitt’s Growth
Theorem corresponding to the generators a1 , . . . , aN , so that for each 1 ď i ď N
there exist constants Ai , Bi ą 0 such that
Ai λni nmi ď }ψ n pai q}A ď Bi λni nmi
for all n P N.
Order these parameters lexicographically: pλi , mi q ă pλj , mj q if and only if λi ă λj
or λi “ λj and mi ă mj . Clearly, pλi , mi q ă pλj , mj q if and only if λnj nmj {λni nmi Ñ
8 as n Ñ 8. Pick 1 ď i0 ď N such that pλi0 , mi0 q is maximal with respect to this
order. Then for any constants C1 , C2 ą 0 and arbitrary 1 ď i ď N we have:
C1 λni nmi ! C2 λni0 nmi0 ,
which means that the left-hand side is less than or equal to the right-hand side for
all large enough n P N.
To prove (ii) in one direction, notice that for any 1 ď i ď N ,
˘
B λd dmi `
mi
}pψ d qn pai q}A ď Bi λdn
“ pBi λdi dmi qλni nmi ! i Aii
Ai0 λni0 nmi0 ď
i pdnq
0
mi
Bi λd
id
Ai0
}ψ n pai0 q}A .
Hence, there exist a constant Cbig ě 0 such that
grψd ,A pnq “ max }pψ d qn pai q}A ď D grψ,A pnq ` Cbig ,
1ďiďN
where D “ max1ďiďN Bi λdi dmi {Ai0 . Thus, grψd ,A ĺ grψ,A .
In the opposite direction, for any 1 ď i ď N we have:
`
˘
mi0
mi
}ψ n pai q}A ď Bi λni nmi ď Bi λdn
! ABii Ai0 λdn
ď
i0 pdnq
i pdnq
0
Bi
Ai0
}ψ dn pai0 q}A .
6
NOEL BRADY AND IGNAT SOROKO
By taking maximum, we get for arbitrary n P N:
grψ,A pnq “ max }ψ n pai q}A ď D}ψ dn pai0 q}A ` Cbig ď D grψd ,A pnq ` Cbig
1ďiďN
for D “ maxi Bi {Ai0 and some Cbig ě 0. This proves that grψ,A ĺ grψd ,A and
hence that grψ,A „ grψd ,A .
To prove (iii) in one direction, notice first that H, being of finite index in F ,
is quasi-convex in F (see e.g. [14, III.3.5]). Hence for any h P H, one has }h}B ď
C}h}A for some C ą 0. Writing each bj P B as a word bj “ vj pa1 , . . . , aN q and
setting L “ max1ďjďM }vj }A , we obtain for arbitrary 1 ď j ď M :
}ψ n pbj q}B ď C}ψ n pbj q}A ď CL max }ψ n pai q}A “ CL grψ,A pnq,
1ďiďN
n
so that grψ|H ,B pnq “ max1ďjďM }ψ pbj q}B ď CL grψ,A pnq, i.e. grψ|H ,B ĺ grψ,A .
In the opposite direction, notice that there exist an integer p ą 0 such that for
every ai P A, we have api P H. As above, let pλi , mi q, Ai , Bi ą 0 be a sequence
of growth parameters for the generators a1 , . . . , aN , and let pλi0 , mi0 q be maximal.
Consider a new generating set B 1 for H, B 1 “ B Y tapi0 u. Then for arbitrary 1 ď
i ď N we have:
`
˘
}ψ n pai q}A ď Bi λni nmi ! ABii Ai0 λni0 nmi0 ď ABii }ψ n pai0 q}A ď
0
0
Bi
Ai0
}ψ n papi0 q}A ď
Bi
Ai0
L}ψ n papi0 q}B1 ,
where L has a similar meaning as above. Here the fourth inequality holds since,
in general, for any automorphism α P AutpF q, any g P F and any p ą 0, one
has }αpgq}A ď }αpg p q}A . (Indeed, one can write αpgq “ uvu´1 with v cyclically
reduced. Then }αpgq} “ 2}u} ` }v}, whereas }αpg p q} “ }uv p u´1 } “ 2}u} ` p}v}.)
By taking maximum, we get for arbitrary n P N:
grψ,A pnq “ max }ψ n pai q}A ď DL}ψ n papi0 q}B1 ` Cbig ď DL grψ|H ,B1 pnq ` Cbig
1ďiďN
for D “ maxi Bi {Ai0 and some Cbig ě 0. This means that grψ,A ĺ grψ|H ,B1 . Since,
by part (i), grψ|H ,B1 „ grψ|H ,B , this proves that grψ,A ĺ grψ|H ,B and part (iii) is
proved.
Remark 2.5. The proof of property (i) of Proposition 2.4 works for automorphisms
of arbitrary finitely generated groups.
Remark 2.6. Property (iii) of Proposition 2.4 does not hold for arbitrary finitely
generated groups. We are grateful to Yves Cornulier for providing the following
example. Let G “ xa, b | aba´1 “ b´1 , a2 “ 1y be the infinite dihedral group. Then
the inner automorphism ib : x ÞÑ bxb´1 has linear growth, but its restriction to
the index 2 subgroup xby is trivial. To see that, observe that aba´1 “ b´1 implies
ab “ b´1 a and hence ba “ ab´1 . Thus bab´1 “ ab´2 and inb paq “ bn ab´n “ ab´2n .
Looking at the Cayley graph of G shows that the element g “ ab´2n is at distance
2n ` 1 from 1, so that ab´2n is a word of minimal length representing element g,
and ib indeed grows linearly on G.
In view of item (i) in Proposition 2.4, we will suppress the dependence on the
generating set and adopt the notation
grψ pnq :“ grψ,A pnq,
for an arbitrary generating set A Ă F .
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
7
For the abelianization Fab “ F {rF, F s – Zk we consider the induced automorphism ψ ab : Fab Ñ Fab and denote tēi u be the generating set of Fab corresponding
to A: ēi “ ai rF, F s, ai P A, i “ 1, . . . , k. For any v P Zk let |v|1 denote the `1 -norm
řk
řk
on Zk viewed as a subset of Ck : if v “ i“1 ci ēi , then |v|1 “ i“1 |ci |. Define
grψab pnq :“ max |pψ ab qn pēi q|1 .
i“1,...,k
Then the following is true:
Lemma 2.7.
grψ pnq ě grψab pnq.
Proof. Let ε : F Ñ Fab be the natural homomorphism. Then
pψ ab qn pēi q “ εpψ n pai qq
and hence the length of the shortest word in generators tēi uki“1 of the element
pψ ab qn pēi q P Zk is no bigger than }ψ n pai q}A . But the former is equal to |pψ ab qn pēi q|1
hence |pψ ab qn pēi q|1 ď }ψ n pai q}A for all i “ 1, . . . , k. By taking maximum, we get
the required inequality.
By embedding Zk into Ck we may consider Ck as a vector space with the basis
tēi uki“1 . Now let A be a linear operator on Ck given in basis tēi uki“1 by the matrix
řk
paij qki,j“1 , and let |v|8 denote the `8 -norm on Ck : if v “ i“1 ci ēi , then |v|8 “
maxi“1,...,k |ci |. Consider two norms on EndpCk q, one is the operator norm with
respect to `8 :
|Av|8
}A}op “ sup
“ sup |Av|8 ,
v‰0 |v|8
|v|8 “1
2
and another one is the supremum norm, which is the `8 -norm on the space Ck :
}A}sup “
max
i,j“1,...,k
|aij |.
Lemma 2.8.
max |Aēi |1 ě }A}sup .
i“1,...,k
Proof.
max |Aēi |1 ě max |Aēi |8 “ max |aij | “ }A}sup .
i
i
i,j
The following fact is well-known (see [22, Cor. 5.4.5]):
Lemma 2.9. There exist constants C1 , C2 ą 0 such that
C1 }A}op ď }A}sup ď C2 }A}op .
Corollary 2.10. The growth function
n
grsup
A : n ÞÝÑ }A }sup
is „ equivalent to the growth function
n
grop
A : n ÞÝÑ }A }op .
The following results are proved in [13, Proof of Th. 2.1]:
Lemma 2.11. The „ equivalence class of the function grop
A depends only on the
conjugacy class of A in GLpk, Cq.
8
NOEL BRADY AND IGNAT SOROKO
In view of Corollary 2.10 and Lemma 2.11, we need only to consider the growth
of the Jordan normal forms of matrices A.
Lemma 2.12 ([13, Th. 2.1]). Suppose that J is a matrix in the Jordan normal
c´1
form with all eigenvalues equal to 1. Then grsup
, where c is the maximal
J pnq „ n
size of Jordan blocks of J.
Combining all of the above, we get:
Corollary 2.13. Let ψ be an automorphism of a free group F . If the abelianization
ψ ab has all eigenvalues equal to 1, and c is the size of the largest Jordan block in
the Jordan normal form J for ψ ab , then
grψ pnq ľ nc´1
and
grψab pnq ľ nc´1 .
Proof. Indeed,
grψ pnq ě grψab pnq
(by Lemma 2.7)
ab n
(by Lemma 2.8)
ě }pψ q }sup
ab n
ě C1 }pψ q }op
(for some C1 ą 0, by Lemma 2.9)
n
(by Lemma 2.11)
c´1
(by Lemma 2.12).
„ }J }op
„n
3. Bounding the Dehn function of the Bieri double
In this section we outline what is known about the upper and the lower bounds
for the Dehn function of a Bieri double group. The lower bound was established
in [12, Lemma 1.5] (see Proposition 3.3 below). The argument for the upper bound
(see Proposition 3.4 below) follows the outline of [15, Theorem 5.1]. In the latter
paper the argument is given in the setting of abelian-by-cyclic groups; we adapt
this reasoning to the free-by-free setting.
Definition 3.1. (Bieri double) Let G be a free-by-cyclic group G “ F ¸ψ Z. The
Bieri double of G is the group ΓpGq “ G ˚F G.
If G – xA, t | tat´1 “ ψpaq for all a P Ay then ΓpGq – xA, s, t | sas´1 “
ψpaq, tat´1 “ ψpaq for all a P Ay. If one denotes F ps, tq the free group on the
generating set ts, tu and pψq : F ps, tq Ñ AutpF pAqq the homomorphism given on
the generators by s ÞÑ ψ, t ÞÑ ψ, then ΓpGq – F pAq ¸pψq F ps, tq.
Definition 3.2. (Dehn function) Let a group Γ be given by a finite presentation
P “ xA | Ry. For each word w lying in the normal closure of R in the free group
F pAq, define
Areapwq :“ min N | w “
F pAq
N
ź
(
˘
x´1
.
i ri xi with xi P F pAq, ri P R
i“1
The Dehn function of P is the function δP : N Ñ N defined by
δP pnq :“ maxtAreapwq | w “ 1, }w}A ď nu.
Γ
where }w}A denotes the length of the word w in generators A˘ .
Viewed up to » equivalence, the Dehn functions are independent of the choice
of the presentation (see [10, 1.3.3]), so we denote δP pnq as δΓ pnq.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
9
Proposition 3.3 ([12, Lemma 1.5] and [10, Proposition 7.2.2]). Let ψ be an automorphism of F and }.} denote the word length with respect to a fixed generating set
of F . Then for the Dehn function δΓ pnq of the Bieri double Γ of F ¸ψ Z one has
n ¨ max }ψ n pbq} ă
“ δΓ pnq.
}b}ďn
bPF
Proposition 3.4. Let ψ be an automorphism of a free group F and assume that
grψ pnq ĺ nd and grψ´1 pnq ĺ nd . Then for the Dehn function δΓ pnq of the Bieri
d`2
double Γ “ ΓpF ¸ψ Zq one has δΓ pnq ă
“n .
Remark 3.5. It can be proved using train-tracks that grψ´1 pnq „ nd if and only
if grψ pnq „ nd (see e.g. [25, Th. 0.4]). However, for the reader who is unfamiliar
with the train-track machinery we make the exposition independent of this result.
Instead, in what follows we will apply Proposition 3.4 to the automorphisms φ
whose growth functions grφ pnq and grφ´1 pnq are computed in section 8 and are
shown to be „ equivalent to each other.
In order to prove Proposition 3.4, we need some preliminary results on combings
of groups. We start with some definitions from [9] and [15].
Let Γ be a group with finite generating set A and dA px, yq be the associated
word metric.
Definition 3.6. A combing (normal form) for Γ is a set of words tσg | g P Γu in
the letters A˘ such that σg “ g in Γ. We denote by |σg | or |σg |A the length of the
word σg in the free monoid on A˘ .
Definition 3.7. Let
R “ tρ : N Ñ N | ρp0q “ 0; ρpn ` 1q P tρpnq, ρpnq ` 1u @n; ρ unbounded u.
Given eventually constant paths p1 , p2 : N Ñ pΓ, dq we define
Dpp1 , p2 q “ min
1
ρ,ρ PR
(
maxtdA pp1 pρptqq, p2 pρ1 ptqqu .
tPN
Definition 3.8. Given a combing σ for Γ, the asynchronous width of σ is the
function Φσ : N Ñ N defined by
(
Φσ pnq “ max Dpσg , σh q | dA p1, gq, dA p1, hq ď n; dA pg, hq “ 1 .
Definition 3.9. A finitely generated group Γ is said to be asynchronously combable
if there exists a combing σ for Γ and a constant K ą 0 such that Φσ pnq ď K for
all n P N.
Definition 3.10. The length of a combing σ for Γ is the function L : N Ñ N given
by:
(
Lpnq “ max |σg | | dA p1, gq ď n .
The relation of combings to Dehn functions is manifested in the following result:
Proposition 3.11 ([15, Lemma 4.1]). Let Γ be a group with a finite set of semigroup
generators A˘ . If there exists a combing σ for Γ whose asynchronous width is
bounded by a constant and whose length is bounded by the function Lpnq, then the
Dehn function δΓ pnq for any presentation of Γ satisfies δΓ pnq ă
“ nLpnq.
In connection to the groups which are Bieri doubles, the following result from [9]
is useful.
10
NOEL BRADY AND IGNAT SOROKO
Theorem 3.12 ([9, Theorem B]). If G is word-hyperbolic and H is asynchronously
combable then every split extension
1 ÝÑ G ÝÑ G ¸ H ÝÑ H ÝÑ 1
of G by H is asynchronously combable.
Remark 3.13. From the proof of this result in [9] it follows that if groups G
and H have combings σ G and σ H whose asynchronous width is bounded by some
constants, then the combing for the split extension G ¸ H of G by H, whose length
is bounded by a constant, can be taken as the product (concatenation) σ H σ G of
combings σ H and σ G , meaning that we traverse path σ H first, then path σ G . Note
that the product of combings in the opposite order, σ G σ H , may not have bounded
asynchronous width, as the example of Baumslag–Solitar groups shows.
Now let again Γ “ F ¸pψq F ps, tq be the Bieri double of G “ F ¸ψ Z, where F
is a free group on the set of free generators A.
Our goal is to obtain an upper bound on the length Lpnq of the combing σ F ps,tq ¨
F pAq
σ
in terms of the growth of the automorphism ψ. (Here we treat a combing
on a free group as a unique reduced word in a fixed system of generators which
represents the given element of the group.) We prove the following proposition,
adapting the reasoning for the abelian-by-cyclic groups from [15, Theorem 5.1] to
the case of free-by-free groups.
Proposition 3.14. Let P pnq be an increasing function bounding the growth of both
ψ and ψ ´1 , i.e. dA p1, ψ n paqq ď P p|n|q for all a P A, n P Z. Then the length Lpnq
of the combing σ F ps,tq ¨ σ F pAq of the group Γ “ F pAq ¸pψq F ps, tq satisfies
Lpnq ď nP pnq ` n.
Proof. Take arbitrary γ P Γ and write it as γ “ u ¨ g, where u P F ps, tq, g P F pAq.
Let n0 “ dAYts,tu p1, γq be the length of the shortest word in generators pAYts, tuq˘
representing element γ in Γ. We would like to show that
|σγ | “ |σu ¨ σg | “ dts,tu p1, uq ` dA p1, gq ď n0 P pn0 q ` n0 .
Considering the natural homomorphism η : F pAq ¸pψq F ps, tq Ñ F ps, tq, one observes that u “ ηpγq and hence dts,tu p1, uq ď n0 . Therefore it suffices to show
that
dA p1, gq ď n0 P pn0 q.
Denote w0 the shortest word in generators pA Y ts, tuq˘ such that w0 “ γ in Γ,
so that |w0 |AYts,tu “ n0 . Then w0 can be written as
w0 “ u1 w1 u2 w2 ¨ ¨ ¨ ¨ ¨ ur wr ,
where ui P F ps, tq, wi P F pAq for all i. Then
r
r
ÿ
ÿ
n0 “ |w0 |AYts,tu “
|ui |ts,tu `
|wi |A
i“1
and u “ u1 . . . ur .
Denote
vi “
i
ź
j“1
uj ¨ wi ¨
i
´ź
j“1
i“1
¯´1
uj
,
i “ 1, . . . , r.
(*)
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
11
Then, as one easily checks,
v1 v2 . . . vr “ u1 w1 u2 w2 . . . ur wr ¨
i
´ź
¯´1
uj
j“1
so that
γ “ w0 “ v1 v2 . . . vr ¨
i
´ź
¯
uj .
j“1
Hence
g “ u´1 γ “
r
´ź
¯´1
uj
¨ v1 v2 . . . vr ¨
j“1
¯
uj “
j“1
r ”´ ź
r
ź
i“1
r
´ź
j“1
i
i
r
¯´1 ź
´ź
¯´1 ź
ı
uj
¨
uj ¨ wi ¨
uj
¨
uj “
j“1
j“1
r
ź
`
j“1
˘
`
˘
´1
´1
u´1
r ur´1 . . . ui`1 ¨ wi ¨ ui`1 . . . ur .
i“1
If we denote by ε : F ps, tq Ñ Z the homomorphism defined on the generators as:
s ÞÑ 1, t ÞÑ 1, then for any g P F pAq and any u P F ps, tq we have ugu´1 “ ψ εpuq pgq.
Therefore,
r
r
řr
ź
ź
g“
ψ ´εpui`1 ...ur q pwi q “
ψ ´ j“i`1 εpuj q pwi q.
i“1
i“1
On the other hand,
r
r
r
r
ˇ ÿ
ˇ
ÿ
ÿ
ÿ
ˇ
ˇ
εpuj qˇ ď
|εpuj q| ď
|εpuj q| ď
|uj |ts,tu “ |u|ts,tu ď n0
ˇ
j“i`1
j“i`1
j“1
(**)
j“1
by the observation above.
Moreover, since for any a P A we have dA p1, ψ n paqq ď P p|n|q, then for any
wi P F pAq we get
`
˘
dA 1, ψ n pwi q ď P p|n|q ¨ dA p1, wi q.
Finally, we get for the element g the estimate:
r
r
r
ˇ¯
´ˇ ÿ
řr
` ˘ ÿ
`
˘ ÿ
ˇ
ˇ
dA 1, g ď
dA 1, ψ ´ j“i`1 εpuj q pwi q ď
P ˇ
εpuj qˇ ¨ dA p1, wi q
i“1
r
ÿ
ď rby (**)s ď
i“1
i“1
P pn0 q ¨ dA p1, wi q “ P pn0 q ¨
r
ÿ
j“i`1
dA p1, wi q ď rby (*)s ď P pn0 qn0 .
i“1
This shows that |σγ | ď n0 P pn0 q ` n0 and finishes the proof of the Proposition.
Now we are ready to prove the upper bound for the Dehn function of the Bieri
double.
Proof of Proposition 3.4. As was noted above, Γ “ ΓpF ¸ψ Zq – F ¸pψq F ps, tq. As
a free group, F is asynchronously combable (with constant K “ 1) and F ps, tq is
also word-hyperbolic. Therefore by Theorem 3.12, Γ is asynchronously combable
and hence, by Proposition 3.11, δΓ pnq ă
“ nLpnq. But due to Proposition 3.14,
d`1
d`2
Lpnq ă
“ n , and therefore δΓ pnq ă
“n .
12
NOEL BRADY AND IGNAT SOROKO
4. Cube complexes
4.1. Special cube complexes. In their article [21] Haglund and Wise established
that the fundamental groups of the so-called special cube complexes admit embeddings into right-angled Artin groups. This gives us a natural class of subgroups of
right-angled Artin groups and suggests that we construct our examples within this
class. We summarize the relevant definitions and results from [21] about special
cube complexes in this section.
Definition 4.1. (Cube complex) An n–cube is a copy of r0, 1sn Ă Rn , viewed as
a metric space with the euclidean metric of Rn . (We will suppress ‘n–’ and call
‘n–cubes’ just ‘cubes’.) A face is a metric subspace of an n–cube obtained by
restricting some of coordinates (or all of them) to either 0 or 1. A cube complex is a
CW complex obtained by gluing n–cubes (of possibly varied dimensions n) together
along faces via isometries. If all cubes of a cube complex are 2–cubes, such cube
complex is called a square complex. A cube complex is simple if the link of every
vertex of is a simplicial complex. A simplicial complex is flag if any collection of
k`1 pairwise adjacent vertices spans a k–simplex. A cube complex is non-positively
curved if the link of each vertex is a flag simplicial complex.
Definition 4.2. (Hyperplane) A midcube of an n–cube r0, 1sn is a subset obtained
by restricting one of the coordinates to 21 . A hyperplane of a cube complex X is a
connected component of a new cube complex Y which is formed as follows:
‚ the cubes of Y are the midcubes of X;
‚ the restriction of a pk ` 1q–cell of X to a midcube of r0, 1sk defines the
attaching map of a k–cell in Y .
An edge a of X is dual to some hyperplane H if the midpoint of a is a vertex of H.
Definition 4.3. (Parallelism, Walls) Two oriented edges a, b of a cube complex X
are called elementary parallel if there is a square of X containing a and b and such
that the attaching map sends two opposite edges of r0, 1s ˆ r0, 1s with the same
orientation to a and b respectively. Define the parallelism on oriented edges of X
as the equivalence relation generated by elementary parallelism. An (oriented) wall
of X is a parallelism class of oriented edges. Note that every hyperplane H in X
defines a pair of oriented walls consisting of edges dual to H.
Now we describe four pathologies for interaction of hyperplanes in a cube complex, which are forbidden for special cube complexes.
Definition 4.4. (Self-intersection) A hyperplane H in X self-intersects, if it contains more than one midcube from the same cube of X.
Definition 4.5. (One-sided) A hyperplane H is two-sided if there exists a combinatorial map of CW complexes H ˆ r0, 1s Ñ X mapping H ˆ t 21 u identically to
H. (Recall that a cellular map f : X Ñ Y of CW complexes is combinatorial if
the restriction of f to each open cell of X is a homeomorphism onto its image.) A
hyperplane H in X is called one-sided if it is not two-sided.
Definition 4.6. (Self-osculating) A hyperplane H in X is self-osculating if there
are two edges a, b dual to H which do not belong to a common square of X but
share a common vertex. If in addition there is a consistent choice of orientation
on the edges dual to H which makes the common vertex for a, b their origin or
terminus, then the hyperplane H is called directly self-osculating.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
13
Definition 4.7. (Inter-osculating) Two distinct hyperplanes H1 , H2 of X are interosculating if they intersect and there are edges a1 dual to H1 and a2 dual to H2
which do not belong to the same square of X but share a common vertex.
Definition 4.8. (Special cube complex) A non-positively curved cube complex is
called special if its hyperplanes are all two-sided, with no self-intersections, selfosculations or inter-osculations.
Definition 4.9. (Virtually special group) A group G is called special if there exists
a special cube complex X whose fundamental group is isomorphic to G. A group
G is virtually special if there exists a special cube complex X and a finite index
subgroup H ď G such that H is isomorphic to the fundamental group of X.
Definition 4.10. (Right-angled Artin group) Let ∆ be a simplicial graph. The
right-angled Artin group, or RAAG, associated to ∆, is a finitely presented group
Ap∆q given by the presentation:
Ap∆q “ xai P Verticesp∆q | rai , aj s “ 1 if pai , aj q P Edgesp∆qy.
Definition 4.11. (Salvetti complex) Given a right-angled Artin group Ap∆q, the
Salvetti complex associated to Ap∆q is a non-positively curved cube complex S∆
defined as follows. For each ai P Verticesp∆q let Sa1i be a circle endowed with
a structure of a CW complex havingśa single 0–cell and a single 1–cell. Let
n
1
n “ CardpVerticesp∆qq and let T “
j“1 Saj be an n–dimensional torus with
the product CW structure. For every full subgraph K Ă ∆ with VerticespKq “
tai1 , . . . , aik u define a k–dimensional torus TK as a Cartesian product of CW comśk
plexes: TK “ j“1 Sa1i and observe that TK can be identified as a combinatorial
j
subcomplex of T . Then the Salvetti complex associated with Ap∆q is
ď
(
S∆ “
TK Ă T | K a full subgraph of ∆ .
Thus S∆ has a single 0–cell and n 1–cells. Each edge pai , aj q P Edgesp∆q con´1
tributes a square 2–cell to S∆ with the attaching map ai aj a´1
i aj . And in general each full subgraph K Ă ∆ contributes a k–dimensional cell to S∆ where
k “ CardpVerticespKqq.
Theorem 4.12 ([21],Th. 4.2). A cube complex is special if and only if it admits a
local isometry into the Salvetti complex of some right-angled Artin group.
Since local isometries of CAT(0) spaces are π1 -injective, one gets the following
Corollary 4.13. The fundamental group of a special cube complex is isomorphic
to a subgroup of a right-angled Artin group.
4.2. Morse theory for cube complexes. We will use the following definitions
from [3, 4].
Definition 4.14. (Morse function) A map f : X Ñ R defined on a cube complex
X is a Morse function if
‚ for every cell e of X, with the characteristic map χe : r0, 1sm Ñ e, the
composition f χe : r0, 1sm Ñ R extends to an affine map Rm Ñ R and f χe
is constant only when dim e “ 0;
‚ the image of the 0–skeleton of X is discrete in R.
14
NOEL BRADY AND IGNAT SOROKO
Definition 4.15. (Circle-valued Morse function) A circle-valued Morse function
on a cube complex X is a cellular map f : X Ñ S 1 with the property that f lifts
to a Morse function between universal covers.
Definition 4.16. (Ascending and descending links) Suppose X is a cube complex,
f : X Ñ S 1 is a circle-valued Morse function and f˜: X̃ Ñ R is the corresponding
Morse function. Let v P X p0q and note that the link of v in X is naturally isomorphic
to the link of any lift ṽ of v in X̃. We say that a cell ẽ Ă X̃ contributes to the
ascending (respectively descending) link of ṽ if ṽ P ẽ and f˜|ẽ achieves its minimum
(respectively, maximum) value at ṽ. The ascending (respectively, descending) link
of v is then defined to be the subset of the link Lkpv, Xq naturally identified with
the ascending (respectively, descending) link of ṽ. Note that in the case when X is
a square complex, all ascending, descending and entire links are graphs.
The following characterization of free-by-cyclic groups was proven in [3] (see
also [23, Th. 10.1]).
Theorem 4.17 ([3], Proposition 2.5). If f : X Ñ S 1 is a circle-valued Morse
function on a 2–complex X all of whose ascending and descending links are trees,
then X is aspherical and π1 pXq is free-by-cyclic. This means that there is a short
exact sequence
1 ÝÑ Fm ÝÑ π1 pXq ÝÑ Z ÝÑ 1,
where the free group Fm is isomorphic to π1 pf ´1 pptqq, pt being any point on S 1 .
5. Groups Gm,k
In this section we define a sequence of groups Gm,k and study their presentation
complex. We show that it is a non-positively curved square complex and that the
groups are free-by-cyclic.
5.1. LOG definition. Recall that a labeled, oriented graph, or LOG, consists of a
finite, directed graph with labels on the vertices and edges satisfying the following:
the vertices have distinct labels, and the edge labels are chosen from the set of
vertex labels.
A LOG determines a finite presentation as follows. The set of generators is the
set of vertex labels. The set of relations is in one-to-one correspondence with the
set of edges; there is a relation of the form a´1 ua “ v for each oriented edge labeled
a from vertex u to vertex v.
Let m P N, m ě 1. For k “ 0, . . . , m, let Gm,k be a group defined by the LOG
presentation in the Figure 1:
i.e.
Gm,k “ x a1 , . . . , am`k`1 | rai , ai`1 s “ 1,
i “ 1, . . . , m,
a´1
m`j`1 aj am`j`1
“ am`j ,
j “ 1, . . . , k y.
Clearly Gm,k is an HNN extension of Gm,k´1 with the stable letter am`k`1 so
there is a natural tower of inclusions
Gm,0 Ă Gm,1 Ă Gm,2 Ă ¨ ¨ ¨ Ă Gm,m .
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
a2
...
a3
ak`1
ak`2
a1
a2
ak
am`2
am`3
am`k`1
am`1
am`2
am`k
...
15
am`1
ak`1
am
am`k`1
Figure 1. The LOG description of Gm,k .
aj
aj`1
a`
j
a`
j`1
a´
j
a´
j`1
aj`1
aj
am`j
am`j`1
a`
m`j
am`j`1
a´
m`j
a`
j
aj
a´
j
a`
m`j`1
a´
m`j`1
Figure 2. The contribution of the relations a´1
j`1 aj aj`1 “ aj ,
1 ď j ď m, and a´1
a
a
“
a
,
1
ď
j
ď k, to the link
m`j
m`j`1 j m`j`1
of the 0–cell of the presentation complex Km,k .
5.2. CATp0q structure for Gm,k . One way of producing a CATp0q structure on
groups Gm,k is to verify that the presentation 2–complex corresponding to their
LOG presentation can be metrized so that it is a non-positively curved, piecewise
euclidean (PE) complex.
Let Km,k denote the presentation 2–complex corresponding to the LOG presentation above of Gm,k . It has one 0–cell, pm`k`1q 1–cells labeled by a1 , . . . , am`k`1 ,
and pm ` kq 2–cells corresponding to the relations a´1
j`1 aj aj`1 “ aj for 1 ď j ď m
´1
and am`j`1 aj am`j`1 “ am`j for 1 ď j ď k. By construction, Km,k is a subcomplex of Km,k`1 . We endow Km,k with a PE structure by using regular euclidean
squares for the 2–cells, and using local isometric embedding attaching maps.
Proposition 5.1. The presentation complex Km,k defined above is a non-positively
curved PE complex.
16
NOEL BRADY AND IGNAT SOROKO
Proof. We need to check the Gromov link condition [14, Th. II.5.20]. For the square
2–cells, it reduces to a purely combinatorial requirement that the link of every 0–cell
has no circuits of combinatorial length less than 4. Figure 2 shows the contributions
of the relations of Gm,k to the link L of the unique 0–cell of Km,k . We adopt the
following notation: if a 1–cell a originates at 0–cell u and terminates at 0–cell v,
then it contributes a vertex denoted a´ to the link of u and a vertex denoted a`
to the link of v.
We see that the link L can be obtained as a union of a sequence of graphs:
L1 Ă L2 Ă ¨ ¨ ¨ Ă Lm`k`1 “ L,
´
where L1 is just a pair of disjoint vertices a`
1 , a1 , and Li`1 is obtained from Li by
`
´
adding a new pair of disjoint vertices ai`1 , ai`1 and connecting each one of them
´
to some pair a`
s , as with s ă i ` 1. We observe that this procedure preserves the
´
following property: “for every l, vertices a`
l , al are non-adjacent”. Indeed, the
´
`
shortest path between the “old” vertices as , as has length two, and the shortest
´
path between the newly added vertices a`
i`1 , ai`1 is at least two. This shows that
at each step we cannot create cycles of lengths two and three. Therefore the link
L has no cycles of length less than four.
Corollary 5.2. Groups Gm,k are CATp0q.
r m,k of non-positively curved square complex
Proof. Indeed, the universal cover K
Km,k is a CAT(0) complex and Gm,k acts on it by isometries, properly discontinuously and cocompactly.
5.3. Free-by-cyclic structure. Notice that all the relations of groups Gm,k have
a
the form: ai j “ al . This implies that there exists a well-defined epimorphism
Gm,k Ñ Z, sending every ai to a fixed generator of Z. This epimorphism can
be realized geometrically by a circle-valued Morse function f : Km,k Ñ S 1 , which
can be defined as follows. Consider a CW structure on S 1 consisting of one 0–cell
and one 1–cell. Then f takes the 0–cell of Km,k to the 0–cell of S 1 , maps 1–cells
of Km,k map homeomorphically onto the target 1–cell of S 1 , and extends linearly
over the 2–cells. Here by ‘extends linearly’ we mean that f lifts to a map of the
universal covers in the way depicted in the Figure 3. (Note that, by the non-positive
curvature, characteristic maps of cells lift to embeddings in the universal cover.)
R
ai`1
ai
am`j
ai`1
f˜
Bj
Ai
1
am`j`1
0
ai
am`j`1
aj
´1
Figure 3. The Morse function on each 2–cell and the preimage
set of 0.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
17
Proposition 5.3. The (circle-valued) Morse function f : Km,k Ñ S 1 induces a
short exact sequence
1 ÝÑ Fm`k ÝÑ Gm,k ÝÑ Z ÝÑ 1,
where Fm`k is a free group of rank m ` k.
Proof. By Theorem 4.17 it suffices to show that the ascending and the descending
links of the 0–cell in Km,k are trees.
The ascending link of the 0–cell of Km,k is formed by those corners of 2–cells
of Km,k which are formed by a pair of originating edges (labeled a´
‚ in Figure 2).
Similarly, the descending link of the 0–cell of Km,k is formed by those corners of
2–cells of Km,k which are formed by a pair of terminating edges (labeled a`
‚ , in
Figure 2).
a´
1
a´
2
a´
3
a´
m`2
a´
m`3
a´
m`4
...
a´
k
a´
k`1
a`
2
a`
3
a´
m`1
a´
m`k`1
...
a`
1
a´
m
...
...
a`
m
a`
m`1
a`
m`2
a`
m`k
a`
m`k`1
Figure 4. The ascending and the descending links for the Morse
function f : Km,k Ñ R{Z.
From Figure 4 we observe that the ascending and the descending links of the 0–
cell of Km,k are indeed trees. By the definition of f , each 2–cell of Km,k contributes
its diagonal loop to f ´1 p0–cellq. Furthermore, f ´1 p0–cellq is a bouquet of these
diagonal loops. Hence f ´1 p0–cellq is a graph having a single 0–cell and pm ` kq
1–cells which are denoted in the Figure 3 by Ai , Bj .
The above Proposition implies that Gm,k – Fm`k ¸φm,k Z for some monodromy
automorphism φm,k . We shall determine explicitly the automorphism φm,k for a
particular choice of basis for Fm`k . Let Ai , Bj be the diagonals of the 2–cells of
Km,k , as shown in Figure 3. Note that they have the following expressions in the
generators of Gm,k :
Ai “ a´1
i`1 ai ,
1 ď i ď m;
Bj “ a´1
m`j`1 aj ,
1 ď j ď k.
Proposition 5.4. For 0 ď k ď m, Gm,k has the following explicit free-by-cyclic
structure:
Gm,k – Fm`k ¸φm,k Z
where
Fm`k “ xA1 , . . . , Am , B1 , . . . , Bk y;
Z “ xa1 y
18
NOEL BRADY AND IGNAT SOROKO
and the monodromy automorphism φm,k acts as follows (here overbar denotes the
inverse):
φm,k :
A1 ÞÝÑ A1
A2 ÞÝÑ A1 pA2 q A1
A3 ÞÝÑ A1 A2 pA3 q A2 A1
...
Am ÞÝÑ A1 A2 . . . Am´1 pAm q Am´1 . . . A1
B1 ÞÝÑ A1 A2 . . . Am pB1 q
B2 ÞÝÑ A1 A2 . . . Am pB1 B2 q A1
B3 ÞÝÑ A1 A2 . . . Am pB1 B2 B3 q A2 A1
...
Bk ÞÝÑ A1 A2 . . . Am pB1 B2 . . . Bk q Ak´1 Ak´2 . . . A2 A1 .
Furthermore, φm,k is the restriction of φm,m to Fm`k .
Proof. In the proof of Proposition 5.3 it was shown that Fm`k is freely generated
by all elements Ai , Bj .
As a generator of the Z factor we are free to choose any element that maps to a
generator of π1 pS 1 q; without loss of generality, we may take Z “ xa1 y.
To get the action of the monodromy automorphism φ on the generators Ai , Bj
´1
of Fm`k we need to compute the conjugations a1 Ai a´1
1 and a1 Bj a1 . That is, we
´1
need to find words in generators Ai , Bj which are equal to a1 Ai a1 and a1 Bj a´1
1
in Km,k .
Ai
ai`1
a1
a2
ai´1 ai
a3
ai
ai´1
...
A1
A2
a1
a3
a2
...
Ai´1
Ai
Ai´1
A2
A1
Figure 5. The action of the monodromy automorphism on Ai .
For a1 Ai a´1
1 , we start with the triangle having Ai on top and 1–cells ai`1 , ai
´1
forming two bottom sides. We would like to express a1 a´1
i`1 and ai a1 as products
of free generators Ai , Bj . Since the descending link of the 0–cell in Km,k is a tree,
`
there exists a unique path in it connecting a`
1 to ai`1 and a unique path connecting
`
a`
i to a1 . These paths correspond to paths A1 A2 . . . Ai´1 Ai and Ai´1 . . . A2 A1 ,
respectively, see Figure 5. Thus,
a1 Ai a´1
1 “ A1 A2 . . . Ai´1 pAi q Ai´1 . . . A2 A1 .
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
19
Bj
am`j`1
a1
a2
a3
am
am`1 am`2 am`j
...
A1
A2
aj
aj´1
...
Am
B1
a1
a3
a2
...
Bj
Aj´1
A2
A1
Figure 6. The action of the monodromy automorphism on Bj .
Similarly, for a1 Bj a´1
1 , we start with the triangle having Bj on top and am`j`1 ,
aj forming two bottom sides. Again, there are unique paths in the descend`
`
`
ing link from a`
1 to am`j`1 and from aj to a1 . They correspond to words
A1 A2 . . . Am B1 . . . Bj and Aj´1 . . . A2 A1 , respectively, see Figure 6. Hence,
a1 Bj a´1
1 “ A1 A2 . . . Am pB1 . . . Bj q Aj´1 . . . A2 A1 .
6. Constructing a special cover for Gm,m
In this section we construct a certain permutation representation for a group
Gm,m and show that it defines a finite cover for its presentation 2–complex Km,m ,
which can be embedded in an p2m ` 1q–dimensional torus. This allows us to construct a finite special cover for Km,m , for all even values of m.
6.1. The permutation representation. We now define a right transitive action
of Gm,m on a certain set H2m`1 of cardinality 22m`1 .
Action set. For any n “ 1, . . . , 2m ` 1 denote ś
Hk to be the set of all tuples
n
of length k consisting of 0’s and 1’s, i.e. Hn “ i“1 t0, 1u. There are natural
inclusions
Hn ãÑ Hn`1 , px1 , . . . , xn q ÞÑ px1 , . . . , xn , 0q,
and we identify Hn with its image in Hn`1 under these inclusions. Also denote Hn˚
a subset of Hn`1 consisting of all tuples with the last coordinate 1:
Hn˚ “ tpx1 , . . . , xn , 1qu Ă Hn`1 .
With the above identifications, we have Hn`1 “ Hn \ Hn˚ (disjoint union).
To define a right action of a group G on a set X, it suffices to associate to each
g P G a permutation πpgq of X such that
πpghq “ πphqπpgq for all g, h P G.
Equivalently, a right action of G on X is a homomorphism of the opposite group
G˝ to SympXq, the group of all permutations of X, where G˝ equals G as a set,
with the new operation ˝ defined as
a ˝ b :“ ba.
We adopt the latter approach and construct the homomorphism from G˝m,m to
SympH2m`1 q.
20
NOEL BRADY AND IGNAT SOROKO
Recall that we have a natural tower of inclusions
Gm,0 Ă Gm,1 Ă ¨ ¨ ¨ Ă Gm,m .
Since there are also inclusions
Hm`1 Ă Hm`2 Ă ¨ ¨ ¨ Ă Hpm`1q`m “ H2m`1
this allows us to define the homomorphism π : G˝m,m Ñ SympH2m`1 q inductively
by repeatedly extending the homomorphisms G˝m,k´1 Ñ SympHm`k q to G˝m,k Ñ
SympHm`k`1 q for k “ 1, . . . , m as follows.
Base of induction. Let the m ` 1 generators a1 , . . . , am`1 of Gm,0 act on Hm`1
as flips in the respective coordinates, i.e. for i “ 1, . . . , m ` 1, set
πpai q|Hm`1 :“ βi
(A0 )
where βi : H2m`1 Ñ H2m`1 given by
βi px1 , . . . , xi´1 , xi , xi`1 , . . . q “ px1 , . . . , xi´1 , 1 ´ xi , xi`1 , . . . q
is the operator that changes the i-th coordinate from 0 to 1 and vice versa, fixing
all others.
All the relations in Gm,0 (and G˝m,0 ) are commutators rai , ai`1 s “ 1, i “
1, . . . , m. Clearly, they are satisfied in SympHm`1 q since operators βi pairwise
commute. Thus we have a well-defined homomorphism π : G˝m,0 Ñ SympHm`1 q.
Inductive step. For a fixed k P t1, . . . , mu, suppose that π : G˝m,k´1 Ñ SympHm`k q
is already defined. In particular, this implies that Hm`k is invariant under πpaj q
for all j “ 1, . . . , m ` k. Also suppose that the following property holds:
for all j “ k, . . . , m, πpaj q|Hm`k “ βj |Hm`k .
(Pk )
The base of induction above guarantees that these suppositions are true for k “ 1.
Our goal is to extend the homomorphism π|G˝m,k´1 to π : G˝m,k Ñ SympHm`k`1 q.
˚
Since Hm`k`1 “ Hm`k \ Hm`k
, it will suffice to define πpaj q|H ˚
for j “
m`k
1, . . . , m ` k, and πpam`k`1 q|Hm`k \H ˚ .
m`k
To this end, we set
πpam`k`1 q|Hm`k \H ˚
m`k
:“ βm`k`1
(A1 )
and for all 1 ď j ď m ` k,
πpaj q|H ˚
m`k
:“ βm`k`1 ¨ ϕk,m`k ¨ πpaj q|Hm`k ¨ ϕk,m`k ¨ βm`k`1 ,
(A2 )
where ¨ denotes the composition and ϕk,m`k : Hm`k`1 Ñ Hm`k`1 is the involution
that interchanges k-th and pm`kq-th coordinates leaving all other coordinates fixed:
ϕk,m`k : px1 , . . . , xk , . . . , xm`k , xm`k`1 q ÞÑ px1 , . . . , xm`k , . . . , xk , xm`k`1 q.
˚
In other words, we transfer the action of Gm,k´1 from Hm`k to Hm`k
while
twisting it with ϕk,m`k . Notice that, with the above definitions, both sets Hm`k
˚
and Hm`k
are invariant under πpaj q for j “ 1, . . . , m`k. All the relations involving
˚
generators a1 , . . . , am`k are satisfied on Hm`k`1 “ Hm`k \ Hm`k
since they hold
true on Hm`k and the conjugation by βm`k`1 ¨ϕk,m`k is a homomorphism between
˚
permutation groups on Hm`k and Hm`k
.
The only relation in Gm,k involving the last generator am`k`1 is
a´1
m`k`1 ak am`k`1 “ am`k ,
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
21
which translates to
am`k`1 ˝ ak ˝ a´1
m`k`1 “ am`k
in G˝m,k .
˚
Since βm`k`1 sends Hm`k to Hm`k
, the left-hand side of this relation acts on
Hm`k as follows:
πpam`k`1 q ¨ πpak q ¨ πpa´1
m`k`1 q|Hm`k
“ πpam`k`1 q ¨ πpak q ¨ βm`k`1 |Hm`k
“ πpam`k`1 q ¨ πpak q|H ˚
m`k
¨ βm`k`1 |Hm`k
“ πpam`k`1 q ¨ pβm`k`1 ¨ ϕk,m`k ¨ πpak q|Hm`k ¨ ϕk,m`k ¨ βm`k`1 q ¨ βm`k`1 |Hm`k
“ πpam`k`1 q ¨ βm`k`1 ¨ ϕk,m`k ¨ πpak q|Hm`k ¨ ϕk,m`k |Hm`k
“ pπpam`k`1 q ¨ βm`k`1 q ¨ ϕk,m`k ¨ πpak q|Hm`k ¨ ϕk,m`k |Hm`k
“ id ¨ ϕk,m`k ¨ πpak q|Hm`k ¨ ϕk,m`k |Hm`k “ [by (Pk )]
“ ϕk,m`k ¨ βk |Hm`k ¨ ϕk,m`k |Hm`k “ βm`k |Hm`k “ πpam`k q|Hm`k ,
where the last equality holds due to the inductive definition of π. Thus, the both
sides of the above relation act the same on Hm`k .
˚
Analogously, on Hm`k
, the left-hand side acts as:
πpam`k`1 q ¨ πpak q ¨ πpa´1
m`k`1 q|H ˚
m`k
“ βm`k`1 ¨ πpak q|Hm`k ¨ βm`k`1 |H ˚
m`k
“ [by (Pk )] “ βm`k`1 ¨ βk |Hm`k ¨ βm`k`1 |H ˚
m`k
“ βk | H ˚
m`k
,
and the right-hand side:
πpam`k q|H ˚
m`k
“ βm`k`1 ¨ ϕk,m`k ¨ πpam`k q|Hm`k ¨ ϕk,m`k ¨ βm`k`1 |H ˚
m`k
“ [by the inductive definition] “ βm`k`1 ¨ ϕk,m`k ¨ βm`k ¨ ϕk,m`k ¨ βm`k`1 |H ˚
m`k
“ βm`k`1 ¨ βk ¨ βm`k`1 |H ˚
m`k
“ βk | H ˚
m`k
.
˚
Since the two sides act the same on Hm`k \ Hm`k
“ Hm`k`1 , the above relation
is satisfied in SympHm`k`1 q, which proves that π is well-defined on G˝m,k .
It remains to be proved that the auxiliary condition (Pk ) is preserved under the
inductive step, i.e. that (Pk ) implies (Pk`1 ).
Indeed, (Pk ) means that πpaj q|Hm`k “ βj |Hm`k for j “ k, . . . , m. Thus, for
j ą k,
πpaj q|H ˚
m`k
“ βm`k`1 ¨ ϕk,m`k ¨ πpaj q|Hm`k ¨ ϕk,m`k ¨ βm`k`1 |H ˚
m`k
“ βm`k`1 ¨ ϕk,m`k ¨ βj |Hm`k ¨ ϕk,m`k ¨ βm`k`1 |H ˚
m`k
“ [since j ‰ k, m ` k] “ βj |H ˚
m`k
.
This proves that πpaj q|Hm`k`1 “ βj |Hm`k`1 for j “ k ` 1, . . . , m, i.e. that (Pk`1 )
holds.
This finishes the inductive construction of the homomorphism
π : G˝m,m Ñ SympH2m`1 q
and the proof that it is well-defined. Thus one gets a right action of Gm,m on
H2m`1 which will also be denoted π.
Figure 7 shows the permutation representation for G2,2 .
22
NOEL BRADY AND IGNAT SOROKO
1
01100
11100
dh
dh
hhh 4
hhh
hhhh
h
h
@
hhhh
hhh
@
hhh 4
hhhh
3
hhhh 01110
hh
3 @ dh 1
11000
h d11110
h
d
d
h
h
h
hhhh h
hhh 4
01000
3
@
h
h hh
hhhh 1
hhh
1
h
@
h
h
h
h
h
2
hh
2
2
@ d h3hh
h d11010
h
4
2
01010
1
hh
2
d10000
hh
dthhhh
4
hhhh
@h hhh
2
h
2 2
3 00000
hhhhhhhhh
3 @
h
h
hhh
00100
1
@ dh
10100
h
h
4
dhh
d h3hh
d10010
h
h
h
hhhh
hhhh
h
hh
hh
00010
@
1h
4
hhhh 1 @
h
h
h
h
hhh
h
hh
@ d10110
h d
h
4
5 5
00110
3
5 5
5 5 5
5
5 5
3
11101
5
01101
5
5
5 5
dhh
dhh
hh
hh 2
5
hhh 1
hhhh
@
h
h
h
h
hhhh 2
h
1@
h hhhh
hhh
h
3
h
h d01111
h d11111
11001
d h
hhh
@ dh
hhhh
01001
3 1
hh2h
@ 1
h
hhhh
hhh
hh
h
h
@
h
h
h
h
4 4
h
h
4
hh
@ d h
3h
h d 11011
2
4
h
01011
d hh1
d10001
4
hhhh
hhh
4
hhh2
00001
4
4
@hhh
3
h
h
h
hhhh
3 @ hhhhh
h
hh
00101
1 h
1
hh
10011
h
@ d10101
h
h
2
dhh
d
d
h
hhh
hhhh
hhhh 3 00011
@
hhhh
hhhhh
hhh 2
3
@
hhhh
hhhh
@ d 10111
hd
h
2
00111
1
Figure 7. The case of m “ 2, k “ 2: the action of
G2,2 “ xa1 , a2 , a3 , a4 , a5 | ra1 , a2 s “ 1, ra2 , a3 s “ 1, a´1
4 a1 a4 “
´1
a3 , a5 a2 a5 “ a4 y on H5 . Elements of H5 are arranged at vertices
of the hypercube graph marked with the corresponding tuples of
0,1’s. (Thus, each edge of this graph corresponds to a pair of opposite edges in the 1–skeleton of the 5–dimensional torus T5 defined
below.) The subset H3 is represented by the upper left-hand corner
subgraph, and H4 by the upper half of the picture. If πpai q interchanges vertices u and v we mark the edge uv with the italicized
digit i.
Proposition 6.1. The right action π of Gm,m on H2m`1 , defined above, has the
following properties:
(1) Gm,k acts transitively on Hm`k`1 for all k “ 0, . . . , m.
(2) Each generator ai , i “ 1, . . . , 2m ` 1, acts as an involution on H2m`1 .
(3) For any v P H2m`1 , and any ai , i “ 1, . . . , 2m ` 1, πpai qv differs from v in
exactly one coordinate. In particular, πpai q has no fixpoints.
(4) For any i ‰ j, πpai aj q has no fixpoints.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
23
Proof. (1) An easy induction. The case k “ 1 is obvious since Gm,0 acts on Hm`1
by coordinate flips. So one can start with any pm ` 1q–tuple of 0,1’s and obtain
any other pm ` 1q–tuple by changing one coordinate at a time. Suppose now that
˚
Gm,k´1 acts transitively on Hm`k . Then by (A2 ), Hm`k
comprises another orbit
˚
for Gm,k´1 and am`k`1 glues Hm`k and Hm`k into one orbit for Gm,k by (A1 )
˚
thus proving that Gm,k is transitive on Hm`k`1 “ Hm`k \ Hm`k
.
(2),(3) Follow by induction from formulas (A0 )–(A2 ).
(4) Again, this is obvious for ai , aj with 1 ď i, j ď m ` 1 acting on Hm`1 since
they act as different coordinate flips βi , βj . Suppose that the statement is proven
for some k P t1, . . . , m ` 1u, for all ai , aj , 1 ď i, j ď m ` k acting on Hm`k .
˚
˚
Then πpai aj q has no fixpoints on Hm`k
either, since otherwise if v P Hm`k
is such
a fixpoint, then by (A2 ), ϕk,m`k ¨ βm`k`1 pvq would be a fixpoint for πpai aj q in
Hm`k . Finally, if, say, i “ m ` k ` 1 then πpai q changes the last, pm ` k ` 1q-st,
coordinate on Hm`k`1 , whereas for j ă i, πpaj q preserves both subsets Hm`k and
˚
Hm`k
, so it doesn’t change the pm ` k ` 1q-st coordinate. Hence, the composition
of πpaj q and πpai q has no fixpoints.
e0
C2 :
0
1
e1
Figure 8. The CW complex C2 .
6.2. A p2m ` 1q–torus cover. Let C2 “ R{2Z be a 1–dimensional CW complex
with the following CW structure: its 0–cells are 0 ` 2Z and 1 ` 2Z, which we denote
by 0 and 1 respectively. The 1–cells are r0, 1s ` 2Z and r1, 2s ` 2Z, which we denote
by e0 and e1 respectively, see Figure 8.
We denote by Tn the CW complex Rn {p2Zqn – pR{2Zqn with the product CW
structure. Notice that the natural action of p2Zqn on Rn preserves the standard
unit cubulation of Rn , hence induces the structure of a cubical complex on Tn .
Observe that Tn is homeomorphic to an n–dimensional torus.
In what follows, it will be convenient to parametrize points of Tn by n–tuples
px1 , . . . , xn q of numbers from r0, 2s viewed up to the identification 0 „ 2.
The 0–skeleton of Tn is naturally identified with the set Hn of all n-tuples of
t0, 1u introduced before.
The 1–cells of Tn are formed by fixing an edge e0 or e1 in some factor of Tn “
C2 ˆ C2 ˆ ¨ ¨ ¨ ˆ C2 , say, in position i, and taking product with vertices 0 or 1 in all
other positions. (So if two 0–cells of T0 differ in only one coordinate, then there is
p1q
a unique directed edge in Tn from the first 0–cell to the second one and a unique
directed edge from the second one to the first one.) Thus, a typical 1–cell in Tn can
be identified with a product of the form
v1 ˆ v2 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vn ,
where each vj P t0, 1u and α “ 0 or 1.
Similarly, an arbitrary 2–cell of Tn is a product
v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vj´1 ˆ eβ ˆ vj`1 ˆ ¨ ¨ ¨ ˆ vn
24
NOEL BRADY AND IGNAT SOROKO
for some choice of 1 ď i, j ď n (i ‰ j), with each vk P t0, 1u, and α, β P t0, 1u.
Let Km,m be the presentation 2–complex for Gm,m . Recall that it consists of
one 0–cell, p2m ` 1q 1–cells corresponding to the generators a1 , . . . , a2m`1 of Gm,m
and 2m 2–cells corresponding to the relations of Gm,m .
Consider the right action π : G˝m,m Ñ SympH2m`1 q constructed in the previous
section and denote
S “ tg P Gm,m | πpgqp0, 0, . . . , 0q “ p0, 0, . . . , 0qu
the stabilizer of the point p0, 0, . . . , 0q in Gm,m . Subgroup S defines a finite covering
p m Ñ Km,m whose properties we now describe.
K
p m cellularly embeds into the 2–skeleton of
Proposition 6.2. The covering space K
T2m`1 .
p m are in one-to-one correspondence with the right cosets
Proof. The 0–cells of K
SzGm,m . Since the action of Gm,m is transitive on H2m`1 by Proposition 6.1(1),
p0q
p0q
pm
consists of |Gm,m : S| “ 22m`1 vertices which we can identify with T2m`1 ,
K
the 0–skeleton of T2m`1 , which was earlier identified with the set H2m`1 of all
p2m ` 1q–tuples consisting of t0, 1u.
p m are in one-to-one correspondence with pairs of right cosets
The 1–cells of K
pSg, Sgai q where ai , i “ 1, . . . , 2m ` 1 runs through all the generators of Gm,m .
Proposition 6.1(3) guarantees that each such 1–cell is not a loop, and it actually
belongs to the 1–skeleton of the p2m ` 1q–torus T2m`1 .
p m are lifts of the 2–cells in Km,m . Each such 2–cell is uniquely
The 2–cells of K
determined by the base vertex (a lift of the base vertex of Km,m ) and by the fixed
cyclic order of the relator word of Gm,m , which defines the attaching map of a
2–cell in Km,m . Indeed, since π : G˝m,m Ñ SympH2m`1 q is a homomorphism, every
relator word w of Gm,m acts as the identical permutation. There are two types of
relators in the presentation for Gm,m :
´1
ai ai`1 a´1
i ai`1 “ 1
for i “ 1, . . . , m,
´1
a´1
m`j`1 aj am`j`1 am`j
“1
and
for j “ 1, . . . , m,
p m , based at every
each of which has length 4. Thus they define length 4 loops in K
vertex, each of such loops has to be filled with a 2–cell because these loops must
p m can be given
be nullhomotopic when projected to Km,m . Thus, each 2–cell of K
´1
by a word ai aj a´1
a
for
some
values
i
‰
j,
j
‰
l,
see
Figure
9.
j
l
Sgaj
al
aj
Sg
Sgaj al “ Sgai aj
aj
ai
Sgai
pm.
Figure 9. A typical 2–cell in K
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
25
p0q
If we identify cosets SzGm,m with T2m`1 ” H2m`1 , Proposition 6.1(3) shows
that for any i “ 1, . . . , 2m ` 1, every edge pSg, Sgai q changes only one coordinate
of the p2m`1q–tuple of t0, 1u representing vertex Sg, therefore it maps to a suitable
1–cell of T2m`1 .
p0q
pm
Let’s show that each 2–cell of the above form at a vertex Sg P K
naturally
p2q
p0q
pm
embeds into T2m`1 under the embedding induced by the embeddings of K
and
p1q
p1q
p
Km to T2m`1 introduced above. Denote p, q, r, s the positions in t1, . . . , 2m ` 1u
in which the endpoints of the following edges differ: pSg, Sgai q, pSgai , Sgai aj q,
pSg, Sgaj q, pSgaj , Sgaj al q, respectively. By Proposition 6.1(4), ai aj and aj al have
no fixpoints on H2m`1 , hence p ‰ q and r ‰ s. And since the square above is
commutative, we conclude that 2–element sets tp, qu and tr, su are equal. Again,
by Proposition 6.1(2), ai and aj act as involutions, hence p ‰ r, since otherwise
a´1
i aj “ ai aj would have a fixpoint Sgai . Therefore, p “ s, q “ r, and the 2–cell
p2q
under consideration actually belongs to T2m`1 since each pair of its parallel edges
changes coordinates of vertices in the same position, one in position p “ s and
another in q “ r.
6.3. Exploring hyperplane pathologies. We will need the following description
of hyperplanes and walls in the n–torus Tn .
Lemma 6.3. The hyperplanes and oriented walls in Tn are in 1–1 correspondence
with pairs pi, eα q, where 1 ď i ď n and α P t0, 1u. More explicitly:
(1) the hyperplane corresponding to the pair pi, eα q is a subset of Tn of one of
the following two types:
(
px1 , . . . xi´1 , 21 , xi`1 , . . . , xn q | xj P r0, 2s
if eα “ e0 , and
px1 , . . . xi´1 , 32 , xi`1 , . . . , xn q | xj P r0, 2s
(
if eα “ e1 (with the identification 0 „ 2).
(2) the oriented wall through a 1–cell
v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vn
consists of all 1–cells
u1 ˆ ¨ ¨ ¨ ˆ ui´1 ˆ eα ˆ ui`1 ˆ ¨ ¨ ¨ ˆ un
with i, eα fixed, and uk ’s taking all possible values of t0, 1u.
The oriented wall in (2) is dual to the corresponding hyperplane in (1).
Proof. (1) Recall that the structure of a cube complex on Tn – Rn {p2Zqn is induced
by the standard cubulation of Rn . Hyperplanes in Rn are subsets of the form
(
Hi,k “ px1 , . . . , xi´1 , k ` 21 , xi`1 , . . . , xn q | xj P R , 1 ď i ď n, k P Z.
Modding out by the action of p2Zqn yields the result.
(2) Recall that the oriented wall containing a 1–cell a of a cube complex X is
the class of all oriented 1–cells of X which are connected to a through a sequence
of elementary parallelisms via the 2–cells of X. Notice that an arbitrary 1–cell of
Tn is a product of the form: v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vn , where each vertex
vk P t0, 1u and α “ 0 or 1, and an arbitrary 2–cell of Tn is a product
v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vj´1 ˆ eβ ˆ vj`1 ˆ ¨ ¨ ¨ ˆ vn
26
NOEL BRADY AND IGNAT SOROKO
for some choice of 1 ď i, j ď n (i ‰ j) and α, β P t0, 1u. Thus, the elementary
parallelism via the above 2–cell establishes equivalence of the 1–cells
v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vj ˆ ¨ ¨ ¨ ˆ vn
and
v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ p1 ´ vj q ˆ ¨ ¨ ¨ ˆ vn .
Since index j varies independently of i, we conclude that any 1–cell u1 ˆ ¨ ¨ ¨ ˆ
ui´1 ˆ eα ˆ ui`1 ˆ ¨ ¨ ¨ ˆ un , uk P t0, 1u, is contained in the parallelism class of
v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vn .
p m does not have three of the four pathologies
Now we show that the complex K
in the definition of a special cube complex.
Proposition 6.4.
p m do not self-intersect.
(a) Hyperplanes of K
p m do not self-osculate.
(b) Hyperplanes of K
p m are two-sided.
(c) Hyperplanes of K
Proof. It is convenient to work with the oriented walls dual to hyperplanes. Since,
p m is a square subcomplex of T2m`1 , every wall of K
p m is a
by Proposition 6.2, K
subset of some wall of T2m`1 . By Lemma 6.3, the walls in T2m`1 consist of all
1–cells of the form u1 ˆ ¨ ¨ ¨ ˆ ui´1 ˆ eα ˆ ui`1 ˆ ¨ ¨ ¨ ˆ u2m`1 for a fixed i, eα , and
arbitrary uk P t0, 1u.
p m were self-intersecting, the corresponding wall would conIf a hyperplane of K
tain edges with eα in two different coordinate positions i and j, which is impossible.
This proves (a).
p m were self-osculating, the corresponding wall would contain
If a hyperplane of K
a pair of edges u1 ˆ u2 ˆ ¨ ¨ ¨ ˆ ui´1 ˆ eα ˆ ui`1 ˆ ¨ ¨ ¨ ˆ u2m`1 and v1 ˆ v2 ˆ ¨ ¨ ¨ ˆ
vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ v2m`1 with common extremities: either their origins or their
termini coincide (for direct self-osculation), or the origin of one edge coincides with
the terminus of the other (for indirect self-osculation). In either case the tuples
pu1 , . . . , ui´1 , ui`1 , . . . , u2m`1 q and pv1 , . . . , vi´1 , vi`1 , . . . , v2m`1 q are equal, which
means that the original 1–cells are equal and there is actually no self-osculation
happening. This proves (b).
p m lies in a unique hyperplane
To prove (c) we observe that a hyperplane H of K
in T2m`1 . In particular, by the above lemma, in the coordinate system on T2m`1 ,
the hyperplane H has the following description:
(
H “ px1 , . . . xi´1 , t, xi`1 , . . . , x2m`1 q
for some 1 ď i ď 2m ` 1, t “ 12 or 32 , and some values from r0, 2s for the rest of the
p m is a square complex, H is the union of mid-cubes of some set
variables. Since K
p m of
of square 2–cells. Hence each point z of H belongs to a square 2–cell C of K
the form
C “ v1 ˆ ¨ ¨ ¨ ˆ vi´1 ˆ eα ˆ vi`1 ˆ ¨ ¨ ¨ ˆ vj´1 ˆ eβ ˆ vj`1 ˆ ¨ ¨ ¨ ˆ v2m`1
for some 1 ď j ď 2m ` 1, where all vk ’s are 0 or 1. (The index j may be less than
or bigger than i.)
Suppose that eα “ e0 so that t “ 21 . Then z actually has coordinates:
z “ pv1 , . . . vi´1 , 12 , vi`1 , . . . , vj´1 , s, vj`1 , . . . , v2m`1 q
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
27
where s is some value from r0, 2s. We see that the set
z ˆ r0, 1s “ pv1 , . . . vi´1 , t, vi`1 , . . . , vj´1 , s, vj`1 , . . . , v2m`1 q | t P r0, 1s
(
also belongs to the same square C above. We conclude that the product
(
H ˆ r0, 1s “ px1 , . . . xi´1 , t, xi`1 , . . . , xn q | t P r0, 1s
p m . This defines a combinatorial map H ˆ r0, 1s Ñ K
pm
is a union of 2–cells of K
1
(actually, an embedding) such that H ˆ t 2 u is identified with H itself.
A similar reasoning applies if eα “ e1 , t “ 32 (we parametrize H ˆ r0, 1s by
t P r1, 2s).
p m is two-sided.
This proves that every hyperplane of K
Unfortunately, cube subcomplexes of a Cartesian product of three or more graphs
can have inter-osculating hyperplanes, as the example in the Figure 10 shows. The
2–complex in Figure 10 is a subcomplex of the product of two segments of length
one and a segment of length two.
Figure 10. A subcomplex in a product of three graphs with interosculating hyperplanes.
However, Haglund and Wise have proved in [21, Th. 5.7] that in the case when the
square complex is a so-called VH-complex, the absence of the first three hyperplane
pathologies guarantees the existence of a finite special cover.
Definition 6.5. (VH-complex) A simple square complex is called a VH-complex
if its edges are divided into two disjoint classes: vertical and horizontal, such that
the attaching map of each square is of the form vhv 1 h1 where v, v 1 are vertical and
h, h1 are horizontal edges.
p m are VHProposition 6.6. For all even integers m, the complexes Km,m and K
pm.
complexes. Hence there exist a finite special cover K m Ñ K
Proof. From the LOG definition (see section 5.1) of groups Gm,m we observe that,
for the even integers m, the odd-indexed and the even-indexed generators form two
classes V and H (‘vertical’ and ‘horizontal’) such that all relators of Gm,m have the
form: v1h “ v2 or hv1 “ h2 for some v, v1 , v2 P V , h, h1 , h2 P H. This implies that
the complex Km,m is a VH-complex.
p m , being a finite cover of Km,m , inherits the structure of a VHThe complex K
complex from Km,m . Indeed, the preimages of the vertical and horizontal edges
28
NOEL BRADY AND IGNAT SOROKO
p m Ñ Km,m form two disjoint classes Vp “
in Km,m under the covering map p : K
´1
´1
p “ p pHq, and all edges of K
p m are contained in Vp \ H.
p The link
p pV q and H
of every vertex of Km,m is a bipartite graph corresponding to parts V and H,
and links of vertices are mapped isomorphically under covering maps. Thus all
p m are bipartite with respect to parts Vp and H.
p Therefore
links of vertices in K
p
all 2–cells of Km have boundaries of the form v1 h1 v2 h2 with v1 , v2 P Vp , h1 , h2 P
p By Proposition 6.4, hyperplanes of K
p m have no self-intersections and no selfH.
osculations. Hence, by Theorem 5.7 in [21], there exist a special cube complex K m
pm.
and a finite cover K m Ñ K
7. Proof of Main Theorems
Now we are ready to prove our main results.
Theorem A. For each positive even integer m there exist virtually special free-bycyclic groups Gm,m – F2m ¸φ Z with growth function grφ pnq „ nm and Gm,m´1 –
F2m´1 ¸φ1 Z with growth function grφ1 pnq „ nm´1 .
Proof. We have seen in Proposition 6.6 that for each even integer m ą 0, there
exist a special cover K m Ñ Km,m for the presentation complex Km,m of the group
Gm,m – F2m ¸φ Z. In Propositions 8.1 and 8.12 of section 8 we show that the
growth function for φ “ φm,m is „ nm . This proves the first part of Theorem A.
For the second part, recall that Gm,m´1 “ F2m´1 ¸φ1 Z, where φ1 “ φm,m´1
is the restriction of φ on the free subgroup on the first 2m ´ 1 generators. By
construction, the presentation complex Km,m´1 for Gm,m´1 is a subcomplex of
Km,m , and is actually obtained from Km,m by deleting the loop corresponding to
the last generator a2m`1 and also the single open 2–cell adjacent to a2m`1 (i.e.
which have a2m`1 as one of their sides).
Let p̄ : K m Ñ Km,m be the special cover of Km,m from Proposition 6.6. Consider
a square subcomplex K 1m Ă K m which is obtained by:
(1) deleting all 1–cells of K m which map under p̄ onto the loop labeled a2m`1
in Km,m ;
(2) deleting all open 2–cells of K m which have 1–cells from (1) as one of their
sides;
(3) taking a connected component of the resulting complex.
We claim that p̄ : K 1m Ñ Km,m´1 is a finite special cover of Km,m´1 .
Indeed, by construction, p̄pK 1m q lies in Km,m´1 . The hyperplanes of K 1m are twosided, do not self-intersect and do not self-osculate, since they are subcomplexes of
the corresponding hyperplanes in the special complex K m .
To see that the complex K 1m has no inter-osculating hyperplanes, observe that
in steps (1), (2) above we deleted only the hyperplanes which are dual to the 1–
cells corresponding to the last generator a2m`1 . This doesn’t change the absence of
inter-osculation of the remaining hyperplanes of K m . Therefore, the hyperplanes
in K 1m do not inter-osculate either, and K 1m is special.
Again, that the growth of φ1 is „ nm´1 is shown in Propositions 8.1 and 8.12 in
section 8, since φ1 “ φm,m´1 .
Corollary A. For each positive integer k there exist a right-angled Artin group
containing a free-by-cyclic subgroup whose monodromy automorphism has growth
function „ nk .
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
29
Proof. In Theorem A we have proved that for any positive integer k (where k “ m
or m ´ 1 for arbitrary even m) there exists a free-by-cyclic group G “ F ¸ψ Z
with grψ pnq „ nk , such that some finite index subgroup H ď G is isomorphic to a
fundamental group of a special cube complex. By D. Wise’s celebrated result (see
Corollary 4.13), there exists a right-angled Artin group Ap∆q with H isomorphic
to a subgroup of Ap∆q.
Let’s prove that H is free-by-cyclic itself. Indeed, we have a commutative diagram:
1
F
F ¸ψ Z π
Z
1
1
N
H
`Z
1
Here N “ H X F and `Z is the image of H under π. Since H has finite index in
G, ` ‰ 0. Hence the subgroup N is invariant under ψ ` and is a free group. Since
F Ÿ G, F H is a subgroup of G, and
|F : N | “ |F : H X F | “ |F H : H| ď |G : H| ă 8.
Therefore, N is a finitely generated free group, and H – N ¸ψ` Z, a free-by-cyclic
group.
Parts (ii) and (iii) of Proposition 2.4 tell us now that
grψ` |N pnq „ grψ pnq „ nk .
Theorem B. For each positive integer k there exists a right-angled Artin group
which contains a finitely presented subgroup with Dehn function » nk .
Proof. In Theorem A we proved that, for all even integers m, the free-by-cyclic
group Gm,m “ F2m ¸φ Z (resp. Gm,m´1 “ F2m´1 ¸φ1 Z) has the following properties:
grφ pnq „ nm (resp. grφ1 pnq „ nm´1 ), and it contains a finite index subgroup H
which embeds into a right-angled Artin group. In Corollary A we showed that H
is itself free-by-cyclic: H – N ¸φ` Z (resp. H – N ¸φ1 ` Z) for some finite index
subgroup N ď F2m (resp. N ď F2m´1 ) with the monodromy automorphism being
φ` (resp. pφ1 q` ) for some ` ą 0.
We claim that the Bieri double of H, ΓpHq “ H ˚F H, has Dehn function δΓ pnq
» equivalent to grφ pnq ¨ n2 (resp. grφ1 pnq ¨ n2 ), and itself embeds into a RAAG.
We now prove this claim for the case of subgroup H ď Gm,m , the monodromy
automorphism φ` , and k “ m, and notice that the case of H ď Gm,m´1 , the
`
monodromy automorphism φ1 , and k “ m ´ 1, is proved in a similar fashion.
k`2
The upper bound: δΓ pnq ă
is established as follows. By Propositions 8.1,
“n
k
and 8.12, grφ pnq „ n and grφ´1 pnq „ nk . Proposition 2.4(ii) implies that grφ` pnq „
nk and grpφ` q´1 pnq “ grpφ´1 q` pnq „ nk , and so the upper bound follows from Proposition 3.4.
The lower bound: n¨max}b}ďn, bPN }φ`n pbq} ă
“ δΓ pnq was given in Proposition 3.3.
k`1
If we show that max}b}ďn, bPN }φ`n pbq} ą
, it will follow, in view of the above,
“n
that δΓ pnq » nk`2 .
We prove in section 8 that in the group Gm,m “ F2m ¸φ Z, containing H, the
maximum in the definition of the growth functions
gr
›
› φ pnq
ˇ and ngrφab pnq
ˇ is achieved
m
k
ˇ
at the generator Bm (see Corollary 8.14): ›φn pBm q› „ ˇpφab
q
p
B̄
q
k 1 „ n “ n .
m,k
30
NOEL BRADY AND IGNAT SOROKO
(Here the bar over an element of F2m denotes its image in the abelianization of
F2m .)
Since the subgroup N is of finite index in F2m , there exists an integer p ą 0 such
p
that Bm
P N . Then we have:
›
› ›
›
ˇ
ˇ
pn ›
max ›φ`n pbq› ě ›φ`n pBm
q ě pn ¨ ˇpφab q`n pB̄m qˇ ľ pnp`nqm „ nm`1 .
1
}b}ďn
bPN
Since k “ m, this proves that δΓ pnq » nk`2 .
To prove that Γ embeds into a RAAG, consider a homomorphism µ : Γ Ñ H ˆ
F pu, vq, where F pu, vq is a free group of rank 2 on free generators u, v, from [12,
Rem. 3.7(iii)], which is described as follows. Let N “ F px1 , . . . , xq q be freely
generated by elements x1 , . . . , xq . Denote the generators of Z-factors
` of three copies
`
of H
as
s,
t
and
τ
.
Also
denote
for
brevity
ψ
“
φ
.
Then
Γ
“
F px1 , . . . , xq q ¸
˘
`
˘
`
˘ψ
xsy ˚F px1 ,...,xq q F px1 , . . . , xq q ¸ψ xty , and H ˆ F pu, vq “ F px1 , . . . , xq q ¸ψ xτ y ˆ
F pu, vq. Define µ on the generators as follows:
xi ÞÑ xi ,
s ÞÑ τ u,
t ÞÑ τ v.
We check at once that µ is a homomorphism, and it is easily proved using the
normal forms of elements in free amalgamated products, that µ is injective.
Thus, if we denote the right-angled Artin group containing H as Ap∆q, for some
graph ∆, then Γ Ă H ˆ F2 is a subgroup of Ap∆q ˆ F2 , which is itself a RAAG
(corresponding to the graph join of ∆ and the empty graph on two vertices).
Remark 7.1. Following the proof of Proposition 3.3 given in [12, Lemma 1.5]
(see also [10, Proposition 7.2.2]), we can exhibit an explicit sequence of words
wn “ rpst´1 qn , t`n Bkpn t´`n s (where k “ m or m´1, as above) which realize the lower
bound for the Dehn function δΓ pnq. To understand what van Kampen diagrams for
these words look like, the reader is referred to the proof of [12, Lemma 1.5]. In the
notation of [12], β “ Bkpn , t1 “ t, t2 “ s.
8. Growth of φ and φ´1
In Proposition 5.4 we have shown that, for all 1 ď k ď m, Gm,k “ Fm`k ¸φm,k Z,
where Fm`k is a free group with generators A1 , . . . , Am , B1 , . . . , Bk . For convenience, in what follows we adopt the notation:
φ “ φm,m
and use the fact that φm,k is the restriction of φ on the first m ` k generators.
The goal of this section is to prove that φm,k and pφm,k q´1 have growth „ nk . In
particular, grφ pnq „ grφ´1 pnq „ nm .
Throughout this section, }.} will denote the word length in F2m with respect to
the system of free generators tAi , Bj u.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
31
Recall (see Proposition 5.4) that the automorphism φ is given by the formulas
(where the overbar denotes the inverse):
φ “ φm,m :
A1 ÞÝÑ A1
(1)
A2 ÞÝÑ A1 pA2 q A1
A3 ÞÝÑ A1 A2 pA3 q A2 A1
...
Am ÞÝÑ A1 A2 . . . Am´1 pAm q Am´1 . . . A1
B1 ÞÝÑ A1 A2 . . . Am pB1 q
B2 ÞÝÑ A1 A2 . . . Am pB1 B2 q A1
B3 ÞÝÑ A1 A2 . . . Am pB1 B2 B3 q A2 A1
...
Bm ÞÝÑ A1 A2 . . . Am pB1 B2 . . . Bm q Am´1 Am´2 . . . A2 A1 .
8.1. Upper bounds for the growth of φ, φ´1 .
Proposition 8.1. For the automorphism φm,k we have:
grφm,k pnq ĺ nk
and
grpφm,k q´1 pnq ĺ nk .
We will need few basic lemmas.
Lemma 8.2. For i “ 1, . . . , m,
φn pAi q “ An1 An2 . . . Ani´1 ¨ Ai ¨ Ani´1 . . . An2 An1 .
Proof. We prove the statement by induction on n, observing that it is true for
n “ 0, 1:
φn`1 pAi q “ φpφn pAi qq “ φpAn1 An2 . . . Ani´1 q ¨ φpAi q ¨ φpAni´1 . . . An2 An1 q
“ φpAn1 qφpAn2 qφpAn3 q . . . φpAni´1 q ¨ φpAi q ¨ φpAni´1 q . . . φpAn3 qφpAn2 qφpAn1 q
“ pAn1 qpA1 An2 A1 qpA1 A2 An3 A2 A1 q . . . pA1 . . . Ai´2 Ani´1 Ai´2 . . . A1 q
ˆ pA1 . . . Ai´1 Ai Ai´1 . . . A1 q ˆ pA1 . . . Ai´2 Ani´1 Ai´2 . . . A1 q . . . pA1 A2 An3 A2 A1 q
n`1
n`1 n`1
ˆ pA1 An2 A1 qpAn1 q “ An`1
An`1
. . . An`1
A1 .
1
2
i´1 ¨ Ai ¨ Ai´1 . . . A2
Corollary 8.3. For i “ 1, . . . , m,
}φn pAi q} “ 2pi ´ 1qn ` 1.
Lemma 8.4. φn pB1 q “ An1 An2 . . . Anm ¨ B1 .
Proof. The statement is true for n “ 0, 1. By induction,
φn`1 pB1 q “ φpφn pB1 qq “ φpAn1 An2 . . . Anm q ¨ φpB1 q
“ pAn1 qpA1 An2 A1 qpA1 A2 An3 A2 A1 q . . . pA1 . . . Am´1 Anm Am´1 . . . A1 q
ˆ pA1 A2 . . . Am ¨ B1 q “ An`1
An`1
. . . An`1
¨ B1 .
m
1
2
Corollary 8.5. }φn pB1 q} “ mn ` 1.
32
NOEL BRADY AND IGNAT SOROKO
n
n n
Lemma 8.6. φn pA1 A2 . . . Am q “ An`1
An`1
. . . An`1
1
2
m´1 ¨ Am ¨ Am´1 . . . A2 A1 .
Proof. We do induction on n, the case n “ 0 being evident:
φn`1 pA1 A2 . . . Am q “ φpφn pA1 A2 . . . Am qq “ φpAn`1
qφpAn`1
q . . . φpAn`1
1
2
m´1 q
ˆ φpAm q ¨ φpAnm´1 q . . . φpAn2 qφpAn1 q “ pAn`1
A1 qpA1 A2 An`1
A2 A1 q . . .
qpA1 An`1
3
1
2
ˆ pA1 . . . Am´2 An`1
m´1 Am´2 . . . A1 q ¨ pA1 . . . Am´1 Am Am´1 . . . A1 q
ˆ pA1 . . . Am´2 Anm´1 Am´2 . . . A1 q . . . pA1 A2 An3 A2 A1 q ¨ pA1 An2 A1 qpAn1 q
n`1
n`1 n`1
A1 .
“ An`2
An`2
. . . An`2
1
2
m´1 ¨ Am ¨ Am´1 . . . A2
Lemma 8.7. }φn pB2 q} “
m 2
2n
` pm
2 ` 2qn ` 1.
Proof. One observes that
φpB2 q “ φpB1 q ¨ B2 ¨ A1 .
This gives by induction in view of Lemma 8.4:
φn pB2 q “ φn pB1 qφn´1 pB1 q . . . φpB1 q ¨ B1 ¨ An1
n
“ pAn1 An2 . . . Anm B1 q ¨ pA1n´1 An´1
. . . An´1
m B1 q . . . pA1 A2 . . . Am B1 q ¨ B1 ¨ A1 .
2
Hence,
}φn pB2 q} “ rmn ` 1s ` rmpn ´ 1q ` 1s ` . . . ` rm ` 1s ` 1 ` n
`m
˘
2
“ m npn`1q
` 2n ` 1 “ m
2
2 n ` 2 ` 2 n ` 1.
Claim 8.8. For k “ 1, . . . , m,
}φn pBk q} ĺ nk .
Proof. From the formulas (1) we get for all k ě 2,
φpBk`1 q “ φpBk q ¨ pA1 . . . Ak´1 q ¨ Bk`1 ¨ φpAk . . . A1 q.
Therefore,
φn pBk`1 q “ φn pBk q ¨ φn´1 pA1 . . . Ak´1 q ¨ φn´1 pBk`1 q ¨ φn´1 pA1 . . . Ak q´1 .
Lemma 8.6 gives:
}φn´1 pA1 . . . Ak´1 q} “ 2pk ´ 2qpn ´ 1q ` pk ´ 1q,
}φn´1 pA1 . . . Ak q´1 } “ 2pk ´ 1qpn ´ 1q ` k,
so that the total length of φn pBk`1 q is bounded above by
}φn pBk q} ` }φn´1 pBk`1 q} ` rp4k ´ 6qn ´ p2k ´ 5qs.
Now if we denote
f pk, nq :“ }φn pBk q},
we will
‚
‚
‚
have
f pk, 0q “ 1;
f p1, nq “ mn ` 1, by Corollary 8.5;
m
2
f p2, nq “ m
2 n ` p 2 ` 2q ` 1, by Lemma 8.7;
(2)
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
33
and for k ě 2,
f pk ` 1, nq ď f pk, nq ` f pk ` 1, n ´ 1q ` rp4k ´ 6qn ´ p2k ´ 5qs.
We have an inequality here (instead of an equality) because in the formula (2) there
can be some cancellations. Let’s define another function gpk, nq as follows:
‚ gpk, 0q “ 1;
‚ gp1, nq “ f p1, nq “ mn ` 1,
m
2
‚ gp2, nq “ f p2, nq “ m
2 n ` p 2 ` 2q ` 1,
‚ gpk ` 1, nq “ gpk, nq ` gpk ` 1, n ´ 1q ` rp4k ´ 6qn ´ p2k ´ 5qs, for k ě 2.
Obviously, g is well-defined in a recurrent fashion. An easy induction shows that
f pk, nq ď gpk, nq for all k ě 1, n ě 0,
so that gpk, nq gives an upper bound for the growth of }φn pBk q}.
To estimate the order of growth of gpk, nq, let’s look at finite differences in n:
gpk ` 1, nq ´ gpk ` 1, n ´ 1q “ gpk, nq ` rp4k ´ 6qn ´ p2k ´ 5qs
so if we assume by induction that gpk, nq is a polynomial in n of degree k, then we
conclude that gpk ` 1, nq is a polynomial of degree k ` 1 in n.
Since this assumption is true for k “ 1 and 2, this proves Claim 8.8.
Now we establish a similar bound for φ´1 . One could use the train-track machinery (along the lines of [25, Th. 0.4]) to prove that the growth of φ´1 is the same
as the growth of φ, when it is polynomial, but we give here a simple direct proof.
One easily checks that the inverse automorphism φ´1 acts as follows:
φ´1 :
A1 ÞÝÑ A1
(3)
A2 ÞÝÑ A1 pA2 q A1
A3 ÞÝÑ A1 A2 pA3 q A2 A1
...
Am ÞÝÑ A1 A2 . . . Am´1 pAm q Am´1 . . . A2 A1
B1 ÞÝÑ A1 A2 . . . Am´1 Am ¨ B1
B2 ÞÝÑ pB 1 B2 qA1
B3 ÞÝÑ A1 pB 2 B3 q A2 A1
...
Bm ÞÝÑ A1 A2 . . . Am´2 pB m´1 Bm q Am´1 . . . A2 A1 .
Lemma 8.9. For i “ 1, . . . , m,
}φ´n pAi q} “ }φn pAi q} “ 2pi ´ 1qn ` 1.
Proof. Define an automorphism ι : H ÝÑ H of the subgroup H “ xA1 , . . . , Am y
given by ι : Aj ÞÑ Aj , j “ 1, . . . , m. One easily checks that
φ´1 |H “ ι ˝ pφ|H q ˝ ι´1 ,
therefore }φ´n pAi q} “ }φn pAi q} and the result follows from Corollary 8.3.
34
NOEL BRADY AND IGNAT SOROKO
Claim 8.10. For k “ 1, . . . , m,
}φ´n pBk q} ĺ nk .
Proof. Denote for any i ě 0, k ě 2:
T1,i :“ B1 ,
Tk,i :“ Bk ¨ Aik´1 Aik´2 . . . Ai2 Ai1 ,
Si :“ Ai1 Ai2 . . . Aim´1 Aim .
In this notation, the action of φ´1 can be written as follows:
φ´1 pTk,i q “ Tk´1,1 ¨ Tk,i`2 ,
φ
´1
(4)
pSi ¨ T1,1 q “ Si`1 ¨ T1,1 .
The first relation is obvious, and the second one follows by easy induction.
Lemma 8.11. }φ´n pB1 q} “ mn ` 1.
Proof. Indeed,
φ´n pB1 q “ φ´n pS0 ¨ T1,1 q “ φ´pn´1q pS1 ¨ T1,1 q “ φ´pn´2q pS2 ¨ T1,1 q “ . . .
“ φ´2 pSn´2 ¨ T1,1 q “ φ´1 pSn´1 ¨ T1,1 q “ Sn ¨ T1,1 .
Define for any k ě 1, i ě 0, n ě 0 a function f pk, i, nq as follows:
‚ f p1, i, nq “ mn ` 1;
‚ f pk, i, nq “ }φ´n pTk,i q}, for k ě 2.
Then relations (4) imply
f pk, i, n ` 1q ď f pk ´ 1, 1, nq ` f pk, i ` 1, nq,
where we have an inequality (but not an equality) because of possible cancellations
in the reduced expression for φ´n pTk,i q.
To obtain an upper bound on f pk, i, nq we introduce a function gpk, i, nq defined
recurrently as follows:
‚ gpk, i, 0q “ }Tk,i } “ pk ´ 1qi ` 1, for all k ě 1, i ě 0;
‚ gp1, i, nq “ }φ´n pB1 q} “ mn ` 1, for all i ě 0, n ě 0;
‚ gpk, i, n ` 1q “ gpk ´ 1, 1, nq ` gpk, i ` 1, nq, for all k ě 2, i ě 0, n ě 0.
These formulas define gpk, i, nq recurrently for all values of k ě 1, i ě 0, n ě 0.
Indeed, one proceeds by layers numbered by n, with the case n “ 0 given by the
first formula, and the case of arbitrary n given by the third one, which is valid for
k ě 2. The remaining case k “ 1 is given by the second formula.
Clearly, f pk, i, nq ď gpk, i, nq for all k ě 1, i ě 0, n ě 0, so that the function g
can be used to establish the upper bound for }φ´n pBk q}:
}φ´n pBk q} “ }φ´n pTk,0 q} “ f pk, 0, nq ď gpk, 0, nq.
To estimate the growth of gpk, i, nq, consider the finite difference gpk, i, n ` 1q ´
gpk, i, nq. Applying the recurrent relation several times, we get:
gpk, i, n ` 1q “ gpk ´ 1, 1, nq ` gpk, i ` 1, nq
“ gpk ´ 1, 1, nq ` gpk ´ 1, 1, n ´ 1q ` gpk, i ` 2, n ´ 1q
...
“ rgpk ´ 1, 1, nq ` gpk ´ 1, 1, n ´ 1q ` ¨ ¨ ¨ ` gpk ´ 1, 1, 0qs ` gpk, i ` n ` 1, 0q.
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
35
Similarly,
gpk, i, nq “ rgpk ´ 1, 1, n ´ 1q ` gpk ´ 1, 1, n ´ 2q ` ¨ ¨ ¨ ` gpk ´ 1, 1, 0qs ` gpk, i ` n, 0q.
Since by definition
gpk, i ` n ` 1, 0q “ pk ´ 1qpi ` n ` 1q ` 1,
gpk, i ` n, 0q “ pk ´ 1qpi ` nq ` 1,
we have for all k ě 2, i ě 0, n ě 0:
gpk, i, n ` 1q ´ gpk, i, nq “ gpk ´ 1, 1, nq ` pk ´ 1q.
(5)
In particular,
gpk, 1, n ` 1q ´ gpk, 1, nq “ gpk ´ 1, 1, nq ` pk ´ 1q.
If we assume by induction on k that gpk ´ 1, 1, nq is a polynomial function in n of
degree k ´ 1 (which is true for k “ 2 since gp1, i, nq “ mn ` 1), then we conclude
at once that gpk, 1, nq is a polynomial function in n of degree k.
Now the formula (5) similarly implies that gpk, i, nq is a polynomial in n of
degree k.
Therefore, }φ´n pBk q} ď gpk, 0, nq „ nk , which finishes the proof of Claim 8.10.
Proof of Proposition 8.1. According to Corollary 8.3 and Lemma 8.9, }φ˘n pAi q} ĺ
n for i “ 1, . . . , m, and according to Claims 8.8 and 8.10, }φ˘n pBk q} ĺ nk , for
k “ 1, . . . , m. Therefore grφm,k pnq ĺ nk and grpφm,k q´1 pnq ĺ nk .
8.2. Lower bounds for the growth of φ, φ´1 .
Proposition 8.12. For the automorphism φm,k and φ´1
m,k , we have:
grφm,k pnq ľ nk
and
grpφm,k q´1 pnq ľ nk .
Claim 8.13. The size of the largest Jordan block of the Jordan normal form for
´1 ab
both φab
is k ` 1.
m,k , pφm,k q
´1 ab
´1
Proof. It is sufficient to prove the claim just for φab
“ pφab
.
m,k , as pφm,k q
m,k q
ab
By direct inspection of formulas (1), we see that φm,k is represented by the
following pm ` kq ˆ pm ` kq matrix:
«
ff
I
D
m
mk
φab
,
m,k “
Okm Ckk
where Im is the identity m ˆ m matrix, Okm is the zero k ˆ m matrix, and Dmk
and Ckk are m ˆ k and k ˆ k matrices, respectively, given by the formulas:
»
fi
»
fi
1 1 ... 1
1 1 ... 1
—1 1 . . . 1ffi
—0 1 . . . 1ffi
ffi
ffi
Dmk “ —
Ckk “ —
–. . . . . . . . . . . . .fl ,
–. . . . . . . . . . . . .fl .
1 1 ... 1
0 0 ... 1
It is known that the number of Jordan blocks of a matrix A P GLpm ` k, Cq with
all eigenvalues 1 is given by the number
dim kerpA ´ Im`k q “ m ` k ´ rankpA ´ Im`k q,
36
NOEL BRADY AND IGNAT SOROKO
and the number of Jordan blocks of A with all eigenvalues 1 and size at least 2 is
given by
dim kerrpA ´ Im`k q2 s ´ dim kerpA ´ Im`k q “ rankpA ´ Im`k q ´ rankrpA ´ Im`k q2 s.
An easy computation shows that
»
«
φab
m,k
´ Im`k “
Omm
Dmk
Okm
1
Ckk
ff
,
and
where
«
pφab
m,k
2
´ Im`k q “
1
Ckk
fi
0 1 1 ... 1
—0 0 1 . . . 1ffi
—
ffi
ffi
“—
—. . . . . . . . . . . . . . . .ffi ,
–0 0 0 . . . 1fl
0 0 0 ... 0
Omm
1
Dmk
Okm
2
Ckk
ff
,
where
fi
0 0 1 2 ... k ´ 2
—0 0 0 1 . . . k ´ 3ffi
ffi
—
—. . . . . . . . . . . . . . . . . . . . . . .ffi
ffi
—
“—
1 ffi
ffi
—0 0 0 0 . . .
–0 0 0 0 . . .
0 fl
0 0 0 0 ...
0
»
»
1
Dmk
fi
0 1 2 ... k ´ 1
—0 1 2 . . . k ´ 1ffi
ffi
“—
–. . . . . . . . . . . . . . . . . . . .fl ,
0 1 2 ... k ´ 1
2
Ckk
1
2
Note that rank Ckk
“ k ´ 1, rank Ckk
“ k ´ 2, hence rankpφab
m,k ´ Im`k q “ k and
ab
2
rankrpφm,k ´ Im`k q s “ k ´ 1. Therefore,
the number of Jordan blocks for φab
m,k “ pm ` kq ´ k “ m,
the number of Jordan blocks of size ě 2 for φab
m,k “ k ´ pk ´ 1q “ 1.
This means that there is only one block of size bigger than 1, let’s denote this
size c, and there are m ´ 1 blocks of size 1. Hence, m ` k “ c ` pm ´ 1q ¨ 1 so that
c “ k ` 1.
Proof of Proposition 8.12. The Proposition follows now from Corollary 2.13 and
Claim 8.13.
8.3. Lower bounds for the growth of φab . In the proof of Theorem B in section 7 we needed a certificate for the growth of the abelianization of φm,k , i.e. an
element of the basis that realizes the maximum in the definition of the growth
functions. Now we can provide it:
Corollary 8.14. With the above notation, let B̄k be the image of the generator Bk
in the abelianization of F . Then
›
› ˇ
ˇ
ˇ ab n
ˇ
n
k
›pφm,k qn pBk q› „ ˇpφab
ˇ
ˇ
ˇ
m,k q pB̄k q 1 „ pφm,k q pB̄k q 8 „ n .
Proof. An elementary computation with the matrix from the proof of Claim 8.13
n
shows that pφab
m,k q is represented by the matrix with the following structure:
«
ff
P
I
m
mk
n
,
pφab
m,k q “
Okm Qkk
DEHN FUNCTIONS OF SUBGROUPS OF RIGHT-ANGLED ARTIN GROUPS
37
where Im is the identity m ˆ m matrix, Okm is the zero k ˆ m matrix, and Pmk
and Qkk are m ˆ k and k ˆ k matrices, respectively, given by the formulas:
»
fi
»
fi
1 c1n . . . ck´2,n ck´1,n
c1n c2n . . . ckn
—0 1 . . . ck´3,n ck´2,n ffi
—c1n c2n . . . ckn ffi
—
ffi
—
ffi
ffi
Pmk “ –
,
Qkk “ —
—. . . . . . . . . . . . . . . . . . . . . . . . . . . .ffi .
. . . . . . . . . . . . . . . . . . .fl
–0 0 . . .
1
c1n fl
c1n c2n . . . ckn
0 0 ...
0
1
Here Pmk has all rows equal to each other and Qkk is upper triangular with the
same number on each diagonal sequence of entries parallel to the main diagonal.
The numbers c1n , c2n , . . . , ckn satisfy the following identity, which follows from the
matrix multiplication rule:
`
ÿ
c`,n`1 “
cin ,
i“0
with the convention
that
`
˘ c0n “ 1. We now show by double induction on pairs
pi, nq that cin “ n`i´1
. Indeed, this equality is true for pairs pi, nq “ p0, nq with
i
arbitrary n, since c0n “ 1 by our convention, and for pi, nq “ pi, 1q with arbitrary
i, since ci1 “ 1 in the matrix representation for φab
(see the proof of Claim 8.13).
`n`i´1˘ m,k
Now suppose that the equality cin “
is already proved for all pairs pi, nq
i
with n fixed and i arbitrary, and for all pairs pi, n ` 1q with 0 ď i ď ` ´ 1. Then
for the pair p`, n ` 1q we get:
ˆ
˙ ˆ
˙ ˆ
˙
`´1
ÿ
n``´1
n``´1
n``
c`,n`1 “
cin ` c`,n “ c`´1,n`1 ` c`,n “
`
“
,
`´1
`
`
i“0
as needed.
n
In particular, the coefficients of the vector pφab
m,k q pB̄k q are: 1, c1n , . . . , ckn , with
`n`k´1˘
ckn “
being a polynomial „ nk .
k
Since, by Claim 8.8, }φnm,k pBk q} ĺ nk , we have:
ˇ
ˇ ab n
ˇ
› ˇ
›
k
n
ˇ
ˇ
ˇ
nk ľ ›φnm,k pBk q› ě ˇpφab
m,k q pB̄k q 1 ě pφm,k q pB̄k q 8 ľ n ,
and we conclude that
ˇ ab n
ˇ
› ˇ
› n
˘
k
n
ˇ
ˇ
›φm,k pBk q› „ ˇpφab
m,k q pB̄k q 1 „ pφm,k q pB̄k |8 „ n .
Remark 8.15. It can be proved in a similar manner that the same elements Bk and
ab ´1
,
B̄k also serve as certificates for the growth of automorphisms φ´1
m,k and pφm,k q
respectively. However the formulas involved are more complicated, and we don’t
need this result for our construction.
9. Open questions
We conclude our paper with two open questions.
Question 1. Does every CAT(0) free-by-cyclic group virtually embed into a RAAG?
Question 2. Do there exist finitely presented subgroups of RAAGs whose Dehn
functions are either super-exponential or sub-exponential but not polynomial?
38
NOEL BRADY AND IGNAT SOROKO
References
[1] Agol, I., Criteria for virtual fibering. J. Topol. 1 (2008), no. 2, 269–284.
[2] Agol, I., The virtual Haken conjecture. With an appendix by Ian Agol, Daniel Groves, and
Jason Manning. Doc. Math. 18 (2013), 1045–1087.
[3] Barnard, J., Brady, N., Distortion of surface groups in CAT(0) free-by-cyclic groups. Geom.
Dedicata, 120 (2006), 119–139.
[4] Bestvina, M., Brady, N., Morse theory and finiteness properties of groups. Invent. Math., 129
(1997), no. 3, 445–470.
[5] Birget, J., Ol’shanskii, A., Rips, E., Sapir, M., Isomperimetric functions of groups and computational complexity of the word problem. Ann. of Math. (2), 156 (2002), no. 2, 476–518.
[6] Brady, N., Forester, M., Snowflake geometry in CAT(0) groups. arXiv:1602.08379 [math.GR],
48 pages.
[7] Brady, N., Dehn functions and non-positive curvature, in The geometry of the word problem
for finitely generated groups. (Birkhäuser, Basel, 2007) 1–79.
[8] Brady, N., Bridson, M., There is only one gap in the isoperimetric spectrum. Geom. Funct.
Anal., 10 (2000), no. 5, 1053–1070.
[9] Bridson, M. R., Combings of semidirect products and 3–manifold groups. Geom. Funct. Anal.,
3 (1993), no. 3, 263–278.
[10] Bridson, M. R., The geometry of the word problem. Invitations to geometry and topology,
29–91, Oxf. Grad. Texts Math., 7, Oxford Univ. Press, Oxford, 2002.
[11] Bridson, M. R., On the subgroups of right-angled Artin groups and mapping class groups.
Math. Res. Lett., 20 (2013), no. 2, 203–212.
[12] Bridson, M. R., Polynomial Dehn functions and the length of asynchronously automatic
structures. Proc. London Math Soc., (3) 85 (2002), 441–466.
[13] Bridson, M. R., Gersten, S. M., The optimal isoperimetric inequality for torus bundles over
the circle. Quart. J. Math. Oxford Ser. (2), 47 (1996), no. 185, 1–23.
[14] Bridson, M. R., Haefliger, A., Metric Spaces of Non-Positive Curvature. Springer, 1999.
[15] Bridson, M. R., Pittet, Ch., Isoperimetric inequalities for the fundamental groups of torus
bundles over the circle. Geom. Dedicata, 49 (1994), no. 2, 203–219.
[16] Dison, W., An isoperimetric function for Bestvina–Brady groups. Bull. Lond. Math. Soc. 40
(2008), no. 3, 384–394.
[17] Dison, W., Riley, T. R., Hydra groups. Comment. Math. Helv. 88 (2013), no. 3, 507–540.
[18] Gersten, S. M., The automorphism group of a free group is not a CAT(0) group. Proc. Amer.
Math. Soc. 121 (1994), no. 4, 999–1002.
[19] Hagen, M. F., Wise, D. T., Cubulating hyperbolic free-by-cyclic groups: the irreducible case.
Duke Math. J. 165 (2016), no. 9, 1753–1813.
[20] Hagen, M. F., Wise, D. T., Cubulating hyperbolic free-by-cyclic groups: the general case.
Geom. Funct. Anal. 25 (2015), no. 1, 134–179.
[21] Haglund, F., Wise, D. T., Special cube complexes. Geom. Funct. Anal., 17 (2008), no. 5,
1551–1620.
[22] Horn, R.A., Johnson, C.R., Matrix Analysis. 2nd ed. Cambridge University Press, 2013.
[23] Howie, J., On the asphericity of ribbon disc complements. Trans. Amer. Math. Soc. 289
(1985), no. 1, 281–302.
[24] Levitt, G., Counting growth types of automorphisms of free groups. Geom. Funct. Anal. 19
(2009), no. 4, 1119–1146.
[25] Piggott, A., Detecting the growth of free group automorphisms by their action on the homology of subgroups of finite index. arXiv:math/0409319v1, 59 pages.
[26] Sapir, M., Birget, J.-C., Rips, E. Isoperimetric and isodiametric functions of groups. Ann. of
Math. (2), 156 (2002), no. 2, 345–466.
Department of Mathematics, University of Oklahoma, Norman, OK 73019, USA
E-mail address: [email protected]
Department of Mathematics, University of Oklahoma, Norman, OK 73019, USA
E-mail address: [email protected]
| 4math.GR
|
Deciding Circular-Arc Graph Isomorphism in
Parameterized Logspace
Maurice Chandoo1
1
Leibniz Universität Hannover, Theoretical Computer Science,
Appelstr. 4, 30167 Hannover, Germany
[email protected]
arXiv:1507.03348v3 [cs.DS] 28 Dec 2015
Abstract
We compute a canonical circular-arc representation for a given circular-arc (CA) graph which
implies solving the isomorphism and recognition problem for this class. To accomplish this we
split the class of CA graphs into uniform and non-uniform ones and employ a generalized version
of the argument given by Köbler et al. (2013) that has been used to show that the subclass of
Helly CA graphs can be canonized in logspace. For uniform CA graphs our approach works
in logspace and in addition to that Helly CA graphs are a strict subset of uniform CA graphs.
Thus our result is a generalization of the canonization result for Helly CA graphs. In the nonuniform case a specific set Ω of ambiguous vertices arises. By choosing the parameter k to be the
cardinality of Ω this obstacle can be solved by brute force. This leads to an O(k + log n) space
algorithm to compute a canonical representation for non-uniform and therefore all CA graphs.
1998 ACM Subject Classification G.2.2 Graph Theory
Keywords and phrases graph isomorphism, canonical representation, parameterized algorithm
1
Introduction
An arc is a connected set of points on the circle. A graph G is called a CA graph if every vertex
v can be assigned to an arc ρ(v) such that two vertices u, v are adjacent iff their respective
arcs intersect, i.e. ρ(u) ∩ ρ(v) 6= ∅. We call such a (bijective) mapping ρ a CA representation
of G and the set of arcs ρ(G) = {ρ(v) | v ∈ V (G)} a CA model. The recognition problem for
CA graphs is to decide whether a given graph G is a CA graph. The canonical representation
problem for CA graphs consists of computing a CA representation ρG for a given CA graph
G with the additional canonicity constraint that whenever two CA graphs G and H are
isomorphic the CA models ρG (G) and ρH (H) are identical.
Similarly, a graph is an interval graph if every vertex can be assigned to an interval on a
line such that two vertices share an edge iff their intervals intersect. It is easy to see that
every interval graph is a CA graph since every interval model is a CA model.
The class of CA graphs started to gain attraction after a series of papers in the 1970’s by
Alan Tucker. However, there is still no known better upper bound for deciding CA graph
isomorphism than for graph isomorphism in general even though considerable effort has been
done to this end. There have been two claimed polynomial-time algorithms in [9], [3] which
have been disproven in [2], [1] respectively. For the subclass of interval graphs a linear-time
algorithm for isomorphism has been described in [7]. A series of newer results show that
canonical representations for interval graphs, proper CA graphs and Helly CA graphs (a
superset of interval graphs) can be computed in logspace [4, 6, 5]. Furthermore, recognition
and isomorphism for interval graphs is logspace-hard[4] and these two hardness results carry
over to the class of CA graphs; for recognition the reduction requires a little additional work.
© Maurice Chandoo;
licensed under Creative Commons License CC-BY
Leibniz International Proceedings in Informatics
Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany
2
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
A1
2
ρ(i) = Ai
1
A2
ρ(G)
G
3
A5
5
4
A3
A4
Figure 1 A CA graph and representation
Our main contribution is that we extend the argument used in [5] to compute canonical
representations for HCA graphs to all CA graphs. We split the class of CA graphs into
uniform and non-uniform ones and show that the mentioned argument can be applied in both
cases using only O(k + log n) space. The parameter k describes the cardinality of an obstacle
set Ω that occurs only in the non-uniform case. This means k = 0 in the uniform case and
hence we also obtain a logspace algorithm for uniform CA graphs which are a superclass of
HCA graphs. To the best of our knowledge this is the first non-trivial algorithm to decide
isomorphism specifically for the class of CA graphs.
This paper is structured as follows. In section 2 we define CA graphs along with their
representations and recall the concept of normalized representations from [3]. In section 3
we explain what we mean by flip trick and formalize this with the notions of flip sets and
candidate functions. This idea has been used by [8] to compute a CA representation for CA
graphs in linear time and [5] has modified it to compute canonical (Helly) CA representations
for HCA graphs. In section 4 and 5 the flip trick is applied to uniform and non-uniform CA
graphs respectively.
2
Preliminaries
Given two sets A, B we say A and B intersect if A ∩ B 6= ∅. We say A, B overlap, in symbols
A G B, if A ∩ B, A \ B and B \ A are non-empty. Let A = (au,v )u,v∈V (A) , B = (bu,v )u,v∈V (B)
be two square matrices over vertex sets V (A), V (B). We say A and B are isomorphic, in
symbols A ∼
= B, if there exists a bijection π : V (A) → V (B) such that au,v = bπ(u),π(v) for
all u, v ∈ V (A); π is called an isomorphism. For two graphs G, H with adjacency matrices
∼ H if AG ∼
AG , AH we say that G =
= AH . We consider only undirected graphs without
self-loops. A graph class C is a subset of all graphs which is closed under isomorphism, i.e. if
G ∈ C and H ∼
= G then H ∈ C. We define the graph isomorphism problem for a graph class
∼ H}. For a graph G and a vertex v ∈ V (G) we
C as GI(C) = {(G, H) | G, H ∈ C and G =
define the open neighborhood N (v) of v as the set of vertices that are adjacent to v and the
closed neighborhood N [v] = N (v) ∪ {v}. For a subset of vertices V 0 ⊆ V (G) we define the
T
common neighborhood of V 0 as N [V 0 ] = v∈V 0 N [v]. We also write N [u, v, . . . ] instead of
N [{u, v, . . . }]. A vertex v is called universal if N [v] = V (G). For two vertices u =
6 v ∈ V (G)
we say that u and v are twins if N [u] = N [v]. A twin class is an equivalence class induced
by the twin relation. A graph is said to be without twins if every twin class has cardinality
one. For a graph G and S 0 ⊆ S ⊆ V (G) we define the exclusive neighborhood NS (S 0 ) as all
vertices v ∈ V (G) \ S such that v is adjacent to all vertices in S 0 and to none in S \ S 0 .
I Definition 1 (Label-independent). Let f be a function which maps graphs to a subset of
subsets of vertices, i.e. f (G) ⊆ P(V (G)). We say f is label-independent if for every pair of
isomorphic graphs G, H and all isomorphisms π from G to H it holds that
f (H) = {π(X) | X ∈ f (G)} with π(X) = {π(v) | v ∈ X}
M. Chandoo
2.1
Circular-Arc Graphs and Representations
A CA model is a set of arcs A = {A1 , . . . , An } on the circle. Let p 6= p0 be two points
on the circle. Then the arc A specified by [p, p0 ] is given by the part of the circle that is
traversed when starting from p going in clockwise direction until p0 is reached. We say that
p is the left and p0 the right endpoint of A and write l(·), r(·) to denote the left and right
endpoint of an arc in general. If A = [p, p0 ] then the arc obtained by swapping the endpoints
A = [p0 , p] covers the opposite part of the circle. We say A is obtained by flipping A. When
considering a CA model with respect to its intersection structure only the relative position
of the endpoints to each other matter. W.l.o.g. all endpoints can be assumed to be pairwise
different and no arc covers the full circle. Therefore a CA model A with n arcs can be
described as a unique string as follows. Pick an arbitrary arc A ∈ A and relabel the arcs with
1, . . . , n in order of appearance of their left endpoints when traversing the circle clockwise
starting from the left endpoint of A. Then write down the endpoints in order of appearance
when traversing the circle clockwise starting from the left endpoint of the chosen arc A. Do
this for every arc and pick the lexicographically smallest resulting string as representation
for A. For example, the smallest such string for the CA model in Fig. 1 would result from
choosing A1 (l(1), r(1), l(2), r(5), l(3), r(2), . . . ). In the following we identify A with its string
representation.
Let G be a graph and ρ = (A, f ) consists of a CA model A and a bijective mapping f
from the vertices of G to the arcs in A. Then ρ is called a CA representation of G if for all
u=
6 v ∈ V (G) it holds that {u, v} ∈ E(G) ⇔ f (u) ∩ f (v) 6= ∅. We write ρ(x) to mean the arc
f (x) corresponding to the vertex x, ρ(G) for the CA model A and for a subset V 0 ⊆ V (G)
let ρ[V 0 ] = {ρ(v) | v ∈ V 0 }. Given a set X ⊆ V (G) we write ρ+ (X) to denote ∪v∈X ρ(v). A
graph is a CA graph if it has a CA representation.
We say a CA model A has a hole if there exists a point on the circle which is not contained
in any arc in A. Every such CA model can be understood as interval model by straightening
the arcs. Therefore a graph is an interval graph if it admits a CA representation with a hole.
A CA graph G is called Helly (HCA graph) if it has a CA representation ρ such that for
T
all maxcliques, i.e. inclusion-maximal cliques, C in G it holds that v∈C ρ(v) 6= ∅. Every
interval model has the Helly property and therefore every interval graph is an HCA graph.
2.2
Normalized Representation
In [3] it was observed that the intersection type of two arcs A 6= B can be one of the following
five types: A and B are disjoint (di), A is contained in B (cd), A contains B (cs), A and B
jointly cover the circle (circle cover cc) or A and B overlap (ov) but do not jointly cover the
circle. Using these types we can associate a matrix with every CA model. An intersection
matrix is a square matrix with entries {di, ov, cs, cd, cc}. Given a CA model A we define its
intersection matrix µA such that (µA )a,b reflects the intersection type of the arcs a =
6 b ∈ A.
An intersection matrix µ is called a CA (interval) matrix if it is the intersection matrix of
some CA (interval) model.
When trying to construct a CA representation for a CA graph G it is clear that whenever
two vertices are non-adjacent their corresponding arcs must be disjoint. If two vertices u, v
are adjacent the intersection type of their corresponding arcs might be ambiguous. It would
be convenient if the intersection type for every pair of vertices would be uniquely determined
by G itself. This can be achieved by associating a graph G with an intersection matrix λG
3
4
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
called the neighborhood matrix which is defined for all u 6= v ∈ V (G) as
di , if {u, v} ∈
/ E(G)
cd , if N [u] ( N [v]
cs , if N [v] ( N [u]
(λG )u,v = cc , if N [u] G N [v] and N [u] ∪ N [v] = V (G)
and ∀w ∈ N [u] \ N [v] : N [w] ⊂ N [u]
and ∀w ∈ N [v] \ N [u] : N [w] ⊂ N [v]
ov , otherwise
and the first case applies whose condition is satisfied.
Let µ be an intersection matrix over the vertex set V and ρ = (A, f ) where A is a CA
model and f is a bijective mapping from V to A. We say ρ is a CA representation of the
matrix µ if µ is isomorphic to the intersection matrix of A via f and denote the set of
such CA representations with N (µ). Then we say ρ is a normalized CA representation of a
graph G if ρ is a CA representation of the neighborhood matrix λG of G. An example of a
normalized representation can be seen in Fig. 1. Let us denote the set of all normalized CA
representations of G with N (G) = N (λG ).
I Lemma 2 ([3]). Every CA graph G without twins and universal vertices has a normalized
CA representation, that is N (G) 6= ∅.
For our purpose it suffices to consider only graphs without twins and universal vertices for
the same reasons as in [5]. The point is that a universal vertex can be removed from the
graph and later added as arc which covers the whole circle in the representation. For each
twin class an arbitrary representative vertex can be chosen and colored with the cardinality
of its twin class; the other twins are removed.
I Lemma 3. The canonical CA representation problem for CA graphs is logspace reducible to
the canonical CA representation problem for colored CA graphs without twins and universal
vertices.
Henceforth we assume every graph to be twin-free and without universal vertices and shall
only consider normalized representations. For two vertices u 6= v in a graph G we write u α v
instead of (λG )u,v = α. For example, u cd v indicates that the arc of u must be contained in
the arc of v for every (normalized) representation of G.
3
Flip Trick
Let A be a CA model
and X ⊆ A is a subset of arcs to be flipped. We define the resulting
CA model A(X) = A | A ∈ X ∪ A \ X. Consider a point x on the circle and let X be the
Table 1 Effects of flipping arcs in the intersection matrix
µA,B
µĀ,B
µA,B̄
µĀ,B̄
di
cs
cd
cc
cd
cc
di
cs
cs
di
cc
cd
cc
cd
cs
di
ov
ov
ov
ov
M. Chandoo
5
set of arcs that contain this point. Then after flipping the arcs in X no other arc contains
the point x and thus A(X) has a hole and therefore must be an interval model. Let µ and
µ(X) be the intersection matrices of A and A(X) respectively. It was observed in [8] that
the interval matrix µ(X) can be easily computed using µ and X as input via Table 1. With
this the problem of computing a canonical CA representation for colored CA graphs can be
reduced to the canonical interval representation problem for colored interval matrices, which
can be solved in logspace[5] (the colored part is not mentioned explicitly but can be easily
incorporated into the proof by adding the colors to the leaves of the colored ∆ tree).
The idea is that given a CA graph G if we can compute a set of vertices X as described
above then we can obtain a canonical CA representation for G by the following argument.
(X)
The neighborhood matrix λG of G is a CA matrix and the matrix λG must be an interval
(X)
matrix. Compute a canonical interval representation for λG and flip the arcs in X back.
This leads to a representation for λG and thus G. The required set X can be specified as
follows.
I Definition 4. Let G be a CA graph. Then a non-empty X ⊆ V (G) is a flip set iff there
exists a representation ρ ∈ N (G) and a point x on the circle such that v ∈ X ⇔ x ∈ ρ(v).
In fact, for the argument to obtain a canonical representation to hold it is only required
(X)
that X is chosen such that λG is an interval matrix. However, it can be shown that this is
equivalent to the above definition, see Appendix. Now, we can reframe the argument given
in [5] as follows.
I Definition 5 (Candidate function). Let C be a subset of all CA graphs and f is a function
which maps graphs to a subset of subsets of their vertices, i.e. f (G) ⊆ P(V (G)). We call f a
candidate function for C if the following conditions hold:
1. For every G ∈ C there exists an X ∈ f (G) such that X is a flip set
2. f is label-independent
I Theorem 6. If f is a candidate function for all CA graphs that can be computed in logspace
then the canonical representation problem for CA graphs can be solved in logspace.
Proof. Let G be a graph. To decide the recognition problem for CA graphs observe that
there is a flip set in f (G) iff G is a CA graph. To verify if a set X ⊆ V (G) is a flip set one
(X)
can check if λG is an interval matrix by trying to compute an interval representation.
For the representation problem let G be a CA graph. Let F be the subset of f (G) such
that every X ∈ F is a flip set. By the first condition it holds that F is non-empty. For every
X ∈ F a CA representation ρX of G can be computed by the previous argument. We return
a CA representation with the lexicographically smallest underlying model
argmin ρX (G)
{ρX | X∈F }
as canonical CA representation. To see that this is indeed a canonical representation consider
two isomorphic CA graphs G, H with FG , FH defined as F for G previously. Let π be an
isomorphism from G to H and MG = {ρX (G) | X ∈ FG } is the set of CA models induced
by the flip sets FG , similarly define MH . Then canonicity follows by showing MG = MH .
We show that MG ⊆ MH as the argument for the other direction is analogous. Let A be
a model in MG . Let X be a flip set in FG which induces A, i.e. ρX (G) = A. It must hold
∼ λH and
that π(X) ∈ f (H) since f is label-independent. From G ∼
= H it follows that λG =
(X)
(π(X))
therefore the interval matrices λG and λH
are isomorphic meaning that π(X) ∈ FH
6
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
since it is a flip set as well. As the interval representations of both interval matrices have
identical underlying models due to canonicity it follows that they remain so after flipping X
resp. π(X). Therefore it holds that A ∈ MH .
This works in logspace since f and the representation ρX for every flip set X can be
computed in logspace.
J
So, we have reduced the problem of computing a canonical CA representation for CA graphs
to the problem of computing a candidate function for CA graphs.
Let C and C 0 be two graph classes that partition all CA graphs. If fC , fC 0 are candidate
functions for C, C 0 respectively then f (G) = fC (G) ∪ fC 0 (G) is a candidate function for all CA
graphs. That f is label-independent follows from label-independent functions being closed
under taking unions. The crux here is that we do not need to be able to distinguish if a
CA graph G is in C or C 0 . Hence, in the next two sections we consider two such classes that
partition all CA graphs while avoid dealing with recognition of these two classes.
We complete this section by stating the candidate function used in [5] to canonize HCA
graphs and explain why it is a candidate function for this subclass of CA graphs.
[
fHCA (G) =
N [u, v]
u,v∈V (G)
fHCA always returns at least one flip set for an HCA graph because all maxcliques in an
HCA graph are flip sets due to the Helly property and there exists at least one maxclique in
every HCA graph that can be characterized as the common neighborhood of two vertices[5].
However, neither of these two properties hold for CA graphs in general.
It remains to argue that fHCA can be computed in logspace and is label-independent.
Since the same arguments have to be made for the two candidate functions devised in the
next sections we introduce a tool that facilitates this and demonstrate it for fHCA .
I Definition 7. Let ϕ be a first-order (FO) formula over graph structures with k + 1 free
variables. Then we define the function fϕ for a graph G as:
[
fϕ (G) =
{u ∈ V (G) | G |= ϕ(v1 , . . . , vk , u)}
(v1 ,...,vk )∈V (G)k
I Lemma 8. For every FO formula ϕ over graph structures the function fϕ is computable
in logspace and label-independent.
To compute fϕ we can successively evaluate ϕ and take the union of the results, which can
be both done in logspace. To show that fϕ is label-independent it suffices to apply structural
induction to ϕ. The full argument for this can be found in the Appendix. Then fHCA is
computed by the FO formula ϕ(u, v, x) that states that x ∈ N [u, v]. By Lemma 8 it follows
that fHCA is logspace-computable and label-independent.
4
Uniform CA graphs
The difficulty when trying to compute flip sets for CA graphs in general is that for a CA
graph G there might be different normalized CA representations such that a set of vertices
shares a common point in one representation but not in an other one. We show a subset of
CA graphs, namely the uniform CA graphs, where this issue does not occur therefore making
it easy to compute flip sets.
For a CA graph G consider an arbitrary vertex u. Looking at the neighbors of u we
can try to compute the flip sets Xu,1 , Xu,2 specified in Fig. 2. Both sets contain u and all
M. Chandoo
7
vertices that contain u or form a circle cover with u. The vertices that overlap with u belong
to either Xu,1 or Xu,2 depending on the side they overlap from with u. Since we cannot
determine left and right from the neighborhood matrix we want to express an equivalence
relation ∼u which states that two vertices overlap from the same side with u. With the two
equivalence classes induced by ∼u the two flip sets can be expressed.
Given two vertices x, y that both overlap with u it is for instance easy to see that they
must overlap from different sides with u if they are disjoint. The only intersection type
between x, y for which the situation is not immediately clear is ov as further distinctions are
required. An ov-triangle is a set of three pairwise overlapping vertices. If x and y overlap
then x, y, u form such an ov-triangle. Consider the possible normalized representations for an
ov-triangle. The three vertices can either all jointly cover the circle or be a set of overlapping
intervals. In the first case they overlap pairwise but their overall intersection is empty thus
we call this a non-Helly triangle and the second case an interval triangle. For an interval
triangle there are three different possible representations up to reflection depending on which
of the three vertices is placed in-between the other two. If x, y, u is an ov-triangle then x
and y overlap from the same side with u iff x, y, u form an interval triangle and u is not
in-between x, y. We show that it is easy to derive this information in the case of a uniform
CA graph G as it does not depend on a representation of G.
I Definition 9. Let G be a graph. An ov-triangle T is in the set ∆G if the following holds:
S
1.
N [v] = V (G)
v∈T
2. For all x ∈ T it holds that if a vertex v ∈ NT (x) then v cd x
I Definition 10 (Uniform CA graph). A CA graph G is uniform if for all ov-triangle T in G
and ρ ∈ N (G) it holds that:
T ∈ ∆G ⇒ ρ[T ] is a non-Helly triangle
The idea behind the definition of ∆G is that it captures the properties that an ov-triangle
must satisfy in the graph if it can be represented as non-Helly triangle. The definition of
uniform CA graphs guarantees us that an ov-triangle T ∈ ∆G can never be represented as
interval triangle. Now, we can show that for the class of uniform CA graphs the property of
being a non-Helly triangle and the in-between predicate for interval triangles is invariant
across all normalized representations.
I Lemma 11. Let G be a uniform CA graph. Then the following statements are equivalent
for every ov-triangle T :
1. T ∈ ∆G
Xu,1
Xu,2
u
Figure 2 Uniform target flip sets
8
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
2. ∃ρ ∈ N (G) : ρ[T ] is a non-Helly triangle
3. ∀ρ ∈ N (G) : ρ[T ] is a non-Helly triangle
Proof. This immediately follows from the definition of ∆G and uniform CA graphs.
J
As a contrasting example of a (non-uniform) CA graph for which being a non-Helly triangle
depends on the representation consider the graph G obtained by taking the complement of
the disjoint union of three K2 ’s (a triforce with a circle around the outer corners). Every edge
in G is an ov-entry in λG and a CA model for G is given by precisely two non-Helly triangles.
The possible assignments of the vertices to the arcs that follow from the automorphisms of
G yield the different representations.
I Definition 12. Let G be a graph and T = {u, v, w} is an ov-triangle with T ∈
/ ∆G . We
say v is in-between u, w if at least one of the following holds:
1. NT (u), NT (w) 6= ∅
2. NT (u, w) 6= ∅ and there exists z ∈ NT (u, w) such that {u, w, z} ∈ ∆G
I Lemma 13. Let G be a uniform CA graph and T = {u, v, w} is an ov-triangle with
T ∈
/ ∆G . Then the following statements are equivalent:
1. v in-between u, w
2. ∃ρ ∈ N (G) : ρ(v) ⊂ ρ(u) ∪ ρ(w)
3. ∀ρ ∈ N (G) : ρ(v) ⊂ ρ(u) ∪ ρ(w)
Proof. “2 ⇒ 1”: There exists ρ ∈ N (G) such that ρ(v) ⊂ ρ(u) ∪ ρ(w). For all x 6= y ∈ T
it must hold that N [x] \ N [y] 6= ∅ due to the fact that x ov y implies N [x] G N [y]. For this
to be true NT (x) or NT (x, z) must be non-empty for z ∈ T \ {x, y}. It follows that NT (u)
and NT (w) or NT (u, w) must be non-empty since NT (v) = ∅ due to ρ(v) ⊂ ρ(u) ∪ ρ(w). If
z ∈ NT (u, w) then for ρ(z) to intersect with ρ(u) and ρ(w) but not with ρ(v) implies that
ρ[u, w, z] forms a non-Helly triangle and therefore {u, w, z} ∈ ∆G by Lemma 11.
“1 ⇒ 3”: Assume there exists a ρ ∈ N (G) such that ρ(u) ⊂ ρ(v) ∪ ρ(w). This implies that
NT (u) = ∅ and therefore there exists a z ∈ NT (u, w) such that {u, w, z} ∈ ∆G . By Lemma
11 it follows that ρ[u, w, z] must be a non-Helly triangle and ρ(z) must be disjoint from ρ(v),
contradiction.
“3 ⇒ 2”: is clear.
J
Lemma 11 and 13 state a fact of the form that if a property holds in one representation then
it holds in all representations hence the name uniform CA graphs.
The α-neighborhood of a vertex u in a graph G is defined as N α (u) = {v ∈ N (u) | u α v}
for α ∈ {ov, cd, cs, cc}. Now, we can define the aforementioned equivalence relation ∼u and
state the candidate function for uniform CA graphs.
I Definition 14. Given a graph G and vertex u ∈ V (G) we define the relation ∼u on N ov (u)
such that x ∼u y holds if one of the following applies:
1. x = y
2. x contains or is contained in y
3. x and y overlap, {x, y, u} ∈
/ ∆G and u is not in-between x, y
I Lemma 15. Let G be a uniform CA graph and u ∈ V (G). Then x ∼u y holds iff x and y
overlap from the same side with u in every ρ ∈ N (G).
M. Chandoo
9
Proof. "⇒": If x, y are in a contained/contains relation this is clear. For the third condition
it holds that for all ρ ∈ N (G) ρ[x, y, u] is an interval triangle and x or y is in-between the
other two. It follows that x, y overlap from the same side with u.
"⇐": If λx,y ∈ {di, cc} this is clear. If x, y overlap then they either form a non-Helly triangle
or u is in-between x, y. In both cases x, y overlap from different sides with u.
J
I Theorem 16. The following mapping is a candidate function for uniform CA graphs and
can be computed in logspace:
fU (G) =
[
{u} ∪ N cd (u) ∪ N cc (u) ∪ {y ∈ N ov (u)|x ∼u y}
u∈V (G)
x∈N ov (u)
Proof. To show that fU (G) is a candidate function we have to prove that for every uniform
CA graph G there always exists a flip set X ∈ fU (G) and that fU is label-independent. In
fact, the even stronger claim holds that for all uniform CA graphs G every set in fU (G) is
a flip set. Let X ∈ fU (G) via some u ∈ V (G) and x ∈ N ov (u). Then the set of vertices in
X correspond to one of the two flip sets shown in Fig. 2. The correctness for the subset of
vertices in X overlapping with u follows from Lemma 15.
To show that fU (G) can be computed in logspace and is label-independent we apply
Lemma 8. We can rewrite fU as
fU (G) =
[
{z ∈ V (G) | G |= ϕ(u, x, z)}
u,x∈V (G)
with G |= ϕ(u, x, z) iff x ∈ N ov (u) and z ∈ {u} ∪ N cd (u) ∪ N cc (u) ∪ {y ∈ N ov (u)|x ∼u y}. It
remains to check that the entries in the neighborhood matrix, α-neighborhoods, exclusive
neighborhoods, ∆G , in-between and ∼u can be expressed in FO logic.
J
I Corollary 17. A canonical CA representation for uniform CA graphs can be computed in
logspace.
I Theorem 18. Helly CA graphs are a strict subset of uniform CA graphs.
Proof. First, we show "⊆" by contradiction. Assume there exists a Helly CA graph G
which is non-uniform. For G to be non-uniform there must exist an ov-triangle T ∈ ∆G
and a representation ρ ∈ N (G) such that T is represented as interval triangle in ρ. Let
T = {u, v, w} and assume w.l.o.g. that ρ(v) ⊂ ρ(u) ∪ ρ(w) (v is in-between u, w). It follows
that N [u] ∪ N [w] = V (G). Since λu,w =
6 cc there must be a u0 ∈ N [u] \ N [w] such that
N [u0 ] \ N [u] 6= ∅. This means there exists a w0 ∈ N [u0 , w] \ N [u]. As N [u0 ] G N [w0 ] it follows
that u0 and w0 overlap. For u0 it must hold that it is either in NT (u) or NT (u, v). If it
is in NT (u) then by the second condition of ∆G it follows that u0 must be contained in
u, contradiction. For the same reason w0 is in NT (v, w). It follows that u0 , v, w0 form an
ov-triangle and must be represented as non-Helly triangle in ρ. This contradicts that G is a
Helly CA graph.
To see that this inclusion is strict consider the graph G obtained by taking a triangle
T and attaching a new vertex to each vertex in T (also known as net graph). In every
representation ρ ∈ N (G) it must hold that T is represented as non-Helly triangle since
NT (v) 6= ∅ for all v ∈ T . For this reason G cannot be a Helly or a non-uniform CA graph. J
10
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
5
Non-Uniform CA graphs
From the definition of uniform CA graphs it follows that a CA graph G is non-uniform if
there exists an ov-triangle T in ∆G and a ρ ∈ N (G) such that T is represented as interval
triangle in ρ. We call the pair (T, ρ) a witness for the non-uniformity of G and also say G
is non-uniform via (T, ρ). Additionally, for such a witness pair (T, ρ) we call T maximal if
there exists no T 0 6= T such that G is non-uniform via (T 0 , ρ) and ρ+ (T ) ⊂ ρ+ (T 0 ). Such
a maximal T for a given ρ must always exist. For the purpose of computing a candidate
function for this class we can assume that for a given non-uniform CA graph G we are
supplied with an ov-triangle T such that there exists a ρ ∈ N (G) with (T, ρ) being a witness
for G and T is maximal. This is justified by the fact that we can iterate over all ov-triangle
T ∈ ∆G trying to compute flip sets knowing that for at least one such T these conditions are
met. Additionally, we write T as ordered triple (u, v, w) to indicate that v is in-between u
and w in ρ.
Let G be non-uniform via (T, ρ). Consider for a vertex x ∈ V (G) \ T what the possible
relations between ρ(x) and ρ+ (T ) are. For instance, ρ(x) cannot be disjoint from ρ+ (T )
because this implies that x ∈
/ ∪t∈T N [t] and therefore T ∈
/ ∆G . Also, ρ(x) cannot contain
+
ρ (T ) as this would mean that x is a universal vertex.
I Definition 19. Let G be a non-uniform CA graph via (T, ρ). The set of normalized
representations that agree with ρ on T is:
NρT (G) = {ρ0 ∈ N (G) | ρ0 [T ] = ρ[T ]}
I Definition 20. Let G be a non-uniform CA graph via (T, ρ) and α ∈ {ov, cc, cd}. We say
x ∈ V (G) \ T is an α-arc in ρ0 if
ρ0 (x) α ρ+ (T )
for some ρ0 ∈ NρT (G). We call x an unambiguous α-arc if the above condition holds for all
ρ0 ∈ NρT (G).
I Definition 21. Let G be a graph and T = (u, v, w) ∈ ∆G . Then we define the following
1
u
2
3
4
15
5
25
v
w
35
14
24
13
x
l(x)
∈2
r(x)
∈5
45
55
34
44
23
33
Figure 3 Possible positions of the endpoints of x relative to T = {u, v, w}
12
22
11
M. Chandoo
11
sets w.r.t. T :
Γov,u = {x ∈ V (G) \ T | x ov u, v , x di w}
Γov,w = {x ∈ V (G) \ T | x ov v, w , x di u}
Γov
Γcc
= Γov,u ∪ Γov,w
= x ∈ V (G) \ T
x ∈ V (G) \ T
x ov u, w , x di v or
∃a ∈ T : x cc a
x ov u, w , x cs v or
∃a ∈ T : x cd a
Γcd
=
Ω
= {x ∈ V (G) \ T | x ov u, v, w}
I Lemma 22. If G is a non-uniform CA graph via (T, ρ) such that T is maximal then
T, Γov , Γcc , Γcd , Ω partition V (G).
Proof. It is not hard to see that these sets do not overlap. To show that every vertex in
G belongs to one of these sets we need to check all possible positions of the endpoints of
a vertex x not in T relative to T , consider Fig. 3. We know every vertex x ∈
/ T must be
represented as α-arc for some α ∈ {ov, cd, cc}. For α ∈ {cd, cc} it must hold that both
endpoints of x must be in one of the intervals 1–5. The exemplary x depicted in Fig. 3 is a
cd-arc in the given representation and overlaps with u, v, w. If x is a cd-arc then the number
of the interval in which its left endpoint is situated must be less than or equal that of its
right endpoint (in our example 2 ≤ 5). If it is a cc-arc then the right endpoint must come
before the left. The graph on the right encodes all possible placements of the two endpoints
and it can be verified case-by-case that an α-arc for α ∈ {cd, cc} will occur in either Γα or
Ω. It remains to argue that an ov-arc can only have the intersection structure denoted by
Γov . W.l.o.g. assume that x is an ov-arc that overlaps from u’s side with T . It holds that
the right endpoint of x is in one of the five intervals and the left endpoint must be in none of
these five intervals. If r(x) ∈ 1 then x ∈ NT (u) and by the second condition of ∆G it must
hold that x is contained in u, contradiction. If r(x) ∈ 2 then x overlaps with u, v and is
disjoint with w and therefore x ∈ Γov,u . If r(x) ∈ {3, 4} then T = {u, v, w} is not maximal
since {x, v, w} ∈ ∆G . If r(x) ∈ 5 then it can be shown that there must be a circle cover entry
in the neighborhood matrix for x, w which contradicts that they must overlap.
J
I Lemma 23. Let G be a non-uniform CA graph via (T, ρ) and T is maximal. All vertices
in Γα are unambiguous α-arcs for α ∈ {ov, cd, cc}.
Proof. The intersection structure of a vertex x ∈ Γα with T dictates the positioning of the
endpoints relative to T in every ρ0 ∈ NρT (G). It follows that this placement of the endpoints
of x must hold for all ρ0 ∈ NρT (G) and therefore x is an unambiguous α-arc.
J
For a vertex x ∈ Ω the possible placements of its endpoints to satisfy the intersection
structure with T can be one of the following four types (cd, 14), (cd, 25), (cc, 14), (cc, 25).
For example x in Fig. 3 is type (cd, 25) and flipping x would lead to type (cc, 25).
Let G be non-uniform via (T, ρ) and T = (u, v, w) is maximal. Then the two target flip
sets Xu , Xw we want to compute in the non-uniform case are immediately before the left
endpoint and immediately after the right endpoint of ρ+ (T ) and must be of the form
Xi = Γov,i ∪ Γcc ∪ Ω0
for i ∈ {u, w} and some subset Ω0 ⊆ Ω.
12
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
I Definition 24. Let G be a non-uniform CA graph via (T, ρ) and T is maximal. We call a
subset Ω0 ⊆ Ω cc-realizable w.r.t. (T, ρ) if there exists a ρ0 ∈ NρT (G) such that for all x ∈ Ω
it holds that x is a cc-arc in ρ0 iff x ∈ Ω0 .
In other words, a cc-realizable set is a subset of Ω such that all of its vertices can be
represented as cc-arc in a normalized representation. By finding such a set we can construct
two flip sets by adding the cc-vertices in Γcc and one side of the ov-vertices as described
above. Now, the challenge consists in finding such a cc-realizable subset. A way to solve this
is to parameterize our input by the cardinality of Ω and try all possibilities. Since Ω and its
cardinality depend on the particular ov-triangle T chosen, which we do not know a priori,
we can use the following set which is a superset of every possible Ω and thus bounds the
cardinality:
KG = {x ∈ V (G) | ∃{u, v, w} ∈ ∆G s.t. x ov u, v, w}
I Theorem 25. The following mapping is a candidate function for non-uniform CA graphs
and can be computed in O(k + log n) space for k = |KG |:
[
fN (G) =
{Γov,u ∪ Γcc ∪ Ω0 }
(u,v,w)∈∆G
Ω0 ⊆Ω
where Γov,u , Γcc , Ω are taken w.r.t. T = (u, v, w).
Proof. To show that there always exists a flip set X ∈ fN (G) for a non-uniform CA graph
G we argue as follows. Let G be non-uniform via (T, ρ) and T = (u, v, w) is maximal.
Let Ω0 be a cc-realizable set w.r.t. (T, ρ), which must exist since G is non-uniform. Then
X = Γov,u ∪ Γcc ∪ Ω0 w.r.t. T is one of the target flip sets described previously. This means
there exists a ρ ∈ N (G) such that X describes the set of arcs that contain a point right
before the left endpoint of ρ+ (T ) or a point right after the right endpoint of ρ+ (T ).
To see that fN (G) is label-independent a formula ϕ(Ω0 , u, v, w, x) can be constructed that
is true iff x ∈ Γov,u ∪ Γcc ∪ Ω0 where Ω0 is a second-order set variable. Note, that |Ω| ≤ |KG |.
Therefore this works in O(k + log n) space since one can iterate over all 2k subsets of Ω using
k bits and then apply the argument in Lemma 8 via ϕ which requires additional O(log n)
space.
J
Conclusion
We showed how to canonically, or in our terms label-independently, compute flip sets for
CA graphs to acquire canonical CA representations. The properties of uniform CA graphs
enable us to do this easily in logspace. In the case of non-uniform CA graphs, however, it
seems that the cc-realizable sets pose a non-trivial obstacle when trying to compute flip sets.
The only simple remedy appears to be the proposed parameterization that enables us to use
brute force. Changing the target flip sets does not seem to improve upon this situation. As
a consequence, we suggest to investigate the space of cc-realizable sets. Given the restricted
structure of non-uniform CA graphs this could be a reasonable first step towards deciding
isomorphism for CA graphs in polynomial time.
Additionally, in [8] it was shown how to compute flip sets for CA graphs in linear time
without the canonicity constraint. Can this be done in logspace as well? This would mean
that recognition of CA graphs is logspace-complete.
Acknowledgments We thank the anonymous reviewers for their helpful comments on earlier
drafts of this paper.
M. Chandoo
13
References
1
2
3
4
5
6
7
8
9
6
Andrew Curtis, Min Chih Lin, Ross McConnell, Yahav Nussbaum, Francisco Soulignac,
Jeremy Spinrad, and Jayme Szwarcfiter. Isomorphism of graph classes related to the
circular-ones property. Discrete Mathematics and Theoretical Computer Science, 15(1),
2013.
Elaine Marie Eschen. Circular-arc Graph Recognition and Related Problems. PhD thesis,
Vanderbilt University, Nashville, TN, USA, 1998. UMI Order No. GAX98-03921.
Wen-Lian Hsu. O(M · N ) algorithms for the recognition and isomorphism problems on
circular-arc graphs. SIAM J. Comput., 24(3):411–439, June 1995.
Johannes Köbler, Sebastian Kuhnert, Bastian Laubner, and Oleg Verbitsky. Interval graphs:
Canonical representations in logspace. SIAM J. Comput., 40(5):1292–1315, 2011.
Johannes Köbler, Sebastian Kuhnert, and Oleg Verbitsky. Helly circular-arc graph isomorphism is in logspace. In MFCS 2013, volume 8087 of Lecture Notes in Computer
Science, pages 631–642. Springer Berlin Heidelberg, 2013.
Johannes Köbler, Sebastian Kuhnert, and Oleg Verbitsky. Solving the Canonical Representation and Star System Problems for Proper Circular-Arc Graphs in Logspace. In FSTTCS,
volume 18, pages 387–399. Schloss Dagstuhl, 2012.
George S. Lueker and Kellogg S. Booth. A linear time algorithm for deciding interval graph
isomorphism. J. ACM, 26(2):183–195, April 1979.
Ross M. McConnell. Linear-time recognition of circular-arc graphs. Algorithmica, 37(2):93–
147, 2003.
Tsong-Ho Wu. An O(n3 ) Isomorphism Test for Circular-Arc Graphs. PhD thesis, SUNY
Stony Brook, New York, NY, USA, 1983.
Appendix
Proof of Lemma 8. fϕ can be computed in logspace by successive evaluation of ϕ and taking
the union of the resulting sets. To prove that fϕ is label-independent we use the following
claim that can be verified by induction, see Lemma 26. For all FO formulas ψ and isomorphic
graphs G, H it holds that
G |= ψ(v1 , . . . , vk ) ⇐⇒ H |= ψ(π(v1 ), . . . , π(vk ))
for all isomorphisms π from G to H and assignments (v1 , . . . , vk ) ∈ V (G)k . Now, we
must argue that X ∈ fϕ (G) implies π(X) ∈ fϕ (H). The other direction follows from a
symmetrical argument. Let X ∈ fϕ (G) then there exist (v1 , . . . , vk ) ∈ V (G)k such that
X = {u ∈ V (G) | G |= ϕ(v1 , . . . , vk , u)}. This means
π(X) = {π(u) | u ∈ V (G) and G |= ϕ(v1 , . . . , vk , u)}
We can replace u ∈ V (G) with u0 ∈ V (H) and by the previous claim rewrite the above set as
π(X) = {u0 ∈ V (H) | H |= ϕ(π(v1 ), . . . , π(vk ), u0 )}
This concludes that π(X) ∈ fϕ (H).
J
I Lemma 26. For every FO formula ϕ with k free variables over graph structures and
isomorphic graphs G, H it holds that:
G |= ϕ(v1 , . . . , vk ) ⇐⇒ H |= ϕ(π(v1 ), . . . , π(vk ))
for all isomorphisms π from G to H and every assignment (v1 , . . . , vk ) ∈ V (G)k .
14
Deciding Circular-Arc Graph Isomorphism in Parameterized Logspace
Proof. We show this by structural induction over FO formulas. For the base case ϕ =
E(xi , xj ) the statement is clear, i.e.
G |= E(u, v) ⇐⇒ H |= E(π(u), π(v))
for all isomorphisms π and u, v ∈ V (G). For the inductive step we consider the boolean
connectives ¬, ∧, ∨ and the quantifiers ∃, ∀. Let ϕ = ¬ψ(x1 , . . . , xk ).
G |= ¬ψ(v1 , . . . , vk )
⇐⇒ G 6|= ψ(v1 , . . . , vk )
I.H.
⇐⇒ H 6|= ψ(π(v1 ), . . . , π(vk ))
⇐⇒ H |= ¬ψ(π(v1 ), . . . , π(vk ))
holds for all isomorphisms π from G to H and v1 , . . . , vk ∈ V (G). For the cases ∧ and ∨ this
is similar. Let ϕ = ∃xψ(x, x1 , . . . , xk ).
G |= ∃xψ(x, v1 , . . . , vk )
⇐⇒ there exists v ∈ V (G) such that G |= ψ(v, v1 , . . . , vk )
I.H.
⇐⇒ H |= ψ(π(v), π(v1 ), . . . , π(vk ))
⇐⇒ H |= ∃xψ(x, π(v1 ), . . . , π(vk ))
for all isomorphisms π from G to H and v1 , . . . , vk ∈ V (G). A similar argument holds for
the ∀-case.
J
(X)
I Lemma 27. Given a simple CA graph G it holds that X ⊆ V (G) is a flip set iff λG
an interval matrix.
is
Proof. If X is a flip set then there exists a ρ ∈ N (G) and a point x on the circle such that
exactly all vertices in X have the point x in common in ρ. The resulting CA representation
ρ(X) after flipping these arcs is an interval representation since ρ(X) (G) must have a hole at
(X)
x. Since λG must be isomorphic to the intersection matrix of ρ(X) (G) via ρ it follows that
it is an interval matrix.
(X)
For the other direction let X ⊆ V (G) such that λG is an interval matrix. To reach a
contradiction assume that X is not a flip set. Then for every ρ ∈ N (G) and all points x on
the circle it holds that there exists a v ∈ V (G) such that either v ∈ X or x ∈ ρ(v). Since
(X)
(X)
λG is an interval matrix it holds that there exists a ρ1 ∈ N (λG ) such that ρ1 has a hole.
(X)
By flipping the arcs in X in ρ1 we acquire the representation ρ1 ∈ N (λG ) for G. It holds
(X)
that for every point x on the circle there exists a v ∈ V (G) such that v ∈ X and x ∈
/ ρ1 (v)
(X)
(X)
or v ∈
/ X and x ∈ ρ1 (v). It follows that after flipping the set of arcs X in ρ1 back that
no hole can exists which contradicts that ρ1 has been an interval representation.
J
| 8cs.DS
|
1
Aviation Time Minimization of UAV for Data
Collection over Wireless Sensor Networks
Jie Gong, Member, IEEE, Tsung-Hui Chang, Senior Member, IEEE, Chao
arXiv:1801.02799v1 [cs.IT] 9 Jan 2018
Shen, Member, IEEE, Xiang Chen, Member, IEEE
Abstract
In this paper, we consider a scenario where an unmanned aerial vehicle (UAV) collects data from
a set of sensors on a straight line. The UAV can either cruise or hover while communicating with the
sensors. The objective is to minimize the UAV’s total aviation time from a starting point to a destination
while allowing each sensor to successfully upload a certain amount of data using a given amount of
energy. The whole trajectory is divided into non-overlapping data collection intervals, in each of which
one sensor is served by the UAV. The data collection intervals, the UAV’s navigation speed and the
sensors’ transmit powers are jointly optimized. The formulated aviation time minimization problem is
difficult to solve. We first show that when only one sensor node is present, the sensor’s transmit power
follows a water-filling policy and the UAV aviation speed can be found efficiently by bisection search.
Then we show that for the general case with multiple sensors, the aviation time minimization problem
can be equivalently reformulated as a dynamic programming (DP) problem. The subproblem involved
in each stage of the DP reduces to handle the case with only one sensor node. Numerical results present
insightful behaviors of the UAV and the sensors. Specifically, it is observed that the UAV’s optimal
speed is proportional to the given energy and the inter-sensor distance, but inversely proportional to the
data upload requirement.
J. Gong is with Guangdong Key Laboratory of Information Security Technology, School of Data and Computer Science, Sun
Yat-sen University, Guangzhou 510006, China. Email: [email protected].
T.-H. Chang is with School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, Shenzhen 518172,
China. Email: [email protected]
C. Shen is with State Key Lab of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China. Email:
[email protected]
X. Chen is with the School of Electronics and Information Engineering, Sun Yat-Sen University, Guangzhou 510006, China,
SYSU-CMU Shunde International Joint Research Institute and Key Lab of EDA, Research Institute of Tsinghua University in
Shenzhen, Shenzhen 518057, China. Email: [email protected].
2
I. I NTRODUCTION
Recently, wireless communication with unmanned aerial vehicles (UAVs) [1] has been considered as a promising technology to expand network coverage and enhance system throughput, by
leveraging the UAVs’ high mobility [2] and line-of-sight (LOS) dominated air-ground channels
[3]. One of the key applications is wide-area data collection in wireless sensor networks [4].
Conventionally, each sensor node delivers their monitored data to a fusion center via multi-hop
transmissions. Hence, a sensor node requires to not only transmit its own data, but also relay the
others’. As a consequence, the sensors’ battery may drain quickly and the multi-hop network
connection may be lost. By using the UAVs as mobile fusion centers, every sensor node can
directly send observed data to a UAV. In addition, the LOS channel condition results in higher data
rate for ground-to-air transmissions compared with ground-to-ground transmissions. However,
as UAVs are energy constrained due to the limited on-board battery, it is paramount to shorten
the aviation time needed for a data collection mission.
Different from the conventional communication techniques, there is a trajectory optimization issue for UAV-aided wireless communications. To improve network connectivity, UAVs’
deployment and movement were optimized to track the network topology in [5]. In [6], offline
path planning of UAVs was addressed for collision avoidance and fuel efficiency. Joint UAV
deployment and trajectory optimization problem was solved in [7] with a quantization theory
approach, and joint trajectory and communication power control for multiple UAVs was studied
in [8]. In addition, UAVs are widely used as mobile relays. Reference [9] studied the throughput
maximization problem for a UAV relay and showed that the uplink power of users should follow
a “staircase” water filling structure. In [10], joint optimization of multi-UAV beamforming and
relay positions for throughput maximization was studied based on stochastic optimization techniques. A round trip “load-carry-and-deliver” protocol was tested and evaluated by experiments
in [11]. Besides serving as relays, UAVs can also be used as mobile base stations (BSs) for
emergent communications. BS placement was optimized in the 2D space [12] and 3D space [13],
respectively, to minimize the required number of mobile BSs while maximizing their coverage.
The coverage of UAVs as mobile BSs was analytically studied in [14] considering inter-UAV
interference and beamwidth design.
In addition, there has been a growing research interest in applying UAV for data collection and
dissemination in wireless sensor networks. The aerial link characterization based on practical
3
protocols and experiments was given in [15]. Reference [16] considered data collection via uplink
transmission, and proposed to mitigate multi-sensor interference by adjusting the UAV heading
and beamforming. Adaptive modulation strategy was adopted in [17] to improve energy efficiency
of sensor nodes while guaranteeing user fairness. To avoid contention due to simultaneous
data transmissions from multiple sensor nodes, a priority-based frame selection scheme was
proposed in [18]. In [19], wake-up and sleep adaptation was applied for sensor nodes and UAV’s
trajectory optimization was jointly considered to minimize the sensors’ energy consumption.
One dimensional information dissemination problem is considered in [20], where the sensors
are served in cyclical TDMA mode, and the service regions for all sensors are optimized.
It is worthwhile to note that most of the existing works mentioned above focus on enhancing
energy efficiency or spectrum efficiency of sensor nodes, but overlook the fact that the limited
aviation energy of UAVs is one of the fundamental bottlenecks in UAV-aided wireless networks.
As a matter of fact, the dominant energy consumption of a UAV lies in the propulsion control
system that accelerates the UAV and maintains its aviation height. In [21], a UAV’s energy
consumption was modeled as a function of aviation speed and operation conditions such as
climbing, hovering, and so on. A UAV trajectory optimization problem with detailed propulsion
energy consumption considering both velocity and acceleration was studied in [22]. However,
as the UAV’s energy consumption model is quite complex, the problems are difficult to be
optimally solved. Intuitively, the energy consumption of a UAV is proportional to its aviation
time. Therefore, the energy minimization problem can be handled alternatively by formulating an
aviation time minimization problem. The UAV mission completion time minimization problem
was studied in [23] by optimizing its trajectory subject to a link quality constraint between
ground base station (GBS) and UAV in cellular networks. While in wireless sensor networks,
there is still a lack of research efforts to consider both the UAV and sensors’ energy consumption
as well as the quality of service of the sensor nodes at the same time.
In this paper, we study an aviation time minimization problem for a UAV which collects data
from a set of energy constrained ground sensors. Each of the sensors wants to upload a certain
amount of data to the UAV. The UAV can collect data either during navigation or hovering.
We assume that the sensors are located on a line and the UAV’s trajectory is divided into nonoverlapping data collection intervals, each of which is dedicated to data collection from one
sensor node. The objective is to minimize the total aviation time of the UAV for flying from
an initial point to a destination by jointly optimizing the division of intervals, the UAV speed,
4
as well as the sensors’ transmission power. The contributions of this paper are summarized as
follows.
•
The formulated UAV aviation time minimization problem is intrinsically difficult. We first
consider the single-senor scenario. While the problem is still difficult when only one sensor
node is present, we reveal some insightful structures for the optimal solution. Specifically, we
present an explicit condition on the feasibility of the problem. When the problem is feasible
and if the data collection interval is given, we show that the optimal power allocation of the
sensor follows a water-filling solution and the optimal speed can be efficiently obtained via
bisection search. The data collection interval can be numerically found via a two-dimensional
search.
•
The algorithm for solving the single-sensor case can be extended for solving the general
scenario with multiple sensor nodes. In particular, by judiciously exploiting the problem
structure, we show that the aviation time minimization problem with multiple sensors can
be equivalently formulated as a dynamic programming (DP) problem. In each stage of the
DP, the optimal data collection interval for one sensor node is searched and the algorithm for
the single-sensor case is used for finding the optimal UAV speed and sensor’s transmission
power.
•
Numerical results illustrate the optimal behaviors of the UAV and the sensor nodes under
different scenarios. In particular, the UAV’s optimal speed is proportional to the sensors’
energy budgets and the inter-sensor distance, but inversely proportional to the amount of
data to upload. For the randomly distributed sensors with random amount of data and energy,
the average minimum aviation time increases with the average amount of data and decreases
with the average amount of available energy.
The rest of the paper is organized as follows. Section II presents the system model and the
problem formulation. Section III studies the single-sensor case. Then, the multi-sensor problem
is solved in Section IV. Simulations are shown in Section V. Finally, Section VI concludes the
paper.
II. S YSTEM M ODEL
AND
P ROBLEM F ORMULATION
As shown in Fig. 1, we consider a scenario where a UAV flying over a set of N sensors for
data collection. The sensors are located on a line, labeled by S1 , S2 , · · · , SN . Each sensor n needs
to upload Bn information bits and is subject to a total energy budget En , where n = 1, 2, · · · , N.
5
A UAV flies at a fixed height H from an initial point S0 to a destination SN +1 , and applies time
division protocol to sequentially receive the uplink data from the sensors. Specifically, the whole
aviation range [S0 , SN +1 ] is divided into N non-overlapping intervals [xn , yn ], n = 1, 2, · · · , N
satisfying S0 ≤ x1 ≤ y1 ≤ x2 ≤ y2 ≤ · · · ≤ xN ≤ yN ≤ SN +1 . Each sensor node n uploads its
data when the UAV flies in the interval [xn , yn ]. If xn = yn , the UAV hovers above the location
xn and receives the data from sensor n. Otherwise, we assume the UAV flies with a constant
speed 0 < vn ≤ vmax from xn to yn and receives the data during its aviation. As no sensor
uploads data in the interval (yn , xn+1 ), the UAV flies with the maximum speed vmax in order to
minimize the total aviation time. In this paper, the UAV’s acceleration/deceleration process is
ignored for analytical tractability.
UAV
Uplink
H
...
S0
x1
S1
y1 x2
S2
y2
SN
yN
SN+1
Fig. 1. Data collection by a UAV from ground sensors along a line.
A. Data Collection Modes
Since the UAV can receive data when either navigating or hovering, we respectively consider
the data collection models for the two cases.
1) Data Collection during Aviation: If vn > 0 and xn < yn , the UAV collects data from the
ground node Sn during [xn , yn ]. The aviation time or the data collection time is tn = (yn −xn )/vn .
As the transmission distance changes during the flight, the transmit power and the data rate should
also adapt to the varying path-loss fading. The LOS ground-to-air channel model between the
UAV and the sensors with pathloss exponent α ≥ 2 is adopted [15]. With this model, the
6
instantaneous data rate in the transmission interval [xn , yn ] is given by
pn (t)β
1
,
Rn (t) = W log2 1 +
α
2
((xn + vn t − Sn )2 + H 2 ) 2
(1)
for t ∈ [0, tn ] where W is the bandwidth, β is the reference signal-to-noise ratio (SNR) at the
reference distance 1 meter, and pn (t) is the transmission power of the nth sensor, which satisfies
the total energy constraint
Z
tn
pn (t)dt ≤ En .
(2)
0
Besides, since each sensor n requires to upload Bn bits when the UAV flies over [xn , yn ], we
have the data constraint as
Z
tn
Rn (t)dt ≥ Bn .
(3)
0
Notice that there is a feasibility issue for data collection, i.e., with a given amount of sensor’s
energy En , is it feasible to upload Bn bits within the time duration tn ? Since the best channel
quality is experienced when hovering right above the sensor n, the maximum number of data
bits Bn is related to the hovering mode, which is detailed below.
2) Data Collection when Hovering: If vn = 0 and xn = yn , the UAV hovers above location xn
and sensor n uploads data with constant transmit power and data rate. Denote the transmission
time when hovering above the location xn by tn = Th,n (xn ). As the transmission link is static,
pn (t) should be a constant in this case. Thus, sensor n’s energy constraint (2) is simplified as
Th,n (xn )pn (t) ≤ En .
(4)
To fully utilize sensor n’s energy budget to minimize the aviation time, the transmission power
should be maximized, i.e., pn (t) = En /Th,n (xn ). Then the data constraint (3) is simplified as
βEn
Th,n (xn )
≥ Bn .
(5)
W log2 1 +
α
2
Th,n (xn )((xn − Sn )2 + H 2) 2
The function on the left hand side of (5) has the following property.
Lemma 1. The function f (x) = x log2 (1 + xa ), a > 0, x > 0 is an increasing function, and
f (x) <
a
.
ln 2
Proof. See Appendix A.
7
Based on Lemma 1, the left hand side of (5) is an increasing function of Th,n (xn ). Hence,
the minimum Th,n (xn ) satisfies (5) with equality, i.e.,
βEn
1
= Bn .
Th,n (xn )W log2 1 +
α
2
Th,n (xn )((xn − Sn )2 + H 2 ) 2
(6)
The above transcendental equation can be effectively solved by either line search or bisection
search. As the UAV experiences the best channel condition when hovering on top of the user
(xn = Sn ), the feasibility condition can be derived based on (6) as follows.
Proposition 1. (Feasibility) For each sensor n, the data constraint (3) is feasible if and only if
Bn <
W βEn
.
2H α ln 2
(7)
Proof. See Appendix B.
Hovering mode may be needed when the amount of information bits is large or the amount of
sensor’s energy is small. However, it may not be the most time efficient strategy when comparing
to that the UAV cruises and collects data at the same time. Therefore, navigation and hovering
modes have to be selected depending on the values of Bn and En , which will be incorporated
in our problem formulation.
B. Problem Formulation
In this paper, we aim to minimize the total aviation time while guaranteeing that all the sensors’
data are successfully collected. If (7) holds for all n = 1, 2, · · · , N, i.e., the data collection is
feasible for all the sensors, the problem can be formulated as
P
N
X
(SN +1 − S0 ) − N
n=1 (yn − xn )
+
tn
min
x,y,v,p(t)
vmax
n=1
s.t.
(8a)
(2) and (3), ∀n,
S0 ≤ x1 ≤ y1 ≤ x2 ≤ · · · ≤ yN ≤ SN +1 ,
tn =
yn − xn
Ixn 6=yn + Th,n (xn )Ixn =yn , ∀n,
vn
(8b)
(8c)
0 ≤ vn ≤ vmax , ∀n,
(8d)
pn (t) ≥ 0, ∀n, t,
(8e)
where the optimization variables are the locations x = {x1 , x2 , · · · , xN }, y = {y1 , y2 , · · · , yN },
the UAV speeds v = {v1 , v2 , · · · , vN }, and the transmission power p(t) = {p1 (t), p2 (t), · · · , pN (t)}.
8
The function Ievent is an indicator which equals 1 if the event is true and equals 0 otherwise. It
can be seen that the interval variables x, y for the sensors are coupled in the constraint (8b),
which makes (8) difficult to solve. To tackle the problem, we firstly consider a single-sensor
case, and then show how the solution of the single-sensor case can be extended to the general
multi-sensor case in (8).
III. AVIATION T IME M INIMIZATION
FOR
S INGLE - SENSOR C ASE
For the single-sensor case N = 1, without loss of generality, we set S1 = 0 (origin point in
the horizontal axis) and ignore the sensor index for all notations. Then the problem (8) reduce
to
min
x,y,v,p(t)
s.t.
(S2 − S0 ) − (y − x)
+t
vmax
Z t
p(τ )β
1
dτ ≥ B,
W log2 1 +
α
((x + vτ )2 + H 2 ) 2
0 2
Z t
p(τ )dτ ≤ E,
(9b)
S0 ≤ x ≤ y ≤ S2 ,
(9d)
(9a)
(9c)
0
t=
y−x
Ix6=y + Th (x)Ix=y ,
v
(9e)
0 ≤ v ≤ vmax ,
(9f)
p(t) ≥ 0.
(9g)
Since the hovering mode has been studied in the previous section, we mainly focus on the
navigation mode with v > 0 and x < y. The problem with only the navigation mode for the
single-sensor case is given by
min
x,y,v,p(t)
s.t.
1
1
S2 − S0
+ (y − x)
−
vmax
v vmax
Z y−x
v
p(τ )β
1
W log2 1 +
dτ ≥ B,
α
2
((x + vτ )2 + H 2) 2
0
Z y−x
v
p(τ )dτ ≤ E,
(10b)
S0 ≤ x < y ≤ S2 ,
(10d)
(10a)
(10c)
0
0 < v ≤ vmax , p(t) ≥ 0.
9
The problem (10) includes the power allocation optimization over p(t), the UAV speed
optimization over v, and the data upload interval optimization over x and y. These subproblems
are solved separately as follows.
A. Power Allocation
Suppose that the upload interval [x, y] and the UAV speed v are fixed and given. It is
obvious that to minimize the aviation time, the sensor should allocate its power to maximize the
uplink throughput on the left hand side of (10b). Thus, let us consider the following throughput
maximization problem
max
p(τ )≥0
s.t.
Z
y−x
v
p(τ )β
1
W log2 1 +
dτ
α
2
((x + vτ )2 + H 2 ) 2
(11a)
p(τ )dτ ≤ E.
(11b)
0
Z
y−x
v
0
Denote s = x + vτ , we have ds = vdτ . By changing the variable from τ to s, the throughput
maximization problem (11) can be reformulated as
Z
1 y1
p(s)β
max
W log2 1 + 2
ds
α
p(s)≥0 v x 2
(s + H 2 ) 2
Z
1 y
s.t.
p(s)ds ≤ E.
v x
(12a)
(12b)
Notice that the UAV receives the data from the sensor if and only if p(s) > 0. Otherwise, the
UAV flies with the maximum speed. Therefore, the condition for p(s) > 0 needs to be specified.
We have the following conclusion.
Theorem 1. Let p∗ (s) be an optimal solution of the problem (12). It holds that p∗ (s) > 0 for
x < s < y if and only if x, y and v satisfy
2
2
2
α
2
(y − x)(max{x , y } + H ) −
Moreover, the optimal power allocation p∗ (s) is
p∗ (s) =
Z
y
α
(s2 + H 2 ) 2 ds ≤ βEv.
(13)
x
1
1
−
,
γ0 γ(s)
(14)
where the water level is
1
vE
1
=
+
γ0
y − x (y − x)β
Z
x
y
α
(s2 + H 2 ) 2 ds,
(15)
10
and the inverse of channel gain is
α
(s2 + H 2 ) 2
1
=
.
γ(s)
β
(16)
The corresponding optimal objective value of (12a) is
W
β
αs
αH
s
Bmax (x, y, v) =
s log2
−
arctan
α +
2v
ln 2 ln 2
H
γ0 (s2 + H 2) 2
s=y
.
(17)
s=x
Proof. See Appendix C.
1
g ( s)
v
p( s )
1
g0
x
0
y
y'
s
Fig. 2. Illustration of water-filling power allocation.
The results in Theorem 1 are interpreted in Fig. 2. In this figure, the red solid curve represents
the inverse of the channel gain
1
,
γ(s)
the blue dash-dotted line represents the water level
1
,
γ0
and
the area between the two curves represents the total energy budget. If x, y and v satisfy the
condition (13), we have p(s) > 0 for x < s < y. However, if x, y ′ and v do not satisfy the
condition (13) as shown in the figure, there must be another set of x, y and v where y < y ′
so that p(s) > 0 for x < s < y. Therefore, the data upload must be within the range [x, y].
Theorem 1 explicitly gives the feasible region of x, y, v for optimal data collection.
11
For the free space LOS channel model with α = 2, the condition can be further simplified by
calculating the integration. In particular, we have
Z y
Z y
2
2 α
(s2 + H 2 )ds
(s + H ) 2 ds =
x
x
Replacing the term
Ry
x
α
y 3 − x3
=
+ (y − x)H 2
3
2
x + xy + y 2
2
+H .
= (y − x)
3
(18)
(s2 +H 2) 2 ds by the above expression, the condition (13) can be expressed
as the following two conditions:
(a) |x| ≤ |y| and 2y 3 + x3 − 3y 2x ≤ 3βEv,
(b) |x| ≥ |y| and 3x2 y − 2x3 − y 3 ≤ 3βEv,
and the water level can be expressed as
vE
x2 + xy + y 2 H 2
1
=
+
+
.
γ0
y−x
3β
β
(19)
B. UAV Speed Optimization
With the optimal power allocation, the maximum throughput Bmax (x, y, v) in (17) has the
following property.
Theorem 2. The maximum throughput Bmax (x, y, v) is a decreasing function of v.
Proof. See Appendix D.
Based on Theorem 2, the feasibility of any solution (x, y, v, p(t)) is guaranteed if the minimum
speed satisfies (13). The minimum speed can be written as a function of x and y, i.e.,
Z y
α
1
2
2
2 α
2
2
(y − x)(max{x , y } + H ) 2 −
(s + H ) 2 ds .
vm (x, y) = min vmax ,
βE
x
When α = 2, the minimum speed can be rewritten as
2y 3 +x3 −3y 2 x
, if |x| ≤ |y| and 2y 3 + x3 − 3y 2x ≤ 3βEvmax ,
3βE
3x2 y−2x3 −y 3
vm (x, y) =
, if |x| ≥ |y| and 3x2 y − 2x3 − y 3 ≤ 3βEvmax ,
3βE
vmax ,
otherwise.
(20)
(21)
12
According to Theorems 1 and 2, for given x, y and the optimal power allocation, the optimization over v can be formulated as
min
v
1
1
(S2 − S0 )
+ (y − x)
−
vmax
v vmax
s.t. Bmax (x, y, v) ≥ B,
vm (x, y) ≤ v ≤ vmax ,
(22a)
(22b)
(22c)
Problem (22) can be solved in two steps. Firstly, we check the feasibility of problem (22).
Based on Theorem 2, if Bmax (x, y, vm (x, y)) ≥ B, (22) is feasible, and we go to the second
step. As the objective function (22a) is a decreasing function of v, the optimal speed, denoted by
v ∗ (x, y), is the maximum feasible speed that satisfies (22b) in [vm (x, y), vmax]. Since Bmax (x, y, v)
is a decreasing function of v, v ∗ (x, y) can be found by bisection search algorithm. In summary,
the algorithm to obtain the optimal v and p(s) for given x and y where x < y in problem (10)
is summarized in Algorithm 1.
Algorithm 1 Calculate v and p(s) for given x, y in problem (10)
Input: β, H, W, α, B, E, δ, x and y where x < y.
Output: v ∗ , p∗ (s).
1:
Calculate vm (x, y) according to (20).
2:
if Bmax (x, y, vm (x, y)) ≥ B then
3:
Set vU = vmax , vL = vm (x, y), v = 21 (vU + vL ).
4:
while |vU − vL | > δ do
if Bmax (x, y, v) > B then
5:
Update vL = v, and reset v = 21 (vU + vL ).
6:
else
7:
Update vU = v, and reset v = 21 (vU + vL ).
8:
9:
end if
10:
end while
11:
Set v ∗ = v, and p∗ (s) is calculated according to (14)-(16).
12:
13:
14:
else
Problem (10) for given x and y is infeasible.
end if
13
In this algorithm, a precision parameter δ > 0 is introduced, which is used to control the
precision of v in the bisection search process. Line 2 examines the feasibility of the problem.
If the inequality does not hold, there is no feasible solution for the given parameters, and the
algorithm terminates. Otherwise, bisection search is launched as in lines 3-10. In line 4, the
search process will continue if |vU − vL | > δ. When the bisection search terminates, the optimal
solution is recorded in line 11.
Remark: It is interesting to remark that the maximum throughput in (12) can be re-written as
Ry 1
p(s)β
1
ds
1
+
W
log
α
2
y−x x 2
(s2 +H 2 ) 2
,
(23)
Bmax (x, y, v) = E max
v
p(s)
E
y−x
Ry
1
v
where p(s) is constrained by y−x
E which should be satisfied with equality
p(s)ds ≤ y−x
x
to achieve the maximum. The term on the right side of the operator max can be viewed as
the energy efficiency (achievable data rate per unit power) with “average power budget”
v
E.
y−x
Therefore, Theorem 2 says that the energy efficiency is a decreasing function of the power
budget in fading channels. It extends the result from the AWGN channel [24] to the UAV LOS
channel.
C. Data Collection Interval Optimization
Finally, we consider the problem of determining x and y in problem (10), which can be written
as
1
1
(S2 − S0 )
+ (y − x) ∗
−
min
x,y
vmax
v (x, y) vmax
s.t. S0 ≤ x < y ≤ S2 ,
(24a)
(24b)
where v ∗ (x, y) is the optimal solution of (22). As v ∗ (x, y) is a complex function of x and y,
there is no efficient algorithms other than two-dimensional line search to solve the problem
(24). By sampling m points in the aviation range [S0 , S2 ] with identical inter-point distance,
the total number of search pairs (x, y) where x < y is
m(m+1)
.
2
Thus, the complexity of the
two-dimensional search is O(m2 ).
IV. AVIATION T IME M INIMIZATION
FOR
M ULTI - SENSOR C ASE
In the multi-sensor case, the data upload intervals for the sensors correlates with one another.
In particular, if a sensor’s data upload interval is wide, the one next to it can only have a short
14
data upload interval. To deal with the inter-sensor correlation, we adopt the DP approach [25]
to solve the aviation time minimization problem for multiple sensors. Firstly, the basic concept
of the DP algorithm is briefly reviewed as follows.
A. Introduction to DP Algorithm
The DP algorithm deals with decision making problems in dynamic systems which can be
divided into stages. The dynamic system expresses the evolution of the system states, under the
influence of control actions taken at discrete instances of time (stage). The system has the form
sk+1 = fk (sk , uk ),
k = 0, 1, · · · , K − 1,
(25)
where
k is the index of the stage,
sk is the system state that summarizes all the information available for decision making,
uk is the control action selected in stage k,
fk describes how the system state is updated.
Once an action uk is taken under the state sk in stage k, an additive cost gk (sk , uk ) incurs. The
objective is to minimize the total cost by finding the optimal control actions for a given initial
state, which can be formulated as
min
u0 ,u1 ,··· ,uK−1
(K−1
X
gk (sk , uk ) + gK (sK ) s0
k=0
)
.
(26)
Notice that the above problem is optimized jointly over the actions for all stages u0 , u1, · · · , uK−1.
The Bellman’s equation in the following proposition tells us that the problem can be solved
stage-by-stage efficiently.
Proposition 2. (DP Algorithm) [25, Prop. 1.3.1, Vol. I] For every initial state s0 , the minimum
cost of the basic problem (26) is equal to J0 (s0 ), given by the last step of the following algorithm,
which proceeds backward in time from stage K − 1 to stage 0:
JK (sK ) = gK (sK ), ∀sK ∈ SK
Jk (sk ) = min
gk (sk , uk ) + Jk+1 (fk (sk , uk )) sk ,
uk ∈Uk (sk )
(27)
∀sk ∈ Sk , k = K − 1, K − 2, · · · , 0,
(28)
15
where Sk is the state space in stage k, Uk (sk ) is the state-dependent action space in stage k,
and (28) is called Bellman’s equation. Furthermore, if uk = µk (sk ) minimize the right side of
(28) for each sk and k, the policy π = {µ0 , µ1 , · · · , µK−1} is optimal.
The function Jk (sk ) is termed as the optimal cost-to-go, i.e., the minimum cost for the (K −k)stage problem that starts at stage k with state sk and ends at stage K. Based on Proposition
2, instead of jointly optimizing u0 , u1 , · · · , uK−1 for all stages, the DP algorithm recursively
optimizes the per-stage control action uk as in (28) based on the optimal cost-to-go Jk+1(sk+1 )
that has be calculated in the previous step.
B. DP-based Aviation Time Minimization
Now, we apply the DP algorithm to solve the aviation time minimization problem (8). Firstly,
the objective function (8a) can be rewritten as
N
yn − xn
SN +1 − S0 X
+
tn −
min
x,y,v,p(t)
vmax
vmax
n=1
N
SN +1 − S0 X
yn − xn
,
+
= min
min tn −
x,y
vn ,pn (t)
vmax
v
max
n=1
(29)
where the minimization over vn , pn (t) for a given pair xn < yn corresponds to the single-sensor
navigation case (10) and can be efficiently solved by Algorithm 1. If xn = yn , i.e., the UAV
hovers at location xn , the minimization takes the value with tn = Th,n (xn ) as the solution for
(6). Thus, according to the results in Sections II-A2), III-A, and III-B, we can define a cost
function as
yn − xn
tn −
vmax
gn (xn , yn ) = min
vn ,pn (t)
Th,n (xn ),
= (yn −xn )
+∞,
if xn = yn ,
1
1
∗ (x̃ ,ỹ ) − v
vn
n n
max
, if xn < yn and (22) is feasible,
(30)
elsewhere,
for all n = 1, 2, · · · , N, where x̃n = xn −Sn , ỹn = yn −Sn are the horizontal coordinates relative
to Sn , vn∗ (x̃n , ỹn ) is the optimal feasible solution of (22) that can be calculated via Algorithm 1,
and Th,n (xn ) is the minimum hovering time obtained by solving (6). If xn < yn while (22) is
infeasible, we set the cost as infinity.
Based on the above cost function, we formulate the aviation time minimization problem as a
DP problem. In particular, we have
16
- index of stage: n,
- system state in stage n: the end point of data upload for sensor n−1, denoted by sn = yn−1 .
The state space is Sn = [S0 , SN +1 ],
- control action in stage n: the data upload interval for sensor n, i.e., (xn , yn ). The action
space is Un (sn ) = {(xn , yn )|sn ≤ xn ≤ yn ≤ SN +1 },
- state update rule: sn+1 = fn (sn , xn , yn ) = yn ,
- per-stage cost: gn (xn , yn ), n = 1, 2, · · · , N as defined in (30), and gN +1 (sN +1 ) =
SN+1 −S0
.
vmax
As a result, the problem (29) can be rewritten as
" N
#
X
min
gn (xn , yn ) + gN +1 (yN ) ,
x,y
(31)
n=1
which can be solved by recursively calculating the cost-to-go function stage-by-stage as
JN +1 (sN +1 ) = gN +1 (sN +1 ) =
Jn (sn ) =
min
sn ≤xn ≤yn ≤SN+1
SN +1 − S0
,
vmax
∀sN +1
{gn (xn , yn ) + Jn+1 (yn )},
(32)
∀sn , n = N, N − 1, · · · , 1.
(33)
Then the minimum aviation time can be obtain in the last step, i.e.
Tmin = J1 (S0 ).
(34)
∗
In addition, if the optimal control actions for (33) are (x∗1 , y1∗), (x∗2 , y2∗ ), · · · , (x∗N , yN
), the
∗
optimal solution for the problem (29) is x∗ = {x∗1 , x∗2 , · · · , x∗N }, y ∗ = {y1∗, y2∗ , · · · , yN
}. Thus,
the optimal solution of the original problem (8) is x∗ , y ∗ joint with the optimal speeds vn∗ (x∗n −
Sn , yn∗ − Sn ), n = 1, 2, · · · , N from problem (22) and the optimal power allocation in (14).
It is remarkable that the computational complexity for the calculation of the cost-to-go functions Jn (sn ) can be reduced by exploring the property of (33).
Proposition 3. Concerning the DP algorithm (32) and (33), for any given n and sn , if the optimal
solution (x∗n , yn∗ ) for the minimization problem in (33) satisfies x∗n > sn , we have Jn (s′n ) = Jn (sn )
for all s′n ∈ [sn , x∗n ].
Proof. See Appendix E.
According to Proposition 3, to reduce the computational complexity, the calculation of Jn (sn )
for a given n can be launched from the initial point S0 to the destination SN +1 . When an optimal
solution (x∗n , yn∗ ) for a given sn is found and satisfies sn < x∗n , the calculation of Jn (s′n ) for
s′n ∈ [sn , x∗n ] can be omitted as the optimal solutions are equivalent to (x∗n , yn∗ ).
17
V. N UMERICAL R ESULTS
Some numerical results are shown in this section. In the numerical simulations, we set H = 100
m, β = 80 dB [20], and the channel bandwidth W = 20 kHz. According to the state-of-the-art
in the industry [2], we set the maximum speed vmax = 26 m/s.
A. Single-sensor Case Study
The optimal result for the single-sensor case versus different values of data upload requirement
B and sensor energy constraint E with S0 = −5000 m, S1 = 0 m, S2 = 5000 m are depicted
in Figs. 3 and 4, respectively. It can be seen that the optimal transmission interval (x, y) is
symmetric, which corresponds to the shortest average transmission distance from the sensor to
the UAV. In Fig. 3, when B > 5.7 Mb, the optimal solution is hovering above the sensor to
receive data. When 2.5 Mb < B < 5.7 Mb, both the length of data upload interval and the UAV
speed decreases as the data upload requirement increases. The decrease of data upload interval
increases the channel gain between the UAV and the sensor, and the decrease of the UAV speed
increases the transmission time. When B < 2.5 Mb, the UAV can fly with the maximum speed
while successfully receive all the uploaded data. In this range, the minimum data upload interval
is depicted, and its length decreases as the data upload requirement decreases as the time required
for data upload decreases.
In Fig. 4, the optimal result versus E is opposite to that versus B. In particular, when E < 0.3
J, the UAV also needs to hover above the sensor to receive data. When 0.3 J < E < 1.7 J, both
the length of the data upload interval and the UAV speed increases as the amount of energy
increases. While for E > 1.7 J, the UAV can fly with the maximum speed, and the minimum
length of the data upload interval decreases as the amount of energy increases.
B. Multi-sensor Case Study
Then the data collection for multiple sensors is studied by simulation. In particular, the UAV
flies from S0 = 0 m to SN +1 = 10000 m, during which N = 10 sensors are deployed. The
locations of the sensors Sn , n = 1, · · · , 10 are fixed as 500m, 2500m, 4500m, 6500m, 7000m,
7500m, 8000m, 8500m, 9000m, and 9500m, i.e., the first four sensors are 2000m apart from one
another (sparsely deployed), and the last six sensors are 500m apart from one another (densely
deployed). We study the impact of required data and energy limitation respectively.
18
1500
25
x
y 20
v
1000
15
Location (m)
5
0
0
−5
−500
Speed (m/s)
10
500
−10
−15
−1000
−20
−1500
0
1
2
3
4
5
−25
6
B (Mb)
Fig. 3. Optimal solution (x, y, v) versus B for the single-sensor case, with S0 = −5000 m, S1 = 0 m, S2 = 5000 m, and
E = 1 J.
1500
25
x
y 20
v
1000
15
Location (m)
5
0
0
−5
−500
Speed (m/s)
10
500
−10
−15
−1000
−20
−1500
0
0.5
1
1.5
2
2.5
−25
3
E (J)
Fig. 4. Optimal solution (x, y, v) versus E for the single-sensor case, with S0 = −5000 m, S1 = 0 m, S2 = 5000 m, and
B = 3 Mb.
19
30
v
n
Sn
25
x
n
y
n
Speed (m/s)
20
15
10
5
0
0
2000
4000
6000
8000
10000
Location (m)
Fig. 5. Optimal solution (xn , yn , vn ) for N = 10 sensors with En = 1.2 J for all n = 1, 2, · · · , N , B1 = · · · = B4 = B6 =
B10 = 3 Mbits, B5 = 2.5 Mbits, B7 = B9 = 3.5 Mbits, and B8 = 7 Mbits.
In Fig. 5, the amount of energy in each sensor is set identical, En = 1.2 J for all n =
1, 2, · · · , N, and the amount of data to be transmitted varies. We set B1 = · · · = B4 = B6 =
B10 = 3 Mbits, B5 = 2.5 Mbits, B7 = B9 = 3.5 Mbits, and B8 = 7 Mbits. It can be seen that
as the first four sensors are sparsely located, the upload intervals are disconnected. The reason
is that it is not energy-efficient when the transmission distance is large. In this case, the UAV
collects data from a sensor in a short range and then flies towards another with the maximum
speed. For the last six sensors, as the amount of data to be transmitted increases from sensor
S5 to sensor S8 and then decreases from S8 to S10 , the UAV’s speed firstly decreases and then
increases accordingly so that the required data can be uploaded successfully. Particularly, As the
amount of data in sensor S8 is extremely large, the UAV hovers above it to collect data with
maximum data rate, so that the overall aviation time is minimized.
In Fig. 6, we change the values of the amount of data bits as B1 = · · · = B4 = B6 = B10 = 2
Mbits, B5 = 2.5 Mbits, B7 = B9 = 3.5 Mbits, and B8 = 3.8 Mbits. Firstly, as the data bits in
sensors S1 , · · · , S4 are limited, the UAV can successfully receive all the data bits when flying
with maximum speed. In addition, as the data bits in sensor S8 are reduced compared with Fig. 5,
the hovering mode is not necessary any more. As the amount of data bits is still the largest, the
20
30
vn
S
n
25
x
n
yn
Speed (m/s)
20
15
10
5
0
0
2000
4000
6000
8000
10000
Location (m)
Fig. 6. Optimal solution (xn , yn , vn ) for N = 10 sensors with En = 1.2 J for all n = 1, 2, · · · , N , B1 = · · · = B4 = B6 =
B10 = 2 Mbits, B5 = 2.5 Mbits, B7 = B9 = 3.5 Mbits, and B8 = 3.8 Mbits.
aviation speed is quite low.
Then we set the amount of data in each sensor to be the same, i.e., Bn = 3 Mbits for all
n = 1, 2, · · · , N, while E1 = · · · = E4 = 3.6 J, E5 = 3.2 J, E6 = E10 = 1.8 J, E7 = E9 = 0.8
J, and E8 = 0.2 J to evaluate the impact of the energy constraint. It can be seen that with
sufficient amount of energy for the first four sensors, the UAV can fly with maximum speed
while successfully receiving all the data. For the last six sensors, as the amount of energy firstly
decreases and then increases from sensor S5 to sensor S10 , the optimal speed also decreases
at first and then increase. In particular, as the eighth sensor is quite energy stringent, the UAV
hovers above it with zero speed to collect its data. In addition, the transmission intervals for the
first four sensors shift towards the initial point so that more space can be reserved for the last
six sensors which has limited energy budget.
Next, we reset the amount of energy as E1 = E2 = E3 = E7 = E9 = 1.0 J, E4 = 1.2 J,
E5 = 3.2 J, E6 = E10 = 2.0 J, and E8 = 0.6 J and re-run the simulation, the result is shown
in Fig. 8. It can be found that the UAV serves the first three sensors with medium aviation
speed, as the limited amount of energy cannot support the maximum speed. Similarly, as the
energy in sensor S8 is sufficient to support data collection during aviation, the hovering mode
21
30
25
Speed (m/s)
20
15
10
v
n
Sn
5
x
n
y
n
0
0
2000
4000
6000
8000
10000
Location (m)
Fig. 7. Optimal solution (xn , yn , vn ) for N = 10 sensors with Bn = 3 Mbits for all n = 1, 2, · · · , N , and E1 = · · · = E4 = 3.6
J, E5 = 3.2 J, E6 = E10 = 1.8 J, E7 = E9 = 0.8 J, and E8 = 0.2 J.
30
v
n
Sn
25
xn
yn
Speed (m/s)
20
15
10
5
0
0
2000
4000
6000
8000
10000
Location (m)
Fig. 8. Optimal solution (xn , yn , vn ) for N = 10 sensors with Bn = 3 Mbits for all n = 1, 2, · · · , N , and E1 = E2 = E3 =
E7 = E9 = 1.0 J, E4 = 1.2 J, E5 = 3.2 J, E6 = E10 = 2.0 J, and E8 = 0.6 J.
22
40
Ē
Ē
Ē
Ē
Average Aviation Time (min)
35
=
=
=
=
0.15
0.30
0.60
1.50
J
J
J
J
30
25
20
15
10
5
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
B̄ (Mb)
Fig. 9. Average aviation time versus average amount of data with random data requirement, random energy and random locations.
is not necessary. Compared with Figs. 5-8, the energy constraint has similar impact as the data
requirement.
C. Average Performance Evaluation
We further evaluate the average performance with random data requirement, random energy
and random locations. The amount of data in each sensor follows uniform distribution with a
mean value B̄, the amount of energy in each sensor follows uniform distribution with a mean
value Ē, and each pair (Bn , En ) is set to satisfy the feasibility constraint (7). The sensors are
uniformly distributed in the range [S0 , SN +1 ] = [0, 10000] m. The results are illustrated in Figs. 9
and 10. It can be seen in Fig. 9 that when the average amount of energy is sufficient, the average
aviation time grows almost linearly with the increase of B̄. But when the amount of energy is
deficient (e.g., Ē = 0.15 J), the average aviation time grows exponentially with the increase of
B̄. This is due to the different relations between the aviation time and the amount of data in
hovering mode and aviation mode. In energy sufficient case, the UAV collects data mainly in
aviation mode. While in energy constrained case, it collects data mainly in hovering mode.
In Fig. 10, it is observed that when the amount of data is small, the average aviation time is
constant over all examined values of Ē, which means that the UAV can fly with the maximum
23
40
B̄
B̄
B̄
B̄
Average Aviation Time (min)
35
=
=
=
=
0.5
2.0
3.5
5.0
Mb
Mb
Mb
Mb
30
25
20
15
10
5
0
0.5
1
1.5
Ē (J)
Fig. 10. Average aviation time versus average amount of energy with random data requirement, random energy and random
locations.
speed and collect data during aviation. In addition, it is expected with the increase of Ē, the
curves converges to a fixed point with minimum aviation time, i.e., the UAV flies with the
maximum speed. However, the figure shows that the convergence is slow, especially for large
values of B̄. For the case with B̄ = 5.0 Mb, the curve firstly goes down exponentially, and then
linearly with close-to-zero slope.
VI. C ONCLUSION
In this paper, we have solved the aviation time minimization problem for completing the data
collection mission in a one-dimensional sensor network. The analysis on hovering mode provides
the feasibility condition for a successful data collection. The analysis on the single-sensor case
reveals the optimal solution structures. Firstly, the optimal power allocation follows the classical
water-filling policy. Secondly, the maximum amount of data bits that can be successfully uploaded
during UAV’s aviation is a decreasing function of the UAV speed, which results in a simple
bisection method to find the optimal aviation speed. For the multi-sensor case, we have shown
that the division of data collection intervals can be optimized via the DP algorithm. According to
the numerical results, is has been observed that the behavior of the UAV relies on the locations,
the data amount and the energy amount of sensors. With a sufficient amount of energy, the UAV
24
can fly with maximum speed. Otherwise, its speed is proportional to the sensors’ energy budgets
and the inter-sensor distance, but inversely proportional to the amount of data to be uploaded.
A PPENDIX A
P ROOF
OF
L EMMA 1
Since
a2
< 0,
f (x) = −
x(x + a)2
(35)
a
a
f ′ (x) = log2 1 +
−
> f ′ (+∞) = 0,
x
x+a
(36)
′′
f ′ (x) is decreasing. Therefore,
which indicates that f (x) is increasing. In addition,
a xa
lim f (x) = lim a log2 1 +
= a log2 e.
x→+∞
x→+∞
x
Hence, f (x) < a log2 e =
(37)
a
.
ln 2
A PPENDIX B
P ROOF
OF
P ROPOSITION 1
As
βEn
Th,n (xn )
W log2 1 +
α
2
Th,n (xn )((xn − Sn )2 + H 2 ) 2
W βEn
<
α
2((xn − Sn )2 + H 2 ) 2 ln 2
W βEn
,
≤
2H α ln 2
(38)
where the first inequality holds according to Lemma 1, and the gap can be arbitrarily small as
Th,n (xn ) tends to infinity. In the second inequality, the equality holds when xn = Sn . Hence, if
Bn <
W βEn
,
2H α ln 2
there is always a feasible transmission mode so that Bn bits can be successfully
transmitted.
If Bn ≥
W βEn
2H α ln 2
on the contrary, the left hand side of (5) is always less than Bn . Therefore,
the equation (6) is not feasible.
25
A PPENDIX C
P ROOF
OF
T HEOREM 1
The Lagrangian function of the problem (12) is expressed as
Z y
Z
p(s)β
1
W y
ds − λ
log2 1 + 2
p(s)ds − E .
L=
α
2v x
v x
(s + H 2 ) 2
By setting
∂L
∂p(s)
(39)
= 0, we get the optimal power allocation expressed as (14), where γ0 =
1
λ
is
the water level so that (12b) is satisfied with equality, and the channel gain is
γ(s) =
(s2
β
α ,
+ H 2) 2
(40)
which is equivalent to (16).
Based on (14) and (40), it can be found that p∗ (s) > 0 must hold in a continuous interval.
Next, we derive the necessary and sufficient condition for p∗ (s) > 0 for all x < s < y.
1) Sufficiency:
Suppose that p∗ (s) > 0 for x < s < y. As s2 ≤ max{x2 , y 2 } for any x < s < y, we have
γ(s) =
As p∗ (s) > 0, we have
1
γ0
>
β
β
α >
α .
(s2 + H 2 ) 2
(max{x2 , y 2 } + H 2 ) 2
1
γ(s)
(41)
holds for all x < s < y. To guarantee this,
than or equal to the maximum value of
1
,
γ(s)
1
γ0
must be larger
i.e.,
α
(max{x2 , y 2} + H 2 ) 2
1
≥
.
γ0
β
(42)
On the other hand, according to (12b), i.e.,
Z
Z
α
1 y ∗
(s2 + H 2 ) 2
1 y 1
−
ds
p (s)ds =
v x
v x γ0
β
Z
α
y−x 1
1 y (s2 + H 2 ) 2
=
−
ds
v γ0 v x
β
≤ E,
(43)
we have
1
vE
1
≤
+
γ0
y−x y−x
Z
x
y
α
(s2 + H 2 ) 2
ds.
β
(44)
According to (42) and (44), we have
α
vE
1
(max{x2 , y 2} + H 2 ) 2
≤
+
β
y−x y−x
Z
x
y
α
(s2 + H 2 ) 2
ds,
β
which is equivalent to (13). Therefore, the sufficiency is proved.
(45)
26
In addition, to maximize the throughput, (43) must be satisfied with equality, which results in
equality condition in (44). Hence, (15) is obtained.
2) Necessity:
1
γ0
Suppose (13) (or equivalently (45)) holds true. We let
equals to the right hand side of (44).
Then (43) is satisfied with equality, which guarantees that the power allocation is optimal as all
the energy budget is fully utilized. Based on (45) and the equality of (44), we have
α
α
1
(max{x2 , y 2} + H 2 ) 2
(s2 + H 2 ) 2
≥
>
γ0
β
β
for all x < s < y. Therefore, we have p∗ (s) =
1
γ0
− (s
α
2 +H 2 ) 2
β
(46)
> 0 for x < s < y, and hence, the
necessity is proved.
The optimal throughput can be obtained by substituting p(s) in (12a) with (14) and deducing
as follows
=
=
=
=
=
y
β
α ds
γ0
+ H 2) 2
x
Z
y
α y
β
W
2
2
−
s log2
log2 (s + H )ds
2v
γ0 x 2 x
y αZ y
β
α
W
2
2
2
2
+
s log2
sd log2 (s + H )
− s log2 (s + H )
2v
γ0
2
2 x
x
Z y
y
α
s2
β
W
+
s log2
ds
α
2v
γ0 (s2 + H 2 ) 2 x ln 2 x s2 + H 2
Z y
y
α
β
H2
W
+
s log2
1− 2
ds
α
2v
s + H2
γ0 (s2 + H 2 ) 2 x ln 2 x
y
W
αH
s
αs
β
.
(47)
s log2
−
arctan
α +
2v
ln 2 ln 2
H x
γ0 (s2 + H 2 ) 2
W
Bmax (x, y, v) =
2v
Z
log2
(s2
A PPENDIX D
P ROOF
OF
T HEOREM 2
Based on (12a) and (12b), to achieve the maximum throughput, all the energy should be fully
used, i.e.
Z
y
p(s)ds = vE.
(48)
x
Replacing p(s) in the above equation by (14), we have
Z y
vE
1
1
1
=
+
ds.
γ0
y − x y − x x γ(s)
(49)
27
According to the first line of (47), we have
Z
γ(s)
W y
ds
log2
Bmax (x, y, v) =
2v x
γ0
Z y
Z y
W
1
1
=
ds
log2 ds −
log2
2v
γ0
γ(s)
x
x
1
W
a1 log2
vE + a2
− a3 ,
=
2v
a1
(50)
where
a1 = y − x,
Z y
1
ds,
a2 =
x γ(s)
Z y
1
ds.
a3 =
log2
γ(s)
x
(51)
(52)
(53)
Define a function
Since
1 E
g(u) = u a1 log2
+ a2
− a3 .
a1 u
g ′′ (u) = −
a1 E 2
<0
u(E + a2 u)2
(54)
(55)
for all u > 0, g ′(u) is a decreasing function of u. Therefore,
1 E
a1 E
′
g (u) = a1 log2
+ a2
− a3 −
a1 u
E + a2 u
> g ′ (+∞)
a2
− a3
= a1 log2
a1
Z y
Z y
1
1
1
ds −
ds
log2
= (y − x) log2
y − x x γ(s)
γ(s)
x
≥ 0,
(56)
where the first inequality holds due to the monotonicity of g ′ (u), and the second inequality holds
due to the concavity of log function. Based on (56), we conclude that g(u) is an increasing
function of u. Since Bmax (x, y, v) = 21 W g( v1 ), it is a decreasing function of v.
28
A PPENDIX E
P ROOF
OF
P ROPOSITION 3
As (x∗n , yn∗ ) is the optimal solution for the minimization problem in (33), we have
Jn (sn ) =
min
sn ≤xn ≤yn ≤SN+1
{gn (xn , yn ) + Jn+1 (yn )}
= gn (x∗n , yn∗ ) + Jn+1 (yn∗ ).
(57)
For a given s′n ∈ [sn , x∗n ], as s′n ≥ sn , we have [s′n , SN +1 ] ⊆ [sn , SN +1 ]. Therefore,
Jn (s′n ) =
≥
min
{gn (xn , yn ) + Jn+1 (yn )}
min
{gn (xn , yn ) + Jn+1 (yn )} = Jn (sn ).
s′n ≤xn ≤yn ≤SN+1
sn ≤xn ≤yn ≤SN+1
(58)
Secondly, as s′n ≤ x∗n , we have s′n ≤ x∗n ≤ yn∗ ≤ SN +1 . Hence,
Jn (s′n ) =
min
s′n ≤xn ≤yn ≤SN+1
{gn (xn , yn ) + Jn+1 (yn )}
≤ gn (x∗n , yn∗ ) + Jn+1 (yn∗ ) = Jn (sn ).
(59)
Combining (58) and (59), we prove that Jn (s′n ) = Jn (sn ) for all s′n ∈ [sn , x∗n ].
R EFERENCES
[1] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with unmanned aerial vehicles: opportunities and challenges,”
IEEE Communications Magazine, vol. 54, no. 5, pp. 36–42, May 2016.
[2] Dji. INSPIRE 2: Power beyond imagination. [Online]. Available: http://www.dji.com/inspire-2
[3] R. Sun, “Dual-band non-stationary channel modeling for the air-ground channel,” Ph.D. dissertation, University of South
Carolina, Jul. 2015.
[4] M. Dong, K. Ota, M. Lin, Z. Tang, S. Du, and H. Zhu, “UAV-assisted data gathering in wireless sensor networks,” The
Journal of Supercomputing, vol. 70, no. 3, pp. 1142–1155, Dec. 2014.
[5] Z. Han, A. L. Swindlehurst, and K. J. R. Liu, “Optimization of MANET connectivity via smart deployment/movement of
unmanned air vehicles,” IEEE Transactions on Vehicular Technology, vol. 58, no. 7, pp. 3533–3546, Sept. 2009.
[6] E. I. Grøtli and T. A. Johansen, “Path planning for UAVs under communication constraints using SPLAT! and MILP,”
Journal of Intelligent & Robotic Systems, vol. 65, no. 1, pp. 265–282, Jan. 2012.
[7] E. Koyuncu, R. Khodabakhsh, N. Surya, and H. Seferoglu, “Deployment and trajectory optimization for UAVs: A
quantization theory approach,” arXiv:1708.08832, 2017.
[8] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication design for multi-UAV enabled wireless networks,”
arXiv:1705.02723, 2017.
[9] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for UAV-enabled mobile relaying systems,” IEEE Transactions
on Communications, vol. 64, no. 12, pp. 4983–4996, Dec. 2016.
[10] D. S. Kalogerias and A. P. Petropulu, “Mobile beamforming & spatially controlled relay communications,” in Proceedings
of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016, pp. 6405–6409.
29
[11] C.-M. Cheng, P.-H. Hsiao, H. Kung, and D. Vlah, “Maximizing throughput of UAV-relaying networks with the load-carryand-deliver paradigm,” in IEEE Wireless Communications and Networking Conference, 2007, pp. 4417–4424.
[12] J. Lyu, Y. Zeng, R. Zhang, and T. J. Lim, “Placement optimization of UAV-mounted mobile base stations,” IEEE
Communications Letters, vol. 21, no. 3, pp. 604–607, Mar. 2017.
[13] M. Alzenad, A. El-Keyi, F. Lagum, and H. Yanikomeroglu, “3D placement of an unmanned aerial vehicle base station
(UAV-BS) for energy-efficient maximal coverage,” IEEE Wireless Communications Letters, vol. 6, no. 4, pp. 434–437,
Aug. 2017.
[14] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Efficient deployment of multiple unmanned aerial vehicles for optimal
wireless coverage,” IEEE Communications Letters, vol. 20, no. 8, pp. 1647–1650, Aug. 2016.
[15] N. Ahmed, S. S. Kanhere, and S. Jha, “On the importance of link characterization for aerial wireless sensor networks,”
IEEE Communications Magazine, vol. 54, no. 5, pp. 52–57, May 2016.
[16] F. Jiang and A. L. Swindlehurst, “Optimization of UAV heading for the ground-to-air uplink,” IEEE Journal on Selected
Areas in Communications, vol. 30, no. 5, pp. 993–1005, Jun. 2012.
[17] A. E. A. A. Abdulla, Z. M. Fadlullah, H. Nishiyama, N. Kato, F. Ono, and R. Miura, “An optimal data collection technique
for improved utility in UAS-aided networks,” in IEEE Conference on Computer Communications (Infocom), Apr. 2014,
pp. 736–744.
[18] S. Say, H. Inata, J. Liu, and S. Shimamoto, “Priority-based data gathering framework in UAV-assisted wireless sensor
networks,” IEEE Sensors Journal, vol. 16, no. 14, pp. 5785–5794, Jul. 2016.
[19] C. Zhan, Y. Zeng, and R. Zhang, “Energy-efficient data collection in UAV enabled wireless sensor network,”
arXiv:1708.00221, pp. 1–4, Aug. 2017.
[20] J. Lyu, Y. Zeng, and R. Zhang, “Cyclical multiple access in UAV-aided communications: A throughput-delay tradeoff,”
IEEE Wireless Communications Letters, vol. 5, no. 6, pp. 600–603, Dec. 2016.
[21] C. D. Franco and G. Buttazzo, “Energy-aware coverage path planning of UAVs,” in IEEE International Conference on
Autonomous Robot Systems and Competitions, Apr. 2015, pp. 111–117.
[22] Y. Zeng and R. Zhang, “Energy-efficient UAV communication with trajectory optimization,” IEEE Transactions on Wireless
Communications, vol. 16, no. 6, pp. 3747–3760, Jun. 2017.
[23] S. Zhang, Y. Zeng, and R. Zhang, “Cellular-enabled UAV communication: Trajectory optimization under connectivity
constraint,” arXiv:1710.11619, 2017.
[24] S. Verdu, “On channel capacity per unit cost,” IEEE Transactions on Information Theory, vol. 36, no. 5, pp. 1019–1030,
Sep. 1990.
[25] D. P. Bertsekas, Dynamic programming and optimal control.
Athena Scientific Belmont, MA, 2005.
| 7cs.IT
|
WEIGHTED GROWTH FUNCTIONS OF AUTOMATIC GROUPS
arXiv:1711.01256v1 [math.GR] 3 Nov 2017
MIKAEL VEJDEMO-JOHANSSON
Abstract. The growth function is the generating function for sizes of spheres
around the identity in Cayley graphs of groups. We present a novel method
to calculate growth functions for automatic groups with normal form recognizing automata that recognize a single normal form for each group element,
and are at most context free in complexity: context free grammars can be
translated into algebraic systems of equations, whose solutions represent generating functions of their corresponding non-terminal symbols. This approach
allows us to seamlessly introduce weightings on the growth function: assign
different or even distinct weights to each of the generators in an underlying
presentation, such that this weighting is reflected in the growth function. We
recover known growth functions for small braid groups, and calculate growth
functions that weight each generator in an automatic presentation of the braid
groups according to their lengths in braid generators.
1. Introduction
Analytic combinatorics provides tools for enumerating structures as described by
formal grammars, producing generating functions. In this paper we will approach
the enumeration of minimal length words representing group elements in finitely
presented automatic groups using generating functions generated from the formal
grammars associated to the group’s automatic structure.
For a group with presentation G = hg|ri, we define
Cayley graph: the graph with group elements as vertices, and an edge from
each vertex h for each generator in g, to the vertex gh.
geodesic word: shortest word in the generators and their inverses representing a group element; corresponds to a shortest path in the Cayley graph.
radius r sphere around the identity: the set of elements whose geodesic
words have length r. We denote this S(r).
growth function: the generating function of the sequence S(r) for r nonnegative integers.
First, in Section 2 we will introduce the route from a formal grammar to a generating function, and in Section 3 we will demonstrate how these methods apply to
automatic group, by working with the explicit example of the braid group B3 on
three strands.
Date: November 6, 2017.
1
2
MIKAEL VEJDEMO-JOHANSSON
2. Counting with grammars
Chomsky and Schützenberger proved [2] that a contextfree language can studied
using generating functions. Their article provides a construction for finding the
generating function related to a specific grammar.
Starting with a Backus-Naur form of the grammar, each rewriting rule can be translated into an algebraic equation. Each terminal symbol is assigned some expression
in the variables of the resulting generating function, and each non-terminal symbol
is assigned a generating function of its own. The rewriting assignment is replaced
by an equality, each concatenation with a multiplication and each disjunction with
an addition.
For a first and simple example, balanced two-symbol sequences have the grammar
S → ∅ | aSb
Translating this to an algebraic equation, we would get
S(x, y) = 1 + xyS(x, y)
by weighting each symbol a by x1 and each symbol b by y 1 . The resulting generating
function will count the number of strings by the number of a and b symbols in the
result, or by evaluating S(t, t) will count by length of the string.
P
This equation is solved straightforwardly to S(x, y) = 1/(1 − xy) = (xy)j , from
which we can immediately read that there is exactly one
for each combination
P string
of j each of as and bs. From S(t, t) = 1/(1 − t2 ) =
t2j follows that there is one
unique string for each even length, and no odd-length strings.
Chomsky and Schützenberger proved that as long as the grammar is at most
context-free, the corresponding generating function(s) will be rational functions.
For anything that can be described by a context-free grammar, this suggests a
concrete approach for enumeration:
(1) Find a Backus-Naur form of a grammar describing your structures
(2) Translate the grammar to a system of polynomial equations
(3) Use a Gröbner basis with an elimination order to solve the system of equations
(4) Isolating the Gröbner basis elements concentrated to the interesting nonterminal symbol and the terminal variables, solve for a rational form of the
generating function
3. Braids and Automatic Groups
Braid groups are usually introduced with a finite presentations in terms of elementary braids: for k strands, the braid group Bk has generators σj for 1 ≤ j < k,
where σj crosses strand j over strand j + 1. We give an illustration for B4 in
WEIGHTED GROWTH FUNCTIONS OF AUTOMATIC GROUPS
3
Figure 1. Generators of the Braid group B4
=
=
Figure 2. Relations of the Braid group B4
Figure 1. By inspecting the effects of Reidemeister moves, and of manipulations of
separated areas of the 3-sphere, we can derive the finite presentation
Bk = hσ1 , . . . , σk |σi σj = σj σi ; σi σi+1 σi = σi+ σi σi+1 i
where |i − j| > 1. Figure 2 shows these relations in B4 , the smallest braid group
where all relations are applicable.
One proof that the word problem is solvable for braid groups was described in [3],
demonstrating that automatic groups solve the word problem, and that braid groups
are (bi)automatic. An automatic group, here, is a finitely presented group coupled
with several automata: one to detect whether a given string in the generators is
the normal form of a group element, and one to detect right products of a normal
form by a generator.
Braid groups form an example of biautomatic groups: there are grammars both
for recognizing right products and left products. The part that really interests us
here, though, is the normal form recognizer. With a grammar for normal forms,
4
MIKAEL VEJDEMO-JOHANSSON
algebraic equations to compute generating functions for group sizes can be computed. These generating functions are also studied extensively for finitely presented
groups: they are called growth series. For braid groups, we even know grammars
that pick out exactly one normal form for each group element, such that this normal form is geodesic: has the shortest possible expression in some specific set of
generators.
Charney in [1] gives a grammar for the Braid group B3 with the following transition
rules, with each state terminal.
B3 → e|s1 v2 |s2 v3 |s1 s2 v3 |s2 s1 v2 |s1 s2 s1 v1 |s1 v5 |s2 v6 |s1 s2 v6 |s2 s1 v5 |s1 s2 s1 v4
v1 → s1 s2 s1 v1
v2 → s1 v2 |s1 s2 v3 |s2 v6 |s2 s1 v5 |s1 s2 s1 v1
v3 → s2 v3 |s2 s1 v2 |s1 v5 |s1 s2 v6 |s1 s2 s1 v1
v4 → s1 s2 s1 v4 |s1 s2 v6 |s2 v6 |s2 s1 v5 |s1 v5
v5 → s1 v5 |s1 s2 v6
v6 → s2 v6 |s2 s1 v5
The construction of this automaton generalizes to all braid groups, with exponential growth in the number of rules in the grammar. This improves on previous
constructions that needed factorial growth in the number of rules.
From this grammar we can produce a system of algebraic equations that counts
each generator in Charney’s presentation equally
B3 = (1 + t · v2 + t · v3 + t · v3 + t · v2 + t · v1 + t · v5 + t · v6 + t · v6 + t · v5 + t · v4 )
v1 = (1 + t · v1 )
v2 = (1 + t · v2 + t · v3 + t · v6 + t · v5 + t · v1 )
v3 = (1 + t · v3 + t · v2 + t · v5 + t · v6 + t · v1 )
v4 = (1 + t · v4 + t · v6 + t · v6 + t · v5 + t · v5 )
v5 = (1 + t · v5 + t · v6 )
v6 = (1 + t · v6 + t · v5 )
Solving this system for B3 (t) with term order to eliminate all the vs, using your
favorite computer algebra system recovers a Gröbner basis:
4B3 (t)t3 − 8B3 (t)t2 − 4t3 + 5B3 (t)t − 8t2 − B3 (t) + 5t + 1
− 2B3 (t)t2 + 3B3 (t)t + 2t2 − B3 (t) + 5t + v6
− 2B3 (t)t2 + 3B3 (t)t + 2t2 − B3 (t) + 5t + v5
− 20B3 (t)t2 + 28B3 (t)t + 20t2 − 9B3 (t) + 52t + 2v4 + 7
20B3 (t)t2 − 26B3 (t)t − 20t2 + 5B3 (t) − 54t + 6v3 − 11
20B3 (t)t2 − 26B3 (t)t − 20t2 + 5B3 (t) − 54t + 6v2 − 11
4B3 (t)t2 − 4B3 (t)t − 4t2 + B3 (t) − 12t + 6v1 − 7
WEIGHTED GROWTH FUNCTIONS OF AUTOMATIC GROUPS
5
The first of these terms completely avoids all the vs, and is the one generator of
the elimination ideal. This produces a functional equation for B3 (t):
4B3 (t)t3 − 8B3 (t)t2 − 4t3 + 5B3 (t)t − 8t2 − B3 (t) + 5t + 1 = 0
which we can rewrite to
B3 (t)(4t3 − 8t2 + 5t − 1) = 4t3 + 8t2 − 5t − 1
from which follows
B3 (t) =
2t(8t − 5)
4t3 + 8t2 − 5t − 1
=1+
4t3 − 8t2 + 5t − 1
(t − 1)(2t − 1)2
1+10t+34t2 +90t3 +218t4 +506t5 +1146t6 +2554t7 +5626t8 +12282t9 +26618t10 +57338t11 +
122874t12 +262138t13 +557050t14 +1179642t15 +2490362t16 +5242874t17 +11010042t18 +O(t19 )
This recovers the growth function for B3 as computed by Charney [1].
The method of going through Gröbner basis computations, however, is more flexible
than Charney’s linear algebra approach. Since we can choose weights at will, we
can – for instance – compute the growth series of the automatic presentation, as
weighted by the number of elementary braid generators used for each word. Doing
this still retains a strong focus on the automatic presentation, and as we will see no
longer calculates geodesic (ie shortest) words for the presentation with elementary
braid generators.
To achieve this, we weight each term when translating to a system of equations not
by the number of automatic generators involved, but by the number of elementary
braid generators in each term, producing the system of equations
B3 = (1 + t · v2 + t · v3 + t2 · v3 + t2 · v2 + t3 · v1 + t · v5 + t · v6 + t2 · v6 + t2 · v5 + t3 · v4 )
v1 = (1 + t3 · v1 )
v2 = (1 + t · v2 + t2 · v3 + t · v6 + t2 · v5 + t3 · v1 )
v3 = (1 + t · v3 + t2 · v2 + t · v5 + t2 · v6 + t3 · v1 )
v4 = (1 + t3 · v4 + t2 · v6 + t · v6 + t2 · v5 + t · v5 )
v5 = (1 + t · v5 + t2 · v6 )
v6 = (1 + t · v6 + t2 · v5 )
Calculating, again, an eliminating Gröbner basis produces
B3 (t)t5 + B3 (t)t4 − t5 − 3B3 (t)t3 − t4 − B3 (t)t2 − t3 + 3B3 (t)t − t2 − B3 (t) + t + 1
6
MIKAEL VEJDEMO-JOHANSSON
3
3
2
3
2
3
−4t4 B3 (t) −8B3 (t) t3 −2B3 (t) t4 +8B3 (t) t2 −4B3 (t) t3 +3B3 (t)t4 +12B3 (t) t+
2
3
2
2
20B3 (t) t2 + 6B3 (t)t3 + 3t4 − 8B3 (t) + 30B3 (t) t + 8B3 (t) v6 + 18B3 (t)t2 + 6t3 −
2
12B3 (t) + 27B3 (t)t + 12B3 (t)v6 + 6t2 − 6B3 (t) + 9t + 6v6
2
2
2
2
− 2B3 (t) t4 − 4B3 (t) t3 + 4B3 (t) t2 + B3 (t)t3 + 2t4 + 6B3 (t) t + 8B3 (t)t2 + 3t3 −
2
4B3 (t) + 10B3 (t)t + 4B3 (t)v6 + 4t2 + 2tv6 − 3B3 (t) + 4t + 2v6 + 1
2
2
2
2
−2B3 (t) t4 −4B3 (t) t3 +3B3 (t)t4 +4B3 (t) t2 +5B3 (t)t3 −t4 +6B3 (t) t+3B3 (t)t2
2
− t3 − 4B3 (t) + 6B3 (t)t + 4B3 (t)v6 − 3t2 + 2v6 2 − B3 (t) − 2t + 2v6 − 3
− B3 (t)t4 − 2B3 (t)t3 + t4 + 2B3 (t)t2 + 2t3 + 3B3 (t)t + 2t2 − 2B3 (t) + 3t + v5 + v6
− 4B3 (t)t4 −7B3 (t)t3 + 4t4 + 7B3 (t)t2 + 7t3 + 9B3 (t)t + 9t2 −6B3 (t) + 11t + 2v4 + 4
5
5
4
5
4
3
5
56B3 (t) t4 +88B3 (t) t3 +24B3 (t) t4 −80B3 (t) t2 +40B3 (t) t3 −40t4 B3 (t) −88B3 (t) t−
4
3
2
5
4
4
3
4
248B3 (t) t2 − 60B3 (t) t3 + 47B3 (t) t4 + 8B3 (t) − 280B3 (t) t + 96B3 (t) v3 −
3
2
3
256B3 (t) t2 + 109B3 (t) t3 + 14B3 (t)t4 − 88B3 (t) − 296B3 (t) t + 144B3 (t) v3 −
2
3
2
2
282B3 (t) t2 +25B3 (t)t3 −101t4 −148B3 (t) −387B3 (t) t+80B3 (t) v3 −385B3 (t)t2 −
2
202t3 +79B3 (t) −570B3 (t)t+12B3 (t)v3 −168B3 (t)v6 −205t2 +181B3 (t)−303t+6v3 −196v6 −6
4
4
3
4
3
2
−868B3 (t) t4 −1364B3 (t) t3 −694t4 B3 (t) +1240B3 (t) t2 −1126B3 (t) t3 +2011B3 (t) t4 +
4
3
2
4
3
1364B3 (t) t+4304B3 (t) t2 +3545B3 (t) t3 +1376B3 (t)t4 −124B3 (t) +4846B3 (t) t−
3
2
3
2
1488B3 (t) v3 + 2620B3 (t) t2 + 2595B3 (t)t3 − 1825t4 + 1318B3 (t) + 2321B3 (t) t−
2
2
2784B3 (t) v3 − 3915B3 (t)t2 − 3650t3 + 4935B3 (t) − 6772B3 (t)t − 1216B3 (t)v3 −
2064B3 (t)v6 − 3625t2 + 364tv3 + 4941B3 (t) − 5475t − 50v3 − 3336v6 − 132
4
4
3
4
3
2
252B3 (t) t4 + 396B3 (t) t3 − 4t4 B3 (t) − 360B3 (t) t2 + 4B3 (t) t3 − 1077B3 (t) t4 −
4
3
2
4
3
396B3 (t) t − 956B3 (t) t2 − 2039B3 (t) t3 + 170B3 (t)t4 + 36B3 (t) − 1084B3 (t) t+
3
2
3
2
432B3 (t) v3 + 1030B3 (t) t2 + 321B3 (t)t3 + 659t4 − 412B3 (t) + 1745B3 (t) t+
2
2
456B3 (t) v3 + 2939B3 (t)t2 + 1318t3 − 2149B3 (t) + 4426B3 (t)t + 36B3 (t)v3 +
1656B3 (t)v6 + 1299t2 − 1411B3 (t) + 1977t + 91v2 − 53v3 + 1356v6 − 38
REFERENCES
4
4
7
3
4
3
2
504B3 (t) t4 + 792B3 (t) t3 − 8t4 B3 (t) − 720B3 (t) t2 + 8B3 (t) t3 − 2154B3 (t) t4 −
4
3
2
4
3
792B3 (t) t − 1912B3 (t) t2 − 4078B3 (t) t3 + 158B3 (t)t4 + 72B3 (t) − 2168B3 (t) t+
3
2
3
2
864B3 (t) v3 + 2060B3 (t) t2 + 369B3 (t)t3 + 1500t4 − 824B3 (t) + 3490B3 (t) t+
2
2
912B3 (t) v3 + 6151B3 (t)t2 + 2909t3 − 4298B3 (t) + 9125B3 (t)t + 72B3 (t)v3 +
3312B3 (t)v6 + 3053t2 − 2822B3 (t) + 4409t + 182v1 − 288v3 + 2712v6 + 106
The first of these terms is the elimination order projection, producing the functional
equation
B3 (t)t5 + B3 (t)t4 − t5 − 3B3 (t)t3 − t4 − B3 (t)t2 − t3 + 3B3 (t)t − t2 − B3 (t) + t + 1 = 0
Which we can solve for B3 (t), producing
B3 (t) =
t5 + t4 + t3 + t2 − t − 1
= 1 + 4t + 10t2 + 22t3 + 44t4 + 84t5 + O(t6 )
t5 + t4 − 3t3 − t2 + 3t − 1
Comparing this to a hand-enumeration of small braids produces 12 braids using
two elementary generators, whereas this enumeration predicts 10. The reason for
this discrepancy is precisely the fact that geodesic here is measured in terms not of
elementary generators but in terms of automatic generators. Hence, while σ1−1 σ2
and σ2−1 σ1 are both length-2 words in the elementary generating set, they have
minimal representatives in the automatic presentation as
σ1−1 σ2 = σ2 σ1 σ2−1 σ1−1 = σ1−1 Dσ2
and
σ2−1 σ1 = σ1 σ2 σ1−1 σ2−1 = σ2−1 Dσ1
where D = σ1 σ2 σ1 σ2−1 σ1−1 σ2−1 , and hence shows up as length 3 instead.
4. Conclusion
The methods from analytical combinatorics producing generating functions directly
from contextfree grammars are directly applicable to the problem of computing
growth functions for automatic groups. They can be weighted, which provides some
insight into how the automatic group geodesic words relate to their presentation
in a different choice of generators – however, for, for instance, braid groups, the
automatic presentations tend to sort generators moving the elementary generators
to the front and their inverses to the end of a word, which may not produce a
geodesic in the simpler presentation.
It is unclear how to get closer to a growth function for the elementary presentation
of a braid group.
References
[1]
Ruth Charney. “Geodesic automation and growth functions for Artin groups
of finite type”. In: Mathematische Annalen 301.1 (1995), pp. 307–324.
[2] Noam Chomsky and Marcel P Schützenberger. “The algebraic theory of contextfree languages”. In: Studies in Logic and the Foundations of Mathematics 35
(1963), pp. 118–161.
[3] David Epstein et al. Word processing in groups. AK Peters, Ltd., 1992.
| 4math.GR
|
ON GROUPS WITH THE SAME CHARACTER DEGREES AS
ALMOST SIMPLE GROUPS WITH SOCLE THE MATHIEU
GROUPS
arXiv:1511.04129v3 [math.GR] 24 Jan 2016
SEYED HASSAN ALAVI, ASHRAF DANESHKHAH, AND ALI JAFARI
Abstract. Let G be a finite group and cd(G) denote the set of complex irreducible character degrees of G. In this paper, we prove that if G is a finite
group and H is an almost simple group whose socle is Mathieu group such that
cd(G) = cd(H), then there exists an Abelian subgroup A of G such that G/A
is isomorphic to H. This study is heading towards the study of an extension of
Huppert’s conjecture (2000) for almost simple groups.
1. Introduction
Let G be a finite group, and let Irr(G) be the set of all complex irreducible character degrees of G. Denote by cd(G) the set of character degrees of G, that is to
say, cd(G) = {χ(1)|χ ∈ Irr(G)}. It is well-known that the complex group algebra
CG determines character degrees and their multiplicities.
There is growing interest in a question regarding the structure of G which can
be recovered from the character degree set of G with or without multiplicity. It is
well-known that the character degree set of G can not use to completely determine
the structure of G. For example, the non-isomorphic groups D8 and Q8 not only
have the same set of character degrees, but also share the same character table. The
character degree set cannot be used to distinguish between solvable and nilpotent
groups. For example, if G is either Q8 or S3 , then cd(G) = {1, 2}. Recently, Navarro
[14] showed that the character degree set alone cannot determine the solvability of
the group. Indeed, he constructed a finite perfect group H and a finite solvable
group G such that cd(G) = cd(H). It is also discovered by Navarro and Rizo [15]
that there exists a finite perfect group and a finite nilpotent group with the same
character degree set. Notice that in both examples, these finite perfect groups are
not nonabelian simple. It remains open whether the complex group algebra can
determine the solvability of the group or not (see Brauer’s Problem 2 [5]).
However, the situation for simple groups and related groups is rather different.
It has been proved recently that all quasisimple groups are uniquely determined up
to isomorphism by their complex group algebras [3] in which a finite group G is
quasisimple if G is perfect and G/Z(G) is a nonabelian simple group. In the late
1990s, Huppert [10] posed a conjecture which asserts that the nonabelian simple
groups are essentially characterized by the set of their character degrees.
Date: January 26, 2016.
2010 Mathematics Subject Classification. Primary 20C15; Secondary 20D05.
Key words and phrases. Character degrees; Almost simple groups; Sporadic simple groups;
Mathieu groups; Huppert’s Conjecture.
Corresponding author: Ashraf Daneshkhah.
1
2
S.H. ALAVI, A. DANESHKHAH, AND A. JAFARI
Conjecture 1.1. (Huppert) Let G be a finite group and H a finite nonabelian
simple group such that the sets of character degrees of G and H are the same. Then
G∼
= H × A, where A is an abelian group.
This conjecture is verified for Alternating groups, many of the simple groups of
Lie type [16, 19, 20] and for all sporadic simple groups [1, 2, 11, 18].
In this paper, we initiate an investigation on an extension of Huppert’s conjecture
for almost simple groups whose socle is the sporadic simple groups. A group H is
called almost simple if there exists a nonabelian simple group H0 such that H0 6
H 6 Aut(H0 ). Indeed, this paper is devoted to studying finite groups with the same
character degrees as almost simple groups H with socle H0 being one of the Mathieu
groups:
Theorem 1.1. Let G be a finite group, and let H be an almost simple group whose
socle is one of the Mathieu groups. If cd(G) = cd(H), then there exists an abelian
group A such that G/A is isomorphic to H.
In order to prove Theorem 1.1, we establish the following steps which Huppert
introduced in [10]. Let H be an almost simple group with socle H0 , and let G be a
group with the same character degrees as H. Then we show that
Step 1.: G′ = G′′ ;
Step 2.: if G′ /M is a chief factor of G, then G′ /M is isomorphic to H0 ;
Step 3.: if θ ∈ Irr(M) with θ(1) = 1, then IG′ (θ) = G′ and so M = M ′ ;
Step 4.: M = 1 and G′ ∼
= H0 ;
′
Step 5.: G/CG (G ) is isomorphic to H.
Note that to prove Step 2, we determine all finite simple groups whose irreducible
character degrees divide some irreducible character degrees of almost simple groups
with socle sporadic simple groups, and by Proposition 3.1, all such simple groups
are listed in Table 1. This result somehow relates to [17, Theorem 1] for sporadic
simple groups.
2. Preliminaries
In this section, we present some useful results to prove Theorem 1.1. We first
establish some definitions and notation.
Throughout this paper all groups are finite. Recall that a group H is said to
be an almost simple group with socle H0 if H0 6 H 6 Aut(H0 ), where H0 is a
nonabelian simple group. For a positive integer n, π(n) denotes the set of all prime
divisors of n. If G is a group, we will write π(G) instead of π(|G|). If N E G and
θ ∈ Irr(N), then the inertia group of θ in G is denoted by IG (θ) and is defined by
P
IG (θ) = {g ∈ G | θg = θ}. If the character χ = ki=1 ei χi , where each χi is an
irreducible character of G and ei is a nonnegative integer, then those χi with ei > 0
are called the irreducible constituents of χ. The set of all irreducible constituents
of θG is denoted by Irr(G|θ). All further notation and definitions are standard and
could be found in [9, 12].
Lemma 2.1. [9, Theorems 19.5 and 21.3] Suppose N E G and χ ∈ Irr(G).
(a) If χN = θ1 +θ2 +· · ·+θk with θi ∈ Irr(N), then k divides |G/N|. In particular,
if χ(1) is prime to |G/N|, then χN ∈ Irr(N).
(b) (Gallagher’s Theorem) If χN ∈ Irr(N), then χψ ∈ Irr(G) for all ψ ∈ Irr(G/N).
GROUPS WITH CHARACTER DEGREES OF ALMOST SIMPLE MATHIEU GROUPS
3
Lemma 2.2. [9, Theorems 19.6 and 21.2] Suppose N E G and θ ∈ Irr(N). Let
I = IG (θ).
P
(a) If θI = ki=1 φi with φi ∈ Irr(I), then φG
i ∈ Irr(G). In particular, φi (1)|G :
I| ∈ cd(G).
(b) If θ extends to ψ ∈ Irr(I), then (ψτ )G ∈ Irr(G) for all τ ∈ Irr(I/N). In
particular, θ(1)τ (1)|G : I| ∈ cd(G).
(c) If ρ ∈ Irr(I) such that ρN = eθ, then ρ = θ0 τ0 , where θ0 is a character of an
irreducible projective representation of I of degree θ(1) and τ0 is a character
of an irreducible projective representation of I/N of degree e.
Lemma 2.3. [18, Lemma 3] Let G/N be a solvable factor group of G minimal with
respect to being nonabelian. Then two cases can occur.
(a) G/N is an r-group for some prime r. Hence there exists ψ ∈ Irr(G/N) such
that ψ(1) = r b > 1. If χ ∈ Irr(G) and r ∤ χ(1), then χτ ∈ Irr(G) for all
τ ∈ Irr(G/N).
(b) G/N is a Frobenius group with an elementary abelian Frobenius kernel F/N.
Then f = |G : F | ∈ cd(G) and |F/N| = r a for some prime r, and a is
the smallest integer such that r a ≡ 1 mod f . If ψ ∈ Irr(F ), then either
f ψ(1) ∈ cd(G) or r a divides ψ(1)2 . In the latter case, r divides ψ(1).
(1) If no proper multiple of f is in cd(G), then χ(1) divides f for all χ ∈
Irr(G) such that r ∤ χ(1), and if χ ∈ Irr(G) such that χ(1) ∤ f , then
r a | χ(1)2 .
(2) If χ ∈ Irr(G) such that no proper multiple of χ(1) is in cd(G), then either
f divides χ(1) or r a divides χ(1)2 . Moreover if χ(1) is divisible by no
nontrivial proper character degree in G, then f = χ(1) or r a | χ(1)2 .
Lemma 2.4. Let G be a finite group.
(a) If G is a nonabelian simple group, then there exists a nontrivial irreducible
character ϕ of G that extends to Aut(G).
(b) If N is a minimal normal subgroup of G so that N ∼
= S k , where S is a
nonabelian simple group, and ϕ ∈ Irr(S) extends to Aut(S), then ϕk ∈ Irr(N)
extends to G.
Proof. Part (a) follows from [4, Theorems 2-4] and to prove part (b) see [4, Lemma
5].
Lemma 2.5. [10, Lemma 6] Suppose that M E G′ = G′′ and for every λ ∈ Irr(M)
with λ(1) = 1, λg = λ for all g ∈ G′ . Then M ′ = [M, G′ ] and |M/M ′ | divides the
order of the Schur multiplier of G′ /M.
Lemma 2.6. [13, Theorem D] Let N be a normal subgroup of a finite group G and
let ϕ ∈ Irr(N) be G-invariant. Assume that χ(1)/ϕ(1) is odd, for all χ(1) ∈ Irr(G|ϕ).
Then G/N is solvable.
3. Degree properties of almost simple groups with socle sporadic
In this section, we determine all finite simple groups whose irreducible character
degrees divide some irreducible character degrees of almost simple groups whose
socles are sporadic simple groups.
Proposition 3.1. Let S be a simple group, and let H be an almost simple group
whose socle is a sporadic simple group. Then the character degrees of S divides some
character degrees of H if and only if H and S are as in Table 1.
4
S.H. ALAVI, A. DANESHKHAH, AND A. JAFARI
Proof. Suppose that H is an almost simple group with socle a sporadic simple group
H0 . Suppose also that S is a simple group whose degrees divide some degrees of
H. Then the prime divisors of the degrees of S are exactly those primes dividing
|S|. Therefore, π(S) ⊆ π(H), and hence by [21], we know all such possible simple
groups S. We only need to check if the degrees of S divide some degrees of H and
this could mainly be done by [7, 8]. Since our arguments are similar for each group
H, we only give a detailed proof for the cases where H is M12 : 2 or M22 : 2 which
will be frequently used and referred to in Sections 4 and 5.
Suppose first H = M12 : 2. Then π(S) ⊆ {2, 3, 5, 11}, and so by [21], S is
isomorphic to one of the simple groups A5 , A6 , L2 (11), U5 (2), S4 (3), M11 and M12 .
Note that U5 (2) and S4 (3) have degrees 220 and 81, respectively. Therefore, S is
isomorphic to A5 , A6 , L2 (11), M11 or M12 .
Suppose now H = M22 : 2. Then π(S) ⊆ {2, 3, 5, 7, 11}, and so by [21], S is
isomorphic to one of the simple groups in A1 ∪ A2 ∪ A3 , where
A1 := {A5 , A6 , A7 , L2 (7), L2 (8), M22 },
A2 := {A8 , L3 (4), L2 (49), U3 (3), S4 (7), M11 },
A3 := {A9 , A10 , A11 , A12 , L2 (11), U3 (5), U4 (3), U5 (2), U6 (2),
S4 (3), S6(2), O8+ (2), M12 , McL, HS, J2 }.
If S ∈ A2 , then S has a degree divisible by 25, 27, 44, 49 or 64, which is a contradiction. If S ∈ A3 , then S has a degree which is divisible by 12, which is also a
contradiction. Therefore S ∈ A1 as claimed.
Table 1: Simple groups S whose irreducible character
degrees divide some character degrees of almost simple
groups H with socle sporadic simple groups.
H
M11
M12 , M12 : 2
M22 , M22 : 2
M23
M24
S
An for n = 5, 6, M11
An for n = 5, 6, L2 (11), M11 , M12
An for n = 5, 6, 7, L2 (q) for q = 7, 8, M22
An for n = 5, 6, 7, L2 (q) for q = 7, 8, M11 , M23
An for n = 5, 6, 7, 8, L2 (q) for q = 7, 8, 11, 23, L3 (4),
U3 (3), M11 , M24
J1
A5 , L2 (q) for q = 7, 11, J1
J2
An for n = 5, 6, 7, L2 (q) for q = 7, 8, U3 (3), J2
J2 : 2
A8 , L3 (4), and all S in J2 ,
J3 , J3 : 2
An for n = 5, 6, S4 (3), L2 (q) for q = 16, 17, 19, J3
J4
An for n
=
5, 6, 7, 8, L2 (q) for q
=
7, 8, 11, 23, 29, 31, 32, 43, L3 (4), L5 (2), U3 (3), U3 (11),
M11 , M12 , M22 , J4
HS, HS : 2
An for n = 5, 6, 7, 8, L2 (q) for q = 7, 8, 11, L3 (4), M11 ,
M22 , HS
McL, McL : 2 An for n = 5, 6, 7, 8, L2 (q) for q = 7, 8, 11, L3 (4),
U3 (3), U3 (5) S4 (3), M11 , McL
Continued
GROUPS WITH CHARACTER DEGREES OF ALMOST SIMPLE MATHIEU GROUPS
H
Suz,
Suz : 2
Co3
Co2
Co1
He, He : 2
F i22
F i22 : 2
F i23
F i′24 , F i′24 : 2
Th
Ru
Table 1 – Continued
S
An for n = 5, . . . , 10, L2 (q) for q = 7, 8, 11, 13, 25,
27, 64, L3 (3), L3 (4), L3 (9), L4 (3), U3 (3), U3 (4), U4 (2),
U4 (3), U5 (2), S6 (2), 2 B2 (8), G2 (3),2 F4 (2)′ , M11 , M12 ,
M22 , Suz, J2
A11 , and all S in Suz,
An for n = 5, 6, 7, 8, 9, 11, L2 (q) for q = 7, 8, 11, 23,
L3 (4), U3 (q) for q = 3, 5 , U4 (3), S4 (3), S6 (2), M11 ,
M12 , M22 , M23 , M24 , Co3
An for n = 5, . . . , 11, L2 (q) for q = 7, 8, 11, 23, L3 (4),
U3 (q) for q = 3, 5, U4 (3), U5 (2), S4 (3), S6 (2), M11 ,
M12 , M22 , M23 , M24 J2 , Co2
An for n = 5, . . . , 16, L2 (q) for q = 7, 8, 11, 13, 23,
25, 27, 49, 64, L3 (q) for q = 3, 4, 9, L4 (3), U3 (q) for
q = 3, 4, 5, U4 (3),U5 (2), U6 (2), S4 (q) for q = 3, 5,
8, S6 (q) for q = 2, 3, 2 B2 (8), O7 (3), O8+ (2), G2 (q) for
q = 3, 4, 3 D4 (2), 2 F4 (2)′ , M11 , M12 , M22 , M23 , M24 ,
McL, J2 , HS, Co1 , Co3
An for n = 5, 6, 7, 8, L2 (q) for q = 7, 8, 16, 17, 49,
L3 (4), U3 (3), S4 (4), He
An for n = 5, . . . , 11, A13 , L2 (q) for q = 7, 8, 11,
13, 25, 27, 64, L3 (q) for q = 3, 4, 9, L4 (3), U3 (q) for
q = 3, 4, U4 (3), U5 (2), U6 (2), S4 (3), S6 (2), 2 B2 (8),
O8+ (2), G2 (q) for q = 3, 4, M11 , M12 , M22 , J2 , McL,
F i22
S6 (3), O7 (3), and all S in F i22 .
An for n = 5, . . . , 13, L2 (q) for q = 7, 8, 11, 13, 16,
17, 23, 25, 27, 64, L3 (q) for q = 3, 4, 9, 162 , L4 (q)
for q = 3, 4, U3 (q) for q = 3, 4, U4 (q) for q = 3,
4, U5 (2), S4 (3), S4 (4), S6 (2), S6 (3), 2 B2 (8), O7 (3),
O8+ (2), O8− (2), G2 (q) for q = 3, 4, 2 F4 (2)′ , M11 , M12 ,
M22 , M23 , M24 , HS, J2 , F i23
An for n = 5, . . . , 14, L2 (q) for q = 7, 8, 11, 13, 16, 17,
23, 25, 27, 29, 49, 64, L3 (q) for q = 3, 4, 9, 162 , L4 (q)
for q = 3, 4, L6 (3), U3 (q) for q = 3, 4, U4 (3), U5 (2),
S4 (q) for q = 3, 4, 8, S6 (2), S6 (3), S8 (2), 2 B2 (8),
O7 (3), O8± (2), G2 (q) for q = 3, 4, 3 D4 (2), 2 F4 (2)′ ,
M11 , M12 , M22 , M23 , M24 , He, J2 , F i′24
An for n = 5, . . . , 10, L2 (q) for q = 7, 8, 13, 19, 25,
27, 31, 49, 64, L3 (q) for q = 3, 4, 5, 9, L4 (3), L5 (2),
U3 (q) for q = 3, 4, 5, 8, S4 (3), S4 (8),S6 (2), 2 B2 (8),
3
D4 (2), G2 (q) for q = 3, 4, 2 F4 (2)′ , J2 , T h
An for n = 5, . . . , 8, L2 (q) for q = 7, 8, 13, 25, 27, 29,
64, L3 (q) for q = 3, 4, U3 (q) for q = 3, 4, 5, J2 , Ru
Continued
5
6
S.H. ALAVI, A. DANESHKHAH, AND A. JAFARI
H
Ly
HN, HN : 2
O ′ N, O ′N : 2
B
M
Table 1 – Continued
S
An for n = 5, . . . , 9, A11 , L2 (q) for q = 7, 8, 11, 31,
32, L3 (q) for q = 4, 5, U3 (q) for q = 3, 5, S4 (3), M11 ,
M12 , M22 , J2 , McL, HS, Ly
An for n = 5, . . . , 10, L2 (q) for q = 7, 8, 11, 19, L3 (q)
for q = 4. 19, L4 (7), U3 (q) for q = 3, 5, 8, U4 (3),
S4 (3),O8+ (2), M11 , M12 , M22 , J1 , J2 , HS, HN
An for n = 5, . . . , 8, L2 (q) for q = 7, 8, 11, 16, 17, 19,
31, 32, L3 (q) for q = 4, 7, U3 (q) for q = 3, 8, S4 (3),
S6 (2), M11 , M12 , M22 , O ′ N
An for n = 5, . . . , 28, L2 (q) for q = 7, 8, 11, 13, 16,
17, 19, 23, 27, 31, 32, 47, 49, 64, 125, L3 (q) for q = 3,
4, 5, 9, 16, 25, L4 (q) for q = 3, 4, 5, L5 (2), L5 (4),
L6 (2), L6 (4), U3 (q) for q = 3, 4, 5, 8, U4 (q) for q = 2,
3, 4, 5, 8, U5 (2), U6 (2), S4 (q) for q = 4, 5, 7, 8, G2 (q)
±
±
for q = 3, 4, 5, O7 (3), O8± (2), O8+ (3), O10
(2), O12
(2),
2
′ 3
F4 (2) , D4 (2), M11 , M12 , M22 , M23 , M24 , J1 , J2 ,
J3 , HS, McL, Suz, F i22 , Co3 , Co2 , T h, B
An for n = 5, . . . , 36, L2 (q) for q = 7, 8, 11, 13, 16,
17, 19, 23, 25, 27, 29, 31, 32, 41, 47, 49, 59, 64, 71, 81,
169, 1024, L3 (q) for q = 3, 4, 5, 7, 9, 16, 19, 25, L4 (q)
for q = 3, 4, 5, 7, 9, L5 (q) for q = 2, 4, L6 (q), for q =
2, 3, 4, U3 (q) for q = 3, 4, 5, 8, 27, U4 (q) for q = 2, 3,
4, 5, 8, 9, U5 (q) for q = 2, 4, U6 (2) for q = 2, 4, S4 (q)
for q = 4, 5, 7, 8, 9, S6 (q) for q = 2, 3, 4, 5, S8 (2),
S10 (2), 2 B2 (8), 2 B2 (32), G2 (q) for q = 3, 4, 5, O7 (3),
±
±
±
O7 (5), O9 (3),O8± (2), O8± (3), O10
(2), O10
(3), O12
(2),
2
G2 (27), 2 F4 (2)′ , F4 (2), 3 D4 (2), M11 , M12 , M22 , M23 ,
M24 , J1 , J2 , J3 , HS, McL, Suz, F i22 , Co3 , Co2 , T h,
He, O ′N, Ru, M
4. Groups with socle M12
In this section, we prove Theorem 1.1 for almost simple group H whose socle is
H0 := M12 . By [11], Theorem 1.1 is proved when H = H0 = M12 . Therefore, we
only need to deal with the case where H := M12 : 2. For convenience, we mention
some properties of H and H0 some of which can be obtained in [7, pp. 31-33].
Lemma 4.1. Let H0 := M12 and H := M12 : 2. Then
(a) The Schur multiplier and the group of outer automorphisms of H0 are Z2 ;
(b) The degrees of irreducible characters of H are
45 = 32 · 5
66 = 2 · 3 · 11
120 = 23 · 3 · 5
22 = 2 · 11
54 = 2 · 33
99 = 32 · 11
144 = 24 · 32
32 = 25
55 = 5 · 11
110 = 2 · 5 · 11
176 = 24 · 11
1
(c) If K is a maximal subgroup of H0 whose index in H0 divides some degrees
χ(1) of H, then one of the following occurs:
GROUPS WITH CHARACTER DEGREES OF ALMOST SIMPLE MATHIEU GROUPS
7
(i) K ∼
= M11 and χ(1)/|H0 : K| divides 2 · 5 or 22 · 3;
(ii) K ∼
= M10 : 2 and χ(1)/|H0 : K| = 1;
(iii) K ∼
= L2 (11) and χ(1)/|H0 : K| = 1.
(d) If S is a finite nonabelian simple group whose irreducible character degrees
divide some degrees of H, then S is isomorphic to A5 , A6 , L2 (11), M11 or
M12 .
Proof. Parts (a) and (b) follows from [7, pp. 31-33] and part (d) follows from
Proposition 3.1 and Table 1. Part (c) is a straightforward calculation.
4.1. Proof of Theorem 1.1 for M12 : 2. As noted before, by [11], we may assume
that H := M12 : 2. We further assume that G is a finite group with cd(G) =
cd(M12 : 2). The proof of Theorem 1.1 follows from the following lemmas.
Lemma 4.2. G′ = G′′ .
Proof. Assume the contrary. Then there is a normal subgroup N of G, where N is
maximal such that G/N is a nonabelian solvable group. Now we apply Lemma 2.3
and we have one of the following cases:
(a) G/N is a r-group with r prime. In this case, G/N has an irreducible character ψ
of degree r b > 1, and so does G. Since M12 : 2 has an irreducible character of degree
32, we conclude that r = 2. Let now χ ∈ Irr(G) with χ(1) = 99. Then Lemma 2.1(a)
implies that χN ∈ Irr(N), and so by Lemma 2.1(b), G has an irreducible character
of degree 99ψ(1), which is a contradiction.
(b) G/N is a Frobenius group with kernel F/N. Then |G : F | ∈ cd(G) divides
r a − 1, where |F/N| = r a . Let |G : F | ∈ {2 · 11, 5 · 11} and χ(1) = 24 · 32 . Then
Lemma 2.2(b) implies that r a divides χ2 (1) = 28 · 34 , and it is impossible as |G : F |
does not divide r a − 1, for every divisor r a of 28 · 34 . Let now |G : F | 6∈ {2 · 11, 5 · 11}.
Then no proper multiple of |G : F | is in cd(G). If r = 2, then by Lemma 2.2(a),
both 32 · 11 and 32 · 5 must divide |G : F |, which is a contradiction. If r = 3, then
by Lemma 2.2(a), |G : F | is divisible by 25 and 24 · 11, which is a contradiction.
Similarly, if r 6= 2, 3, then 25 and 24 · 32 divide |G : F |, which is a contradiction.
Lemma 4.3. Let G′ /M be a chief factor of G. Then G′ /M ∼
= M12 .
Proof. Suppose G′ /M ∼
= S k , where S is a nonabelian simple group for some positive
integer k. Since S is a finite nonabelian simple group whose irreducible character
degrees divide some degrees of M12 : 2, by Lemma 4.1(d), S is isomorphic to one of
the groups A5 , A6 , M11 , M12 or L2 (11). If S is isomorphic to one of the groups A5 ,
A6 , M11 , M12 , L2 (11), then k = 1 as G has no degree divisible by 52 . Assume that
S is isomorphic to A5 or A6 , then G′ /M has a character ψ of degree 5. If χ is an
irreducible constituent of ψ G/M , then χ(1) = tψ(1) = 5t, where t divides | Out(S)|.
Consequently, G has a character of degree at most 20, which is a contradiction.
Similarly, in the case where S is isomorphic to M11 or L2 (11), the factor group G/M
has a character of degree 10t with t = 1, 2, and this implies that G has a character
of degree at most 20, which is a contradiction. Therefore G′ /M is isomorphic to
M12 .
Lemma 4.4. Let θ ∈ Irr(M) with θ(1) = 1. Then IG′ (θ) = G′ and M = M ′ .
P
Proof. Suppose I = IG′ (θ) < G′ . By Lemma 2.2, we have θI = ki=1 φi where φi ∈
Irr(I) for i = 1, 2, ..., k. Let U/M be a maximal subgroup of G′ /M ∼
= M12 containing
8
S.H. ALAVI, A. DANESHKHAH, AND A. JAFARI
I/M and set t := |U : I|. It follows from Lemma 2.2(a) that φi (1)|G′ : I| ∈ cd(G′ ),
and so tφi (1)|G′ : U| divides some degrees of G. Then |G′ : U| must divide some
character degrees of G, and hence by Lemma 4.1(c) one of the following holds.
(i) Suppose U/M ∼
= M11 .
= M11 . Then tφi (1) divide 2 · 5 or 22 · 3. If t = 1, then I/M ∼
Since M11 has trivial Schur multiplier, it follows that θ extends to θ0 ∈ Irr(I), and so
′
by Lemma 2.2(b) (θ0 τ )G ∈ Irr(G′ ), for all τ ∈ Irr(I/M). For τ (1) = 55 ∈ cd(M11 ),
it turns out that 12 · 55 · θ0 (1) divide some degrees of G, which is a contradiction.
Therefore, t 6= 1, and hence the index of a maximal subgroup of U/M ∼
= M11
2
containing I/M must divide 2 · 5 or 2 · 3. This implies that tφi (1) divides 22 · 3
and I/M ∼
= L2 (11). In particular, φi (1) = 1. Thus θ extends to a φi , and so
by Lemma 2.2(b), 144τ (1) ∈ cd(G′ ), for all τ ∈ Irr(I/M). This leads us to a
contradiction by taking τ (1) = 10 ∈ cd(L2 (11)).
(ii) Suppose U/M ∼
= M10 : 2. In this case t = 1, or equivalently, I/M = U/M ∼
=
M10 : 2. Moreover, φi (1) = 1, for all i. Then θ extends to φi ∈ Irr(I), and so
by Lemma 2.2(b), 66τ (1) divides some degrees of G, for τ (1) = 10, which is a
contradiction.
(iii) Suppose U/M ∼
= L2 (11), and
= L2 (11) and t = φi (1) = 1, for all i. Then I/M ∼
′
so θ extends to φi ∈ Irr(I). Thus 144τ (1) ∈ Irr(G ), for all τ ∈ Irr(I/M). This is
impossible by taking τ (1) = 10.
Therefore, IG′ (θ) = G′ . By Lemma 2.5, we have that |M/M ′ | divides the order
of Schur multiplier of G′ /M ∼
= M12 which is 2. If |M/M ′ | = 2, then G′ /M ′ is
isomorphic to 2 · M12 which has a character of degree 32 [7, p. 33]. Therefore M12
must have a degree divisible by 32, which is a contradiction. Hence |M/M ′ | = 1, or
equivalently, M = M ′ .
Lemma 4.5. The subgroup M is trivial, and hence G′ ∼
= M12 .
Proof. By Lemmas 4.3 and 4.4, we have that G′ /M ∼
= M12 and M = M ′ . Suppose
that M is nonabelian, and let N 6 M be a normal subgroup of G′ such that M/N
is a chief factor of G′ . Then M/N ∼
= S k , for some nonabelian simple group S. It
follows from Lemma 2.4 that S possesses a nontrivial irreducible character ϕ such
that ϕk ∈ Irr(M/N) extends to G′ /N. By Lemma 2.1(b), we must have ϕ(1)k τ (1) ∈
cd(G′ /N) ⊆ cd(G′ ), for all τ ∈ Irr(G′ /M). Now we can choose τ ∈ G′ /M such that
τ (1) is the largest degree of M12 , and since ϕ is nontrivial, ϕ(1)k τ (1) divides no
degree of G, which is a contradiction. Therefore, M is abelian, and since M = M ′ ,
we conclude that M = 1.
Lemma 4.6. There exists an abelian group A such that G/A ∼
= M12 : 2.
Proof. Set A := CG (G′ ). Since G′ ∩ A = 1 and G′ A ∼
= G′ × A, it follows that
G′ ∼
= G′ A/A E G/A 6 Aut(G′ ). By Lemma 4.5, we have G′ ∼
= M12 , and so we
conclude that G/A is isomorphic to M12 or M12 : 2. In the case where G/A is
isomorphic to M12 , we must have G ∼
= A × M12 . This is impossible as 32 ∈ cd(G)
but M12 has no character of degree 32. Therefore, G/A is isomorphic to M12 : 2.
5. Groups with socle M22
In this section, we prove Theorem 1.1 for almost simple group H whose socle is
H0 := M22 . Note that Theorem 1.1 is proved for H = H0 = M22 , see [11]. Therefore,
we only need to focus on case where H := M22 : 2. For convenience, we mention
some properties of H and H0 some of which can be obtained from [7, pp. 39-41].
GROUPS WITH CHARACTER DEGREES OF ALMOST SIMPLE MATHIEU GROUPS
9
Lemma 5.1. Let H0 := M22 and H := M22 : 2. Then
(a) The Schur multiplier H0 is Z12 and the group of outer automorphisms of H0
is Z2 ;
(b) The degrees of irreducible characters of H are
1
55 = 5 · 11
210 = 2 · 3 · 5 · 7
385 = 5 · 7 · 11
21 = 3 · 7
99 = 32 · 11
231 = 3 · 7 · 11
560 = 24 · 5 · 7
45 = 32 · 5
154 = 2 · 7 · 11
(c) If K is a maximal subgroup of H0 whose index in H0 divides some degrees
χ(1) of H, then one of the following occurs:
(i) K ∼
= L3 (4) and χ(1)/|H0 : K| divides 7;
(ii) K ∼
= 24 : S5 and χ(1)/|H0 : K| = 1;
(iii) K ∼
= 24 : A6 and χ(1)/|H0 : K| divides 2, 3 or 5.
(d) If S is a finite nonabelian simple group whose irreducible character degrees
divide some degrees of H, then S is isomorphic to A5 , A6 , A7 , L2 (7), L2 (8)
or M22 .
Proof. Parts (a)-(b) follows from [7, pp. 31-33] part (d) follows from Proposition 3.1
and Table 1. Part (c) is a straightforward calculation.
5.1. Proof of Theorem 1.1 for M22 : 2. Theorem 1.1 is true for the Mathieu
group M22 by [11]. It remains to assume that H := M22 : 2. In what follows assume
that G is a finite group with cd(G) = cd(M22 : 2). The proof follows from the
following lemmas.
Lemma 5.2. G′ = G′′ .
Proof. Assume the contrary. Then there is a normal subgroup N of G where N is a
maximal such that G/N is a nonabelian solvable group. We now apply Lemma 2.3,
and so we have the following two cases:
(a) Suppose that G/N is a r-group with r prime. Then it has an irreducible character
ψ of degree r b > 1. It is impossible as the group M22 : 2 does not have a irreducible
character of prime power degree.
(b) G/N is a Frobenius group with kernel F/N. Then |G : F | ∈ cd(G) divides r a −1,
where |F/N| = r a . Let |G : F | ∈ {3·7, 5·11} and χ(1) = 2·7·11. Then Lemma 2.2(b)
implies that r a divides χ2 (1) = 22 · 72 · 112 , and it is impossible as |G : F | does not
divide r a − 1, for every divisor r a of 22 · 72 · 112 . Let now |G : F | 6∈ {3 · 7, 5 · 11}.
Then no proper multiple of |G : F | is in cd(G). If r = 3, then by Lemma 2.2(a),
both 5 · 7 · 11 and 24 · 5 · 7 must divide |G : F |, which is a contradiction. If r = 5,
then by Lemma 2.2(a), both 3 · 7 · 11 and 2 · 7 · 11 must divide |G : F |, which is a
contradiction. If r = 11, then by Lemma 2.2(a), |G : F | is divisible by 2 · 3 · 5 · 7
and 24 · 5 · 7, which is a contradiction. Similarly, if r 6= 3, 5, and 11, then 32 · 11 and
5 · 11 divide |G : F |, which is impossible. Therefore, G′ = G′′ .
Lemma 5.3. Let G′ /M be a chief factor of G. Then G′ /M ∼
= M22 .
Proof. Suppose G′ /M ∼
= S k , where S is a nonabelian simple group and for some
positive integer k. Since S is a finite nonabelian simple group whose irreducible
character degrees divide some degrees of M22 : 2, by Lemma 5.1(d), the group S
is isomorphic to A5 , A6 , A7 , L2 (7), L2 (8) or M22 . Observe that G has no degree
10
S.H. ALAVI, A. DANESHKHAH, AND A. JAFARI
Table 2. The triples (S, ψ, d) in Lemma 5.3
S
| Out(S)| ψ(1) d
A5
2
5
10
A6
4
5
20
A7 , L2 (7)
2
6
12
L2 (8)
3
8
24
divisible by 25 and 49. This implies that k = 1 in each case. Assume that S is
isomorphic to one of the simple groups as in the first column of Table 2. Then by
[7], G′ /M has a character ψ of degree as in the third column of the same Table 2. If χ
is an irreducible constituent of ψ G/M , then χ(1) = tψ(1), where t divides | Out(S)|.
Consequently, G has a character of degree at most d as in the forth column of
Table 2, which is a contradiction. For example, if S is isomorphic to A7 or L2 (7),
then G′ /M has a character ψ of degree 6, then χ(1) = tψ(1) = 6t, where t divides
| Out(S)|, and so G has a character of degree at most 12, which is a contradiction.
Therefore G′ /M ∼
= M22 .
Lemma 5.4. If θ ∈ Irr(M), then IG′ (θ) = G′ and M = M ′ .
P
Proof. Suppose I := IG′ (θ) < G′ . By Lemma 2.2 we have θI = ki=1 φi where φi ∈
Irr(I) for i = 1, 2, ..., k. Let U/M be a maximal subgroup of G′ /M ∼
= M22 containing
I/M and set t := |U : I|. It follows from Lemma 2.2(a) that φi (1)|G′ : I| ∈ cd(G′ ),
and so tφi (1)|G′ : U| divides some degrees of G. Then |G′ : U| must divide some
character degrees of G, and hence by Lemma 5.1 one of the following holds:
(i) Suppose U/M ∼
= L3 (4) does
= L3 (4). Then, for each i, tφi (1) divide 7. As U/M ∼
∼
not have any subgroup of index 7, by [7, p. 23], so t = 1 and I/M = U/M ∼
= L3 (4)
and φi (1) divide 7. If φi (1) = 1, then θ extend to φi , and so by Lemma 2.2(b),
′
(φi τ )G ∈ Irr(G′ ), for all τ ∈ Irr(I/M). If τ (1) = 64 ∈ cd(L3 (4)), then 22τ (1) = 27 ·11
divides some degrees of G, which is a contradiction. Hence φi (1) = 7, for all i. Then
φiM = ei θ, where ei 6= 1 is the degree of a projective representation of I/M ∼
= L3 (4),
and it is impossible by [7, p. 24].
(ii) Suppose U/M ∼
= 24 : S5 and φi (1) = 1, for all i. Thus
= 24 : S5 . Then I/M ∼
θ extends to φi in I. It follows from Lemma 2.2(b) that τ (1)|G′ : I| divides some
character degrees of G, for all τ ∈ I/M. This is impossible by taking τ (1) = 4.
(iii) Suppose U/M ∼
= 24 : A6 . In this case, tφi (1) divides 2, 3 or 5. It follows from
[6] that U/M has no maximal subgroup of index 2, 3 and 5, and this implies that
I = U. Therefore, I/M ∼
= 24 : A6 , that is to say, I/M has an abelian subgroup
A/M of order 24 such that I/A ∼
= A6 . P
Let now λ ∈ Irr(A|θ), and write λI = fi µi . Since AEI, the degree µi (1) divides
2, 3 or 5, for all i. Since the index of a maximal subgroup of I/A ∼
= A6 is at least
6, λ is I-invariant, and so µiA = fi λ, for all i. If fi = 1 for some i, then λ extends
to λ0 ∈ Irr(I), and so by Lemma 2.2(b), λ0 τ is an irreducible character of λI , for all
τ ∈ Irr(I/A), and so λ0 (1)τ (1) = τ (1) divides 2, 3, or 5. This is impossible as we
could take τ (1) = 8 ∈ cd(A6 ). Therefore, fi > 1, for all i. Moreover, we know from
Lemma 2.2(c) that each fi is the degree of a nontrivial proper irreducible projective
representation of A6 , by [7, p. 5], we observe that fi ∈ {3, 5}. This shows that
µ(1)/λ(1) is odd, for all µ ∈ Irr(I|A), and so by Lemma 2.6, the group I/A ∼
= A6 is
solvable, which is a contradiction.
GROUPS WITH CHARACTER DEGREES OF ALMOST SIMPLE MATHIEU GROUPS
11
Table 3. Some character degrees of G′ /M ′ in Lemma 5.4
G′ /M ′ 2 · M22 3 · M22 4 · M22 6 · M22 12 · M22
Degree
440
384
440
384
384
This show IG′ (θ) = G′ . By Lemma 2.5, we have that |M/M ′ | divides the order
6 1, then G has an
of Schur multiplier of G′ /M ∼
= M22 which is 12. If |M/M ′ | =
irreducible character of degree divisible by one the degrees in the second row of
Table 3, which is a contradiction. Therefore, M = M ′ .
Lemma 5.5. The subgroup M is trivial, and hence G′ ∼
= M22 .
Proof. It follows from Lemmas 5.3 and 5.4 that G′ /M ∼
= M22 and M = M ′ . Assume
that M is nonabelian, and let N 6 M be a normal subgroup of G′ such that M/N
is a chief factor of G′ . Then M/N ∼
= S k for some nonabelian simple group S. By
Lemma 2.4, S has a nontrivial irreducible character ϕ such that ϕk ∈ Irr(M/N)
extends to G′ /N. Now Lemma 2.1(b) implies that ϕ(1)k τ (1) ∈ cd(G′ /N) ⊆ cd(G′ ),
for all τ ∈ Irr(G′ /M). As ϕ(1) > 1, if we choose τ ∈ G′ /M such that τ (1) is the
largest degree of M22 , then ϕ(1)k τ (1) divides no degree of G, which is a contradiction.
Therefore, M is abelian, and hence we are done.
Lemma 5.6. There exists an abelian group A such that G/A ∼
= M22 : 2.
Proof. Set A := CG (G′ ). Since G′ ∩ A = 1 and G′ A ∼
= G′ × A, it follows that
G′ ∼
= M22 , we conclude that G/A is isomorphic
= G′ A/AEG/A 6 Aut(G′ ). Since G′ ∼
to M22 or M22 : 2. In the case where G/A is isomorphic to M22 , we conclude that
G∼
= A × M22 . This is impossible as 560 ∈ cd(G) but M22 has no character of degree
560. Therefore, G/A is isomorphic to M22 : 2.
References
[1] S. H. Alavi, A. Daneshkah, H. P. Tong-Viet, and T. P. Wakefield. Huppert’s conjecture for
F i23 . Rend. Semin. Mat. Univ. Padova, 126:201–211, 2011. 2
[2] S. H. Alavi, A. Daneshkhah, H. P. Tong-Viet, and T. P. Wakefield. On Huppert’s conjecture
for the Conway and Fischer families of sporadic simple groups. J. Aust. Math. Soc., 94(3):289–
303, 2013. 2
[3] C. Bessenrodt, H. N. Nguyen, J. B. Olsson, and H. P. Tong-Viet. Complex group algebras of
the double covers of the symmetric and alternating groups. Algebra Number Theory, 9(3):601–
628, 2015. 1
[4] M. Bianchi, D. Chillag, M. L. Lewis, and E. Pacifici. Character degree graphs that are complete
graphs. Proc. Amer. Math. Soc., 135(3):671–676 (electronic), 2007. 3
[5] R. Brauer. Representations of finite groups. In Lectures on Modern Mathematics, Vol. I, pages
133–175. Wiley, New York, 1963. 1
[6] T. Connor and D. Leemans. An Atlas of subgroup lattices of finite almost simple groups.
ArXiv e-prints, June 2013. 10
[7] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker, and R. A. Wilson. Atlas of finite
groups. Oxford University Press, Eynsham, 1985. Maximal subgroups and ordinary characters
for simple groups, With computational assistance from J. G. Thackray. 4, 6, 7, 8, 9, 10
[8] The GAP Group. GAP – Groups, Algorithms, and Programming, Version 4.7.8, 2015. 4
[9] B. Huppert. Character theory of finite groups, volume 25 of de Gruyter Expositions in Mathematics. Walter de Gruyter & Co., Berlin, 1998. 2, 3
[10] B. Huppert. Some simple groups which are determined by the set of their character degrees.
I. Illinois J. Math., 44(4):828–842, 2000. 1, 2, 3
12
S.H. ALAVI, A. DANESHKHAH, AND A. JAFARI
[11] B. Huppert. Some simple groups which are determined by the set of their character degrees i.
Preprint, 2000. 2, 6, 7, 8, 9
[12] I. M. Isaacs. Character theory of finite groups. AMS Chelsea Publishing, Providence, RI, 2006.
Corrected reprint of the 1976 original [Academic Press, New York; MR0460423]. 2
[13] A. Moretó. An answer to a question of Isaacs on character degree graphs. Adv. Math.,
201(1):90–101, 2006. 3
[14] G. Navarro. The set of character degrees of a finite group does not determine its solvability.
Proc. Amer. Math. Soc., 143(3):989–990, 2015. 1
[15] G. Navarro and N. Rizo. Nilpotent and perfect groups with the same set of character degrees.
J. Algebra Appl., 13(8):1450061, 3, 2014. 1
[16] H. N. Nguyen, H. P. Tong-Viet, and T. P. Wakefield. Projective special linear groups PSL4 (q)
are determined by the set of their character degrees. J. Algebra Appl., 11(6):1250108, 26, 2012.
2
[17] H. P. Tong-Viet. Alternating and sporadic simple groups are determined by their character
degrees. Algebr. Represent. Theory, 15(2):379–389, 2012. 2
[18] H. P. Tong-Viet and T. P. Wakefield. On Huppert’s conjecture for the Monster and Baby
Monster. Monatsh. Math., 167(3-4):589–600, 2012. 2, 3
[19] T. P. Wakefield. Verifying Huppert’s conjecture for PSL3 (q) and PSU3 (q 2 ). Comm. Algebra,
37(8):2887–2906, 2009. 2
[20] T. P. Wakefield. Verifying Huppert’s conjecture for 2 G2 (q 2 ). Algebr. Represent. Theory,
14(4):609–623, 2011. 2
[21] A. V. Zavarnitsine. Finite simple groups with narrow prime spectrum. ArXiv e-prints, Oct.
2008. 4
S.H. Alavi, Department of Mathematics, Faculty of Science, Bu-Ali Sina University, Hamedan, Iran
E-mail address: [email protected] [email protected] (Gmail is preferred)
A. Daneshkhah, Department of Mathematics, Faculty of Science, Bu-Ali Sina
University, Hamedan, Iran
E-mail address: [email protected] [email protected] (Gmail is preferred)
A. Jafari, Department of Mathematics, Faculty of Science, Bu-Ali Sina University, Hamedan, Iran
E-mail address: [email protected]
| 4math.GR
|
arXiv:1704.05596v2 [cs.LG] 23 Nov 2017
Insensitive Stochastic Gradient Twin Support Vector
Machines for Large Scale Problems
Zhen Wanga , Yuan-Hai Shaob,∗, Lan Baia , Li-Ming Liuc , Nai-Yang Dengd
a
School of Mathematical Sciences, Inner Mongolia University, Hohhot, 010021,
P.R.China
b
School of Economics and Management, Hainan University, Haikou, 570228, P.R. China
c
School of Statistics, Capital University of Economics and Business, Beijing, 100070,
P.R.China
d
College of Science China Agricultural University, Beijing, 100083, P.R.China
Abstract
Stochastic gradient descent algorithm has been successfully applied on support vector machines (called PEGASOS) for many classification problems.
In this paper, stochastic gradient descent algorithm is investigated to twin
support vector machines for classification. Compared with PEGASOS, the
proposed stochastic gradient twin support vector machines (SGTSVM) is
insensitive on stochastic sampling for stochastic gradient descent algorithm.
In theory, we prove the convergence of SGTSVM instead of almost sure convergence of PEGASOS. For uniformly sampling, the approximation between
SGTSVM and twin support vector machines is also given, while PEGASOS
only has an opportunity to obtain an approximation of support vector machines. In addition, the nonlinear SGTSVM is derived directly from its linear
case. Experimental results on both artificial datasets and large scale problems show the stable performance of SGTSVM with a fast learning speed.
Keywords: Classification, support vector machines, twin support vector
machines, stochastic gradient descent, large scale problem.
∗
Corresponding author. Tel./Fax:(+86)0571-87313551.
Email address: [email protected] (Yuan-Hai Shao )
Preprint submitted to Elsevier
November 27, 2017
1. Introduction
Support vector machines (SVM), being powerful tool for classification
[7, 20, 42], have already outperformed most other classifiers in a wide variety of applications [23, 17, 11]. Different from SVM with a pair of parallel hyperplanes, twin support vector machines (TWSVM) [12, 35] with a
pair of nonparallel hyperplanes has been proposed and developed, e.g., twin
bounded support vector machines (TBSVM) [35], twin parametric margin
support vector machines (TPMSVM) [24], and weighted Lagrangian twin
support vector machines (WLTSVM) [33]. These classifiers have been widely
applied in many practical problems [34, 39, 19, 38, 6, 36, 29, 28, 26, 27]. In
the training stage, SVM solves a quadratic programming problem (QPP),
whereas TWSVM solve two smaller QPPs by traditional solver such as interior method [20, 1, 12]. However, neither SVM nor TWSVM based on these
solvers can deal with the large scale problem, especially millions of samples.
In order to deal with the large scale problem, many improvements were
proposed, e.g., for SVM, sequential minimal optimization, coordinate decent method, trust region Newton, and stochastic gradient descent algorithm (SGD) in [25, 13, 5, 9, 32], and for TWSVM, successive overrelaxation
technique, Newton-Armijo algorithm, and dual coordinate decent method in
[35, 39, 37]. The stochastic gradient descent algorithm for SVM (PEGASOS)
[16, 43, 32, 41] attracts a great attention, because it partitions the large scale
problem into a series of subproblems by stochastic sampling with a suitable
size. It has been proved that PEGASOS is almost sure convergent, and thus
is able to find an approximation of the desired solution with high probability [2, 43, 32]. The existing experiments confirm the effectiveness of these
algorithms with an amazing learning speed.
However, for large scale problem, the stochastic sampling in SGD may
bring some difficulties to SVM due to only a small subset of the dataset is
selected for training. In fact, if the subset is not suitable, PEGASOS would be
weak. It is well known that in SVM the support vectors (SVs), a small subset
of the dataset, decides the final classifier. If the stochastic sampling does not
include the SVs sufficiently, the classifier would lose some generalizations.
Figure 1 is a toy example for PEGASOS. There are two classes in this figure,
where the positive and negative classes respectively include 6 and 4 samples,
and the circle is one of the potential SVs. The solid blue line is the separating
line obtained by PEGASOS with three different sampling: (i) strengthening
the circle sample; (ii) infrequently using the circle sample; (iii) ignoring the
2
5
4
5
Class +1
Class -1
w T x=0
4
w T x=+1
w T x=-1
5
Class +1
Class -1
w T x=0
4
w T x=+1
w T x=-1
3
3
2
2
2
1
1
1
0
-4
0
-4
-2
-1
0
1
2
3
4
-3
w T x=0
w T x=+1
w T x=-1
3
-3
Class +1
Class -1
-2
-1
(a)
0
1
2
3
4
0
-4
-3
-2
-1
(b)
0
1
2
3
4
(c)
Figure 1: PEGASOS on 10 samples from two classes. (i) Training includes all of the 10
samples with 11 iterations, and the circle sample is used twice; (ii) Training includes all
of the 10 samples with 28 iterations, and the circle sample is used once; (iii) Training
includes 9 samples with 27 iterations, where the circle sample is excluded.
5
5
Class +1
Class -1
f(x)=0
f 1 (x)=0
4
5
Class +1
Class -1
f(x)=0
f 1 (x)=0
4
f 2 (x)=0
f 2 (x)=0
f 2 (x)=0
3
3
3
2
2
2
1
1
1
0
-4
0
-4
-3
-2
-1
0
(a)
1
2
3
Class +1
Class -1
f(x)=0
f 1 (x)=0
4
4
-3
-2
-1
0
(b)
1
2
3
4
0
-4
-3
-2
-1
0
1
2
3
4
(c)
Figure 2: SGTSVM on 10 samples from two classes. (i) Training includes all of the 10
samples with 7 iterations, and the circle sample is used twice; (ii) Training includes all
of the 10 samples with 16 iterations, and the circle sample is used once; (iii) Training
includes 9 samples with 15 iterations, where the circle sample is excluded.
3
circle sample. Figure 1 shows that the circle sample plays an important role
on the separating line, and infrequently using or ignoring this sample would
lead to misclassify.
Compared with SVM, it is significant that TWSVM is more stable for
sampling and does not strongly depend on some special samples such as the
SVs [12, 35], which indicates SGD is more suitable for TWSVM. Therefore,
in this paper, we propose a stochastic gradient twin support vector machines
(SGTSVM). Different from PEGASOS, our method selects two samples from
different classes randomly in each iteration to construct a pair of nonparallel
hyperplanes. Due to TWSVM fits all of the training samples, our method is
stable for the stochastic sampling and thus gains well generalizations. Moreover, the characteristics inherited from TWSVM result in that our SGTSVM
suits for many cases, e.g., “cross planes” dataset [21] and preferential classification [12]. As the above toy example, Figure 2 shows the corresponding
results by SGTSVM. Comparing Figure 2 with Figure 1, it is clear that
SGTSVM performs better than PEGASOS.
The main contributions of this paper includes:
(i) a SGD-based TWSVM (SGTSVM) is proposed, and it is very easy to be
extended to other TWSVM-type classifiers;
(ii) we prove that the proposed SGTSVM is convergent, instead of almost
sure convergence in PEGASOS;
(iii) for the uniformly sampling, it is proved that the original objective of
the solution to SGTSVM is bounded by the optimum of TWSVM, which
indicates the solution to SGTSVM is an approximation of the optimal solution to TWSVM, while PEGASOS only has an opportunity to obtain an
approximation of the optimal solution to SVM (more information please see
Corollaries 1 and 2 in [32]);
(iv) the nonlinear case of SGTSVM is obtained directly based on its original
problem;
(v) each iteration of SGTSVM includes no more than 8n + 4 multiplications without additional storage, so it is the fastest one than other proposed
TWSVM-type classifiers.
The rest of this paper is organized as follow. Section 2 briefly reviews
SVM, PEGASOS, and TWSVM. Our linear and nonlinear SGTSVMs together with the theoretical analysis are elaborated in Section 3. Experiments
are arranged in Section 4. Finally, we give the conclusions.
4
2. Related Works
Consider a binary classification problem in the n-dimensional real space
Rn . The set of training samples is represented by X ∈ Rn×m , where x ∈ Rn is
the sample with the label y ∈ {+1, −1}. We further organize the m1 samples
of Class +1 into a matrix X1 ∈ Rn×m1 and the m2 samples of Class −1 into
a matrix X2 ∈ Rn×m2 . Below, we give a brief outlines of some related works.
2.1. SVM
Support vector machines (SVM) [7, 3] searches for a separating hyperplane
w ⊤ x + b = 0,
(1)
where w ∈ Rn and b ∈ R. By introducing the regularization term, the primal
problem of SVM can be expressed as a QPP as follow
1
||w||2
2
min
w,b
+
c ⊤
e ξ
m
D(X ⊤ w + b) ≥ e − ξ, ξ ≥ 0,
s.t.
(2)
where || · || denotes the L2 norm, c > 0 is a parameter with some quantitative
meanings [3], e is a vector of ones with an appropriate dimension, ξ ∈ Rm is
the slack vector, and D = diag(y1 , . . . , ym ). Note that the minimization of
the regularization term kwk2 is equivalent to maximize the margin between
two parallel supporting hyperplanes w ⊤ x + b = ±1. And the structural risk
minimization principle is implemented in this problem [7].
2.2. PEGASOS
PEGASOS [43, 32] considers a strongly convex problem by modifying (2)
as follow
min 12 ||w||2 + mc e⊤ ξ
w
(3)
s.t. DX ⊤ w ≥ e − ξ, ξ ≥ 0,
and recasts the above problem to
min
w
1
||w||2
2
+
c ⊤
e (e
m
− DX ⊤ w)+ ,
where (·)+ replaces negative components of a vector by zeros.
5
(4)
In the tth iteration (t ≥ 1), PEGASOS constructs a temporary function,
which is defined by a random sample xt ∈ X as
gt (w) = 21 ||w||2 + c(1 − yt w ⊤ xt )+ .
(5)
Then, starting with an initial w1 , PEGASOS iteratively updates wt+1 =
wt − ηt ∇wt gt (w) for t ≥ 1, where ηt = 1/t is the step size and ∇wt gt (w) is
the sub-gradient of gt (w) at wt ,
∇wt gt (w) = wt − cyt xt sign(1 − yt wt⊤ xt )+ .
(6)
When some terminate conditions are satisfied, the last wt is outputted as w.
And a new sample x can be predicted by
y = sign(w ⊤ x).
(7)
It has been proved that the average solution w̄ =
1
T
T
P
wt is bounded
t=1
by the optimal solution w ∗ to (4) with o(1), and thus PEGASOS has with
a probability of at least 1/2 to find a good approximation of w ∗ [32]. The
authors of [32] also pointed out that wT is often used instead of w̄ in practice.
The sample xt which is selected randomly can be replaced with a small subset
belonging to the whole dataset, and the subset only including a sample is
often used in practice [43, 32, 41]. In order to extend the generalization ability
of PEGASOS, the bias term b in SVM can be appended to PEGASOS by
replacing g(wt ) of (5) with
g(wt , b) = 12 ||wt ||2 + C(1 − yt (wt⊤ xt + b))+ .
(8)
However, this modification would lead to the function not to be strongly
convex and thus yield a slow convergence rate [32].
2.3. TWSVM
TWSVM [12, 35] seeks a pair of nonparallel hyperplanes in Rn which can
be expressed as
w1⊤ x + b1 = 0 and w2⊤ x + b2 = 0,
(9)
such that each hyperplane is close to samples of one class and has a certain
distance from the other class. To find the pair of nonparallel hyperplanes, it
is required to get the solutions to the primal problems
w1 ,b1
min
1
(||w1 ||2
2
s.t.
X2⊤ w1 + b1 − ξ1 ≤ −e, ξ1 ≥ 0,
+ b21 ) +
c1
kX1⊤ w1
2m1
6
+ b1 k2 +
c2 ⊤
e ξ1
m2
(10)
and
min
w2 ,b2
s.t.
c3
1
(||w2 ||2 + b22 ) + 2m
kX2⊤ w2 + b2 k2
2
2
X1⊤ w2 + b2 + ξ2 ≥ e, ξ2 ≥ 0,
+
c4 ⊤
e ξ2
m1
(11)
where c1 , c2 , c3 , and c4 are positive parameters, ξ1 ∈ Rm2 and ξ2 ∈ Rm1 are
slack vectors. Their geometric meaning is clear. For example, for (10), its
objective function makes the samples of Class +1 proximal to the hyperplane
w1⊤ x + b1 = 0 together with the regularization term, while the constraints
make each sample of Class −1 has a distance more than 1/||w1|| away from
the hyperplane w1⊤ x + b1 = −1.
Once the solutions (w1 , b1 ) and (w2 , b2 ) to the problems (10) and (11) are
respectively obtained, a new point x ∈ Rn is assigned to which class depends
on the distance to the two hyperplanes in (9), i.e.,
y = arg min
i
|wi⊤ x+bi |
,
kwi k
(12)
where | · | is the absolute value.
3. SGTSVM
In this section, we elaborate our SGTSVM and give its convergence analysis together with the boundedness.
3.1. Linear Formation
Following the notations in Section 2, we recast the QPPs (10) and (11)
in TWSVM to unconstrained problems
min
w1 ,b1
1
(||w1 ||2
2
+ b21 ) +
c1
||X1⊤ w1
2m1
+ b1 ||2 +
c2 ⊤
e (e
m2
+ X2⊤ w1 + b1 )+ ,
(13)
1
(||w2||2
2
+ b22 ) +
c3
||X2⊤ w2
2m2
+ b2 ||2 +
c4 ⊤
e (e
m1
− X1⊤ w2 − b2 )+ ,
(14)
and
min
w2 ,b2
respectively.
In order to solve the above two problems, we construct a series of strictly
convex functions f1,t (w1 , b1 ) and f2,t (w2 , b2 ) with t ≥ 1 as
f1,t = 21 (||w1||2 + b21 ) +
c1
||w1⊤ xt
2
+ b1 ||2 + c2 (1 + w1⊤ x̂t + b1 )+ ,
7
(15)
and
f2,t = 21 (||w2 ||2 + b22 ) +
c3
||w2⊤ x̂t
2
+ b2 ||2 + c4 (1 − w2⊤ xt − b2 )+ ,
(16)
where xt and x̂t are selected randomly from X1 and X2 , respectively.
The sub-gradients of the above functions at (w1,t , b1,t ) and (w2,t , b2,t ) can
be obtained as
⊤
⊤
∇w1,t f1,t = w1,t + c1 (w1,t
xt + b1,t )xt + c2 x̂t sign(1 + w1,t
x̂t + b1,t )+ ,
⊤
⊤
∇b1,t f1,t = b1,t + c1 (w1,t xt + b1,t ) + c2 sign(1 + w1,t x̂t + b1,t )+ ,
(17)
and
⊤
⊤
xt − b2,t )+ ,
x̂t + b2,t )x̂t − c4 xt sign(1 − w2,t
∇w2,t f2,t = w2,t + c3 (w2,t
⊤
⊤
∇b2,t f2,t = b2,t + c3 (w2,t x̂t + b2,t ) − c4 sign(1 − w2,t xt − b1,t )+ ,
(18)
respectively.
Our SGTSVM starts from the initial (w1,1 , b1,1 ) and (w2,t , b2,t ). Then, for
t ≥ 1, the updates are given by
w1,t+1 = w1,t − ηt ∇w1,t f1,t ,
b1,t+1 = b1,t − ηt ∇b1,t f1,t ,
w2,t+1 = w2,t − ηt ∇w2,t f2,t ,
b2,t+1 = b2,t − ηt ∇b2,t f2,t ,
(19)
where ηt is the step size and typically is set to 1/t. If the terminated condition
is satisfied, (w1,t , b1,t ) is assigned to (w1 , b1 ), and (w2,t , b2,t ) is assigned to
(w2 , b2 ). Then, a new sample x ∈ Rn can be predicted by (12).
The above procedures are summarized in Algorithm 1.
3.2. Nonlinear Formation
Now, we extend our SGTSVM to nonlinear case by the kernel trick [21,
12, 35, 31, 15, 18]. Suppose K(·, ·) is the predefined kernel function, then the
nonparallel hyperplanes can be expressed as
K(x, X)⊤ w1 + b1 = 0 and K(x, X)⊤ w2 + b2 = 0.
(20)
The counterparts of (13) and (14) can be formulated as
min
w1 ,b1
1
(||w1 ||2
2
+ b21 ) +
c1
||K(X1 , X)⊤ w1
2m1
+ b1 ||2 +
c2 ⊤
e (e
m2
+ K(X2 , X)⊤ w1 + b1 )+ ,
(21)
8
Algorithm 1 SGTSVM Framework.
Require:
Given the training dataset X1 ∈ Rn×m1 as positive class, X2 ∈ Rn×m2 as
negative class, select parameters c1 , c2 , c3 , c4 , and a small tolerance tol,
typically tol = 1e − 3.
Ensure:
w1 , b1 , w2 , b2 .
1: set w1,1 , b1,1 , w2,1 , and b2,1 be zeros;
For t = 1, 2, . . .
2: Choose a pair of samples xt and x̂t from X1 and X2 at random, respectively;
3: Compute the tth gradients by (17) and (18);
4: Update w1,t+1 , b1,t+1 , w2,t+1 , and b2,t+1 by (19);
5: If ||w1,t+1 − w1,t || + |b1,t+1 − b1,t | < tol, stop updating w1,t+1 and b1,t+1 ,
and set w1 = w1,t+1 , b1 = b1,t+1 ;
6: If ||w2,t+1 − w2,t || + |b2,t+1 − b2,t | < tol, stop updating w2,t+1 and b2,t+1 ,
and set w2 = w2,t+1 , b2 = b2,t+1 ;
and
min
w2 ,b2
1
(||w2 ||2
2
+ b22 ) +
c3
||K(X2 , X)⊤ w2
2m2
+ b2 ||2 +
c4 ⊤
e (e
m1
− K(X1 , X)⊤ w2 − b2 )+ .
(22)
Then, we construct a series of functions with t ≥ 1 as
h1,t = 21 (||w1 ||2 + b21 ) +
c1
||K(xt , X)⊤ w1
2
+ b1 ||2 + c2 (1 + K(x̂t , X)⊤ w1 + b1 )+ ,
(23)
and
h2,t = 21 (||w2 ||2 + b22 ) +
c3
||K(x̂t , X)⊤ w2
2
+ b2 ||2 + c4 (1 − K(xt , X)⊤ w2 − b2 )+ .
(24)
Similar to (17), (18), and (19), the sub-gradients and updates can be
obtained. The details are omitted.
For large scale problem, it is time consuming to calculate the kernel
K(·, X). However, the reduced kernel strategy, which has been successfully applied for SVM and TWSVM [18, 40, 39], can also be applied for our
SGTSVM. The reduced kernel strategy replaces K(·, X) with K(·, X̃), where
X̃ is a random sampled subset of X. In practice, X̃ just needs 0.01% ∼ 1%
samples from X to get a well performance, reducing the learning time without
loss of generalization [40].
9
3.3. Analysis
In this subsection, we discuss two issues: (i) the convergence of the solution in SGTSVM; (ii) the relation between the solution in SGTSVM and
the optimal one in TWSVM. For convenience, we just consider the first QPP
(13) of linear TWSVM together with the SGD formation of linear SGTSVM.
The conclusions on another QPP (14) and the nonlinear formations can be
obtained easily as the first one.
Let u = (w ⊤ , b)⊤ , Z1 = (X1⊤ , e)⊤ , Z2 = (X2⊤ , e)⊤ , z = (x⊤ , 1)⊤ , and the
notations with the subscripts in SGTSVM also comply with this definition.
Then, the first QPP (13) is reformulated as
min f (u) = 21 ||u||2 +
u
c1
||Z1u||2
2m1
+
c2 ⊤
e (e
m2
+ Z2 u)+ .
(25)
Next, we reformulate the tth (t ≥ 1) function in SGTSVM as
ft (u) = 21 ||u||2 +
c1
||u⊤ zt ||2
2
+ c2 (1 + u⊤ ẑt )+ ,
(26)
where zt and ẑt are the samples selected randomly from Z1 and Z2 for the
tth iteration, respectively. The sub-gradient of ft (u) at ut is denoted as
∇t = ut + c1 (u⊤ zt )zt + c2 ẑt sign(1 + u⊤ ẑt )+ .
(27)
Given u1 and the step size ηt = 1/t, ut+1 with t ≥ 1 is updated by
ut+1 = ut − ηt ∇t ,
(28)
i.e.,
ut+1 = (1 − 1t )ut −
c1
z z⊤ u
t t t t
−
c2
ẑ sign(1
t t
+ u⊤
t ẑt )+ .
(29)
Lemma 3.1. For all t ≥ 1, ||∇t || and ||ut || have the upper bounds.
Proof. The formation (29) can be rewritten as
ut+1 = At ut + 1t vt ,
(30)
where At = 1t ((t−1)I−c1 zt zt⊤ ), I is the identity matrix, and vt = −c2 ẑt sign(1+
u⊤
t ẑt )+ . Note that for sufficient t, there is a positive integer N such that for
t > N, At is positive definite, and the largest eigenvalue λt of At is smaller
than or equal to t−1
. Based on (30), we have
t
ut+1 =
t
Q
At+N +1−i uN +1 +
i=N +1
t
P
i=N +1
10
1
(
i
t
Q
j=i+1
At+i+1−j )vi .
(31)
For i ≥ N + 1, ||At+N +1−i uN +1 || ≤ λi ||uN +1|| ≤
t
Q
||
|| 1i (
t
Q
j=i+1
[10]. Therefore,
N
||uN +1||,
t
(32)
At+i+1−j )vi || ≤ 1t max ||vi ||.
(33)
At+N +1−i uN +1|| ≤
i=N +1
and
i−1
||uN +1||
i
i≤t
Thus, we have
||ut+1 || ≤
N
||uN +1 ||
t
+
t−N
t
max ||vi ||
i≤t
≤ ||uN +1 || + c2 max ||z||.
(34)
z∈Z2
Let M be the largest norm of the samples in the dataset and
G1 = max{max{||u1||, . . . , ||uN ||}, ||uN +1|| + c2 M}.
(35)
This leads to that G1 is an upper bound of ||ut ||, and G2 = G1 +c1 G1 M 2 +c2 M
is an upper bound of ||∇t ||, for t ≥ 1.
Theorem 3.1. The iterative formation (29) of our SGTSVM is convergent.
Proof. On the one hand, from (32) in the proof of Lemma 3.1, we have
t
Q
lim ||
t→∞
At+N +1−i uN +1 || = 0,
(36)
At+N +1−i uN +1 = 0.
(37)
i=N +1
which indicates
t
Q
lim
t→∞ i=N +1
On the other hand, from (33), we have
t
P
i=N +1
|| 1i (
t
Q
At+i+1−j )vi || ≤ M,
(38)
j=i+1
which indicates that the following limit exists
lim
t
P
t→∞ i=N +1
|| 1i (
t
Q
At+i+1−j )vi || < ∞.
j=i+1
11
(39)
Note that an infinite series of vectors is convergent if its norm series is convergent [30]. Therefore, the following limit exists
t
P
lim
t→∞ i=N +1
1
(
i
t
Q
At+i+1−j )vi < ∞.
(40)
j=i+1
Combine (37) with (40), we conclude that the series wt+1 is convergent
for t → ∞.
Based on the above theorem, it is reasonable to take the terminate condition to be ||ut+1 − ut || < tol. Moreover, if we reform (31) by u1 , then
ut+1 =
t
Q
At+1−i u1 +
i=1
t
P
i=1
1
(
i
t
Q
At+i+1−j )vi .
(41)
j=i+1
In order to keep ut+1 to be convergent fast, it is suggested to set u1 = 0.
In the following, we analyse the relation between the solution ut in SGTSVM
and the optimal solution u∗ = (w ∗⊤ , b∗ )⊤ in TWSVM.
Lemma 3.2. Let f1 , . . . , fT be a sequence of convex functions, and u1 , . . . , uT +1 ∈
Rn be a sequence of vectors. For t ≥ 1, ut+1 = ut − ηt ∇t , where ∇t belongs
to the sub-gradient set of ft at ut and ηt = 1/t. Suppose ||ut|| and ||∇t || have
the upper bounds G1 and G2 , respectively. Then, for all θ ∈ Rn , we have
T
T
P
P
1
ft (ut ) ≤ T1
ft (θ) + G2 (G1 + ||θ||) + 2T
G22 (1 + ln T );
(i) T1
t=1
t=1
(ii) for sufficiently large T , given any ε > 0, then
1
T
T
P
ft (ut ) ≤
t=1
1
T
T
P
ft (θ)+ε.
t=1
Proof. Since ft is convex and ∇t is the sub-gradient of ft at ut , we have that
ft (ut ) − ft (θ) ≤ (ut − θ)⊤ ∇t .
(42)
Note that
(ut − θ)⊤ ∇t =
1
(||ut
2ηt
− θ||2 − ||ut+1 − θ||2) +
12
ηt
||∇t ||2 .
2
(43)
Combine (42) and (43), we have
T
P
(ft (ut ) − ft (θ))
t=1
T
T
P
P
1
1
1
2
2
(ηt ||∇t ||2 )
(||u
−
θ||
−
||u
−
θ||
)
+
t
t+1
2
ηt
2
t=1
t=1
P
P
1
( Tt=1 ||ut − θ||2 − T ||uT +1 − θ||2 ) + 12 Tt=1 (ηt ||∇t ||2 )
2
T
P
(G1 + ||θ||) ||uT +1 − ut || + 12 G22 (1 + ln T )
t=1
T
T
P
P
(G1 + ||θ||) || 1i ∇i || + 12 G22 (1 + ln T )
t=1 i=t
T G2 (G1 + ||θ||) + 12 G22 (1 + ln T ).
≤
=
≤
=
≤
(44)
Multiplying (44) by 1/T leads to the conclusion (i).
On the other hand, suppose lim uT = ũ, we have lim ||uT || = ||ũ||.
Then,
T
P
lim T1
||ut −θ||
T →∞
t=1
T →∞
T →∞
G22 (1+lnT )
T
T →∞
= lim ||uT −θ|| = ||ũ−θ||. Note that lim
T →∞
=
0. Given any ε > 0, for sufficiently large T ,
1
T
T
P
(ft (ut ) − ft (θ))
t=1
≤
1 1
(
2 T
≤
1
ε
2
T
P
||ut − θ||2 − ||uT +1 − θ||2) +
t=1
1
2T
G22 (1 + lnT )
(45)
+ 12 ε = ε.
We are now ready to bound the average instantaneous objective (26).
Theorem 3.2. For ft (t = 1, . . . , T ) defined as (26) in SGTSVM, ut (t =
1, . . . , T ) is constructed by (29), and u∗ is the optimal solution to (25). Then,
(i) there are two constants G1 and G2 (actually, they are the upper bounds of
T
T
P
P
||wt || and ||∇t ||, respectively) such that T1
ft (ut ) ≤ T1
ft (u∗ ) + G2 (G1 +
||u∗||) +
1
2T
t=1
G22 (1 + ln T );
(ii) for sufficiently large T , given any ε > 0, then
t=1
1
T
T
P
t=1
ft (ut ) ≤
1
T
T
P
ft (u∗ )+ε.
t=1
Proof. Obviously, ft (t = 1, . . . , T ) is convex. Let G1 and G2 respectively be
the upper bounds of ||ut || and ||∇t ||, the conclusions come from Lemmas 3.1
and 3.2.
13
In the following, let us discuss the relation between the solutions to
SGTSVM and TWSVM with the uniform sampling.
Corollary 3.1. Assume the conditions stated in Theorem 3.1 and m1 = m2 ,
where m1 and m2 are the sample number of X1 and X2 , respectively. Suppose
T = km1 , where k > 0 is an integer, and each sample is selected k times at
random. Then
1
(i) f (uT ) ≤ f (u∗ ) + G2 (G1 + ||u∗|| + G2 ) + 2T
G21 (1 + ln T );
(ii) for sufficiently large T , given any ε > 0, then f (uT ) ≤ f (u∗ ) + G22 + ε.
Proof. First, we prove that for all i, j = 1, 2, . . . , T ,
|ft (ui ) − ft (uj )| ≤ G2 ||ui − uj ||, t = 1, 2, . . . , T.
(46)
From the formation of ft (u), we have
|ft (ui ) − ft (uj )| ≤ 21 |||ui||2 − ||uj ||2 |
2
⊤
2
+ c21 |(u⊤
i zt ) − (uj zt ) |
⊤
+c2 |(1 + u⊤
i ẑt )+ − (1 + uj ẑt )+ |.
(47)
Since G1 is the upper bound of ||ut|| (t ≥ 1) and M is the largest norm of
the samples in the dataset, the first part, the second part, and the third part
on the right hand of (47) are respectively
1
|||ui||2
2
=
≤
and
− ||uj ||2 | ≤ G1 ||ui − uj ||,
c1
2
⊤
2
|(u⊤
i zt ) − (uj zt ) |
2
c1
|(ui + uj )⊤ zt (ui − uj )⊤ zt |
2
c1 G1 M 2 ||ui − uj ||,
⊤
c2 |(1 + u⊤
i ẑt )+ − (1 + uj ẑt )+ |
= c2 |(ui − uj )⊤ ẑt |
≤ c2 M||ui − uj ||.
(48)
(49)
(50)
Therefore, there is a constant G2 = G1 + c1 G1 M 2 + c2 M satisfying (46).
From ut+1 = ut − 1t ∇t , it is easy to obtain
ut+1 = u1 −
t
P
i=1
1
∇,
i t
14
t = 1, 2, . . . , T.
(51)
Thus, for 1 ≤ i < j ≤ T ,
||ui − uj || = ||
j−1
P
t=i
1
∇ ||
t t
Since T = km1 = km2 , for all u ∈ Rn ,
1
T
≤
j−1
P
t=i
T
P
1
G .
t 2
(52)
ft (u) = f (u). Note that f (u)
t=1
is the objective of TWSVM. Based on (46) and (52), we have
f (uT ) −
=
≤
1
T
1
T
T
P
1
T
T
P
ft (ut )
t=1
(ft (uT ) − ft (ut ))
t=1
T
P
(53)
G2 ||uT − ut ||
t=1
G2 (T −1)
≤ 2T
≤ G22 .
Using the Theorem 3.1, we have the conclusion immediately.
If m1 6= m2 , we can modify the sampling rule to obtain the same result
as one in Corollary 3.1.
Corollary 3.2. Assume the conditions stated in Corollary 3.1, but m1 6= m2 .
Suppose T = kd(m1 , m2 ), where k > 0 is an integer and d is the least common
multiple of m1 and m2 . The sample in X1 is selected kd/m1 times at random,
and the one in X2 is kd/m2 times at random. Then
1
(i) f (uT ) ≤ f (u∗ ) + G2 (G1 + ||u∗|| + G2 ) + 2T
G21 (1 + ln T );
(ii) for sufficiently large T , given any ε > 0, then f (uT ) ≤ f (u∗ ) + G22 + ε.
Note that for all u ∈ Rn ,
1
T
T
P
ft (u) = f (u). The proof of the above
t=1
corollary is the same as Corollary 3.1.
The above corollaries provide the approximations of u∗ by uT . If the
sampling rule is not as stated in these corollaries, these upper bounds no
longer holds. However, Kakade and Tewari [14] have shown a way to obtain
a similar bounds with high probability.
15
2
2
1.5
1.5
1
1
0.5
0.5
0
0
-0.5
-0.5
-1
-1
-1.5
-1.5
-2
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
0.8
-2
-1
1
(a) TWSVM
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
0.6
0.8
1
(b) SGTSVM
Figure 3: Results of TWSVM and SGTSVM on the “cross planes”, where the black solid
lines are w1⊤ x + b1 = 0 and w2⊤ x + b2 = 0, respectively.
4. Experiments
In the experiments, we compared our SGTSVM with SVM [7], PEGASOS
[32], and TWSVM [12, 35] on several artificial and large scale problems. All
of the methods were implemented on a PC with an Intel Core Duo processor
(3.4 GHz) with 4 GB RAM.
4.1. Artificial datasets
On the artificial datasets, PEGASOS, TWSVM, and our SGTSVM were
implemented by Matlab [22], and the corresponding SGTSVM Matlab codes
were uploaded upon http://www.optimal-group.org/Resource/SGTSVM.html.
First of all, we consider the similarity between TWSVM and SGTSVM.
These two methods were implemented on the “cross planes” dataset, where
TWSVM was superior on this dataset [12]. Figure 3 shows the proximal
lines on the dataset. It is obvious that the two proximal lines by SGTSVM
is similar as the ones by TWSVM, so TWSVM and SGTSVM can precisely
capture the data distribution, and thus both of them obtain the well classifier. To measure the similarity quantitatively, the optimums f1 of (10) and
f2 of (11) in TWSVM were calculated compared with the ones of each iteration in SGTSVM on the “cross planes” and some UCI datasets [4] (e.g.,
dataset Australia which includes 690 samples with 14 features, dataset Creadit which includes 690 samples with 15 features, and dataset Hypothyroid
which includes 3, 163 samples with 25 features). Linear TWSVM, SGTSVM,
16
0.12
0.1
f 1 of TBSVM
0.11
f 1 of SGTSVM
0.095
f 2 of TBSVM
f 2 of SGTSVM
Objective
Objective
f 1 of TBSVM
f 1 of SGTSVM
0.1
0.09
f 2 of TBSVM
f 2 of SGTSVM
0.09
0.085
0.08
0.08
5
10
15
20
25
20
40
60
Iteration
80
100
120
140
160
180
200
Iteration
(a) Cross planes
(b) Australia
0.14
0.12
f 1 of SGTSVM
0.11
f 2 of TBSVM
Objective
Objective
0.12
f 1 of TBSVM
f 2 of SGTSVM
0.1
f 1 of TBSVM
f 1 of SGTSVM
f 2 of TBSVM
f 2 of SGTSVM
0.1
0.09
0.08
0.07
0.08
0.06
0.06
0.05
20
40
60
80
100
120
140
160
180
Iteration
20
40
60
80
100
120
140
Iteration
(c) Creadit
(d) Hypothyroid
Figure 4: Results of linear TWSVM and SGTSVM on the four datasets, where the vertical
axis denotes the objectives of f1 and f2 .
and their nonlinear versions were implemented, where the Gaussian kernel
K(x, y) = exp{−µ||x−y||2} was used for nonlinear versions. The parameters
c1 , c2 , c3 , c4 , and µ are fixed to 0.1. Figure 4 shows the results from the two
linear classifiers, and Figure 5 corresponds to the nonlinear case. In Figures
4 and 5, the horizontal axis denotes the iteration of SGTSVM and the vertical axis denotes the objectives f1 and f2 of TWSVM and SGTSVM. Due
to the objectives of TWSVM are constant, they are denoted by two horizontal lines, while the objectives of SGTSVM for each iteration are denoted by
two broken lines in these figures. For different datasets, it can be seen that
our SGTSVM converges to TWSVM after different iterations. For instance,
linear SGTSVM converges to TWSVM after 20 iterations in Figure 4 (a),
whereas the same thing appears in Figure 4 (b) after 180 iterations. Generally, SGTSVM converges to TWSVM after 150 iterations on these datasets
either for linear or nonlinear case. Furthermore, the 10-fold cross validation
[8] was used on these datasets. We ran TWSVM and SGTSVM 10 times,
17
0.12
0.2
f 1 of TBSVM
0.1
f 1 of SGTSVM
0.15
f 2 of TBSVM
f 2 of SGTSVM
Objective
Objective
f 1 of TBSVM
f 1 of SGTSVM
0.08
0.06
f 2 of TBSVM
f 2 of SGTSVM
0.1
0.05
0.04
0
20
40
60
80
100
120
10
20
30
40
Iteration
(a) Cross planes
60
70
80
90
100
(b) Australia
0.1
0.1
f 1 of TBSVM
0.099
f 2 of TBSVM
f 1 of SGTSVM
f 2 of TBSVM
0.098
Objective
f 2 of SGTSVM
0.097
f 1 of TBSVM
0.099
f 1 of SGTSVM
0.098
Objective
50
Iteration
0.096
0.096
0.095
0.095
0.094
0.094
0.093
f 2 of SGTSVM
0.097
0.093
10
20
30
40
50
60
70
80
90
100
Iteration
20
40
60
80
100
120
140
160
Iteration
(c) Creadit
(d) Hypothyroid
Figure 5: Results of nonlinear TWSVM and SGTSVM on the four datasets, where the
vertical is the same as the one in Fig. 4.
and reported the mean accuracy and standard deviation on Table 1. The
differences of the mean accuracies are no more than 2%, which implies the
classifiers obtained by TWSVM and SGTSVM do not have significant difference.
Secondly, we test the stability of SGTSVM compared with PEGASOS.
100 datasets were generated randomly, and each dataset contain 10, 000
samples in R, where 5, 000 negative samples are from normal distribution
N(−2, 1) and 5, 000 positive ones are from N(2, 1). The best classification
point is at zero. We implemented PEGASOS and SGTSVM without any
restrictions on the 100 datasets and obtained 100 classifiers shown in Figure 6, where the upper right digit is the mean of these lines together with
their standard deviation (the parameters c in PEGASOS, c1 , c2 , c3 , and c4 in
SGTSVM were fixed to 0.1). It is clear that our SGTSVM obtains much more
compact classification lines than PEGASOS. The mean line of SGTSVM is
at −0.0016 which is closer to zero and its standard deviation is smaller than
18
Table 1: Mean accuracy (%) with standard deviation of TWSVM and SGTSVM by 10-fold
cross validation.
Data
Cross Planes
Australia
Creadit
Hypothyroid
TWSVM†
96.05±0.70
86.87±0.38
85.78±0.32
98.21±0.09
†
SGTSVM†
97.71±0.41
87.34±0.13
85.72±0.23
97.28±0.01
TWSVM♯
99.01±2.24
87.10±0.43
86.71±0.33
98.08±0.09
SGTSVM♯
98.51±2.15
85.21±0.16
85.21±0.45
98.07±0.03
linear case;♯ nonlinear case.
0.4
0.4
-0.0236±0.17
-0.0016±0.05
0.3
0.3
0.2
0.2
0.1
0.1
0
-6
-4
-2
0
2
4
6
(a) PEGASOS
0
-6
-4
-2
0
2
4
6
(b) SGTSVM
Figure 6: Results of PEGASOS and SGTSVM on 100 artificial datasets, where the 100
upright black solid lines are final classifiers.
19
0.4
0.4
-0.2038±0.24
-0.0537±0.07
0.3
0.3
0.2
0.2
0.1
0.1
0
-6
-4
-2
0
2
4
6
(a) PEGASOS
0
-6
-4
-2
0
2
4
6
(b) SGTSVM
Figure 7: Results of PEGASOS and SGTSVM on 100 artificial datasets, where the 100
upright black solid lines are final classifiers, and the samples on the dash line is invisible
for sampling.
PEGASOS. In order to investigate the effect of sampling, PEGASOS and
SGTSVM were implemented on the above 100 datasets with the restricted
sampling (i.e., some possible support vectors from negative samples in SVM
and the samples close to these support vectors are invisible for sampling).
Figure 7 shows the results of PEGASOS and SGTSVM, where the dash line
denotes that the samples in this scope are invisible for sampling. From Figure 7, it can be seen that the classification lines by PEGASOS fall into two
regions, while SGTSVM obtains a compact region. Thus, it means that the
possible support vectors significantly influence PEGASOS, while SGTSVM
relatively relies on the data distribution. From Figures 6 and 7, PEGASOS
always acquires a mean classification line further from zero with a larger
standard deviation than SGTSVM. Therefore, SGTSVM is more stable than
PEGASOS on these datasets with or without restricted sampling. To further show the classifiers’ stability, we recorded the classification accuracies
(%) of PEGASOS and SGTSVM on one of the 100 datasets. PEGASOS
and SGTSVM were implemented 100 times on this dataset, where the parameters were set as before and two methods were iterated 200 times. Every
accuracies of these methods are reported in Figure 8. From Figure 8, the
accuracies of SGTSVM belong to [99.0, 99.5] while PEGASOS is [96.5, 99.5],
which indicates SGTSVM is more stable than PEGASOS from the aspect
of classification result. Although PEGASOS obtains the highest accuracy in
this test, SGTSVM obtains higher accuracies than PEGASOS in most cases.
Finally, we test the convergence of PEGASOS and SGTSVM. A dataset
20
100
PEGASOS
Accuracy (%)
99.5
SGTSVM
99
98.5
98
97.5
97
96.5
10
20
30
40
50
60
70
80
90
100
Times
Figure 8: Accuracies of PEGASOS and SGTSVM on a normal distribution dataset, where
each method is implemented 100 times.
0.2
mean
0
-0.2
10
100
200
300
400
500
600
700
800
900
1000
PEGASOS
0.2
mean
0
-0.2
10
100
200
300
400
500
600
700
800
900
1000
SGTSVM
Figure 9: Results of PEGASOS and SGTSVM on a normal distribution dataset, where
each method is implemented 10 times. The horizontal axis is the iteration and the vertical
one is the classification location.
21
0
6
10
10
4
Iteration
10
PEGASOS (mean)
SGTSVM (mean)
PEGASOS (std)
SGTSVM (std)
Time (Sec.)
PEGASOS (mean)
SGTSVM (mean)
PEGASOS (std)
SGTSVM (std)
102
100
10-2
-1
10
-2
10
-3
10
10
-4
-5
10
10-5
-6
10
10
tol
-1
10
-2
-3
-4
10
10
10
-5
10
-6
tol
Figure 10: Iteration and time of PEGASOS and SGTSVM on a normal distribution
dataset, where each method is implemented 100 times.
contains 20, 000 samples in R was generated randomly, where 10, 000 negative
samples are from normal distribution N(−2, 1) and 10, 000 positive ones are
from N(2, 1). PEGASOS and SGTSVM were implemented 10 times and
each method was iterated 1, 000 times. The current classification locations
for different iterations were reported in Figure 9, where the horizontal axis is
the iteration and the vertical one is the classification location. From Figure
9, it can be seen that: (i) the initial selected samples do not very affect
both PEGASOS and SGTSVM after iterating 150 times; (ii) after iterating
100 times, the classification locations of two methods are centralized to zero
and the error is less than 0.1; (iii) it is important that PEGASOS gets higher
error after iterating 800 times than SGTSVM, indicates PEGASOS converges
slower than SGTSVM. To more precisely discuss the convergence, PEGASOS
and SGTSVM were implemented 100 times and each method was terminated
by the solution error parameter tol (more details about tol can be found
in Algorithm 1). tol is selected from {10i |i = −1, −2, . . . , −6}, and the
corresponding iteration and spent time are reported in Figure 10. It is clear
from Figure 10 that our SGTSVM converges faster than PEGASOS when
tol ≤ 10−3 . Moreover, if one needs smaller solution error such as tol = 10−4
or tol = 10−5 , the iterations of PEGASOS would be about 10 times more than
SGTSVM, and it would be 100 times when tol = 10−6 (thus the learning time
between PEGASOS and SGTSVM is more than a hundredfold). Therefore,
SGTSVM converges much faster than PEGASOS.
4.2. Large scale datasets
To test the feasibility of these methods on large scale datasets, we ran
SVM, PEGASOS, and SGTSVM on six large scale datasets [4]. Table 2 shows
22
Table 2: The details of the large scale datasets.
Data
(a)
(b)
(c)
(d)
(e)
(f)
Name
Skin
Gashome
Susy
Kddcup
Gas
Hepmass
No. of samples
245,057
928,990
5,000,000
4,898,432
8,386,764
10,500,000
Dimension
3
10
18
41
16
28
Ratio
0.262
0.578
0.844
0.248
0.077
1.000
the details of the large scale datasets, where Ratio in Table 2 is the sample
number of positive class than negative one. Each dataset is split into two
subsets where one (including 90% samples) is used for training and the other
(including 10% samples) is used for testing. SVM is implemented by Liblinear [9], while PEGASOS and SGTSVM are implemented by the softwares
written in C language. The corresponding softwares can be downloaded
from http://www.optimal-group.org/Resource/SGTSVM.html. For nonlinear SGTSVM, the reduced kernel [18] is used and the kernel size is fixed
to 100.
First, let us test the influence of parameter tol on PEGASOS and SGTSVM.
These methods were implemented on the large scale datasets, where tol was
respectively set to {10i |i = −1, −2, . . . , −6} and other parameters were fixed
to 0.1. The testing accuracy and learning time are reported in Figure 11.
By comparing Figure 11 (a), (c), and (e), it can bee seen that our SGTSVM
(including linear and nonlinear cases) is more stable than PEGASOS when
tol ≤ 10−4. In order to select a high accuracy with an acceptable learning
time from Figure 11, tol is set to 10−6 for PEGASOS, and it is set to 10−4
for SGTSVM.
Then, we compare SVM and PEGASOS with our SGTSVM with fixed tol
on these datasets. These methods’ accuracies are recorded in Table 3, where
validation accuracy is obtained by 5-fold cross validation on the training subset, and testing accuracy is obtained by the testing subset. The parameters
c in SVM and PEGASOS, c1 , c2 , c3 , and c4 in SGTSVM are selected from
{2i |i = −8, −7, . . . , 1}, and the Gaussian kernel parameter µ in nonlinear
SGTSVM is selected from {2i |i = −10, −9, . . . , −1}. For simplicity, we also
set c1 = c3 and c2 = c4 in SGTSVM. The optimal parameters are recorded
in Table 4. From Table 3, it is obvious that our SGTSVM owns the highest
23
1800
90
1600
80
1400
70
1200
60
1000
Time (Sec.)
Accuracy (%)
100
50
40
800
600
30
400
20
200
10
Skin
0
10-1
Gashome
10-2
Susy
Kddcup
10-3
Gas
10-4
0
Hepmass
10-5
Skin
Gashome
Susy
Kddcup
Gas
Hepmass
10-6
10-1
10-2
10-3
tol
10-4
10-5
10-6
10-5
10-6
10-5
10-6
tol
(a) PEGASOS
(b) PEGASOS
700
100
600
90
500
Skin
Gashome
Susy
Kddcup
Gas
Hepmass
400
Time (Sec.)
Accuracy (%)
80
70
60
300
200
50
100
40
0
Skin
30
10-1
Gashome
10-2
Susy
Kddcup
10-3
Gas
10-4
Hepmass
10-5
10-6
10-1
10-2
10-3
tol
(d) SGTSVM†
100
800
90
700
80
600
70
500
Time (Sec.)
Accuracy (%)
(c) SGTSVM†
60
50
300
200
30
100
20
Skin
Gashome
Susy
Kddcup
Gas
Hepmass
400
40
0
Skin
10
10-1
10-4
tol
10-2
Gashome
Susy
Kddcup
10-3
10-4
Gas
Hepmass
10-5
10-6
tol
10-1
10-2
10-3
10-4
tol
(e) SGTSVM♯
(f) SGTSVM♯
Figure 11: The accuracy and learning time of PEGASOS, linear SGTSVM († ), and nonlinear SGTSVM (♯ ) on six large scale datasets. The dashed box corresponds to the chosen
parameter tol.
24
Table 3: The results on the large scale datasets.
Data
Skin
245,057×3
Gashome
919,438×10
Susy
5,000,000×18
Kddcup
4,898,432×41
Gas
8,386,764×16
Hepmass
10,500,000×28
†
validation(%)
testing(%)
validation(%)
testing(%)
validation(%)
testing(%)
validation(%)
testing(%)
validation(%)
testing(%)
validation(%)
testing(%)
SVM
PEGASOS
SGTSVM†
SGTSVM♯
78.87
84.28
49.11
82.57
78.41
78.52
*
*
*
*
*
*
82.46
85.39
70.09
72.85
54.11
56.44
96.39
96.42
69.77
50.54
80.63
80.84
85.23
87.70
67.50
76.09
76.14
75.09
95.24
97.45
89.73
92.45
80.80
81.10
84.70
85.34
74.49
89.13
69.90
68.61
93.19
99.20
92.60
92.86
82.18
79.59
linear case;♯ nonlinear case; ∗ out of memory.
Table 4: The optimal parameters of SVM, PEGASOS, and SGTSVM.
Data
Skin
Gashome
Susy
Kddcup
Gas
Hepmass
validation
testing
validation
testing
validation
testing
validation
testing
validation
testing
validation
testing
†
SVM
c
2i
PEGASOS
c
2i
SGTSVM†
c1 = c3 , c2 = c4
2i , 2j
SGTSVM♯
c1 = c3 , c2 = c4 , µ
2i , 2j , 2k
-1
-1
0
-1
1
0
NA
NA
NA
NA
NA
NA
-6
-4
-6
-1
0
-7
-6
-2
-1
1
0
0
0,-5
1,-6
-4,-5
-8,-7
-2,-6
-1,-3
-8,-4
-8,-4
-4,0
-3,1
-1,-2
0,-2
-6,-5,-3
-1,0,-9
-3,-5,-2
-8,-1,-2
-3,-1,-4
-3,-3,-3
0,-3,-4
-6,-1,-8
-1,-1,-6
-4,-8,-6
-4,-1,-3
-4,-2,-3
linear case;♯ nonlinear case.
25
linear SGTSVM
nonlinear SGTSVM
PEGASOS
Liblinear
Time (Sec.)
2000
1500
1000
500
0
Figure 12: Learning time of SGTSVM, PEGASOS, and Liblinear on the large scale
datasets with the optimal parameters.
accuracies on 9 groups of comparisons, and performs as well as SVM or PEGASOS on the other 3 groups. However, SVM performs much worse than
SGTSVM on the dataset Gashome and cannot work on three much larger
datasets. Though PEGASOS can work on these datasets, it performs much
worse than SGTSVM on Susy and Gas. To further comparing the learning
time of these methods, we report the one-run time in Figure 12 with the optimal parameters. It is obvious that SGTSVM (including linear and nonlinear
cases) is much faster than the others. Thus, our SGTSVM is comparable to
SVM and PEGASOS on these large scale datasets. In addition, the softwares
of SGTSVM and PEGASOS need much less RAM than Liblinear (the software of SVM). In detail, Liblinear needs store the entire training set in RAM,
while PEGASOS and SGTSVM only store a subset related to the iteration.
Due to the required memory of Liblinear increases with the size of dataset, it
tends to out of memory with the increasing data size, while the same thing
does not appear in PEGASOS or SGTSVM.
5. Conclusion
The stochastic gradient twin support vector machines (SGTSVM) based
on stochastic gradient decent algorithm has been proposed. By hiring the
26
nonparallel hyperplanes, SGTSVM is more stable on stochastic sampling
than PEGASOS. In theory, we prove that SGTSVM is convergent, and it is
an approximation of TWSVM with uniform sampling. Experimental results
have confirmed the merits of SGTSVM and shown our SGTSVM has better
accuracy compared with Liblinear and PEGASOS with the fastest learning
speed. For practical convenience, the corresponding SGTSVM codes (including Matlab and C language) can be downloaded from http://www.optimal-group.org/Resource/S
For the future work, it is possible to design some special sampling for SGTSVM
to obtain more powerful performance, together with applying SGTSVM on
the bigdata problems.
Acknowledgment
This work is supported by the National Natural Science Foundation of
China (Nos. 11501310, 11201426, and 11371365), the Natural Science Foundation of Inner Mongolia Autonomous Region of China (No. 2015BS0606),
and the Zhejiang Provincial Natural Science Foundation of China (No. LY15F
030013).
References
[1] M.S. Bazarra, H.D. Sherali, and C.M. Shetty. Nonlinear ProgrammingTheory and Algorithms, second ed. Wiley, 2004.
[2] A. Bennar and J.M. Monnez. Almost sure convergence of a stochastic
approximation process in a convex set. International Journal of Applied
Mathematics, 20(5):713–722, 2007.
[3] J.B. Bi and V.N. Vapnik. Learning with rigorous support vector machines. Springer, 2003.
[4] C.L. Blake and C.J. Merz. UCI Repository for Machine Learning
Databases. http://www.ics.uci.edu/~ mlearn/MLRepository.html,
1998.
[5] C.C. Chang and C.J. Lin. LIBSVM: A library for support vector machines. http://www.csie.ntu.edu.tw/~ cjlin, 2001.
[6] W.J. Chen, Y.H. Shao, C.N. Li, and N.Y. Deng. Mltsvm: A novel twin
support vector machine to multi-label learning. Pattern Recognition,
52:61–74, 2015.
27
[7] C. Cortes and V.N. Vapnik. Support vector networks. Machine Learning,
20:273–297, 1995.
[8] R.O. Duda, P.E. Hart, and D.G. Stork. Pattern Classification, 2nd
Edition. John Wiley and Sons, 2001.
[9] R.E. Fan, K.W. Chang, C.J. Hsieh, X.R. Wang, and C.J. Lin. LIBLINEAR: a library for large linear classification. Journal of Machine
Learning Research, 9:1871–1874, 2008.
[10] G.H. Golub and L.C.F. Van. Matrix Computations. The John Hopkins
University Press, 1996.
[11] H. Ince and T.B. Trafalis. Support vector machine for regression and
applications to financial forecasting. In International Joint Conference
on Neural Networks, pages 6348–6354, Italy, 2002.
[12] Jayadeva, R. Khemchandani, and S. Chandra. Twin support vector
machines for pattern classification. IEEE Trans.PatternAnal. Machine
Intell, 29(5):905–910, 2007.
[13] T. Joachims. Making large-scale SVM learning practical. In Advances
in Kernel Methods-Support Vector Learning, pages 169–184, Cambridge,
1998.
[14] S.M. Kakade and A. Tewari. On the generalization ability of online
strongly convex programming algorithms. In Advances in Neural Information Processing Systems, pages 801–808, 2009.
[15] R. Khemchandani, Jayadeva, and S. Chandra. Optimal kernel selection
in twin support vector machines. Optimization Letters, 3:77–88, 2009.
[16] J. Kivinen, A.J. Smola, and R.C. Williamson. Online learning with kernels. Signal Processing, IEEE Transactions on, 52(8):2165–2176, 2004.
[17] T.N. Lal, M. Schröder, T. Hinterberger, J. Weston, M. Bogdan, N. Birbaumer, and B. Schölkopf. Support vector channel selection in BCI.
Data Mining and Knowledge Discovery, 51(6):1003–1010, 2004.
[18] Y.J. Lee and O.L. Mangasarian. RSVM: Reduced support vector machines. In First SIAM International Conference on Data Mining, pages
5–7, Chicago, IL, USA, 2001.
28
[19] D.W. Li, Y.J. Tian, and H.G. Xu. Deep twin support vector machine.
In Data Mining Workshop (ICDMW), 2014 IEEE International Conference on, pages 65–73. IEEE, 2014.
[20] O.L. Mangasarian. Nonlinear Programming. SIAM, 1994.
[21] O.L. Mangasarian and E.W. Wild. Multisurface proximal support vector classification via generalize eigenvalues. IEEE Trans.PatternAnal.
Machine Intell, 28(1):69–74, 2006.
[22] Matlab.
User’s
Guide,
The
http://www.mathworks.com, 1994-2010.
MathWorks,
Inc.
[23] W.S. Noble. Support vector machine applications in computational biology. In Kernel Methods in Computational Biology, Cambridge, 2004.
[24] X.J. Peng. TPMSVM: A novel twin parametric-margin support vector
machine for pattern recognition. Pattern Recognition, 44(10-11):2678–
2692, 2011.
[25] J. Platt. Fast training of support vector machines using sequential minimal optimization. In Advances in kernel methods-support vector learning, pages 185–208, Cambridge, MA: MIT Press, 1999.
[26] Z. Qi, Y. Tian, and Y. Shi. Laplacian twin support vector machine for
semi-supervised classification. Neural Networks, 35:46–53, 2012.
[27] Z. Qi, Y. Tian, and Y. Shi. Twin support vector machine with universum
data. Neural Networks, 36:112–119, 2012.
[28] Z. Qi, Y. Tian, and Y. Shi. Robust twin support vector machine for
pattern classification. Pattern Recognition, 46(1):305–316, 2013.
[29] Z. Qi, Y. Tian, and Y. Shi. Successive overrelaxation for laplacian support vector machine. IEEE transactions on neural networks and learning
systems, 26(4):674–683, 2015.
[30] W. Rudin. Principles of mathematical analysis, volume 3. McGraw-Hill
New York, 1964.
[31] B. Schölkopf and A. Smola. Learning with kernels. MA:MIT Press,
Cambridge, 2002.
29
[32] S.S. Shai, Y. Singer, N. Srebro, and A. Cotter. Pegasos: Primal
estimated sub-gradient solver for svm. Mathematical programming,
127(1):3–30, 2011.
[33] Y.H. Shao, W.L. Chen, J.J. Zhang, Z. Wang, and N.Y. Deng. An efficient
weighted lagrangian twin support vector machine for imbalanced data
classification. Pattern Recognition, 47(9):3158–3167, 2014.
[34] Y.H. Shao and N.Y. Deng. A coordinate descent margin based-twin
support vector machine for classification. Neural Networks, 25:114–121,
2012.
[35] Y.H. Shao, C.H. Zhang, X.B. Wang, and N.Y. Deng. Improvements on
twin support vector machines. IEEE Transactions on Neural Networks,
22(6):962 – 968, 2011.
[36] Y. Tian, Z. Qi, and X. Ju. Nonparallel support vector machines for
pattern classification. IEEE transactions on cybernetics, 44(7):1067–
1079, 2014.
[37] Y.J. Tian and Y. Ping. Large-scale linear nonparallel support vector
machine solver. Neural Networks, 50:166–174, 2014.
[38] Z. Wang, Y.H. Shao, L. Bai, and N.Y. Deng. Twin support vector
machine for clustering. IEEE Transactions on Neural Networks and
Learning Systems, 26(10):2583–2588, 2015.
[39] Z. Wang, Y.H. Shao, and T.R. Wu. A ga-based model selection for
smooth twin parametric-margin support vector machine. Pattern Recognition, 46(8):2267–2277, 2013.
[40] Z. Wang, Y.H. Shao, and T.R. Wu. Proximal parametric-margin support vector classifier and its applications. Neural Computing and Applications, 24(3-4):755–764, 2014.
[41] W. Xu. Towards optimal one pass large scale learning with averaged
stochastic gradient descent. arXiv preprint arXiv:1107.2490, 2011.
[42] C.H. Zhang, Y.J. Tian, and N.Y. Deng. The new interpretation of
support vector machines on statistical learning theory. Science China,
53(1):151–164, 2010.
30
[43] T. Zhang. Solving large scale linear prediction problems using stochastic
gradient descent algorithms. In Proceedings of the twenty-first international conference on Machine learning, page 116. ACM, 2004.
31
| 1cs.CV
|
arXiv:1603.08077v1 [math.GT] 26 Mar 2016
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Abstract. Suppose an orientation preserving action of a finite group
G on the closed surface Σg of genus g > 1 extends over the 3-torus T 3 for
some embedding Σg ⊂ T 3 . Then |G| ≤ 12(g − 1), and this upper bound
12(g − 1) can be achieved for g = n2 + 1, 3n2 + 1, 2n3 + 1, 4n3 + 1, 8n3 +
1, n ∈ Z+ . Those surfaces in T 3 realizing the maximum symmetries
can be either unknotted or knotted. Similar problems in non-orientable
category is also discussed.
Connection with minimal surfaces in T 3 is addressed and when the
maximum symmetric surfaces above can be realized by minimal surfaces
is identified.
Contents
1. Introduction
2. Upper and lower bounds of extendable finite groups
3. Unknotted examples of the most symmetric surfaces
4. Knotted examples of the most symmetric surfaces
5. Minimal surfaces, space groups, proof of the main result
References
1
4
6
10
16
18
1. Introduction
Let Σg be the closed orientable surface of genus g > 1, Πg be the closed
non-orientable surface of genus g > 2, and T 3 be the three dimensional
torus (3-torus for short). We consider the following question in the smooth
category:
Suppose the action of a finite group G on a closed surface S can extend
over T 3 . Then what is the maximum order of the group and what does the
maximum action look like?
A similar problem has been addressed for surfaces embedded in the 3sphere, S 3 , which is the simplest compact 3-manifold in the sense that it is
a one point compactification of our three space and the universal spherical
3-manifold covering all spherical 3-manifolds. See [WWZZ1] and [WWZZ2]
for surfaces in the orientable category. Note that only orientable surfaces Σg
2010 Mathematics Subject Classification. 57M60, 57N10, 57S25, 53A10, 20F65, 05C10;
Key words and phrases. maximum surface symmetry in 3-torus, minimal surface.
The second author is supported by grant No.11501534 of NSFC and the last author is
supported by grant No.11371034 of NSFC.
1
2
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
can be embedded in S 3 . T 3 is another natural and significant 3-manifold for
this question. It is the universal compact Euclidean 3-manifold in the sense
that it covers all compact Euclidean 3-manifolds; moreover T 3 is covered
by our 3-space and the preimage of a closed surface S ⊂ T 3 under such a
covering can be a triply periodic surface, which is an interesting object in
the natural sciences and engineering [HBLL+].
Definition 1.1. Let G be a finite group. A G-action on a closed surface S
is extendable over T 3 with respect to an embedding e : S ֒→ T 3 if G can act
on T 3 such that h ◦ e = e ◦ h for any h ∈ G.
For an embedding of an orientable surface in T 3 we can define whether it
is unknotted in the same way as the usual definition for knotting in S 3 .
Definition 1.2. An embedding e : Σg ֒→ T 3 is unknotted if e(Σg ) splits T 3
into two handlebodies. Otherwise it is knotted.
We assume all orientable manifolds in this note are already oriented. According to whether the action preserves the orientation of the surface and
T 3 , we can define four classes of maximum orders.
Definition 1.3. Let S be either Σg or Πg . Define E(S), E + (S), E+ (Σg )
+
(Σg ) as below:
and E+
E(S): the maximum order of all extendable G-actions on S.
E + (S): the maximum order of all extendable G-actions on S which preserve the orientation of T 3 .
E+ (Σg ): the maximum order of all extendable G-actions on Σg which
preserve the orientation of Σg .
+
(Σg ): the maximum order of extendable G-actions on Σg , which preE+
serve the orientation of both T 3 and Σg .
We will prove the following Theorem 1.4 and Theorem 1.5. Theorem
1.4 gives the upper bounds of those invariants defined in Definition 1.3,
and Theorem 1.5 provides infinitely many g to realize each upper bound in
Theorem 1.4.
Theorem 1.4. Suppose the genus g > 1 for Σg and g > 2 for Πg .
+
(Σg ) ≤ 12(g − 1).
(1) E+
(2) E+ (Σg ) ≤ 24(g − 1), E + (Σg ) ≤ 24(g − 1), E(Σg ) ≤ 48(g − 1).
(3) E + (Πg ) ≤ 12(g − 2), E(Πg ) ≤ 24(g − 2).
If an extendable G-action on S realizes one of the above upper bounds,
then the corresponding surface e(S) can be thought as a most symmetric
surface in T 3 .
Theorem 1.5. Suppose n is any positive integer.
+
(Σg ) in Theorem 1.4 can be achieved by an
(1) The upper bound of E+
unknotted embedding for g = 2n3 + 1, 4n3 + 1, 8n3 + 1; and by a knotted
embedding for g = 2n3 + 1, 4n3 + 1, 8n3 + 1, where 6 does not divide n; and
g = n2 + 1, 3n2 + 1.
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
3
(2) The upper bound of E+ (Σg ), E + (Σg ) and E(Σg ) in Theorem 1.4 can
be achieved for g = 2n3 + 1, 4n3 + 1, 8n3 + 1 by an unknotted embedding.
(3) The upper bound of E + (Πg ) and E(Πg ) in Theorem 1.4 can be achieved
for g = 2n3 + 2, 8n3 + 2, where n is odd.
The proof of Theorem 1.4, using the Riemann-Hurwitz Formula and the
Equivariant Loop Theorem, is given in §2. The proof of Theorem 1.5 occupies the remaining three sections of the paper, which is outlined as below:
In §3 and §4 we will construct various examples to realize those upper
bounds in Theorem 1.5 (1), §3 for the unknotted case and §4 for the knotted case, therefore Theorem 1.5 (1) follows, up to the verification of the
knottiness of those embeddings. Those examples are explicit in the following sense: The 3-torus is obtained by standard opposite face identification of
the cube and we define those surfaces in the cube before the identification.
Indeed, for each g in Theorem 1.5 (1), we construct all embeddings Σg ⊂ T 3
+
(Σg ) we can image for the moment, and we expect those are all
realizing E+
+
(Σg ), see a conjecture below. The constructions in
embeddings realizing E+
§3 and §4 often rely on an understanding of crystallographic space groups.
The knottedness of the examples in §3 and §4 involved in Theorem 1.5
(1), as well as Theorem 1.5 (2) and (3), could be verified by arguments
such as those in §3 and §4, and by some topological reasoning; but we
present a more convenient and interesting way in §5. In §5 we first link
the verification of knottedness of the examples in §3 and §4 with minimal
surfaces in T 3 , or equivalently, triply periodic minimal surfaces in R3 , which
itself is an important topic, see [Me] and [FH] for examples. Historically,
many minimal surfaces in T 3 were constructed using the symmetry of T 3
and it is known that minimal surfaces in T 3 must be unknotted [Me]. We
identify the examples in §3 with known triply periodic minimal surfaces
(up to isotopy) [Br], therefore they are unknotted. On the other hand,
by a simple criterion from covering space theory and our constructions,
the examples in §4 are knotted, therefore can not be realized by minimal
surfaces. We also identify the group actions in §3 and §4 with known space
groups as well as their index-2 supergroups; then Theorem 1.5 (2) and (3)
are proved.
+
(g) = 12(g − 1) can
Corollary 1.6. Σg ⊂ T 3 realizing the upper bound E+
3
3
be realized by minimal surfaces for g = 2n + 1, 4n + 1, 8n3 + 1.
For each g it is easy to construct an extendable action of order 4(g − 1)
on (T 3 , Σg ), see Example 2.3. We end the introduction by the following
Conjecture 1.7. Suppose the genus g > 1.
+
(Σg ) = 12(g − 1) are listed in
(1) All g realizing the upper bound E+
Theorem 1.5 (1), and moreover, all examples realizing those g are listed in
§3 and §4.
+
(Σg ) = 4(g − 1) for g ∈ Z+ \ K, where K = {fi (n)|n ∈ Z+ } and
(2) E+
fi runs over finitely many quadratic and cubic functions.
4
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
2. Upper and lower bounds of extendable finite groups
We need the following two important results, see [Hu], [MY], to prove
Theorem 1.4.
Riemann-Hurwitz Formula. Σg → Σg′ is a regular branched covering
with transformation group G. Let a1 , a2 , · · · , ak be the branched points in
Σg′ having indices q1 ≤ q2 ≤ · · · ≤ qk . Then
2 − 2g = |G|(2 − 2g ′ −
k
X
1
(1 − ))
qi
i=1
Equivariant Loop Theorem. Let M be a three manifold with a smooth
action of a discrete group G. Let F be an equivariant subsurface of ∂M .
If F is not π1 -injective with respect to inclusion into M , then it admits a
G-equivariant compression disk.
Here a nonempty subset X of M is G-equivariant if h(X) = X or h(X) ∩
X = ∅, for any h ∈ G. A disk D ⊂ M is a compression disk of F if ∂D ⊂ F
and in F it does not bound any disk.
Proof of (1). Suppose there is an extendable G-action on Σg which preserves
the orientation of both T 3 and Σg . Cutting T 3 along e(Σg ) we get a three
manifold M . Since both Σg and T 3 are orientable, Σg must be two-sided in
T 3 , therefore M contains two boundaries F1 and F2 , and F1 ∼
= F2 ∼
= Σg .
Now clearly G acts on M . Since the G-action preserves the orientation of
both T 3 and Σg , each of F1 and F2 is a G-equivariant surface. Since g > 1,
π1 (Σg ) is not abelian, but π1 (T 3 ) is abelian so the induced homomorphism
π1 (Σg ) → π1 (T 3 ) is not injective. Then at least one of F1 and F2 is not π1 injective with respect to inclusion into M . Suppose F1 is not π1 -injective,
then it admits a G-equivariant compression disk D of F1 by the Equivariant
Loop Theorem.
If there exists an h ∈ G such that h(D) = D and h reverses an orientation
of D, then we can choose a G-equivariant regular neighbourhood N (D)
of D such that there is a homeomorphism i : D × [−1, 1] → N (D) and
i(D × {0}) = D. Then D ′ = i(D × {1}) is also a G-equivariant compression
disk of F1 , and clearly for this D ′ , if h′ (D ′ ) = D ′ for some h′ ∈ G, then h′
preserves an orientation of D ′ . Hence we can assume each element of G that
preserves D also preserves its orientation, in particular it is fixed point free
on ∂D.
Since the G-action on T 3 preserves the orientations of both Σg and T 3 ,
the induced G-action on M preserves F1 . With the quotient topology F1 /G
is homeomorphic to some Σg′ , and p : F1 → F1 /G is a regular branched
covering. Since the G action is fixed point free on ∂D by previous discussion,
p(∂D) is a simple closed curve in F1 /G.
Let a1 , a2 , · · · , ak be the branch points having indices q1 ≤ q2 ≤ · · · ≤ qk .
Note 2 − 2g < 0. By the Riemann-Hurwitz Formula we have
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
2 − 2g′ −
5
k
X
1
2 − 2g
(1 − ) =
< 0.
qi
|G|
i=1
If g′ = 0 and k ≤ 3, then p(∂D) must bound a disk in F1 /G containing
at most one branch point, and ∂D will bound a disk in F1 , a contradiction.
Hence either g′ ≥ 1 or g ′ = 0 and k ≥ 4.
Notice that for each qi , we have
1
≥ 1/2.
qi
Then by elementary calculation we have |G| ≤ 12(g−1), and moreover the
equality holds if and only if g′ = 0, k = 4 and (q1 , q2 , q3 , q4 ) = (2, 2, 2, 3).
1−
Remark 2.1. Zimmermann first proved the order of orientation preserving
finite group action on handlebody of genus g is bounded by 12(g − 1) [Zi]
soon after the work [MY].
By the above proof, we actually have the following:
Theorem 2.2. Suppose Σg is embedded in a three manifold M and a finite group G acts on (Σg , M ). If G preserves both the two sides and the
orientation of Σg and Σg is not π1 -injective in M , then |G| ≤ 12(g − 1).
Now (2) and (3) follow from (1).
Proof of (2). Suppose there is an extendable G-action on Σg . Let Go be
the normal subgroup of G containing all elements that preserve both the
orientations of Σg and T 3 . In the case of E+ (Σg ) or E + (Σg ), the index
of Go in G is at most two, and in the case of E(Σg ), the index of Go
in G is at most four. Hence E+ (Σg ) ≤ 24(g − 1), E + (Σg ) ≤ 24(g − 1),
E(Σg ) ≤ 48(g − 1).
Proof of (3). Suppose there is an extendable G-action on Πg and the action preserves the orientation of T 3 . We can choose an equivariant regular neighbourhood N (Πg ) of Πg , then G also acts on ∂N (Πg ). Since T 3
is orientable, N (Πg ) is homeomorphic to a twisted [−1, 1]-bundle over Πg
and ∂N (Πg ) is the orientable double cover of Πg under the bundle projection. Since χ(Πg ) = 2 − g, χ(∂N (Πg )) = 4 − 2g = 2 − 2(g − 1). It
follows that ∂N (Πg ) is homeomorphic to Σg−1 . Clearly the G-action preserves the two sides of ∂N (Πg ). Since the action preserves the orientation
of T 3 , it also preserves the orientation of ∂N (Πg ). Then by the result of
(1), we have E + (Πg ) ≤ 12(g − 2). And similar to the proof of (2), we have
E(Πg ) ≤ 24(g − 2).
Example 2.3. Let ([0, 1]3 , +) be the unit cube with a cross properly embedded shown as the right side of Figure 1. For each g > 1, put g − 1 copies of
([0, 1]3 , +) to get ([0, 1]3 , +)g−1 which is a cuboid with an antennae properly
embedded, shown as Figure 1. If we identify the opposite faces of the cuboid,
6
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
we get (T 3 , Θg ), where Θg is a graph of genus g. If we first only identify
the right and left faces, we get ([0, 1]2 × S 1 , Ag−1 ), where Ag−1 is a circular
antennae with g − 1 bars. It is easy to see that G = Dg−1 ⊕ Z2 acts on the
pair ([0, 1]2 × S 1 , Ag−1 ), where Dg−1 is the dihedral group acts in a standard way on ([0, 1]2 × S 1 , Ag−1 ), and Z2 is π-rotation of ([0, 1]2 × S 1 , Ag−1 )
around the center-circle. Clear this action preserves the each pair of faces of
([0, 1]2 × S 1 , Ag−1 ) to be identified, therefore induces an action on (T 3 , Θg ).
Let N (Θg ) be a G-invariant regular neiborhood of Θg . Then ∂N (Θg ) = Σg
and G of order 4(g − 1) acts on (T 3 , Σg ).
Figure 1.
3. Unknotted examples of the most symmetric surfaces
In this section we give three classes of examples realizing the upper bound
+
(Σg ) = 12(g − 1). In each case we first construct a triply periodic
of E+
graph Γ in the three-dimensional Euclidean space E 3 . There will be a
three-dimensional space group G preserving Γ. Then we choose a rankthree translation normal subgroup T in G. The space E 3 /T is our T 3 . The
finite group G = G/T acts on T 3 preserving the graph Θ = Γ/T . Finally, we
choose an equivariant regular neighbourhood N (Θ) of Θ, and ∂N (Θ) is our
surface Σg . After the discussion of §5 we will see that for each example the
complement of N (Θ) is also a handlebody, hence the surface is unknotted.
Definition 3.1. Let T1 = {(a, b, c) | a, b, c ∈ Z} be the group of integer
translations. Let tx = (1, 0, 0), ty = (0, 1, 0), tz = (0, 0, 1). An element
t = (a, b, c) ∈ T1 acts on E 3 as following:
t : (x, y, z) 7→ (x + a, y + b, z + c)
For n ∈ Z+ , we define three classes of subgroups Tm of T1 for those integers
m that can be presented (uniquely) in the form n3 , 2n3 and 4n3 as follows:
Tn3 = hntx , nty , ntz i,
T2n3 = hnty + ntz , ntz + ntx , ntx + nty i,
T4n3 = h−ntx + nty + ntz , ntx − nty + ntz , ntx + nty − ntz i.
Here the subscript m of Tm is equal to the volume V ol(E 3 /Tm ), m =
n3 , 2n3 , 4n3 .
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
7
Clearly T2n3 and T4n3 are subgroups of Tn3 . One can easily verify that
T(2n)3 ⊂ T2n3 , since 2ntx , 2nty , 2ntz are linear combinations of nty +ntz , ntz +
ntx , ntx + nty , hence T32n3 = T4(2n)3 ⊂ T(2n)3 = T8n3 ⊂ T2n3 . Similarly one
can verify that T(2n)3 ⊂ T4n3 , hence T16n3 = T2(2n)3 ⊂ T(2n)3 = T8n3 ⊂ T4n3 .
Definition 3.2. We define five isometries of E 3 as follows:
ry : (x, y, z) 7→ (−x, y, −z)
rz : (x, y, z) 7→ (−x, −y, z)
rxy : (x, y, z) 7→ (y, x, −z)
rxyz : (x, y, z) 7→ (z, x, y)
t1/2 : (x, y, z) 7→ (x + 1/2, y + 1/2, z + 1/2)
The isometries ry , rz and rxy are 2-fold rotations (i.e., rotation by an
angle of π) about the y-axis, z-axis and the line x = y, z = 0 respectively.
The isometry rxyz is a positive 3-fold rotation about the cube body diagonal,
x = y = z (i.e., right-hand rule rotation by 2π/3 about the direction [1, 1, 1].)
The notations of space groups used below come from [Ha].
Example 3.3. Let Γ1min beSthe one skeleton of the unit cube [0, 1]3 in E 3
as in Figure 2. Let Γ1 = t∈T1 t(Γ1min ). Then Γ1 , the 1-skeleton of the
tessellation of E 3 by the unit cube, is a triply periodic graph called the
simple or primitive cubic lattice (pcu in [RCSR]).
Figure 2. One skeleton of [0, 1]3
Let H 1 = hry , rz , rxy , rxyz i, which is the well-known orientation-preserving
isometric group of [−1, 1]3 of order 24 (with Schönflies symbol O). Let
G 1 = hT1 , H 1 i, this is the space group P 432. Then G 1 preserves Γ1 . Now in
T3 ∼
= E 3 /T1 we have a graph Θ11 = Γ1 /T1 . It has one vertex and three edges,
hence its Euler characteristic χ(Θ11 ) = −2 and its genus g = 1 − χ(Θ11 ) = 3.
Clearly G11 = G 1 /T1 ∼
= E 3 /T1 preserving Θ11 , and G11
= H 1 acts on T 3 ∼
has order 24. Hence when we choose an equivariant regular neighbourhood
N (Θ11 ) of Θ11 , we get an extendable action of order 24 on Σ3 ∼
= ∂N (Θ11 ).
8
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Similarly in T 3 ∼
= E 3 /Tn3 we have a graph Θ1n3 = Γ1 /Tn3 . Since Tn3 is a
normal subgroup of G 1 , G1n3 = G 1 /Tn3 acts on T 3 ∼
= E 3 /Tn3 preserving Θ1n3 .
χ(Θ1n3 ) = χ(Θ11 ) · V ol(E 3 /Tn3 ) = −2n3
|G1n3 | = |G11 | · V ol(E 3 /Tn3 ) = 24n3
Hence the genus of Θ1n3 is 2n3 + 1. Then we can get an extendable action
of order 24n3 on Σ2n3 +1 ∼
= ∂N (Θ1n3 ).
Notice that when m = 2n3 , 4n3 , n ∈ Z+ , Tm is also a normal subgroup
of G 1 . Similar to the above construction, we can get an extendable action
of order 24m on Σ2m+1 ∼
= ∂N (Θ1m ). Here Θ1m = Γ1 /Tm is a graph in
3
3
T ∼
= E /Tm .
In the above example the superscript 1 in Γ1 or Θ1m is equal to the volume
of the ‘minimal 3-torus’ E 3 /T1 . It is also equal to the number of vertices of
the graph Θ11 . In following examples we use similar notations.
Example 3.4. Let Γ2min be the graph in the unit cube [0, 1]3 in E 3 as in
Figure 3. It consists of four
(1/2, 1/2, 1/2) to (0, 0, 0), (0, 1, 1),
S edges from
2
2
(1, 0, 1), (1, 1, 0). Let Γ = t∈T2 t(Γmin ). One can check that it is connected
and is known to scientists as the bonding structure of diamond (dia in
[RCSR]). Figure 3 shows a fundamental region of T2 .
Figure 3. Γ2min in [0, 2] × [0, 1] × [0, 1]
Let H 2 = hry , rz , rxyz i. It is the orientation-preserving isometric group of
the regular tetrahedron formed by the convex hull of (1, 1, 1), (1, −1, −1),
(−1, 1, −1), and (−1, −1, 1) and has Schönflies symbol T . Let G 2 = hT2 , H 2 , t1/2 rxy i,
this is the space group F 41 32. Then G 2 preserves Γ2 .
Now in T 3 ∼
= E 3 /T2 we have a graph Θ22 = Γ2 /T2 . It has two vertices
and four edges, hence its Euler characteristic χ(Θ22 ) = −2 and its genus is
3. T2 is a normal subgroup of G 2 and G22 = G 2 /T2 has order 24. It acts on
T3 ∼
= E 3 /T2 preserving Θ22 . Hence when we choose an equivariant regular
neighbourhood N (Θ22 ) of Θ22 , we get an extendable action of order 24 on
Σ3 ∼
= ∂N (Θ22 ).
Similarly when m = n3 , 4n3 , 16n3 , n ∈ Z+ , in T 3 ∼
= E 3 /T2m we have a
2
2
graph Θ2m = Γ /T2m . One can check that T2m is a normal subgroup of G 2 ,
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
9
and the quotient G22m = G 2 /T2m acts on T 3 ∼
= E 3 /T2m preserving Θ22m .
χ(Θ22m ) = χ(Θ22 ) · V ol(E 3 /T2m )/V ol(E 3 /T2 ) = −2m
|G22m | = |G22 | · V ol(E 3 /T2m )/V ol(E 3 /T2 ) = 24m
Hence the genus of Θ22m is 2m + 1. Then we can get an extendable action
of order 24m on Σ2m+1 ∼
= ∂N (Θ22m ).
Example 3.5. Let γ be the graph in the unit cube [0, 1]3 in E 3 as in Figure 4. It has three edges from (1/4, 1/4, 1/4) to (0, 1/2, 1/4), (1/4, 0, 1/2)
and (1/2, 1/4, 0). Let Γ4min = γ ∪ t2y tz ry rz (γ) ∪ t2x ty tz ry (γ) ∪ t2x ty rz (γ).
S
Then let Γ4 = t∈T4 t(Γ4min ). One can check that it is connected, and is
the oft-rediscovered chiral vertex-transitive net of degree-3 known by many
names [HOP], including srs in [RCSR]. Figure 4 shows a fundamental region
of T4 .
Figure 4. Γ4min in [0, 2] × [0, 2] × [0, 1]
Let G 4 = hT4 , tx tz rz , ty tz ry , rxyz , tx t1/2 rxy i, it is the space group I41 32.
Then G 4 preserves Γ4 .
Now in T 3 ∼
= E 3 /T4 we have a graph Θ44 = Γ4 /T4 . It has four vertices
and six edges, hence its Euler characteristic χ(Θ44 ) = −2 and its genus is
3. T4 is a normal subgroup of G 4 and G44 = G 4 /T4 has order 24. It acts on
T3 ∼
= E 3 /T4 preserving Θ44 . Hence when we choose an equivariant regular
neighbourhood N (Θ44 ) of Θ44 , we get an extendable action of order 24 on
Σ3 ∼
= ∂N (Θ44 ).
Similarly when m = n3 , 2n3 , 4n3 , n ∈ Z+ , in T 3 ∼
= E 3 /T4m we have a
4
4
graph Θ4m = Γ /T4m . One can check that T4m is a normal subgroup of G 4 ,
and the quotient G44m = G 4 /T4m acts on T 3 ∼
= E 3 /T4m preserving Θ44m .
χ(Θ44m ) = χ(Θ44 ) · V ol(E 3 /T4m )/V ol(E 3 /T4 ) = −2m
|G44m | = |G44 | · V ol(E 3 /T4m )/V ol(E 3 /T4 ) = 24m
10
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Hence the genus of Θ44m is 2m + 1. Then we can get an extendable action
of order 24m on Σ2m+1 ∼
= ∂N (Θ44m ).
4. Knotted examples of the most symmetric surfaces
In the section we give a further six classes of examples realizing the upper
+
(Σg ) = 12(g − 1). In each case below the embedding is knotted.
bound of E+
The surface e(Σg ) does bound a handlebody in T 3 on one side, but the
complement of the handlebody is not a handlebody, and this will be clear
after the discussion of §5.
Constructions of the extendable actions and surfaces is similar to §4,
but here the graph Γ in E 3 can be disconnected. There is a space group G
preserving Γ and a rank three translation normal subgroup T in G so that the
graph Θ = Γ/T is connected. The finite group G = G/T acts on T 3 ∼
= E 3 /T
preserving Θ. Then we choose an equivariant regular neighbourhood N (Θ)
of Θ, and ∂N (Θ) is our surface Σg .
Example 4.1. Let Γ1,2 = Γ1 ∪ t1/2 (Γ1 ). The graph t1/2 (Γ1 ) can be thought
of as the dual of Γ1 in E 3 . Γ1,2 has two connected components and is named
pcu-c in [RCSR]. In the unit cube [0, 1]3 it is as in Figure 5.
Figure 5. Part of Γ1,2 in [0, 1]3
Let G 1,2 = hG 1 , t1/2 i, it is the space group I432, and let T1/2 = hT1 , t1/2 i =
{(a/2, b/2, c/2) | (a, b, c) ∈ T4 }. Then G 1,2 preserves Γ1,2 and T1/2 is a normal subgroup of G 1,2 . Since t1/2 changes the two components of Γ1,2 , the
3
1,2
3 ∼
graph Θ1,2
1/2 = Γ /T1/2 in T = E /T1/2 is connected. Its Euler character-
1,2
1,2 /T
istic χ(Θ1,2
1/2 has order 24. It
1/2 ) = −2 and its genus is 3. G1/2 = G
1,2
3
3
∼
acts on T = E /T1/2 preserving Θ1/2 . Hence when we choose an equivari-
1,2
ant regular neighbourhood N (Θ1,2
1/2 ) of Θ1/2 , we get an extendable action of
1,2
order 24 on Σ3 ∼
= ∂N (Θ ).
1/2
Similarly let Tn3 /2 = {(a/2, b/2, c/2) | (a, b, c) ∈ T4n3 }, n ∈ Z+ , 2 ∤ n.
Then the graph Θ1,2
= Γ1,2 /Tn3 /2 in T 3 ∼
= E 3 /Tn3 /2 is connected. Since
n3 /2
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
11
Tn3 /2 is a normal subgroup of G 1,2 , G1,2
= G 1,2 /Tn3 /2 acts on T 3 ∼
=
n3 /2
E 3 /Tn3 /2 preserving Θ1,2
.
n3 /2
3
3
3
χ(Θ1,2
) = χ(Θ1,2
1/2 ) · V ol(E /Tn3 /2 )/V ol(E /T1/2 ) = −2n
n3 /2
3
3
3
|G1,2
| = |G1,2
1/2 | · V ol(E /Tn3 /2 )/V ol(E /T1/2 ) = 24n
n3 /2
Hence the genus of Θ1,2
is 2n3 + 1. Then we can get an extendable action
n3 /2
∼ ∂N (Θ1,2
of order 24n3 on Σ2n3 +1 =
), here n ∈ Z+ , 2 ∤ n.
n3 /2
Example 4.2. Let Γ2,2 = Γ2 ∪ tx (Γ2 ). The graph tx (Γ2 ) can be thought
as the dual of Γ2 in E 3 . Γ2,2 has two connected components and is called
dia-c in [RCSR]. In the fundamental region of T2 it is as in Figure 6.
Figure 6. Part of Γ2,2 in [0, 2] × [0, 1] × [0, 1]
Let G 2,2 = hG 2 , tx i, it is the space group P 42 32. Then G 2,2 preserves Γ2,2
and contains T1 as a normal subgroup. Since tx changes the two components
3
2,2
3 ∼
of Γ2,2 , the graph Θ2,2
1 = Γ /T1 in T = E /T1 is connected. Its Euler
2,2
2,2 /T has order
characteristic χ(Θ2,2
1
1 ) = −2, and its genus is 3. G1 = G
2,2
3
3
∼
24. It acts on T = E /T1 preserving Θ1 . Hence when we choose an
2,2
equivariant regular neighbourhood N (Θ2,2
1 ) of Θ1 , we get an extendable
2,2
action of order 24 on Σ3 ∼
= ∂N (Θ1 ).
2,2
Similarly if m = n3 , 4n3 , n ∈ Z+ , 2 ∤ n, the graph Θ2,2
m = Γ /Tm in
3
3
∼
T = E /Tm is connected. One can check that Tm is a normal subgroup of
2,2 /T acts on T 3 ∼ E 3 /T preserving Θ2,2 .
G 2,2 , G2,2
=
m =G
m
m
m
2,2
3
χ(Θ2,2
m ) = χ(Θ1 ) · V ol(E /Tm ) = −2m
2,2
3
|G2,2
m | = |G1 | · V ol(E /Tm ) = 24m
Hence the genus of Θ2,2
m is 2m + 1. Then we can get an extendable action
2,2
of order 24m on Σ2m+1 ∼
= ∂N (Θm ), here m = n3 , 4n3 , n ∈ Z+ , 2 ∤ n.
Example 4.3. Let Γ4,4 = Γ4 ∪ tx (Γ4 ) ∪ ty (Γ4 ) ∪ tz (Γ4 ). Γ4,4 has four
connected components. In the unit cube [0, 1]3 in E 3 it is as in Figure 7.
12
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Figure 7. Part of Γ4,4 in [0, 1]3
One can check that G 2,2 defined in Example 4.2 (space group P 42 32)
3
4,4
3 ∼
preserves Γ4,4 , and the graph Θ4,4
1 = Γ /T1 in T = E /T1 is connected.
2,2
2,2 /T has
Its Euler characteristic χ(Θ4,4
1
1 ) = −2, and its genus is 3. G1 = G
4,4
3
3
∼
order 24. It acts on T = E /T1 preserving Θ1 . Hence when we choose an
4,4
equivariant regular neighbourhood N (Θ4,4
1 ) of Θ1 , we get an extendable
4,4
action of order 24 on Σ3 ∼
= ∂N (Θ1 ).
4,4
Similarly if m = n3 , 2n3 , n ∈ Z+ , 2 ∤ n, the graph Θ4,4
m = Γ /Tm in
4,4
2,2
T3 ∼
= E 3 /Tm preserving Θm .
= E 3 /Tm is connected. Gm acts on T 3 ∼
4,4
3
χ(Θ4,4
m ) = χ(Θ1 ) · V ol(E /Tm ) = −2m
2,2
3
|G2,2
m | = |G1 | · V ol(E /Tm ) = 24m
Hence the genus of Θ4,4
m is 2m + 1. Then we can get an extendable action
2,2
of order 24m on Σ2m+1 ∼
= ∂N (Θm ), here m = n3 , 2n3 , n ∈ Z+ , 2 ∤ n.
Example 4.4. Let Γ4,8 = Γ4,4 ∪ t1/2 (Γ4,4 ). It has eight connected components. In the unit cube [0, 1]3 it is as in Figure 8.
One can check that G 1,2 defined in Example 4.1 (space group I432) pre4,8
3 ∼
3
serves Γ4,8 , and the graph Θ4,8
1/2 = Γ /T1/2 in T = E /T1/2 is connected.
Its Euler characteristic is −2 and its genus is 3. The order 24 group G1,2
1/2
4,8
3
3
∼
acts on T = E /T1/2 preserving Θ1/2 . Hence when we choose an equivari-
4,8
ant regular neighbourhood N (Θ4,8
1/2 ) of Θ1/2 , we get an extendable action of
4,8
order 24 on Σ3 ∼
= ∂N (Θ ).
1/2
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
13
Figure 8. Part of Γ4,8 in [0, 1]3
Similarly for n ∈ Z+ , 2 ∤ n, the graph Θ4,8
= Γ4,8 /Tn3 /2 in T 3 ∼
=
n3 /2
1,2
4,8
E 3 /Tn3 /2 is connected. Gn3 /2 acts on T 3 ∼
= E 3 /Tn3 /2 preserving Θn3 /2 .
3
3
3
χ(Θ4,8
) = χ(Θ4,8
1/2 ) · V ol(E /Tn3 /2 )/V ol(E /T1/2 ) = −2n
n3 /2
3
3
3
|G1,2
| = |G1,2
1/2 | · V ol(E /Tn3 /2 )/V ol(E /T1/2 ) = 24n
n3 /2
is 2n3 + 1. Then we can get an extendable action
Hence the genus of Θ4,8
n3 /2
4,8
of order 24n3 on Σ2n3 +1 ∼
= ∂N (Θn3 /2 ), here n ∈ Z+ , 2 ∤ n.
Example 4.5. Let γ ′ be the graph in the unit cube [0, 1]3 in E 3 as in Figure
3. There are three edges from (1/4, 1/4, 1/4) to (0, 1/4, 1/2), (1/2, 0, 1/4),
(1/4, 1/2, 0), and three edges from (0, 3/4, 1/2) to (1/2, 3/4, 1), (1/2, 0, 3/4)
to (1, 1/2, 3/4) and (3/4, 1/2, 0) to (3/4, 1, 1/2) separately.
S
′ 2
′
2
′
2
′
′4
′4
Let Γ′4
min = γ ∪ty tz ry rz (γ )∪tx ty tz ry (γ )∪tx ty rz (γ ), and Γ =
t∈T4 t(Γmin ).
One can check that Γ′4 has 27 connected components, each is similar to a
mirror image of Γ4 . Figure 9 shows the part of Γ′4 in a fundamental region
of T4 .
By construction, G 4 (space group I41 32) preserves Γ′4 . And one can check
3
′4
′4
3 ∼
that Θ′4
4 = Γ /T4 in T = E /T4 is connected. Θ4 has four vertices and
six edges, hence it has Euler characteristic −2 and genus 3. The order24 group G44 acts on T 3 ∼
= E 3 /T4 preserving Θ′4
4 . Hence when we choose
an equivariant regular neighbourhood N (Θ′4
)
of
Θ′4
4
4 , we get an extendable
′4
action of order 24 on Σ3 ∼
).
∂N
(Θ
=
4
′4
Similarly when m = n3 , 2n3 , 4n3 , n ∈ Z+ , 3 ∤ n, the graph Θ′4
4m = Γ /T4m
4
3
4
3
∼
in T = E /T4m is connected. The quotient G4m = G /T4m acts on T 3 ∼
=
14
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Figure 9. Part of Γ′4 min in [0, 2] × [0, 2] × [0, 1]
E 3 /T4m preserving Θ′4
4m .
′4
3
3
χ(Θ′4
4m ) = χ(Θ4 ) · V ol(E /T4m )/V ol(E /T4 ) = −2m
|G44m | = |G44 | · V ol(E 3 /T4m )/V ol(E 3 /T4 ) = 24m
Hence the genus of Θ′4
4m is 2m + 1. Then we can get an extendable action
3
3
3
of order 24m on Σ2m+1 ∼
= ∂N (Θ′4
4m ), here m = n , 2n , 4n , n ∈ Z+ , 3 ∤ n.
√
Definition 4.6. Let tω = (−1/2, 3/2, 0). Define
Tnω2 = hntω , ntx , tz i,
ω
T3n
2 = h2ntω + ntx , ntω + 2ntx , tz i.
Define a rotation rω on E 3 as following:
√
√
1
1
3
3
rω : (x, y, z) 7→ (− x −
y,
x − y, z)
2
2
2
2
ω
T1 is the hexagonal 3D lattice and rω is a rotation by 2π/3 right-handed
with respect to the direction [0, 0, 1].
Example 4.7. Let P be a√regular hexagon in the xy-plane. It has center
a vertex, see Figure 10. Let ΓPmin be
(0, 0, 0) and contains (1/2, 3/6, 0) as S
the boundary of P in E 3 . Let ΓP = t∈T ω t(ΓPmin ). It contains infinitely
1
many connected components, and for each n ∈ Z, the horizontal plane
{(x, y, n) | x, y ∈ E 2 } contains exactly one of them. A local picture of ΓP is
as in Figure 11.
Let H ω = hrω , rx , ry i; it is the isometric group of P (Schönflies symbol
D6 ). Let G ω = hT1ω , H ω i, this is the space group P 622. Then G ω preserves
ΓP , and ΘP1 = ΓP /T1ω is a connected graph in T 3 ∼
= E 3 /T1ω . It has two
vertices and three edges, hence its Euler characteristic χ(Θω1 ) = −1 and
its genus is 2. Clearly Gω1 = G ω /T1ω acts on T 3 ∼
= E 3 /T1ω preserving ΘP1 ,
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
15
0.6
0.4
0.2
-0.4
0.2
-0.2
0.4
-0.2
-0.4
-0.6
Figure 10. A regular hexagon
Figure 11. A local picture of ΓP
and Gω1 ∼
= H ω has order 12. Hence when we choose an equivariant regular
neighbourhood N (ΘP1 ) of ΘP1 , we get an extendable action of order 12 on
Σ2 ∼
= ∂N (ΘP1 ).
ω is a normal subgroup of
Notice that when m = n2 , 3n2 , n ∈ Z+ , Tm
ω in T 3 ∼ E 3 /T ω is connected, and
G ω . Similarly the graph ΘPm = ΓP /Tm
=
m
3
ω
3
ω
ω
ω
∼
Gm = G /Tm acts on T = E /Tm preserving ΘPm .
ω
χ(ΘPm ) = χ(ΘP1 ) · V ol(E 3 /Tm
)/V ol(E 3 /T1ω ) = −m
ω
|Gωm | = |Gω1 | · V ol(E 3 /Tm
)/V ol(E 3 /T1ω ) = 12m
16
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Hence the genus of ΘPm is m + 1. Then we can get an extendable action of
order 12m on Σm+1 ∼
= ∂N (ΘPm ).
5. Minimal surfaces, space groups, proof of the main result
In this section we will finish the proof of Theorem 1.5. We need some
results about triply periodic minimal surfaces, space groups, and a lemma
given below.
There are three classical triply periodic minimal surfaces that admit high
symmetries: Schwarz’s P surface, Schwarz’s D [Schw] and Schoen’s gyroid
surface illustrated in Figure 12 [Br]. Denote them by SP , SD and SG . The
fundamental region for SD is a cube of volume 2, we redraw SD in the
fundamental region [0, 1] × [0, 2] × [0, 1] we used.
SD
SP
SG
Figure 12. Translational unit cells of the minimal surfaces
SP , and SD match the translational unit cells of their associated graphs, Γ1 , Γ2 , and are displayed with the same
viewing direction. The picture of SG above shows the cube
[0, 2] × [0, 2] × [0, 2], twice the region of that used to depict
Γ4 , but depicted with the same viewing direction.
The following results are known (and can be checked):
(a) Boundaries of equivariant regular neighbourhoods of Γ1 , Γ2 and Γ4 in
Example 3.3, 3.4 and 3.5 can be realized by SP , SD and SG respectively.
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
17
(b) SP , SD and SG are unknotted in T 3 . Actually, any genus g > 1
minimal orientable closed surface in T 3 must be unknotted,[Me].
The notations of space groups below come from [Ha].
(c) G 1 , G 2 , G 4 , G 1,2 and G 2,2 in Example 3.3, 3.4, 3.5, 4.1 and 4.2 are the
space groups [P 432], [F 41 32], [I41 32], [I432] and [P 42 32] respectively.
(d) SP , SD , SG are preserved by space groups [Im3̄m], [P n3̄m], [Ia3̄d]
respectively.
(e) We have the following index two subgroup sequences:
• [P 432] ⊂ [I432] ⊂ [Im3̄m]
• [F 41 32] ⊂ [P 42 32] ⊂ [P n3̄m]
• [I41 32] ⊂ [Ia3̄d]
Lemma 5.1. Let T be a lattice in E 3 , p : E 3 → T 3 = E 3 /T be the covering
map. Σg is an embedded surface in T 3 . If p−1 (Σg ) is not connected, then
Σg is knotted.
Proof. Note first, from the definition of unknotted embedding Σg ⊂ T 3 , the
induced map on the fundamental groups must be surjective. Let F be a
connected component of p−1 (Σg ). Let St(F ) be its stable subgroup in T ,
i.e., the lattice translations that preserve F . If p−1 (Σg ) has more than one
component then St(F ) 6= T , hence π1 (Σg ) → π1 (T 3 ) is not surjective. Hence
Σg is knotted in T 3 .
Proof of Theorem 1.5. By the above results (a) and (b), the surfaces in T 3
described in §3 are unknotted. Since Γ1,2 , Γ2,2 , Γ4,4 , Γ4,8 , Γ′4 and ΓP are
disconnected, by Lemma 5.1, the surfaces in T 3 described in §4 are knotted. Then by combining the Examples in §3 and §4, we finish the proof of
Theorem 1.5 (1).
Now we are going to prove Theorem 1.5 (2) and (3) based on the examples
in §3 and §4, and the results (c), (d) and (e) above.
For (2). Recall G 1 = [P 432]. Example 3.3 told us that when m =
n3 , 2n3 , 4n3 we have the action G 1 /Tm on Γ1 /Tm , or equivalently on SP /Tm
by (a), of order 24m. By (d) [Im3̄m] preserves SP . By (e), we have an order
96m extendable [Im3̄m]/Tm -action on SP /Tm ∼
= Σ2m+1 realizing the upper
bound of E(Σg ), where g = 2m + 1.
The group [Im3̄m]/Tm contains two elements h1 and h2 satisfying: h1
preserves the orientation of SP /Tm and reverses the orientation of E 3 /Tm ,
h2 reverses the orientation of SP /Tm and preserves the orientation of E 3 /Tm .
Then choosing the index two subgroups of [Im3̄m], h[P 432], h1 i and h[P 432], h2 i,
we get an extendable action on Σ2m+1 , realizing the upper bound of E+ (Σg )
and E + (Σg ) respectively. Now (2) is proved.
For (3). Recall G 2 = [F 41 32]. Example 3.4 told us that when m =
3
n , 4n3 , 16n3 we have the action G 2 /T2m on Γ2 /T2m , or equivalently on
SD /T2m by (a), of order 24m.
Similarly we also have an order 96m extendable [P n3̄m]/T2m -action on
SD /T2m ∼
= Σ2m+1 realizing the upper bound of E(Σg ), where g = 2m + 1.
18
SHENG BAI, VANESSA ROBINS, CHAO WANG, AND SHICHENG WANG
Furthermore if m = n3 , 4n3 , n ∈ Z+ , n odd, [P n3̄m]/T2m contains a translation h reversing an orientation of SD /T2m and preserving an orientation
of E 3 /T2m (see Example 4.2 for details, or better to see SD in Figure 12).
Modulo this translation we can get an order 48m extendable [P n3̄m]/Tm action on SD /Tm ∼
= Π2m+2 , realizing the upper bound 24(g − 2) of E(Πg ),
where g = 2m + 2. Then choosing the index two subgroup [P 42 32] = G 2,2 ,
we can get an extendable action on Π2m+2 , realizing the upper bound of
E + (Πg ). Now (3) is proved.
Remark 5.2. In the above discussion for (3), the regular neighbourhood
N (SD /Tm ) of SD /Tm is homeomorphic to a twisted [−1, 1]-bundle over
SD /Tm . Its complement in E 3 /Tm is essentially the regular neighbour2,2
hood N (Θ2,2
m ) of Θm in Example 4.2. Similarly for n ∈ Z+ , n odd, and
m = n3 /2, we can get an order 48m extendable [Im3̄m]/Tn3 /2 -action on
SP /Tn3 /2 ∼
= Π2n3 +2 , realizing the upper bound of E(Πg ). Choosing the
index two subgroup [I432], we can get an extendable action on Π2n3 +2 , realizing the upper bound of E + (Πg ). The regular neighbourhood N (SP /Tn3 /2 )
is homeomorphic to a twisted [−1, 1]-bundle over SP /Tn3 /2 . Its complement
in E 3 /Tn3 /2 is essentially the regular neighbourhood N (Θn1,2
3 /2 ) in Example
4.1. There is no similar construction for a regular neighbourhood of the
Gyroid minimal surface because there is no translation that reverses the
orientation of SG /T4 ; the handlebodies on each side of SG are mirror images
of one another.
References
[Br]
[FH]
[Ha]
[He]
[Hu]
[HBLL+]
[HOP]
[Me]
[MY]
[RCSR]
K. Brakke, Minimal surface page,
http://www.susqu.edu/brakke/evolver/examples/periodic/periodic.html
C. Frohman, J. Hass, Unstable minimal surfaces and Heegaard splittings. Invent. Math. 95 (1989), no. 3, 529-540.
T. Hahn (Ed.), International tables for crystallography, D. Reidel Publishing
Company, (2005).
J. Hempel, 3–manifolds, Princeton University Press, (1976).
A. Hurwitz, Über algebraische Gebilde mit eindeutigen Transformationen in
sich, Mathematische Annalen, 41(3) (1892), 403-442.
S.T. Hyde, Z. Blum, T. Landh, S. Lidin, B.W. Ninham, S. Andersson and
K. Larsson. The Language of Shape: The Role of Curvature in Condensed
Matter. New York, USA: Elsevier, (1996).
S.T. Hyde, M. O’Keeffe, D.M. Proserpio, A Short History of an Elusive Yet
Ubiquitous Structure in Chemistry, Materials, and Mathematics. Angewandte
Chemie Int. Ed. 47, (2008), 79968000.
W. H. Meeks, The conformal structure and geometry of triply periodic minimal
surfaces in R3 , Bull. Amer. Math. Soc. 83 (1977), no. 1, 134-136.
W. H. Meeks, S. T. Yau, The equivariant Dehn’s lemma and loop theorem,
Commentarii Mathematici Helvetici, 56(1) (1981), 225-239.
M. O’Keeffe, M.A. Peskov, S.J. Ramsden, O.M. Yaghi, The Reticular Chemistry Structure Resource (RCSR) Database of, and Symbols for Crystal Nets
Accts. Chem. Res. 41, (2008), 1782-1789.
THE MOST SYMMETRIC SURFACES IN THE 3-TORUS
19
[Schw]
H. A. Schwarz, Gesammelte Mathematische Abhandlungen. Bd 1, Berlin:
Springer, (1890).
[Scho]
A. H. Schoen, NASA Tech. Note No. D-5541, (1970)
[WWZZ1] C. Wang, S. C. Wang, Y. M. Zhang, B. Zimmermann, Extending finite group
actions on surfaces over S 3 . Topology Appl. 160, (2013), no. 16, 2088-2103.
[WWZZ2] C. Wang, S. C. Wang, Y. M. Zhang, B. Zimmerman, Maximal Orders of Extendable Finite Group Actions on Surfaces. Groups Geom. Dyn. 9 (2015), no.
4, 1001-1045.
[Zi]
B. Zimmermann, Uber Homomorphismen n-dimensionaler Henkelkrper und
endliche Erweiterungen von Schottky-Gruppen, Comment. Math. Helv. 56
(1981), 474-486.
School of Mathematical Sciences, Peking University, Beijing 100871, CHINA
E-mail address: [email protected]
Department of Applied Mathematics, Research School of Physics and Engineering, The Australian National University, Canberra, Australia
E-mail address: [email protected]
School of Mathematical Sciences, University of Science and Technology
of China, Hefei 230026, CHINA
E-mail address: chao wang [email protected]
School of Mathematical Sciences, Peking University, Beijing 100871, CHINA
E-mail address: [email protected]
| 4math.GR
|
HYPERGROUPS AND HYPERFIELDS IN UNIVERSAL ALGEBRA
arXiv:1604.03415v1 [math.GR] 11 Apr 2016
LOUIS ROWEN
Abstract. Hypergroups are lifted to power semigroups with negation, yielding a method of transferring
results from semigroup theory. This applies to analogous structures such as hypergroups, hyperfields,
and hypermodules, and permits us to transfer the general theory espoused in [19] to the hypertheory.
1. Introduction
This note, a companion to [19], grew out of a conversation with Matt Baker, in which we realized
that the “tropical hyperfield” of [3] and [22, §5.2] is isomorphic to the “extended” tropical arithmetic in
Izhakian’s Ph.D. dissertation (Tel-Aviv University) in 2005, also cf. [10, 11]. On the other hand, there are
many parallels between the two theories. This motivated us to see whether hyperfields in general also can
be studied by semiring theory, which fits in well with the theory of universal algebra, and which might
be more amenable for further study. Viewing a hyperfield as a group with additive structure on part of
its power set, we want to extend this structure to all of the power set, thereby making the definitions
tighter and “improving” the additive structure to make standard tools more available for developing an
algebraic theory.
Thus, the theme is to embed the category of hyperfields (and their modules) into the category of
semirings with negation (and their modules), as studied in [19], defined on power sets. The tricky part in
passing to the power set is distributivity, which must be weakened at times to a notion that we call “weak
distributivity,” and we thereby weaken “semiring” to “T -semiring,” where distributivity holds only with
respect to a special subset T . Then we can treat all hyperrings (not just hyperfields) in this context.
It turns out that the hyperrings of [3, 22] can be injected naturally into T -semirings, which are power
sets with a negation map, in the context of [19], whereby the hyperring is identified with the subset of
singletons. Then one can develop linear algebra over hyperfields, and also go through [3], making the
appropriate adjustments to view matroids over these semifields with negation.
In the other direction, Henry [9] has defined a hypergroup structure on symmetrized monoids.
1.1. Pre-semirings.
Semigroups need not have an identity element, but monoids do, and are usually written multiplicatively,
i.e. (A, ·, 1). We start with semirings, for which the standard reference is [7]. Since distributivity will
be weakened, we remove it (as well as the element 0) from the definition. We enrich a monoid with a
“hyper” operation (resembling addition).
Definition 1.1. A monoid (A, ·, 1) acts on a set S if there is a multiplication A × S → S satisfying
1s = s and (a1 a2 )s = a1 (a2 s) for all ai ∈ A and s ∈ S.
A pre-semiring (A, ·, +, 1) is a multiplicative monoid (A, ·, 1R ) also possessing the structure of an
additive Abelian semigroup (A, +), on which (A, ·) acts.
A pre-semifield is a pre-semiring (A, ·, +, 1) for which (A, ·, 1) is a group.
A premodule S over a monoid (A, ·, 1) is an Abelian group (S, +, 0) on which A acts, also satisfying
the condition:
r0M = 0M , ∀r ∈ R.
Date: April 13, 2016.
2010 Mathematics Subject Classification. Primary 16Y60, 12K10, 06F05, 14T05 Secondary 12K10, .
Key words and phrases. hyperfield, negation map, tropical algebra, tropical geometry, power set, semiring, supertropical
algebra.
1
2
L. ROWEN
A premodule S over a pre-semiring (A, ·, +, 1) is a premodule over the monoid (A, ·, 1), also satisfying
the condition:
• “Left distributivity”: (a1 + a2 )s = a1 s + a2 s, ∀ai ∈ A, ∀s ∈ S.
Then a semiring† (R, +, ·, 1R ) (without 0) would be a pre-semiring satisfying the usual distributive
laws. There are various versions of distributivity that will be relevant to us later.
Definition 1.2. Define the following notions, where (S, +) is a premodule over a pre-semiring (A, ·, +, 1),
for ai ∈ A and sj ∈ S:
(i) “Right distributivity”: a(s1 + s2 ) = as1 + as2 .
(ii) “Two-sided distributivity”: Left and right distributivity.
(iii) “Double distributivity”: (a1 + a2 )(s1 + s2 ) = a1 s1 + a2 s1 + a1 s2 + a2 s2 .
(iv) “Generalized distributivity”:
!
X
X
X
(ai sj ).
sj =
ai
i
j
i,j
Remark 1.3. The properties are in order of increasing formal strength although, by induction, double
distributivity implies generalized distributivity.
1.2. Motivation: Power sets of semigroups.
We let P(A) denote the power set of a set A, i.e., the set of subsets of A. The sets {a} for a ∈ A are
called singletons.
Theorem 1.4.
(i) Given a monoid (A, ·, 1), we can extend its operation to P(A) elementwise, by putting
S1 S2 = {s1 s2 : sj ∈ Sj }.
Then (P(A), ·) also is a monoid with the identity element {1}, on which A acts.
Given a semigroup (A, +), we can define addition elementwise on P(A) by defining
S1 + S2 = {s1 + s2 : sj ∈ Sj }.
Then (P(A), +) also is a semigroup.
Thus, when A is a pre-semiring (resp. semiring), so is P(A), and P(A) is an A-premodule via
the action
aS = {as : s ∈ S}.
(ii) More generally, the relevant concepts in universal algebra were outlined in [19, §2.3], including
signatures defined via operators and identical relations. We can lift operators from an (Ω; Id)algebra A to P(A), as follows: Given an operator ωm = ωm (x1 , . . . , xm ) on A, we define ωm on
P(A) via
ωm (S1 , . . . , Sm ) = {ωm (s1 , . . . , sm ) : sk ∈ Sk , 1 ≤ k ≤ m}.
Let us call an identical relation φ(x1 , . . . , xℓ ) = φ(x1 , . . . , xℓ ) multilinear if each xi appears
exactly once in the definition (via the operators). Then any multilinear identical relation holding
in A also holds in P(A).
Proof. (i) First we verify associativity:
(S1 + S2 ) + S3 = {a1 + a2 : aj ∈ Sj } + S3
= {(a1 + a2 ) + a3 : aj ∈ Sj }
= {a1 + (a2 + a3 ) : aj ∈ Sj }
= S1 + {a2 + a3 : aj ∈ Sj }
= S1 + (S2 + S3 ).
For generalized distributivity we have:
(1.1)
HYPERGROUPS AND HYPERFIELDS
X
Si
X
Tj =
(
mi
XX
aik : aik ∈ Si
ik k=1
=
X
)
nj
X X
3
bjℓ : bjℓ ∈ Tj
jℓ ℓ=1
aik bjℓ : aik ∈ Si , bjℓ ∈ Tj
i,j,k,ℓ
=
X
(1.2)
Si T j .
(ii) We generalize the proof in (i). By an easy induction applied to [19, Definition 2.12], any formula
φ(x1 , . . . , xℓ ) satisfies
φ(S1 , . . . , Sℓ ) = {φ(s1 , . . . , sℓ ) : sj ∈ Sj },
and thus any multilinear identical relation φ = ψ holding elementwise in A also holds set-wise in P(A).
In particular, distributivity and generalized distributivity lift from a semiring A to P(A). When the
relation is not multilinear we encounter difficulties due to repetition. For example, being a group does not
lift/ Indeed, the defining identical relation xx−1 = 1 is quadratic in x; here we are defining the inverse as
a unary operation ω1 : x 7→ x−1 , so the left side is xω1 (x). In fact the only invertible elements in P(A)
are the singletons.
1.3. Hypermonoids and semirings.
The next step is to formulate all of our extra structure in terms of addition (and possibly other
operations) on P(A) as a premodule over A. But this is not as easy when A itself is not a semiring, so
let us pause to review hypermonoids, to see just how much of the semiring structure we would need.
The “intuitive” definition: A hypermonoid should be a triple (A, ⊞, 0) where ⊞ : A × A → P(A), and
the analog of associativity holds:
(a1 ⊞ a2 ) ⊞ a3 = a1 ⊞ (a2 ⊞ a3 ),
∀a ∈ A.
There is a fundamental difficulty in this definition — a1 ⊞ a2 is a set, not an element of A, so
technically (a1 ⊞ a2 ) ⊞ a3 is not defined. This difficulty is exacerbated when considering generalized
associativity; for example, what does (a1 ⊞ a2 ) ⊞ (a3 ⊞ a4 ) mean? We rectify this by passing to P(A).
Definition 1.5. A hypermonoid is a triple (A, ⊞, 0) where
(i) ⊞ is a commutative binary operation A × A → P(A), which also is associative in the sense that
if we define
a ⊞ S = ∪s∈S a ⊞ s,
then (a1 ⊞ a2 ) ⊞ a3 = a1 ⊞ (a2 ⊞ a3 ) for all ai in A.
(ii) 0 is the neutral element.
We always think of ⊞ as a sort of addition.
We write à for {a1 ⊞ a2 : ai ∈ A}. Note that {a} = a ⊞ 0 ∈ Ã. Thus there is a natural embedding
A ֒→ Ã given by a 7→ {a}, and we can transfer the addition to P(A) by defining
{a1 } ⊞ {a2 } = a1 ⊞ a2 .
By definition, the hypermonoid is not closed under repeated addition, which makes it difficult to check
basic identical relations such as associativity.
Many hypermonoids satisfy the extra property:
Property P. a, b ∈ a ⊞ b whenever a ⊞ b is not a singleton.
A hyperinverse of an element a in a hypermonoid (A, ⊞, 0) is an element denoted as −a, for which
0 ∈ a ⊞ (−a).
A hyperzero of a hypermonoid (A, ⊞, 0) is an element of the form a ⊞ (−a) ⊆ P(A).
A hypergroup is a hypermonoid (A, ⊞, 0), satisfying the extra property:
Every element a ∈ A has a unique hyperinverse.
By [9, §2], any hypergroup satisfies the condition:
4
L. ROWEN
(Reversibility) If a ∈ b ⊞ c,
then c ∈ a ⊞ (−b).
In [22, Definition 3.1] Viro calls this a multigroup.
Definition 1.6. A hypermodule over a monoid (A, ·, 1) is a hypermonoid (M, ⊞, 0) together with an
action of A on M such that distributivity holds for M over A.
A hyperring (A, ·, ⊞, 0) is a hypermonoid (A, ⊞, 0) which also is a hypermodule over (A, ·, 1).
In other words, a hyperring is an additive hypermonoid which also is a monoid with respect to an
associative multiplication that distributes over addition; we have the two operations · on A and ⊞ : A → Ã,
with distributivity holding on the elements of A.
A hyperfield is a hyperring (A, ·, ⊞, 0), with (A, ·) a group.
[12, Definition 2.3] defines a hypermonoid morphism to be a map f : A1 → A2 of hypergroups,
satisfying f (a ⊞ b) ⊆ f (a) ⊞ f (b). This yields the category of hypergroups and their morphisms, which
matches the definition of morphism in [19].
Here are some easy instances in which associativity fails in P(A).
Example 1.7. Consider the natural max-plus algebra.
(i) Define a ⊞ b = sup{a, b}, a 6= b, and
a ⊞ a = {0, 9}.
Then each element has a unique hyperinverse, itself, and this is associative on distinct single
elements (taking their max) but (2 ⊞ 2) ⊞ 5 = {0, 9} ⊞ 5 = {5, 9} whereas 2 ⊞ (2 ⊞ 5) = 5.
(ii) Define a ⊞ b = sup{a, b}, a 6= b, and
a ⊞ a = {−a, 0, a}.
Again each element has a unique hyperinverse, itself, and now
(2 ⊞ 3) ⊞ 3 = 3 ⊞ 3 = {−3, 0, 3};
2 ⊞ (3 ⊞ 3) = 2 ⊞ {−3, 0, 3} = {2, 2, 3}.
Lemma 1.8. If (A, ·, 1) is a monoid and (A, ⊞, 0) is a hypermonoid, then A acts on à via the action
aS = {as : s ∈ S}.
(1.3)
.
Proof. (a1 a2 )S = {(a1 a2 )s : s ∈ S} = {a1 (a2 s) : s ∈ S} = a1 (a2 S).
1.4. The power set of a hyperfield.
To proceed further, we need associativity at the level of sets, and we need the following definition to
make this precise (and hopefully more manageable, since then we can do all the calculations in the power
set).
Definition 1.9. Every operator ω on A is extended to an element-compatible operator on P(A), in
the sense that
[
ωm (S1 , . . . , Sm ) = {ωm (s1 , . . . , sm ) : sk ∈ Sk , 1 ≤ k ≤ m}.
(1.4)
If (A, ⊞, 0) is a hypermonoid, then P(A) is a monoid with respect to a commutative associative binary
operation P(A) × P(A) → P(A), compatible with the operation on singletons, in the sense that
[
S1 ⊞ S2 =
{{s1 } ⊞ {s2 } : si ∈ Si }
(1.5)
à is the subset of P(A) containing all singletons and their sums. ({0} is the neutral element.)
Lemma 1.10. For any multiplicative monoid A, any invertible element of P(A) must be a singleton.
HYPERGROUPS AND HYPERFIELDS
5
Proof. If S has two elements s1 , s2 and is invertible, then S −1 contains s1 −1 and s2 −1 , implying 1 =
s1 −1 s2 , i.e., s1 = s2 .
Theorem 1.4 generalizes easily to:
Theorem 1.11. Given a hyperfield (A, ⊞, 0), we can define addition elementwise on P(A) by means of
(1.5). Then (P(A), ⊞) is a monoid, whose identity element is {0}. In this case A \ {0} (viewed as the set
of singletons) is the set of invertible elements of P(A).
Proof. We need to verify associativity, repeating the proof of Theorem 1.4, replacing + by ⊞.
[
(S1 ⊞ S2 ) ⊞ S3 = {s1 ⊞ s2 : sj ∈ Sj } ⊞ S3
[
= ((s1 ⊞ s2 ) ⊞ s3 ) : sj ∈ Sj }
[
= (s1 ⊞ (s2 ⊞ s3 )) : sj ∈ Sj }
[
= S1 ⊞ {s2 ⊞ s3 : sj ∈ Sj }
(1.6)
= S1 ⊞ (S2 ⊞ S3 ).
The set of invertible elements of P(A) must be contained in the set of singletons of P(A), which is A.
For any finite set S = {s1 , . . . , sm } ⊂ P(A), we write ⊞S for s1 ⊞ · · · ⊞ sm , which makes sense since
we already have associativity of ⊞.
Remark 1.12. Viro showed that the general transition of universal relations to P(A) is not as straightforward as it may seem. The analogous argument to Theorem 1.11 unravels for hyperrings, since distributivity does not pass from elements to sets:
(i) [22, Theorem 4.B] (a ⊞ b)(c ⊞ d) ⊆ (ac) ⊞ (ad) ⊞ (bc) ⊞ (bd) in any hyperring; the same argument
shows that (⊞S)(⊞T ) ⊆ ⊞(ST ) for any finite sets S, T ;
(ii) [22, Theorem 5.B] Recall Viro’s “triangle” hyperfield, defined over R+ by the formula
a ⊞ b = {c ∈ R+ : |a − b| ≤ c ≤ a + b}.
In other words, c ∈ a ⊞ b iff there exists an Euclidean triangle with sides of lengths a, b, and c.
The “triangle” hyperfield R does not satisfy “double distributivity,” so P(R) is not distributive.
In other words, the analog of Theorem 1.4 fails for distributivity. To overcome this setback, we need
to modify our underlying algebraic structure both at the hyper level and the power set level, the crux of
the matter being to weaken generalized distributivity on sets.
Actually, many of the important examples of hyperfields are doubly distributive, so we could pass to
(distributive) power semirings without further ado. But even in the absence of doubly distributivity, we
can formulate the weaker theory in terms of universal algebra, in order to have those techniques at our
disposal. On the face of it, this is problematic since the hypersum set could be arbitrarily large. However,
we can get around this by focusing on the monoid of singletons, and using operators instead of elements.
1.5. Pre-semirings. Motivated by the fact that a hyperring is a multiplicative monoid, we bring in the
following definition, keeping the power set in mind:
Definition 1.13. A pre-semiring† is a set (A, +, ·, 1R ) for which (A, +) is an additive Abelian semigroup and (A, ·, 1R ) is a multiplicative monoid but not necessarily satisfying the usual distributive laws.
Given a pre-semiring† A and a (distinguished) multiplicative submonoid T , an (A, T )-module is a
premodule over A that also satisfies the distributivity conditions for ri ∈ T and ai ∈ M :
(i) (r1 + r2 )a = r1 a + r2 a,
(ii) r(a1 + a2 ) = ra1 + ra2 ,
In line with [11], we call T tangible. When these conditions hold for A, we then call (A, T ) a
T -semiring† .
6
L. ROWEN
This can be described in the framework of universal algebra, with elaboration and details given in [19,
§ 5]. We define the left multiplication maps ℓr : M → M by ℓr (a) = ra, a unary operator for each r ∈ T ,
and rewrite these rules as the identical relations
(i) ℓr1 +r2 (x) = ℓr1 (x) + ℓr2 (x),
(ii) ℓr (x1 + x2 ) = ℓr (x1 ) + ℓr (x2 )
Example 1.14. For any hyperring T , taking P (T ), T ) is a T -semiring† .
1.5.1. The categorical approach.
We can improve these results slightly by working in a category with a weaker definition of morphism.
Definition 1.15. Multiplication weakly distributes over addition in a subset S ⊆ P(T ) if for all finite
S, T ⊆ S we have
(⊞S)(⊞T ) ⊆ ⊞(ST ).
(1.7)
In this case we call P(T ) a weak power semiring. (It is not a semiring.)
The restriction of this definition to hyperrings is:
Definition 1.16. Suppose (T , ·) is a monoid and (T , ⊞) a hypermonoid. Multiplication weakly distributes over ⊞ in T if for all ai , b ∈ T we have
(⊞i ai )b ⊆ ⊞i (ai b).
(1.8)
In this case we call T a weak hyperring.
Proposition 1.17. Suppose T is a hyperring. Then multiplication weakly distributes over ⊞ in P(T ).
Proof. We need to verify (1.7). But writing S = {s1 , . . . , sm } we have
[
[
⊞(si T ) ⊆ ⊞(ST )
(⊞S)(⊞T ) = (⊞si )T =
i
i
since each si T ⊆ ⊞ST.
The reverse inclusion fails since we simultaneously encounter varying si T when i varies. Thus, we are
interested in weak power semirings which, strictly speaking, are not quite semirings. So far, the power
set of a hyperring is a weak power semiring. Now we repeat the proof of [22, Theorem 4.B], to show that
at the bottom level we have not lost anything.
Theorem 1.18. Suppose T is a weak hyperring. If (T , ·) also is a group, then T is a hyperring, which
can be identified with the set of singletons of P(T ).
Proof. As in [22, Theorem 4.A], to obtain distributivity, we need to reverse the inequality (1.7) when
S = {a} is a singleton {a}, given multiplicative inverses in T . But
⊞(aT ) = aa−1 (⊞(aT )) ⊆ a(⊞a−1 aT ) = a ⊞ T.
Thus, the theory of hyperfields embeds into the theory of weak power semirings.
Definition 1.19. A weak morphism of weak power semirings is a multiplicative homomorphism f :
P(T1 ) → P(T2 ), satisfying
f (S1 ⊞ S2 ) ⊆ f (S1 ) ⊞ f (S2 ).
By induction, we have f (⊞S) ⊆ ⊞f (S) for any finite set S, and thus for arbitrary S. This is described
in universal algebra in [19, Definition 5.4]. Note that the multiplicative version yields equality, since if
f ({a})f ({b}) ⊆ f ({ab}), then f ({a})f ({b}) = f ({ab}) since they are both singletons, so f (a)f (b) = f (ab).
HYPERGROUPS AND HYPERFIELDS
7
1.6. Weak power modules.
As often is the case, one gets a deeper understanding by turning to modules. This was done in [3,
Definition 2.18], but we take a slightly weaker definition in line with our earlier categorical considerations.
Definition 1.20. Suppose that P(T ) is a weak power semiring. A weak module over P(T ) is a set M
with an element 0M such that (P(M ), ⊞M , 0M ) is a monoid with scalar multiplication T × P(M ) → P(M )
satisfying the following for all Si ⊆ T and T ⊆ M :
(i) (S1 S2 )T = S1 (S2 T );
(ii) (⊞T S)(⊞M T ) ⊆ ⊞(ST );
(iii) r0M = 0M for all r in T ;
(iv) 0R a = 0M , ∀a ∈ M.
This leads to a slight modification for hypermodules:
Definition 1.21. A weak hypermodule over a weak hyperring (R, ⊞R , 0R ) is a hypergroup (M, ⊞M , 0)
together with a binary operation R × M → P(M ) satisfying the following properties for all r, ri ∈ R and
a, aj ∈ M :
(i) (r1 r2 )a = r1 (r2 a);
(ii) (⊞i ri )(⊞j aj ) ⊆ ⊞i,j (ri aj );
(iii) r0M = 0M ;
(iv) 0R a = 0M .
As before, {⊞S : finite S ⊆ M } is a submodule of P(M ).
Definition 1.22. A weak module morphism is a map f : P(M ) → P(N ) of weak modules, satisfying
f (rS1 ) ⊆ rf (S1 );
f (S1 ⊞ S2 ) ⊆ f (S1 ) ⊞ f (S2 ),
∀Si ⊆ M.
The weak module morphism is an example of a morphism as given in [19].
Theorem 1.23. Suppose P(R) is a weak power semiring and (R, ·) also is a group. If M is a weak
module over P(R), then M is an R-module.
Proof. We repeat the proof of Theorem 1.18. First we show that f (rS) = rf (S), i.e., rf (s) = f (rs) ∈
f (rS). for all r ∈ R and s ∈ S. Indeed,
rf (s) = rf (r−1 rs) ⊆ rr−1 f (rs) = f (rs).
To obtain distributivity, we need to reverse the inclusion (1.7), given multiplicative inverses in R.
Taking S = {a} to be a singleton, we are given
⊞(aT ) = aa−1 (⊞(aT )) ⊆ a(⊞(a−1 aT )) = a ⊞ T.
Taking f to be left multiplication by an element a ∈ R, we have a(⊞S) ⊆ ⊞(aS) which is precisely
weak distributivity. In other words, M is weakly distributive over R iff left multiplication is a weak
module morphism, for every element r ∈ R. When (R, ·) is a group, M is distributive over R.
1.6.1. Negation maps.
We also want to treat negation maps from [19, §4] in this perspective. We review the definition.
Definition 1.24. A negation map on an additive semigroup (A, +) is a semigroup homomorphism
(−) : A → A of order ≤ 2, again written a 7→ (−)a.
(Thus (−)(a + b) = (−)a + (−)b.) For all other operators, including multiplication, we have a different
perspective:
Definition 1.25. A negation map (−) : A → A on an operator ωm,j (other than addition) satisfies
(−)ωm,j (a1 , . . . , au−1 , au , au+1 , . . . , am ) = ωm,j (a1 , . . . , au−1 , (−)au , au+1 , . . . , am )
for each au ∈ Au , 1 ≤ u ≤ m.
(1.9)
8
L. ROWEN
Lemma 1.26. Any negation map on A induces a negation map on P(A), via (−)S = {(−)s : s ∈ S}.
Proof. A special case of Theorem 1.4(ii), viewing the properties of the negation map as identical relations.
To see that (−)(a1 + a2 ) = (−)a1 (−)a2 , note that 0 ∈ ai (−)ai for i = 1, 2, so
0 ∈ a1 (−)a1 + a2 (−)a2 = (a1 + a2 )(−)a1 (−)a2 .
Likewise, 0 ∈ a1 (−)a1 implies 0 ∈ a(a1 (−)a1 ) ∈ aa1 (−)aa1 .
When T is a hyperfield, (A, T ) is a T -semiring† with the negation map a 7→ (−)a. In this way we have
embedded the theory of hyperfields into the theory of T -semirings† with a negation map. This is pushed
even further in [19, §7.9].
1.7. Major examples.
Let us see how all of this applies to the major examples of [3]. Since these examples are so important,
we will pay special attention to the set T̃ corresponding to a hyperring T . Although the theory presented
above formally passes to the weak power semiring P(T ), one actually gets distributivity in P(T ) when
the underlying hyperring satisfies generalized distributivity, which happens in many of the examples.
Even better, we can often identify P(T ) with a semiring which we already recognize.
Many of the “good” examples can be put in the framework of [3, Remark 2.7].
Example 1.27. Let R be a commutative semiring. Any multiplicative monoid T , together with a surjection of multiplicative monoids ϕ : R → T , has an induced hyperring structure given by the hyperaddition
law
a1 ⊞ a2 := ϕ(ϕ−1 (a1 ) + ϕ−1 (a2 )).
This extends naturally to P(T ), via
S1 ⊞ S2 := ϕ(ϕ−1 (S1 ) + ϕ−1 (S2 )).
Generalized distributivity on P(T ) and thus on T̃ , is inherited from generalized distributivity on P(R).
Explicitly, for ai ∈ S and bj ∈ T, we have
X
X
X
X
ϕ(ϕ−1 (ai bj )) ⊆ ⊞(ST ),
ϕ(ϕ−1 (ai )ϕ−1 (bj )) =
ϕ(ϕ−1 (bj )) =
ϕ(ϕ−1 (ai ))
(⊞i ai )(⊞j bj ) =
i,j
i,j
j
i
(1.10)
yielding ⊞S ⊞ T ⊆ ⊞(ST ). For the opposite direction, given ⊞i,j ai bj ∈ ⊞(ST ), we reverse (1.10) to get
X
X
X
ϕ(ϕ−1 (bj )) ∈ (⊞S)(⊞T ).
ϕ(ϕ−1 (ai ))
ϕ(ϕ−1 (ai bj )) =
i,j
i
j
Thus P(T ) is a semiring, and its theory can be embedded into semiring theory.
The complications arise when Example 1.27 is not applicable, cf. (vii), (viii) of the next example.
Example 1.28.
J
The tropical hyperfield. Define R∞ = R ∪ {−∞} and define the product a b := a + b and
(
max(a, b) if a 6= b,
a⊞b=
{c : c ≤ a} if a = b.
Thus 0 is the multiplicative identity element, −∞ is the additive identity, and we have a hyperfield
(satisfying Property P), called the tropical hyperfield.
Proposition 1.29. This is easily seen to be isomorphic (as hyperfields) to Izhakian’s extended tropical
arithmetic [10], further expounded as supertropical algebra in [11], where we identify (−∞, a] :=
{c : c ≤ a} with aν , so we have a natural hyperfield isomorphism of this tropical hyperfield with the
d
sub-semiring R
∞ of P(R∞ ), because
b : b > a;
(−∞, a] + b = (−∞, a] : b = a
(−∞, b] ∪ (b, a] = (−∞, a] : b < a.
HYPERGROUPS AND HYPERFIELDS
9
This isomorphism is as semirings. Thus Example 1.27 is applicable.
Example 1.30. The Krasner hyperfield. Let K = {0; 1} with the usual operations of Boolean algebra,
except that now 1 ⊞ 1 = {0; 1}. The Krasner hyperfield satisfies Property P. Again, this generates a subsemiring of P(K) having three elements, and is just the supertropical algebra of the monoid K, where we
identify {0; 1} with 1ν . Example 1.27 is applicable.
Example 1.31. Valuative hyperfields ([3, Example 2.12]) also are isomorphic to the extended semirings
in the sense of [11], in the same way.
Example 1.32. (Hyperfield of signs) Let S := {0, 1, −1} with the usual multiplication law and hyperaddition defined by 1 ⊞ 1 = {1}, −1 ⊞ −1 = {−1}, x ⊞ 0 = 0 ⊞ x = {x}, and 1 ⊞ −1 = −1 ⊞ 1 = {0, 1, −1}.
Then S is a hyperfield (satisfying Property P), called the hyperfield of signs.
In this case, though, we have a natural interpretation for P(S) :
(i) {+1} means “positive,” denoted as >0 .
(ii) {−1} means “negative,” denoted as <0 .
(iii) {0} means “neutral.”
(iv) {0, +1} means “non-negative,” denoted as ≥0 .
(v) {0, −1} means “non-positive,” denoted as ≤0 .
(vi) S = {−1, 0, 1} means “could be anything”
(Note that we have not denoted {−1, +1}.)
Then we have the familiar identifications:
(i) >0 +0 = >0 + ≥0 = >0 + >0 = >0 ;
(ii) ≥0 +0 = ≥0 + ≥0 = ≥0 ;
(iii) 0 + 0 = 0;
(iv) ≤0 +0 = ≤0 + ≤0 = ≤0 ;
(v) <0 +0 = <0 + ≤0 = <0 + <0 = <0 ;
(vi) >0 + <0 = ≥0 + <0 = >0 + ≤0 = ≥0 + ≤0 = S+ <0 = S + 0 = S+ >0 = S+ ≤0 =
S+ ≥0 = S.
These six elements constitute the sub-semiring S̃ of P(S).
Example 1.33. The “triangle” hyperfield A of Remark 1.12 is not doubly distributive but does satisfy
2
1
Property P since |a − b| ≤ a ≤ a + b. Here à = {[a1 , a2 ] : a1 ≤ a2 } since [a1 , a2 ] = a1 +a
+ a2 −a
∈ Ã.
2
2
b
b
◦
Any interval [0, b] is in P(A) , since [0, b] = [0, 2 ] + [0, 2 ].
Example 1.34. The phase hyperfield. Let S 1 denote the complex unit circle, and P := S 1 ∪ {0}. We say
that points a and b are antipodes if a = −b. Multiplication is defined as usual (so corresponds on S 1 to
addition of angles). We call an arc of less than 180 degrees short. The hypersum is given by
all points in the short arc from a to b if a 6= b;
a ⊞ b = {−a, 0, a} if a, b are antipodes;
{a} if b = 0.
Then P is a hyperfield (satisfying Property P), called the phase hyperfield. At the power set level, given
T1 , T2 ⊆ S 1 , one of which having at least two points, we define T1 ⊞ T2 to be the union of all (short) arcs
from a point of T1 to a non-antipodal point in T2 (which together makes a connected arc), together with
{0} if T2 contains an antipode of T1 . Note that any arc of S 1 can be obtained by taking T1 to be a single
point in the middle and T2 to be the two endpoints.
f1 of P(S 1 ) is the set of short arcs, possibly with {0} adjoined. This is not a subIn other words, S
semiringl for this we need the set of all arcs, where ⊞ is concatenation (and filling in the rest of S 1 if the
arcs go more than half way around), and adjoining {0} if the arcs contain an antipode.
Double distributivity fails, when we take a1 and a2 almost to be antipodes, b1 = a2 , and the arc
connecting b1 and b2 just passes the antipode of a1 ; then (a1 ⊞ a2 )(b1 ⊞ b2 ) is the arc from a1 to b2 , a
little more than a semicircle, whereas a1 b1 ⊞ a1 b2 ⊞ a2 b2 is already all of S 1 .
Viro [22] also has a somewhat different version, which is not distributive.
10
L. ROWEN
Example 1.35. Here is another example, suggested by Lopez, also cf. [13]. Consider R, with addition
given by a ⊞ b and b ⊞ a (for a ≤ b) to be the interval [a, b]. This extends to addition on intervals, given by
[a1 , b2 ] + [a2 , b2 ] = {min(a1 , a2 ), max(b1 , b2 )}, which clearly is associative. But the inverse is not unique,
since a + (−a) = [−a, a] contains 0, but so does a2 + a. On the other hand, this does satisfy the restriction
that every set of the form a + (−a) cannot be of the form a + (−b) for b 6= a, so if we modify the condition
of quasi-inverse to stipulate that a + (−a) must be of the form c + (−c) for some c, then it is unique.
This is essentially the general condition set forth in [19].
References
[1] M. Akian, S. Gaubert, and A. Guterman. Linear independence over tropical semirings and beyond. In Tropical and
Idempotent Mathematics, G.L. Litvinov and S.N. Sergeev, (eds.), Contemp. Math., 495:1–38, 2009.
[2] M. Akian, S. Gaubert, and A. Guterman. Tropical Cramer determinants revisited. In Tropical and idempotent mathematics and applications, Contemp. Math. 616, 1–45. Amer. Math. Soc., Providence, RI, 2014.
[3] M. Baker. Matroids over hyperfields, arXiv:1601.01204v2 [math.CO], 2016.
[4] G. Blachar and L. Rowen Symmetrized rank of matrices
[5] A. Connes and C. Consani, From monoids to hyperstructures: in search of an absolute arithmetic. In Casimir Force,
Casimir operators, and the Riemann hypothesis,, Walter de Gruyter, Berlin, 147–198, 2010.
[6] S. Gaubert, Théorie des systèmes linéaires dans les dioı̈des. PhD dissertation, School of Mines. Paris, July 1992.
[7] J. Golan, Semirings and their Applications, Springer-Science + Business, Dordrecht, 1999. (Previously published by
Kluwer Acad. Publ., 1999.)
[8] M. Gondran and M. Minoux. Graphs, dioids and semirings, volume 41 of Operations Research/Computer Science
Interfaces Series. Springer, New York, 2008.
[9] Henry
[10] Z. Izhakian. Tropical arithmetic and matrix algebra. Comm. in Algebra 37(4):1445–1468, 2009.
[11] Z. Izhakian and L. Rowen. Supertropical algebra. Adv. in Math., 225(4):2222–2286, 2010, Preprint at arXiv:0806.1175,
2007.
[12] J. Jaiung, Algebraic geometry over hyperrings. Preprint. Available at arxiv:math.AG/1512.04837, 37 pages, 2015.
[13] M. Gómez, S. López-Permouth , F. Mazariegos, A.J. Vargas De León, and R.Z. Cifuentes, Group Structures on Families
of Subsets of a Group, arXiv:1604.01119 [math.GR], 2015.
[14] A. Niv. On pseudo-inverses of matrices and their characteristic polynomials in supertropical algebra, Linear Algebra
Appl. 471: 264–290, 2015.
[15] A. Niv. Factorization of tropical matrices, J. Algebra Appl., 13(1):1350066:1–26, 2014.
[16] M. Plus. Linear systems in (max; +)-algebra. In Proceedings of the 29th Conference on Decision and Control, Honolulu,
Dec. 1990.
[17] C. Reutenauer and H. Straubing, Inversion of matrices over a commutative semiring, J. Algebra, 88, 350-360, 1984.
[18] L.H. Rowen. Graduate algebra: A noncommutative view Semigroups and Combinatorial Applications. American Mathematical Society, 2008.
[19] L.H. Rowen. Algebras with a negation map, originally entitled Symmetries in tropical algebra, arXiv:1602.00353
[math.RA], 2016.
[20] D.E. Rutherford. Inverses of Boolean matrices, Proceedings of the Glasgow Mathematical Association 6 (1963), 49–53.
[21] H. Straubing. A combinatorial proof of the Cayley-Hamilton theorem. Discrete Math., 43(2-3):273-279, 1983.
[22] O.Y. Viro. Hyperfields for Tropcial Geometry I. Hyperfields and dequantization. ArXiv AG/1006.3034, 2010.
Department of Mathematics, Bar-Ilan University, Ramat-Gan 52900, Israel
E-mail address: [email protected]
| 0math.AC
|
General Video Game AI: a Multi-Track Framework
for Evaluating Agents, Games and Content
Generation Algorithms
arXiv:1802.10363v1 [cs.AI] 28 Feb 2018
Diego Perez-Liebana, Jialin Liu, Ahmed Khalifa, Raluca D. Gaina, Julian Togelius, Simon M. Lucas
Abstract—General Video Game Playing (GVGP) aims at
designing an agent that is capable of playing multiple video
games with no human intervention. In 2014, The General Video
Game AI (GVGAI) competition framework was created and
released with the purpose of providing researchers a common
open-source and easy to use platform for testing their AI
methods with potentially infinity of games created using Video
Game Description Language (VGDL). The framework has been
expanded into several tracks during the last few years to meet the
demand of different research directions. The agents are required
to either play multiples unknown games with or without access
to game simulations, or to design new game levels or rules.
This survey paper presents the VGDL, the GVGAI framework,
existing tracks, and reviews the wide use of GVGAI framework
in research, education and competitions five years after its birth.
A future plan of framework improvements is also described.
I. I NTRODUCTION
Game-based benchmarks and competitions have been used
for testing artificial intelligence capabilities since the inception
of the research field. For the first four or five decades,
such testing was almost exclusively based on board games.
However, since the early 2000s a number of competitions
and benchmarks based on video games have sprung up. The
more well-known include the Ms Pac-Man competition [1],
the Mario AI competition [2], the Simulated Car Racing
competition [3], the Arcade Learning Environment [4] and the
StarCraft [5] competitions.
So far, most competitions and game benchmarks challenge
the agents to play a single game (an exception is the Arcade Learning Environment which contains several dozens
of games, but so far almost all published studies deal with
learning agents for one game at a time). This leads to an overspecialization, or overfitting, of agents to individual games.
This is reflected in the outcome of individual competitions
– for example, over the more than five years the Simulated
Car Racing Competition ran, submitted car controllers got
better at completing races fast, but incorporated more and more
game-specific engineering and arguably less of general AI and
machine learning algorithms. Similarly, the well-performing
bots on the StarCraft competitions are generally highly domain
– and even strategy-specific, and display very little in the way
of learning and adaptation.
It should not come as a surprise that, whenever possible,
researchers will incorporate domain knowledge about the game
they design an agent for. Yet, this trend threatens to negate the
usefulness of game-based AI competitions for spurring and
testing the development of stronger and more general AI.
The General Video Game AI competition [6] was founded
on the belief that the best way to stop AI researchers from
relying on game-specific engineering in their agents is to
make it impossible. The idea is that researchers develop their
agents without knowing what games they will be playing, and
after submitting their agents to the competition all agents are
evaluated using an unseen set of games. Every competition
event requires the design of a new set of games, as reusing
previous games would make it possible to adapt agents to
existing games.
In order to make this possible, the Video Game Description
Language (VGDL) was developed to easily create new games
to be played by agents. VGDL was designed so that it would
be easy to create games both for humans and algorithms, eventually allowing for automated generation of testbed games. A
game engine was also created to allow games specified in this
language to be visualized and played, both by humans and AI
agents, forming the basis of the competition.
While the GVGAI competition was initially focused on
benchmarking AI algorithms for playing the game, the competition and its associated software has multiple uses. In addition
to the competition tracks dedicated to game-playing agents,
there are now competition tracks focused on generating game
levels or rules. There is also the potential to use VGDL and
GVGAI as a game prototyping system, and there is a rapidly
growing body of research using this framework for everything
from building mixed-initiative design tools to demonstrating
new concepts in game design.
This paper gives an overview of the various tracks of the
GVGAI competition, the GVGAI software, and the various
uses the software has been put to. We start with describing
the basics of VGDL and the GVGAI framework. We then
describe the various competition tracks that have launched so
far: planning (single-player and two-player), level generation,
rule generation and learning. The next few sections are devoted
to discussing the various kinds of AI methods that have been
used in the submissions to each track. Especial consideration
is given to the single-player planning track, as it has existed
for longest and received the most submissions up to date.
This is followed by a section cataloging some of the noncompetition research uses of the GVGAI software. The final
few sections look forward to the future use and development
of the framework and competition: how it can be used in
teaching, open research problems (specifically related to the
planning tracks), and the future evolution of the competition
and framework itself.
II. VGDL AND
THE
GVGAI F RAMEWORK
The idea of Video Game Description Language (VGDL)
was initially proposed by Ebner et al. [7] at the Dagstuhl Seminar on Artificial and Computational Intelligence in Games,
during which the first VGDL game, Space Invaders, was
created. Then, Tom Schaul continued this work by completing
and improving the language in a Python framework for modelbased learning and released the first game engine in 2013 [8],
[9]. VGDL is a text description language that allows for
the definition of two-dimensional, arcade, single-player, gridbased physics and (generally) stochastic games and levels.
With an ontology defined in the framework, VGDL permits
the description of objects (sprites), their properties and the
consequences of them colliding with each other. Additionally,
termination conditions and reward signals (in form of game
scores) can be defined for these games. In total, four different
sets are defined: Sprite Set (which defines what kind of sprites
take part in the game), Interaction Set (rules that govern the
effects of two sprites colliding with each other), Termination
Set (which defines how does the game end) and Mapping Set
(that specifies which characters in the level file map to which
sprites from the Sprite set).
M. Ebner et al. [7] and J. Levine et al. [10] described,
in their Dagstuhl 2013 follow-up, the need and interest for
such a framework that could accommodate a competition for
researchers to tackle the challenge of General Video Game
Playing (GVGP). D. Perez et al. [6] implemented a version of
T. Schaul’s initial framework in Java and organized the first
General Video Game AI (GVGAI) competition in 2014 [11].
In the following years, this framework was extended to accommodate two-player games [12], [13], level [14], rule [15]
generation, and real-world physics games [16].
This framework provided an API for creating bots that
would be able to play in any game defined in VGDL, without
giving them access to the rules of the games nor to the
behaviour of other entities defined in the game. However, the
agents do have access to a Forward Model (in order to roll
the current state forward given an action) during the thinking
time, set to 40ms in the competition settings. Controllers also
had access at every game tick to game state variables, such
game status - winner, time step and score -, state of the player
(also referred to in this paper as avatar) - position, orientation,
resources, health points -, history of collisions and positions of
the different sprites in the game identified with a unique type
id. Additionally, sprites are grouped in categories attending to
their general behaviour: Non-Player Characters (NPC), static,
movable, portals (which spawn other sprites in the game, or
behave as entry or exit point in the levels) and resources (that
can be collected by the player).
All this information is also provided to agents for the
learning setting of the framework and competition, with the
exception of the Forward Model. In its last (to date) modification of the framework, GVGAI included compatibility
for creating learning agents, both in Java and in Python,
which would learn to play any game is given in an episodic
manner [17]. At the moment of writing, the framework counts
on 120 single-player and 60 two-player games.
Contest Leg
CIG-14
GECCO-15
CIG-15
CEEC-15
GECCO-16
CIG-16
WCCI-16 (2P)
CIG-16 (2P)
GECCO-17
CEC-17 (2P)
Winner
OLETS
Type
Tree Search Method
Section
IV-B [11]
YOLOBOT
Return42
YBCriber
Hyper-heuristic
Hyper-heuristic
Hybrid
IV-E [18]
IV-E [19]
IV-D [20]
YOLOBOT
MaastCTS2
ToVo2
Number27
Hyper-heuristic
Tree Search Method
Hybrid
Hybrid
IV-E [18]
IV-B [21]
V-A [13]
V-B [13]
YOLOBOT
ToVo2
Hyper-heuristic
IV-E [18]
Hybrid
V-A [13]
TABLE I
W INNERS OF ALL EDITIONS OF THE GVGAI P LANNING COMPETITION .
2P INDICATES 2-P LAYER TRACK . H YBRID DENOTES 2 OR MORE
TECHNIQUES COMBINED IN A SINGLE ALGORITHM . H YPER - HEURISTIC
HAS A HIGH LEVEL DECISION MAKER TO DECIDES WHICH SUB - AGENT
MUST PLAY ( SEE S ECTION IV). TABLE EXTENDED FROM [19].
III. GVGAI C OMPETITION
TRACKS
This section summarizes the different tracks featured in the
GVGAI competition.
A. Single-player planning
The first competition track is Single-player Planning [11],
in which one agent (also referred to as bot or controller) plays
single-player games with the aid of the Forward Model. Each
controller has 1 second for initialization and 40ms at each
game tick as decision time.
All GVGAI tracks follow a similar structure: there are
several public sets of games, included in the framework,
allowing the participants to train their agents on them. For
each edition, there is one validation and one test set. Both
sets are private and stored in the competition server1 . There
are 10 games on each set, with 5 different levels each.
Participants can submit their entries any time before the
submission deadline to all training and validation sets, and
preliminary rankings are displayed in the competition website
(the names of the validation set games are anonymized). All
controllers are run on the test set after the submission deadline
to determine the final rankings of the competition, executing
each agent 5 times on each level.
Rankings are computed by first sorting all entries per game
according to victory rates, scores and time steps, in this order.
These per-game rankings award points to the first 10 entries,
from first to tenth position: 25, 18, 15, 12, 10, 8, 6, 4, 2 and 1.
The winner of the competition is the submission that sums
more points across all games in the test set. For a more
detailed description of the competition and its rules, the reader
is referred to [11].
Table I shows the winners of all editions up to date, along
with the section of this survey in which the method is included
and the paper that describes the approach more in depth.
B. Two-player planning
The Two-player Planning track [12] was added in 2016,
with the aim of testing general AI agents in environments
1 www.gvgai.net;
Intel Core i5 machine, 2.90GHz, and 4GB of memory.
which are more complex and present more direct player
interaction. Games in this setting are played by two-players in
a simultaneous move fashion. The rules of the games included
in the competition are still secret to the players, similar to
the Single-player track, but an additional piece of information
is hidden: whether the game is competitive or cooperative.
Having both types of games ensures that agents are not tuned
to only compete against their opponents, instead having to
correctly judge various situations and identify what the goal
of the other intelligent presence in the game is. However, this
question of an appropriate opponent model remains open, as
all competition entries so far have employed random or very
simple techniques.
Two legs of this track were organized for the first time in
2016, at the IEEE World Congress on Computational Intelligence (WCCI) and the IEEE Conference on Computational
Intelligence and Games (CIG). Although ToVo2 won the first
leg and Number27 the second, the winner (adrienctx) and
runner-up (MaastCTS2) of the overall championship showed
that a general agent may not be the best at a particular
subset of problems, but will perform at a high level on many
different ones. In 2017, ToVo2 did win the overall competition,
organized at the IEEE Congress on Evolutionary Computation
(CEC). The final results of the competition can be seen in
Table I. For more details, the reader is referred to [13].
C. Learning track
The GVGAI Single-Player learning track started in 2017.
Among the GVGAI tracks, this is the only one which accepts
submission of agent written not only in Java, but also in
Python, in order to accommodate for popular machine learning
libraries written in this language. The Single-Player Learning
track is briefly introduced below. More technical details of
the framework and competition procedure are explained in the
track technical manual [17].
The learning track is based on the GVGAI framework, but
a key difference is that no forward model is provided to
the controllers. Hence, learning needs to be achieved by an
episodic repetition of games played. Note that, even while no
forward model is accessible during the learning and validation
phases, controllers receive an observation of the current game
state via a StateObservation object, which is provided as a
Gson object or as a screen-shot of the game screen (in png
format). The agent is free to select either or both forms
of game state observation at any game tick. Similar to the
planning tracks, controllers (either in Java or in Python) inherit
from an abstract class and a constructor and three methods can
be implemented: INIT (called at the beginning of every game,
must finish in no more than 1s of CPU time), ACT (called at
every game tick, determines the next action of the controller
in 40ms of CPU time) and RESULT (called at the end of every
game, with no time limit to allow for processing the outcome
and perform some learning).
As in the planning track, games sets count on 10 games
with 5 levels each. The execution in a given set is split in two
phases: a learning phase, which allows training in the first 3
levels of each game, and a validation phase, which uses the
Agent
kkunan
sampleRandom†
DontUnderestimateUchiha
sampleLearner†
ercumentilhan
YOLOBOT
Training set
Score
Ranking
125
6
154
2
149
3
149
4
179
1
132
5
TABLE II
Test set
Score
Ranking
184
1
178
2
158
3
152
4
134
5
112
6
TABLE SHOWS THE SCORE AND RANKING OF THE SUBMITTED LEARNING
AGENTS HAVE OBTAINED ON THE TRAINING AND TEST SET. † DENOTES A
SAMPLE CONTROLLER .
1-P Planning
1-P Learning
Best score
Best score
Agent
G2
109.00 ± 38.19
31.5 ± 14.65
sampleRandom†
G3
1.00 ± 0.00
0±0
*
G4
1.00 ± 0.00
0.2 ± 0.09
kkunan
G5
216.00 ± 24.00
1±0
*
5.60 ± 0.78
3.45± 0.44
DontUnderestimateUchiha
G6
G7 31696.10 ± 6975.78 29371.95±2296.91
kkunan
G8
1116.90 ± 660.84
35.15±8.48
kkunan
G9
1.00 ± 0.00
0.05± 0.05
sampleRandom†
56.70 ± 25.23
2.75 ± 2.04
sampleLearner†
G10
TABLE III
TABLE COMPARES THE BEST SCORES BY SINGLE - PLAYER PLANNING AND
LEARNING AGENTS ON THE SAME TEST SET. N OTE THAT ONE OF THE
Game
GAMES IN THE TEST SET IS REMOVED FROM THE FINAL RANKING DUE TO
BUGS IN THE GAME ITSELF. † DENOTES A SAMPLE CONTROLLER .
other 2 available levels. The execution of a controller in a set
has therefore 2 phases:
a) Learning phase: In each of the games, each controller
has a limited amount of time, 5 minutes, for learning the first
3 levels. It will play each of the 3 levels once then be free to
choose the next level to play if there is time remaining. The
controller will be able to send an action called ABORT to finish
the game at any moment. The method RESULT is called at the
end of every game regardless if the game has finished normally
or has been aborted by the controller. Thus, the controller can
play as many games as desired, potentially choosing the levels
to play in, as long as it respects the 5 minutes time limit.
b) Validation phase: Immediately after learning phase,
the controller plays 10 times the levels 4 and 5 sequentially.
There is no more total time limit, but the agent respects the
time limits for init, act and result, and can continue learning
during the game playing.
The first GVGAI single-player learning track was held in the
IEEE CIG 2017. Besides two sample random agents written in
Java and Python and one sample agent using Sarsa [22] written
in Java, there were three submissions written in Java and one
in Python [23]. Table II illustrates the score and ranking of
learning agents on the training and test sets. Table III compares
the score achieved by the best planning agent in 2017 on each
of the games in the test set and the score achieved by the best
learning agent.
D. Level Generation
The Level Generation track [14] started in 2016. The aim
of the track is to allow competitors to develop a general level
generation algorithm. To participate in this track, competitors
must implement their own level generator. Competitors have to
provide at least one function that is responsible for generating
the level. The framework provides the generator with all the
information needed about the game such as game sprites,
interaction set, termination conditions and level mapping. Additionally, the framework also provides access to the Forward
Model, in order to allow testing the generated levels via agent
simulation. The levels are generated in the form of 2d matrix
of characters, with each character representing the game sprites
at the specific location determined by the matrix. Competitors
have the choice to either use the provided level mapping or
provide their own one.
The first level generation competition was held at the International Joint Conference on Artificial Intelligence (IJCAI)
in 2016, which received four participants. Each participant
was provided a month to submit a new level generator. Three
different level generators were provided in order to help
the users get started with the system (see Section VII for
a description of these). Three out of the four participants
were simulation-based level generators while the remaining
was based on cellular automata. During the competition day,
people attending the conference were encouraged to try pairs
of generated levels and select which level they liked (one,
both, or neither). Finally, the winner was selected based on
the generator with more votes. The winner of the contest
was the Easablade generator, a cellular automata described
in Section VII-A4.
The competition was run again during IEEE CIG 2017 with
same configuration from previous year (one month for implementation followed by on site judging). Unfortunately, only
one submission was received, hence the the competition was
canceled. This submission used a n-gram model to generate
new constrained levels using a recorded player keystrokes.
E. Rule Generation
The Rule Generation track [15] was introduced and held
during CIG 2017. The aim of the track is to generate the
interaction set and termination conditions for a certain level
with a fixed set of game sprites in a fixed amount of time.
To participate in the track, competitors have to provide their
own rule generator. The framework provides the competitors
with game sprites, a certain level, and a forward model to
simulate generated games, as in the Level Generation case.
The generated games are represented as two arrays of strings.
The first array contains the interaction set, while the second
array contains the termination conditions.
The first rule generation competition was intended to be
run at CIG 2017. Three different sample rule generators were
provided (as discussed in Section VIII) and the contest ran
over a month’s period. Unfortunately, no submissions were
received for this track.
IV. M ETHODS FOR S INGLE P LAYER P LANNING
This section describes the different methods that have been
implemented for Single Player Planning in GVGAI. All the
controllers that face this challenge have in common the possibility of using the forward model to sample future states from
the current game state, plus the fact that they have a limited
action-decision time. While most attempts abide by the 40ms
decision time imposed by the competition, other efforts in the
literature compel their agents to obey a maximum number of
uses of the forward model.
Section IV-A briefly introduces the most basic methods
that can be found within the framework. Then Section IV-B
describes the different tree search methods that have been
implemented for this settings by the community, followed by
Evolutionary Methods in Section IV-C. Often, more than one
method is combined into the algorithm, which gives place to
Hybrid methods (Section IV-D) or Hyper-heurisric algorithms
(Section IV-E). Further discussion on these methods and their
common take-aways has been included in Section XI.
A. Basic Methods
The GVGAI framework contains several agents aimed at
demonstrating how a controller can be created for the singleplayer planning track of the competition [11]. Therefore, these
methods are not particularly strong.
The simplest of all methods is, without much doubt, doNothing. This agent returns the action NIL at every game tick without exception. The next agent in complexity is sampleRandom,
which returns a random action at each game tick. Finally,
onesteplookahead is another sample controller that rolls the
model forward for each one of the available actions in order
to select the one with the highest action value, determined
by a function that tries to maximize score while minimizing
distances to NPCs and portals.
B. Tree Search Methods
One of the strongest and influential sample controllers
is sampleMCTS, which implements the Monte Carlo Tree
Search [24] algorithm for real-time games. Initially implemented in a closed loop version (the states visited are stored
in the tree node, without requiring the use of the Forward
Model during the tree policy phase of MCTS), it achieved the
third position (out of 18 participants) in the first edition of the
competition.
The winner of that edition, Adrien Couëtoux, implemented
Open Loop Expectimax Tree Search (OLETS), which is an
open loop (states visited are never stored in the associated tree
node) version of MCTS which does not include rollouts and
uses Open Loop Expectimax (OLE) for the tree policy. OLE
substitutes the empirical average reward by rM , a weighted
sum of the empirical average of rewards and the maximum of
its children rM values [11].
Torsten Schuster, in his MSc thesis [25], analyzes several
enhancements and variations for MCTS in different sets of
the GVGAI framework. These modifications included different tree selection, expansion and play-out policies. Results
show that combinations of Move-Average Sampling Technique
(MAST) and N-Gram Selection Technique (NST) with Progressive History provided an overall higher rate of victories
than their counterparts without these enhancements, although
this result was not consistent across all games (with some
simpler algorithms achieving similar results).
In a different study, Dennis Soemers [21], [26] explored
multiple enhancements for MCTS: Progressive History (PH)
and NST for the tree selection and play-out steps, tree reuse (by starting at each game tick with the subtree grown in
the previous frame that corresponds to the action taken, rather
than a new root node), bread-first tree initialization (direct
successors of the root note are explored before MCTS starts),
safety pre-pruning (prune those nodes with high number of
game loses found), loss avoidance (MCTS ignores game lose
states when found for the first time by choosing a better alternative), novelty-based pruning (in which states with features
rarely seen are less likely to be pruned), knowledge based
evaluation [27] and deterministic game detection. The authors
experimented with all these enhancements in 60 games of the
framework, showing that most of them improved the performance of MCTS significantly and their all-in-one combination
increased the average win rate of the sample agent in 17
percentage points. The best configuration was winner of one
of the editions of the 2016 competitions (see Table I).
F. Frydenberg studied yet another set of enhancements
for MCTS. The authors showed that using MixMax backups
(weighing average and maximum rewards on each node)
improved the performance in only some games, but its combination with reversal penalty (to penalize visiting the same
location twice in a play-out) offers better results than vanilla
MCTS. Other enhancements, such as macro-actions (by repeating an action several times in a sequence) and partial
expansion (a child node is considered expanded only if its
children have also been expanded) did not improve the results
obtained.
Perez et al. [27] implemented KB-MCTS, a version of
MCTS with two main enhancements. First, distance to different sprites were considered features for a linear combination, where the weights were evolved to bias the MCTS
rollouts. Secondly, a Knowledge Base (KB) is kept about
how interesting for the player the different sprites are, where
interesting is a measure of curiosity (rollouts are biased
towards unknown sprites) and experience (a positive/negative
bias for getting closer/farther to beneficial/harmful entities).
The results of applying this algorithm to the first set of games
of the framework showed that the combination of these two
components gave a boost in performance in most games of
the first training set.
The work in [27] has been extended by other researchers in
the field, which also put a special effort on biasing the Monte
Carlo (MC) simulations. In [28], the authors modified the
random action selection in MCTS rollouts by using potential
fields, which bias the rollouts by making the agent move in
a direction akin to the field. The authors showed that KBMCTS provides a better performance if this potential field
is used instead of the Euclidean distance between sprites
implemented in [27]. Additionally, in a similar study [29],
the authors substituted the Euclidean distance for a measure
calculated by a pathfinding algorithm. This addition achieved
some improvements over the original KB-MCTS, although the
authors noted in their study that using pathfinding does not
provide a competitive advantage in all games.
Another work by H. Park and K. Kim [30] tackles this
challenge by a) determining the goodness of the other sprites
in the game; b) computing an Influence Map (IM) based on
this; and c) using the IM to bias the simulations, in this
occasion by adding a third term to the Upper Confidence
Bound (UCB) [31] equation for the tree policy of MCTS. Although not compared with KB-MCTS, the resultant algorithm
improves the performance of the sample controllers in several
games of the framework, albeit performing worse than these
in some of the games used in the study.
Biasing rollouts is also attempted by E. dos Santos et
al. [32], who introduced Redundant Action Avoidance (RAA)
and Non-Defeat Policy (NDP); RAA analyzes changes in
the state to avoid selecting sequences of actions that do not
produce any alteration on position, orientation, properties or
new sprites in the avatar. NDP makes the recommendation
policy ignore all children of the root node who found at least
one game loss in a simulation from that state. If all children
are marked with a defeat, normal (higher number of visits)
recommendation is followed. Again, both modifications are
able to improve the performance of MCTS in some of the
games, but not in all.
M. de Waard et al. [33] introduced the concept of options
or macro-actions in GVGAI. Each option is associated with
a goal, a policy and a termination condition. The selection
and expansion steps in MCTS are modified so the search
tree branches only if an option is finished, allowing for a
deeper search in the same amount of time. Their results show
that Option MCTS outperforms MCTS in games with small
levels or a few number of sprites, but loses in the comparison
to MCTS when the games are bigger due to these options
becoming too large.
In a similar line, Perez et al. [16] employed macro-actions
for GVGAI games that used continuous (rather than gridbased) physics. These games have a larger state space, which
in turn delays the effects of the player’s actions and modifies
the way agents navigate through the level. Macro-actions are
defined as a sequence or repetition of the same action during
M steps, which is arguably the simplest kind of macro-actions
that can be devised. MCTS performed better without macroactions on average across games, but there are particular games
where MCTS needs macro-actions to avoid losing at every
attempt. The authors also concluded that the length M of
the macro-actions impacts different games distinctly, although
shorter ones seem to provide better results than larger ones,
probably due to a more fine control in the movement of the
agents.
Some studies have brought multi-objective optimization to
this challenge. For instance, Perez et al. [34] implemented
a Multi-Objective version of MCTS, concretely maximizing
score and level exploration simultaneously. In the games
tested, the rate of victories grew from 32.24% (normal MCTS)
to 42.38% in the multi-objective version, showing great
promise for this approach. In a different study, A. Khalifa et
al. [35] apply multi-objective concepts to evolving parameters
for a tree selection confidence bounds equation. A previous
work by I. Bravi [36] (also discussed later in Section IV-D)
provided multiple UCB equations for different games. The
work in [35] evolved, using S-Metric Selection Evolutionary
Multi-objective Optimization Algorithm (SMS-EMOA), the
linear weights of an UCB equation that results of combining
all from [36] in a single one. All these components respond
to different and conflicting objectives, and their results show
that it is possible to find good solutions for the games tested.
A significant exception to MCTS with regards to tree search
methods for GVGAI is that of T. and H. Geffner [20] (winner
of one of the editions of the 2015 competition, YBCriber, as
indicated in Table I), who implemented Iterated Width (IW;
concretely IW(1)). IW(1) is a breadth-first search with a crucial
alteration: a new state found during search is pruned if it does
not make true a new tuple of at most 1 atom, where atoms
are boolean variables that refer to position (and orientations
in the case of avatars) changes of certain sprites at specific
locations. The authors found that IW(1) performed better than
MCTS in many games, with the exception of puzzles, where
IW(2) (pruning according to pairs of atoms) showed better
performance. This agent was declared winner in the CEEC
2015 edition of the Single-player planning track [6].
A. Badabi [37] implemented several versions of Enforced
Hill Climbing (EHC), a breadth-first search method that looks
for a successor of the current state with a better heuristic value.
EHC obtained similar results to KB-MCTS in the first set of
games of the framework, with a few disparities in specific
games of the set.
Finally, Mark J. Nelson [38] ran a study on MCTS in order
to investigate if, giving a higher time budget to the algorithm
(i.e. increasing the number of iterations), MCTS was able to
master most of the games. In other words, if the real-time
nature of the GVGAI framework and competition is the reason
why different approaches fail to achieve a high victory rate.
This study provided up to 30 times more budget to the agent,
but the performance of MCTS only increased marginally even
at that level. In fact, this improvement was achieved by means
of losing less often rather than by winning more games. This
paper concludes that the real-time aspect is not the only factor
in the challenge, but also the diversity in the games. In other
words, increasing the computational budget is not the answer
to the problem GVGAI poses, at least for MCTS.
C. Evolutionary Methods
The second big group of algorithms used for single-player
planning is that of evolutionary algorithms (EA). Concretely,
the use of EAs for this real-time problem is mostly implemented in the form of Rolling Horizon EAs (RHEA). This
family of algorithms evolves sequences of actions with the
use of the forward model. Each sequence is an individual of
an EA which fitness is the value of the state found at the end
of the sequence. Once the time budget is up, the first action of
the sequence with the highest fitness is chosen to be applied
in that time step.
The GVGAI competition includes SampleRHEA as a sample
controller. SampleRHEA has a population size of 10, individual
length of 10 and implements uniform crossover and mutation,
where one action in the sequence is changed for another one
(position and new action chosen uniformly at random) [11].
R. Gaina et al. [39] analyzed the effects of the RHEA
parameters on the performance of the algorithm in 20 games,
chosen among the existent ones in order to have a representative set of all games in the framework. The parameters
analyzed were population size and individual length, and
results showed that higher values for both parameters provided
higher victory rates. This study motivated the inclusion of
Random Search (SampleRS) as a sample in the framework,
which is equivalent to RHEA but with an infinite population
size (i.e. only one generation is evaluated until budget is
consumed) and achieves better results than RHEA in some
games. [39] also compared RHEA with MCTS, showing better
performance for an individual length of 10 and high population
sizes.
A different Evolutionary Computation agent was proposed
by B. Jia et al. [40], [41], which consists of a Genetic
Programming (GP) approach. The authors extract features
from a screen capture of the game, such as avatar location and
the positions and distances to the nearest object of each type.
These features are inputs to a GP system that, using arithmetic
operands as nodes, determines the action to execute as a result
of three trees (horizontal, vertical and action use). The authors
report that all the different variations of the inputs provided to
the GP algorithm give similar results to those of MCTS, on
the three games tested in their study.
D. Hybrids
The previous studies feature techniques in which one technique is predominant in the agent created, albeit they may
include enhancements which can place them in the boundary
of hybrids. This section describes those approaches that, in the
opinion of the authors, would in their own right be considered
as techniques that mix more than one approach in the same,
single algorithm.
An example of one of these approaches is presented by R.
Gaina et al. [42] analyzed the effects of seeding the initial
population of the RHEA using different methods. Part of
the decision time budget is dedicated to initialize a population with sequences that are promising, as determined by
onesteplookahead and MCTS. Results show that both seeding
options provide a boost in victory rate when population size
and individual length are small, but the benefits vanish when
these parameters are large.
Other enhancements for RHEA proposed in [43] are incorporating a bandit-based mutation, a statistical tree, a shift
buffer and rollouts at the end of the sequences. The banditbased mutation breaks the uniformity of the random mutations
in order to choose new values according to suggestions given
by a uni-variate armed bandit. However, the authors reported
that no improvement on performance was noticed. A statistical
tree, previously introduced in [44], keeps a game tree with
visit count and accumulated rewards in the root node, which
are subsequently used for recommending the action to take
in that time step. This enhancement produced better results
with shorter individuals and smaller population sizes. The
shift buffer enhancement provided the best improvement in
performance, which consist of shifting the sequences of the
individuals of the population one action to the left, removing
the action from the previous time step. This variation, similar
to keeping the tree between frames in MCTS, combined with
the addition of rollouts at the end of the sequences provided
an improvement victory rate (20 percentile points over vanilla
RHEA) and scores.
A similar (and previous) study was conducted by H. Horn et
al. [45]. In particular, this study features RHEA with rollouts
(as in [43]), RHEA with MCTS for alternative actions (where
MCTS can determine any action with the exception of the one
recommended by RHEA), RHEA with rollouts and sequence
planning (same approach as the shift buffer in [43]), RHEA
with rollouts and occlusion detection (which removes not
needed actions in a sequence that reaches a reward) and
RHEA with rollouts and NPC attitude check (which rewards
sequences in terms of proximity to sprites that provide a
positive or negative reward). Results show that RHEA with
rollouts improved performance in many games, although all
the other variants and additions performed worse than the
sample agents. It is interesting to see that in this case the
shift buffer did not provide an improvement in the victory
rate, although this may be due to the use of different games.
Torsten Schuster [25] proposes two methods that combine
MCTS with evolution. One of them, (1+1)−EA as proposed
by [27], evolves a vector of weights for a set of game features
in order to bias the rollouts towards more interesting parts
of the search space. Each rollout becomes an evaluation for
an individual (weight vector), using the value of the final
state as fitness. The second algorithm is based on stronglytyped GP (STGP) and uses game features to evolve state
evaluation functions that are embedded within MCTS. These
two approaches join MAST and NST (see Section IV-B) in
a larger comparison, and the study concludes that different
algorithms outperform others in distinct games, without an
overall winner in terms of superior victory rate, although
superior to vanilla MCTS in most cases.
The idea of evolving weight vectors for game features
during the MCTS rollouts introduced in [27] (KB-MCTS2 )
was explored further by Jim van Eeden in his MSc thesis [46].
In particular, the author added A* as a pathfinding algorithm
to replace the euclidean distance used in KB-MCTS for a more
accurate measure and changing the evolutionary approach.
While KB-MCTS used a weight for each pair feature-action,
being the action chosen at each step by the Softmax equation,
this work combines all move actions on a single weight and
picks the action using Gibbs sampling. The author concludes
that the improvements achieved by these modifications are
marginal, and likely due to the inclusion of pathfinding.
Additional improvements on KB-MCTS are proposed by
C. Chu et al. [47]. The authors replace the Euclidean distance
feature to sprites with a grid view of the agent’s surroundings,
and also the (1 + 1) − EA with a Q-Learning approach to bias
the MCTS rollouts, making the algorithm update the weights at
each step in the rollout. The proposed modifications improved
the victory rate in several sets of games of the framework
and also achieved the highest average victory rate among the
algorithms it was compared with.
2 This approach could also be considered an hybrid. Given its influence in
other tree approaches, it has also been partially described in Section IV-B
E. İlhan and A. Etaner-Uyar [48] implemented a combination of MCTS and true online Sarsa (λ) [49]. The authors
use MCTS rollouts as episodes of past experience, executing
true online Sarsa with each iteration with a ǫ-greedy selection
policy. Weights are learnt for features taken as the smallest
euclidean distance to sprites of each type. Results showed that
the proposed approached improved the performance on vanilla
MCTS in the majority of the 10 games used in the study.
Evolution and MCTS have also been combined in different
ways. In one of them, I. Bravi et al. [50] used a GP system
to evolve different tree policies for MCTS. Concretely, the
authors evolve a different policy for each one of the (five)
games employed in the study, aiming to exploit the characteristics of each game in particular. The results showed that the
tree policy plays a very important role on the performance of
the MCTS agent, although in most cases the performance is
poor - none of the evolved heuristics performed better than
the default UCB in MCTS.
Finally, C. Sironi et al. [51] designed three Self-Adaptive
MCTS (SA-MCTS) that tuned the parameters of MCTS (playout depth and exploration factor) on-line, using Naive MonteCarlo, an Evolutionary Algorithm (λ, µ) and the N-Tuple
Bandit Evolutionary Algorithm [52]. Results show that all
tuning algorithms improve the performance of MCTS there
where vanilla MCTS performs poorly, while keeping a similar
rate of victories in those where MCTS performs well.
E. Hyper-heuristics / algorithm selection
Several authors have also proposed agents that use several
algorithms, but rather than combining them into a single one,
there is a higher level decision process that determines which
one of them should be used at each time.
Blaine Ross, in his MSc thesis [53] proposes an agent that
is a combination of two methods. This approach uses A* with
Enforced Hill Climbing to navigate through the game at a
high level and switches to MCTS when in close proximity
to the goal. The work highlights the problems of computing
paths in the short time budget allowed, but indicate that goal
targeting with path-finding combined with local maneuvering
using MCTS does provide good performance in some of the
games tested.
T. Joppen et al. implemented YOLOBOT [18], arguably the
most successful agent for GVGAI up to date, as it has won
several editions of the competition. Their approach consists
of a combination of two methods: a heuristic Best First
Search (BFS) for deterministic environments and MCTS for
stochastic games. Initially, the algorithm employs BFS until
the game is deemed stochastic, an optimal solution is found
or a certain game tick threshold is reached, extending through
several consecutive frames if needed for the search. Unless the
optimal sequence of actions is found, the agent will execute
an enhanced MCTS consistent of informed priors and rollout
policies, backtracking, early cutoffs and pruning. The resultant
agent has shown consistently a good level of play in multiple
game sets of the framework.
Another hyper-heuristic approach, also winner of one of
the 2015 editions of the competition (Return42, see Table I),
determines first if the game is deterministic or stochastic. In
case of the former, A* is used to direct the agent to sprites of
interest. Otherwise, random walks are employed to navigate
through the level [19].
The fact that this type of portfolio agents has shown very
promising results has triggered more research into hyperheuristics and game classification. The work by P. Bontrager
et al. [54] used K-means to cluster games and algorithms
attending to game features derived from the type of sprites
declared in the VGDL description files. The resulting classification seemed to follow a difficulty pattern, with 4 clusters
that grouped games that were won by the agents at different
rates.
Mendes et al. [55] built a hyper-agent which selected
automatically an agent from a portfolio of agents for playing
individual game and tested it on the GVGAI framework. This
approached employed game-based features to train different
classifiers (Support Vector Machines - SVM, Multi-layer Perceptrons, Decision Trees - J48, among others) in order to select
which agent should be used for playing each game. Results
show that the SVM and J48 hyper-heuristics obtained a higher
victory rate than the single agents separately.
H. Horn et al. [45] (described before in Section IV-D) also
includes an analysis on game features and difficulty estimation.
The authors suggest that the multiple enhancements that are
constantly attempted in many algorithms could potentially be
switched on and off depending on the game that is being
played, with the objective of dynamically adapting to the
present circumstances.
D. Ashlock et al. [19] suggest the possibility of creating a
classification of games, based on the performance of multiple
agents (and their variations: different enhancements, heuristics,
objectives) on them. Furthermore, this classification needs
to be stable, in order to accommodate the ever-increasing
collection of games within the GVGAI framework, but also
flexible enough to allow an hyper-heuristic algorithm to choose
the version that better adapts to unseen games.
V. M ETHODS FOR T WO -P LAYER P LANNING
This section approaches agents developed by researchers
within the Two-Player Planning setting. Most of these entries
have been submitted to the Two-Player Planning track of the
competition [12]. Two methods stood out as the base of most
entries received so far, Monte Carlo Tree Search (MCTS) and
Evolutionary Algorithms (EA) [13]. On the one hand, MCTS
performed better in cooperative games, as well as showing the
ability to adapt better to asymmetric games, which involved a
role switch between matches in the same environment. EAs,
on the other hand, excelled in games with long lookaheads,
such as puzzle games, which rely on a specific sequence of
moves being identified.
Counterparts of the basic methods described in Section IV-A
are available in the framework for the Two-Player track as
well, the only difference being in the One Step Lookahead
agent which requires an action to be supplied for the opponent
when simulating game states. The opponent model used by the
sample agent assumes they will perform a random move (with
the exception of those actions that would cause a loss of the
game).
A. Tree Search methods
Most of the competition entries in the 2016 season were
based on MCTS (see Section IV-B).
Some entries employed an Open Loop version, which would
only store statistics in the nodes of the trees and not game
states, therefore needing to simulate through the actions at
each iteration for a potentially more accurate evaluation of the
possible game states. Due to this being unnecessarily costly
in deterministic games, some entries such as MaasCTS2 and
YOLOBOT switched to Breadth-First Search in such games
after an initial analysis of the game type, a method which has
shown ability to finding the optimal solution if the game lasts
long enough.
Enhancements brought to MCTS include generating value
maps, either regarding physical positions in the level, or
higher-level concepts (such as higher values being assigned to
states where the agent is closer to objects it hasn’t interacted
with before; or interesting targets as determined by controllerspecific heuristics). The winner of the 2016 WCCI leg, ToVo2,
also employed dynamic Monte Carlo roll-out length adjustments (increased with the number of iterations to encourage
further lookahead if budget allows) and weighted roll-outs (the
weights per action generated randomly at the beginning of
each roll-out).
All agents use online learning in one way or another
(the simplest form being the base Monte Carlo Tree Search
backups, used to gather statistics about each action through
multiple simulations), but only the overall 2016 Championship
winner, adrienctx, uses offline learning on the training set
supplied to tune the parameters in the Stochastic Gradient
Descent function employed, learning rate and mini batch size.
B. Evolutionary methods
Two of the 2016 competition entries used an EA technique as a base as an alternative to MCTS: Number27 and
CatLinux [13].
Number27 was the winner of the CIG 2016 leg, the
controller placing 4th overall in the 2016 Championship.
Number27 uses a Genetic Algorithm, with one population
containing individuals which represent fixed-length action
sequences. The main improvement it features on top of the
base method is the generation of a value heat-map, used to
encourage the agent’s exploration towards interesting parts of
the level. The heat-map is initialized based on the inverse
frequency of each object type (therefore a lower value the
higher the object number) and including a range of influence
on nearby tiles. The event history is used to evaluate game
objects during simulations and to update the value map.
CatLinux was not a top controller on either of the individual
legs run in 2016, but placed 5th overall in the Championship.
This agent uses a Rolling Horizon Evolutionary Algorithm
(RHEA). A shift buffer enhancement is used to boost performance, specifically keeping the population evolved during
one game tick in the next, instead of discarding it, each action
sequence is shifted one action to the left (therefore removing
the previous game step) and a new random action is added at
the end to complete the individual to its fixed length.
No offline learning used by any of the EA agents, although
there could be scope for improvement through parameter
tuning (offline or online).
C. Opponent model
Most agents submitted to the Two-Player competition use
completely random opponent models. Some entries have
adopted the method integrated within the sample One Step
Lookahead controller, choosing a random but non-losing action. In the 2016 competition, webpigeon assumed the opponent would always cooperate, therefore play a move beneficial
to the agent. MaasCTS2 used the only advanced model at
the time: it remembered Q-values for the opponent actions
during simulations and added them to the statistics stored
in the MCTS tree nodes; an ǫ-greedy policy was used to
select opponent actions based on the Q-values recorded. This
provided a boost in performance on the games in the WCCI
2016 leg, but it did not improve the controller’s position in
the rankings for the following CIG 2016 leg.
Opponent models were found to be an area to explore
further in [13] and Gonzalez and Perez looked at 9 different
models integrated within the sample MCTS agent provided
with the framework [56]. Alphabeta builds a tree incrementally, returning the best possible action in each time tick,
while Minimum returns the worst possible action. Average
uses a similar tree structure, but it computes the average
reward over all the actions and it returns the action closest
to the average. Fallible returns the best possible action with
a probability p = 0.8 and the action with the minimum
reward otherwise. Probabilistic involved offline learning over
20 games in the GVGAI framework in order to determine
the probability of an MCTS agent to select each action,
and then using these to determine the opponent action while
playing online. Same Action returns the same action the agent
plays, while Mirror returns its opposite. Finally, LimitedBuffer
records the last n = 20 actions performed by the player
and builds probabilities of selecting the next action based on
this data, while UnlimitedBuffer records the entire history of
actions during the game. When all 9 opponent models were
tested in a round robin tournament against each other, the
probabilistic models achieve the highest win rates and two
models, Probabilistic and UnlimitedBuffer outperforming a
random opponent model.
VI. M ETHODS FOR S INGLE -P LAYER L EARNING
The GVGAI framework has also been used from an agent
learning perspective. In this setting, the agents do not use the
forward model to plan ahead actions to execute in the real
game. Instead, the algorithms learn the games by repeatedly
playing them multiple times (as episodes in Reinforcement
Learning), ideally improving their performance progressively.
This section first describes those approaches that tackled
the challenge set in the single-player learning track of the
competition (described in Section III-C), to then move to those
the ones not adhered to the competition format (Section VI-B.
A. 2017 competition entries
Some of the entries are available in the framework3.
1) Random agent: A sample random agent, which selects
an action at uniform random at every game tick, is included
in the framework (in both Java and Python) for the purposes
of testing. This agent is also meant to be taken as a baseline:
a learner is expected to perform better than an agent which
acts randomly and does not undertake any learning.
2) Multi-armed bandit algorithms: DontUnderestimateUchiha by K. Kunanusont is based on two popular MultiArmed Bandit (MAB) algorithms, ǫ-Decreasing Greedy Algorithm [57] and UCB [31]. At any game tick T , the current
best action a∗ with probability 1 − ǫT is picked, otherwise an
action is uniformly randomly selected. The best action a∗ at
time T is defined as in Equation 1.
!
r
2
log
T
∗
ˆ a+
,
(1)
a = arg max ∆score
a∈A
ta
where ta denotes the number of times that the action a
ˆ a denotes the empirical mean
has been selected, and ∆score
increment of score by applying the action a so far.
This is a very interesting combination, as the UCB-style
selection (Equation 1) and the ǫ-Decreasing Greedy Algorithm
both aim at balancing the trade-off between exploiting more
the best-so-far action and exploring others. Additionally, ǫ0
is set to 0.5 and it decreases slowly along time, formalized
as ǫT = ǫ0 − 0.0001T . According to the competition setting,
all games will last longer than 2, 000 game ticks, so ∀T ∈
{1, . . . , 2000}, 0.5 ≥ ǫT ≥ 0.3. As a result, random decisions
are made for approximately 40% time.
3) State-Action-Reward-State-Action: sampleLearner and
ercumentilhan are based on the State-Action-Reward-StateAction (SARSA) algorithm. Both agents choose to use a subset
of the whole game state information to build a new state to
reduce the amount of information to be saved and to take
into account similar situations. The main difference is that the
former uses a square region with fixed size centered at the
avatar’s position, while the latter uses a first-person view with
a fixed distance.
4) Q-learning: kkunan, by K. Kunanusont, is a simple Qlearning agent using most of the avatar’s current information
as features, which a few exceptions (as avatar’s health and
screen size, as these elements that vary greatly from game
to game). The reward at game tick t + 1 is defined as the
difference between the game score at game tick t + 1 and
the one at t. The learning rate α and discounted factor γ are
manually set to 0.05 and 0.8. During the learning phase, an
random is performed with probability ǫ = 0.1, otherwise, the
best action is selected. During the validation phase, the best
action is always selected. Despite it’s simplicity, it won the
only edition of this track up to date, being the only entry that
ranked above the sample random agent.
5) Tree search methods: YOLOBOT is an adaption of
the YOLOBOT planning agent (as described previously in
Section IV-E). As the forward model is no more accessible
3 https://github.com/GAIGResearch/GVGAI/tree/master/clients/
in the learning track, the MCTS is substituted by a greedy
algorithm to pick the action that minimizes the distance to
the chosen object at most. According to the authors, the poor
performance of YOLOBOT in the learning track, contrary to
its success in the planning tracks, was due to the collision
model created by themselves that did not work well.
B. Other learning agents
One of the first works that used this framework as a learning
environment was carried out by S. Samothrakis et al. [58], who
employed Neuro-Evolution in 10 games of the benchmark.
Concretely, the authors experimented with Separable Natural
Evolution Strategies (S-NES) using two different policies (ǫgreedy versus softmax) and a linear function approximator
versus a neural network as a state evaluation function. Features
like score, game status, avatar and other sprites information
were used to evolve learners during 1000 episodes. Results
show that ǫ-greedy with a linear function approximator was
the better combination to learn how to maximize scores on
each game.
A. Braylan and R. Miikkulainen [59] performed a study
in which the objective was to learn a forward model on
30 games. The objective was to learn the next state from
the current one plus an action, where the state is defined
as a collection of attribute values of the sprites (spawns,
directions, movements, etc.), by means of logistic regression.
Additionally, the authors transfer the learnt object models from
game to game, under the assumption that many mechanics
and behaviours are transferable between them. Experiments
showed the effective value of object model transfer in the
accuracy of learning forward models, resulting in these agents
being stronger at exploration.
Also in a learning setting, K. Kunanusont et al. [60], [61]
developed agents that were able to play several games via
screen capture. In particular, the authors employed a Deep
Q-Network [62] in 7 games of the framework of increasing
complexity, and included several enhancements to GVGAI to
deal with different screen sizes and a non-visualization game
mode. Results showed that the approach allowed the agent to
learn how to play in both deterministic and stochastic games,
achieving a higher winning rate and game score as the number
of episodes increased.
VII. M ETHODS FOR LEVEL GENERATION
Different researchers used different approaches to generate
levels for the GVGAI framework. The following subsection
describes all known generators either included in the framework or developed during the competition.
A. Constructive methods
Constructive generators are designed to generate the level
based on general knowledge. For example: enemies should be
away from the avatar, walls shouldn’t divide the world into
islands, etc. Based on the game the generator adjusts a couple
of parameters and rules to fit the game as, for example, the
number of non-playable characters (NPCs) in the generated
level. Constructive generators don’t need any simulations after
generating the level. The following are the known constructive
generators.
1) Sample random generator: This is the most naive
method to generate a level. The generator first identifies
solid sprites. Solid sprites block the avatar and all NPCs
from moving and don’t react to anything. The generator adds
a selected solid sprite as a border for the generated level
to prevent sprites from wandering outside the game screen.
Followed by adding one of each character in the level mapping
section to a random location in the level. This step ensures the
game is playable. Finally, it adds a random amount of random
sprites from the level mapping to random locations in the level.
2) Sample constructive generator: This generator uses
some general game knowledge to generate the level. First, the
generator calculates the level dimensions and the number of
sprites in the level, then labels game sprites based on their
interactions and sprite types. After that, it constructs a level
layout using the solid sprites, to later add the avatar to a
random empty location. After knowing the avatar position, the
generator adds harmful sprites (those that can kill the avatar)
in a far location from the avatar and adds other sprites at any
random free locations. Finally, the generator makes sure that
the number of goal sprites is sufficient to prevent winning or
losing automatically when the game starts.
3) Easablade constructive generator: This is the winner
generator for the first level generator competition. The generator is similar to the sample constructive generator but it uses
cellular automata to generate the level instead of layering the
objects randomly. The cellular automata is run on multiple
layers. The first layer is to design the map obstacles, followed
by the exit and the avatar, then the goal sprites, harmful sprites,
and others.
4) N-Gram constructive generator: This generator uses a
n-gram model to generate the level. The generator records
the player actions from a previous play-through. This action
sequence is used to generate the levels using predefined rules
and constraints. For example, if the player uses the USE action
quite often, the generator will include more enemies in the
level. The n-gram is used to specify the rules. Instead of reacting to each separate action, the model reacts to a n-sequence
of actions. During the generation process, the algorithm keeps
track of the number and position of every generated object to
ensure the generated sprites do not overpopulate the level. A
single avatar sprite is placed in the lower half of the level.
B. Search-based methods
Search-based generators use simulations to make sure the
generated level is playable and better than just placing random
objects. The following are the known search-based generators.
1) Sample genetic generator: This is a search-based level
generator based on the Feasible Infeasible 2 Population Genetic Algorithm (FI2Pop) [63]. FI2Pop is a genetic algorithm
which uses 2 populations, one for feasible chromosomes and
the other for infeasible chromosomes. The feasible population
tries to increase the difference between the OLETS agent (see
Section IV-B) and one-step look ahead, while the infeasible
population tries to decrease the number of chromosomes that
violate the problem constraints (i.e. at least one avatar in the
game, the avatar must not die in the first 40 steps, etc.). Each
population evolves on its own, where the children can transfer
between the two populations. This generator initializes the
population using sample constructive generator.
2) Amy12 genetic generator: This generator is built on top
of the sample genetic generator. The main idea is to generate a
level that fits a certain suspense curve. Suspense is calculated
at each point in time, by calculating the number of actions that
leads to death or tie using the OLETS agent. The algorithm
modifies the levels to make sure the suspense curve is not
constant during the life time of the game. Good generators
are aimed at producing 3 suspense peeks with values of 50%
(where half of the actions, on average lead to losing the game).
One of the advantages of using this technique that it makes
sure that the generated level is winnable. Games that are hard
to win will have a higher peak in the suspense curve, which
is not valued highly by the generator.
3) Jnicho genetic generator: This generator [64] uses a
standard genetic algorithm with similar crossover and mutation
operators to the sample genetic algorithm. The fitness function
used is a combination between the score difference and the
constraints specified in the sample genetic generator. The score
difference is calculated between an Monte Carlo Tree Search
agent and One Step Look Ahead agent. The score difference is
normalized between 0 and 1 to make sure it won’t overshadow
the constraint values.
4) Number13 genetic generator: This is a modified version
of the sample genetic generator. These modifications includes
using adaptive crossover mechanism, adaptive mutation rate,
a better agent than OLETS, and allowing crossover between
feasible and infeasible population, which is not allowed in the
sample genetic generator.
C. Constraint-based methods
1) ASP generator: This generator [65] uses Answer Set
Programming (ASP) to generate levels. The main idea is to
generate ASP rules that generate suitable levels for the current
game. The generated rules consists of three different types. The
first type are basic rules, which are based on specific decisions
to keep the levels simple (for instance, levels can only have one
sprite per tile). The second type are game specific rules, which
are extracted from the game description file. An example is
the identification of singleton sprites that should only have
one sprite in the level. The last type are additional rules to
minimize the search space. These rules limit the minimum and
maximum number of each sprite type. All the rules are evolved
using evolutionary strategy with the algorithm performance
difference between sampleMCTS and a random agent as the
fitness function.
VIII. M ETHODS FOR RULE G ENERATION
This section describes the different algorithms that are
included in the framework or have been found in the literature [66] toward generating rules for the GVG-AI framework.
A. Constructive methods
Constructive methods are algorithms that generate the rules
in one pass without the need to play the game. The constructive
methods often incorporate knowledge about game design to
generate more interesting games.
1) Sample random generator: This is the simplest generator
provided with the framework. The main idea is to generate a game that compiles with no errors. For example, the
game shouldn’t contain interactions such as killing the end
of screen (EOS) sprite. The algorithm starts by generating
a random number of interactions by selecting two random
sprites (including EOS) and a random interaction rule one
by one. The algorithm checks that every interaction is valid
before adding it to the generated game. After generating the
random interactions, the algorithm generates two termination
conditions, one for winning and one for losing. The losing
condition is fixed to the avatar being killed, while the winning
is either winning the game after a random amount of frames or
winning the game when the number of a certain sprite reaches
zero.
2) Sample constructive generator: This is a more complex
generator that utilizes knowledge about VGDL language and
level design to generate more interesting games. The algorithm
starts by classifying the game sprites into different categories,
such as wall sprites (sprites that surround the level), collectible/harmful sprites (immovable sprites that cover around
10% of the level), spawner sprites (sprites that spawn another
sprite type), etc. For each type of sprite, the algorithm has rules
to generate interactions based on them. For example, harmful
sprites kill the avatar on collision, wall sprites either prevent
any movable object from passing through or kill the movable
object upon collision, etc. For more details about the rules,
the reader is referred to [15]). After the game interactions are
generated, two termination conditions are generated, one for
winning and one for losing. The losing condition is fixed to
the avatar’s death, while the winning condition depends on the
current sprites. For example: if collectible sprites exist in the
current definition, the winning condition is set to collect all of
them.
B. Search-based methods
Search-based methods use a search based algorithm to find a
game based on certain criteria that ensure the generated game
have better rules than just randomly choosing them.
1) Sample genetic generator: Similar to the level generation track, the search based algorithm uses Feasible Infeasible
2 Population Genetic Algorithm (FI2Pop) [63] to evolve new
games. As discussed before, FI2Pop keeps two populations
one for feasible games and the other for infeasible games.
The infeasible games tries to become feasible by satisfying
multiple constraints such as minimizing the number of bad
frames (frames contains sprites outside the level boundaries)
under certain threshold, the avatar doesn’t die in the first 40frames, etc. On the other hand, the feasible chromosomes try
to maximize its fitness. The fitness consists of two parts, the
first part is to maximize the difference in performance between
the OLETS and MCTS agents, and the difference between
MCTS and random agent. The second part is to maximize the
number of interaction rules that fires during the simulation of
the generated game.
2) Thorbjrn generator: This generator [66] is inspired by
the sample genetic generator. Similar to the sample genetic
generator, it tries to maximize the difference between the
performance of different algorithms. This generator uses evolutionary strategies with mutation and crossover operators to
generate an entire game instead of an interaction set and
termination conditions.
IX. R ESEARCH
THAT BUILDS ON
GVGAI
A. AI-assisted game design
Machado et al. [67] implemented a recommender system
based on the VGDL to recommend game elements, such as
sprites and mechanics. Then, the recommender system was
expanded to Cicero [68], an AI-assisted game design tool
built on top of the GVGAI. Cicero has a statistics tool of
the interactions to help figuring out the unused game rules; a
visualization system to illustrate the information about game
objects and events, a mechanics recommender, a query system
for in-game data and a retrospective analysis application SeekWhence [69]. The gameplay sessions by human players or AI
agents can be recorded and every single frame at every game
tick can be easily extracted for further study and analysis.
Recently, Liu et al. [70] applied a simple Random Mutation
Hill Climber (RMHC) and a Multi-Armed Bandit RMHC
together with resampling methods to tune game parameters
automatically. Games instances with significant skill-depth
have been evolved using GVGAI agents. Futhermore, Kunanusont et al. [52] evolved simultaneously the GVGAI agents as
part of the game (opponent models).
Guerrero et al. [71] explored five GVGAI agents using
four different heuristics separately on playing twenty GVGAI
games, allowing different behaviors according to the diverse
scenarios presented in the games. In particular, this work
explored heuristics that were not focused on winning the game,
but to explore the level or interact with the different sprites
of the games. These agents can be used to evaluate generated
games, thus help evolve them with preferences to particular
behaviors.
Khalifa et al. [72] modified MCTS agents by editing the
UCT formula used in the agent. Human playing data has
been used for modeling to make the modified agents playing
in a human-like way. Primary results showed that one of
the studied agents achieved a similar distribution of repeated
actions to the one by human players. The work was then
extended by Bravi et al. [50], in which game-play data have
been used to evolve effective UCT alternatives for a specific
game. The MCTS agents using new formulas, with none
or limited domain information, are compared to a standard
implementation of MCTS (the sampleMCTS agent of GVGAI)
on the game Missile Command. Applying the UCT alternatives
evolved using game-playing data to a standard MCTS significantly improved its performance.
Besides designing games and the agents used in them,
the automatic generation of video game tutorials (aimed at
helping players understanding how to play a game) is also
an interesting sub-field of study. Green et al. [73] pointed
out that the GVGAI Framework provides an easy testbed for
tutorial generation. The game rules in GVGAI are defined in
VGDL, therefore the tutorial generation can be easily achieved
by reading and translating VGDL files.
A more recent work by Anderson et al. [74] focused on
designing deceptive games to deceive AI agents and lead
the agents away from a globally optimal policy. Designing
such games helps understand the capabilities and weaknesses
of existing AI agents and can serve at a preparation step
for designing a meta-agent for GVGP which combines the
advantages of different agents. The authors categorized the deceptions and imported various types of deception to the existing GVGAI games by editing the corresponding VGDL files.
The agents submitted to the GVGAI single-player planing
competition have been tested on the new games. Interestingly,
the final ranking of the agents on each of the games differed
significantly from the rankings in the GVGAI competition.
The new designed deceptive games successfully explored the
weaknesses of agents which have performed well on the test
set of the official competition.
B. Game generation with RAPP
Nielsen et al. [75] proposed Relative Algorithm Performance Profile (RAPP) as a measure of relative performance
of agents and tested their approach on different general gameplaying AI agents using GVGAI framework. The authors
showed that well-designed games have clear skill-depth, thus
being able to distinct good or bad players. In other words,
a strong agent or human player should perform significantly
better than a weak agent or human player over multiple
playings on well-designed games. For instance, a skillful agent
is expected to perform better than a random agent, or one that
does not move.
Then, Nielsen et al. [66] integrated the differences of
average game scores and win rate between any agent and a
random agent to the evaluation of new games either randomly
generated or generated by editing existing GVGAI games.
Though most of the resulted games are interesting to play,
there are some exceptions, in which the core challenge of the
game has been removed. For instance, the enemy can not heart
the player, which makes it no more an enemy. But it still
provides useful starting points for human designers.
Kunanusont et al. [52] extended the idea of RAPP. Five
GVGAI agents and a deterministic agent designed for the
tested Space Battle Game are used as the candidate opponent,
which is considered as part of the game to be evolved.
Two GVGAI agents, One Step Look Ahead (weak), MCTS
(strong) and the deterministic agent (mediocre), are used to
play multiple times the evolved game for evaluation. The
evaluation function is defined as the minimum of the difference
of game scores between the strong and mediocre agents, and
the difference of game scores between the mediocre and weak
agents, aiming at generating games that can clearly distinguish
stronger agents and weak agents. A recently proposed N-Tuple
Bandit Evolutionary Algorithm [76] has been compare to the
simple RMHC. Two human players have tested the generated
games and preferred the new game evolved using the N-Tuple
Bandit Evolutionary Algorithm.
C. Robustness testing
Perez et al. [77] ran a study on the winners of the 2014
and 2015 editions of the single player planning competition
in order to analyze how robust they were to changes in the
environment with regards to actions and rewards. The aim of
this work was to analyze a different type of generality: controllers for this framework are developed to play in multiple
games under certain conditions, but the authors investigated
which could be the effect of breaking those compromises. An
inaccurate and noisy Forward Model, an agent that does not
execute the move decided by the algorithm, or score penalties
incurred by performing certain actions.
An interesting conclusion on this study is that, once the
conditions have been altered, sample agents climb up to the
top of the rankings and the good controllers behave worse.
Agents that rely on best first search or A* (such as YOLOBOT
or Return42, already described in this paper) handled noise
very badly. MCTS also showed to be quite robust in this
regard, above other Rolling Horizon agents that could not
cope so well with these changes. This work also reinforced
the idea that the GVGAI framework and competition are also
robust. Despite the changes in the performance of the agents,
some controllers do better than others under practically all
conditions. The opposite (rankings depending only on noise
factors, for instance) would mean that the framework is quite
fragile.
X. E DUCATIONAL USE OF GVGAI
The GVGAI framework has been used to provide engaging
assignments for taught modules, and as the basis for many
MSc dissertation projects. The descriptions below give an idea
of the educational uses of GVGAI but are not intended to be
an exhaustive list.
interesting games as the assignment. This was done to good
effect at IT University of Copenhagen, where the students
produced a number of challenging puzzle games that were
later used in the planning track training and validation sets. A
similar approach was taken in a module on AI-Assisted Game
Design at the University of Essex, where planning track games
were also produced.
B. MSc Dissertation Projects
GVGAI offers an extensive range of interesting research
challenges, some of which have been addressed in MSc
dissertation projects. The majority of the ones we are aware of
have focused on the planning track, but this is not surprising
as it was the first track to be developed. The planning track
also has the benefit of providing some good sample agents
as starting points for further work either in the sense of
extending the samples to achieve higher performance, or using
the samples as a useful source of comparison. A good example
is the work on MCTS with options, which used showed the
the version with options significantly outperformed the sample
MCTS agent on most of the games studied: as with many
cases what began as an MSc thesis was later published as a
conference paper [33]. In our experience this usually provides
an excellent educational experience for the student. Other
planning track theses include [25], the real-time enhancements
of [26], knowledge-based variants [46] and goal-oriented
approaches [53].
Beyond the planning track, other examples (already described in this survey) include applying Answer-Set Programming (ASP) [78] or Genetic Algorithms (GA) [64] for the level
generation track and learning from screen capture [60] (this
was essentially a learning track approach before the learning
track was running). Finally, another approach is to extend the
framework in some way, such developing the 2-player learning
track [79].
XI. D ISCUSSION
AND OPEN RESEARCH PROBLEMS ON
SINGLE AND TWO - PLAYER PLANNING
A. Taught Modules
GVGAI has been used in at least two distinct ways within
taught modules. The most typical way is to use design specific
aspects of the course around the framework, teaching the
students about the main concepts of GVGAI with examples
of how to write agents for the selected tracks. This is then
followed up with an assignment, where a significant weight is
given to how well each student or group’s entry performs in the
league. Several institutions have run private leagues for this,
including Otto Von Guericke Universität Magdeburg, University of Essex, University of Muenster, Universidad Carlos III
de Madrid, Universidad de Malaga and New York University.
Running a private league means the course supervisor has full
control over the setup of the league, including when students
can enter and how thoroughly the entries are evaluated, and
the set of games to evaluate them on. For the 2-player track,
this also allows control over the opponents chosen.
Another use-case in taught modules is to teach the VGDL
part of framework, and then set the development of novel and
The single and two-player planning versions of GVGAI
are the ones that have received most attention and research.
Despite their popularity and efforts, the best approaches rarely
surpass an approximately 50% victory rate in competition
game sets, with very low victory percentage in a great number
of games. Similarly, different MCTS and RHEA variants
(including many of the enhancements studied in the literature)
struggle to achieve a higher than 25% victory rate in all (more
than a hundred) single-player games of the framework. Therefore, increasing performance in a great proportion of games is
probably the most challenging problem at the moment.
Literature shows multiple enhancements on algorithms and
methods aiming to improve this performance, but in the vast
majority of cases the improvements only affect a subset of
games or certain configurations of the algorithms. While this
is understandable due to the nature of general video game
playing, it also shows that the current approaches does not
work in order to reach truly general approaches that work
across board.
The work described in this survey has shown, however,
interesting insights that can point us in the right direction. For
instance, several studies show that using more sophisticated
(i.e. with A* or other methods such as potential fields)
distances to sprites as features works better than Euclidean
distances. The downside is that computing these measurements
take an important part of the decision time budget, which can’t
be used in case it is needed for some games or states where
the best action to take is not straight-forward.
In general, one could say that one of the main points to
address is how to use the decision time more wisely. Some
approaches tried to make every use of the forward model
count, like those agents that attempt to learn facts about the
game during the rollouts of MCTS. Again, some attempts in
this direction have provided marginal improvements, but the
problem may be trying to a general feature extractor. In other
words, what we try to learn is influenced by what we know
about existing games (i.e. some sprites are good, other are bad,
some spawn other entities and there are things - resources that the avatar can collect). Some games may require features
that have not been thought of, especially because the challenge
itself presents games that has not been seen before to the
participants.
Another improvement that has been tried in several studies
is the use of macro-actions (in most cases, a repetition of an
action during several consecutive steps) to a) make the action
space coarser; and b) make a better use of the time budget.
Again, these modifications have improved performance in
certain games (including some that had not been won by any
algorithm previously) but they either did not have an impact
in others, or they made the performance worse. It is likely
that different games can benefit from different macro-action
lengths (so work could be done on trying to automatically and
dynamically adapt the number of times the action is repeated)
but also of more complex structures that allow for high-level
planning. In fact, games that require high-level planning are
still and open problem to be solved in this setting.
Games classification and the use of hyper-heuristics are also
an interesting area for research. Some of the best approaches
up to date, as YOLOBOT, do make a differentiation between
stochastic and deterministic games to later use one or another
algorithm. An open challenge is how to make this classification
more accurate and detailed, so an approach could count on a
portfolio of (more than 2) algorithms that adapt to every game.
Attempts have been made to classify with game features, but
results suggest that these classifications and the algorithms
used are not strong enough. Devising more general features
for this clustering, maybe focused on the agent gameplay
experience rather than game features, is a line of future
research.
All these unsolved issues apply to both single and two
player settings, although the latter case adds the difficulty of
having an opponent to compete or collaborate with. There are
two open problems that arise from this: first, no study has
been made that tries to identify the game and behaviour of the
opponent as collaborative of competitive. Analysis of the other
player’s intentions can be seen as a sub-field on its own, only
that in this case we add the general game playing component
to it. Secondly, some advancements have been done in using
opponent models that go beyond random, but investigation in
more complicated opponent models that better capture and
learn the behaviour of the other player could potentially yield
better results.
Beside the development of agents for game playing, AIassisted game design and automatic game testing and debugging using GVGAI agents have attracted researchers’ attention.
Some work around evolving game skill-depth using relative
performance between GVGAI agents have been done recently,
and most of this work has been focused on Relative Algorithm
Performance Profiles (RAPP), where performance is measured
in terms of how well the agents play the given games.
However, it is sensible to explore other aspects of agent game
play to influence game design. Factors like the amount of
level explored by different agents (so a generator favours those
levels or games that allow for a wider exploration, or maybe a
progressive one), their decisiveness [80] on selecting the best
action to take or the entropy of their moves can also be used
to this end.
XII. F UTURE D IRECTIONS
The GVGAI framework and competition are in constant
development. The opportunities that this benchmark provides
for different lines of research and education are varied, and
this section outlines the future directions planned ahead for
the following years.
A. New tracks
As new challenges are proposed, the possibility of organizing them as tracks for the competition arise. Below are listed
some possible new tracks that can attract interesting areas of
research.
1) Automatic game design: The game design involves,
but not limited to, game generation, level generation, rule
generation and playtesting (playing experience, game feeling,
fun, etc.), study of game market, user interface design and
audio design. The automatic game design becomes an active
research topic since the late 2000’s, though, to the best of our
knowledge, Barney Pell firstly automatically generated rules
for chess-like games in 1992 [81]. A review of the state of the
art in automatic game design can be found in [70].
A Game Generation track would aim at providing
AI controllers which automatically generate totally new games
or game instances by varying the game parameters, i.e.,
parameter tuning. How to achieve the former is an open
question. The straight-forward way would be providing a
particular theme, a database of game objects, or searching
spaces of game rules, with which the participants can generate
new games. The ideal case would be that the controllers
automatically create totally new games from nothing. Though
there is a yawning gulf between aspiration and reality, an
interdisciplinary field combining automatic game design and
domain-specific automatic programming is expected. The latter, automatic game tuning, is relatively easier. Some searchbased and population-based methods have been applied to
game parameter optimisation aiming at maximising the depth
of game variants [70] or finding more playable games [82].
2) Multi-Player GVGAI: Multi-agent games has drawn
people’s attention, for instance, real time strategy games (e.g.
StarCraft) and board games (e.g. Mahjong). The study of
multi-agent GVGAI is a fruitful research topic. Atari games
can also be extended to multi-agent games. In particular,
the Pac-Man can be seen as a multi-agent game and related
competitions have been held since 2011 [1]. The most recent
Ms Pac-Man vs Ghost Team Competition [83], which included
partial observability, was held at CIG in 2016. Nevertheless,
a more general multi-agent track is favorable.
The interface of the Two-Player Planning Track was initially
developed for two or more players, so it has the potential to
be expanded to a Multi-player planning track, in which an
agent is allowed to control more than one player or each of
the players is controlled by a separate agent. This future track
can be expanded again as a multi-agent learning framework,
providing a two-or-more player learning track.
3) Turing Test GVGAI: Determining if an agent that is
playing a game is a human or a bot is a challenge that has
been subject of study for many years [84], [85], and the idea
of applying it to a general video game setting is not new [86].
This offers an interesting opportunity to extend the framework
to having a Turing Test track where participants create AI
agents that play like humans for any game that is given. Albeit
the understandable difficulty of this problem, the interest for
research in this area is significant: what are the features that
can make an agent play like a human in any game?
B. General directions
There are several improvements and additions to the framework that can be done and would potentially affect all existent
and future competition tracks. One of these continuous modifications is the constant enlargement of the games library.
Not only new games are added for each new edition of the
competition, but the work done on automatic game design
using the GVGAI framework has the potential to create infinite
number of games that can be integrated perfectly into the
framework.
Adding more games can also be complemented with compatibility with other systems. Other general frameworks like
OpenAI Gym [87], ALE [4] or Microsoft Malmö [88] count on
a great number of single or multi-player, model-free or model
based tasks. Interfacing with these systems would increment
the number of available games which all GVGAI agents could
play via a common API. This would also open the framework
to 3D games, an important section of the environments the
current benchmark does not cover.
With regards to the agents, another possibility could be
to provide them with a wider range of available actions.
For instance, the player could be able to apply more than
one action simultaneously, or these actions could form a
continuous action space (i.e. pressing a throttle in a range
between 0 and 1). In general, this would enhance the number
of legal combinations for the agent to choose from at each
decision step.
Beside the framework itself, the website for GVGAI could
also be improved to provide better and faster feedback to
the competition participants. More data analysis features can
be added, such as visualization of the score changes during
the game playing, the action entropy and the exploration of
the game world (heat-map of visited positions). A related
work is to provide better and more flexible support for game
play metric logging, better support for data mining of results
together with visualization, and better data saving, which will
help enabling to upload replays (i.e., action logs) from AI
agents and human play-throughs.
Another envisaged feature is being able to play the game
in a web browser (without any download or installation) by
an AI agent or human, and visualize the analyzed features
during the game playing in real time. A bonus will be the
easy parametrisation options for games., thus a player or
an AI agent can easily set up the parameters and rules to
define the desired game by inserting values directly or generate
pseudo-randomly a level to play using some pre-implemented
automatic game tuning techniques given some particular goals
or features.
XIII. C ONCLUSIONS
The GVGAI framework offers the most comprehensive
system to date for evaluating the performance of general
video game playing agents, and for testing general purpose
algorithms for creating new games and creating new content
for novel games. The framework has been used in multiple
international competitions, and has been used to evaluate the
performance of hundreds of general video game agents.
The agent tracks cater for planning agents able to exploit
a fast forward model, and learning agents that must learn
to react sensibly without the benefits of a forward model.
The planning track already comes in single and two-player
versions; the learning track is currently single-player only, but
with a two-player version under development. Although longterm learning may also be used within the planning track, the
best-performing agents have, as far as we know, not yet done
this. The success of AlphaGoZero [89] indicates what can be
achieved by combining learning and planning, so applying a
similar system within GVGAI is an interesting prospect.
The main alternative to GVGAI is the Atari Learning
Environment (ALE). At the time of writing, ALE offers
higher-quality games than GVGAI as they were home-console
commercial games of a few decades ago. In GVGAI terms,
ALE offers just two tracks: single-player learning, and singleplayer planning, with the learning track being the more widely
used. For future work on machine learning in video games,
we predict that the 2-player tracks will become the most
important, as they offer open-ended challenges based on an
arms race of intelligence as new players are developed, and
are also outside of the current scope of ALE.
In addition to offering a wider range of tasks, GVGAI
also benefits from being much more easily extensible than
ALE, though ALE has so far had greater uptake within some
sectors of the machine learning community. An immediate
priority is to test the rich set of ALE agents on the equivalent
GVGAI-tracks to gain a sense of the relative difficulty of
each environment and to learn more of the relative challenges
offered by each one.
The content creation tracks offer an extremely hard challenge: creating rules or levels for unseen games. Promising
directions include the further development and exploitation of
a range of general game evaluation measures [80], and greater
use of the best GVGAI agents to perform the play-testing of
the novel rules and levels.
The Video Game Description Language (VGDL) has been
an important part of GVGAI to date, since it makes it possible
to rapidly and concisely specify new games. However, it is
also a source of limitation, as its limited expressivity makes it
hard to make games which are fun for humans to play. VGDL
also limits the ease with which complex game mechanics can
be embedded in games, which in turn limits the depth of
challenge that can be posed for the GVGAI agents. Hence
an important future direction is the authoring of GVGAIcompatible games in any suitable language which conform
to the necessary GVGAI API in order to ensure compatibility
with the desired GVGAI track.
Finally, while the above discussion provides a compelling
case for the future of GVGAI as a tool for academic study, we
also believe that when it reaches a higher level of maturity it
will provide an important tool for game designers. The vision
is to provide an army of intelligent agents with a range of
play-testing abilities, and a diverse set of metrics with which
to analyse a range of important functional aspects of a game.
ACKNOWLEDGEMENTS
The authors would like to thank the participants of all tracks
of the competition for their work and submitted controllers and
generators. This work was partially funded by the EPSRC
CDT in Intelligent Games and Game Intelligence (IGGI)
EP/L015846/1.
R EFERENCES
[1] D. P.-L. Philipp Rohlfshagen, Jialin Liu and S. M. Lucas, “Pac-Man
Conquers Academia: Two Decades of Research Using a Classic Arcade
Game,” IEEE Transactions on Computational Intelligence and AI in
Games, 2017.
[2] S. Karakovskiy and J. Togelius, “The mario ai benchmark and competitions,” IEEE Transactions on Computational Intelligence and AI in
Games, vol. 4, no. 1, pp. 55–67, 2012.
[3] D. Loiacono, P. L. Lanzi, J. Togelius, E. Onieva, D. A. Pelta, M. V.
Butz, T. D. Lonneker, L. Cardamone, D. Perez, Y. Sáez et al., “The
2009 simulated car racing championship,” IEEE Transactions on Computational Intelligence and AI in Games, vol. 2, no. 2, pp. 131–147,
2010.
[4] M. G. Bellemare, Y. Naddaf, J. Veness, and M. Bowling, “The arcade
learning environment: An evaluation platform for general agents.” J.
Artif. Intell. Res.(JAIR), vol. 47, pp. 253–279, 2013.
[5] S. Ontanón, G. Synnaeve, A. Uriarte, F. Richoux, D. Churchill, and
M. Preuss, “A survey of real-time strategy game ai research and competition in starcraft,” IEEE Transactions on Computational Intelligence
and AI in games, vol. 5, no. 4, pp. 293–311, 2013.
[6] D. Perez-Liebana, S. Samothrakis, J. Togelius, S. M. Lucas, and
T. Schaul, “General Video Game AI: Competition, Challenges and
Opportunities,” in Thirtieth AAAI Conference on Artificial Intelligence,
2016, pp. 4335–4337.
[7] M. Ebner, J. Levine, S. M. Lucas, T. Schaul, T. Thompson, and
J. Togelius, “Towards a video game description language,” 2013.
[8] T. Schaul, “A video game description language for model-based or
interactive learning,” in Computational Intelligence in Games (CIG),
2013 IEEE Conference on. IEEE, 2013, pp. 1–8.
[9] ——, “An extensible description language for video games,” IEEE
Transactions on Computational Intelligence and AI in Games, vol. 6,
no. 4, pp. 325–331, 2014.
[10] J. Levine, C. B. Congdon, M. Ebner, G. Kendall, S. M. Lucas, R. Miikkulainen, T. Schaul, and T. Thompson, “General video game playing,”
Dagstuhl Follow-Ups, vol. 6, 2013.
[11] D. Perez, S. Samothrakis, J. Togelius, T. Schaul, S. Lucas, A. Couëtoux,
J. Lee, C.-U. Lim, and T. Thompson, “The 2014 general video game
playing competition,” IEEE Transactions on Computational Intelligence
and AI in Games, vol. 8, pp. 229–243, 2015.
[12] R. D. Gaina, D. Perez-Liebana, and S. M. Lucas, “General Video
Game for 2 Players: Framework and Competition,” in Proceedings of
the IEEE Computer Science and Electronic Engineering Conference
(CEEC), 2016.
[13] R. D. Gaina, A. Couëtoux, D. J. Soemers, M. H. Winands, T. Vodopivec,
F. Kirchgessner, J. Liu, S. M. Lucas, and D. Perez-Liebana, “The
2014 general video game playing competition,” IEEE Transactions on
Computational Intelligence and AI in Games, 2017.
[14] A. Khalifa, D. Perez-Liebana, S. M. Lucas, and J. Togelius, “General
video game level generation,” in Proceedings of the 2015 Annual
Conference on Genetic and Evolutionary Computation. ACM, 2016.
[15] A. Khalifa, M. C. Green, D. Pérez-Liébana, and J. Togelius, “General
Video Game Rule Generation,” in 2017 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2017.
[16] D. Pérez-Liébana, M. Stephenson, R. D. Gaina, J. Renz, and S. M.
Lucas, “Introducing Real World Physics and Macro-Actions to General
Video Game AI,” in 2017 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2017.
[17] J. Liu, D. Perez-Liebana, and S. M. Lucas, “The Single-Player GVGAI
Learning Framework - Technical Manual,” 2017. [Online]. Available:
http://www.liujialin.tech/publications/GVGAISingleLearning manual.pdf
[18] T. Joppen, M. Moneke, N. Schroder, C. Wirth, and J. Furnkranz,
“Informed Hybrid Game Tree Search for General Video Game Playing,”
IEEE Transactions on Computational Intelligence and AI in Games,
2017.
[19] D. Ashlock, D. Pérez-Liébana, and A. Saunders, “General Video Game
Playing Escapes the No Free Lunch Theorem,” in 2017 IEEE Conference
on Computational Intelligence and Games (CIG). IEEE, 2017.
[20] T. Geffner and H. Geffner, “Width-based planning for general videogame playing,” in Eleventh Artificial Intelligence and Interactive Digital
Entertainment Conference, 2015.
[21] D. Soemers, C. Sironi, T. Schuster, and M. Winands, “Enhancements for
Real-Time Monte-Carlo Tree Search in General Video Game Playing,”
in IEEE Conference on Computational Intelligence and Games (CIG),
2016.
[22] G. A. Rummery and M. Niranjan, On-line Q-learning using connectionist systems. University of Cambridge, Department of Engineering,
1994, vol. 37.
[23] J.
Liu,
“Gvgai
single-player
learning
competition
at
ieee
cig17,”
2017.
[Online].
Available:
https://www.slideshare.net/ljialin126/gvgai-singleplayer-learning-competition-at-ieee-ci
[24] C. B. Browne, E. Powley, D. Whitehouse, S. M. Lucas, P. I. Cowling,
P. Rohlfshagen, S. Tavener, D. Perez, S. Samothrakis, and S. Colton,
“A survey of monte carlo tree search methods,” IEEE Transactions on
Computational Intelligence and AI in games, vol. 4, no. 1, pp. 1–43,
2012.
[25] M. B. A. for General Video Games, “Torsten schuster,” Master’s thesis,
Maastricht University, 2015.
[26] D. J. Soemers, “Enhancements for real-time monte-carlo tree search
in general video game playing,” Master’s thesis, Maastricht University,
2016.
[27] D. Perez, S. Samothrakis, and S. Lucas, “Knowledge-based fast evolutionary mcts for general video game playing,” in 2014 IEEE Conference
on Computational Intelligence and Games. IEEE, 2014, pp. 1–8.
[28] C. Y. Chu, T. Harada, and R. Thawonmas, “Biasing monte-carlo rollouts
with potential field in general video game playing,” , p. 6p, 2015.
[29] C. Y. Chu, H. Hashizume, Z. Guo, T. Harada, and R. Thawonmas,
“Combining pathfmding algorithm with knowledge-based monte-carlo
tree search in general video game playing,” in 2015 IEEE Conference
on Computational Intelligence and Games (CIG). IEEE, 2015, pp.
523–529.
[30] H. Park and K.-J. Kim, “Mcts with influence map for general video game
playing,” in 2015 IEEE Conference on Computational Intelligence and
Games (CIG). IEEE, 2015, pp. 534–535.
[31] P. Auer, “Using confidence bounds for exploitation-exploration tradeoffs,” Journal of Machine Learning Research, vol. 3, no. Nov, pp. 397–
422, 2002.
[32] E. H. dos Santos and H. S. Bernardino, “Redundant action avoidance and
non-defeat policy in the monte carlo tree search algorithm for general
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
video game playing,” in Proceedings do XVI Simpsio Brasileiro de Jogos
e Entretenimento Digital, 2017.
M. d. Waard, D. M. Roijers, and S. C. Bakkes, “Monte carlo tree search
with options for general video game playing,” in 2016 IEEE Conference
on Computational Intelligence and Games (CIG). IEEE, 2016, pp. 47–
54.
D. Perez-Liebana, S. Mostaghim, and S. M. Lucas, “Multi-objective
tree search approaches for general video game playing,” in Evolutionary
Computation (CEC), 2016 IEEE Congress on. IEEE, 2016, pp. 624–
631.
A. Khalifa, M. Preuss, and J. Togelius, “Multi-objective adaptation of
a parameterized gvgai agent towards several games,” in International
Conference on Evolutionary Multi-Criterion Optimization. Springer,
2017, pp. 359–374.
I. Bravi, A. Khalifa, C. Holmgård, and J. Togelius, “Evolving uct
alternatives for general video game playing,” in The IJCAI-16 Workshop
on General Game Playing, 2016, p. 63.
A. Babadi, B. Omoomi, and G. Kendall, “Enhic: An enforced hill climbing based system for general game playing,” in 2015 IEEE Conference
on Computational Intelligence and Games (CIG). IEEE, 2015, pp.
193–199.
M. J. Nelson, “Investigating vanilla mcts scaling on the gvg-ai game
corpus,” in 2016 IEEE Conference on Computational Intelligence and
Games (CIG). IEEE, 2016, pp. 402–408.
R. D. Gaina, J. Liu, S. M. Lucas, and D. Pérez-Liébana, “Analysis
of vanilla rolling horizon evolution parameters in general video game
playing,” in European Conference on the Applications of Evolutionary
Computation. Springer, 2017, pp. 418–434.
B. Jia, M. Ebner, and C. Schack, “A gp-based video game player,” in
Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation. ACM, 2015, pp. 1047–1053.
B. Jia and M. Ebner, “A strongly typed gp-based video game player,”
in 2015 IEEE Conference on Computational Intelligence and Games
(CIG). IEEE, 2015, pp. 299–305.
R. D. Gaina, S. M. Lucas, and D. Pérez-Liébana, “Population Seeding
Techniques for Rolling Horizon Evolution in General Video Game Playing,” in 2017 IEEE Conference on Evolutionary Computation (CEC).
IEEE, 2017.
——, “Rolling Horizon Evolution Enhancements in General Video
Game Playing,” in 2017 IEEE Conference on Computational Intelligence
and Games (CIG). IEEE, 2017.
D. Perez Liebana, J. Dieskau, M. Hunermund, S. Mostaghim, and
S. Lucas, “Open loop search for general video game playing,” in Proceedings of the 2015 Annual Conference on Genetic and Evolutionary
Computation. ACM, 2015, pp. 337–344.
H. Horn, V. Volz, D. Pérez-Liébana, and M. Preuss, “Mcts/ea hybrid
gvgai players and game difficulty estimation,” in Computational Intelligence in Games (CIG), 2013 IEEE Conference on. IEEE, 2013, pp.
1–8.
J. van Eeden, “Analysing and improving the knowledge-based fast
evolutionary mcts algorithm,” 2015.
C.-Y. Chu, S. Ito, T. Harada, and R. Thawonmas, “Position-based
reinforcement learning biased mcts for general video game playing,”
in 2016 IEEE Conference on Computational Intelligence and Games
(CIG). IEEE, 2016, pp. 444–451.
E. Ilhan, Erdem, and Ş. Uyar, “Monte Carlo Tree Search with TemporalDifference Learning for General Video Game Playing,” in 2017 IEEE
Conference on Computational Intelligence and Games (CIG). IEEE,
2017.
H. Van Seijen, A. R. Mahmood, P. M. Pilarski, M. C. Machado, and R. S.
Sutton, “True online temporal-difference learning,” Journal of Machine
Learning Research, vol. 17, no. 145, pp. 1–40, 2016.
I. Bravi, A. Khalifa, C. Holmgård, and J. Togelius, “Evolving gamespecific ucb alternatives for general video game playing,” in European
Conference on the Applications of Evolutionary Computation. Springer,
2017, pp. 393–406.
C. F. Sironi, J. Liu, D. Perez-Liebana, R. D. Gaina, I. Bravi, S. M.
Lucas, and W. M. H. M, “Self-Adaptive MCTS for General Video Game
Playing,” in European Conference on the Applications of Evolutionary
Computation. Springer, 2018, p. to appear.
K. Kunanusont, R. D. Gaina, J. Liu, D. Perez-Liebana, and S. M. Lucas,
“The n-tuple bandit evolutionary algorithm for automatic game improvement,” in Evolutionary Computation (CEC), 2017 IEEE Congress on.
IEEE, 2017, pp. 2201–2208.
B. Ross, “General video game playing with goal orientation,” Master’s
thesis, University of Strathclyde, 2014.
[54] P. Bontrager, A. Khalifa, A. Mendes, and J. Togelius, “Matching games
and algorithms for general video game playing,” in Twelfth Artificial
Intelligence and Interactive Digital Entertainment Conference, 2016.
[55] A. Mendes, A. Nealen, and J. Togelius, “Hyperheuristic general video
game playing,” Proceedings of Computational Intelligence and Games
(CIG). IEEE, 2016.
[56] J. M. Gonzalez-Castro and D. Perez-Liebana, “Opponent Models Comparison for 2 Players in GVGAI Competitions,” in Computer Science
and Electronic Engineering Conference (CEEC), 2017 9th. IEEE, 2017.
[57] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction.
MIT press Cambridge, 1998, vol. 1, no. 1.
[58] S. Samothrakis, D. Perez-Liebana, S. M. Lucas, and M. Fasli, “Neuroevolution for general video game playing,” in 2015 IEEE Conference
on Computational Intelligence and Games (CIG). IEEE, 2015, pp.
200–207.
[59] A. Braylan and R. Miikkulainen, “Object-model transfer in the general
video game domain,” in Twelfth Artificial Intelligence and Interactive
Digital Entertainment Conference, 2016.
[60] K. Kunanusont, “General video game artificial intelligence: Learning
from screen capture,” Master’s thesis, University of Essex, 2016.
[61] K. Kunanusont, S. M. Lucas, and D. Pérez-Liébana, “General Video
Game AI: Learning from Screen Capture,” in 2017 IEEE Conference on
Evolutionary Computation (CEC). IEEE, 2017.
[62] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski
et al., “Human-level control through deep reinforcement learning,”
Nature, vol. 518, no. 7540, p. 529, 2015.
[63] S. O. Kimbrough, G. J. Koehler, M. Lu, and D. H. Wood, “On a feasible–
infeasible two-population (fi-2pop) genetic algorithm for constrained
optimization: Distance tracing and no free lunch,” European Journal
of Operational Research, vol. 190, no. 2, pp. 310–327, 2008.
[64] J. Nichols, “The use of genetic algorithms in automatic level generation,”
Master’s thesis, University of Essex, 2016.
[65] X. Neufeld, S. Mostaghim, and D. Perez-Liebana, “Procedural level generation with answer set programming for general video game playing,”
in Computer Science and Electronic Engineering Conference (CEEC),
2015 7th. IEEE, 2015, pp. 207–212.
[66] T. S. Nielsen, G. A. Barros, J. Togelius, and M. J. Nelson, “Towards
generating arcade game rules with vgdl,” in Computational Intelligence
and Games (CIG), 2015 IEEE Conference on. IEEE, 2015, pp. 185–
192.
[67] T. Machado, I. Bravi, Z. Wang, A. Nealen, and J. Togelius, “Shopping
for game mechanics,” 2016.
[68] T. Machado, A. Nealen, and J. Togelius, “Cicero: A mixed-initiative
AI-assisted game design tool,” in Proceedings of the 12th International
Conference on the Foundations of Digital Games, ser. FDG’17. New
York, NY, USA: ACM, 2017.
[69] ——, “SeekWhence a Retrospective Analysis Tool for General
Game Design,” in Proceedings of the 12th International Conference
on the Foundations of Digital Games, ser. FDG ’17. New
York, NY, USA: ACM, 2017, pp. 4:1–4:6. [Online]. Available:
http://doi.acm.org/10.1145/3102071.3102090
[70] J. Liu, J. Togelius, D. Pérez-Liébana, and S. M. Lucas, “Evolving
game skill-depth using general video game ai agents,” in 2017 IEEE
Conference on Evolutionary Computation (CEC). IEEE, 2017.
[71] C. Guerrero-Romero, A. Louis, and D. Pérez-Liébana, “Beyond Playing
to Win: Diversifying Heuristics for GVGAI,” in 2017 IEEE Conference
on Computational Intelligence and Games (CIG). IEEE, 2017.
[72] A. Khalifa, A. Isaksen, J. Togelius, and A. Nealen, “Modifying mcts
for human-like general video game playing.” in IJCAI, 2016, pp. 2514–
2520.
[73] M. C. Green, A. Khalifa, G. A. Barros, and J. Togelius, ““Press
Space To Fire”: Automatic Video Game Tutorial Generation,” in Fourth
Experimental AI in Games Workshop, 2017.
[74] D. Anderson, M. Stephenson, J. Togelius, C. Salge, J. Levine, and
J. Renz, “Deceptive games,” arXiv preprint arXiv:1802.00048, 2018.
[75] T. S. Nielsen, G. A. Barros, J. Togelius, and M. J. Nelson, “General
video game evaluation using relative algorithm performance profiles,” in
European Conference on the Applications of Evolutionary Computation.
Springer, 2015, pp. 369–380.
[76] S. M. Lucas, J. Liu, and D. Perez-Liebana, “The n-tuple bandit
evolutionary algorithm for game agent optimisation,” arXiv preprint
arXiv:1802.05991, 2018.
[77] D. Pérez-Liébana, S. Samothrakis, J. Togelius, T. Schaul, and S. M.
Lucas, “Analyzing the robustness of general video game playing agents,”
in Proceedings of the IEEE Conference on Computational Intelligence
and Games, 2016.
[78] X. Neufeld, “Procedural level generation with answer set programming
for general video game playing,” Master’s thesis, University of Magdeburg, 2016.
[79] R. D. Gaina, “The 2 player general video game playing competition,”
Master’s thesis, University of Essex, 2016.
[80] V. Volz, D. Ashlock, S. Colton, S. Dahlskog, J. Liu, S. Lucas, D. PerezLiebana, and T. Thompson, “Gameplay evaluation measures,” Dagstuhl
Follow-Ups, 2017.
[81] B. Pell, “Metagame in symmetric chess-like games,” 1992.
[82] A. Isaksen, D. Gopstein, J. Togelius, and A. Nealen, “Discovering unique
game variants,” in Computational Creativity and Games Workshop at the
2015 International Conference on Computational Creativity, 2015.
[83] P. R. Williams, D. Perez-Liebana, and S. M. Lucas, “Ms. Pac-Man Versus Ghost Team CIG 2016 Competition,” in Computational Intelligence
and Games (CIG), 2016 IEEE Conference on, 2016.
[84] P. Hingston, “The 2k botprize,” in Computational Intelligence and
Games, 2009. CIG 2009. IEEE Symposium on. IEEE, 2009, pp. 1–1.
[85] N. Shaker, J. Togelius, G. N. Yannakakis, L. Poovanna, V. S. Ethiraj,
S. J. Johansson, R. G. Reynolds, L. K. Heether, T. Schumann, and
M. Gallagher, “The turing test track of the 2012 mario ai championship:
entries and evaluation,” in Computational Intelligence in Games (CIG),
2013 IEEE Conference on. IEEE, 2013, pp. 1–8.
[86] J. Lehman and R. Miikkulainen, “General video game playing as a
benchmark for human-competitive ai,” in AAAI-15 Workshop on Beyond
the Turing Test, 2015.
[87] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, and W. Zaremba, “Openai gym,” arXiv preprint
arXiv:1606.01540, 2016.
[88] M. Johnson, K. Hofmann, T. Hutton, and D. Bignell, “The malmo
platform for artificial intelligence experimentation.” in IJCAI, 2016, pp.
4246–4247.
[89] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang,
A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton et al., “Mastering
the game of go without human knowledge,” Nature, vol. 550, no. 7676,
p. 354, 2017.
| 2cs.AI
|
arXiv:1405.3675v1 [cs.PL] 14 May 2014
Under consideration for publication in Theory and Practice of Logic Programming
1
Abstract Diagnosis for tccp using a Linear
Temporal Logic
MARCO COMINI, LAURA TITOLO
DIMI, Università degli Studi di Udine, Italy
(e-mail: [email protected])
ALICIA VILLANUEVA
DSIC, Universitat Politècnica de València, Spain
(e-mail: [email protected])
submitted 1 January 2003; revised 1 January 2003; accepted 1 January 2003
Abstract
Automatic techniques for program verification usually suffer the well-known state explosion
problem. Most of the classical approaches are based on browsing the structure of some form of
model (which represents the behavior of the program) to check if a given specification is valid.
This implies that a part of the model has to be built, and sometimes the needed fragment is
quite huge.
In this work, we provide an alternative automatic decision method to check whether a given
property, specified in a linear temporal logic, is valid w.r.t. a tccp program. Our proposal (based
on abstract interpretation techniques) does not require to build any model at all. Our results
guarantee correctness but, as usual when using an abstract semantics, completeness is lost.
KEYWORDS: concurrent constraint paradigm, linear temporal logic, abstract diagnosis, decision procedures, program verification
1 Introduction
The Concurrent Constraint Paradigm (ccp, (Saraswat 1989)) is a simple, logic model
which is different from other (concurrent) programming paradigms mainly due to the
notion of store-as-constraint that replaces the classical store-as-valuation model. It is
based on an underlying constraint system that handles constraints on variables and
deals with partial information. Within this family, (de Boer et al. 2000) introduced the
Timed Concurrent Constraint Language (tccp in short) by adding to the original ccp
model the notion of time and the ability to capture the absence of information. With
these features, one can specify behaviors typical of reactive systems such as timeouts or
preemption actions.
It is well-known that modeling and verifying concurrent systems by hand can be an
extremely hard task. Thus, the development of automatic formal methods is essential.
One of the most known techniques for formal verification is model checking, that was
originally introduced in (Clarke and Emerson 1981; Queille and Sifakis 1982) to automatically check if a finite-state system satisfies a given property. It consisted in an exhaustive
analysis of the state-space of the system; thus the state-explosion problem is its main
drawback and, for this reason, many proposals in the literature try to mitigate it.
All the proposals of model checking have in common that a part of the model of the
(target) program has to be built, and sometimes the needed fragment is quite huge. In this
work, we propose a completely different approach to the formal verification of temporal
(LTL) properties of concurrent (reactive) systems specified in tccp. We formalize a method
to validate a specification of the expected behavior of a tccp program P , expressed by a
linear temporal formula φ, which does not require to build any model at all.
The linear temporal logic we use to express specifications, csLTL, is an adaptation of
the propositional LTL logic to the concurrent constraint framework. This logic is also
used as the basis of the abstract domain for a new (abstract) semantics for the language.
In brief, our method is an extension of abstract diagnosis for tccp (Comini et al. 2011)
where the abstract domain F is formed by csLTL formulas. We cannot use the original
abstract diagnosis framework of (Comini et al. 2011) since F is not a complete lattice.
The contributions of this work are the following:
● A new abstract semantics for tccp programs based on csLTL formulas;
● A novel and effective method to validate csLTL properties based on the ideas of
abstract diagnosis. This proposal intuitively consists in viewing P as a formula
transformer by means of an (abstract) immediate consequence operator D̂JP K which
works on csLTL formulas. Then, to decide the validity of φ, we just have to check
if D̂JP Kφ (i.e., the P -transformation of φ) implies φ;
● An automatic decision procedure for csLTL properties that makes our method effective.
With our technique we can check, for instance, that, at a railway crossing system,
each time a train is approaching, the gate is down, or that whenever a train has crossed,
the gate is up. When a property is non valid, the method identifies the buggy process
declaration. Technical results of Sections 3 and 4 can be found in (Comini et al. 2014).
2 The small-step operational behavior of the tccp language
The tccp language (de Boer et al. 2000) is particularly suitable to specify reactive and
time critical systems. As the other languages of the ccp paradigm (Saraswat 1993), it
is parametric w.r.t. a cylindric constraint system which handles the data information of
the program in terms of constraints. The computation progresses as the concurrent and
asynchronous activity of several agents that can accumulate information in a store, or
query information from it. Briefly, a cylindric constraint system1 is an algebraic structure
C = ⟨C, ⪯, ⊗, false, true, Var , ∃ ⟩ composed of a set of constraints C such that (C, ⪯) is a
complete algebraic lattice where ⊗ is the lub operator and false and true are respectively
the greatest and the least element of C; Var is a denumerable set of variables and ∃
existentially quantifies variables over constraints. The entailment ⊢ is the inverse of ⪯.
Given a cylindric constraint system C and a set of process symbols Π, the syntax of
agents is given by the grammar:
A ∶∶= skip ∣ tell(c) ∣ A ∥ A ∣ ∃x A ∣ ∑ni=1 ask(ci ) → A ∣ now c then A else A ∣ p(⃗
x)
1
See (de Boer et al. 2000; Saraswat 1993) for more details on cylindric constraint systems.
2
⟨tell(c), d⟩ → ⟨skip, c ⊗ d⟩
d ≠ false
⟨∑n
i=1 ask(ci ) → Ai , d⟩ → ⟨Aj , d⟩
j ∈ [1, n], d ⊢ cj , d ≠ false
⟨A, d⟩ → ⟨A′ , d′ ⟩
d⊢c
⟨now c then A else B, d⟩ → ⟨A′ , d′ ⟩
⟨A, d⟩ →
/
d ⊢ c, d ≠ false
⟨now c then A else B, d⟩ → ⟨A, d⟩
⟨B, d⟩ → ⟨B ′ , d′ ⟩
d⊬c
⟨now c then A else B, d⟩ → ⟨B ′ , d′ ⟩
⟨B, d⟩ →
/
d⊬c
⟨now c then A else B, d⟩ → ⟨B, d⟩
⟨A, d⟩ → ⟨A′ , d′ ⟩ ⟨B, d⟩ → ⟨B ′ , c′ ⟩
⟨A ∥ B, d⟩ → ⟨A′ ∥ B ′ , d′ ⊗ c′ ⟩
⟨A, d⟩ → ⟨A′ , d′ ⟩ ⟨B, d⟩ →
/
⟨A ∥ B, d⟩ → ⟨A′ ∥ B, d′ ⟩
⟨B ∥ A, d⟩ → ⟨B ∥ A′ , d′ ⟩
⟨A, l ⊗ ∃x d⟩ → ⟨B, l′ ⟩
⟨∃l x A, d⟩ → ⟨∃l′ x B, d ⊗ ∃x l′ ⟩
⟨p(⃗
x), d⟩ → ⟨A, d⟩
p(⃗
x ) ∶− A ∈ D, d ≠ false
Fig. 1. The transition system for tccp.4
where c, c1 , . . . , cn are finite constraints in C; p/m ∈ Π and x⃗ denotes a generic tuple of
m variables. A tccp program is an object of the form D . A, where A is an agent, called
initial agent, and D is a set of process declarations of the form p(⃗
x ) ∶− A (for some agent
A). The notion of time is introduced by defining a discrete and global clock.
The operational semantics of tccp, defined in (de Boer et al. 2000), is formally described by a transition system T = (Conf , →). Configurations in Conf are pairs ⟨A, c⟩
representing the agent A to be executed in the current global store c. The transition relation → ⊆ Conf ×Conf is the least relation satisfying the rules of Figure 1. Each transition
step takes exactly one time-unit.
Example 2.1 (Guiding example) Through the paper, we use as guiding example a
part of the full specification of a railway crossing system introduced in (Alpuente et al.
2006). Let us call Dm the following tccp declaration:
master (C , G) ∶− ∃C ′ , G′ ( now (C = [near ∣ ]) then
′
′
′
′
tell(C = [near ∣ C ]) ∥ tell(G = [down ∣ G ]) ∥ master (C , G )
else now (C = [out ∣ ]) then
tell(C = [out ∣ C ′ ]) ∥ tell(G = [up ∣ G′ ]) ∥ master (C ′ , G ′ )
else master (C , G))
Due to the monotonicity of the store, streams (written in a list-fashion way) are used
to model imperative-style variables (de Boer et al. 2000). The master process uses an
input channel C (implemented as a stream) through which it receives signals from the
environment (trains), and an output channel G through which it sends orders to a gate
process. It checks the input channel for a near signal (the guard in the first now agent),
in which case it sends (tells) the order down through G, links the future values (C ′ )
of the stream C and restarts the check at the following time instant (recursive call
master (C ′ , G ′ )). If the near signal is not detected, then, the else branch looks for the
out signal and (if present) behaves dually to the first branch. Finally, if no signal is
detected at the current time instant (last else branch), then the process keeps checking
from the following time instant.
4
The auxiliary agent ∃l x A makes explicit the local store l of A. This auxiliary agent is linked to the
principal hiding construct by setting the initial local store to true, thus ∃x A ∶= ∃true x A.
3
In this work, we prove the correctness of our technique w.r.t. the denotational concrete semantics of (Comini et al. 2013a), which is fully-abstract (correct and complete)
w.r.t. the small-step operational behavior of tccp. Also csLTL is interpreted over this
denotational model. We thus introduce the most relevant aspects of such semantics.
The denotational semantics of a tccp program consists of a set of conditional (timed)
traces that represent, in a compact way, all the possible behaviors that the program can
manifest when fed with an input (initial store). Conditional traces can be seen as hypothetical computations in which, for each time instant, we have a condition representing
the information that the global store has to satisfy in order to proceed to the next time
instant. Briefly, a conditional trace is a (possibly infinite) sequence t1 ⋯tn ⋯ of conditional
states, which can be of three forms:
conditional store: a pair η ↣ c, where η is a condition and c ∈ C a store;
stuttering: the construct stutt(C), with C ⊆ C ∖ {true};
end of a process: the construct ⊠.
Intuitively, the conditional store η ↣ c means that, provided condition η is satisfied by
the current store, the computation proceeds so that in the following time instant, the
store is c. A condition η is a pair η = (η + , η − ) where η + ∈ C and η − ∈ ℘(C) are called
positive and negative condition, respectively. The positive/negative condition represents
information that a given store must/must not entail, thus they have to be consistent in
the sense that ∀c− ∈ η − η + ⊬ c− . The stuttering construct models the suspension of the
computation when none of the guards in a non-deterministic agent is satisfied. C is the
set of guards in the non-deterministic agent. Conditional traces are monotone (i.e., for
each ti = ηi ↣ ci and tj = ηj ↣ cj such that j ≥ i, cj ⊢ ci ) and consistent (i.e., each store
in a trace does not entail the negative conditions of the following conditional state).
We denote the domain of conditional trace sets as M. (M, ⊑, ⊔, ⊓, M, {ǫ}) is a com¯x r
plete lattice, where M1 ⊑ M2 ⇔ ∀r1 ∈ M1 ∃r2 ∈ M2 . r1 is a prefix of r2 . We define as ∃
the sequence resulting by removing from r ∈ M all the information about the variable x.
We distinguish two special classes of conditional traces. r ∈ M is said to be self-sufficient if
+
−
the first condition is (true, ∅) and, for each ti = (ηi+ , ηi− ) ↣ ci and ti+1 = (ηi+1
, ηi+1
) ↣ ci+1 ,
+
ci ⊢ ηi+1
(each store satisfies the successive condition). Moreover, r is x-self-sufficient if
¯Var ∖{x} r is self-sufficient. Thus, this definition demands that for self-sufficient condi∃
tional traces, no additional information (from other agents) is needed in order to complete
the computation.5
The semantics definition is based on a semantics evaluation function AJAKI (Comini
et al. 2013a) which, given an agent A and an interpretation I , builds the conditional
traces associated to A. The interpretation I is a function which associates to each process symbol a set of conditional traces “modulo variance”. The semantics for a set of
process declarations D is the fixpoint F JDK ∶= lfp (DJDK) of the continuous immediate consequences operator DJDKI (p(⃗
x)) ∶= ⊔p(⃗x )∶−A∈D AJAKI . Proof of full abstraction
w.r.t. the operational behavior of tccp is given in (Comini et al. 2013a).
Example 2.2 Consider the process declaration Dm of Example 2.1. Given an interpretation I , the semantics of master (C , G) is graphically represented in Figure 2, where we
5
The set of all self-sufficient conditional traces can be considered as a generalization (using conditional
states in place of stores) of the traditional strongest postcondition for semantics.
4
(cnear , ∅) ↣ c′near ∧ cdown
¯C ′ ,G′
∃
I (master (C ′ , G ′ ))
(true, {cnear , cout }) ↣ true
(cout , {cnear } ) ↣ c′out ∧ cup
I (master (C , G))
¯C ′ ,G′
∃
′
′
I (master (C , G ))
Fig. 2. Tree representation of DJ{Dm }KI (master (C , G)) of Example 2.2.
have used some shortcuts for characteristic constraints. Namely, cnear ∶= (C = [near ∣ ]),
c′near ∶= ∃C ′ (C = [near ∣ C ′ ]), cdown ∶= ∃G′ (G = [down ∣ G′ ]), cout ∶= (C = [out ∣ ]),
c′out ∶= ∃C ′ (C = [out ∣ C ′ ]), cup ∶= ∃G′ (G = [up ∣ G′ ]).
The branch on the left represents the computation when a near signal arrives. The
first conditional state requires that cnear holds, thus the constraints c′near and cdown are
concurrently added to the store during that computational step. A recursive call is also
concurrently invoked. Process calls do not modify the store when invoked, but they affect
the store from the following time instant, which is graphically represented by the triangle
labeled with the interpretation of the process. The branch in the middle is taken only
if cout is entailed and cnear is not entailed by the initial store (it occurs in the negative
condition of the first conditional state in that branch). Finally, the branch on the right
represents the case when both cnear and cout are not entailed by the initial store.
3 Abstract semantics for tccp over csLTL formulas
In this section, we present a novel abstract semantics over formulas that approximates
the small-step semantics described in Section 2 and, therefore, the small-step operational
behavior of a tccp program. To this end, we first define an abstract domain of logic
formulas which is a variation of the classical Linear Temporal Logic (Manna and Pnueli
1992). Following (Palamidessi and Valencia 2001; de Boer et al. 2001; de Boer et al. 2002;
Valencia 2005), the idea is to replace atomic propositions by constraints of the underlying
constraint system.
Definition 3.1 (csLTL formulas) Given a cylindric constraint system C, c ∈ C and
x ∈ Var , formulas of the Constraint System Linear Temporal Logic over C are:
˙ ∣ c ∣ ¬˙ φ ∣ φ ∧˙ φ ∣ ∃˙ x φ ∣ ◯ φ ∣ φ U φ.
˙ ∣ false
φ ∶∶= true
csLTLC is the set of all temporal formulas over C (we omit C if clear from the context).
˙ ¬,
˙ false,
˙ ∧˙ , ◯ φ, φ1 U φ2 have the classical logical meaning. The atomic formula c ∈
true,
C states that c has to be entailed by the current store. ∃˙ x φ is the existential quantification
over the set of variables Var. As usual, we use φ1 ∨˙ φ2 as a shorthand for ¬˙ φ1 ∧˙ ¬˙ φ2 ;
˙ U φ and ◻ φ for
φ1 →
˙ φ2 for ¬˙ φ1 ∨˙ φ2 ; φ1 ↔
˙ φ2 for φ1 →
˙ φ2 ∧˙ φ2 →
˙ φ1 ; ◇ φ for true
¬˙ ◇ ¬˙ φ. A constraint formula is an atomic formula c or its negation ¬˙ c. Formulas ◯ φ and
¬˙ ◯ φ are called next formulas. Constraint and next formulas are said to be elementary
˙ φ) are called eventualities.
formulas. Finally, formulas of the form φ1 U φ2 , ◇ φ or ¬(◻
We define the abstract domain F ∶= csLTL/↔˙ (i.e., the domain formed by csLTL formulas
˙
˙ , true,
˙, ⋀
˙ false)
modulo logical equivalence) ordered by →.
˙ The algebraic lattice (F, →,
˙ ⋁
˙ always exist just for finite sets of formulas.
˙ and ⋁
is not complete, since both ⋀
5
The semantics of a temporal formula is typically defined in terms of an infinite sequence
of states which validates it. Here we use conditional traces instead. As usually done in
the context of temporal logics, we define the satisfaction relation ⊧ only for infinite
conditional traces. We implicitly transform finite traces (which end in ⊠) by replicating
the last store infinite times.
Definition 3.2 The semantics of φ ∈ F is given by function γ F ∶ F → M defined as γ F (φ) ∶=
⊔{r ∈ M ∣ r ⊧ φ}, where, for each φ, φ1 , φ2 ∈ csLTL, c ∈ C and r ∈ M, satisfaction relation
⊧ is defined as:
˙
r ⊧ true
+
˙
r⊧
/ false
and
−
(3.1a)
′
+
(η , η ) ↣ d ⋅ r ⊧ c
−
iff η ⊢ c
′
−
(3.1b)
−
−
′
stutt (η ) ⋅ r ⊧ c
r ⊧ ¬˙ φ
iff ∀d ∈ η . c ⊬ d and r ⊧ c
(3.1c)
iff r ⊭ φ
(3.1d)
r ⊧ φ1 ∧˙ φ2
iff r ⊧ φ1 and r ⊧ φ2
1
r ⊧ ◯φ
r ⊧ φ1 U φ2
r ⊧ ∃˙ x φ
iff r ⊧ φ
(3.1e)
6
(3.1f)
i
j
iff ∃i ≥ 1. ∀j < i. r ⊧ φ2 and r ⊧ φ1
¯
¯x r, r ′ x-self-sufficient and r ′ ⊧ φ
iff exists r s.t. ∃x r ′ = ∃
′
(3.1g)
(3.1h)
We say that φ ∈ F is a sound approximation of R ∈ M if R ⊑ γ F (φ). φ is said to be
satisfiable if there exists r ∈ M such that r ⊧ φ, while it is valid if, for all r ∈ M, r ⊧ φ.
All the cases are fairly standard except (3.1b) and (3.1c). The conditional trace r = (η + ,
η ) ↣ d ⋅ r′ prescribes that η + is entailed by the current store, thus r models all the
constraint formulas c such that η + ⊢ c. We have to note that, by the monotonicity of
the store of tccp computations, the positive conditions in conditional traces contains all
the information previously added in the constraint store. Furthermore, by the definition
of condition, since η + cannot be in contradiction with η − , it holds that neither c is in
contradiction with η − . Thus, the conditional trace stutt(η − ) ⋅ r′ models all the constraint
formulas c that are not in contradiction with the set η − and such that c holds in the
continuation r′ by monotonicity.
−
Lemma 3.3 The function γ F is monotonic, injective and ⊓-distributive.
3.1 csLTL Abstract Semantics
The technical core of our semantics definition is the csLTL agent semantics evaluation
function ÂJAK which, given an agent A and an interpretation Î (for the process symbols
of A), builds a csLTL formula which is a sound approximation of the (concrete) behavior
Π
of A. In the sequel, we denote by AΠ
C the set of agents and DC the set of sets of process
declarations built on signature Π and constraint system C.
Definition 3.4 Let PC ∶= {p(⃗
x) ∣ p ∈ Π, x
⃗ are distinct variables }. An F-interpretation
is a function PC → F modulo variance7 . Two functions I, J∶ PC → F are variants if for
each π ∈ PC there exists a renaming ρ such that (Iπ)ρ = J(πρ). The semantic domain
IF is the set of all F-interpretations ordered by the point-wise extension of →.
˙
6
7
r k denotes the sub-sequence of r starting from state k.
i.e., a family of elements of F, indexed by PC, modulo variance.
6
Definition 3.5 (csLTL Semantics) Given A ∈ AΠ
C and Î ∈ IF , we define the csLTL
semantics evaluation ÂJAKÎ by structural induction as follows.
ÂJskipKÎ ∶= true
ÂJtell(c)KÎ ∶= ◯ c
ÂJA1 ∥ A2 KÎ ∶= ÂJA1 KÎ ∧˙ ÂJA2 KÎ
ÂJp(⃗
x)KÎ ∶= ◯ Î(p(⃗
x))
ÂJ∃x AKÎ ∶= ∃˙ x ÂJAKÎ
˙ ni=1 ¬˙ ci ) ∨˙ ((⋀
˙ ni=1 (ci ∧˙ ◯ ÂJAi K ))
˙ ni=1 ¬˙ ci ) U ⋁
ÂJ∑ni=1 ask(ci ) → Ai KÎ ∶= ◻(⋀
Î
ÂJnow c then A1 else A2 KÎ ∶= (c ∧˙ ÂJA1 KÎ ) ∨˙ (¬˙ c ∧˙ ÂJA2 KÎ )
Given D ∈ DΠ
C we define the immediate consequence operator D̂JDK∶ IF → IF as
˙ {ÂJAK ∣ p(⃗
x ) ∶− A ∈ D}
D̂JDKÎ (p(⃗
x)) ∶= ⋁
Î
We have that  is a sound approximation of A and D̂ is a sound approximation of D.
Π
Theorem 3.6 (Correctness of  and D̂) Let A ∈ AΠ
C , D ∈ DC and Î ∈ IF . Then,
F
F
AJAKγ F (Î) ⊑ γ (ÂJAKÎ ) and DJDKγ F (Î) ⊑ γ (D̂JDKÎ ).
Example 3.7 Consider the process declaration Dm of Example 2.1 and let us use ◯n
to abbreviate the repetition of ◯ n-times. Given Î ∈ IF , with Definition 3.5 we compute
φM (Î) ∶= D̂J{Dm }KÎ (master(C , G))) = φnear (Î) ∨˙ φout (Î) ∨˙ φcwait (Î)
where
φnear (Î) = ∃˙ C ′ ,G′ (C = [near ∣ ] ∧˙ ◯ C = [near ∣ C ′ ] ∧˙ ◯ G = [down ∣ G′ ] ∧˙ ◯ Î(master (C ′ , G ′ )))
′
˙
= [near ∣ ]) ∧˙ ◯ C = [out ∣ C ] ∧˙
φout (Î) = ∃˙ C ′ ,G′ (¬(C
C = [out ∣ ] ∧˙ ◯ G = [up ∣ G′ ] ∧˙ ◯ Î(master (C ′ , G ′ )))
˙
˙
φcwait (Î) = ¬(C
= [near ∣ ]) ∧˙ ¬(C
= [out ∣ ]) ∧˙ ◯ Î(master (C , G))
The three disjuncts of φM (Î) match the three possible behaviors of master (C , G): when
signal near is emitted by the train, when out is emitted, and when no signal arrives.
4 Abstract diagnosis of tccp with csLTL formulas
Since F is not a complete lattice, it is impossible to find for the function γ F an adjoint
function α which forms a Galois Connection ⟨α, γ⟩, and therefore we cannot use the
abstract diagnosis framework for tccp defined in (Comini et al. 2011). Thus, we propose
in this section a new weaker version of abstract diagnosis that works on F 8 .
Given a set of declarations D and Ŝ ∈ IF , which is the specification of the abstract
intended behavior of D over F, we say that
1. D is (abstractly) partially correct w.r.t. Ŝ if F JDK ⊑ γ F (Ŝ).
2. D is (abstractly) complete w.r.t. Ŝ if γ F (Ŝ) ⊑ F JDK.
The differences between F JDK and γ F (Ŝ) are usually called symptoms. Many of the
8
Actually, the proposal is defined using just γ F only for the sake of simplicity. It could easily be defined
parametrically w.r.t. a suitable family of concretization functions.
7
symptoms are just a consequence of some “originating” ones, those which are the direct consequence of errors. The abstract diagnosis determines exactly the “originating”
symptoms and, in the case of incorrectness, the faulty process declarations in D. This
is captured by the definitions of abstractly incorrect process declaration and abstract
uncovered element :9
Definition 4.1 Let D ∈ DΠ
C , R a process declaration for process p, φt ∈ F and Ŝ ∈ IF .
● R is abstractly incorrect w.r.t. Ŝ (on testimony φt ) if φt →
˙ D̂J{R}KŜ (p(⃗
x)) and φt ∧˙
˙
Ŝ(p(⃗
x)) = false.
● φt is an uncovered element for p(⃗
x) w.r.t. Ŝ if φt →
˙ Ŝ(p(⃗
x)) and φt ∧˙ D̂JDKŜ (p(⃗
x)) =
˙
false.
Informally, R is abstractly incorrect if it derives a wrong abstract element φt from the
intended semantics. Dually, φt is uncovered if the declarations cannot derive it from the
intended semantics.
Theorem 4.2 Let D ∈ DΠ
C and Ŝ ∈ IF . (1) If there are no abstractly incorrect process
declarations in D (i.e., D̂JDKŜ →
˙ Ŝ), then D is partially correct w.r.t. Ŝ. (2) If D is
partially correct w.r.t. Ŝ and D has abstract uncovered elements then D is not complete.
Absence of abstractly incorrect declarations is a sufficient condition for partial correctness, but it is not necessary. Because of the approximation, it can happen that a (concretely) correct declaration is abstractly incorrect. Hence, abstract incorrect declarations
are in general just a warning about a possible source of errors. However, an abstract
correct declaration cannot contain an error; thus, no (manual) inspection is needed for
declarations which are not abstractly incorrect. Moreover, as shown by the following
theorem, all concrete errors—that are “visible”—are indeed detected, as they lead to
an abstract incorrectness or abstract uncovered. Intuitively, a concrete error is visible if
we can express a formula φ whose concretization reveals the error (i.e., if the logic is
expressive enough).
Theorem 4.3 Let R be a process declaration for p(⃗
x), S a concrete specification and
Ŝ a sound approximation for S (i.e., S ⊑ γ F (Ŝ)). (1) If DJ{R}KS ⋢ γ F (Ŝ) and it exists
˙
φt such that γ F (φt ) ⊑ DJ{R}KS (p(⃗
x)) and φt ∧˙ Ŝ(p(⃗
x)) = false,
then R is abstractly
incorrect w.r.t. Ŝ (on testimony φt ). (2) If there exists an abstract uncovered element φ
w.r.t. Ŝ, then there exists r ∈ γ F (φ) such that r ∉ DJ{R}KS (p(⃗
x)).
Point 2 says that the concrete error has an abstract symptom which is not hidden by the
approximation on Ŝ and, moreover, there exists a formula φt which can express it.
In the following examples, we borrow from (Alpuente et al. 2006) the notation for last
entailed value of a stream: X =c
˙ holds if the last instantiated value in the stream X is c.
Example 4.4 We verify (for Example 2.1) that each time a near signal arrives from a
train, the order down is sent to a gate process.10 To model this property, we define the
specification (of the property) Ŝdown as
φordersent ∶= Ŝdown (master (C , G)) ∶= ◻(C =near
˙
→
˙ ◇(G=down))
˙
9
10
It is worth noticing that although the notions defined in this section are similar to those defined for
the standard approach, the formal definitions and proofs are different due to the weaker framework.
A more interesting property, namely that, in addition, the gate is eventually down, is verified in
(Comini et al. 2014). Here we have simplified the property due to space limitations.
8
To check whether the program implies the specification (D̂J{Dm }KŜdown →
˙ Ŝdown ) we have
to check if φM (Ŝdown ) →
˙ φordersent (where φM (⋅) is defined in Example 3.7). Each of the
three disjuncts of φM (Ŝdown ) implies φordersent . Thus, by Theorem 4.2, Dm is partially
correct w.r.t. Ŝdown .
When the check of a process declaration R against a specification S fails, our method
reports that R is not partially correct w.r.t. S. If this occurs, the formula testimony for
the possible incorrectness gives useful information to fix the process declaration or check
whether it corresponds to a false positive.
Example 4.5 Now we show how our technique detects an error in a buggy set of declarations. We remove instruction tell(G = [up ∣ G′ ]) in the process declaration Dm (of
Example 2.1). To avoid misunderstandings, we call the modified process master′ and let
R be the new process declaration.
We aim to verify that the order up is sent whenever the signal out is received:
φ ∶= Ŝup (master ′ (C , G)) ∶= ◻((C =out
˙
)→
˙ ◇(G=up))
˙
We need to compute the (one step) semantics for the (buggy version of the) process:
φ′ ∶= D̂J{R}KŜup (master ′ (C , G)) = φ′near ∨˙ φ′out ∨˙ φ′cwait
where
˙ G = [down ∣ G′ ] ∧˙ ◯ Ŝup (master ′ (C ′ , G ′ )))
φ′near ∶= ∃˙ C ′ ,G′ (C = [near ∣ ] ∧˙ ◯ C = [near ∣ C ′ ] ∧◯
˙
˙
= [out ∣ C ′ ] ∧˙ ◯ Sˆup (master ′ (C ′ , G ′ ))))
= [near ∣ ]) ∧˙ C = [out ∣ ]∧◯(C
φ′out ∶= ∃˙ C ′ ,G′ (¬(C
′
′
˙
˙
= [near ∣ ]) ∧˙ ¬(C
φcwait ∶= ¬(C
= [out ∣ ]) ∧˙ ◯ Ŝup (master (C , G))
We detect an incorrectness of R (in master′ process) w.r.t. Ŝup on testimony φ′out since
˙
φ′out →
˙ φ′ and φ′out ∧˙ φ = false.
The testimony suggests that on channel C we have out
signal but we do not see the corresponding up signal on channel G.
Our technique behaves negatively for sets of declarations D where D̂JDK has more than
one fixpoint. This happens with programs with loops that do not produce contributes at
all (which are in some sense non meaningful programs). In such situations, we can have
that the actual behavior does not model a specification Ŝ which is a non-least fixpoint of
D̂JDK, but, since Ŝ is a fixpoint, we do not detect the abstractly incorrect declaration,
as shown by the following example.
Example 4.6 (Pathological cases) Let Dp ∶= {q(y) ∶− now y = 1 then q(y) else q(y)}
and Ŝp (q(y)) ∶= ◇(y = 1) be the specification. Then, we compute D̂JDp KŜp (q(y)) =
˙ ◇(y = 1), thus Dp is
(y = 1 ∧˙ ◇ y = 1) ∨˙ (¬˙ y = 1 ∧˙ ◇ y = 1). We can see that D̂JDp KŜp →
partially correct w.r.t. Ŝp . However, y = 1 is not explicitly added by the process.
Note that, if Ŝ(p(⃗
x)) is assumed to hold for each process p(⃗
x) defined in D and
D̂JDKŜ →
˙ Ŝ, then F JDK satisfies Ŝ.
4.1 An automatic decision procedure for csLTL
In order to make our abstract diagnosis approach effective, we have defined an automatic
decision procedure to check the validity of the formulas involved in Definition 4.1 (of the
9
Table 1. α- and β-formulas rules.
R1
α
A(α)
¬˙ ¬˙ φ
{φ}
R2 φ1 ∧˙ φ2
R3
¬˙ ◯ φ
B1 (β)
B2 (β)
˙ 1 ∧˙ φ2 )
R4 ¬(φ
{¬˙ φ1 }
{¬˙ φ2 }
{φ1 , φ2 }
˙ 1 U φ2 )
R5 ¬(φ
{¬˙ φ1 , ¬˙ φ2 }
{φ1 , ¬˙ φ2 , ¬˙ ◯(φ1 U φ2 )}
{◯ ¬˙ φ}
R6
{φ2 }
{φ1 , ¬˙ φ2 , ◯((Γ∗ ∧˙ φ1 ) U φ2 )}
β
φ1 U φ2
form ψ →
˙ φ with φ = Ŝ(p(⃗
x)) and ψ = D̂JDKŜ (p(⃗
x))). We adapt to csLTL the tableau
construction for Propositional LTL of (Gaintzarain et al. 2008; Gaintzarain et al. 2009).
(Comini et al. 2013b) contains a preliminary version of the method.
Intuitively, a tableau consists of a tree whose nodes are labeled with sets of formulas.
The root is labeled with the set of formulas which has to be checked for satisfiability.
Branches are built according to rules defined on the syntax of formulas (see Table 1
defining α and β formulas). The basic idea is that a formula from a node is selected and,
depending on its form, a rule of Table 1 is applied. β formulas generate a bifurcation on
the tree and there are specific rules for next and existential quantification formulas.
If all branches of the tree are closed (Definition 4.8), then the formula has no models.
Otherwise, we can obtain a model from the open branches.
Definition 4.7 (csLTL tableau) A csLTL tableau for a finite set of formulas Φ is a
tuple TΦ = (Nodes, nΦ , L, B , R ) such that:
1. Nodes is a finite non-empty set of nodes;
2. nΦ ∈ Nodes is the initial node;
3. L ∶ Nodes → ℘(csLTL) is the labeling function that associates to each node the formulas
which are true in that node; the initial node is labeled with Φ;
4. B is the set of branches such that exactly one of the following points holds for every
branch b = n0 , . . . , ni , ni+1 , . . . , nl ∈ B and every 0 ≤ i < l:
(a) for an α-formula α ∈ L(ni ), L(ni+1 ) = {A(α)} ∪ L(ni ) ∖ {α};
(b) for a β-formula β ∈ L(ni ), L(ni+1 ) = {B1 (β)}∪ L(ni )∖{β} and there exists another branch
in B of the form b′ = n0 , . . . , ni , n′i+1 , . . . , n′k such that L(n′i+1 ) = {B2 (β)} ∪ L(ni ) ∖ {β} ;
(c) for an existential quantified formula ∃˙ x φ′ ∈ L(ni ), L(ni+1 ) = {φ′′ } ∪ L(ni ) ∖ {∃˙ x φ′ } where
φ′′ ∶= φ′ [y/x] with y fresh variable;
(d) in case L(ni ) is a set formed only by elementary formulas, L(ni+1 ) = next(L(ni )), where
next(Φ) ∶= {φ ∣ ◯ φ ∈ Φ} ∪ {¬˙ φ ∣ ¬˙ ◯ φ ∈ Φ} ∪ (Φ ∩ C).
Rules 4a and 4b are standard, replacing α and β-formulas with one or two formulas
according to the matching pattern of rules in Table 1, except for Rule R6 that uses the
so-called context Γ∗ , which is defined in the following. The next operator used in Rule 4d
is different from the corresponding one of PLTL since it also preserves the constraint
formulas. This is needed for guaranteeing correctness in the particular setting of tccp
where the store is monotonic. Finally, Rule 4c is specific for the ∃˙ case: ∃˙ x is removed
after renaming x with a fresh variable11 .
Definition 4.8 A node in the tableau is inconsistent if it contains a couple of formulas
˙
φ, ¬˙ φ, or the formula false,
or a constraint formula ¬˙ c′ such that the merge c of all the
11
The csLTL existential quantification does not correspond to the one of FO logic. It serves to model
local variables, and ∃˙ x φ can be seen just as φ where the information about x is local.
10
(positive) constraint formulas c1 , . . . , cn in the node (i.e., c ∶= c1 ⊗ ⋅ ⋅ ⋅ ⊗ cn ) is such that
c ⊢ c′ . A branch is closed if it contains an inconsistent node.
The last condition for inconsistence of a node is particular to the ccp context.
We now describe the algorithm that automatically builds the csLTL tableau for a given
set of formulas Φ (see (Comini et al. 2014) for the pseudocode). The construction consists in selecting at each step a branch that can be extended by using α or β rules or ∃˙
elimination. When none of these can be applied, the next operator is used to pass to the
next stage. When dealing with eventualities, to determine the context Γ∗ in Rule R6, it is
necessary to distinguish the eventuality that is being unfolded in the path. Given a node
n and φ ∈ L(n), Γ ∶= L(n) ∖ {φ}. Then, when Rule R6 is applied to a distinguished even˙ γ∈Γ ¬˙ γ; otherwise Γ∗ ∶= true. The use of contexts is the mechanism
tuality, we set Γ∗ ∶= ⋁
to detect the loops that allows one to mark branches containing eventuality formulas as
open or to generate inconsistent nodes and mark branches as closed. A node is marked
as closed when it is inconsistent while is marked as open when (1) it is the last node of
the branch and contains just constraint formulas or (2) the branch is cyclic and all the
eventualities in the cycle have been already distinguished.
In order to ensure termination of the algorithm, it is necessary to use a fair strategy
to distinguish eventualities, in the sense that every eventuality in an open branch must
be distinguished at some point. This assumption and the fact that, given a finite set of
initial formulas, there exists only a finite set of possible labels in a systematic tableau,
imply termination of the tableau construction. Moreover, the constructed tableau is sound
and complete. Therefore, to check the validity of a formula of the form ψ →
˙ φ, with φ =
Ŝ(p(⃗
x)) and ψ = D̂JDKŜ (p(⃗
x)), we just have to build the tableau for its negation T¬(ψ
˙ →φ)
˙
and check if it is closed or not. If it is, we have that D is abstractly correct. Otherwise,
we can extract from T¬(ψ
an explicit testimony ϕ of the abstract incorrectness of D.
˙ →φ)
˙
The construction of ψ = D̂JDKŜ (p(⃗
x)) is linear in the size of D. The systematic
˙
tableau construction of ¬(ψ
→
˙ φ) (from what said in (Gaintzarain et al. 2009)) has worst
˙
∣ ¬(ψ
→φ)∣
˙
)
case O(2O(2
). However, we believe that such bound for the worst-case asymptotic
behavior is quite meaningless in this context, since it is not very realistic to think that the
formulas of the specification should grow much (big formulas are difficult to comprehend
and in real situations people would hardly try even to imagine them). Moreover, note that
tableau explosion is due to nesting of eventualities and in practice really few eventualities
are used in specifications. Therefore, in real situations, we do not expect that (extremely)
big tableaux will be built.
5 Related Work
A Constraint Linear Temporal Logic is defined in (Valencia 2005) for the verification of
a different timed concurrent language, called ntcc, which shares with tccp the concurrent
constraint nature and the non-monotonic behavior. The restricted negation fragment of
this logic, where negation is only allowed for state formulas, is shown to be decidable.
However, no efficient decision procedure is given (apart from the proof itself). Moreover,
the verification results are given for the locally-independent fragment of ntcc, which
avoids the non-monotonicity of the original language. In contrast, in this work, we address
the problem of checking temporal properties for the full tccp language.
11
Some model-checking techniques have been defined for tccp in the past (Falaschi and
Villanueva 2006; Alpuente et al. 2005a; Alpuente et al. 2005b; Falaschi et al. 2001).
It is worth noting that the notions of correctness and completeness in these works are
defined in terms of F JDK, i.e., in terms of the concrete semantics, and therefore their
check requires a (potentially infinite) fixpoint computation. In contrast, the notions of
abstractly incorrect declarations and abstract uncovered elements are defined in terms of
just one application of D̂JDK to Ŝ. Moreover, since D̂JDK is defined compositionally, all
the checks are defined on each process declaration in isolation. Hence, our proposal can
be used with partial sets of declarations. When a property is falsified, model checking
provides a counterexample in terms of an erroneous execution trace, leaving to the user
the problem of locating the source of the bug. On the contrary, we identify the faulty
process declaration.
In (Falaschi et al. 2007), a first approach to the declarative debugging of a ccp language is presented. However, it does not cover the particular extra difficulty of the nonmonotonicity behavior, common to all timed concurrent constraint languages. This makes
our approach significantly different. Moreover, although they propose the use of LTL for
the specification of properties, their formulation, based on the depth-k concretization
function, complicates the task of having an efficient implementation.
Finally, this proposal clearly relates to the abstract diagnosis framework for tccp defined for Galois Insertions (Comini et al. 2011). That work can compete with the precision
of model checking, but its main drawback is the fact that the abstract domain did not
allow to specify temporal properties in a compact way. In fact, specifications consisted
of sets of abstract conditional traces. Thus, specifications were big and unnatural to be
written. The use of temporal logic in this proposal certainly overcomes this problem.
6 Conclusion and Future Work
We have defined an abstract semantics for tccp based on the domain of a linear temporal
logic with constraints. The semantics is correct w.r.t. the behavior of the language.
By using this abstract semantics, we have defined a method to validate csLTL formulas
for tccp sets of declarations. Since the abstract semantics cannot be defined by means of
a Galois Connection, we cannot use the abstract diagnosis framework for tccp defined in
(Comini et al. 2011), thus we devised (from scratch) a weak version of the abstract diagnosis framework based only on a concretization function γ. It works by applying D̂JDK to
the abstract specification and then by checking the validity of the resulting implications
(whether that computation implies the abstract specification). The computational cost
depends essentially on the cost of that check of the implication.
We have also presented an automatic decision procedure for the csLTL logic, thus
we can effectively check the validity of that implication. We are currently finishing to
implement a proof of concept tool, which is available online at URL http://safe-tools.
dsic.upv.es/tadi/, that realizes the proposed instance. Then we would be able to
compare with other tools and assess the “real life” goodness of our proposal.
In the future, we also plan to explore other instances of the method based on logics
for which decision procedures or (semi)automatic tools exists. This proposal can also be
immediately adapted to other concurrent (non-monotonic) languages (like tcc and ntcc)
once a suitable fully abstract semantics has been developed.
12
References
Alpuente, M., Falaschi, M., and Villanueva, A. 2005a. A Symbolic Model Checker for
tccp Programs. In First International Workshop on Rapid Integration of Software Engineering
Techniques (RISE 2004), Revised Selected Papers. Lecture Notes in Computer Science, vol.
3475. Springer-Verlag, 45–56.
Alpuente, M., Gallardo, M., Pimentel, E., and Villanueva, A. 2005b. A Semantic
Framework for the Abstract Model Checking of tccp Programs. Theoretical Computer Science 346, 1, 58–95.
Alpuente, M., Gallardo, M., Pimentel, E., and Villanueva, A. 2006. Verifying RealTime Properties of tccp Programs. Journal of Universal Computer Science 12, 11, 1551–1573.
Clarke, E. M. and Emerson, E. A. 1981. Design and synthesis of synchronization skeletons
using branching-time temporal logic. In Logic of Programs, D. Kozen, Ed. Lecture Notes in
Computer Science, vol. 131. Springer, 52–71.
Comini, M., Titolo, L., and Villanueva, A. 2011. Abstract Diagnosis for Timed Concurrent
Constraint programs. Theory and Practice of Logic Programming 11, 4-5, 487–502.
Comini, M., Titolo, L., and Villanueva, A. 2013a. A Condensed Goal-Independent BottomUp Fixpoint Modeling the Behavior of tccp. Tech. rep., DSIC, Universitat Politècnica de
València. Available at http://riunet.upv.es/handle/10251/34328.
Comini, M., Titolo, L., and Villanueva, A. 2013b. Towards an Effective Decision Procedure for LTL formulas with Constraints. In 23rd Workshop on Logic-based methods in
Programming Environments (WLPE 2013). CoRR abs/1308.2055.
Comini, M., Titolo, L., and Villanueva, A. 2014. Abstract Diagnosis for tccp using a
Linear Temporal Logic. Tech. rep., Universitat Politècnica de València. Available at http:
//riunet.upv.es/handle/10251/8351.
de Boer, F. S., Gabbrielli, M., and Meo, M. C. 2000. A Timed Concurrent Constraint
Language. Information and Computation 161, 1, 45–83.
de Boer, F. S., Gabbrielli, M., and Meo, M. C. 2001. A Temporal Logic for Reasoning about
Timed Concurrent Constraint Programs. In TIME ’01: Proceedings of the Eighth International
Symposium on Temporal Representation and Reasoning (TIME’01). IEEE Computer Society,
Washington, DC, USA, 227.
de Boer, F. S., Gabbrielli, M., and Meo, M. C. 2002. Proving correctness of Timed
Concurrent Constraint Programs. CoRR cs.LO/0208042.
Falaschi, M., Olarte, C., Palamidessi, C., and Valencia, F. D. 2007. Declarative Diagnosis
of Temporal Concurrent Constraint Programs. In Logic Programming, 23rd International
Conference, ICLP 2007, Proceedings, V. Dahl and I. Niemelä, Eds. Lecture Notes in Computer
Science, vol. 4670. Springer-Verlag, 271–285.
Falaschi, M., Policriti, A., and Villanueva, A. 2001. Modeling concurrent systems specified in a temporal concurrent constraint language-I. Electronic Notes in Theoretical Computer
Science 48, 197–210.
Falaschi, M. and Villanueva, A. 2006. Automatic verification of timed concurrent constraint
programs. Theory and Practice of Logic Programming 6, 3, 265–300.
Gaintzarain, J., Hermo, M., Lucio, P., and Navarro, M. 2008. Systematic semantic
tableaux for PLTL. Electronic Notes in Theoretical Computer Science 206, 59–73.
Gaintzarain, J., Hermo, M., Lucio, P., Navarro, M., and Orejas, F. 2009. Dual Systems
of Tableaux and Sequents for PLTL. The Journal of Logic and Algebraic Programming 78, 8,
701–722.
Manna, Z. and Pnueli, A. 1992. The temporal logic of reactive and concurrent systems specification. Springer.
Palamidessi, C. and Valencia, F. D. 2001. A Temporal Concurrent Constraint Programming Calculus. In 7th International Conference on Principles and Practice of Constraint
Programming (CP’01). Lecture Notes in Computer Science, vol. 2239. Springer, 302–316.
13
Queille, J. P. and Sifakis, J. 1982. Specification and verification of concurrent systems in
CESAR. In Symposium on Programming, M. Dezani-Ciancaglini and U. Montanari, Eds.
Lecture Notes in Computer Science, vol. 137. Springer, 337–351.
Saraswat, V. A. 1989. Concurrent Constraint Programming Languages. Ph.D. thesis,
Carnegie-Mellon University.
Saraswat, V. A. 1993. Concurrent Constraint Programming. The MIT Press, Cambridge,
Mass.
Valencia, F. D. 2005. Decidability of infinite-state timed CCP processes and first-order LTL.
Theoretical Computer Science 330, 3, 577–607.
14
| 6cs.PL
|
Superrosy fields and valuations
arXiv:1308.3394v1 [math.LO] 15 Aug 2013
Krzysztof Krupiński∗
Abstract
We prove that every non-trivial valuation on an infinite superrosy field of
positive characteristic has divisible value group and algebraically closed residue
field. In fact, we prove the following more general result. Let K be a field such
that for every finite extension L of K and for every natural number n > 0 the
index [L∗ : (L∗ )n ] is finite and, if char(K) = p > 0 and f : L → L is given
by f (x) = xp − x, the index [L+ : f [L]] is also finite. Then either there is a
non-trivial definable valuation on K, or every non-trivial valuation on K has
divisible value group and, if char(K) > 0, it has algebraically closed residue
field. In the zero characteristic case, we get some partial results of this kind.
We also notice that minimal fields have the property that every non-trivial
valuation has divisible value group and algebraically closed residue field.
0
Introduction
A motivation for our work comes from some open structural questions concerning
fields in various model-theoretic contexts.
A fundamental theorem says that each infinite superstable field is algebraically
closed [16, 4]. An important generalization of superstable theories is the class of
supersimple theories and yet more general class of superrosy theories. Superrosy
theories with NIP (the non independence property) also form a generalization of
superstable theories which is “orthogonal” to supersimple theories in the sense that
each supersimple theory with NIP is superstable. It is known from [11] that perfect
PAC (pseudo algebraically closed) fields with small absolute Galois group (i.e. with
absolute Galois group possessing only finitely many closed subgroups of every finite
index) are supersimple. A well-known conjecture predicts the converse:
Conjecture 1 Each infinite supersimple field is perfect PAC with small absolute
Galois group.
Research supported by NCN grant 2012/07/B/ST1/03513
2010 Mathematics Subject Classification: 03C60, 12J10
0
Key words and phrases: superrosy field, valuation
∗
0
1
A complementary conjecture on infinite superrosy fields with NIP was formulated
in [6].
Conjecture 2 Each infinite superrosy field with NIP is either algebraically or real
closed.
Recall that both algebraically closed and real closed fields are superrosy with
NIP. After dropping the NIP assumption, one has to extend the list of possibilities
in the conclusion of the above conjecture. Namely, since perfect PAC fields with
small absolute Galois group as well as orderable PRC (pseudo real closed) fields
with small absolute Galois group are known to be superrosy [18, Appendix A], the
following conjecture is strongest possible. (See Section 4 for the definition of PRC
fields, which is chosen so that PAC fields are PRC).
Conjecture 3 Each infinite superrosy field is perfect PRC with small absolute Galois group.
It is known that a PAC field is simple if and only if its absolute Galois group is
small [11, 2, 3]; it is supersimple if and only if it is perfect and has small absolute
Galois group. Similarly, a PRC field is superrosy if and only if it is perfect and its
absolute Galois group is small (see Fact 4.1). Thus, in Conjectures 1 and 3, once we
know that the field is PAC [resp. PRC], the rest of the conclusion is automatically
satisfied. It is also easy to see that Conjecture 3 implies Conjecture 1, because one
can show that orderable PRC fields have strict order property, and so they are not
simple (see Remark 4.2). By Fact 4.3, Conjecture 3 also implies Conjecture 2.
There are also interesting questions and conjectures concerning NIP fields (without assuming superrosiness). By [12], infinite NIP fields are closed under ArtinSchreier extensions. A. Hasson and S. Shelah formulated some dichotomies between
nice algebraic properties of the field in question and the existence of non-trivial
definable valuations. In particular, one can expect that the following is true.
Conjecture 4 Suppose K is an infinite field with NIP with the property that for
every finite extension L of K and for every natural number n > 0 the index [L∗ :
(L∗ )n ] is finite. Then either there is a non-trivial definable valuation on K, or K is
either algebraically or real closed.
Note that if a pure field K is algebraically or real closed, then there is no non-trivial
definable valuation on K (e.g. because K is superrosy and we have Fact 1.8). Notice
also that by Facts 1.8 and 1.9, Conjecture 4 implies Conjecture 2.
Another interesting problem is to classify strongly dependent fields [20, Section
5].
Independently of the questions of A. Hasson and S. Shelah in the NIP context,
our approach to attack Conjectures 2 and 3 was to assume that the field in question
does not satisfy the conclusion and try to produce a non-trivial definable valuation
(existence of which contradicts rosiness by Fact 1.8). This approach led us to the
2
following conjecture whose assumptions generalize the situations from Conjectures 1,
2, 3 and 4, but whose conclusion is weaker than the conclusions of these conjectures
(see Section 4 for explanations). So, one could say that it is a common approximation
of these conjectures.
Conjecture 5 Let K be a field such that for every finite extension L of K and for
every natural number n > 0 the index [L∗ : (L∗ )n ] is finite and, if char(K) = p > 0
and f : L → L is given by f (x) = xp − x, the index [L+ : f [L]] is also finite. Then
either there is a non-trivial definable valuation on K, or every non-trivial valuation
on K has divisible value group and either algebraically or real closed residue field.
Our main result is the proof of Conjecture 5 in the positive characteristic case.
In fact, we will prove the following theorem.
Theorem 6 Let K be a field such that for every finite extension L of K and for
every natural number n > 0 the index [L∗ : (L∗ )n ] is finite and, if char(K) = p > 0
and f : L → L is given by f (x) = xp − x, the index [L+ : f [L]] is also finite. Then
either there is a non-trivial definable valuation on K, or every non-trivial valuation
on K has divisible value group and, in the case when char(K) > 0, it has algebraically
closed residue field.
By Facts 1.8 and 1.9, one gets the following corollary.
Corollary 7 Every non-trivial valuation on a superrosy field of positive characteristic has divisible value group and algebraically closed residue field.
Since infinite NIP fields are closed under Artin-Schreier extensions [12], we also
get the following corollary.
Corollary 8 Suppose K is a field of positive characteristic, satisfying NIP and with
the property that for every finite extension L of K and for every natural number
n > 0 the index [L∗ : (L∗ )n ] is finite. Then either there is a non-trivial definable
valuation on K, or every non-trivial valuation on K has divisible value group and
algebraically closed residue field.
The proof of Theorem 6 relies on [13], where the appropriate results on the existence of non-trivial definable valuations under the presence of certain multiplicative
or additive subgroups were established. In contrast, directly from the definition of
minimality, we obtain the following variant of Corollary 7 for minimal fields.
Theorem 9 Every non-trivial valuation on a minimal field has divisible value group
and algebraically closed residue field.
3
Recall that the famous Podewski’s conjecture predicts that each minimal field is
algebraically closed [19].
Our results tells us that, in various situations, all non-trivial valuations on the
field in question have divisible value groups and algebraically closed residue fields.
The ultimate goal is to show that the original field (i.e. the residue field with respect
to trivial valuation) is algebraically closed [or PAC]. So a questions arises what
information about the field in question can be deduced from the information that
for all non-trivial valuations the value groups are divisible and the residue fields are
algebraically closed. A discussion and some questions about it are included in the
last section.
The paper is constructed as follows. First we give prelimnaries concerning rosy
theories and valuations, listing all the facts from [13] which are used in the course of
the proof of Theorem 6. Section 2 is devoted to the proof of Theorem 6 and some
partial results concerning Conjecture 5 in the zero characteristic case. A very short
and easy Section 3 is self-contained and yields a proof of Theorem 9. In the last
section, we discuss some facts and questions concerning potential applications of our
results to prove the original conjectures.
Katharina Dupont is currently working around Conjecture 4 in her Ph.D. project
under the supervision of Salma Kuhlmann and in collaboration with Assaf Hasson.
She has a different approach than the one presented in this paper (although also
based on [13]). A few details on this are mentioned in the last section.
The author would like to thank Thomas Scanlon for discussions and suggestions
concerning superrosy fields during the visit at Berkeley in 2007.
1
Preliminaries
1.1
Valuations
In this subsection, we list the definitions and facts from [13] which will be useful in
this paper. But before that, let us recall the definition of valuation and other basic
notions. A good reference for fields with valuations is for example [9].
Definition 1.1 A valuation on a field K is a surjective map v : K → Γ ∪ {∞},
where (Γ, +) is an ordered group and Γ < ∞, satisfying the following axioms. For
all x, y ∈ K:
1. v(x) = ∞ =⇒ x = 0,
2. v(xy) = v(x) + v(y),
3. v(x + y) ≥ min{v(x), v(y)}.
Let v be a valuation on a field K. Define
Ov := {x ∈ K : v(x) ≥ 0}.
4
This is a valuation ring, i.e., a subring of K such that for any x ∈ K, either x ∈ Ov
or x−1 ∈ Ov . We say that the valuation v is trivial if Γ = {0}; equivalently, Ov = K.
The group Ov∗ of units of Ov equals {x ∈ K : v(x) = 0}. Finally,
Mv := {x ∈ K : v(x) > 0}
is a unique maximal ideal of Ov , and
K v := Ov /Mv
is called the residue field of v.
With a valuation v we associated its valuation ring Ov . Conversely, starting from
a valuation ring O, one can define a valuation v so that Ov = O, and one can do it
in such a way that both operations are inverses of each other (after the appropriate
identification of value groups). Namely, having a valuation ring O, we define Γ :=
K ∗ /O∗ with xO∗ + yO∗ := xyO∗ , and we order it by xO∗ ≤ yO∗ ⇐⇒ y/x ∈ O;
then we define a valuation v by v(x) = xO∗ ∈ Γ.
Definition 1.2 We say that a valuation v : K → Γ∪{∞} on a field K (possibly with
an additional structure) is definable if the ordered group Γ is interpretable in K and
after the interpretation of Γ in K, graph(v) is definable. By the above discussion,
this is equivalent to the fact that Ov is definable in K.
If K ⊆ L is a field extension and w is a valuation on L, we say that w extends v if
w↾K = v (after an isomorphic embedding of the value group of v into the value group
of w); equivalently, Ow ∩ K = Ov . In such a situation, we write (K, Ov ) ⊆ (L, Ow ).
Let Γv be the value group of v and Γw the value group of w. Then Γv can be treated
as a subgroup of Γw , and e(Ow /Ov ) := [Γw : Γv ] is called the ramification index
of the extension (K, Ov ) ⊆ (L, Ow ). Similarly, since Mw ∩ Ov = Mv , we get that
K v = Ov /Mv ֒→ Ow /Mw = Lw , and f (Ow /Ov ) := [Lw : K v ] is called the residue
degree of the extension (K, Ov ) ⊆ (L, Ow ).
Fact 1.3 Whenever (K, Ov ) ⊆ (L, Ow ) with n := [L : K] is finite, one has the
following inequality e(Ow : Ov )f (Ow : Ov ) ≤ n.
When v and w are two valuations on the same field K, we say that w is a
coarsening of v if Ov ⊆ Ow . In such a situation, Mw ⊆ Mv is a prime ideal of Ov .
In this way, one gets a 1-1 correspondence between overrings of Ov and prime ideals
of Ov . Going further, one gets a 1-1 correspondence between this set of prime ideals
and the set of convex subgroups of Γv (the value group of v):
∆ 7→ p∆ := {x ∈ K : v(x) > δ for all δ ∈ ∆}
p 7→ ∆p := {γ ∈ Γ : γ, −γ < v(x) for all x ∈ p}.
For details on this, see [9, Chapter 2.3]. Let us add that two valuations v and w on
K are said to be comparable if Ov ⊆ Ow or Ow ⊆ Ov .
5
From the model-theoretic perspective, an important question is when there exists
a non-trivial definable valuation on a given field K. A deep insight into this question
is provided in [13]. In particular, with an additive [resp. multiplicative] subgroup
T the author associates a certain valuation ring, denoted by OT , and he gives a
complete characterization of when OT is first order definable in (K, +, ·, 0, 1, T ).
Here, we recall some definitions and results from [13] which we will use later.
Definition 1.4 Let v be a valuation on K and T an additive [resp. multiplicative]
subgroup.
1. v is compatible with T if Mv ⊆ T [resp. 1 + Mv ⊆ T ].
2. v is weakly
compatible with T if A ⊆ T [resp. 1 + A ⊆ T ] for some Ov -ideal A
√
with A = Mv .
3. v is coarsely compatible with T if it is weakly compatible with T and there is
no proper coarsening w of v such that Ow∗ ⊆ T .
Fact 1.5 [13, Lemma 1.2] Let v be a valuation on K. If either T is a multiplicative
subgroup such that for some n ∈ ω, (K ∗ )n ⊆ T and (n, char(K v )) = 1, or T is
an additive subgroup, char(K) = p and {xp − x : x ∈ K} ⊆ T , then v is (fully)
compatible with T if and only if v is weakly compatible with T .
Fact 1.6 [13, Proposition 1.4] For an additive [resp. multiplicative] subgroup T of a
field K, any two coarsly compatible valuations are comparable, and there is a unique
finest coarsly compatible valuation ring of K which we will denote by OT . Moreover,
OT is non-trivial, whenever T is proper (i.e., T 6= K [resp. T 6= K ∗ ]) and admits
some non-trivial weakly compatible valuation.
The author concludes that for any additive [resp. multiplicative] subgroup T of
a field K exactly one of the following possibilities holds:
• groups case: there is a valuation v on K such that Ov∗ ⊆ T .
In this case, OT is the only coarsely compatible valuation ring with this property, and all weakly compatible valuations are fully compatible.
• weak case: there is a weakly, but not fully compatible valuation on K.
In this case, OT is the only valuation ring with this property; the weakly
compatible valuations are the coarsenings of OT ; there is no valuation v with
Ov∗ ⊆ T .
• residue case: all weakly compatible valuations are fully compatible, and there
is no valuation v with Ov∗ ⊆ T .
In this case, OT is the finest fully compatible valuation ring.
6
Now, we are going to recall [13, Theorem 2.5], which will be the main tool in
this paper. This is a complete characterization of when, for a given additive [resp.
multiplicative] subgroup T of a filed K, the ring OT is definable in the language L :=
{+, ·, 0, 1, T }. In fact, in our applications we will only use the positive part of this
characterization (namely the cases when one has definability). Before we formulate
the full characterization, we should emphasis that here by definability in L we do not
just mean definability in the structure (K, +, ·, 0, 1, T ), but the existence of a formula
ϕ(x) in L which defines OT ′ in every model (K ′ , +, ·, 0, 1, T ′) ≡ (K, +, ·, 0, 1, T ).
Fact 1.7 [13, Theorem 2.5] Let K be a field with an additive [resp. multiplicative]
subgroup T . Denote by MT the maximal ideal of OT , and by T the subgroup induced
by T on the residue field of OT . Then OT is definable in L := {+, ·, 0, 1, T } in the
following cases:
T ≤ (K, +)
T ≤ K∗
group case
iff OT is discrete or (∀x ∈ MT )(x−1 OT * T )
always
weak case
iff OT is discrete
iff OT is discrete
residue case
always
iff T is no ordering
1.2
Rosy theories
In this paper, we will only need two properties of rosy groups and fields. Although
they are a folklore, for the reader’s convenience we recall fundamental definitions
concerning rosiness and we give proofs of these two properties:
Fact 1.8 Let K be a rosy field. Then there is no non-trivial definable valuation on
K.
Fact 1.9 Let G be a commutative superrosy group. Then for every natural number
n > 0, if G[n] := {g ∈ G : g n = e} is finite, the index [G : Gn ] is also finite, where
Gn denotes the subgroup consiting of n-th powers.
In particular, if K is a superrosy field, then for every n > 0 the index [K ∗ : (K ∗ )n ]
is finite and, if char(K) = p 6= 0, then the image of the function f : K → K defined
by f (x) = xp − x is a subgroup of finite index in K + . Since any finite extension of
an elementary extension of K is also superrosy, this holds for all finite extensions of
any elementary extension of K, too.
For details on rosy theories the reader is referred to [1, 7, 18], and on rosy groups
to [6]. More information about rosy groups and fields can be found in [14, 15].
In this subsection, we work in Ceq where C is a monster model of a theory T in a
language L.
A motivation to consider rosy theories is the fact that in a sense it is the largest
class of theories which allows the application of techniques from stability theory,
especially of basic forking calculus. This class contains stable and more generally
simple theories as well as o-minimal theories. The definition of rosiness which justifies
7
what we have just said is the following: T is rosy if there is a ternary relation ⌣
| ∗
on small subsets of Ceq satisfying all the basic properties of forking independence in
simple theories except for the Independence Theorem. Such a relation will be called
an independence relation. There is a concrete, particularly useful independence
relation in rosy theories, called þ-independence, which we are going to define now.
A formula δ(x, a) strongly divides over A if it is non-algebraic and the set of
formulas {δ(x, a′ )}a′ |=tp(a/A) is k-inconsistent for some k ∈ N. We say that δ(x, a)
þ-divides over A if we can find some tuple c such that δ(x, a) strongly divides over
Ac. A formula þ-forks over A if it implies a (finite) disjunction of formulas which
þ-divide over A.
We say that a type p(x) þ-divides over A if there is a formula implied by p(x)
which þ-divides over A; þ-forking is similarly defined. We say that a is þ-independent
from b over A, denoted a ⌣
| þA b, if tp (a/Ab) does not þ-fork over A.
In rosy theories, þ-independence is the weakest independence relation in the sense
that a ⌣
| ∗C b implies a ⌣
| þC b for any independence relation ⌣
| ∗.
By a rosy group [or field] we mean a group [or field], possibly with an additional
structure, whose theory is rosy.
Rosy theories can be also defined by means of local þ-ranks.
Definition 1.10 Given a formula ψ(x), a finite set Φ of formulas with object variables x and parameter variables y, a finite set of formulas Θ in variables y, z, and
natural number k > 0, we define the þΦ,Θ,k -rank of ψ inductively as follows:
1. þΦ,Θ,k (ψ) ≥ 0 if ψ is consistent.
2. For λ a limit ordinal, þΦ,Θ,k (ψ) ≥ λ if þΦ,Θ,k (ψ) ≥ α for all α < λ.
3. þΦ,Θ,k (ψ) ≥ α + 1 if there is ϕ ∈ Φ, some θ(y; z) ∈ Θ and parameter c such
that
(a) þΦ,Θ,k (ψ(x) ∧ ϕ(x; a)) ≥ α for infinitely many a |= θ(y; c), and
(b) {ϕ (x; a)}a|=θ(y;c) is k−inconsistent.
Given a (partial) type π(x) we define þΦ,Θ,k (π(x)) to be the minimum of þΦ,Θ,k (ψ)
for ψ ∈ π(x).
Recall that a theory is rosy if and only if for each ψ, Φ, Θ, k as above, the local
thorn rank þΦ,Θ,k (ψ) is finite. One could prove Fact 1.8 using this characterization.
However, one can give an immediate proof using another characterization of rosiness
in terms of the so-called equivalence ranks considered in [7, Section 5].
Definition 1.11 Let π(x) be a partial type, and let ∆ be a finite set of formulas in
variables x, y, z. Define eq-rk∆ (π(x)) as follows:
1. eq-rk∆ (π(x)) ≥ 0 if π(x) is consistent.
8
2. For λ a limit ordinal, eq-rk∆ (π(x)) ≥ λ if eq-rk∆ (π(x)) ≥ α for all α < λ.
3. eq-rk∆ (π(x)) ≥ α + 1 if there is some equivalence relation E(x, y) defined by
δ(x, y, c) with δ(x, y, z) ∈ ∆ and c ∈ Ceq , and there are representatives bi ,
i < ω, of different equivalence classes, such that eq-rk∆ (π(x) ∧ E(x, bi )) ≥ α.
From [7, Section 5], we know that T is rosy if and only if for every ∆ and π(x)
as above, eq-rk∆ (π(x)) is finite.
Proof of Fact 1.8. Suppose for a contradiction that there is a non-trivial definable
valuation v on the rosy field K. We can assume K is a monster model. For x, y from
the sort of K and z from the sort of Γ consider the formula
δ(x, y, z) = (v(x − y) ≥ z).
Then, for γ ∈ Γ the formula δ(x, y, γ) defines an equivalence relation on K which we
denote by Eγ (x, y). Put ∆ = {δ(x, y, z)}.
It is enough to show that eq-rk∆ (δ(x, b, γ)) ≥ n for all n ∈ ω, γ ∈ Γ and b ∈ K,
because then eq-rk∆ (δ(x, b, γ)) are infinite, so K is not rosy.
We argue by induction on n. The case n = 0 is trivial. Suppose eq-rk∆ (δ(x, b, γ)) ≥
n for all n ∈ ω, γ ∈ Γ and b ∈ K. Consider any γ ∈ Γ and b ∈ K. By saturation,
there is γ ′ ∈ Γ such that γ ′ > γ and Eγ ′ (x, y) refines [b]Eγ into infinitely many classes,
say with representatives bi , i ∈ ω. Then, taking c := γ ′ in the definition of eq-rk∆ ,
we get eq-rk∆ (δ(x, b, γ)) ≥ n + 1.
Using ⌣
| þ , we define Uþ -rank in the same way as U-rank is defined in stable
theories by means of ⌣
| , namely Uþ is a unique function from the collection of all
complete types to the ordinals together with ∞ with the property that for any ordinal
α, Uþ (p) ≥ α + 1 if and only if there is some tuple a and some type q ∈ S(Aa) such
that q ⊃ p, Uþ (q) ≥ α and q þ-forks over A. Uþ -rank in rosy theories has most of the
nice properties that U-rank has in stable theories, e.g. it satisfies Lascar Inequalities:
Uþ (a/b, A) + Uþ (b/A) ≤ Uþ (a, b/A) ≤ Uþ (a/b, A) ⊕ Uþ (b/A).
Assume T is rosy. If D is an A-definable set, then Uþ (D) := sup{Uþ (d/A) : d ∈ D}.
Of course, if this supremum is finite, then it is just the maximum. It turns out that if
D is a definable group, then the supremum is also attained [6, Remark 1.20]. For D a
definable set, Uþ (D) = 0 if and only if D is finite. There are also Lascar inequalities
for groups: For definable groups H ≤ G we have
Uþ (H) + Uþ (G/H) ≤ Uþ (G) ≤ Uþ (H) ⊕ Uþ (G/H).
We say that T is superrosy if Uþ (p) < ∞ for every type p; a group [or field] is
superrosy if its theory is superrosy.
9
Proof of Fact 1.9. Let H = Gn . We claim that Uþ (G) = Uþ (H). To see this, take
g ∈ G with Uþ (g/∅) = Uþ (G). Of course, g n ∈ acl(g), so Uþ (g n /g) = 0. Since G[n]
is finite, we get g ∈ acl(g n ), and so Uþ (g/g n ) = 0. Thus, by Lascar Inequalities, we
get Uþ (g n ) = Uþ (g), so Uþ (H) = Uþ (G). Using Lascar Inequalities for groups, we
immediately conclude that Uþ (G/H) = 0, so G/H is finite.
Definition 1.12 We say that a theory T has the NIP if there is no formula ϕ(x, y)
and sequence hai ii<ω such that for every w ⊆ ω there is bw such that |= ϕ(ai , bw ) iff
i ∈ w.
The main result of [12] says that an NIP field K has no Artin-Schreier extensions,
i.e., if char(K) = p > 0, then the function x 7→ xp − x from K to K is surjective.
The proof in general uses some algebraic geometry, but assuming that the image of
the function x 7→ xp − x is of finite index, this is an immediate consequence of the
existence of (K + )00 (i.e., of the smallest type-definable subgroup of K + of bounded
index (wlog we assume here that K is a monster model)). Indeed, one easily checks
that (K + )00 is a non-trivial ideal of K, so (K + )00 = K. Since the image of x 7→ xp −x
is a definable subgroup of K + of finite index, we get that it contains (K + )00 = K,
so it is equal to K.
2
Superrosy fields
This section is devoted to the proof of Theorem 6 and some observations concerning
Conjecture 5 in the zero characteristic case. In fact, we will not use superrosiness,
but only the assumption of Theorem 6, which is a consequence of superrosiness by
Fact 1.9. For a given field K this assumption is the following:
(A) For every finite extension L of K and for any natural number n > 0 the index
[L∗ : (L∗ )n ] is finite and, if char(K) = p > 0 and f : L → L is given by
f (x) = xp − x, then the index [L+ : f [L]] is also finite.
We start from some preparatory observations.
Remark 2.1 If K ⊆ L is an algebraic field extension and v is a non-trivial valuation
on L, then v↾K is also non-trivial.
Proof. Suppose for a contradiction that v ↾K is trivial. Consider any a ∈ L with
v(a) > 0. Let P (x) = xn + an−1 xn−1 + . . . + a0 ∈ K[x] be the minimal monic
polynomial of a over K. Then v(an ) > v(an−1 an−1 ) > . . . > v(a0 ) = 0, so ∞ =
v(0) = v(P (a)) = v(a0 ) = 0, a contradiction.
Remark 2.2 Let L be a finite extension of a field K. Suppose that any non-trivial
valuation on L has the property that its residue field is algebraically closed. Then the
residue field of any non-trivial valuation on K is either algebraically or real closed.
10
Proof. Consider any non-trivial valuation v on K. By Chevalley’s Extension Theorem, v has an extension to a (non-trivial) valuation w on L. By assumption, Lw is
algebraically closed. Since, by Fact 1.3, Lw is a finite extension of K v , the conclusion
follows.
Lemma 2.3 Let v be a valuation on a field K. Let F be a finite extension of the
residue field K v . Then there is a finite extension L of K and an extension w of v to
L such that the field F is isomorphic over K v to the residue field Lw .
Proof. It is enough to prove it for 1-generated extensions. So, let F = K v (α)
for some α ∈ F . Choose P (x) ∈ Ov [x] a monic polynomial such that P (x) is the
minimal monic polynomial of α over K v , where P (x) ∈ K v [x] denotes the polynomial
obtained from P (x) by reducing the coefficients modulo Mv . Consider a root β of
P (x), put L := K(β) and take any extension of v to a valuation w on L. Since the
coefficients of P (x) are in Ov with the leading coefficient equal to 1, one easily gets
that w(β) ≥ 0, so β ∈ Ow .
Now, for β := β + Mw ∈ Lw , we have that P (β) = 0. Since P is irreducible, we
get
[Lw : K v ] ≥ [K v (β) : K v ] = deg P = deg P ≥ [L : K],
so we have everywhere equalities by Fact 1.3. Therefore, Lw = K v (β) which is isomorphic to F over K v .
The next lemma recalls a standard method of showing that a given field is algebraically closed.
Lemma 2.4 Let K be a field. If for every finite extension L of K and for every
prime number n>0, (L∗ )n = L∗ and, in the case when char(K) = p > 0, the function
f : L → L given by f (x) = xp − x is onto, then K is algebraically closed.
Proof. By assumption, K is perfect. If it is not algebraically closed, then it has a
proper Galois extension F of minimal degree k > 1. There is an intermediate field
L with Gal(F/L) ∼
= Zq for some prime number q.
If q = p = char(K), then Galois theory tells us F is a splitting field over L of a
polynomial of the form xp −x−a for some a ∈ L, but, by assumption, this polynomial
has at least one zero in L, so all its zeros are in L, a contradiction.
Assume q 6= char(K). Since q ≤ k and for a primitive q-th root of unity ζq the
field K(ζq ) is a Galois extension of K of degree less than q, by the choice of k, we
conclude that ζq ∈ K. So ζq ∈ L. By Galois theory, we conclude that F is a splitting
field over L of a polynomial of the form xq − a for some a ∈ L. By assumption, this
polynomial has a zero in L, so all its zeros are in L, a contradiction.
Remark 2.5 Let K be an infinite field of characteristic p > 0. Then either K p = K,
or the index [K ∗ : (K ∗ )p ] of multiplicative groups is infinite and the index [K + :
(K + )p ] of additive groups is also infinite. In particular, if the index [K ∗ : (K ∗ )p ] is
finite, then K is perfect.
11
Proof. Suppose K p 6= K, and let b1 , b2 ∈ K be linearly independent over K p . Then
b1 + k p b2 for k ∈ K are in different cosets modulo (K ∗ )p . So the index [K ∗ : (K ∗ )p ]
is infinite. Similarly, the elements b1 k p for k ∈ K are in different additive cosets
modulo (K + )p , so the index [K + : (K + )p ] is also infinite
Proof of Theorem 6. Suppose there is no non-trivial definable valuation on K.
Part 1. The value group of any non-trivial valuation v on K is divisible.
Proof. Suppose for a contradiction that some γ ∈ Γv is not divisible by n. Put
S := {x(K ∗ )n ∈ K ∗ /(K ∗ )n : Ov∗ ∩ x(K ∗ )n 6= ∅}
and
T :=
D[ E
S ,
that is, T is the subgroup of K ∗ generated by the union of the family S.
Claim 1 T is a proper, definable subgroup of K ∗ such that Ov∗ ≤ T and (K ∗ )n ≤ T .
Proof of Claim 1. Since (K ∗ )n is a finite index subgroup of K ∗ , we get that T is a
union of finitely many cosets of (K ∗ )n , so T is definable and contains (K ∗ )n . The
fact that Ov∗ ≤ T follows directly from the definition of T . To see that T is proper,
suppose for a contradiction that T = K ∗ . Then there is a ∈ T such that v(a) = γ.
By the definition of T , we can write a = aε11 · . . . · aεmm , where ai ∈ Ov∗ · (K ∗ )n and
εi ∈ {−1, 1} for i = 1, . . . , m. Then γ = v(a) = ε1 v(a1 ) + . . . + εm v(am ) ∈ nΓv , a
contradiction.
By Claim 1, we know that T is proper and 1 + Mv ⊆ Ov∗ ≤ T , so v is fully compatible with T . By Fact 1.6, we conclude that OT is non-trivial. We also get that
we are in the group case, so Fact 1.7 tells us that OT is definable in (K, +, ·, 0, 1, T ),
but T is definable in K, so OT is definable in K. This is a contradiction, which
completes the proof of Part 1.
Part 2. Assuming that char(K) = p > 0, the residue field of any non-trivial valuation v on K is algebraically closed.
Proof. By Lemmas 2.3 and 2.4, we will be done if we prove the following two claims.
Claim 2 For every finite extension L of K, for every extension w of v to a valuation
∗
∗
on L, and for every prime number n, one has (Lw )n = Lw .
Claim 3 For every finite extension L of K, one has that the function f : Lw → Lw
given by f (x) = xp − x is onto.
Proof of Claim 2. First, notice that by Remark 2.1, we can assume that L = K.
Indeed, since L is definable in K (living in some Cartesian power of K), by Remark
2.1, we get that there is no non-trivial definable valuation on L; it is also clear that
12
L satisfies (A).
Consider the case n 6= pp.
Subclaim K n (1 + Mv ) = K
Proof of the subclaim. Suppose it is not true. Then T := (K ∗ )n (1 + Mv ) is a proper
subgroup of K ∗ , and v is fully compatible with T . By Fact 1.6, OT is non-trivial.
Since [K ∗ : (K ∗ )n ] is finite, we see that T is definable, so there is no non-trivial
valuation on K definable in (K, +, ·, 0, 1, T ).
Let K T be the residue field corresponding to the valuation ring OT . Since
∗ n
(K ) ≤ T and (n, char(K T )) = 1, Fact 1.5 gives us that we are either in the
group case or in the residue case. By Fact 1.7, in the group case, OT is definable in
(K, +, ·, 0, 1, T ) which is impossible, and, in the residue case, either OT is definable
in (K, +, ·, 0, 1, T ) which is impossible or T is the positive cone of an ordering on
K T . However, the last thing is also impossible as char(K T ) = p > 0.
n
By the subclaim, K v = K v . Indeed, for any a ∈ Ov , a = k n (1 + m) for some
n
n
k ∈ K and m ∈ Mv . Since 1 + m ∈ Ov∗ , we get that k ∈ Ov , so a = k ∈ K v .
p
Now, consider the case n = pp. Suppose for a contradiction that K v is a proper subm
field of K v . As we have already proved that K v = K v whenever (m, char(K v )) = 1,
∗
∗
we see that K v is infinite. Thus, Remark 2.5 implies that [K v : (K v )p ] is infinite.
p
p
Moreover, if aK v 6= bK v for some a, b ∈ Ov , then aK p 6= bK p , because otherwise
p
p
either ak p = b or a = bk p for some k ∈ Ov , and so either ak = b or a = bk , a
contradiction. This implies that [K ∗ : (K ∗ )p ] is infinite, which contradicts (A).
Proof of Claim 3. As in the proof of Claim 2, by Remark 2.1, we can assume that
K = L. Let F : K → K be given by F (x) = xp − x.
Subclaim F [K] + Mv = K.
Proof of the subclaim. Suppose it is not true. Then T := F [K] + Mv is a proper
subgroup of K + , and v is fully compatible with T . By Fact 1.6, OT is non-trivial.
As [K + : F [K]] is finite, T is definable in K, so there is no non-trivial valuation on
K definable in (K, +, ·, 0, 1, T ).
Since F [K] ≤ T , Fact 1.5 ensures that we are either in the group case or in the
residue case. In the residue case, OT is definable by Fact 1.7, a contradiction. In the
group case, since we know that OT is not definable, Fact 1.7 yields some x ∈ MT
with x−1 OT ⊆ T .
Now, we will adopt the argument from the proof of [13, Theorem 3.1]. For the
reader’s convenience, we give all the details.
Let AT be the largest fractional OT -ideal contained in T . We aim at defining
a certain fractional OT -ideal AαT which will properly contain AT and which will be
contained in T . This will contradict the choice of AT .
Denote by vT and by ΓT the valuation and the value group corresponding to OT .
For a real number α and γ1 , γ2 ∈ Γ, by γ1 ≥ αγ2 we mean that γ1 ≥ rγ2 for all
13
rationals r ≤ α if γ2 ≥ 0, or for all rationals r ≥ α if γ2 < 0. This definition makes
sense since ΓT is divisible by Part 1 of the proof. By γ1 < αγ2 we mean the negation
of γ1 ≥ αγ2 . For α > 1 define
AαT := {x ∈ K : vT (x) ≥ αvT (y) for some y ∈ AT }.
This is, of course, a fractional OT -ideal. Since x−1 OT ⊆ T and x ∈ MT , we have
that AT properly contains OT . This easily implies that AT ⊆ AαT . Now, we check
that this inclusion is proper.
Take a natural number n such that α > 1 + n1 . There is y ∈ AT \ OT such
that (1 + n1 )vT (y) ∈
/ vT (AT ), as otherwise one easily gets that for all y ∈ AT \ OT ,
yOT generates a valuation ring properly containing OT and contained in T , which
contradicts the fact that vT is coarsely compatible with T . Choose z ∈ K with
vT (z) = n1 vT (y). Then vT (zy) = (1 + n1 )vT (y) ≥ αvT (y), so zy ∈ AαT \ AT .
The proof of the subclaim will be completed if we show that AαT ⊆ T for α ∈
(1, 2 − 1p ). It is enough to prove that every element t ∈ AαT \ AT belongs to T .
We have vT (t) ≥ αvT (y) for some y ∈ AT \ OT . Since t ∈
/ AT , we immediately get
vT (ty −1 ) = vT (t)−vT (y) < 0. Therefore, ty −1 ∈ K \OT . Thus, by Claim 2, ty −1 = ap
for some a ∈ K \ OT , and so ta−p = y ∈ AT \ OT ⊆ T \ OT , hence ta−p = bp − b + m
for some b ∈ K \ OT and m ∈ Mv ⊆ MT . As α < 2 − p1 , we obtain
vT (ap b) = vT (ap ) + vT (b) = vT (ty −1) + vT (b) = vT (t) − vT (y) + 1p vT (y)
≥ α − 1 + p1 vT (y) > vT (y).
Therefore, vT (ab) > vT (ap b) > vT (y) ≥ αvT (y) and vT (ap m) > vT (ap b) > vT (y) ≥
αvT (y). Hence, ab, ap b, ap m ∈ AT ⊆ T , and so t = ((ab)p −ab)+ab−ap b+ap m ∈ T .
By the subclaim, f [Lv ] = Lv . Indeed, for any a ∈ Ov , a = k p − k + m for some
p
k ∈ K and m ∈ Mv . Then k ∈ Ov , so a = k − k.
So, the proof of Part 2 and of the whole theorem has been completed.
As was pointed out in the introduction, Corollary 7 follows from Theorem 6 and
Facts 1.8 and 1.9, and Corollary 8 follows from Theorem 6 and the fact that NIP
fields are closed under Artin-Schreier extensions.
Proposition 2.6 Let K be a field of characteristic zero satisfying (A) and containing
√
−1. Then either there is a non-trivial definable valuation on K, or for every nontrivial valuation v on K:
n
1. if char(K v ) > 0, then K v = K v for every n > 0,
2. if char(K v ) = 0, then there is a prime number p such that for all primes n
n
different from p, K v = K v .
14
Proof. Suppose there is no non-trivial definable valuation on K.
(1) The same argument (based on Facts 1.5, 1.6 and 1.7) as in √
the proof of Claim 2
in the proof of Theorem 6 works, noting that the assumption −1 ∈ K eliminates
the possibility that T is the positive cone of an ordering on K T .
p
(2) Suppose that for some prime p, K v 6= K v . Then T := (K ∗ )p (1 + Mv ) is a proper,
definable subgroup of K ∗ . If p 6= char(K T ), then we get a contradiction as in the
proof of the subclaim in the proof of Claim 2 in Theorem 6. So p = char(K T ).
Consider any prime n 6= p. Let T ′ := (K ∗ )np (1 + Mv ). Then T ′ ≤ T . On the
other hand, since T is definable and OT is not definable, Fact 1.7 implies that T
does not belong to the group case. Thus, we conclude that OT ⊆ OT ′ , and hence
char(K T ′ ) ∈ {0, p}. However, it is impossible to have char(K T ′ ) = 0, as in this case
once again one gets a contradiction as in the proof of the subclaim in the proof of
Claim 2 in Theorem 6. So char(K T ′ ) = p. Our goal is to show that K n (1+Mv ) = K.
If this is not the case, then T ′′ := (K ∗ )n (1 + Mv ) is a proper, definable subgroup
of K ∗ , and once again Facts 1.5, 1.6 and 1.7 yield that (n, char(KT ′′ )) 6= 1 and T ′′
does not belong to the group case. Since T ′ ≤ T ′′ , we conclude that OT ′′ ⊆ OT ′ , but
char(K T ′ ) = p, and so we get that char(K T ′′ ) = p. This contradicts the assumption
that n is relatively prime to p.
If one was able to strengthen the conclusion of Proposition 2.6(2) by showing
n
that K v = K v for all primes n, then using Lemma 2.4, one would get that, under
the assumption of Proposition 2.6, either there is a non-trivial definable valuation
on K, or for any non-trivial valuation v with char(K v ) = 0 the residue field K v is
algebraically closed. So, arguing as in the proof of Remark 2.2, one would also get
that Assumption (A) implies that either there is a non-trivial definable valuation
on K, or for any non-trivial valuation v with char(K v ) = 0 the residue field K v is
either algebraically or real closed. In fact, strengthening slightly Assumption (A),
this would imply the full conclusion of Conjecture 5.
Proposition 2.7 Suppose that the conclusion of Proposition 2.6(2) can be strengthn
ened to ‘ K v = K v for all primes n’. Let K be a field such that for every finite
extension L of any elementary extension of K and for every natural number n > 0
the index [L∗ : (L∗ )n ] is finite and, if char(K) = p > 0 and f : L → L is given by
f (x) = xp − x, the index [L+ : f [L]] is also finite. Then either there is a non-trivial
definable valuation on K, or every non-trivial valuation on K has divisible value
group and either algebraically or real closed residue field.
Proof. Suppose there is no non-trivial
definable valuation on K. Using Remarks 2.1
√
and 2.2, we can assume that −1 ∈ K. Let v be any non-trivial valuation on K.
Divisibility of Γv was proved in Theorem 6. By this theorem, it remains to consider
the case char(K) = 0. From the discussion above Proposition 2.7, we are done in
the case char(K v ) = 0. So it remains to consider the case char(K v ) = p > 0.
e Γ,
e e
Take a monster model (K,
v) ≻ (K, Γv , v). Let O be a maximal valuation ring
e
/ O. Let M be the maximal ideal of O. Then
in K containing Ove and such that p1 ∈
15
p ∈ M, so k := O/M is of characteristic p.
e such that O ( O1 .
We claim that there is a non-trivial valuation ring O1 in K
e O of Γ
e defined
To see this, recall that O corresponds to the proper convex subgroup Γ
by
eO := {γ ∈ Γ
e : (∀x ∈ M)(e
Γ
v(x) > γ, −γ)}.
eO . Put Γ
e1 := S (−nγ, nγ) a convex subgroup of Γ
e properly
So, there is γ > Γ
n
eO . By saturation, Γ
e1 6= Γ.
e So, Γ
e1 = Γ
eO1 for some non-trivial valuation
containing Γ
ring O1 ) O.
Since O ( O1 , we have that 1p ∈ O1 , hence the residue field k1 := O1 /M1 (where
M1 is the maximal ideal of O1 ) is of characteristic 0. So k1 is algebraically closed
(as the conclusion of Proposition 2.7 holds in the residue zero characteristic case,
e in place of K). As Ove ⊆ O1 , this implies that the residue field K
e ev is
also for K
algebraically closed, and so K v is algebraically closed, too.
3
Minimal fields
We will prove here Theorem 9. In contrast to Theorem 6, where the proof relies on
non-trivial results from [13], the proof of Theorem 9 is a trivial consequence of the
definition of minimality.
Recall that a minimal field is an infinite field whose every definable (in one variable) subset is finite or co-finite.
Proof of Theorem 9. Consider any non-trivial valuation v on K.
By minimality, for every natural number n > 0, (K ∗ )n = K ∗ . (To see this, notice
that (K ∗ )n is an infinite multiplicative subgroup of K, so it is a co-finite subgroup,
so it is everything.) From this, it is clear that Γv is divisible.
Consider any monic polynomial P (x) = xn + an−1 xn−1 + . . . + a0 ∈ K v of positive
degree n; here a0 , . . . , an−1 ∈ Ov . Let P (x) = xn + an−1 xn−1 + . . . + a0 . Since P (x)
takes co-finitely many values in K and Mv is infinite, there exists a ∈ K such that
P (a) ∈ Mv . Then a ∈ Ov , as otherwise v(a) < 0, and so v(ai ai ) = v(ai ) + iv(a) >
nv(a) = v(an ) for i = 0, . . . , n − 1, which implies that v(P (a)) = v(an ) = nv(a) < 0,
a contradiction with the fact that P (a) ∈ Mv . Therefore, P (a) = 0, i.e., P (x) has a
root in K v .
4
Final comments
We will say that a given field K has Property (∗) if every non-trivial valuation on
K has divisible value group and algebraically closed residue field. We will say that
it has Property (∗−) if every non-trivial valuation on K has divisible value group
and either algebraically or real √
closed residue field. By Remark 2.2, a field K has
Property (∗−) if and only if K( −1) has Property (∗).
16
Having the results and conjectures discussed in this paper, a natural questions
arises what can be said about the structure of fields with Property (∗) or (∗−). In
particular, can one deduce from our results Conjectures 1, 2, 3, 4 (at least in positive
characteristic) or Podewski’s conjecture?
Recall that a filed K is bounded if its absolute Galois group is small, i.e., its
absolute Galois group has only finitely many closed subgroups of any finite index;
equivalently, for every natural number n > 0, K has only finitely many extensions
of degree n (up to isomorphism over K). A field is orderable if it can be equipped
with some order making it an ordered field; equivalently, it is formally real (i.e., −1
is not a sum of squares).
Recall that a field K is PAC (pseudo algebraically closed) if every absolutely
irreducible variety over K has a K-rational point. A field K is PRC (pseudo real
closed) if every absolutely irreducible variety over K which has an F -rational point in
every real closed field F containing K has a K-rational point. With such definitions
√
each PAC field is PRC. We know that if K is an orderable PRC field, then K( −1)
is (perfect) PAC [18, Lemma A.1.1.3].
Fact 4.1 A PRC field is superrosy if and only if it is perfect and bounded.
Proof. (←) was proved in [18, Appendix A] for orderable PRC fields and in [11] for
PAC fields. To see the converse, note that the same argument as in [21, Theorem
5.6.5] yields boundedness. Finally, suppose for a contradiction that K is not perfect.
Then, by Remark 2.5, [K ∗ : (K ∗ )p ] is infinite, which contradicts Fact 1.9.
Remark 4.2 An orderable PRC field has the strict order property, so it is not simple.
In particular, Conjecture 3 implies Conjecture 1.
Proof. Let K be a formally real PRC field. We claim that any element which is a sum
finitely many squares is a sum of two squares. For this, consider any non-zero element
a ∈ K which is a sum of finitely many squares. Then the polynomial x2 + y 2 − a has
a zero in any real closed field containing K. Since x2 + y 2 − a is absolutely irreducible
(e.g. by the Eisenstein criterion) and K is PRC, this polynomial has a zero in K,
and so a is a sum of two squares in K.
Now, define the relation ≤ on K by
x ≤ y ⇐⇒ y − x is a sum of squares of finitely many elements of K.
We claim that ≤ is a partial order with an infinite chain. The fact that ≤ is
antisymmetric follows from the fact that K is formally real. Transitivity is clear.
The existence of an infinite chain can be seen as follows. Take any a 6= 0. Then
a2 < 2a2 < 3a2 < . . ..
Since, by the first paragraph of the proof, x ≤ y if and only if y − x is a sum of
two squares, we see that ≤ is definable.
Fact 4.3 A non separably and non real closed PRC field does not have NIP. In
particular, Conjecture 3 implies Conjecture 2.
17
Proof. The main result of [5] says a non separably closed PAC field does not have
NIP. Now, consider a non separably and
√ non real closed PRC field. Suppose for a
contradiction that it has NIP. Then K( −1) still has NIP (as it is interpretable in
K) and it is PAC but not separably closed, a contradiction.
By [8], perfect PAC fields have Property (∗), so, by [18, Lemma A.1.1.3], PRC
fields have Property (∗−). One could ask whether for infinite fields Property (∗−)
[or (∗)] implies that the field in question is PRC (in the non formally real case, PRC
can be replaced by PAC). By virtue of our results and Fact 4.3, the positive answer
would imply Conjectures 1, 2, 3 and 4 in positive characteristic. Unfortunately the
answer is negative, which we briefly explain now. In [8] and [10], the Hasse principle
for Brauer groups is considered. It is shown in [8, Theorem 3.4] that if K is a perfect
PAC field, then any extension F of K of relative transcendence degree 1 satisfies the
Hasse principle for the Brauer groups. On the other hand, it is shown in [8, Theorem
4.1] that whenever K is a perfect field such that the Hasse principle for the Brauer
groups holds for all extensions F of K of relative transcendence degree 1, then the
field K has Property (∗). It was also asked in [8, Question 4.2] whether a non formally
real infinite perfect field K such that the Hasse principle for the Brauer groups holds
for all extensions F of K of relative transcendence degree 1 is necessarily PAC? In
[10], a counter-example was constructed. The authors introduced the class of the
so-called weakly PAC fields, they proved that weakly PAC fields are non formally
real and that (assuming perfectness) they satisfy the Hasse principle for the Brauer
groups for all extensions of relative transcendence degree 1, and they constructed
perfect weakly PAC fields which are not PAC. In particular, perfect weakly PAC
fields have Property (∗).
The above discussion leads to the following questions in our context.
Question 4.4 Does there exist a weakly PAC but not PAC superrosy [resp. supersimple] field?
The positive answer would refute Conjecture 3 [resp. Conjecture 1]. The negative
answer would support (but not prove) these conjectures.
Question 4.5 Let K be an infinite perfect field with NIP satisfying Property (∗) [or
(∗−)]. Is it true that K is either algebraically or real closed?
√
Applying the trick with adding −1, we see that both versions of this question
are equivalent. By Corollaries 7 and 8, the positive answer would imply Conjectures
2 and 4 in positive characteristic.
Question 4.6 Does there exist a non algebraically closed, perfect weakly PAC field
which [is superrosy and] has NIP?
The positive answer would yield the negative answer to Question 4.5. The positive
answer to the extended version would refute Conjecture 2. Notice that since by [5]
18
we know that non separably closed PAC fields do not have NIP, if the answer to the
above question was positive, the witness field would have to be weakly PAC but not
PAC.
In any case, in order to find counter-examples to Conjectures 1, 2, 3 or 4, one could
try to construct suitable non PRC fields with Property (∗−); possible candidates
could be among perfect weakly PAC but not PAC fields. Or, try to prove the
conjectures by showing that there are no such fields.
A generalization of Corollary 7 to the characteristic zero case is an open problem.
Of course, Thereom 6 yields the divisibility of the value groups, but the problem is
with the residue fields.
Conjecture 10 Every non-trivial valuation on a superrosy field has divisible value
group and either algebraically or real closed residue field.
Another idea of attacking Conjecture 2 by means of Corollary 7 (or rather Conjecture 10), suggested by E. Hrushovski, is to try to show that a superrosy field with
NIP is the residue field with respect to some non-trivial valuation on another superrosy field with NIP, and use Corollary 7 (or Conjecture 10 in the zero characteristic
case) to conclude that the original field is either algebraically or real closed.
As was mentioned in the introduction, K. Dupont has
√ a different approach to
Conjecture 4 (and so also to Conjecture 2). After adding −1 to the field, the goal
is to show that either for every finite extension L of K and for every prime number n,
(L∗ )n = L∗ (as then K is algebraically closed by Lemma 2.4), or there is a non-trivial
definable valuation on K. Assume that the first possibility fails for some L and n.
Put T = (L∗ )n . It follows from the assumptions and Remark 2.5 that L is perfect,
so n 6= char(L). The first goal is to show that OT is a definable valuation ring on L.
Further, K. Dupont deduced from [13] that OT is non-trivial if and only if the family
of sets {aT + a : a ∈ L∗ } is a subbasis of a V -topology on L. The second goal of her
project is to show (using the NIP assumption) that the last condition holds.
References
[1] H. Adler. A geometric introduction to forking and thorn-forking, preprint.
[2] Z. Chatzidakis, Simplicity and independence for pseudo-algebraically closed
fields. In Models and computability (Leeds, 1997), London Math. Soc. Lecture
Note Ser., vol. 259, 41-61, Cambridge Univ. Press, Cambridge, 1999.
[3] Z. Chatzidakis and A. Pillay, Generic structures and simple theories, Ann. Pure
Appl. Logic 95, 71-92, 1998.
[4] G. Cherlin, S, Shelah, Superstable fields and groups, Annals of Mathematical
Logic 18, 227-270, 1980.
19
[5] J. Duret, Les corps faiblement algébriquement clos ont la propriété
d’indépendance. In Model Theory of Algebra and Arithmetic (proc. Karpacz),
Lecture Notes in Mathematics, Springer, vol. 834, 136-162, 1979.
[6] C. Ealy, K. Krupiński, A. Pillay. Superrosy dependent groups having finitely
satisfiable generics, Annals of Pure and Applied Logic 151, 1-21, 2008.
[7] C. Ealy and A. Onshuus. Characterizing rosy theories, Journal of Symbolic Logic
72, 919-940, 2007.
[8] I. Efrat, A Hasse Principle for function fields over PAC fields, Israel Journal of
Mathematics 122, 43-60, 2001.
[9] A. J. Engler, A. Prestel, Valued Fields, Springer, The Netherlands, 2005.
[10] W. Geyer, M. Jarden, Non PAC fields whose Henselian closures are separably
closed, Mathematical Research Letters 8, 509-520, 2001.
[11] E. Hrushovski, Pseudo-finite fields and related structures, preprint, 1991.
[12] I. Kaplan, T. Scanlon, F. Wagner, Artin-Schreier extensions in NIP and simple
fields, Israel Journal of Mathematics 185, 141-153, 2011.
[13] J. Koenigsmann, Definable Valuations, In Delon, Dickmann, and Gondard, editors, Seminaire Structures algébriques ordonnées Paris VII, 1994.
[14] K. Krupiński, Fields interpretable in rosy theories, Israel Journal of Mathematics
175, 421-444, 2010.
[15] K. Krupiński, Fields interpretable in superrosy groups with NIP (the non-solvable
case), Journal of Symbolic Logic 75, 372-386, 2010.
[16] A. Macintyre, On ω1 -categorical theories of fields, Fundamenta Mathematicae
71, 1-25, 1971.
[17] A. Onshuus, Thorn-Forking in Rosy Theories, Ph.D. thesis, Berkeley, 2002.
[18] A. Onshuus. Properties and consequences of thorn-independence, Journal of
Symbolic Logic 71, 1-21, 2006.
[19] K. P. Podewski, Minimale Ringe, Math. Phys. Semesterber. 22, 193-197, 1973.
[20] S. Shelah, Strongly dependent theories, preprint, SH863.
[21] F. Wagner, Simple Theories, Kluwer Academic Publishers, Dordrecht, The
Netherlands, 2000.
Address:
Instytut Matematyczny, Uniwersytet Wrocławski,
pl. Grunwaldzki 2/4, 50-384 Wrocław, Poland.
E-mail address: [email protected]
20
| 0math.AC
|
Real Time Impact Control on Charging Energy Storage
For Shipboard Power Systems
arXiv:1801.05797v1 [cs.SY] 17 Jan 2018
Yusheng Luoa , Sanjeev Srivastavab , Manish Mohanpurkara , Svetomir
Stevica , Rob Hovsapiana
a
Idaho National Laboratory
Idaho Falls, Idaho 83415
b
Siemens Corporate Technology
755 College Rd E, Princeton, NJ 08540
Abstract
Medium voltage direct-current based integrated power system is projected as
one of the solutions for powering the all-electric ship. It faces significant challenges for accurately energizing advanced loads, especially the pulsed power
load, which can be rail gun, high power radar, and other state of art equipment. Energy storage based on supercapacitors is proposed as a technique
for buffering the direct impact of pulsed power load on the power systems.
However, the high magnitude of charging current of the energy storage can
pose as a disturbance to both distribution and generation systems. This paper presents a fast switching device based real time control system that can
achieve a desired balance between maintaining the required power quality
and fast charging the energy storage in required time. Test results are shown
to verify the performance of the proposed control algorithm.
Keywords: Medium voltage direct-current based integrated power system,
Pulsed power load, Power quality, Disturbance metric, Real time control
1. Introduction
Research related to navy shipboard power system raise a critical concern
regarding to the system stability due to diverse loads. Similar to microgrids,
navy shipboard power systems do not have a slack bus [1]. It can be viewed as
a microgrid always operating in islanding mode. Compared with typical terrestrial microgrid, the ratio between the overall load and generation is much
higher [2]. Although new avenues such as zonal load architecture [3], high
Preprint submitted to International Journal of Electrical Power and Energy SystemsJanuary 18, 2018
energy/power density energy storage systems [4], and high efficiency generator [5] have been developed for supporting stability control, new challenges
also arise due to the diverse demand from load side.
In order to reduce ship’s size and visibility in future battlefields, an Integrated Power System (IPS) based all-electric ship is developed [6]. All electric
ship is characterized by using electrical motor driven propulsion system to
replace traditional mechanical transmission propulsion system. Therefore,
the propulsion system is integrated with the shipboard power system, and
is termed as IPS. The application of electrical propulsion waives the need
of slow speed gear providing power to mechanical propulsion. The remaining fast gear can drive both the generation and electrical propulsion [7].
Therefore the space occupied by the transmission system is largely reduced.
Nevertheless, the electrical propulsion has high efficiency, which means less
fuel is needed and the ship size can be further reduced. Not only the shape
of the ship is optimized, but the weapons system can also be improved significantly. Phase-array radars are capable of providing detection with higher
resolution and wider area, pulsed power load features in fast, powerful, and
accurate attacks, electromagnetic ejector can inject high launch dynamics
for shipboard aircrafts and so on. These state of the art devices share a
common characteristic, their power demand appears as a large pulse due to
the integration of power electronics interface [8]. The electrical propulsion
and Pulsed Power Load (PPL) place a huge burden on the generation and
distribution capacity of the shipboard power systems.
To address the challenge of reliably powering the all-electric ship, several
efforts have been made. Different distribution architectures such as Medium
Voltage Alternative Current (MVAC), High Frequency Alternative Current
(HFAC), and Medium Voltage Direct Current (MVDC), have been analyzed
[5, 9]. Such research efforts reached a conclusion that MVDC system is projected as the optimal distribution architecture for IPS. This is on account
of MVDC’s no concerns regarding generator synchronization, harmonics distortion, and frequency stability. The electrical devices and related control
strategy for supporting MVDC distribution architecture have also been developed [10].
Besides developing IPS, contributions have also been made to test the performance of IPS in powering advanced loads. Propulsion loads occupy a large
portion of the total shipboard load consumption. In the rest of the loads,
PPLs are usually critical due to their indispensable role in the battle. One of
the most challenging issues in controlling IPS operation is providing expected
2
power and energy to PPL without affecting the operation of other critical
loads. The impact from PPL to IPS with various distribution architectures
are analyzed in [11, 12, 13]. Analysis shows that the impact from energizing
PPL with around 100 MW power can seriously influence the system stability
and power quality. In [14], noteworthy work is presented for an innovative
application of power electronics interfaced Supercapacitor Energy Storage
System (SESS). Energy storage has found wide application in such hybrid
energy systems, for augmenting limited generation and modern loads [15, 16].
From the beginning of the development of IPS, energy storage was used as
auxiliary power supply [17]. Supercapacitor is well known for its high power
density, which can enable fast charging/discharging [18, 19]. By switching
the power source from shipboard generation to SESS, the direct impact from
PPLs to IPS can be eliminated. However, the charging of SESS can induce
high current and still destabilize the IPS. Control methods for driving the
SESS charging circuit within desired limits and rates are proposed. In [11],
limit-based supercapacitor control is proposed. Although this method can
be effective, it requires a precise understanding of the system’s current and
power limits in order to prevent abrupt disturbance to the system. In [20],
a trapezoidal-based control of SESS charging is introduced. This control is
only effective when trapezoidal load profile fits the system requirement, and
vice versa. Profile-Based Control (PBC) in [14] features a minimal impact
to system stability within a fixed time frame, however it still requires the
prerequisite information about the system’s current limit. Furthermore, it is
challenging to set a fixed charging time which is essential for such systems.
Some other papers, such as [21, 22] focus on coordinating SESS charging
control and generation control to mitigate the possible disturbance caused
by SESS charging. However, during mission time, especially battle time, the
quality of communication supporting coordination may not be guaranteed
due to weather or battle damage. Nevertheless, these coordination strategies
are mostly applied to MVAC system, which highlight coordination of generation control and other load control. The MVDC system is proposed to
waiver the concerns of generation control coordination. In another word, it is
more open decentralized control strategy. Henceforth a decentralized control
strategy is considered as more suitable method for SESS charging in MVDC
system.
The proposed work in this paper is based on the contribution in [23],
which proposed a Disturbance Metric Control (DMC). DMC is a decentralized technique developed to control SESS charging according to disturbances
3
monitored in real time from SESS charging in MVDC system. However, it is
needed to prove that existing hardware is capable of realizing the proposed
real time control theory. To achieve the expected performance of DMC, this
study integrates the cutting edge IGBT technology to DMC and proposed
Real Time DMC (RTDMC). The paper comprises of the following sections:
section 2 describes the experimental system; section 3 analyzes the disturbance due to ES charging; section 4 presents DMC strategy guided by two
major concerned disturbance metrics in MVDC system; section 5 describes
the hardware implementation of proposed RTDMC strategy; in section 6 test
results based on the proposed RTDMC are discussed; and the conclusion is
summarized in section 7.
2. System description
2.1. Test Environment
Unpredicted and unaccounted charging/discharging of SESS can damage
hardware leading to failures, making it uneconomical to test in real-world
applications. Hence, a digital real time simulator (DRTS) is used to assess
the performances and generate result. In this environment, the time-step
for simulating electrical circuit is 50 µs. For power electronics simulation,
the time-step can be reduced to 1-2 µs. The real time computation speed
of the power systems can test whether the proposed control strategy is fast
enough to adjust SESS charging so that expected control performane can be
achieved.
2.2. MVDC System
With the maturity of technology in DC circuit breakers [24], DC cables [25], MVDC system is deemed as advantageous for power distribution.
Following the introduction of MVDC in [9], we simulated and studied a shipboard IPS with MVDC distribution architecture as shown in Figure 1. In
this topology, the main power source are two Main Gas Turbine Generators
(MTGs). Each MTG has a generation capacity of 36 MW. In case of need,
each MTG is equipped with a 5 MW Auxiliary gas Turbine Generator (ATG).
Generation output from MTGs and ATGs is fed into a controllable rectifier
and then into a 5 kV MVDC distribution bus. Two 5 kV distribution buses
constitute the MVDC distribution system. Since a ship is equally divided
into two parts i.e., starboard and port, the bus that feeds starboard is called
starboard bus whereas the other one is called port bus. Each bus is directly
4
connected with an MTG, an ATG, and a 36.5 MW propulsion motor. Between two buses, there are zonal loads, stern circuit breaker, and bow circuit
breaker. Zonal loads can use circuit breaker to choose drawing power from
one bus or both buses. Stern and bow circuit breakers are used to connect
or disconnect starboard and port buses. When starboard and port bus are
connected with each other, generation from all four generators are merged
together, the mode for this connection is called Ring Mode (RM). When starboard and port bus are separated, power supplied to each bus can only come
from one MTG and one ATG. We call this operation as Split Plant Mode
(SPM). The PPL module is directly connected to port bus, which means the
power supply for charging SESS in RM is much more than in SPM.
MTG1
GT
GT
AC
Circuit
Breaker
Rectifier
ATG1
AC
Circuit
Breaker
Port
Propulsion
Motor
DC
Disconnect
Rectifier
DC
Disconnect
MVDC
Starboard Bus
Drive Inverter
Zone 1
Load
Center
Stern
Circuit
Breaker
Zone 2
Load
Center
Zone 3
Load
Center
Zone 4
Load
Center
DC
Disconnect
PPL
ES
BUCK
Converter
Zone 5
Load
Center
DC
Disconnect
Starboard
Propulsion
Motor
DC
Disconnect
Bow
Circuit
Breaker
MVDC
Port Bus
Drive Inverter
ATG2
Rectifier
GT
AC
Circuit
Breaker
GT
MTG2
AC
Circuit
Breaker
Rectifier
Figure 1: System topology of MVDC based IPS.
2.3. Pulsed Power Load Module
Inside the PPL module, there is PPL, SESS, and the power electronics
interface serving as charging circuit of SESS, as shown in Figure 2. The
charging circuit is a BUCK converter which is controlled by switch S1 [26].
During each commutation period T , the turn on time for S1 is Ton . During
Ton , power goes through S1 and L, then enters SESS. When S1 is opened,
current goes through SESS can be continued by passing D and L. When the
5
BUCK converter
MVDC bus P S1
L
+
Vin
S2
+
D
Vo
-
SESS
PPL
-
MVDC bus N
Figure 2: Charging circuit for SESS.
charging reaches a steady state, the voltage on SESS, Vo can be maintained
at a fixed value, as shown in Eq (1):
Ton
Vin .
(1)
T
During energizing PPL, power is sent from SESS, then S2, finally reaches
PPL. To prevent PPL directly draw power from MVDC bus, S1 and S2
are not allowed to be closed simultaneously. Therefore S2 is always opened
during charging, and S1 remained opened when PPL is being energized. In
this study, totally 300 MJ energy is expected to be injected into SESS. This
amount of energy can allows PPL at least be fired up for 2 times without
recharging according to [12].
Vo =
3. Analysis of Disturbance due to SESS charging
Figure 3 is a simplified diagram of the MVDC system using the single
line representation, which is used to analyze the possible disturbance caused
by SESS charging. In this figure EA is the emf generated from a single
phase and Xg is generator’s reactance. The resistance in generator can be
ignored during the transient analysis [27]. D1 -D4 are the switches forming
the rectifier to convert power from AC to DC. RLine is the line resistance in
distribution system and RLoad is the resistance of loads other than SESS. We
set the analysis time begins at t0 , when EA is in the positive semi-period,
6
and only D1 and D4 are turned on. It is generator’s terminal current. Before
charging, It can be expressed as Eq.(2):
It,t−0 =
EA
Xg + RLine + RLoad
.
(2)
The terminal voltage which is also the MVDC bus voltage is calculated in
Eq.(3)
(3)
Vbus,t−0 = EA − Xg ILoad .
RLine
It
EA
D1
D2
Xg +
Vbus
-
RLoad
D3
SESS
D4
Figure 3: Simplification diagram of MVDC based IPS.
Right after that, SESS charging is initiated. Since the voltage of supercapacitor cannot suddenly change, and supercapacitor has zero initial voltage,
it is equal to insert a short circuit fault into the system. Rload is henceforth
removed. It calculation is changed to Eq.(4)
It,t+0 =
EA
.
Xg + RLine
(4)
A transient is introduced into the system, the generator stator reactance in
0
Eq.(4) is replaced by transient reactance Xg which has smaller value compared with Xg , we got Eq.(5)
It,t++
=
0
EA
Xg + RLine
0
7
(5)
Compared to (2), both real and imaginary parts of denominator are reduced, the magnitude of denominator is smaller. At this moment, EA ’s value
can be reviewed as constant, the current magnitude is therefore increased.
0
Since usually Xg is 3-4 times of Xg , and RLoad >> RLine , We got the following
equation:
Xg
EA
0
Xg + RLine + RLoad
< Xg
EA
,
Xg + RLine
0
which means Vbus is reduced. We can further conclude that the reactive
power from generator also increases, according to:
Xg (
EA
0
Xg + RLine + RLoad
)2 < Xg (
EA
)2 ,
Xg + RLine
0
Reduced voltage influences the operation of other loads and increased
reactive power can reduce the fuel efficiency of generator. When these two
disturbances can be mitigated within the tolerated range, SESS charging can
be allowed.
4. Disturbance Mitigation control strategy
The critical impact is mainly correlated with the charging current, the
higher the charging current, the more severe its impact. It is expected that
charging control systems must strike a balance between rapid charging and
tolerable impact. According to analysis presented in the previous section,
power quality impacts from SESS charging are reflected in MVDC bus and
generator reactive power output. Two metrics are developed to evaluate the
impact from SESS charging:
leftmargan=*,labelsep=3mm M1 = |Vbus,lim −Vbus |, Vbus,lim is the input limit
of MVDC bus voltage, Vbus is the real time
measured MVDC bus voltage;
leftmbrgbn=*,lbbelsep=3mm M2 = QM T G , QM T G is the real time measured
generator reactive power.
For designing such power systems, standards are employed as guiding
principles. One of the applicable standards is related to the expected power
quality range and its limitations, such as [28]. For any device operating
within this system, their control designs should ensure that as long as the
8
specified power quality is maintained, the devices should properly operate as
well. Thus, if the SESS charging controller can ensure the power quality is not
lowered below the limit required by the standard, all the loads can function
normally and their performance is acceptable forming the basis for the DMC
proposed in this paper. Assuming the DMC can restrain disturbance below
the set limits, the adopters of the proposed work need to modify the limits
defined by applicable standards. The customized upper limits of these two
metrics are input to DMC, and DMC maintains metric values below limit.
Therefore the expected balance can be reached, as shown in Figure 4. DMC
measures the metric value and determines the control signal sent to charging
circuit. The charging current is defined as the current injected from MVDC
bus positive node to SESS module. We assume that during the charging
process, MVDC bus voltage settle at a steady state other than its rated
value. It is expected to maintain charging current with a minor variation,
because the charging power can be close to a constant value and facilitate
IPS reaching a new steady state during charging. Due to the variations in
the characteristics of MVDC bus voltage and MTG reactive power, there
are two different procedures for controlling charging current to according to
changes of M1 and M2 .
4.1. Control procedure for mitigating impact to MVDC bus voltage
The charging current can directly affect MVDC power, therefore, if we
can maintain charging current at a constant value, the bus voltage can also
stay close to a constant value. Hence the key part of mitigating impact to
MVDC bus voltage is to find the maximum charging current. The proposed
control procedure is:
1. Set an alert value, which is less than but close to the preset upper limit
of bus voltage deviation.
2. Start the controlled charging process with above alert and metric value.
3. When the metric value reaches the preset alert value, stop charging and
record the corresponding charging current.
4. Set this recorded maximum charging current as the reference for charging circuit and let the controller closely tracking it.
5. Stop charging when SESS voltage reaches the desired value.
9
M1
S1 firing
DMC pulse
Charging
circuit
Metric value
M2
Expected region
of metric value
metric curve
Charging time
Figure 4: DMC control strategy.
4.2. Control procedure for mitigating impact to MTG reactive power output
Existing test result shows the impact from charging current to MTG
reactive power output is indirect. There is a delay between the charging
current change and consequent reactive power change. Therefore, the control
procedure in mitigating bus voltage cannot be applied to mitigating reactive
power increment. An adaptive control strategy is developed for reactive
power output limitation:
1. Set an alert value, which is less than but close to the preset upper limit
10
Start charging
Stop charging
when metric value
first time hit alert
value
Record the current
value moment before
suspension
Set the current
reference value
based on the
recorded value
Resume charging and
regulate charging
with acquired
reference value
Stop charging when
SESS stored voltage
reaches desired value
Figure 5: Flow chart for mitigating MVDC bus voltage sag
of bus voltage deviation.
2. Start the controlled charging process.
3. When the metric value reaches the preset alert value, stop charging and
record the corresponding charging current. Set this charging current
value as ‘maximum charging value’ for implementing the algorithm.
11
4. If the metric value continues to increase and exceeds the upper limit,
use a suitable attenuation factor α (0 < alpha < 1) to revise the value of
maximum charging value using the formula ‘attenuationf actorXrecordedchargingvalue’.
5. Resume charging and if the charging current increases to the revised
maximum charging value, stop charging and monitor the metric change.
If the metric value can still reach the upper limit, repeat step 4, 5 and
6.
6. Repeat iteratively until the metric does not exceed upper limit again,
set the last value of the product as maximum charging current. Let the
upper limit value times a positive coefficient (less than 1) be the lower
limit for charging current. This coefficient for the proposed work is set
to 0.9.
7. The reference current value is switched between the lower and upper
limit based on the actual, monitored value of the charging current. Although the current is oscillating, this oscillation impact can be tolerated
due the 10% difference between upper limit and lower limit.
8. Stop charging when SESS stored voltage reaches desired value.
The performance of the proposed control strategy depends on how quickly
the critical current value can be captured, how precisely the actual charging
current can track the reference current, and how immediately the charging
current value can be switched from one state to another state. A desired
controller hardware implementation meeting all of the aforementioned prerequisites is expected to be implemented.
5. Fast Switchable IGBT Based Hardware implementation of Real
Time Disturbance Metric Controller
The expected hardware should be capable of being immediately turning
on/off during SESS charging. It should also be capable of withstanding high
voltages up to 5 kV during turn off period. Furthermore, the switch should
also allow monetary overshoots of charing/discharging current. Based on
the these requirements for the fast response of controller, we conducted a
literature review related to the fast switchable power electronics devices. It
was inferred that a chopper IGBT module FD500R65KE3-K from Infineon
has the necessay functionalities for realizing the proposed control strategy.
According to [29], the turn off delay of this device has been reduced to only 7.3
µs. It can sustain up to 6.5 kV exerted voltage during turn off. By connecting
12
Start charging
Stop charging
when metric value
first time hit alert
value
Record the current
value moment before
suspension
When charging
current reaches upper
limit stop charging
Monitor the trend of
MTG reactive power
increase
Resume charging
If it exceeds
preset limit?
Yes
Let the last recorded
current value multiply
an attenuation factor to
generate an upper limit
No
Fix the upper limit
and lower limit for
charging current
Resume charging and
regulate charging
with acquired limit
value
Stop charging when
SESS stored voltage
reaches desired value
Figure 6: Flow chart for limit MTG reactive power output
13
multiple switches in parallel, a BUCK chopper which is capable of fast turn
on/off during high charing/discharing current can be implemented, and the
concerned disturbance can be maintained within desired regions. This IGBT
module is commercially-off-the-shelf and there may be similar products with
the necessary functionalities. The expected energy to be stored in SESS is
300 MW. To reduce the size of the capacitor, the stored voltage should be
as high as possible. On the other hand, the highest voltage stored in SESS
should not be too high to affect the turning on/off performance of S1 and S2
in Figure 2. According to [29], the best performance is verified when VCE of
the switch device is 3600 V. We allow a 10% increase of test voltage, and the
final charged voltage is set at 4 kV. According to Eq. (6), the capacitance of
SESS in this study case is 37.5 F.
1
Ec = CVc2 .
2
(6)
6. Test Result
In order to validate whether the proposed test can properly mitigate the
impact to IPS and ensure fast charging, test case is setup in the DRTS with a
simulation time step of 50 µs. The reaction of test system can well approach
the actual real time power system response. Overall initial generation output
in all the study cases is set to 70 MW and 5 MVAr. The generation margin
left for SESS charging is 30 MVA. 4 test cases are run: M1,limit =0.6 kV,
M1,limit =0.8 kV, M2,limit = 6 MVAr, M2,limit =10 MVAr. SESS charging begins
at the fifth second after a test is initialized.
6.1. Test case for MVDC bus voltage sag mitigation
Figure 7 shows test result when M1,limit is set to 0.8 kV and the alert
value is set to 4.205 kV. When bus voltage goes down and reaches this value,
the charging is suspended and current value is marked as 4.3 kA. Then, charging controller enables the actual current value stay at 4.3 kA. The charging
process lasts 19 second and stops when SESS stored voltage reaches 4 kV.
The minimum bus voltage is 4.201 kV. Average bus voltage value during
charging is 4.208 kV, and the maximum value is 4.3 kV. During the charging
the expected bus voltage value is maintained.
14
Figure 7: Case study: M1,limit = 0.8 kV
6.2. Test case for MTG reactive power output restrain
Figure 8 is used to demonstrate the effect of DMC when the limit of
M2 is set to 10 MVAr with the alert value is set to 9.5 MVAr. Attenuation
factor is set to 0.95. When charging current first reaches 3.3 kA, single MTG
reactive power output reaches 9.5 MVAr and hence charging is suspended.
MTG output continues to increase and peaks at 9.641 MVAr. Therefore
3.3 kA is set as the upper limit for charging current, and 2.97 kA is set as
the lower limit. It can be seen that after the setting, reactive exceeds the
limit twice, this is caused by the adjustment of generator excitation. After
a short transient, reactive power is stays below 10 Mvar. The average value
of M2 is 9.58 MVAr. It takes 26 seconds to inject 300 MJ energy to SESS.
Attenuation factor is set to 0.9.
Table 1 shows the summarization of all 4 test cases. Test results show
the proposed DMC can strike an optimal balance point between fast charging
and required power quality acquisition.
15
Figure 8: Case study: M2,limit = 10 Mvar
Table 1: Test cases result summarization
test setting
M1,limit =0.6 kV
M1,limit =0.8 kV
M2,limit =6 Mvar
M2,limit =10 Mvar
maximum metric value minimum metric value average metric value
4.04 kV
4.401 kV
4.02 kV
4.3 kV
4.201 kV
4.208 kV
6.04 Mvar
5.84 Mvar
5.89 Mvar
11.15 Mvar
9.23 Mvar
9.58 Mvar
charging current value charging time
3.9 kA
21 s
4.3 kA
19 s
(1.8, 2.0) kA
50 s
(2.97, 3.3) kA
26 s
7. Conclusions
In this paper, DMC strategy is proposed based on a real-time analysis of
SESS charing in MVDC based IPS. The proposed control strategy focus on
reaching a reasonable balance between fast charging SESS and maintaining
required power quality. Based on the first stage analysis, the impact from
SESS charging to power quality is assessed and studied. The underlying reason of the impact from SESS charging to power quality is the large charging
current. It is challenging to quantify the relation between charging current
and power quality. One feasible way for limiting impact from charging current is an online real time monitoring charging current and power quality.
16
Based on the real time monitoring result, an optimal charging current value
can be generated. The next challenging part is how to drive the charging current rapidly and precisely track the reference value. A fast switching charging
circuit based on the latest IGBT technology development is proposed. Test
results shows that using fast IGBT to implement SESS charging system can
accurately follow the control command sent from DMC. Realization of fast
SESS charging can maintain the required power quality.
In the future, greater disturbances caused by SESS charging, such as the
AC side harmonic influence on MVDC bus, is expected to be analyzed. The
proposed control strategy highly depends on the rapid monitoring and action.
In this paper, using DRTS, the effect of real time control has been simulated.
Simulation result shows if the device for monitoring and controlling is fast
enough, rapid SESS charging can be realized without sacrificing required
power quality. In the future, hardware-in-the-loop test in real time will
be performed in order to validate the proposed control strategy on actual
hardware. Finally, decentralized coordination between SESS charging control
and generator control will also be studied as future work.
8. Acknowledgements
Proposed work is supported by the Water Power Technology Office, Department of Energy and the INL Laboratory Directed Research & Development (LDRD) Program under DOE Idaho Operations Office Contract DEAC07-05ID14517.
References
[1] J. G. Ciezki, R. W. Ashton, Selection and stability issues associated with
a navy shipboard dc zonal electric distribution system, IEEE Transactions on power delivery 15 (2000) 665–669.
[2] I. Kondratiev, R. Dougal, Invariant based ship dc power system design,
in: Electric Ship Technologies Symposium (ESTS), 2011 IEEE, IEEE,
pp. 15–20.
[3] N. Doerry, Zonal ship design, Naval engineers journal 118 (2006) 39–53.
17
[4] R. Mo, H. Li, Hybrid energy storage system with active filter function
for shipboard mvdc system applications based on isolated modular multilevel dc/dc converter (im2dc), IEEE Journal of Emerging and Selected
Topics in Power Electronics (2016).
[5] N. Doerry, Next generation integrated power systems (ngips) for the
future fleet, in: IEEE Electric Ship Technologies Symposium.
[6] C. McCoy, Powering the 21st-century fleet, PROCEEDINGS-UNITED
STATES NAVAL INSTITUTE 126 (2000) 54–59.
[7] S. Young, J. Newell, G. Little, Beyond electric ship, Naval engineers
journal 113 (2001) 79–92.
[8] A. K. Panda, T. Penthia, Design and modeling of smes based sapf for
pulsed power load demands, International Journal of Electrical Power
& Energy Systems 92 (2017) 114–124.
[9] R. Soman, E. Davidson, S. McArthur, J. Fletcher, T. Ericsen, Modelbased methodology using modified sneak circuit analysis for power electronic converter fault diagnosis, IET Power Electronics 5 (2012) 813–
826.
[10] S. Castellan, R. Menis, A. Tessarolo, F. Luise, T. Mazzuca, A review
of power electronics equipment for all-electric ship mvdc power systems,
International Journal of Electrical Power & Energy Systems 96 (2018)
306–323.
[11] B. Cassimere, C. R. Valdez, S. Sudhoff, S. Pekarek, B. Kuhn, D. Delisle,
E. Zivi, System impact of pulsed power loads on a laboratory scale integrated fight through power (iftp) system, in: Electric Ship Technologies
Symposium, 2005 IEEE, IEEE, pp. 176–183.
[12] M. Steurer, M. Andrus, J. Langston, L. Qi, S. Suryanarayanan,
S. Woodruff, P. Ribeiro, Investigating the impact of pulsed power charging demands on shipboard power quality, in: Electric Ship Technologies
Symposium, 2007. ESTS’07. IEEE, IEEE, pp. 315–321.
[13] Y. Luo, M. Andrus, J. Lian, S. K. Srivastava, D. A. Cartes, Power
impact analysis of pulse power loads in the future integrated shipboard
18
power system, in: ASNE Electric Electric Machines Technology Symposium.
[14] J. M. Crider, S. D. Sudhoff, Reducing impact of pulsed power loads on
microgrid power systems, Smart Grid, IEEE Transactions on 1 (2010)
270–277.
[15] R. Omar, N. Rahim, Voltage unbalanced compensation using dynamic
voltage restorer based on supercapacitor, International Journal of Electrical Power & Energy Systems 43 (2012) 573–581.
[16] J. Chen, H. E. Garcia, J. S. Kim, S. M. Bragg-Sitton, Operations optimization of nuclear hybrid energy systems, Nuclear Technology 195
(2016) 143–156.
[17] J. Amy, Considerations in the design of naval electric power systems,
in: Power Engineering Society Summer Meeting, 2002 IEEE, volume 1,
IEEE, pp. 331–335.
[18] D. De, C. Klumpner, C. Patel, K. Ponggorn, M. Rashed, G. Asher,
Modelling and control of a multi-stage interleaved dc–dc converter with
coupled inductors for super-capacitor energy storage system, IET Power
Electronics 6 (2013) 1360–1375.
[19] Y. Luo, M. Panwar, M. Mohanpurkar, R. Hovsapian, Real time optimal
control of supercapacitor operation for frequency response, in: 2016
IEEE Power and Energy Society General Meeting (PESGM), pp. 1–5.
[20] M. Bash, R. Chan, J. Crider, C. Harianto, J. Lian, J. Neely, S. Pekarek,
S. Sudhoff, N. Vaks, A medium voltage dc testbed for ship power system
research, in: Electric Ship Technologies Symposium, 2009. ESTS 2009.
IEEE, IEEE, pp. 560–567.
[21] W.-S. Im, C. Wang, L. Tan, W. Liu, L. Liu, Cooperative controls for
pulsed power load accommodation in a shipboard power system, IEEE
Transactions on Power Systems 31 (2016) 5181–5189.
[22] L. Tan, Q. Yang, W. Im, W. Liu, Adaptive critic design based cooperative control for pulsed power loads accommodation in shipboard
power system, IET Generation, Transmission & Distribution 10 (2016)
2739–2747.
19
[23] Y. Luo, S. Srivastava, M. Andrus, D. Cartes, Application of distubance
metrics for reducing impacts of energy storage charging in an mvdc based
ips, in: 2013 IEEE Electric Ship Technologies Symposium (ESTS), pp.
287–291.
[24] Y. M. Yeap, N. Geddada, A. Ukil, Capacitive discharge based transient
analysis with fault detection methodology in dc system, International
Journal of Electrical Power & Energy Systems 97 (2018) 127–137.
[25] S. J. Sutton, P. L. Lewin, S. G. Swingler, Review of global hvdc subsea cable projects and the application of sea electrodes, International
Journal of Electrical Power & Energy Systems 87 (2017) 121–135.
[26] A. Khoudiri, K. Guesmi, D. Mahi, Spectral decomposition based approach for dc–dc converters modeling, International Journal of Electrical
Power & Energy Systems 61 (2014) 288–297.
[27] H. Saadat, Power system analysis, WCB/McGraw-Hill, 1999.
[28] Ieee recommended practice for 1 kv to 35 kv medium-voltage dc power
systems on ships, IEEE Std 1709-2010 (2010) 1–54.
[29] IGBT-Module, Infineon Technologies AG, 2014. Rev. 3.0.
20
| 3cs.SY
|
HOMOLOGY OF LITTLEWOOD COMPLEXES
arXiv:1209.3509v2 [math.RT] 8 Feb 2013
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
Abstract. Let V be a symplectic vector space of dimension 2n. Given a partition λ with at most n
parts, there is an associated irreducible representation S[λ] (V ) of Sp(V ). This representation admits
a resolution by a natural complex Lλ• , which we call the Littlewood complex, whose terms are
restrictions of representations of GL(V ). When λ has more than n parts, the representation S[λ] (V )
is not defined, but the Littlewood complex Lλ• still makes sense. The purpose of this paper is to
compute its homology. We find that either Lλ• is acyclic or it has a unique non-zero homology group,
which forms an irreducible representation of Sp(V ). The non-zero homology group, if it exists, can
be computed by a rule reminiscent of that occurring in the Borel–Weil–Bott theorem. This result
can be interpreted as the computation of the “derived specialization” of irreducible representations
of Sp(∞), and as such categorifies earlier results of Koike–Terada on universal character rings. We
prove analogous results for orthogonal and general linear groups. Along the way, we will see two
topics from commutative algebra: the minimal free resolutions of determinantal ideals and Koszul
homology.
Contents
1. Introduction
2. Preliminaries
3. Symplectic groups
4. Orthogonal groups
5. General linear groups
References
1
4
6
14
24
31
1. Introduction
1.1. Statement of main theorem. Let V be a symplectic vector space over the complex numbers of dimension 2n. Associated to a partition λ with at most n parts there is an irreducible
representation S[λ] (V ) of Sp(V ), and all irreducible representations of Sp(V ) are uniquely of this
form. The space S[λ] (V ) can be defined as the quotient of the usual Schur functor Sλ (V ) by the
sum of the images of all of the “obvious” Sp(V )-linear maps Sµ (V ) → Sλ (V ), where µ can be
obtained by removing from λ a vertical strip of size two. In other words, we have a presentation
M
Sµ (V ) → Sλ (V ) → S[λ] (V ) → 0.
λ/µ=(1,1)
This presentation admits a natural continuation to a resolution Lλ• = Lλ• (V ), which we call the Littlewood complex. It can be characterized as the minimal resolution of S[λ] (V ) by representations
which extend to GL(V ).
Date: February 8, 2013.
2010 Mathematics Subject Classification. 05E10, 13D02, 15A72, 20G05.
S. Sam was supported by an NDSEG fellowship and a Miller research fellowship. A. Snowden was partially
supported by NSF fellowship DMS-0902661. J. Weyman was partially supported by NSF grant DMS-0901185.
1
2
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
When the number of parts of λ exceeds n, it still makes sense to speak of the complex Lλ• ,
even though there is no longer an associated irreducible S[λ] (V ) (see §1.2 for a simple example).
However, Lλ• is typically no longer exact in higher degrees. A very natural problem is to compute
its homology, and this is exactly what the main theorem of this paper accomplishes:
Theorem 1.1. The homology of Lλ• is either identically zero or else there exists a unique i for
which Hi (Lλ• ) is non-zero, and it is then an irreducible representation of Sp(V ).
In fact, there is a procedure, called the modification rule (see §3.4), which allows one to compute exactly which homology group is non-zero and which irreducible representation it is. This rule
can be phrased in terms of a certain Weyl group action, and, in this way, the theorem is reminiscent
of the classical Borel–Weil–Bott theorem. There is also a more combinatorial description of the
rule in terms of border strips. See Theorem 3.6 for a precise statement.
We prove analogous theorems for the orthogonal and general linear groups, but for clarity of
exposition we concentrate on the symplectic case in the introduction. An analogous result for the
symmetric group can be found in [SS1, Proposition 7.4.3]; this will be elaborated upon in [SS2].
1.2. An example. Let us now give the simplest example of the theorem, namely λ = (1, 1). If
V
n ≥ 2 then the irreducible representation S[1,1] (V ) is the quotient of S(1,1) (V ) = 2 V by the line
spanned by the symplectic form (where we identify V with V ∗ via the form). The complex Lλ• is
thus
V
· · · → 0 → C → 2 V,
the differential being multiplication by the form. This complex clearly makes since even if n < 2.
When n = 0, the differential is surjective, and H1 = C, the trivial representation of Sp(V ).
When n = 1, the differential is an isomorphism and all homology vanishes. And when n ≥ 2, the
differential is injective and H0 = S[1,1] (V ). More involved examples can be found in §3.6.
1.3. Representation theory of Sp(∞). The proper context for Theorem 1.1 lies in the representation theory of Sp(∞). We now explain the connection, noting, however, that the somewhat
exotic objects discussed here are not used in our proof of Theorem 1.1 and do not occur in the
remainder of the paper. Let Rep(Sp(∞)) denote the category of “algebraic” representations1 of
Sp(∞). This category was first identified in [DPS], where it is denoted Tg . It is also studied from
a slightly different point of view in [SS2]. As shown in [SS2], there is a specialization functor
ΓV : Rep(Sp(∞)) → Rep(Sp(V )).
This functor is right exact, but not exact — the category Rep(Sp(∞)) is not semi-simple. The
Littlewood complex Lλ• (C∞ ) makes sense, and defines a complex in Rep(Sp(∞)). It is exact in
positive degrees and its H0 is a simple object S[λ] (C∞ ); all simple objects are uniquely of this
form. The Schur functor Sλ (C∞ ), as an object of Rep(Sp(∞)), has two important properties: it is
projective and it specializes under ΓV to Sλ (V ). We thus see that Lλ• (C∞ ) is a projective resolution
of S[λ] (C∞ ) and specializes under ΓV to Lλ• (V ). We therefore have the following observation, which
explains the significance of the Littlewood complex from this point of view:
Proposition 1.2. We have Lλ• (V ) = LΓV (S[λ] (C∞ )), i.e., Lλ• (V ) computes the derived specialization of the simple object S[λ] (C∞ ) to V .
We can thus rephrase Theorem 1.1 as follows:
Theorem 1.3. Let M be an irreducible algebraic representation of Sp(∞). Then LΓV (M ) is either
acyclic or else there is a unique i for which Li ΓV (M ) is non-zero, and it is then an irreducible
representation of Sp(V ).
1Technically, we should use the “pro” version of the category, which is opposite to the more usual “ind” version
of the category. See [SS2] for details.
HOMOLOGY OF LITTLEWOOD COMPLEXES
3
The symplectic Schur functors S[λ] exhibit stability for large dimensional vector spaces (as explained in [KT], but see also [EW] and [HTW]), but not in general, in contrast to the usual Schur
functors. A general strategy for dealing with problems involving symplectic Schur functors is to
pass to the stable range (e.g., work with C∞ ), take advantage of the simpler behavior there, and
then apply the specialization functor to return to the unstable range. For this strategy to be viable,
one must understand the behavior of the specialization functor. This was one source of motivation
for this project, and is accomplished by Theorem 1.3.
1.4. Relation to results of Koike–Terada. Theorem 1.3 categorifies results of [KT], as we now
explain. In [KT], a so-called universal character ring Λ is defined, and a ring homomorphism π
(“specialization”) from Λ to the representation ring of Sp(V ) is given. A basis s[λ] of Λ is given
and it is shown that the image under π of s[λ] is either 0 or (plus or minus) the character of an
irreducible representation of Sp(V ). In fact, Λ is the Grothendieck group of Rep(Sp(∞)), π is the
map induced by the specialization functor ΓV and s[λ] is the class of the simple object S[λ] (C∞ )
in the Grothendieck group. Thus the K-theoretic shadow of Theorem 1.3 is precisely the result of
[KT] on specialization. However, we note that our proof depends on [KT].
1.5. Koszul homology and classical invariant theory. Theorem 1.1 can be reinterpreted as
the calculation of the homology groups of the Koszul complex on the generators of an ideal which
arises in classical invariant theory. This will be explained in §3.2 (see also §4.2 and §5.2 for the
orthogonal and general linear groups). For now, we remark that Koszul homology seems to be
remarkably difficult to calculate, even for well-behaved classes of ideals, such as determinantal
ideals. Very few cases have been worked out explicitly; we point to [AH] for the case of codimension
2 perfect ideals, and [SW] for the case of codimension 3 Gorenstein ideals. Both of these classes
of ideals are determinantal. They are singled out because their Koszul homology modules are
Cohen–Macaulay (this property fails for all other determinantal ideals).
1.6. Resolutions of determinantal ideals. In §2.5, we will see how the interpretation of Theorem 1.1 in terms of Koszul homology in §1.5 can also be interpreted in terms of the minimal free
resolutions of certain modules Mλ supported on the determinantal varieties defined by the Pfaffians
of a generic skew-symmetric matrix. The coordinate ring of the determinantal variety is the module
M∅ and so the computation of its resolution becomes a special case of Theorem 1.1, and therefore
realizes this classical resolution as the first piece of a much larger structure. The orthogonal group
and general linear group correspond to determinantal varieties in generic symmetric matrices and
generic matrices, respectively. We refer the reader to [Wey, §6] for the calculation of the minimal
free resolutions of the coordinate rings of determinantal varieties.
1.7. Overview of proof. There are three main steps to the proof:
(a) We first establish a combinatorial result, relating Bott’s algorithm for calculating cohomology
of irreducible homogeneous bundles to the modification rule appearing in theVmain theorem.
(b) We then introduce a certain module Mλ over the polynomial ring A = Sym( 2 E) (where E is
an auxiliary vector space), and compute its minimal free resolution. The main tools are step
(a), the Borel–Weil–Bott theorem and the geometric method of the third author.
(c) Lastly, we identify Mλ with the S[λ] (V )-isotypic piece of the ring B = Sym(V ⊗ E). The results
of step (b) and the specialization homomorphism on K-theory (see [Koi], [KT], [Wen]) are used
to get enough control on Mλ to do this. Once the identification is made, the results of step (b)
give the minimal free resolution of B as an A-module.
The theorem then follows, as the Littlewood complex can be identified with a piece of the minimal
free resolution of B over A.
4
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
1.8. Notation and conventions. We always work over the complex numbers. It is possible to
work over any field of characteristic 0, but there does not seem to be any advantage to doing so. We
write ℓ(λ) for the number of parts of a partition λ. The rank of a partition λ, denoted rank(λ), is
the number of boxes on the main diagonal. We write λ† for the transpose of the partition λ. We will
occasionally use Frobenius coordinates to describe partitions, which we now recall. Let r = rank(λ).
For 1 ≤ i ≤ r, let ai (resp. bi ) denote the number of boxes to the right (resp. below) the ith diagonal
box, including the box itself. Then the Frobenius coordinates of λ are (a1 , . . . , ar |b1 , . . . , br ). We
denote by cλµ,ν the Littlewood–Richardson coefficients, i.e., the coefficient of the Schur function sλ in
the product sµ sν . For the relevant background on partitions, Schur functions, and Schur functors,
we refer to [Mac, Chapter 1] and [Wey, Chapters 1, 2].
2. Preliminaries
2.1. The geometric technique. Let X be a smooth projective variety. Let
0→ξ→ε→η→0
be an exact sequence of vector bundles on X, with ε trivial, and let V be another vector bundle on
X. Put
A = H0 (X, Sym(ε)),
M = H0 (X, Sym(η) ⊗ V).
Then A is a ring — in fact, it is the symmetric algebra on H0 (X, ε) — and M is an A-module. The
following proposition encapsulates what we need of the geometric technique of the third author.
For a proof, and a stronger result, see [Wey, §5.1].
V
Proposition 2.1. Assume Hj (X, i+j (ξ) ⊗ V) = 0 for i < 0 and all j. Then we have a natural
isomorphism
M
V
TorA
Hj (X, i+j (ξ) ⊗ V).
i (M, C) =
j≥0
2.2. The Borel–Weil–Bott theorem. Let U be the set of all integer sequences (a1 , a2 , . . .) which
are eventually 0. We identify partitions with non-increasing sequences in U (such sequences are
necessarily non-negative). For i ≥ 1, let si be the transposition which switches ai and ai+1 , and let
S be the group of automorphisms of U generated by the si . The group S is a Coxeter group (in
fact, the infinite symmetric group), and admits a length function ℓ : S → Z≥0 . By definition, the
length of w ∈ S is the minimum number ℓ(w) so that there exists an expression
(2.1)
w = si1 · · · siℓ (w) .
Alternatively, ℓ(w) is the number of inversions of w, interpreted as a permutation.
We define a second action of S on U , denoted •, as follows. For w ∈ S and λ ∈ U we put
w • λ = w(λ + ρ) − ρ, where ρ = (−1, −2, . . .). In terms of the generators, this action is:
si • (. . . , ai , ai+1 , . . .) = (. . . , ai+1 − 1, ai + 1, . . .).
Let λ be an element of U . Precisely one of the following two possibilities occurs:
• There exists a unique element w of S such that w • λ is a partition. In this case, we call λ
regular.
• There exists an element w 6= 1 of S such that w • λ = λ. In this case, we call λ singular.
Bott’s algorithm [Wey, §4.1] is a procedure for determining if λ is regular. It goes as follows.
Find an index i such that λi+1 > λi . If no such index exists, then λ is a partition and is regular.
If λi+1 − λi = 1 then λ is singular. Otherwise apply si to λ and repeat. Keeping track of the si
produces a minimal word for the element w in the definition (2.1). In particular, it is important
to note that we have a choice of which index i to pick in the first step. Different choices lead
to different minimal words, but the resulting partition and permutation are independent of these
choices.
HOMOLOGY OF LITTLEWOOD COMPLEXES
5
Let E be a vector space and let X be the Grassmannian of rank n quotients of E. (We assume
dim E ≥ n, obviously.) We have a tautological sequence on X
(2.2)
0 → R → E ⊗ OX → Q → 0,
where Q has rank n. For a partition λ with at most n parts and a partition µ, let (λ |n µ) be the
element of U given by (λ1 , . . . , λn , µ1 , µ2 , . . .). The Borel–Weil–Bott theorem [Wey, §4.1] is then:
Theorem 2.2 (Borel–Weil–Bott). Let λ be a partition with at most n parts, let µ be any partition
and let V be the vector bundle Sλ (Q) ⊗ Sµ (R) on X.
• Suppose (λ |n µ) is regular, and write w • (λ |n µ) = α for a partition α. Then
(
Sα (E) if i = ℓ(w)
Hi (X, V) =
0
otherwise.
• Suppose (λ |n µ) is singular. Then Hi (X, V) = 0 for all i.
Remark 2.3. If ℓ(µ) > rank(R) then V = 0. Similarly, if ℓ(α) > dim(E) then Sα (E) = 0.
These problems disappear if dim(E) is sufficiently large compared to λ and µ; in fact, the situation
becomes completely uniform when dim(E) = ∞.
2.3. Resolution of the second Veronese ring. In our treatment of odd orthogonal groups, we
need to know the resolution for the second Veronese ring in a relative setting. We state the relevant
result here, so as not to interrupt the discussion later.
Let X be a variety and let R be a vector bundle on X. Let π : P(R) → X be the associated
projective space bundle of one dimensional quotients of R. Let π ∗ (R) → L be the universal rank
one quotient. Define ξ to be the kernel of the map Sym2 (π ∗ R) → Sym2 (L). The result we need is
the following:
Proposition 2.4. Let a be 0 or 1. We have
M
M
V
Sµ (R),
Rj π∗ ( i+j (ξ) ⊗ La ) =
j∈Z
µ
where the sum is over those partitions µ such that µ = µ† , rank(µ) = a (mod 2) and i = 12 (|µ| −
rank(µ)).
Proof. This is a relative version of the calculation
of the minimal free resolution (over Sym(U ))
L
2d
of the second Veronese ring M (U )0 =
d≥0 Sym (U ) (a = 0) and its odd Veronese module
L
M (U )1 = d≥0 Sym2d+1 (U ) (a = 1), where U is some vector space.
The case a = 0 is contained in [Wey, Theorem 6.3.1(c)]. Now we calculate the case a = 1. Note
that it is functorial in R, so due to the stability properties of Schur functors, if we calculate the
resolution for rank U = N , the same result also holds for rank U < N . So it is enough to handle
the case that rank U is odd, but arbitrarily large.
Consider the total space of O(−2) on P(U ) with structure map π ′ : O(−2) → P(U ), and define
′
L = π ′ ∗ OP(U ) (1). Also consider the map p : O(−2) → Spec(Sym(U )). Then M (U )a = p∗ (L′ ⊗a ).
Using this setup and [Wey, Theorem 5.1.4], we see that the Ext dual [Wey, Proposition 1.2.5] of
M (U )0 is M (U )1 when rank U is odd. All of the partitions µ in the free resolution of M (U )0 fit in
a square of size rank U , and on the level of the partitions that index the Schur functors appearing
in the free resolution, this duality amounts to taking complements within this square, and then
reversing the direction of the arrows, hence the result follows.
Remark 2.5. Let ε = Sym2 (π ∗ R) and η = Sym2 (L), so that we have an exact sequence
0 → ξ → ε → η → 0.
6
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
The ring π∗ (Sym(η)) is identified with Sym(Sym2 (R)), i.e., the projective coordinate ring of the
second Veronese of P(R). By aVrelative version of the geometric method, its minimal locally free
resolution is computed by Rπ∗ ( • (ξ)), i.e., the sheaves appearing in the proposition.
2.4. A criterion for degeneration of certain spectral sequences. Let π : X ′ → X be a map
of proper varieties and let V be a coherent sheaf on X ′ . We say that (π, V) is degenerate if the
Leray spectral sequence
i
j
i+j
Ei,j
(X, V)
2 = H (X, R π∗ (V)) ⇒ H
degenerates at the second page. The following is a simple criterion for degeneracy that applies in
our one case of interest:
Lemma 2.6. Suppose that a group G acts
X ′ and that π and V are G-equivariant.
L oni X and
j
Suppose furthermore that the G-module
i,j H (X, R π∗ (V)) is semi-simple and multiplicity-free.
Then (π, V) is degenerate.
Proof. The differentials of the spectral sequence are G-equivariant, and thus forced to vanish.
2.5. A lemma from commutative algebra. We now give a very simple lemma that allows us
to interpret Koszul homology groups as Tor’s. This is useful since we are ultimately interested in
certain Koszul homology groups, but the geometric technique computes Tor’s.
Let B be a graded C-algebraVand let U be a homogeneous subspace of B. We can then form
the Koszul complex K• = B ⊗ • U . If f1 , . . . , fn is a basis for U then K• is the familiar Koszul
complex on the fi . Let A = Sym(U ), so that there is a natural homomorphism A → B. We then
have the following result:
Lemma 2.7. There is a natural identification TorA
i (B, C) = Hi (K• ).
Proof. We can resolve C as an A-module using the Koszul resolution A ⊗
with B gives K• , and is also how one computes TorA
• (B, C).
V•
U . Tensoring over A
3. Symplectic groups
3.1. Representations of Sp(V ). Let (V, ω) be a symplectic space of dimension 2n (here ω ∈
V2 ∗
V is the symplectic form, and gives an isomorphism V ∼
= V ∗ ). As stated in the introduction,
the irreducible representations of Sp(V ) are indexed by partitions λ with ℓ(λ) ≤ n (see [FH,
§17.3]). We call such partitions admissible. For an admissible partition λ, we write S[λ] (V ) for
the corresponding irreducible representation of Sp(V ).
V
3.2. The Littlewood complex. Let E be a vector space. Put U = 2 E, A = Sym(U ) and
B = Sym(E ⊗ V ). Consider the inclusion U ⊂ B given by
V
V
V2
E ⊂ 2 E ⊗ 2 V ⊂ Sym2 (E ⊗ V ),
where the first inclusion is multiplication by ω. This inclusion defines an algebra homomorphism
A → B. Put C = B ⊗A C; this is the quotient of B by the ideal generated by U . We have maps
Spec(C) → Spec(B) → Spec(A).
We have a natural identification of Spec(B) with the space Hom(E, V ) of linear maps ϕ : E → V and
V
of Spec(A) with the space 2 (E)∗ of anti-symmetric forms on E. The map Spec(B) → Spec(A)
takes a linear map ϕ to the form ϕ∗ (ω). The space Spec(C), which we call the Littlewood
variety, is the scheme-theoretic fiber of this map above 0, i.e., it consists of those maps ϕ for
which ϕ∗ (ω) = 0. In other words, Spec(C) consists of maps ϕ : E → V such that the image of ϕ is
an isotropic subspace of V .
HOMOLOGY OF LITTLEWOOD COMPLEXES
7
V
Let K• (E) = B ⊗ • U be the Koszul complex of the Littlewood variety. We can decompose this
complex under the action of GL(E):
M
K• (E) =
Sλ (E) ⊗ Lλ• .
ℓ(λ)≤dim E
Lλ•
is the Littlewood complex, and is independent of E (so long as dim E ≥ ℓ(λ)).
The complex
By [How, Theorem 3.8.6.2], its zeroth homology is
(
S[λ] (V ) if λ is admissible
λ
(3.1)
H0 (L• ) =
0
otherwise.
By Lemma 2.7, we have Hi (K• ) = TorA
i (B, C), and so we have a decomposition
M
(3.2)
TorA
Sλ (E) ⊗ Hi (Lλ• ).
i (B, C) =
ℓ(λ)≤dim E
Applied to i = 0, we obtain
(3.3)
C=
M
Sλ (E) ⊗ S[λ] (V ).
admissible λ
Remark 3.1. It is possible to compute the terms of Lλ• explicitly. Let Q−1 be the set of partitions
λ whose Frobenius coordinates (a1 , . . . , ar |b1 , . . . , br ) satisfy ai = bi − 1 for each i (see §3.5 for
further discussion of this set). Then
M
Lλi =
Sλ/µ (V ).
µ∈Q−1 ,
|µ|=2i
If λ is admissible then the higher homology of Lλ• vanishes (see Proposition 3.2 below), and so,
taking Euler characteristics, we get an equality in the representation ring of Sp(V ):
X
(−1)|µ|/2 [Sλ/µ (V )].
[S[λ] (V )] =
µ∈Q−1
The significance of this identity is that it expresses the class of the irreducible S[λ] (V ) in terms of
representations which are restricted from GL(V ). It is due to Littlewood [Lit, p.295] (see also [KT,
Prop. 1.5.3(2)]), and is why we name the complexes Lλ• after him.
3.3. A special case of the main theorem. Our main theorem computes the homology of the
complex Lλ• . We now formulate and prove the theorem in a particularly simple case. We mention
this here only because it is worthwhile to know; the argument is not needed to prove the main
theorem.
Proposition 3.2. Suppose λ is admissible. Then
(
S[λ] (V )
Hi (Lλ• ) =
0
if i = 0
otherwise.
Proof. Choose E to be of dimension n. By Lemma 3.3 below, K• (E) has no higher homology. It
follows that Lλ• does not either. The computation of H0 (Lλ• ) is given in (3.1).
Lemma 3.3. Suppose dim E ≤ n. Then U ⊂ B is spanned by a regular sequence.
Proof. It suffices to show that dim Spec(C) = dim Spec(B) − dim U . Put d = dim E. Observe that
the locus in Spec(C) where ϕ is injective is open. Let IGr(d, V ) be the variety of d-dimensional
isotropic subspaces of V , which comes with a rank d tautological bundle R ⊂ V ⊗ OIGr(d,V ) . There
is a natural birational map from the total space of Hom(E, R) to Spec(C), and thus Spec(C) has
dimension 2nd − 21 d(d − 1). As dim Spec(B) = 2nd and dim U = 12 d(d − 1), the result follows.
8
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
3.4. The modification rule. We now associate to a partition λ two quantities, i2n (λ) and τ2n (λ),
which will be used to describe the homology of Lλ• . (Recall that 2n = dim V .) We give two
equivalent definitions of these quantities, one via a Weyl group action and one via border strips.
We begin with the Weyl group definition, following [Wen, §1.5]. Recall that in §2.2 we defined
automorphisms si of the set U of integer sequences, for i ≥ 1. We now define an additional
automorphism: s0 negates a1 . We let W be the group generated by the si , for i ≥ 0. Then W is a
Coxeter group of type BC∞ , and, as such, is equipped with a length function ℓ : W → Z≥0 , which
is defined just as in (2.1). Let ρ = (−(n + 1), −(n + 2), . . .). Define a new action of W on U by
w • λ = w(λ + ρ) − ρ. On S this action agrees with the one defined in §2.2, despite the difference
in ρ. The action of s0 is given by
s0 • (a1 , a2 , . . .) = (2n + 2 − a1 , a2 , . . .).
Given a partition λ ∈ U , exactly one of the following two possibilities hold:
• There exists a unique element w ∈ W such that w•λ† = µ† is a partition and µ is admissible.
We then put i2n (λ) = ℓ(w) and τ2n (λ) = µ.
• There exists a non-identity element w ∈ W such that w • λ† = λ† . We then put i2n (λ) = ∞
and leave τ2n (λ) undefined.
Note that if λ is an admissible partition then we are in the first case with w = 1, and so i2n (λ) = 0
and τ2n (λ) = λ.
We now give the border strip definition, following [Sun, §5] (which is based on [Kin]). If ℓ(λ) ≤ n
we put i2n (λ) = 0 and τ2n (λ) = λ. Suppose ℓ(λ) > n. Recall that a border strip is a connected
skew Young diagram containing no 2 × 2 square. Let Rλ be the connected border strip of length
2(ℓ(λ) − n − 1) which starts at the first box in the final row of λ, if it exists. If Rλ exists, is nonempty and λ \ Rλ is a partition, then we put i2n (λ) = c(Rλ ) + i2n (λ \ Rλ ) and τ2n (λ) = τ2n (λ \ Rλ ),
where c(Rλ ) denotes the number of columns that Rλ occupies; otherwise we put i2n (λ) = ∞ and
leave τ2n (λ) undefined.
Remark 3.4. There is an alternative way to think about removing Rλ in terms of hooks. Given
a box b in the Young diagram of λ, recall that the book of b is the set of boxes which are either
directly below b or directly to the right of b (including b itself). The border strips R of λ that
begin at the last box in the first column, and have the property that λ \ R is a Young diagram,
are naturally in bijection with the boxes in the first column: just take the box bR in the same row
where R ends. The important point is that the size of this border strip is the same as size of the
hook of bR , and removing R is the same as removing the hook of bR and shifting all boxes below
this hook one box in the northwest direction. This is illustrated in the following diagram:
The shaded boxes indicate the border strip (left diagram) and hook (right diagram).
The agreement of the above two definitions may be known to some experts, but we are unaware
of a reference, so we provide a proof.
Proposition 3.5. The above two definitions agree.
Proof. Suppose that we are removing a border strip Rλ of size 2(ℓ(λ) − n − 1) from λ which begins
at the first box in the final row of λ. Let c = c(Rλ ) be the number of columns of Rλ . The sequence
HOMOLOGY OF LITTLEWOOD COMPLEXES
9
(sc−1 sc−2 · · · s1 s0 ) • λ† is
(λ†2 − 1, λ†3 − 1, . . . , λ†c − 1, 2n + 2 − λ†1 + c − 1, λ†c+1 , λ†c+2 , . . . ),
and these are the same as the column lengths of λ \ Rλ .
Conversely, if we use the Weyl group modification rule with w ∈ W , then the expression (2.1)
for w must begin with s0 : if we apply any si with i > 0, then we increase the number of inversions
of the sequence, so if we write wsi = v, then ℓ(v) = ℓ(w) + 1 [Hum, §5.4, Theorem], so the resulting
expression for w will not be minimal. If we choose i maximal so that w = w′ si−1 · · · s1 s0 with
ℓ(w) = ℓ(w′ ) + i, then we have replaced the first column of λ with 2n + 2 − λ†1 and then moved it
over to the right as much as possible (adding 1 to it each time we pass a column and subtracting
1 from the column we just passed) so that the resulting shape is again a Young diagram. This is
the same as removing a border strip of length 2(ℓ(λ) − n − 1) with i columns.
Finally, there is a third modification rule, defined in [KT, §2.4]. We will not need to know the
statement of the rule, but we will cite some results from [KT], so we need to know that their rule
is equivalent to the previous two. The equivalence of the rule from [KT, §2.4] with the border strip
rule comes from the fact that both rules were derived from the same determinantal formulas (see
[KT, Theorem 1.3.3] and [Kin, Footnote 18]).
3.5. The main theorem. Our main theorem is the following:
Theorem 3.6. For a partition λ and an integer i we have
(
S[τ2n (λ)] (V ) if i = i2n (λ)
λ
Hi (L• ) =
0
otherwise.
In particular, if i2n (λ) = ∞ then Lλ• is exact.
Remark 3.7. Consider the coordinate ring R of rank ≤ 2n skew-symmetric matrices; identifying
E with its dual, this is the quotient of A by the ideal generated by 2(n + 1) × 2(n + 1) Pfaffians. A
description of the resolution of R over A can be found in [Wey, §6.4] and [JPW, §3]. On the other
hand, R is the Sp(V )-invariant part of B, and so the above theorem, combined with (3.2), shows
that Sλ (E) appears in its resolution if and only if τ2n (λ) = ∅. Thus the modification rule gives
an alternative description of the resolution of R. It is a pleasant combinatorial exercise to show
directly that these two descriptions agree. While the description in terms of the modification rule
is more complicated, it has the advantage that it readily generalizes to our situation.
The proof of the theorem will take the remainder of this section. We follow the three-step plan
outlined in §1.7. Throughout, the space V is fixed and n = 21 dim(V ).
Step a. Let Q−1 be the set of partitions λ whose Frobenius coordinates (a1 , . . . , ar |b1 , . . . , br ) satisfy
ai = bi − 1 for all i. This set admits an inductive definition that will be useful for us and which
we now describe. The empty partition belongs to Q−1 . A non-empty partition µ belongs to Q−1 if
and only if the number of rows in µ is one more than the number of columns, i.e., ℓ(µ) = µ1 + 1,
and the partition obtained by deleting the first row and column of µ, i.e., (µ2 − 1, . . . , µℓ(µ) − 1),
belongs to Q−1 . The significance of this set is the plethysm
M
V• V2
Sµ (E)
( (E)) =
µ∈Q−1
(see [Mac, I.A.7, Ex. 4]).
Let λ be a partition with ℓ(λ) ≤ n. We write (λ|µ) in place of (λ |n µ) in this section. Define
S1 (λ) = {µ ∈ Q−1 such that (λ|µ) is regular}
S2 (λ) = {partitions α such that τ2n (α) = λ}.
10
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
Lemma 3.8. Let µ be a non-zero partition in S1 (λ) and let ν be the partition obtained by removing
the first row and column of µ. Then ν also belongs to S1 (λ). Furthermore, let w (resp. w′ ) be the
unique element of W such that α = w • (λ|µ) (resp. β = w′ • (λ|ν)) is a partition. Then the border
strip Rα is defined (see §3.4) and we have the following identities:
|Rα | = 2µ1 ,
α \ Rα = β,
c(Rα ) = µ1 + ℓ(w′ ) − ℓ(w).
Proof. Suppose that in applying Bott’s algorithm to (λ|µ) the number µ1 moves r places to the
left. Thus, after the first r steps of the algorithm, we reach the sequence
(λ1 , . . . , λn−r , µ1 − r, λn−r+1 + 1, . . . , λn + 1, µ2 , . . . , µℓ(µ) ).
Notice that the subsequence starting at λn−r+1 + 1 is the same as the subsequence of (λ|ν) starting
at λn−r+1 , except 1 has been added to each entry of the former. It follows that Bott’s algorithm
runs in exactly the same manner on each. In particular, if (λ|ν) were not regular then (λ|µ)
would not be either; this shows that ν belongs to S1 (λ). Suppose that Bott’s algorithm on (λ|ν)
terminates after N = ℓ(w′ ) steps. By the above discussion, Bott’s algorithm on (λ|µ) terminates
after N + r = ℓ(w) steps, and we have the following formula for α:
1≤i≤n−r
λi
αi = µ1 − r
i=n−r+1
βi−1 + 1 n − r + 2 ≤ i ≤ n + µ1 + 1
Since ℓ(α) = n + µ1 + 1, the border strip Rα has 2µ1 boxes. Using Remark 3.4, we see that Rα
exists since the box in the (n − r + 1)th row and the first column has a hook of size 2(ℓ(α) − n − 1).
Furthermore, α \ Rα = β and c(Rα ) = µ1 − r. Since r = ℓ(w) − ℓ(w′ ), the result follows.
Lemma 3.9. Let ν belong to S1 (λ) and suppose that w′ ∈ W is such that w′ • (λ|ν) = β is a
partition. Let α be a partition such that Rα is defined and α \ Rα = β. Then there exists a partition
µ ∈ S1 (λ) and an element w ∈ W such that w • (λ|µ) = α, and the partition obtained from µ by
removing the first row and column is ν.
Proof. Reverse the steps of Lemma 3.8.
Proposition 3.10. There is a unique bijection S1 (λ) → S2 (λ) under which µ maps to α if there
exists w ∈ S such that w • (λ|µ) = α; in this case, ℓ(w) + i2n (α) = 12 |µ|.
Proof. Let µ be an element of S1 (λ) and let w ∈ W be such that w • (λ|µ) = α is a partition. We
show by induction on |µ| that α belongs to S2 (λ) and that ℓ(w) + i2n (α) = 12 |µ|. For |µ| = 0 this
is clear: w = 1 and α = λ. Suppose now that µ is non-empty. In what follows, we tacitly employ
Lemma 3.8. Let ν be the partition obtained by removing the first row and column of µ. Then ν
belongs to S1 (λ), and so we can choose w′ ∈ W such that w′ •(λ|ν) = β is a partition. By induction
we have τ2n (β) = λ and ℓ(w′ ) + i2n (β) = 12 |ν|. Since α \ Rα = β, we have τ2n (α) = τ2n (β) = λ.
Furthermore, i2n (α) = c(Rα ) + i2n (β), and so
i2n (α) = µ1 + ℓ(w′ ) − ℓ(w) + i2n (β) = 21 |µ| − ℓ(w).
This completes the induction.
We have thus shown that µ 7→ α defines a map of sets S1 (λ) → S2 (λ). We now show that
this map is injective. Suppose µ and µ′ are two elements of S1 (λ) that both map to α. Then
the sequences (λ|µ) + ρ and (λ|µ′ ) + ρ are identical as multisets of numbers. In particular, we
can rearrange the sequence of numbers to the right of the bar of (λ|µ) + ρ to get the sequence of
numbers to the right of the bar of (λ|µ′ ) + ρ. But both of these sequences (to the right of the bar)
are strictly decreasing, so we see that µ = µ′ .
Finally, we show that µ 7→ α is surjective. The partition α = λ has the empty partition as its
preimage. Suppose now that α 6= λ belongs to S2 (λ), and let β = α \ Rα . By induction on size, we
HOMOLOGY OF LITTLEWOOD COMPLEXES
11
can find ν ∈ S1 (λ) mapping to β. Applying Lemma 3.9, we find a partition µ ∈ S1 (λ) mapping to
α. This completes the proof.
Step b. Let E be a vector space of dimension at least n. Let X be the Grassmannian
V of rank n
quotients of E. Let R and Q be the tautological bundles on X as in (2.2). Put ε = 2 (E) ⊗ OX ,
V
ξ = 2 R and define η by the exact sequence
0 → ξ → ε → η → 0.
Finally, for a partition λ with ℓ(λ) ≤ n, put Mλ = Sym(η) ⊗ Sλ (Q) and Mλ = H0 (X, Mλ ). Note
that A = H0 (X, Sym(ε)), and so Mλ is an A-module.
Lemma 3.11. Let λ be a partition with ℓ(λ) ≤ n and µ ∈ S1 (λ) correspond to α ∈ S2 (λ). Then
(
Sα (E) if i = 12 |µ| − i2n (α)
i
H (X, Sλ (Q) ⊗ Sµ (R)) =
0
otherwise.
Proof. This follows immediately from Proposition 3.10 and the Borel–Weil–Bott theorem.
Lemma 3.12. Let λ be a partition with ℓ(λ) ≤ n and let i be an integer. We have
M
M
V
Sα (E),
Hj (X, i+j (ξ) ⊗ Sλ (Q)) =
α
j∈Z
where the sum is over partitions α with τ2n (α) = λ and i2n (α) = i. In particular, when i < 0 the
left side above vanishes.
Proof. We have
Vi+j
(ξ) =
Vi+j V2
( (R)) =
M
Sµ (R),
µ∈Q−1 ,
|µ|=2(i+j)
and so
M
j∈Z
Hj (X,
Vi+j
(ξ) ⊗ Sλ (Q)) =
M
H|µ|/2−i (X, Sµ (R) ⊗ Sλ (Q)).
µ∈Q−1
The result now follows from the previous lemma.
Proposition 3.13. We have
TorA
i (Mλ , C) =
M
Sα (E),
α
where the sum is over partitions α with τ2n (α) = λ and i2n (α) = i.
Proof. This follows immediately from the previous lemma and Proposition 2.1.
Step c. For a partition λ with at most n parts put Bλ = HomSp(V ) (S[λ] (V ), B). Note that Bλ is
an A-module and has a compatible action of GL(E). Our goal is to show that Bλ is isomorphic to
Mλ .
Lemma 3.14. The spaces Bλ and Mλ are isomorphic as representations of GL(E) and have finite
multiplicities.
L
Proof. Let M =
ℓ(λ)≤n Mλ ⊗ S[λ] (V ). It is enough to show that M and B are isomorphic as
representations of GL(E) × Sp(V ) and have finite multiplicities. In fact, it is enough to show that
the Sθ (E) multiplicity spaces of M and B are isomorphic as representations of Sp(V ) and have
finite multiplicities. This is what we do.
12
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
The Sθ (E) multiplicity space of B is Sθ (V ). The decomposition of this in the representation ring
of Sp(V ) can be computed by applying the specialization homomorphism to [KT, Thm. 2.3.1(1)].
The result is
X
(−1)i2n (ν) cθ(2µ)† ,ν [S[τ2n (ν)] (V )].
µ,ν
Note that for a fixed θ there are only finitely many values for µ and ν which make the Littlewood–
Richardson coefficient non-zero, which establishes finiteness of the multiplicities. Now, we have an
equality
X
[Mλ ] = [A]
(−1)i [TorA
i (Mλ , C)]
i≥0
in the representation ring of GL(E). Applying Proposition 3.13, we find
X
X
(−1)i [TorA
(−1)i2n (ν) [Sν (E)].
i (Mλ , C)] =
i≥0
As [A] =
P
µ [S(2µ)† (E)]
τ2n (ν)=λ
(see [Mac, I.A.7, Ex. 2]), we obtain
X
(−1)i2n (ν) cθ(2µ)† ,ν [Sθ (E)].
[Mλ ] =
ν,µ,θ
τ2n (ν)=λ
We therefore find that the Sθ (E)-component of M is given by
X
(−1)i2n (ν) cθ(2µ)† ,ν [S[λ] (V )].
λ,µ
τ2n (ν)=λ
The result now follows.
Proposition 3.15. We have an isomorphism Mλ → Bλ which is A-linear and GL(E)-equivariant.
Proof. According to Proposition 3.13, we have
TorA
0 (Mλ , C) = Sλ (E),
TorA
1 (Mλ , C) = S(λ,12n+2−2ℓ(λ) ) (E),
since the only ν for which τ2n (ν) = λ and i2n (ν) ≤ 1 must agree with λ everywhere except possibly
the first column. We therefore have a presentation
S(λ,12n+2−2ℓ(λ) ) (E) ⊗ A → Sλ (E) ⊗ A → Mλ → 0.
Note that S(λ,12n+2−2ℓ(λ) ) (E) occurs with multiplicity one in Sλ (E) ⊗ A, and thus does not occur in
Mλ ; it therefore does not occur in Bλ either, since Mλ and Bλ are isomorphic as representations
of GL(E) by Lemma 3.14.
Now, TorA
0 (B, C) is the coordinate ring of the Littlewood variety, and its S[λ] (V ) multiplicity
space is Sλ (E) by (3.3). We therefore have a surjection f : Sλ (E)⊗A → Bλ . Since S(λ,12n+2−2ℓ(λ) ) (E)
does not occur in Bλ , the copy of S(λ,12n+2−2ℓ(λ) ) (E) in Sλ (E)⊗A lies in the kernel of f , and therefore
f induces a surjection Mλ → Bλ . Finally, since the two are isomorphic as GL(E) representations
and have finite multiplicity spaces, this surjection is an isomorphism.
Combining this proposition with Proposition 3.13, we obtain the following corollary.
Corollary 3.16. We have
TorA
i (B, C) =
M
Sλ (E) ⊗ S[τ2n (λ)] (V ).
i2n (λ)=i
Combining this with (3.2) yields the main theorem. (We can choose E to be arbitrarily large.)
HOMOLOGY OF LITTLEWOOD COMPLEXES
13
Remark 3.17. The arguments of step c made no use of the construction of the module Mλ , simply
that it satisfied Proposition 3.13. More precisely, say that a GL(E)-equivariant A-module M is of
“type λ” (for an admissible partition λ) if
M
(M,
C)
=
Sα (E),
TorA
i
α
where the sum is over all partitions α with τ2n (α) = λ and i2n (α) = i. Then the arguments of
step c establish the following statement: if a type λ module exists then it is isomorphic to Bλ , and
thus Bλ has type λ. (Actually the argument is a bit weaker, since it works with all λ at once.)
Step b can be thought of as simply providing a construction of a module of type λ.
3.6. Examples. We now give a few examples to illustrate the theorem.
V
V
Example 3.18. Suppose λ = (1i ). Then Lλ• is the complex i−2 V → i V , where the differential
V
is the multiplication by the symplectic form on V ∗ treated as an element of 2 V .
• If i ≤ n then the differential is injective, and H0 (Lλ• ) = S[1i ] (V ) is an irreducible representation of V .
• If i = n + 1 then the differential is an isomorphism, and all homology of Lλ• vanishes.
• If n + 2 ≤ i ≤ 2n + 2 then the differential is surjective and H1 (Lλ• ) = S[12n−i+2 ] (V ).
• If i > 2n + 2 then the complex Lλ• is identically 0.
Example 3.19. Suppose λ = (2, 1, 1). Then Lλ• is the complex C → S(2,1,1)/(1,1) (V ) → S(2,1,1) (V ),
where
the differential is the multiplication by the symplectic form on V ∗ treated as an element of
V2
V.
• If n ≥ 3 then the differential is injective, and H0 (Lλ• ) = S[2,1,1] (V ) is an irreducible representation of V .
• If n = 2 then the complex is exact, and all homology of Lλ• vanishes.
• If n = 1 then H1 (Lλ• ) = S[2] (V ).
• Finally when n = 0 then H2 (Lλ• ) = C.
The reader will check easily that in both instances the description of the homology agrees with
the rule given by the Weyl group action.
Example 3.20. Suppose λ = (6, 5, 4, 4, 3, 3, 2) and n = 2 (so dim(V ) = 4). The modification rule,
using border strips, proceeds as follows:
We start on the left with λ0 = λ. As ℓ(λ0 ) = 7, we are supposed to remove the border strip R0 of
size 2(ℓ(λ0 ) − n − 1) = 8; this border strip is shaded. The result is the second displayed partition,
λ1 = (6, 5, 3, 2, 2, 1). As ℓ(λ1 ) = 6, the border strip R1 we remove from it has length 6. The result
of removing this strip is the third partition λ2 = (6, 5, 1, 1). As ℓ(λ2 ) = 4, the border strip R2 has
length 2. The result of removing it is the final partition λ3 = (6, 5). This satisfies ℓ(λ3 ) ≤ n, so the
algorithm stops. We thus see that τ4 (λ) = (6, 5) and
i4 (λ) = c(R0 ) + c(R1 ) + c(R2 ) = 4 + 3 + 1 = 8.
It follows that Hi (Lλ• ) = 0 for i 6= 8 and H8 (Lλ• ) = S[6,5] (C4 ).
14
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
s
i
Now we illustrate the modification rule using the Weyl group action. We write α −
→
β if
β = si (α). The idea for getting the Weyl group element is to apply s0 if the first column length
is too long, then sort the result, and repeat as necessary. We start with λ† + ρ = (7, 7, 6, 4, 2, 1) +
(−3, −4, −5, . . . ):
s
s
s
s
0
1
(4, 3, 1, −2, −5, −7) −→
(−4, 3, 1, −2, −5, −7) −→
(3, −4, 1, −2, −5, −7)
2
3
−→
(3, 1, −4, −2, −5, −7) −→
(3, 1, −2, −4, −5, −7)
s
s
s
s
0
1
−→
(−3, 1, −2, −4, −5, −7) −→
(1, −3, −2, −4, −5, −7)
2
0
−→
(1, −2, −3, −4, −5, −7) −→
(−1, −2, −3, −4, −5, −7).
Subtracting ρ from the result, we get (6, 5)† .
4. Orthogonal groups
4.1. Representations of O(V ). Let (V, ω) be an orthogonal space of dimension m (here ω ∈
Sym2 V ∗ is the orthogonal form, and gives an isomorphism V ∼
= V ∗ ). We write m = 2n if it is
even, or m = 2n + 1 if it is odd. We now recall the representation theory of O(V ); see [FH, §19.5]
for details. The irreducible representations of O(V ) are indexed by partitions λ such that the first
two columns have at most m boxes in total, i.e., λ†1 + λ†2 ≤ m. We call such partitions admissible.
For an admissible partition λ, we write S[λ] (V ) for the corresponding irreducible representation of
O(V ).
Given an admissible partition λ, we let λσ be the partition obtained by changing the number
of boxes in the first column of λ to m minus its present value; that is, (λσ )†1 = m − λ†1 . We call
λσ the conjugate of λ. Conjugation defines an involution on the set of admissible partitions. On
irreducible representations, conjugating the partition corresponds to twisting by the sign character:
S[λσ ] (V ) = S[λ] (V ) ⊗ sgn. It follows that S[λ] (V ) and S[λσ ] (V ) are isomorphic when restricted
to SO(V ). In fact, these restrictions remain irreducible, unless λ = λσ (which is equivalent to
ℓ(λ) = n and m = 2n), in which case S[λ] (V ) decomposes as a sum of two non-isomorphic irreducible
representations.
For an admissible partition λ, exactly one element of the set {λ, λσ } has at most n boxes in its
first column. We denote this element by λ. Thus λ = λ if λ†1 ≤ n, and λ = λσ otherwise.
4.2. The Littlewood complex. Let E be a vector space. Put U = Sym2 (E), A = Sym(U ) and
B = Sym(E ⊗ V ). Consider the inclusion U ⊂ B given by
Sym2 (E) ⊂ Sym2 (E) ⊗ Sym2 (V ) ⊂ Sym2 (E ⊗ V ),
where the first inclusion is multiplication with ω. This inclusion defines an algebra homomorphism
A → B. Put C = B ⊗A C; this is the quotient of B by the ideal generated by U . We have maps
Spec(C) → Spec(B) → Spec(A).
We have a natural identification of Spec(B) with the space Hom(E, V ) of linear map ϕ : E → V
and of Spec(A) with the space Sym2 (E)∗ of symmetric forms on E. The map Spec(B) → Spec(A)
takes a linear map ϕ to the form ϕ∗ (ω). The space Spec(C), which we call that Littlewood
variety, is the scheme-theoretic fiber of this map above 0, i.e., is consists of those maps ϕ such
that ϕ∗ (ω) = 0. In other words, Spec(C) consists of maps ϕ : E → V such that the image of ϕ is
an isotropic subspace
V of V .
Let K• = B ⊗ • U be the Koszul complex of the Littlewood variety. We can decompose this
complex under the action of GL(E):
M
K• (E) =
Sλ (E) ⊗ Lλ• .
ℓ(λ)≤dim E
HOMOLOGY OF LITTLEWOOD COMPLEXES
15
The complex Lλ• is the Littlewood complex, and is independent of E (so long as dim E ≥ ℓ(λ)).
By [How, Proposition 3.6.3], its zeroth homology is
(
S[λ] (V ) if λ is admissible
(4.1)
H0 (Lλ• ) =
0
otherwise.
By Lemma 2.7, we have Hi (K• ) = TorA
i (B, C), and so we have a decomposition
M
(4.2)
TorA
Sλ (E) ⊗ Hi (Lλ• ).
i (B, C) =
ℓ(λ)≤dim E
Applied to i = 0, we obtain
(4.3)
C=
M
Sλ (E) ⊗ S[λ] (V ).
admissible λ
4.3. A special case of the main theorem. Our main theorem computes the homology of the
complex Lλ• . We now formulate and prove the theorem in a particularly simple case. We mention
this here only because it is worthwhile to know; the argument is not needed to prove the main
theorem.
Proposition 4.1. Suppose λ is admissible. Then
(
S[λ] (V )
λ
Hi (L• ) =
0
if i = 0
otherwise.
Proof. Choose E to be of dimension n. By Lemma 4.2 below, K• (E) has no higher homology. It
follows that Lλ• does not either. The computation of H0 (Lλ• ) is given in (4.1).
Lemma 4.2. Suppose dim E ≤ n. Then U ⊂ B is spanned by a regular sequence.
Proof. The proof is the same as Lemma 3.3. The only difference worth pointing out (but which
does not affect the proof) is that when dim V = 2n and dim E = n, the Grassmannian of isotropic
n-dimensional subspaces of V has two connected components, and the variety cut out by U has
two irreducible components.
4.4. The modification rule. As in the symplectic case, we now associate to a partition λ two
quantities im (λ) and τm (λ). We again give two equivalent definitions.
We begin with the Weyl group definition, following [Wen, §1.4]. Let s0 be the automorphism of
the set U which negates and swaps the first and second entries, and let W be the group generated
by the si with i ≥ 0. This is a Coxeter group of type D∞ . Let ℓ : W → Z≥0 be the length function,
which is defined just as in (2.1). Note that this group W , as a subgroup of Aut(U ), is equal to the
one from §3.4, but that the length function is different since we are using a different set of simple
reflections. Let ρ = (−m/2, −m/2 − 1, . . .). Define a new action of W on U by w • λ = w(λ + ρ) − ρ.
On S this agrees with the one defined in §2.2. The action of s0 is given by
s0 • (a1 , a2 , a3 , . . .) = (m + 1 − a2 , m + 1 − a1 , a3 , . . .).
The definitions of im (λ) and τm (λ) are now exactly as in the first half of §3.4.
We now give the border strip definition. This is motivated by [Sun, §5] (which is based on [Kin]),
but [Sun] only focuses on the special orthogonal group, so we have to modify the definition to get
the correct answer for the full orthogonal group. This is the same as the one given in §3.4, except
for three differences:
(D1) the border strip Rλ has length 2ℓ(λ) − m,
(D2) in the definition of im (λ), we use c(Rλ ) − 1 instead of c(Rλ ), and
(D3) if the total number of border strips removed is odd, then replace the end result µ with µσ .
16
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
One can stop applying the modification rule either when λ becomes admissible or when ℓ(λ) ≤ n;
the resulting values of τ and i are the same. For instance, if λ is admissible but ℓ(λ) > n then one
can stop immediately with i = 0 and τ = λ. Instead, one could remove a border strip. This border
strip occupies only the first column and when removed yields λσ . Thus i = 0 and by (D3), since
we removed an odd number of strips, τ = (λσ )σ = λ.
Proposition 4.3. The above two definitions agree.
Proof. Suppose that we are removing a border strip R1 of size 2ℓ(λ) − m from λ which begins at
the first box in the final row of λ. Let c1 = c(R1 ) be the number of columns of R1 . The first two
column lengths of λ \ R1 are (λ†2 − 1, λ†3 − 1). We have two cases depending on which of the two
quantities λ†2 + λ†3 − 2 and m is bigger.
First suppose that λ†2 +λ†3 −2 > m. Then we remove another border strip R2 of size 2(λ†2 −1)−m
from λ \ R1 which begins at the first box in the final row. Let c2 = c(R2 ) be the number of columns
of R2 . The sequence
(sc2 −1 sc2 −2 · · · s2 s1 sc1 −1 sc1 −2 · · · s3 s2 s0 ) • λ†
gives the column lengths of (λ \ R1 ) \ R2 .
Now suppose that λ†2 + λ†3 − 2 ≤ m. Then we have only removed 1 border strip, which is an odd
number, so we have to replace λ \ R1 with (λ \ R1 )σ according to (D3) above. In this case, the
sequence
(sc1 −1 sc1−2 · · · s3 s2 s0 ) • λ†
gives the column lengths of (λ \ R1 )σ .
Conversely, if we use the Weyl group modification rule with w ∈ W , then the expression (2.1)
for w must begin with s0 : if we apply any si with i > 0, then we increase the number of inversions
of the sequence, so if we write wsi = v, then ℓ(v) = ℓ(w) + 1 [Hum, §5.4, Theorem], so the resulting
expression for w will not be minimal. If we choose i maximal so that w = w′ si−1 · · · s3 s2 s0 with
ℓ(w) = ℓ(w′ ) + i − 1, then we have replaced the first two columns of λ with (m + 1 − λ†2 , m + 1 − λ†1 )
and then moved the column of length m + 1 − λ†1 over to the right as much as possible (adding 1
to it each time we pass a column and subtracting 1 from the column we just passed) so that the
resulting shape (minus the first column) is again a Young diagram.
Now there are two possibilities: if the whole shape is a Young diagram, then it is the result of
first removing a border strip of length 2ℓ(λ) − m with i columns, and then replacing the resulting
µ with µc . Otherwise, the first column length of the resulting shape is less than the second column
length. If we choose j maximal so that w′ = w′′ sj−1 · · · s2 s1 with ℓ(w′ ) = ℓ(w′′ ) + j − 1, then we
have moved the first column over to the right as much as possible (adding 1 to it each time we
pass a column and subtracting 1 from the column we just passed) so that the resulting shape is
again a Young diagram. In this case, then we have removed two border strips of size 2ℓ(λ) − m and
2(λ† − 1) − m with i and j columns, respectively.
Finally, there is a third modification rule, defined in [KT, §2.4]. As in the symplectic case,
we will not need to know the statement of the rule, but we will cite some results from [KT]. The
equivalence of the rule from [KT, §2.4] with the border strip rule comes from the fact that both rules
were derived from the same determinantal formulas (see [KT, Theorem 1.3.2] and [Kin, Footnote
17]). We remark that both rules are only stated for the special orthogonal group, but this will be
enough for our purposes.
As a matter of notation, we write τ m (λ) in place of τm (λ).
4.5. The main theorem. Our main theorem is exactly the same as in the symplectic case:
HOMOLOGY OF LITTLEWOOD COMPLEXES
17
Theorem 4.4. For a partition λ and an integer i we have
(
S[τm (λ)] (V ) if i = im (λ)
Hi (Lλ• ) =
0
otherwise.
In particular, if im (λ) = ∞ then Lλ• is exact.
Remark 4.5. Consider the coordinate ring R of rank ≤ m symmetric matrices; identifying E with
its dual, this is the quotient of A by the ideal generated by (m + 1)× (m + 1) minors. The resolution
of R over A is known, see [Wey, §6.3] or [JPW, §3]. On the other hand, R is the O(V )-invariant part
of B, and so the above theorem, combined with (4.2), shows that Sλ (E) appears in its resolution if
and only if τm (λ) = ∅. Thus the modification rule gives an alternative description of the resolution
of R. It is a pleasant combinatorial exercise to show directly that these two descriptions agree. As
in the symplectic case, the description in terms of the modification rule is more complicated, but
has the advantage of generalizing to our situation.
We separate the proof of the theorem into two cases, according to whether m is even or odd. In
each case, we follow the three-step plan from §1.7.
4.6. The even case. Throughout this section, m = 2n is the dimension of the space V .
Step a. Let Q1 be the set of partitions λ whose Frobenius coordinates (a1 , . . . , ar |b1 , . . . , br ) satisfy
ai = bi + 1 for each i. This set admits an inductive definition, as follows. The empty partition
belongs to Q1 . A non-empty partition µ belongs to Q1 if and only if the number of columns in µ is
one more than the number of rows, i.e., ℓ(µ) = µ1 − 1, and the partition obtained by deleting the
first row and column of µ, i.e., (µ2 − 1, . . . , µℓ(µ) − 1), belongs to Q1 . The significance of this set is
the plethysm
M
V•
Sµ (E)
(Sym2 (E)) =
µ∈Q1
(see [Mac, I.A.7, Ex. 5]).
Let λ be a partition with ℓ(λ) ≤ n. We write (λ|µ) in place of (λ |n µ). Define
S 1 (λ) = {µ ∈ Q1 such that (λ|µ) is regular}
S 2 (λ) = {partitions α such that τ m (α) = λ}.
Lemma 4.6. Let µ be a non-zero partition in S 1 (λ) and let ν be the partition obtained by removing
the first row and column of µ. Then ν also belongs to S 1 (λ). Furthermore, let w (resp. w′ ) be the
element of W such that α = w • (λ|µ) (resp. β = w′ • (λ|ν)) is a partition. Then Rα is defined and
we have the following identities:
|Rα | = 2µ1 − 2,
α \ Rα = β,
c(Rα ) = µ1 + ℓ(w′ ) − ℓ(w).
Proof. Suppose that in applying Bott’s algorithm to (λ|µ) the number µ1 moves r places to the
left. Thus, after the first r steps of the algorithm, we reach the sequence
(λ1 , . . . , λn−r , µ1 − r, λn−r+1 , . . . , λn + 1, µ2 , . . . , µℓ(µ) ).
As before, Bott’s algorithm on this sequence runs just like the algorithm on (λ|ν), and so (λ|ν)
is regular and ν belongs to S 1 (λ). Suppose the algorithm on (λ|ν) terminates after N = ℓ(w′ )
steps. Then the algorithm on (λ|µ) terminates after N + r = ℓ(w) steps, and we have the following
formula for α:
1≤i≤n−r
λi
αi = µ1 − r
i=n−r+1
βi−1 + 1 n − r + 2 ≤ i ≤ n + µ1 − 1
18
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
Since ℓ(α) = n + µ1 − 1, the border strip Rα has 2µ1 − 2 boxes. Using Remark 3.4, we see that
Rα exists since the box in the (n − r + 1)th row and the first column has a hook of size 2ℓ(α) − m.
Furthermore, α \ Rα = β and c(Rα ) = µ1 − r. Since r = ℓ(w) − ℓ(w′ ), we are done.
Proposition 4.7. There is a unique bijection S 1 (λ) → S 2 (λ) under which µ maps to α if there
exists w ∈ S such that w • (λ|µ) = α; in this case, ℓ(w) + im (α) = 12 |µ| and
(
λ
if rank(µ) is even
τm (α) =
σ
λ
if rank(µ) is odd.
Proof. Except for the computation of τm (α), the proof is exactly like that of Proposition 3.10. In
the proof of Lemma 4.6, we see that the number of border strips removed from α is rank(µ), so the
determination of τm (α) follows from (D3) in §4.4.
Step b. Let E be a vector space of dimension at least n. Let X be the Grassmannian of rank n
quotients of E. Let R and Q be the tautological bundles on X as in (2.2). Put ε = Sym2 (E) ⊗ OX ,
ξ = Sym2 (R) and define η by the exact sequence
0 → ξ → ε → η → 0.
Finally, for a partition λ with ℓ(λ) ≤ n, put Mλ = Sym(η) ⊗ Sλ (Q) and M λ = H0 (X, Mλ ). Note
that A = H0 (X, Sym(ε)), and so M λ is an A-module.
Proposition 4.8. We have
TorA
i (M λ , C) =
M
Sα (E),
α
where the sum is over partitions α with τ m (α) = λ and im (α) = i.
Proof. The proof is exactly like that of Proposition 3.13.
Step c. For an admissible partition λ put Bλ = HomO(V ) (S[λ] (V ), B). Note that Bλ is an A-module
and has a compatible action of GL(E). Let λ be a partition with at most n rows. If ℓ(λ) = n, put
B λ = Bλ ; otherwise, put B λ = Bλ ⊕ Bλσ . Note that the decomposition
M
B=
B λ ⊗ S[λ] (V )
ℓ(λ)≤n
holds SO(V )-equivariantly.
Lemma 4.9. Let λ be a partition with ℓ(λ) ≤ n. The spaces B λ and M λ are isomorphic as
representations of GL(E) and have finite multiplicities.
L
Proof. Put M =
ℓ(λ)≤n S[λ] (V ) ⊗ M λ . It is enough to show that M and B are isomorphic as
representations of GL(E) × SO(V ) and have finite multiplicities. In fact, it is enough to show that
the Sθ (E) multiplicity spaces of M and B are isomorphic as representations of SO(V ) and have
finite multiplicities. This is what we do.
The Sθ (E) multiplicity space of B is Sθ (V ). The decomposition of this in the representation ring
of SO(V ) can be computed by applying the specialization homomorphism to [KT, Thm. 2.3.1(2)].
The result is
X
(−1)im (ν) cθ2µ,ν [S[τ m (ν)] (V )].
µ,ν
For a fixed θ there are only finitely many values for µ and ν which make the Littlewood–Richardson
coefficient non-zero, which establishes finiteness of the multiplicities. Now, we have an equality
X
(−1)i [TorA
[M λ ] = [A]
i (M λ , C)]
i≥0
HOMOLOGY OF LITTLEWOOD COMPLEXES
19
in the representation ring of GL(E). Applying Proposition 4.8, we find
X
X
(−1)i [TorA
(−1)im (ν) [Sν (E)].
i (M λ , C)] =
i≥0
As [A] =
P
µ [S2µ (E)]
τ m (ν)=λ
(see [Mac, I.A.7, Ex. 1]), we obtain
X
[M λ ] =
(−1)im (ν) cθ2µ,ν [Sθ (E)].
µ,ν
τ m (ν)=λ
We therefore find that the Sθ (E) multiplicity space of M is given by
X
(−1)im (ν) cθ2µ,ν [S[λ] (V )].
λ,µ,ν
τm (ν)=λ
The result now follows.
Proposition 4.10. Let λ be a partition with ℓ(λ) ≤ n. We have an isomorphism M λ → B λ which
is A-linear and GL(E)-equivariant.
Proof. Suppose first that ℓ(λ) = n. Let µ be the partition given by µ†1 = 2n + 1 − λ†2 , µ†2 = λ†1 + 1 =
n + 1 and µ†i = λ†i for i > 2. Proposition 4.8 provides the following presentation for M λ :
Sµ (E) ⊗ A → Sλ (E) ⊗ A → M λ → 0.
Note that Sµ (E) occurs with multiplicity one in Sλ (E) ⊗ A by the Littlewood–Richardson rule,
and thus does not occur in M λ ; it therefore does not occur in B λ either, since M λ and B λ are
isomorphic as representations of GL(E).
A
Since TorA
0 (B, C) = C, we see from (4.3) that Tor0 (B λ , C) = Sλ (E). It follows that we have
a surjection f : A ⊗ Sλ (E) → B λ . Since Sµ (E) does not occur in B λ , we see that f induces a
surjection M λ → B λ . Since the two are isomorphic as GL(E) representations and have finite
multiplicities, this surjection is an isomorphism.
Now consider the case where ℓ(λ) < n. Define µ as above. Define ν using the same recipe as for
µ but applied to λσ ; thus νi† = µ†i for i 6= 2 and ν2† = 2n − λ†1 + 1. Proposition 4.8 provides the
following presentation for M λ :
(Sµ (E) ⊗ A) ⊕ (Sν (E) ⊗ A) → (Sλ (E) ⊗ A) ⊕ (Sλσ (E) ⊗ A) → M λ → 0.
Each of Sµ (E) and Sν (E) occur with multiplicity one in the middle module by the Littlewood–
Richardson rule, and thus neither occurs in M λ ; therefore neither occurs in B λ either.
As B λ = Bλ ⊕ Bλσ , we see from (4.3) that TorA
0 (B λ , C) = Sλ (E) ⊕ Sλσ (E). We therefore have
a surjection
f : (A ⊗ Sλ (E)) ⊕ (A ⊗ Sλσ (E)) → B λ .
Since neither Sµ (E) nor Sν (E) occurs in B λ , we see that f induces a surjection M λ → B λ . Since
these spaces are isomorphic as GL(E) representations and have finite multiplicities, this surjection
is an isomorphism.
Remark 4.11. In the second case in the above proof, Sµ (E) does not occur in Sλ (E) ⊗ A and
Sν (E) does not occur in Sλσ (E) ⊗ A. It follows that the presentation of M λ is a direct sum, and
so we have a decomposition M λ = Mλ ⊕ Mλσ . The argument in the proof shows that Mλ = Bλ
and Mλσ = Bλσ . It would be interesting if the modules Mλ and Mλσ could be constructed more
directly.
Combining the above proposition with Proposition 4.8, we obtain the following corollary.
20
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
Corollary 4.12. We have
TorA
i (B, C) =
M
Sλ (E) ⊗ S[τ m (λ)] (V )
im (λ)=i
as GL(E) × SO(V ) representations.
Combining this with (4.2) shows that
Hi (Lλ• ) =
(
S[τ m (λ)] (V )
0
if i = im (λ)
otherwise
as representations of SO(V ). We thus see that the O(V )-module Him (λ) (Lλ• ) is isomorphic to
S[τm (λ)] (V ) when restricted to SO(V ), and is therefore either isomorphic to S[τm (λ)] (V ) or S[τm (λ)σ ] (V ).
In fact, it is isomorphic to S[τm (λ)] (V ) by [Wen, Theorem 1.9]. This finishes the proof of the main
result.
4.7. The odd case. Throughout this section, m = 2n + 1 is the dimension of the space V .
Step a. Let Q0 be the set of partitions λ whose Frobenius coordinates (a1 , . . . , ar |b1 , . . . , br ) satisfy
ai = bi . Equivalently, Q0 is the set of partitions λ such that λ = λ† . This set admits an inductive
definition, as follows. The empty partition belongs to Q0 . A non-empty partition λ belongs to Q0
if and only if the number of rows and columns of λ are equal, i.e., ℓ(λ) = λ1 , and the partition
obtained by deleting the first row and column from λ belongs to Q0 .
Let λ be a partition with ℓ(λ) ≤ n. We write (λ|µ) in place of (λ |n µ). Define
S 1 (λ) = {µ ∈ Q0 such that (λ|µ) is regular}
S 2 (λ) = {partitions α such that τ m (α) = λ}.
Lemma 4.13. Let µ be a non-zero partition in S1 (λ) and let ν be the partition obtained by removing
the first row and column of µ. Then ν also belongs to S1 (λ). Furthermore, let w (resp. w′ ) be the
element of W such that α = w • (λ|µ) (resp. β = w′ • (λ|ν)) is a partition. Then Rα is defined and
we have the following identities:
|Rα | = 2µ1 + 1,
α \ Rα = β,
c(Rα ) = µ1 + ℓ(w′ ) − ℓ(w).
Proof. Suppose that in applying Bott’s algorithm to (λ|µ) the number µ1 moves r places to the
left. Thus, after the first r steps of the algorithm, we reach the sequence
(λ1 , . . . , λn−r , µ1 − r, λn−r+1 , . . . , λn + 1, µ2 , . . . , µℓ(µ) ).
As before, Bott’s algorithm on this sequence runs just like the algorithm on (λ|ν), and so (λ|ν)
is regular and ν belongs to S 1 (λ). Suppose the algorithm on (λ|ν) terminates after N = ℓ(w′ )
steps. Then the algorithm on (λ|µ) terminates after N + r = ℓ(w) steps, and we have the following
formula for α:
1≤i≤n−r
λi
αi = µ1 − r
i = n−r+1
βi−1 + 1 n − r + 2 ≤ i ≤ n + µ1
Since ℓ(α) = n + µ1 , the border strip Rα has 2µ1 + 1 boxes. Using Remark 3.4, we see that Rα
exists since the box in the (n − r + 1)th row and the first column has a hook of size 2ℓ(α) − m.
Furthermore, α \ Rα = β and c(Rα ) = µ1 − r. Since r = ℓ(w) − ℓ(w′ ), we are done.
Proposition 4.14. There is a unique bijection S 1 (λ) → S 2 (λ) under which µ maps to α if there
exists w ∈ S such that w • (λ|µ) = α; in this case, ℓ(w) + im (α) = 21 (|µ| − rank(µ)) and
(
λ
if rank(µ) is even
τm (α) =
σ
λ
if rank(µ) is odd.
HOMOLOGY OF LITTLEWOOD COMPLEXES
21
Proof. The proof is exactly the same as for Proposition 4.7.
Step b. Let E be a vector space of dimension at least n + 1. Let X ′ be the partial flag variety of
quotients of E of ranks n + 1 and n. Thus on X ′ we have vector bundles Qn+1 and Qn of ranks
n + 1 and n, and surjections E ⊗ OX ′ → Qn+1 → Qn . Let Rn+1 be the kernel of E ⊗ OX ′ → Qn+1
and let Rn be the kernel of E ⊗ OX ′ → Qn . Put L = Rn /Rn+1 . Let X be the Grassmannian of
rank n quotients of E, let π : X ′ → X be the natural map and let R and Q be the usual bundles
on X. Then Rn = π ∗ (R) and Qn = π ∗ (Q). The space X ′ is naturally identified with P(R), with
L being the universal rank one quotient of R.
Let ξ be the kernel of Sym2 (Rn ) → Sym2 (L) = L⊗2 , let ε = Sym2 (E) ⊗ OX ′ , which contains ξ
as a subbundle, and define η by the exact sequence
0 → ξ → ε → η → 0.
Let λ be an admissible partition and let a = a(λ) be 0 if ℓ(λ) ≤ n and 1 otherwise. Put
Mλ = Sym(η) ⊗ Sλ (Qn ) ⊗ L⊗a
and Mλ = H0 (X ′ , Mλ ). Note that H0 (X ′ , ε) = A, and so Mλ is an A-module. Finally, put
M
V
Wiλ =
Hj (X ′ , Sλ (Qn ) ⊗ L⊗a ⊗ i+j (ξ)),
j∈Z
Wiλ
=
M
Rj π∗ (Sλ (Qn ) ⊗ L⊗a ⊗
j∈Z
We wish to compute
Wiλ .
Lemma 4.15. We have
Wiλ =
M
Vi+j
(ξ)).
Sλ (Q) ⊗ Sµ (R),
µ
where the sum is over those partitions µ with µ = µ† , rank(µ) = a (mod 2) and i = 12 (|µ|−rank(µ)).
Proof. Since Qn = π ∗ (Q), and Schur functors commute with pullback, the projection formula gives
M
V
Wiλ =
Sλ (Q) ⊗ Rj π∗ (L⊗a ⊗ i+j (ξ)).
j∈Z
The result now follows from Proposition 2.4.
Lemma 4.16. Let µ ∈ S1 (λ) correspond to α ∈ S2 (λ). Then
(
Sα (E) if i = 21 (|µ| − rank(µ)) − im (α)
Hi (X, Sλ (Q) ⊗ Sµ (R)) =
0
otherwise.
Proof. This follows from Proposition 4.14 and the Borel–Weil–Bott theorem.
Lemma 4.17. We have
M
j∈Z
λ
Hj (X, Wi+j
)=
M
Sα (E),
α
where the sum is over those partitions α for which τm (α) = λ and im (α) = i.
Proof. This follows immediately from Lemmas 4.15 and 4.16, and Proposition 4.14.
V
Lemma 4.18. The pair (π, Sλ (Qn ) ⊗ L⊗a ⊗ • (ξ)) is degenerate (in the sense of §2.4).
Proof. We have
M
M
V
λ
Hi (X, Rj π∗ (Sλ (Qn ) ⊗ L⊗a ⊗ • (ξ))) =
Hj (X, Wi+j
)=
i,j
i,j
M
Sα (E).
τm (α)=λ
This is multiplicity-free as a representation of GL(E), so the criterion of Lemma 2.6 applies.
22
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
Lemma 4.19. We have
Wiλ =
M
Sα (E),
α
where the sum is over those partitions α for which τm (α) = λ and im (α) = i. In particular, Wiλ = 0
for i < 0.
Proof. By Lemma 4.18, we have an isomorphism of GL(E) representations
M
λ
Wiλ =
Hj (X, Wi+j
).
j∈Z
and so the result follows from Lemma 4.17
Proposition 4.20. We have
TorA
i (Mλ , C) =
M
Sα (E),
α
where the sum is over those partitions α for which τm (α) = λ and im (α) = i.
Proof. This follows immediately from the previous lemma and Proposition 2.1.
Step c. For an admissible partition λ, put Bλ = HomO(V ) (S[λ] (V ), B). Note that Bλ is an A-module
with a compatible action of GL(E).
Lemma 4.21. The spaces Bλ ⊕ Bλσ and Mλ ⊕ Mλσ are isomorphic as representations of GL(E)
and have finite multiplicities.
L
Proof. Let M =
λ Mλ ⊗ S[λ] (V ), where the sum is over admissible partitions λ. It is enough
to show that M and B are isomorphic as representations of GL(E) × SO(V ) and have finite
multiplicities. In fact, it is enough to show that the Sθ (E) multiplicity spaces of M and B are
isomorphic as representations of SO(V ) and have finite multiplicities. The proof goes exactly as
that of Lemma 4.9.
Proposition 4.22. Let λ be an admissible partition. We have an isomorphism Mλ → Bλ which
is A-linear and GL(E)-equivariant.
Proof. Arguing exactly as in the proof of Proposition 3.15 or 4.10, we obtain a surjection f : Mλ →
Bλ . Of course, we also have a surjection f ′ : Mλσ → Bλσ . By the previous lemma, f ⊕ f ′ is an
isomorphism, and so f and f ′ are isomorphisms.
Combining the above proposition with Proposition 4.20, we obtain the following corollary.
Corollary 4.23. We have
TorA
i (B, C) =
M
Sλ (E) ⊗ S[τm (λ)] (V )
im (λ)=i
as GL(E) × O(V ) representations.
4.8. Examples. We now give a few examples to illustrate the theorem.
Example 4.24. Suppose λ = (i). Then Lλ• is the complex Symi−2 V → Symi V , where the
differential is multiplication by the symmetric form on V ∗ treated as an element of Sym2 V .
• If m ≥ 2, or m = 1 and i ≤ 1, or m = 0 and i = 0 then the differential is injective, and
H0 (Lλ• ) = S[i] (V ) is a non-zero irreducible representation of V .
• If m = 1 and i ≥ 2, or m = 0 and i ≥ 3 or i = 1, the differential is an isomorphism and all
homology of Lλ• vanishes.
• If m = 0 and i = 2 then the differential is surjective and H1 (Lλ• ) = C is the trivial
representation of the trivial group O(0).
HOMOLOGY OF LITTLEWOOD COMPLEXES
23
Example 4.25. Suppose λ = (3, 1). Then Lλ• is the complex C → S(3,1)/(2) V → S(3,1) V , where
the differentials are multiplication by the symmetric form on V ∗ treated as an element of Sym2 V .
• If m ≥ 3 then the differential is injective, and H0 (Lλ• ) = S[3,1] (V ) is an irreducible representation of V .
• If m = 1, 2 then the complex is exact, and all homology of Lλ• vanishes.
• Finally when m = 0 then H2 (Lλ• ) = C.
The reader will check easily that in both instances the description of the homology agrees with
the rule given by the Weyl group action.
Example 4.26. Let us consider the same situation as in Example 3.20, i.e., λ = (6, 5, 4, 4, 3, 3, 2)
and m = 4. The modification rule, using border strips, proceeds as follows:
Starting with λ = λ0 we remove the border strip R0 of size 2ℓ(λ) − m = 10. Doing so we obtain
the partition λ1 = (6, 3, 3, 2, 2, 1). We now are supposed to remove the border strip R1 of size 8.
This border strip is shaded. However, upon removing this strip we do not have a Young diagram.
It follows that all homology of Lλ• vanishes.
In the Weyl group version, this amounts to
λ† + ρ = (7, 7, 6, 4, 2, 1) + (−2, −3, −4, . . . ) = (5, 4, 2, −1, −4, −6)
having a nontrivial stabilizer: if σ is the transposition that swaps the first and fifth entries, then
the stabilizer contains s0 σs0 , and this is a non-identity element.
Example 4.27. Suppose λ = (4, 4, 4, 4, 3, 3, 2) and m = 4. The border strip algorithm runs as
follows:
We have removed three border strips R0 , R1 , R2 . Thus according to rule (D3) of §4.4, τ4 (λ) is not
the final partition (2), but its conjugate, i.e., τ4 (λ) = (3, 1). We have
i4 (λ) = (c(R0 ) − 1) + (c(R1 ) − 1) + (c(R2 ) − 1) = 3 + 2 + 1 = 6.
We thus see that Hi (Lλ• ) = 0 if i 6= 6 and H6 (Lλ• ) = S[3,1] (V ).
si
Now we illustrate the modification rule using the Weyl group action. We write α −
→ β if
β = si (α). The idea for getting the Weyl group element is to apply s0 if sum of the first two
column lengths is too big, then sort the result, and repeat as necessary. We start with λ† + ρ =
(7, 7, 6, 4) + (−2, −3, −4, −5, . . . ):
s
s
s
s
s
s
0
2
(5, 4, 2, −1) −→
(−4, −5, 2, −1) −→
(−4, 2, −5, −1)
3
1
−→
(−4, 2, −1, −5) −→
(2, −4, −1, −5)
2
0
−→
(2, −1, −4, −5) −→
(1, −2, −4, −5).
Subtracting ρ from the result, we get (3, 1) = (2, 1, 1)† .
24
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
5. General linear groups
5.1. Representations of GL(V ). Let V be a vector space of dimension n. The irreducible representations of GL(V ) are indexed by pairs of partitions (λ, λ′ ) such that ℓ(λ) + ℓ(λ′ ) ≤ n (see
[Koi, §1] for more details). We call such pairs admissible. Given an admissible pair (λ, λ′ ), we
denote by S[λ,λ′ ] (V ) the corresponding irreducible representation of GL(V ). Identifying weights
of GL(V ) with elements of Zn , the representation S[λ,λ′ ] (V ) is the irreducible with highest weight
(λ1 , . . . , λr , 0, . . . , 0, −λ′s , . . . , −λ′1 ), where r = ℓ(λ) and s = ℓ(λ′ ). The representation S[λ,0] (V ) is
the usual Schur functor Sλ (V ), while the representation S[0,λ] is its dual Sλ (V )∗ .
5.2. The Littlewood complex. Let E and E ′ be vector spaces. Put U = E ⊗ E ′ , A = Sym(U )
and B = Sym((E ⊗ V ) ⊕ (E ′ ⊗ V ∗ )). Let U ⊂ B be the inclusion given by
E ⊗ E ′ ⊂ (E ⊗ V ) ⊗ (E ′ ⊗ V ∗ ) ⊂ Sym2 (E ⊗ V ⊕ E ′ ⊗ V ∗ ),
where the first inclusion is multiplication with the identity element of V ⊗ V ∗ . This inclusion
defines an algebra homomorphism A → B. Let C = B ⊗A C; this is the quotient of B by the ideal
generated by U . We have maps
Spec(C) → Spec(B) → Spec(A).
We have a natural identification of Spec(B) with the space Hom(E, V ∗ ) × Hom(E ′ , V ) of pairs of
maps (ϕ : E → V ∗ , ψ : E ′ → V ). The space Spec(A) is naturally identified with the space (E ⊗ E ′ )∗
of bilinear forms on E × E ′ . The map Spec(B) → Spec(A) takes a pair of maps (ϕ, ψ) to the
form (ϕ ⊗ ψ)∗ ω, where ω : V ⊗ V ∗ → C is the trace map. The space Spec(C), which we call the
Littlewood variety, is the scheme-theoretic fiber of this map above 0, i.e., it consists of those
pairs of maps (ϕ, ψ) such that (ϕ ⊗ ψ)∗ ω = 0.
Remark 5.1. One can modify the definitions of the rings A, B and C by replacing E with its dual
everywhere. The space Spec(A) is then identified with Hom(E ′ , E), while Spec(B) is identified
with the set of pairs of maps (ϕ : V → E, ψ : E ′ → V ). The map Spec(B) → Spec(A) takes (ϕ, ψ)
to ϕψ. The space Spec(C) consists of those pairs (ϕ, ψ) such that ϕψ = 0; thus Spec(C) is the
space of complexes of the form E ′ → V → E.
V
•
Let K• (E, E ′ ) = B ⊗ U be the Koszul complex of the Littlewood variety. We can decompose
this complex under the action of GL(E) × GL(E ′ ):
M
′
Sλ (E) ⊗ Sλ′ (E ′ ) ⊗ Lλ,λ
K• (E, E ′ ) =
• .
ℓ(λ)≤dim E
ℓ(λ′ )≤dim E ′
′
is the Littlewood complex, and is independent of E and E ′ (so long as
The complex Lλ,λ
•
dim E ≥ ℓ(λ) and dim E ′ ≥ ℓ(λ′ )). By [Bry, Theorem 3.3], its zeroth homology is
(
S[λ,λ′ ] (V ) if (λ, λ′ ) is admissible
λ,λ′
(5.1)
H0 (L• ) =
0
otherwise.
By Lemma 2.7, we have Hi (K• ) = TorA
i (B, C), and so we have a decomposition
M
′
Sλ (E) ⊗ Sλ′ (E ′ ) ⊗ Hi (Lλ,λ
(5.2)
TorA
• ).
i (B, C) =
ℓ(λ)≤dim E
ℓ(λ′ )≤dim E ′
Applied to i = 0, we obtain
(5.3)
C=
M
admissible (λ, λ′ )
Sλ (E) ⊗ Sλ′ (E ′ ) ⊗ S[λ,λ′ ] (V ).
HOMOLOGY OF LITTLEWOOD COMPLEXES
25
5.3. A special case of the main theorem. Our main theorem computes the homology of the
complex Lλ• . We now formulate and prove the theorem in a particularly simple case. We mention
this here only because it is worthwhile to know; the argument is not needed to prove the main
theorem.
Proposition 5.2. Suppose (λ, λ′ ) is admissible. Then
(
S[λ,λ′ ] (V ) if i = 0
λ,λ′
Hi (L• ) =
0
otherwise.
Proof. Choose E, E ′ so that dim E = ℓ(λ) and dim E ′ = ℓ(λ′ ). By Lemma 5.3 below, K• (E, E ′ ) has
′
′
does not either. The computation of H0 (Lλ,λ
no higher homology. It follows that Lλ,λ
• ) is given
•
in (5.1).
Lemma 5.3. Suppose dim E + dim E ′ ≤ n. Then U ⊂ B is spanned by a regular sequence.
Proof. It suffices to show that dim Spec(C) = dim Spec(B) − dim U . Put d = dim E and d′ =
dim E ′ . Observe that the locus of (ϕ, ψ) in Spec(C) where ϕ is injective and ψ is surjective is
open. Let Fl(d, d + d′ , V ) be the variety of partial flags Wd ⊂ Wd+d′ ⊂ V , where the subscript
indicates the dimension of the subspace. This variety comes with a tautological partial flag Rd ⊂
Rd+d′ ⊂ V ⊗ OFl(d,d+d′ ,V ) . There is a natural birational map from the total space of Hom(E, Rd ) ⊕
Hom(Rd+d′ /Rd , E ′ ) to Spec(C), and thus Spec(C) has dimension n(d+d′ )−dd′ . As dim Spec(B) =
n(d + d′ ) and dim U = dd′ , the result follows.
5.4. The modification rule. We now associate to a pair of partitions (λ, λ′ ) two quantities,
in (λ, λ′ ) and τn (λ, λ′ ). As usual, we give two equivalent definitions.
We begin with Koike’s definition of the Weyl group definition from the discussion preceding [Koi,
Prop. 2.2]. First, consider −(λ′† )op , which is the sequence obtained by taking λ′† and reversing
and negating its entries. We add n to each entry, and call the result σ(λ′ ). For example, if
λ′ = (3, 2, 2, 1, 1) and n = 4, then −(λ′† )op = (−1, −3, −5) and σ(λ′ ) = (3, 1, −1). Note that if
µ is any weakly decreasing sequence of nonnegative integers with n ≥ µ1 , then it makes sense to
reverse this procedure, and so we can define σ −1 (µ). Now set α = (σ(λ′ ) | λ† ) and ρ = (. . . , 3, 2, 1 |
0, −1, −2, . . . ). We let W ′ be the group of permutations on the index set Z of the coordinates of ρ
and α which differ from the identity permutation in only finitely many places. Given a permutation
w ∈ W ′ , we define w • α = w(α + ρ) − ρ as usual. One of two possibilities occurs:
• There exists a unique element w ∈ W ′ so that w • α = (β ′ | β) is weakly decreasing. In this
case, we set in (λ, λ′ ) = ℓ(w) and τn (λ, λ′ ) = (β, σ −1 (β ′ )).
• There exists a non-identity element w ∈ W ′ such that w • α = α. In this case, we put
in (λ, λ′ ) = ∞ and leave τn (λ, λ′ ) undefined.
We now give a modified (but equivalent) description of this Weyl group action. The group S × S
acts on the set U × U via the • action. We define a new involution t of U × U by
t • ((a1 , a2 , . . .), (b1 , b2 , . . .)) = ((n + 1 − b1 , a2 , . . .), (n + 1 − a1 , b2 , . . .))
Let W be the subgroup of Aut(U × U ) generated by S × S and t. Then W is isomorphic to an
infinite symmetric group, and comes equipped with a length function ℓ : W → Z≥0 with respect
to its set of generators, as in (2.1). Given a pair of partitions (λ, λ′ ) ∈ U × U , exactly one of the
following two possibilities hold:
• There exists a unique element w ∈ W such that w • (λ, λ′ )† = (µ, µ′ )† is a pair of partitions
and (µ, µ′ ) is admissible. We then put in (λ, λ′ ) = ℓ(w) and τn (λ, λ′ ) = (µ, µ′ ). (The
notation (λ, λ′ )† simply means (λ† , (λ′ )† ).)
• There exists a non-identity element w ∈ W such that w • (λ, λ′ )† = (λ, λ′ )† . We then put
in (λ, λ′ ) = ∞ and leave τn (λ, λ′ ) undefined.
26
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
As always, if (λ, λ′ ) is already admissible then we are in the first case, and in (λ, λ′ ) = 0 and
τn (λ, λ′ ) = (λ, λ′ ).
We now give the border strip definition, which we could not find in the literature. If (λ, λ′ ) is
admissible then we define in (λ, λ′ ) = 0 and τn (λ, λ′ ) = (λ, λ′ ). Assume now that (λ, λ′ ) is not
admissible. Let Rλ (resp. Rλ′ ) be the border strip of length ℓ(λ) + ℓ(λ′ ) − n − 1 starting in the first
box of the final row of λ (resp. λ′ ), if it exists. If both Rλ and Rλ′ exist and are non-empty and
both λ \ Rλ and λ′ \ Rλ′ are partitions, we put
in (λ, λ′ ) = c(Rλ ) + c(Rλ′ ) − 1 + in (λ \ Rλ , λ′ \ Rλ′ )
and τn (λ, λ′ ) = τn (λ \ Rλ , λ′ \ Rλ′ ). Otherwise, we put in (λ, λ′ ) = ∞ and leave τn (λ, λ′ ) undefined.
Proposition 5.4. The above two definitions agree.
Proof. Consider the diagram
µc
λ
µ
where µc is the complement of µ in a n × µ1 rectangle (we are allowing the possibility that ℓ(µ) > n,
in which case, we need to consider negative column lengths, but for the purposes of explanation,
we assume ℓ(µ) ≤ n). According to Koike’s rule, we are supposed to apply Bott’s algorithm to the
columns of the union of µc and λ.
We describe two procedures:
(1) Start with a shape that is a single column of length d (d could be negative) union a partition
λ with ℓ(λ) > d and apply Bott’s algorithm. Then we end up with a single column of length
ℓ(λ) − 1 union the shape obtained by removing a border strip of size ℓ(λ) − d − 1 if that is
possible, and 0 otherwise.
(2) Dually, start with a shape ν union a column of length e with e > νν†1 and apply Bott’s
algorithm. Then we get the shape η union a column of length νν†1 + 1 where η is obtained
from ν by adding a border strip of length e − νν†1 − 1 starting from the bottom box in the
last column of ν if it exists, and 0 otherwise.
Now go back to our shape, which is (µc , λ). Apply (1) with the column being the last column
of µc so that d = n − ℓ(µ). Then the last column of µc becomes ℓ(λ) − 1 and we have removed
a border strip of size ℓ(λ) + ℓ(µ) − n − 1 from λ. In the process, we used c(λ) simple reflections.
Now apply (2) with ν being µc minus its last column and e = ℓ(λ) − 1. The result is the shape
obtained by adding a border strip (starting from the right, not left) of length ℓ(λ) − νν†1 to ν union
a column of length νν†1 + 1. We can also describe this shape as follows: we added to µc a border
strip (starting from the right) of size ℓ(λ) + ℓ(µ) − n − 1. In this second step, we have used c(µ) − 1
simple reflections.
Finally, note that adding a border strip, starting from the right, to µc is equivalent to removing
a border strip from µ in the usual sense.
5.5. The main theorem. Our main theorem is the following:
Theorem 5.5. For a pair of partitions (λ, λ′ ) and an integer i, we have
(
S[τn (λ,λ′ )] (V ) if i = in (λ, λ′ )
′
Hi (Lλ,λ
)
=
•
0
otherwise.
HOMOLOGY OF LITTLEWOOD COMPLEXES
27
′
is exact.
In particular, if in (λ, λ′ ) = ∞ then Lλ,λ
•
Remark 5.6. Consider the coordinate ring R of rank ≤ n matrices; identifying E with its dual,
this is the quotient of A by the ideal generated by (n + 1) × (n + 1) minors. The resolution of R over
A is known, see [Wey, §6.1] or [Las]. On the other hand, R is the GL(V )-invariant part of B, and
so the above theorem, combined with (5.2), shows that Sλ (E) ⊗ Sλ′ (E ′ ) appears in its resolution
if and only if τn (λ, λ′ ) = ∅. Thus the modification rule gives an alternative description of the
resolution of R. It is a pleasant combinatorial exercise to show directly that these two descriptions
are equivalent. As in previous situations, the modification rule is more complicated, but has the
advantage that it readily generalizes to our situation.
The proof will take the rest of this section, and will follow the three-step plan given in §1.7.
Step a. Fix integers a and b with n = a + b. Let (λ, λ′ ) be a pair of partitions with ℓ(λ) ≤ a and
ℓ(λ′ ) ≤ b. We write (λ|µ) in place of (λ |a µ) and (λ′ |µ′ ) in place of (λ′ |b µ′ ). Define
S1 (λ, λ′ ) = {partitions µ such that (λ|µ) and (λ′ |µ† ) are regular}
S2 (λ, λ′ ) = {pairs of partitions (α, α′ ) such that τn (α, α′ ) = (λ, λ′ )}.
Lemma 5.7. Let µ be a non-zero partition in S1 (λ, λ′ ) and let ν be the partition obtained by
removing the first row and column of µ. Then ν also belongs to S1 (λ, λ′ ). Furthermore, let (w1 , w1′ )
(resp. (w2 , w2′ )) be elements of W such that α = w1 •(λ|µ) and α′ = w1′ •(λ|µ† ) (resp. β = w2 •(λ|ν)
and β ′ = w2′ • (λ|ν † )) are partitions. Then Rα and Rα′ are defined and we have the identities
|Rα | = |Rα′ | = ℓ(µ) + µ1 − 1,
and
α \ Rα = β,
α′ \ Rα′ = β ′
c(Rα ) + c(Rα′ ) = ℓ(µ) + µ1 + ℓ(w2 ) + ℓ(w2′ ) − ℓ(w1 ) − ℓ(w1′ ).
Proof. Reasoning as in the proof of Lemma 3.8, we see that ν belongs to S1 (λ, λ′ ). Suppose that
in applying Bott’s algorithm to (λ|µ) (resp. (λ′ |µ† )) the number µ1 (resp. µ†1 ) moves r (resp. s)
places to the left. Let N = ℓ(w2 ) (resp. N ′ = ℓ(w2′ )) be the number of steps in Bott’s algorithm
applied to (λ|ν) (resp. (λ|ν † )). Then, as in the proof of Lemma 3.8, we can trace Bott’s algorithm
on (λ|µ) and (λ′ |µ† ). We find
1≤i≤a−r
λi
αi = µ1 − r
i=a−r+1
βi−1 + 1 a − r + 1 ≤ i ≤ a + ℓ(µ)
′
1≤i≤b−s
λi
†
′
αi = µ1 − s
i = b−s+1
′
βi−1 + 1 b − s + 2 ≤ i ≤ b + µ1 .
We now examine the border strips used in the modification rule for (α, α′ ). Both Rα and Rα′ have
ℓ(α) + ℓ(α′ ) − n − 1 = ℓ(µ) + µ1 − 1 boxes. Using Remark 3.4, we see that Rα (resp. Rα′ ) exists
since the box in (a − r + 1)th (resp. (b − s + 1)th) row and the first column has a hook of size
ℓ(µ) + µ1 − 1. Furthermore, α \ Rα = β and α′ \ Rα′ = β ′ and
c(Rα ) = ℓ(µ) + µ1 − ℓ(α) + a − r,
c(Rα′ ) = ℓ(µ) + µ1 − ℓ(α′ ) + b − s,
which completes the proof.
(λ, λ′ )
(λ, λ′ )
Proposition 5.8. There is a unique bijection S1
→ S2
under which µ maps to (α, α′ )
if there exists w and w′ in S such that w • (λ|µ) = α and w′ • (λ′ |µ† ) = α′ ; in this case, ℓ(w) +
ℓ(w′ ) + in (α, α′ ) = |µ|.
28
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
Proof. The proof is essentially the same as that of Proposition 3.10.
Step b. Let E and E ′ be vector spaces of dimensions at least a and b, respectively. Let X (resp.
X ′ ) be the Grassmannian of rank a (resp. b) quotients of E (resp. E ′ ). Let R and Q (resp. R′
and Q′ ) be the tautological bundles on X (resp. X ′ ) as in (2.2); we regard all four as bundles on
X × X ′ . Put ε = E ⊗ E ′ ⊗ OX×X ′ , ξ = R ⊗ R′ and define η by the exact sequence
0 → ξ → ε → η → 0.
Finally, for a pair of partitions (λ, λ′ ) with ℓ(λ) ≤ a and ℓ(λ′ ) ≤ b, put
Mλ,λ′ = Sym(η) ⊗ Sλ (Q) ⊗ Sλ′ (Q′ )
and Mλ,λ′ = H0 (X × X ′ , Mλ,λ′ ). Note that A = H0 (X, Sym(ε)), and so Mλ,λ′ is an A-module.
Lemma 5.9. Let λ and λ′ be partitions with ℓ(λ) ≤ a and ℓ(λ′ ) ≤ b. Let ν ∈ S1 (λ, λ′ ) correspond
to (α, α′ ) in S2 (λ, λ′ ). Let V be the vector bundle on X × X ′ given by
V = Sλ (Q) ⊗ Sλ′ (Q′ ) ⊗ Sν (R) ⊗ Sν † (R′ ).
Then
(
Sα (E) ⊗ Sα′ (E ′ )
H (X × X , V) =
0
i
′
if i = |ν| − in (α, α′ )
otherwise.
Proof. The Künneth formula shows that
H• (X × X ′ , V) = H• (X, Sλ (Q) ⊗ Sν (R)) ⊗ H• (X ′ , Sλ′ (Q′ ) ⊗ Sν † (R′ )).
By definition, (λ|ν) and (λ′ |ν † ) are both regular, and so we can find w and w′ in S such that
α = w • (λ|ν) and α′ = w • (λ′ |ν † ) are partitions. By the Borel–Weil–Bott theorem, we get
(
Sα (E) if i = ℓ(w)
Hi (X, Sλ (Q) ⊗ Sν (R)) =
0
otherwise
(
Sα′ (E ′ ) if i = ℓ(w′ )
Hi (X ′ , Sλ (Q′ ) ⊗ Sν † (R′ )) =
0
otherwise.
By Proposition 5.8, we have ℓ(w) + ℓ(w′ ) = |ν| − in (α, α′ ), which completes the proof.
Lemma 5.10. Let λ and λ′ be partitions with ℓ(λ) ≤ a and ℓ(λ′ ) ≤ b and let i be an integer. We
have
M
M
V
Sα (E) ⊗ Sα′ (E ′ ),
Hj (X × X ′ , i+j (ξ) ⊗ Sλ (Q) ⊗ Sλ′ (Q′ )) =
(α,α′ )
j∈Z
where the sum is over pairs (α, α′ ) with in (α, α′ ) = i and τn (α, α′ ) = (λ, λ′ ). In particular, when
i < 0 the left side above vanishes.
Proof. We have
Vi+j
and so
M
j∈Z
=
M
(ξ) =
Vi+j
Hj (X × X ′ ,
(R ⊗ R′ ) =
Vi+j
M
Sν (R) ⊗ Sν † (R′ ),
|ν|=i+j
(ξ) ⊗ Sλ (Q) ⊗ Sλ′ (Q′ ))
H|ν|−i (X × X ′ , Sλ (Q) ⊗ Sλ′ (Q′ ) ⊗ Sν (R) ⊗ Sν † (R′ )).
ν
Of course, we only need to sum over ν ∈ S1 (λ, λ′ ). The result now follows from Lemma 5.9.
HOMOLOGY OF LITTLEWOOD COMPLEXES
29
Proposition 5.11. Let λ and λ′ be partitions with ℓ(λ) ≤ a and ℓ(λ′ ) ≤ b. We have
M
Sα (E) ⊗ Sα′ (E ′ ),
TorA
i (Mλ,λ′ , C) =
(α,α′ )
where the sum is over pairs (α, α′ ) with in (α, α′ ) = i and τn (α, α′ ) = (λ, λ′ ).
Proof. This follows immediately from the Lemma 5.10 and Proposition 2.1.
Lemma 5.12. The module Mλ,λ′ is independent of the choice of a and b, provided that ℓ(λ) ≤ a
and ℓ(λ′ ) ≤ b.
Proof. Applying Proposition 5.11 with i = 0 and i = 1 shows that we have a presentation
A ⊗ S(λ,1d ) (E) ⊗ S(λ′ ,1d ) (E ′ ) → A ⊗ Sλ (E) ⊗ Sλ′ (E ′ ) → Mλ,λ′ → 0,
where d = n + 1 − ℓ(λ) − ℓ(µ). The left map is unique up to scalar multiple, since S(λ,1d ) (E) ⊗
S(λ′ ,1d ) (E ′ ) occurs with multiplicity one in the middle group, and so the lemma follows.
We thus have a well-defined A-module Mλ,λ′ for any admissible pair (λ, λ′ ).
Step c. For an admissible pair (λ, λ′ ), put
Bλ,λ′ = HomGL(V ) (S[λ,λ′ ] (V ), B).
Note that Bλ,λ′ is an A-module and has a compatible action of GL(E) × GL(E ′ ). Our goal is to
show that Bλ,λ′ is isomorphic to Mλ,λ′ .
Lemma 5.13. Let (λ, λ′ ) be an admissible pair. Then the spaces Bλ,λ′ and Mλ,λ′ are isomorphic
as representations of GL(E) × GL(E ′ ), and have finite multiplicities.
Proof. As we have done before, put
M=
M
admissible
Mλ,λ′ ⊗ S[λ,λ′ ] (V ).
(λ, λ′ )
It is enough to show that M and B are isomorphic as representations of GL(E) × GL(E ′ ) × GL(V )
and have finite multiplicities. In fact, it is enough to show that the Sθ (E) ⊗ Sθ′ (E ′ ) multiplicity
spaces of M and B are isomorphic as representations of GL(V ) and have finite multiplicities. This
is what we do.
The Sθ (E) ⊗ Sθ′ (E) multiplicity space of B is Sθ (V ) ⊗ Sθ′ (V ∗ ). The decomposition of this in
the representation ring of GL(V ) can be computed using [Koi, Thm. 2.4]. The result is
X
′
′
(−1)in (ν,ν ) cθν,µ cθν ′ ,µ [S[τn (ν,ν ′ )] (V )].
ν,ν ′ ,µ
[ν,ν ′ ]
(In the notation of [Koi], we are computing M[θ,0],[0,θ′ ] . These zeros lead to the massive simplification
of the general formula given there.) Note that for fixed (θ, θ ′ ) there are only finitely many values for
(ν, ν ′ , µ) which make the product of Littlewood–Richardson coefficients non-zero, which establishes
finiteness of the multiplicities. Now, we have an equality
X
(−1)i [TorA
[Mλ,λ′ ] = [A]
i (Mλ,λ′ , C)]
i≥0
in the representation ring of GL(E). Applying Proposition 5.11, we find
X
X
′
′
,
C)]
=
(−1)i [TorA
(M
(−1)in (ν,ν ) [Sν (E)][Sν ′ (E ′ )].
λ,λ
i
i≥0
ν,ν ′
τn (ν,ν ′ )=(λ,λ′ )
30
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
As [A] =
P
µ [Sµ (E)][Sµ (E
′ )],
[Mλ,λ′ ] =
we obtain
X
′
′
(−1)in (ν,ν ) cθν,µ cθν ′ ,µ [Sθ (E)][Sθ′ (E ′ )].
µ,θ,θ ′ ,ν,ν ′
τn (ν,ν ′ )=(λ,λ′ )
We therefore find that the Sθ (E) ⊗ Sθ′ (E ′ ) component of M is given by
X
′
′
(−1)in (ν,ν ) cθν,µ cθν ′ ,µ [S[λ,λ′ ] (V )].
λ,λ′ ,µ,ν,ν ′
τn (ν,ν ′ )=(λ,λ′ )
The result now follows.
Proposition 5.14. Let (λ, λ′ ) be an admissible pair. Then we have an isomorphism Bλ,λ′ → Mλ,λ′
which is A-linear and GL(E) × GL(E ′ ) equivariant.
Proof. As in the proof of Lemma 5.12, we have a presentation
A ⊗ S(λ,1d ) (E) ⊗ S(λ′ ,1d ) (E ′ ) → A ⊗ Sλ (E) ⊗ Sλ′ (E ′ ) → Mλ,λ′ → 0,
where d = n + 1 − ℓ(λ) − ℓ(λ′ ). Note that S(λ,1d ) (E) ⊗ S(λ′ ,1d ) occurs with multiplicity one in the
middle module, and thus does not occur in Mλ,λ′ ; it therefore does not occur in Bλ,λ′ either, since
Mλ,λ′ and Bλ,λ′ are isomorphic as representations of GL(E) × GL(E ′ ).
A
′
Since TorA
0 (B, C) = C, we see from (5.3) that Tor0 (Bλ,λ′ , C) = Sλ (E) ⊗ Sλ′ (E ). It follows that
′
we have a surjection f : A ⊗ Sλ (E) ⊗ Sλ′ (E ) → Bλ,λ′ . Since S(λ,1d ) (E) ⊗ S(λ′ ,1d ) (E ′ ) does not occur
in Bλ,λ′ , we see that f induces a surjection Mλ,λ′ → Bλ,λ′ . Since the two are isomorphic as GL(E)×
GL(E ′ ) representations and have finite multiplicities, this surjection is an isomorphism.
Combining the above proposition with Proposition 5.11, we obtain the following corollary. Combined with (5.2), this proves the main theorem.
Corollary 5.15. We have
TorA
i (B, C) =
M
Sλ (E) ⊗ Sλ′ (E ′ ) ⊗ S[τn (λ,λ′ )] (V ).
in (λ,λ′ )=i
5.6. Examples. We now give a few examples to illustrate the theorem.
′
is the complex
Example 5.16. Suppose λ = (1i ), λ′ = (1j ) with i and j positive. Then Lλ,λ
•
Vj ∗
Vi
Vj−1 ∗
Vi−1
V → V ⊗ V ,
V ⊗
where the differential is the multiplication by the identity, treated as an element of V ⊗ V ∗ . Let
n = dim V .
′
• If i + j ≤ n then the differential is injective, and H0 (Lλ,λ
• ) = S[1i ,1j ] (V ) is the irreducible
i
n−i−j
j
representation with highest weight (1 , 0
, (−1) ).
′
vanishes.
• If i + j = n + 1 then the differential is an isomorphism, and all homology of Lλ,λ
•
′
)
=
S
(V
).
• If i + j > n + 1 but i ≤ n + 1 and j ≤ n + 1 we have H1 (Lλ,λ
n+1−j
n+1−i
•
[1
,1
]
′
vanishes identically.
• Finally, if i > n + 1 or j > n + 1 then the complex Lλ,λ
•
The reader will easily check that the description of homology given above agrees with the rule
given by the Weyl group action.
Example 5.17. Suppose λ = λ0 = (4, 3, 2, 2) and λ′ = λ′0 = (5, 2, 2, 1, 1) and n = 3. We are
supposed to remove border strips of size ℓ(λ0 ) + ℓ(λ′0 ) − n − 1 = 4 + 5 − 4 = 5 from each partition.
HOMOLOGY OF LITTLEWOOD COMPLEXES
31
Let R0 and R0′ be these border strips. The picture is as follows:
The partition λ0 is on the left, with R0 shaded, and λ′0 is on the right with R0′ shaded. Let λ1 = λ0 \
R0 and λ′1 = λ′0 \R0′ ; these are the unshaded boxes in the above diagrams. As ℓ(λ1 )+ℓ(λ′1 ) = 5 > n,
the pair (λ, λ′ ) is not admissible and the algorithm continues. The border strips R1 and R1′ have
size 1. The picture is thus:
Removing these border strips, we obtain the partitions λ2 = (4, 1) and λ′2 = (4). As ℓ(λ2 ) + ℓ(λ′2 ) ≤
n, the pair (λ, λ′ ) is admissible and the algorithm terminates. So τ3 (λ, λ′ ) = ((4, 1), (4)) and
i3 (λ, λ′ ) = (c(R0 ) + c(R0′ ) − 1) + (c(R1 ) + c(R1′ ) − 1) = 4 + 1 = 5.
′
′
λ,λ
It follows that Hi (Lλ,λ
• ) = 0 for i 6= 5, while H5 (L• ) = S[(4,1),(4)] (V ) is the irreducible of GL(3)
with highest weight (4, 1, −4).
Now we illustrate the modification rule using Koike’s original Weyl group action. Using the
notation of §5.4, we have σ(λ′ ) = (2, 2, 2, 0, −2), α = (2, 2, 2, 0, −2 | 4, 4, 2, 1), and ρ = (. . . , 2, 1 |
0, −1, . . . ). If we sort α + ρ = (7, 6, 5, 2, −1 | 4, 3, 0, −2), we get (7, 6, 5, 4, 3 | 2, 0, −1, −2). The
permutation that does this sorting has length 5 (we made 5 consecutive swaps), and subtracting
ρ, we get (2, 2, 2, 2, 2 | 2, 1, 1, 1). Then (2, 1, 1, 1)† = (4, 1) is our first partition, and our second
partition is σ −1 (25 ) = (15 )† = (5).
References
[AH]
Luchezar Avramov, Jürgen Herzog, The Koszul algebra of a codimension 2 embedding, Math. Z. 175 (1980),
no. 3, 249–260.
[Bry] Ranee Kathryn Brylinski, Matrix concomitants with the mixed tensor model, Adv. Math. 100 (1993), no. 1,
28–52.
[DPS] Elizabeth Dan-Cohen, Ivan Penkov, Vera Serganova, A Koszul category of representations of finitary Lie
algebras, arXiv:1105.3407v2.
[EW] Thomas J. Enright, Jeb F. Willenbring, Hilbert series, Howe duality and branching for classical groups, Ann.
of Math. (2) 159 (2004), no. 1, 337–375.
[FH]
William Fulton, Joe Harris, Representation Theory: A First Course, Graduate Texts in Mathematics 129,
Springer-Verlag, New York, 1991.
[How] Roger Howe, Perspectives on invariant theory: Schur duality, multiplicity-free actions and beyond, Israel
Mathematical Conference Proceedings 8, 1995.
[HTW] Roger Howe, Eng-Chye Tan, Jeb F. Willenbring, Stable branching rules for classical symmetric pairs, Trans.
Amer. Math. Soc. 357 (2005), no. 4, 1601–1626, arXiv:math/0311159v2.
[Hum] James E. Humphreys, Reflection Groups and Coxeter Groups, Cambridge Studies in Advanced Mathematics
29, Cambridge University Press, Cambridge, 1990.
[JPW] T. Józefiak, P. Pragacz, J. Weyman, Resolutions of determinantal varieties and tensor complexes associated
with symmetric and antisymmetric matrices, Young tableaux and Schur functors in algebra and geometry
(Toruń, 1980), pp. 109–189, Astérisque, 87-88, Soc. Math. France, Paris, 1981.
[Kin] R. C. King, Modification rules and products of irreducible representations of the unitary, orthogonal, and
symplectic groups, J. Mathematical Phys. 12 (1971), 1588–1598.
[Koi] Kazuhiko Koike, On the decomposition of tensor products of the representations of the classical groups: by
means of the universal characters, Adv. Math. 74 (1989), no. 1, 57–86.
[KT]
Kazuhiko Koike, Itaru Terada, Young-diagrammatic methods for the representation theory of the classical
groups of type Bn , Cn , Dn , J. Algebra 107 (1987), no. 2, 466–511.
[Las]
Alain Lascoux, Syzygies des variétés déterminantales, Adv. in Math. 30 (1978), no. 3, 202–237.
32
STEVEN V SAM, ANDREW SNOWDEN, AND JERZY WEYMAN
[Lit]
[Mac]
[SS1]
[SS2]
[SW]
[Sun]
[Wen]
[Wey]
Dudley E. Littlewood, The Theory of Group Characters and Matrix Representations of Groups, reprint of
the second (1950) edition, AMS Chelsea Publishing, Providence, RI, 2006.
I. G. Macdonald, Symmetric Functions and Hall Polynomials, second edition, Oxford Mathematical Monographs, Oxford, 1995.
Steven V Sam, Andrew Snowden, GL-equivariant modules over polynomial rings in infinitely many variables,
arXiv:1206.2233v1.
Steven V Sam, Andrew Snowden, Stability patterns in representation theory, in preparation.
Steven V Sam, Jerzy Weyman, Koszul homology of codimension 3 Gorenstein ideals, Proc. Amer. Math. Soc.,
to appear, arXiv:1203.3168v1.
Sheila Sundaram, Tableaux in the representation theory of the classical Lie groups, Invariant theory and
tableaux (Minneapolis, MN, 1988), 191–225, IMA Vol. Math. Appl., 19, Springer, New York, 1990.
Hans Wenzl, Quotients of representation rings, Represent. Theory 15 (2011), 385–406, arXiv:1101.5887v1.
Jerzy Weyman, Cohomology of Vector Bundles and Syzygies, Cambridge University Press, Cambridge, 2003.
Department of Mathematics, University of California, Berkeley, CA
E-mail address: [email protected]
Department of Mathematics, MIT, Cambridge, MA
E-mail address: [email protected]
Department of Mathematics, Northeastern University, Boston, MA
E-mail address: [email protected]
| 0math.AC
|
Insulin Regimen ML-based control for T2DM patients
arXiv:1710.07855v1 [q-bio.QM] 21 Oct 2017
Mark Shifrin, Hava Siegelmann
October 24, 2017
Abstract
We model individual T2DM patient blood glucose level (BGL) by stochastic process with discrete
number of states mainly but not solely governed by medication regimen (e.g. insulin injections). BGL
states change otherwise according to various physiological triggers which render a stochastic, statistically
unknown, yet assumed to be quasi-stationary, nature of the process. In order to express incentive for being
in desired healthy BGL we heuristically define a reward function which returns positive values for desirable
BG levels and negative values for undesirable BG levels. The state space consists of sufficient number of
states in order to allow for memoryless assumption. This, in turn, allows to formulate Markov Decision
Process (MDP), with an objective to maximize the total reward, summarized over a long run. The
probability law is found by model-based reinforcement learning (RL) and the optimal insulin treatment
policy is retrieved from MDP solution.
1
Introduction
Diabetes mellitus type 2 (T2DM) makes up for about 90% of all Diabetes cases [15], with increasing rates
since as early as 1960 [9]. The goal of therapy for T2DM is to bring the average blood glucose (BG) as close
to the normal range as possible, which can be done by various oral medications or/and insulin injections [12].
The exact dosage and frequency of the medication intakes are coordinated by blood glucose measurements
normally being performed by designated glucose meters, see , e.g., [14]. The recent recommendations are
such that T2DM patients are advised to measure their blood glucose level (BGL) at least 3 times a day [8].
In this work, we address individually adopted insulin regimen control. For this purpose, we harness tools
from the area of Machine Learning (ML) and stochastic control theory. In particular, we build Markov
Decision Process of blood glucose level. The solution to the defined MDP is expressed by a policy which
assigns an action according to the measured BGL.
Note that we pose no contradiction to other known methods employed by medical care. The ML theory
is agnostic to physiological processes, e.g., biochemical insulin impacts e.g. renal, hepatic effects of insulin
resistance, effect of other possibly malfunctioning processes inside beta-cells, impairments of insulin pathways
and so on. We merely taking a different approach, modeling the insulin treatment as a controllable stochastic
process. In contrary to other known, including ML-based works, we exploit no mathematical or biological
models which express chemical dependencies.
One of the well-known difficulties related to insulin regimen control is associated with short and ultradian
insulin secretion peaks, which, at the recent time, are not well understood, [5]. The BGL is known to increase
after meal intake and to decrease during fasting periods and after physical activity. However, the peaks
render the BGL to vary according to the pattern which is hard to mathematically characterize.
In particular, patients with insulin resistance and especially those who had progressed to T2DM, have
abnormal insulin oscillations, no first phase and diminished/scattered 2nd phase of insulin secretion out of
1
beta-cells. Even more important, these oscillations may not exactly follow glucose oscillations, like it is known
to be in healthy people [5].
In order to characterize the BGL state of a patient, we assume continuous and bounded BG axes and
perform discretization by dividing the entire region into finite BG states. For example, between 70 and 300
mg/dL (see, e.g., [6]). Each state refers to continuous region, such that any BG in this region is assigned to
the corresponding state. The state can be augmented by additional individually measured parameters. In
particular, we may also account for glucose absorption rate (GAT) and HbA1c (glycosylated haemoglobin)
values.
The patient’s BGL, hence, is viewed as a stochastic process which varies according to physiological
dynamics and according to the patient activities. This process is the controllable subject such that the control
is applied by means of medications, e.g. insulin injections (IJ). The finesse of the discretization is set in a
way to assure that the next state will solely depend on the previous state and the action, i.e., IJ, if any, taken
in that state. While the BGL process is clearly continuously fluctuating through the time, the measurements
are performed in discrete time slots. Hence, we view the state of the patient at certain time marks. We are
interested in transition law, i.e. transition probabilities from one state, at some time mark t, to the next state
which the patient sees (i.e, feels) right after the next measurement which occurs at time mark t + 1. This law
is expressed by the transition probability from a state, associated with the corresponding BGL, given the set
of actions taken by the patient in that state, to the next state.
The aforementioned state transition probabilities are learned by a model-based reinforcement learning
(RL). The input data for the RL is taken from existing samples of measurements individually performed
under effect of medication applied by physician administration. We assume that such samples exist for each
individual patient. Alternatively, the individual can be assigned to a category of patients for which the
initial insulin policy is already defined. This policy will be improved henceforth and individually adjusted by
applying reinforcement learning on the individual’s measurements. In this document, we show results from
database open for purposes of academic usage [7].
The methods of ML were already addressed in [2] for the treatment of Type I diabetes Mellitis (T1DM).
The paper [2] proposes linearizion of MDP solution. The model is based on high dependence of insulin and
glucose levels. However, for T2DM this assumption is not necessarily true. T1DM treatment is facilitated
by very frequent (e.g., every several minutes) BG measurements and actions, while T2DM measurements
are normally performed several times a day. This makes T2DM control an appropriate candidate for the
stochastic modeling by discrete MDP with discrete actions control. The prediction of BGL was addressed
in [3] and references therein, giving a stronger emphasis to T1DM. Neural Network (NN) based model is
presented in [16], aimed to predict BGL in T2DM patients. The training was performed on other patients for
the purpose of the NN convergence. In this work, the crucial learning part is performed using individual data,
with objective to individually adjust to each patient. Authors of this model suggest that convergence of NN
by sample data from other patients may cause a bias and dependency on that specific data. (Note that we do
use data samples from various patients for research phases of the algorithm presented in this paper, while
adopting to the specific patient is fulfilled in the phase of on-line control.) Block-oriented Wiener modeling
for BG prediction is done in [13].
Previous works which apply ML in the context of Diabetes employ a great deal of system parameters,
which is especially helpful for the prediction. Our approach is control-oriented and is designed to completely
hide the complex impact of multiple parameters behind the stochastic process of the BGL, which we consider
as the main indication for the insulin control purpose. That is, we allow the assumption that BGLs’ stochastic
process embodies in itself the impact of all relevant physical parameters (including, in most extremely
simplified cases, carbohydrates intakes and physical activities), hence we rely on learning the statistical
properties of the process.
Using the states, actions and transition laws, we formulate Markov Decision Process (MDP), which aims
to maximize the average reward over time. For this purpose we heuristically define a mapping which transfers
2
the BGL state into reward, such that a positive reward is obtained for the healthiest states and negative
rewards are obtained at undesired BG levels. We also introduce non-linear components which aim to fine for
being in dangerous states, e.g., overly high BGL or hypoglycemia.
We formally define the MDP and describe the RL algorithm in the next section.
2
The probabilistic model
We start by defining the state space, next we define the reward function, the reward functional and the action
space.
2.1
2.1.1
Definition of spaces
The measurement space
We consider blood glucose interval of glmin to glmax , where the lower bound means an extremely low BGL
(possibly corresponding to hypoglycemia) while the upper bound means extremely high level of glucose in
blood. The BGL finesse coefficient (BFC) defines the size of the interval which is mapped to the single BG
state. For example for BF C = 1 and glmin = 70mg/dL, the lowest interval of [70, 71) corresponds to the
lowest state. The set of all possible BGL forms the space:
L = {1, · · · , L}, L =
glmax − glmin
.
BF C
Denote the BGL-state by gl, where gl ∈ L,
We allow to augment state space by additional measured parameters, e.g., glucose absorption rate (GAT),
Similarly to BGL, we perform discretization for GAT by defining the bounds of the GAT axes gamin to
gamax . The GAT finesse coefficient (GFC) is used in order to define the GAT-state:
G = {1, · · · , G}, G =
gamax − gamin
.
GF C
The measurement space M defines the set of all possible measurements of the patient. In the case both
BGL and GAT can be measured at all times we have M = L × G. In the simplest scenario where the only
component of the measurement space is BGL, we merely have M = L.
2.1.2
The daytime space
We differentiate the BGL process instantiations during the day at different measurement points. These points
are expressed by daytime space, denoted by
T = {τ1 , · · · , τT },
where T is the number of measurements per day. For simplicity we assume this number is constant.
Example 2.1. Consider approximately constant measurement timings, corresponding to morning, noon,
afternoon, evening, night.
Then, T = 5 and {τ1 , τ2 , τ3 , τ4 , τ5 } = {morning, noon, afternoon, evening, night}.
The detailed time is denoted by a couple {t, τ }. In this sense t ∈ {0, 1, · · · } represents the date, while τ ∈ T
represents the time during the day, corresponding to one of the measurements. The absolute measurement
points can be counted by denoting ι = t · T + τ . At any ι we consider ms(ι) ∈ M.
3
2.1.3
Carbohydrates intake history space
The carbohydrates finesse coefficient (CFC) is used in order to define the quantity of carbohydrates consumed
at some time mark by a patient:
C = {1, · · · , C}, C =
chmax − chmin
.
CF C
In order to wisely incorporate the Carbohydrates intake history (CIH) we will assume that at each ι last H
intakes of carbohydrates are relevant for the insulin treatment. That is, at any measurement point ι we care of
all measurement in the range [ι, ι − H], while measurements of older points are presumed of no longer having
impact on the individual. The CIH at time ι is denoted by CH(ι) = {chι }, where chi ∈ C, ∀i ∈ [ι, ι − H].
See that in example 2.1, for H = 3, at time {t, noon} we have CH({t, noon}) = {ch{t, noon}, ch{t, morning}, ch{t−
1, night}, ch{t−1, evening}}, while CH({t, afternoon}) = {ch{t, af ternoon}, ch{t, noon}, ch{t, morning}, ch{t−
1, night}}.
Such a structure allows for impact of the past carbohydrate intakes on one hand and preserves memoryless
property on th other hand. That is, CH(ι) depends only on CH(ι − 1) and ch(ι).
2.1.4
Physical activity history space
We assume physical activities have a prolonged effect, similarly to CIH. The measurements of energy spent
for a given activity can be done in metabolic equivalents, or METs, see, e.g., the table of translation of
activity to METs in [4]. The physical activity finesse coefficient (PFC) is used in order to define the number
of METs corresponding to the energy spent by an individual at some measurement (or in a period between
two consecutive measurements):
PH = {1, · · · , P H}, C =
phmax − phmin
.
PFC
To define the Physical activity history (PAH), denote at time ι the set P H(ι) = {phι }, where phi ∈ PH, ∀i ∈
[ι, ι − Y ], and Y is the size of the relevant history.
2.1.5
Patient activity space
We define the patient activity (PA) space by
PA = CH × PH
At any ι we consider pa(ι) ∈ PA. We reason we differ between PA space and the measurement space is
summarized as follows
• ph is directly known by a patient and can be foreseen by conducted activities. In contrary, ms is
assumed to be purely stochastic and can be only measured.
• The insulin medication is applied in order to control the ms, i.e., the BGL, while pa may only effect
the dosage.
• We aim to apply optimal control for given ms and ,optionally, for a given pa. The pa can be seen as
the secondary means of control, however the maintaining certain level of activities is not a part of the
insulin policy (see definition below).
4
2.1.6
Overall state space definition
We now ready to define the state space and the state. Denote
S = PA × M × T
Denote by sι ∈ S, a state at absolute measurement point ι. That is, the state consists of BGL and other
measurements according to definition of M, patient activities history according to definition of PA and
daytime of ι, according to definition of T.
Note that in the simplest scenario where the only component of the measurement space is BGL and no
patient activities are accounted for, we merely have S = L × T, and s = {gl, τ }, where gl ∈ L and τ ∈ T.
Also note, that even though ι already carries the information about τ , we will still sometimes explicitly
specify τ , for the clarity.
2.2
Reward function
Denote the optimal (the most healthy) BGL by glh . Define reward function r(s(t,τ ) ) which maps the BGL at
s at some given time {t, τ } to the value which quantifies the quality of the healthiness of a patient with BGL
at s(t,τ ) . The linear reward component, normalized to 1, is given by
rl (s) = rl (g) = 1 −
|gl − glh |
gl1 − glL
Define a subset of dangerous states Lhyp ∈ L of being close to hypoglycemia by Lhyp = {1, · · · , Lc }, Lc < L.
Normally, Lc is small. It defines the number of states with critically low BGL. Define the non-linear reward
component which fines for being close to hypoglycemia
rn (s) = rn (g) = Igl<glLc · [1 −
gl − glLc
],
glLc
where I is the standard indicator function. The joint instantaneous reward is given by
r(g) = rl (g) − rn (g)
.
2.3
Action Space
The action space consists of set of possible insulin related medical actions. We allow for finite number
of treatments, in particular, the most known of them - short-acting (Actrapid-like) insulin preparations,
intermediate-acting (NPH-like) and long-acting (Ultratard-like) insulin preparations. Denote the sets of
possible dosages
As = {as1 , · · · , as|As | }, Ai = {ai1 , · · · , ai|Ai | }, Al = {al1 , · · · , al|Al | },
corresponding the short-acting, intermediate-acting and long-acting insulin medications. Note that the first
values of the spaces as1 , ai1 , al1 are equal to 0, meaning no mediation of that type is given. As long as the
medications can be administered concurrently we assume that the action space is given by
A = A s × A i × Al
At each state s ∈ S, an action a ∈ A is chosen. At time mark ι, a(ι) is a triplet {as(ι) , ai(ι) , al(ι) }.
5
2.4
Transition Probabilities
The transitions between states occurs at every absolute measurement point according to transition probabilities
given by p(s0(ι+1) |s(ι) , a(ι) ). That is, the probability of getting to the next state s0 , given that the previous
state was s, and action a was taken. Clearly,
X
p(s0(ι+1) |s(ι) , a(ι) ) = 1,
s0
where the summation is over all possible states at ι + 1.
Clearly, these probabilities are unknown a priori. Hence, the objective is to statistically learn them using
a patient’s measurements, under previously applied insulin regime. This regime could be applied according to
doctor’s purely medical (i.e., non-mathematical) considerations. Once these probabilities are learned, the
new, optimal insulin policy is derived.
2.5
Total reward functional
Define the total discounted reward, with positive discount factor γ < 1.
J =E
∞
X
γ ι r(s(ι) ),
(1)
ι=0
The discount factor γ has two important interpretations. The first one follows from the known analytical
property which allows the sum in (1) to converge. The second one advocates the reasoning of ”feeling better
now” is more important than ”feeling better in a distant future”. Therefore, BGL rewards for the distant
time marks are discounted with geometrically decreasing discount multiplicative. The alternative approach,
which values equally the feeling throughout the day employs the following definition
J =E
τT
∞ X
X
t
γ r(s(t,τ ) ) = E
t=0 τ =τ1
3
∞
X
γ
t=0
τT
X
t
r(s(t,τ ) ).
(2)
τ =τ1
MDP and RL solution
3.1
The Bellman equation
Write the equation (1), for the given initial state s(0) as follows
J π (s(0) ) = E
∞
X
γ t r(s(t) ) = r(s(0) ) + E
t=0
∞
X
γ t r(s(t) )
(3)
t=1
Denote by π a policy which selects action at each state. State s(1) is set at time mark t = 1, according to
the transition probability from state s(0) , given action aπ (s(0) ) = {aπ,s (s(0) ), aπ,i (s(0) ), aπ,l (s(0) )}, which is
chosen according to π.
Define the value function given an initial state:
V (s(0) ) = max J π (s(0) )
π
6
(4)
V (s(0) ) indicates the optimal total reward obtained for the BGL throughout time, when starting BGL was as
in s(0) . We use next the dynamic programming (DP) principle. Expand (3) as follows
J π (s(0) ) = r(s(0) ) + E
∞
X
γ t r(s(t) ) = r(s(0) ) +
X
p(s1 |a(s0 ), s0 )J π (s(1) )
(5)
s1
t=1
Applying DP on the value function gives the Bellman equation (see e.g., [1])
X
V (s(0) ) = r(s(0) ) + max
p(s1 |a(s0 ), s0 )V (s(1) )
a(s0 )
(6)
s1
Denote V the vector of all V (s). The Bellman equation (6) is solved by the value function, a result of a
mapping from the state space to the space of the total discounted reward, which is complete metric space,
denote it by V:
V : S 7→ V,
equipped with a suitable metric kVa − Vb k. Observe that (6) can be written with operator T , that is, V = T V .
By a well-known result (see, e.g., [1]), operator T is strict contraction (i.e., αkVa − Vb k < kVa − Vb k, for
some 0 < α < 1). Therefore, T has a fixed point (see, e.g. [11, Theorem V.18]). This fixed point is V and it
constitutes the unique solution to the Bellman equation (6). The reasoning above means V is found by a
well-known method of value iteration (see, again, [1]). That is, T is iteratively applied, starting with initial
values of some U ∈ V, till the arbitrarily close convergence to the fixed point V .
3.2
Algorithm formulation
Observe that (6) can only be solved by using transition probabilities, as were defined in previous section.
These probabilities constitute the dynamics of the stochastic process of BGL and the response to the actions,
i.e. the insulin preparations. The straightforward approach to calculate them is by mere statistical learning
over the existing vector of samples of measurements of BGL paired with the corresponding actions.
We formulate the complete Insulin Optimization Policy Algorithm next. See Figure 3.2 below for the
complete formulation. The phase A is the initialization of the vector of statistics of ν(s0 , a, s) which counts all
occurrences of being in state s, acting by applying a and passing to the next state s0 . The phase B comprises
the learning phase where acting is done by initial policy π 0 , which normally taken from the same samples,
and stems from doctor’s heuristic consideration treating the individual patient. The output of this phase is
the transition probabilities. These probabilities are exploited in the phase C to perform the value iteration
and to retrieve the optimal policy π ∗ . The number of iterations depends on the size of the vector V and is
heuristically set, in order to achieve the desired level of convergence. Finally, phase D is the exploitation
part, which exploits the latest found optimal policy π. The phase keeps tracking the transition occurrences
and updates the policy every M transitions.
The final phase reflects possible changes in the BGL process properties through the time.
4
Optimal policy result
In this section we use data from [7], in order to demonstrate the activation of the algorithm described in
the previous section. Both examples presented in this section are solely based on short vectors of several
hundreds of measurements of BGL. Anything else, e.g., carbohydrates intakes and physical activities are
presumed to be embodied in the BGL process. Clearly, the obtained policy is only a presumable outcome, as
the learning was done over short-sized vectors. While the BGL (simply denoted as Glucose in the graphs
below) scale is presented starting from minimal measurement and ending by maximal BGL measurement, not
7
Insulin Optimization Policy Algorithm
A. Initialization
1. Initialize statistical data ν(s0 , a, s) = 0, for all triplets {s0 , a, s}
2. Initialize the value function V (s) for all initial states s.
B. Learning from the training sequence of length N
1. set n = 0
2. Visit s = sn , see the action a = an , a ∈ π 0 , taken in that state and the next state
s0 = sn+1 . Update ν(s0 , a, s) = ν(s0 , a, s) + 1
3. Increment n, if n < N go to 1.
4. Calculate p(s0 |a, s) =
0
Pν(s ,a,s)
0
s0 ν(s ,a,s)
C. Value function and policy calculation
1. Use p(s0 |a, s) to perform value iteration till desired level of convergence of V .
2. Apply the max operator at each state s to find the best action. Set argmaxa ∈ π ∗ , the
optimal policy.
D. Policy on-line tracking and calibration
1. Initialize M , set n = 0.
2. Visit s = sn , see the action a = an , a ∈ π ∗ , taken in that state and the next state
s0 = sn+1 . Update ν(s0 , a, s) = ν(s0 , a, s) + 1
3. Increment n, if n < M go to 1.
4. Calculate new p(s0 |a, s)
5. Use new p(s0 |a, s) to perform again value iteration
6. Update the new π ∗ .
at all points in the BGL scale the policy any policy is indicated. The reason for this stems from the limited
data size. In particular, the action outcome cannot be learned in the case no occurrence of any action for
that specific BGL was ever recorded. For this reason the preliminary policy π 0 should be carefully selected.
The best anticipated practice would be having an assessment of a particular individual and assigning them
to the specific category of policies. Once the successful assignment is done, the correction is expected to be
effective even if only limited period of individualized measurements is offered. We further elaborate in the
Future Work section.
5
Future Work
The future work is aimed at two directions.
• Producing a set of categories of individuals. The individuals would be assigned into the finite number
of policy sets. Each set will contain patients with resembling (but clearly not similar) insulin regime.
8
Figure 1: Policy example 1, 943 measurement points.
Figure 2: Policy example 2, 340 measurement points.
9
The patients may also have other resembling parameters, e.g., body weight, age, etc. The categorizing
process will be done by both heuristic assignment and correlation study.
• The second direction relates tot the pure ML approach and is directed towards coping with the size of
of the state-space. For this purpose, approach from approximate MDP (AMDP) will be introduced.
See, e.g., methods described in [10, Chapter 7].
References
[1] D. Bertsekas. Dynamic programming and optimal control, volume 2. Athena Scientific Belmont, MA,
1995.
[2] E. Daskalaki, P. Diem, and S. G. Mougiakakou. Model-free machine learning in biomedicine: Feasibility
study in type 1 diabetes. PloS one, 11(7):e0158722, 2016.
[3] E. I. Georga, V. C. Protopappas, and D. I. Fotiadis. Glucose prediction in type 1 and type 2 diabetic
patients using data driven techniques. In Knowledge-oriented applications in data mining. InTech, 2011.
[4] Harvard School of Public Health. Measuring Physical Activity. https://www.hsph.harvard.edu/
nutritionsource/mets-activity-table/, 2017.
[5] R. I. Holt, C. Cockram, A. Flyvbjerg, and B. J. Goldstein. Textbook of diabetes. John Wiley & Sons,
2016.
Blood glucose
[6] Joslin Diabetes Center.
Goals-for-Blood-Glucose-Control.html, 2017.
chart.
http://www.joslin.org/info/
[7] M. Lichman, University of California, Irvine, School of Information and Computer Sciences. UCI machine
learning repository. https://archive.ics.uci.edu/ml/datasets/Diabetes+130-US+hospitals+
for+years+1999-2008, 2013.
[8] Mayo Clinic.
Blood sugar testing: Why, when and how.
http://www.mayoclinic.org/
diseases-conditions/diabetes/in-depth/blood-sugar/art-20046628, 2017.
[9] S. Moscou. Getting the word out: advocacy, social marketing, and policy development and enforcement.
Public Health Nursing, page 285, 2010.
[10] W. B. Powell. Approximate Dynamic Programming: Solving the curses of dimensionality, volume 703.
John Wiley & Sons, 2007.
[11] M. Reed and B. Simon. Methods of modern mathematical physics: Functional analysis, volume 1. Gulf
Professional Publishing, 1980.
[12] C. M. Ripsin, H. Kang, R. J. Urban, et al. Management of blood glucose in type 2 diabetes mellitus.
Am Fam Physician, 79(1):29–36, 2009.
[13] D. K. Rollins, N. Bhandari, J. Kleinedler, K. Kotz, A. Strohbehn, L. Boland, M. Murphy, D. Andre,
N. Vyas, G. Welk, et al. Free-living inferential modeling of blood glucose level using only noninvasive
inputs. Journal of process control, 20(1):95–107, 2010.
[14] U.S. National Library of Medicine. Blood Glucose Self-Monitoring. https://meshb.nlm.nih.gov/
record/ui?ui=D015190, 2017.
[15] World Health Organization. Diabetes facts list. https://web.archive.org/web/20130826174444/
http://www.who.int/mediacentre/factsheets/fs312/en/, 2013.
10
[16] R. A. Zitar and A. Al-Jabali. Towards neural network model for insulin/glucose in diabetics-ii. Informatica,
29(2), 2005.
11
| 3cs.SY
|
DEFORMATIONS OF FUNDAMENTAL GROUP REPRESENTATIONS AND
EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
arXiv:1609.02644v1 [math.GT] 9 Sep 2016
SON LAM HO
A BSTRACT. In this article we construct a type of deformations of representations π1 (M ) → G
where G is an arbitrary lie group and M is a large class of manifolds including CAT(0) manifolds.
The deformations are defined based on codimension 1 hypersurfaces with certain conditions, and
also on disjoint union of such hypersurfaces, i.e. multi-hypersurfaces. We show commutativity
of deforming along disjoint hypersurfaces. As application, we consider Anosov surface groups in
SO(n, 1) and show that the construction can be extended continuously to measured laminations,
thus obtaining earthquake deformations on these surface groups.
1. I NTRODUCTION
The Fenchel-Nielsen twist is one of the most fundamental tools in studying the deformation
space of a hyperbolic surface M , equivalently the Teichmueller space T (M ). Geometrically it can
be described as cutting the surface along a simple closed geodesic, do a twist of some length t and
then glue back. However these deformations can also be described algebraically and perhaps more
naturally so. That is the point of view of this paper: we will define a type of algebraic deformations
of representations ρ : π1 (M ) → G where G is an arbitrary lie group and M is a manifold with
contractible universal cover. It turns out that many geometric deformations are special cases of this
construction if we consider only the holonomy representation, for example, bending a quasifuchsian
surface group defined by Thurston [17], Johnson-Millson bending [13], the twist-bulge deformation
of a convex real projective surface by Goldman [6], etc. Interestingly, the starting representation ρ
from which we deform need not be discrete.
1.1. Construction and results. Let M be an oriented surface of genus g > 1 and N ,→ M a
directed simple closed curve, this is the case of most interest to us even though our construction
applies more generally to aspherical manifolds of higher dimensions with two-sided aspherical
hypersurfaces. Let ρ : π1 (M ) → G be faithful, and suppose that the centralizer CG (ρ(π1 (N )))
f, we assign
is non-trivial. For each lift Ni (where i = 0, 1, 2, ..) of N in the universal cover M
a transformation γi in the G-centralizer of the ρ-image of the cyclic subgroup of π1 (M ) which
preserve Ni under deck transformation. This assignment of γi also has to satisfy a condition of
equivariance, which means that the choice of γ0 for N0 determines the rest of the γi ’s. Fix a base
f, our construction can be informally described as follows. Given A ∈ π1 (M ), we
point x̃0 ∈ M
consider a directed path from x̃0 to x̃0 A where x̃0 A is the image of x̃0 under the right-action of
deck transformations. This path will cross an ordered collection of lifts N1 , ..., Nk , we can define a
new function EN,γ (ρ) : π1 (M ) → G such that:
EN,γ (ρ)(A) = ρ(A)γksk ...γ1s1
2010 Mathematics Subject Classification. 57M50, 20F65.
Key words and phrases. CAT(0) manifold, Deformation, Surface group, Quasifuchsian, Hyperbolic, Convex cocompact, Fenchel-Nielsen, Earthquakes, Bending.
1
2
SON LAM HO
where si is the intersection sign between Ni and the path from x̃0 . In fact the result does not depend
on the particular path from x̃0 to x̃0 A, as long as this path intersects Ni transversely. We can then
show that the resulting map EN,γ (ρ) : π1 (M ) → G is indeed a homomorphism. Thus for example,
when G = P SL(2, R) and ρ a holonomy representation of a hyperbolic surface, we can choose
γi inside a 1-parameter group of hyperbolic transformations and obtain a 1-parameter family of
representations corresponding to the Fenchel-Nielsen twists.
In section 2.2 we generalize the above construction to multi-curves on surfaces (and multihypersurfaces on manifolds). We will also prove a commutativity result, Theorem 2.9, which we
will state below. Let L be a multi-hypersurface, or a union of disjoint hypersurfaces on M , satisfying generic conditions. Suppose that for each component Li of lifts of L we have γi and αi chosen
equivariantly such that the deformations EL,γ (ρ) and EL,α (ρ) can be defined. Then
Theorem. (Theorem 2.9) If we have γi αi = αi γi then
EL,γ (EL,α (ρ)) = EL,α (EL,γ (ρ)).
This implies the following important corollaries: 1-parameter deformations along a hypersurface
is a flow, that is, EL,γ t (EL,γ s (ρ)) = EL,γ t+s (ρ); and deformations along disjoint hypersurfaces
commute. For example, given a P SL(2, C) surface group, bending it along a curve and twisting it
along another (disjoint) curve are commutative.
The above construction and theorem are presented in section 2. A large part of this paper is in
section 3 where we switch attention to the case of surface groups in G = SO(n, 1) = Isom(Hn )
and study the limit of deformations along weighted simple closed curves that approach a measured
lamination. Let S be a surface of genus g > 1. Thurston introduced the space of measured laminations ML(S) which can be thought of as a completion of the space of weighted simple closed C(S)
which is in fact dense in ML(S) [17]. The classical earthquake deformation is then defined to be
the limit of Fenchel-Nielsen twists as a sequence in C(S) approach a measured lamination [11]. We
aim to generalize this method for Anosov surface groups in SO(n, 1) in order to define earthquakes.
Guichard-Wienhard [7] showed that for SO(n, 1) surface groups, being Anosov is equivalent to
being convex cocompact (See also the work of Bowditch [4], Kapovich-Leeb-Porti [10]). We state
below a reduced version of their theorem.
Theorem 1.1. (Guichard-Wienhard) Let π be a finitely generated word hyperbolic group and G
a real semisimple Lie group of real rank 1. For a representation ρ : π → G, the following are
equivalent:
(i) ρ is Anosov.
(ii) There exists a continuous ρ-equivariant and injective map L : ∂∞ π → G/P
(iii) ker ρ is finite and ρ(π) is convex cocompact.
Indeed since S is a closed surface, this coincide with the notion of 1-quasifuchsian group in [9].
When π = π1 (S) and G = SO(n, 1), condition (ii) above implies that there exists a continuous
e → ∂∞ Hn whose image is the limit set Λ, a quasi-circle
ρ-equivariant injective map L : ∂∞ (S)
n
in ∂∞ H . Moreover, ρ(π) is purely loxodromic, each element of ρ(π) has an attracting and a
repelling fixed point on Λ, and the centralizer of this element must contain a 1-parameter group of
hyperbolic transformations having the same pair of fixed points. We use these 1-parameter groups
to define twist deformations of ρ along weighted simple closed curves, where the weight determines
the translation length.
To pass from simple closed curves to measured laminations, we use the geodesic currents view
e =
of measured laminations [2]. Thus a measured lamination is a π1 (S)-invariant measure on G(S)
e × ∂∞ (S)
e − ∆)/Z2 with 0 self-intersection. Convergence of weighted simple closed curves
(∂∞ (S)
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
3
e Together with the homeoto a measured lamination becomes convergence of measures on G(S).
e → Λ we can show the following convergence result.
morphism L : ∂∞ (S)
Theorem. (Corollary 3.7) For any > 0, λ ∈ ML(S) an Anosov surface group representation ρ
into SO(n, 1), there is a neighborhood U 3 λ such that for any two weighted simple closed curves
l1 , l2 ∈ U , the corresponding representations El1 (ρ) and El2 (ρ) are close.
This means that we can simply define Eλ (ρ) to be limi→∞ Eli (ρ) whenever (li ) → λ, and we have a
continuous map from ML(S) to the space of representations near ρ. This is a direct generalization
of the classical earthquake on hyperbolic surfaces. But unlike in dimension 2, simple dimension
count implies that for n > 2, these earthquakes cannot take ρ to all nearby points in the moduli
space.
1.2. Implications and further directions. In [14], McMullen defined a notion of complex earthquake: starting from a fuchsian group Γ ⊂ P SL(2, R) ⊂ P SL(2, C) it combines classical earthquake and Thurston’s bending/grafting deformation and deform the original group to become quasifuchsian. Theorem 2.9 and Corollary 3.7 implies that starting from a quasifuchsian Γ, along any
measured lamination, both earthquake and Thurston’s bending can be defined and they are commutative. Thus we can combine them into quake-bend deformations with complex parameters like
in [3]. One can then ask whether it is possible to connect 2 quasifuchsian surface groups by 2
quake-bend operations. Thurston showed that we can do that starting from a fuchsian group.
Theorem. (Thurston, [8]) The projective grafting map Gr : ML(S) × T (S) → P(S) is a homeomorphism.
where T (S) is the Teichmuller space of hyperbolic structures whose holonomy are fuchsian, and
P(S) is the space of CP 1 structures whose holonomy include all quasifuchsian groups.
We have Anosov surface groups in G = SO(n, 1) form an open subset QF G (S) of the moduli
space Hom(π1 (S), G)/G of representations up to conjugations, but they are in general not a whole
component of this space. An interesting question is whether earthquake paths Etλ (ρ) can go outside
of the closure of QF G (S).
Another interesting direction is the question of Fenchel-Nielsen coordinates for SO(n, 1) surface groups, in particular SO(4, 1). Tan [15] and Kourouniotis [12] constructed complex FenchelNielsen coordinates for the case of P SL(2, C) = SO+ (3, 1). The situation in SO(4, 1) is more
complicated since in some cases the bending parameter can be any SO(3) rotation, and SO(3) is
not abelian. Moreover, by dimension count there may be up to 4 dimensions of internal parameter
for each pair-of-pants in the decomposition, these parameters specify the arrangement of rotation
axes. Some work has been done in [16] to study pair-of-pants groups in dimension 4, but the whole
picture remains mysterious.
Acknowledgement. I would like to thank Jean-Marc Schlenker and Virginie Charette for being my
mentors during the writing of this article, and I thank my advisor Bill Goldman whose works are
such an inspiration.
2. D EFORMATIONS ALONG HYPERSURFACES
f is con2.1. The Construction. A manifold M is said to be aspherical if its universal cover M
tractible, or equivalently πk (M ) = 0 for all k > 1. For the rest of this section let M be a connected
aspherical manifold (possibly with boundary) of dimension at least 2 with finitely generated fundamental group, and let ι : N ,→ M be a connected properly embedded two-sided aspherical
hypersurface such that ι∗ : π1 (N ) → π1 (M ) is injective.
4
SON LAM HO
Let ρ : π1 (M ) → G be a representation into an arbitrary Lie group G. We will define deformations of ρ along the hypersurface N . An important example is when M is a hyperbolic surface and
N is a simple closed geodesic, or more generally when N is a totally geodesic hypersurface in a
hyperbolic manifold M , in these cases our construction corresponds to Johnson-Millson’s bending
in [13].
b ⊂M
f denote the preimage of N in the universal cover. Then N
b is a disjoint union of a
We let N
e which is
countable collection N = {N0 , N1 , ...} of connected components, each Ni is a copy of N
f
f
contractible and of codimension 1 in M . So M − Ni has two components with a common boundary
Ni .
Definition 2.1. We define the dual tree T to N ⊂ M to be the tree whose vertices are connected
f−N
b and edges are Ni . The adjacency of vertices and edges corresponds to the
components of M
f−N
b with Ni ’s.
adjacency of components M
Each vertex of the tree T possibly has an infinite number of edges attached. Deck transformation
f induce an action on T which is transitive (but not free) on the set of vertices
action of π1 (M ) on M
and the set of edges.
f, with a corresponding base point x0 ∈ M so that x0 6∈ N . For all
Choose a base point x̃0 ∈ M
f as a right action of deck transformations, so in our notation we
A, B ∈ π1 (M, x0 ), they act on M
f. Now we will define an algebraic twist deformation of the
have x̃.(AB) = (x̃.A).B for x̃ ∈ M
representation ρ : π1 (M, x0 ) → G.
Let y0 ∈ N a base point and choose a path from x0 to y0 . By path concatenation this induces
an injective homomorphism π1 (N, y0 ) → π1 (M, x0 ) whose image is a subgroup T0 ⊂ π1 (M, x0 ).
f. We have ỹ0 is on a component of N
b and
The path x0 to y0 lifts uniquely to a path x̃0 to ỹ0 in M
we label this component N0 . The action of T0 preserves N0 , that is, N0 .A = N0 for all A ∈ T0 .
b we have Ni = N0 .Ai , so the subgroup Ti = A−1 T0 Ai preserves Ni .
For each component Ni of N
i
The following is the crucial point of our construction. We define a map γ : N → G with the
following properties:
(1) γ(Ni )ρ(A) = ρ(A)γ(Ni ) for all A ∈ Ti , that is, γ(Ni ) is in the centralizer of ρ(Ti ) in G,
(2) If A ∈ π1 (M, x0 ) such that Nj = Ni .A, then γ(Nj ) = ρ(A−1 )γ(Ni )ρ(A).
For the rest of this article, γ will be reserved to denote this map. Note that property (2) implies
property (1), since Ni = Ni .Ti . We want to check that if the centralizer of ρ(Ti ) is non-trivial then
a non-trivial γ satisfying (2) exists.
We claim that choosing γ(N0 ) 6= 1 in the centralizer of ρ(T0 ) uniquely determines γ(Ni ) for all
Ni ∈ N . For Ni ∈ N , suppose that Ni = N0 .Ai , then we can use property (2) to define γ(Ni ) =
0
ρ(A−1
i )γ(N0 )ρ(Ai ). Note that Ai is not unique for each Ni . If we have Ni = N0 .Ai = N0 .Ai then
0
−1
0
−1
N0 .Ai (Ai ) = N0 , so Ai (Ai ) ∈ T0 . Since we chose γ(N0 ) in the centralizer of ρ(T0 ) we have
0 −1
γ(N0 ) = ρ(A0i A−1
i )γ(N0 )ρ(Ai (Ai ) )
ρ(Ai0−1 )γ(N0 )ρ(A0i ) = ρ(A−1
i )γ(N0 )ρ(Ai )
So γ(Ni ) is well-defined, not depending on different choices of Ai .
Now suppose that Nj = Ni .B, and we have Ni = N0 .Ai . So we can let Aj = Ai B, thus
B = A−1
i Aj . We have
γ(Nj ) = ρ(A−1
j )γ(N0 )ρ(Aj )
−1
−1
= ρ(A−1
j Ai )ρ(Ai )γ(N0 )ρ(Ai )ρ(Ai Aj )
−1
= ρ(B )γ(Ni )ρ(B).
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
5
This is property (2). Therefore γ as above is well-defined and satisfies (1) and (2).
We are now ready to define the twist deformation of representation ρ with respect to γ. First we
f.
choose an orientation of N ⊂ M , which induces orientation of each Ni ⊂ M
Definition 2.2. Let γ : N → G be defined as above. Given A ∈ π1 (M, x0 ), a (minimal) path
f with direction from x̃0 to x̃0 .A will cross a sequence of hypersurfaces in N which we name
in M
Na1 , ...Nak in order. We define
EN,γ (ρ)(A) = E(ρ)(A) := ρ(A) [γ(Nak )sk ...γ(Na1 )s1 ]
where each si = ±1 and equals the intersection sign between Ni and the directed path x̃0 to x̃0 .A.
We say that the deformation is non-trivial if γ(Ni ) 6= 1.
Remark 2.1. Note that it is not necessary for the path from x̃0 to x̃0 A to be minimal since any overlapping would be cancelled out in the expression for E(ρ)(A), this is because of the tree structure
f−N
b . The intersection sign between Ni and the path depends on the chosen orientation of
of M
M and N . There is a dual definition of E(ρ) obtained by changing the orientation of M , or changing the orientation of N ⊂ M . Both are equivalent to switching between a “left” and a “right”
Fenchel-Nielsen twist for the case of surface groups in G = Isom+ (H2 ).
From the above definition we have a well-defined map E(ρ) : π1 (M, x0 ) → G, because a
minimal path from x̃0 to x̃0 .A induces a minimal path in the dual tree T and which is unique, so
the sequence of lines Na1 , ..., Nak is uniquely determined. The following proposition shows that
E(ρ) : π1 (M, x0 ) → G is a homomorphism.
Proposition 2.3. Let A, B ∈ π1 (M, x0 ) and E(ρ) as defined above. Then
(i) E(ρ)(AB) = E(ρ)(A)E(ρ)(B),
(ii) E(ρ)(A−1 ) = E(ρ)(A)−1 .
Therefore E(ρ) is a homomorphism.
Proof.
(i) We use notations as before in this section. Let Na1 , ..., Nap be the sequence of hypersurfaces
between x̃0 and x̃0 A, and Nb1 , ..., Nbq be the sequence of hypersurfaces between x̃0 and x̃0 B, and
let Nc1 , ..., Ncr be the sequence of hypersurfaces between x̃0 and x̃0 AB. Suppose that the definition
of E(ρ) gives us
E(ρ)(A) = ρ(A)αp ...α1
E(ρ)(B) = ρ(B)βq ...β1
E(ρ)(AB) = ρ(A)ρ(B)δr ...δ1
Where αi = γ(Nai )±1 , βi = γ(Nbi )±1 , and δi = γ(Nci )±1 , with the signs determined by the
corresponding intersection signs.
We have
E(ρ)(A)E(ρ)(B)
= ρ(A)αp ...α1 ρ(B)βq ...β1
= ρ(A)ρ(B)[(ρ(B −1 )αp ρ(B)) ... (ρ(B −1 )α1 ρ(B)) βq ...β1 ]
{z
}
|
{z
} |
Indeed β1 , ..., βq are elements in G associated with hypersurfaces Nb1 , ..., Nbq which are between
x̃0 and x̃0 .B, and ρ(B −1 )α1 ρ(B), ..., ρ(B −1 )αp ρ(B) are elements associated with hypersurfaces
Na1 .B, ..., Nap .B which are between x̃0 .B and x̃0 .AB. On the other hand, δ1 , ..., δr are elements
associated with the sequence of hypersurfaces between x̃0 and x̃0 .AB. Consider the tree structure
of the dual tree T (see Figure 1). Indeed the difference between a minimal path from x̃0 to x̃0 AB
6
SON LAM HO
βq
x̃0 B
ρ(B −1 )α1 ρ(B)
ρ(B −1 )α2 ρ(B)
β2
β1
ρ(B −1 )αp ρ(B)
x̃0
δ2
δ1
δr
x̃0 AB
F IGURE 1.
and a concatenation of 2 minimal paths x̃0 to x̃0 B to x̃0 AB is a segment of back tracking, and
along that segment which crosses let’s say m hypersurfaces, we must have cancellation between
ρ(B −1 )αm ρ(B)...ρ(B −1 )α1 ρ(B) and βq ...βq−m+1 .
So
[ρ(B −1 )αp ρ(B)...ρ(B −1 )α1 ρ(B)]βq ...β1 = δr ...δ1 .
Therefore E(ρ)(A)E(ρ)(B) = E(ρ)(AB).
(ii) A similar argument as above shows that
E(ρ)(A−1 )
= ρ(A−1 ) ρ(A)α1−1 ρ(A)−1 ... ρ(A)αk−1 ρ(A)−1
{z
} |
|
{z
}
= α1−1 ...αk−1 ρ(A−1 )
= E(ρ)(A)−1 .
For the case of simple closed curves in surfaces we have the following.
Proposition 2.4. Let M be a closed surface of genus g > 1 and let N, L be disjoint simple closed
curves in distinct homotopy classes, and let ρ : π1 (M ) → G be a representation such that ρ(π1 (N ))
and ρ(π1 (L)) have non-trivial centralizers. Then non-trivial deformations (as constructed in definition 2.2) of ρ along N and L are distinct.
Proof. We cut the surface M along N and obtain a surface M 0 with boundary which still contain
L, so we can choose a base point x0 ∈ M in the same component containing L (if N is a separating
curve). Note that the representation Eρ only changes by a conjugation as the base point changes.
Now we can choose A ∈ π1 (M, x0 ) represented by a curve intersecting L and not touching the
boundary. Thus EN (ρ)(A) = ρ(A) while EL (ρ)(A) 6= ρ(A). Thus EN (ρ) 6= EL (ρ).
2.2. Deformation along multi-hypersurfaces. In this section we will define deformations along
a set of disjoint hypersurfaces - the generalization of deforming a surface group along multicurves.
A theorem on commutativity of deformations will be shown.
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
7
Let L = N(1) ∪ ... ∪ N(n) be a collection of mutually disjoint connected hypersurfaces of M ,
each satisfies properties of N in previous section. Moreover we require that no pair N(i) , N(j) are
homotopic. Let
n
[
L = {L1 , L2 , ...} =
{N(i),1 , N(i),2 , ...}
i=1
f. As before, Ti ⊂ π1 (M, x0 )
be the collection of components of pre-images of N(1) , ..., N(n) in M
is the subgroup preserving Li .
Let γ : L → G be such that
(1) γ(Li )ρ(A) = ρ(A)γ(Li ) for all A ∈ Ti
(2) If A ∈ π1 (M, x0 ) such that Lj = Li .A, then γ(Lj ) = ρ(A−1 )γ(Li )ρ(A).
Suppose L1 , ..., Ln are N(1),0 , ..., N(n),0 in order. Then indeed, γ is determined by γ(L1 ), ..., γ(Ln ).
The following definition and proposition are straight forward generalization of previous section.
Definition 2.5. Let L = N(1) ∪...∪N(n) and γ : L → G be defined as above. Given A ∈ π1 (M, x0 ),
f with direction from x̃0 to x̃0 .A will cross a sequence of hypersurfaces in L
a (minimal) path in M
which we name La1 , ..., Lak in order. We define
EL,γ (ρ)(A) = E(ρ)(A) := ρ(A) [γ(Lak )sk ...γ(La1 )s1 ]
where each si = ±1 and equals the intersection sign between Li and the directed path x̃0 to x̃0 .A.
Proposition 2.6. EL,γ (ρ)(AB) = EL,γ (ρ)(A)EL,γ (ρ)(B). Deformation along multiple disjoint
hypersurfaces gives EL,γ (ρ) a homomorphism.
We will need the following discussion to prove commutativity of deformations. Let x0 , x00 be
different base points on M , x0 , x00 6∈ L. Choose a path from x0 to x00 which determine a lift x̃0 to
f. We will deform ρ : π1 (M, x0 ) → G in two different ways: the first using definition 2.5
x̃00 on M
and base point x0 resulting in EL,γ (ρ); the second way of deforming is by using x̃00 as base point.
0 (ρ) be the resulting representation obtained by using x̃0 as the base point as follows: for
Let EL,γ
0
A ∈ π1 (M, x0 ), we use the (possibly non-minimal) path from x̃00 to x̃00 A obtained by going from
x̃00 to x̃0 , then to x̃0 A, then to x̃00 A. By remark 2.1 we see that taking a non-minimal path does not
0 (ρ) and E
change the deformation result. We will now show that the difference between EL,γ
L,γ (ρ)
is conjugating by some transformation in G.
Lemma 2.7. Let the minimal path from x̃0 to x̃00 cross L1 , ..., Lk with intersection sign s1 , ..., sk .
Then
!
!−1
1
1
Y
Y
E 0 L,γ (ρ)(A) =
γ(Li )si EL,γ (ρ)(A)
γ(Li )si
i=k
i=k
Proof. L1 , ..., Lk are the hypersurfaces between x̃0 and x̃00 in order, so L1 A, ..., Lk A are between
x̃0 A and x̃00 A. Let La1 , ..., Lar be the hypersurfaces between x̃0 and x̃0 A. We have the path from
x̃00 to x̃0 to x̃0 A to x̃00 A crosses the following hypersurfaces
Lk , ..., L1 , La1 , ..., Lar , L1 A, ..., Lk A.
So using property (2) of γ we get
0
EL,γ
(ρ)(A) = ρ(A)
1
Y
i=k
!
ρ(A−1 )γ(Li )si ρ(A)
1
Y
i=r
!
γ(Lai )sai
k
Y
i=1
!
γ(Li )−si
8
SON LAM HO
=
1
Y
!
γ(Li )
si
ρ(A)
1
Y
i=r
i=k
!
sai
γ(Lai )
1
Y
!−1
si
γ(Li )
i=k
and we get the result.
Lemma 2.8. Let La ∈ L be hypersurface and Ta ⊂ π1 (M, x0 ) be the subgroup preserving it.
Suppose the minimal path from x̃0 to La crosses L1 , ..., Lk in order (not including La ), then
!−1
!
1
1
Y
Y
EL,γ (ρ)(Ta ) =
γ(Li )si
ρ(Ta )
γ(Li )si
i=k
i=k
Proof. We can choose x̃00 near La so that the minimal path from x̃0 to x̃00 cross L1 , ..., Lk . That is,
f−S∞ Li adjacent to La and closest to x̃0 . So x̃0 A is still in C for all
x̃00 is in the component C of M
0
i=1
0 (ρ)(A) = ρ(A) for all A ∈ T (because of path independence for definiA ∈ Ta , which means EL,γ
a
Q
−1
Q
1
1
si
si
γ(L
)
γ(L
)
tion 2.5). Applying lemma 2.7 we get EL,γ (ρ)(A) =
ρ(A)
i
i
i=k
i=k
The following theorem implies commutativity of deforming along disjoint (multi-) hypersurfaces, and it also shows that choosing γ values in a 1-parameter subgroup of the centralizer induces
a flow path of representations.
Theorem 2.9. Let γ and α be maps L → G satisfying (1) and (2), and so that γ(Li )α(Li ) =
α(Li )γ(Li ). Then
EL,γ (EL,α (ρ)) = EL,α (EL,γ (ρ)).
Proof. Note that γ on the left hand side is different from the one on the right because the starting
representations are different. When distinction is required we write γρ for the γ on the right hand
side and γE for the left hand side, similarly for α. The equation can be written more unambiguously
as
EL,γE (EL,αρ (ρ)) = EL,αE (EL,γρ (ρ)).
Note that we have yet to define γE and αE . Since, by lemma 2.8, EL,α (ρ)(Ti ) = ξi−1 ρ(Ti )ξi for
some transformation ξi , we can naturally define γE so that γE (Li ) = ξi−1 γρ (Li )ξi . Similarly can
relate αρ and αE this way.
Let A ∈ π1 (M, x0 ), let L1 , ..., Lk be the hypersurfaces between x̃0 and x̃0 A and Ti be the
subgroup preserving Li , for i = 1, .., k. Since L1 , ..., Li−1 is between x̃0 and Li , by lemma 2.8 we
have
EL,α (ρ)(Ti ) = αρ (L1 )−s1 ...αρ (Li−1 )−si−1 ρ(Ti )αρ (Li−1 )si−1 ...αρ (L1 )s1
So for i = 1, ...k
(1)
γE (Li ) = αρ (L1 )−s1 ...αρ (Li−1 )−si−1 γρ (Li )αρ (Li−1 )si−1 ...αρ (L1 )s1 .
Moreoever, by definition
(2)
EL,γ (EL,α (ρ))(A) = ρ(A) [αρ (Lk )sk ...αρ (L1 )s1 γE (Lk )sk ...γE (L1 )s1 ] .
From (1) and (2) we get
EL,γ (EL,α (ρ))(A) = ρ(A) [αρ (Lk )sk γρ (Lk )sk ...αρ (L1 )s1 γρ (L1 )s1 ] .
An analogous formula can be shown for EL,α (EL,γ (ρ))(A), and together with the commutativity
assumption αρ (Li )γρ (Li ) = γρ (Li )αρ (Li ), the theorem follows.
Corollary 2.10. Deformations along disjoint hypersurfaces commute.
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
9
2.3. Infinitesimal deformation. Let g be the lie algebra of G, let π = π1 (M ).
Definition 2.11. Suppose s : (−, ) → G is an analytic path such that s(0) = 1, that is, s(t) =
d
exp(a1 t + a2 t2 + ...) for ai ∈ g; and suppose that a1 6= 0. Then we let dt
|t=0 s(t) = a1 and it will
be called the derivative of s(t). We may also write ṡ(0) = a1 .
With the notation as in previous section, suppose we have a 1-parameter subgroup etX (where
X ∈ g) contained in the centralizer of ρ(N0 ). Thus we have a family of choices for γ(N0 ), we
write γ t (N0 ) = etX . Applying the above construction we get a differentiable 1-parameter family
of deformations of the representation ρ ∈ Hom(π, G).
ρ
Ad
Composition with the adjoint representation gives us π → G → Aut(g). An infinitesimal
deformation of Adρ is given by a 1-cocycle u : π → g. See [5].
Let A ∈ π. For simplicity of notation suppose we have a family of deformations as in previous
section given by E t (ρ)(A) = ρ(A)γkt ...γ1t where each γit = etXi is a 1-parameter group. Of
course the collection X1 , ..., Xk ∈ g depends on A. Let E t (ρ)(A) = ρ(A) exp(tu(A) + O(t2 )) for
u(A) ∈ g, in other words we have
Definition 2.12. For a smooth deformation E t (ρ) of ρ such that E 0 (ρ) = ρ, the map u : π1 (M ) → g
defined by
d
u(A) := |t=0 ρ(A)−1 E t (ρ)(A)
dt
is called the infinitesimal deformation corresponding to E t (ρ).
Indeed u is a 1-cocycle corresponding to the 1-parameter family of representations E t (ρ). We
have
exp(tu(A) + O(t2 )) = γkt ...γ1t
= etXk ...etX1
2
= et(Xk +...+X1 )+O(t )
where by the Baker–Campbell–Hausdorff formula, the coefficients for higher order t-terms on the
right hand side include various combinations nested of lie bracket [, ] between X1 , ..., Xk . Therefore
considering the linear coefficients of t we get
Remark 2.2. u(A) = X1 + ... + Xk .
3. A LGEBRAIC EARTHQUAKE ALONG MEASURED LAMINATIONS
We now switch our attention to the case where S is a closed hyperbolic surface, and Lie group
G = SO(n, 1) = Isom(Hn ), with Lie algebra g = so(n, 1). For the rest of this section, let ρ :
π1 (S) → SO(n, 1) be an Anosov representation. In this section we will define twist deformations
ρ along weighted simple closed curves, and then earthquakes along measured laminations on S. We
have
Theorem 3.1. (Guichard-Wienhard [7]) Let π be a finitely generated word hyperbolic group and
G a real semisimple Lie group of real rank 1. For a representation ρ : π → G, the following are
equivalent:
(i) ρ is Anosov.
(ii) There exists a continuous ρ-equivariant and injective map L : ∂∞ π → G/P
(iii) ker ρ is finite and ρ(π) is convex cocompact.
Considering that G = SO(n, 1) is of rank 1, and π1 (S) is word hyperbolic, we will use condition
(ii) above as the definition of Anosov representations in our case. Thus there is a ρ-equivariant
homeomorphism L : S1∞ → Λ where S1∞ is the boundary at infinity of Se and Λ is the limit set of
ρ(π1 (S)). For the rest of this article L is reserved to denote this limit set map.
10
SON LAM HO
e Following [1] and [2], we can
3.1. Measured laminations. Let A ∈ π1 (S), λ ∈ ML(S), x˜0 ∈ S.
1
1
view λ as an π1 (S)-invariant measure on G(S̃) = (S∞ × S∞ − ∆)/Z2 where Z2 acts by swapping
the two coordinates. Indeed G(S̃) is the space of unoriented geodesic on S̃.
Also considering the geodesic arc A from x˜0 to x˜0 A, and we can define λ|A to be the measure on
the space of geodesics intersecting A transversely. We have the support of λ|A is contained inside
the interior of a compact set I1 × I2 where Ii ’s are disjoint closed intervals of S1∞ , indeed I1 , I2
are separated by (neighborhoods of) the end points of the extended geodesic containing A. If a
sequence (λi ) converges to λ in ML(S) then λi |A converges to λ|A in the weak topology on the
space of measures on I1 × I2 .
Given ρ : π1 (S) → SO(n, 1) an Anosov representation, recall that the homeomorphism L :
∼
∼
1
S∞ → Λρ gives us G(S̃) → (Λρ × Λρ − ∆)/Z2 and in particular I1 × I2 → L(I1 ) × L(I2 ). Thus
any measure on I1 × I2 pushes forward to a measure on L(I1 ) × L(I2 ). In particular λ|A on I1 × I2
induces L∗ λ|A a measure on L(I1 ) × L(I2 ).
3.2. Deforming Anosov representations along weighted simple closed curves. Suppose we have
a weighted simple closed geodesic l ⊂ S, and ρ : π1 (S) → SO(n, 1) an Anosov representation.
We will now define a (right) twist of ρ along l. Following the construction in section 2.1, let x̃0 be a
base point in Se not lying on a lift of l. We choose an orientation for S and an orientation for l. The
way we construct γ, it will turn out that the orientation of l does not matter.
Notation 3.1. For x, y ∈ ∂∞ Hn , x 6= y, t ∈ R, let H(x, y, t) be the hyperbolic transformation
(loxodromic without rotation) fixing x, y with translation length t in the direction from x to y. So
x is the repelling and y is the attracting fixed point.
We have H(x, y, t) preserve the geodesic in Hn whose end-points are x, y, and it translate along
this geodesic a distance t from x to y.
e and suppose T0 ⊂ π1 (S) is the subgroup preserving
Let l0 be a lift of l in the universal cover S,
l0 under deck transform action. Then ρ(T0 ) is an infinite cyclic group, ρ(T0 ) = hτ0 i. Moreover by
properties of Anosov representations in SO(n, 1), we have τ0 is loxodromic, thus τ0 can be written
uniquely as a composition τ0 = σ0 θ0 such that σ0 = H(p0 , q0 , t0 ) is a hyperbolic transformation
in the direction of l0 , and θ0 is an elliptic transformation with p0 , q0 among its fixed points. It’s
important to note that we choose the generator τ0 such that L−1 (p0 ), L−1 (q0 ) ∈ S1∞ is respectively
the starting and ending point of the directed infinite geodesic l0 .
We have σ0 and θ0 commutes with H(p0 , q0 , t) for any t ∈ R. (This is because up to conjugation
p0 = 0 and q0 = ∞ in Rn−1 ∪ {∞} = ∂∞ Hn , so H(p0 , q0 , t) acts as scalar multiplication, θ0 acts
as an SO(n − 1) rotation on Rn−1 .) So we can choose
γ t (l0 ) = H(p0 , q0 , tw)
where w is the weight of l and t ∈ R+ , and indeed γ t (l0 ) commutes with τ0 as required by condition
(1) in section 2.1, and thus this choice of γ t (l0 ) gives us γ t (li ) = H(pi , qi , tw) for any lift li . Note
that we also have L−1 (pi ), L−1 (qi ) are respectively the starting and ending points of li . Following
Definition 2.2 we have constructed a 1-parameter family of algebraic twist deformations of ρ.
Definition 3.2. Let Elt (ρ) be the 1-parameter family of representations obtained by deforming of ρ
along the weighted simple closed curve l by choosing γ t (l0 ) = H(p0 , q0 , tw) as above. We simply
write El (ρ) for when t = 1.
Considering the boundary at infinity S1∞ = ∂∞ Se which is mapped homeomorphically to the
limit set Λρ , the picture of these deformations is very similar to the classical Fenchel-Nielsen twist
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
11
I1
x̄2 ...
x̄1
x̄k
x̃0
A
x̃0 A
ȳk
ȳ1 ȳ2 ...
I2
F IGURE 2. I1 × I2 ⊂ S1∞
(2)
. Here x̄i , ȳi are L−1 (xi ), L−1 (yi ) respectively.
deformation of a hyperbolic surface. Let A ∈ π1 (S) and let A be the geodesic arc from x̃0 to x̃0 A.
By definition we have
ρ(A)−1 Elt (ρ)(A) = γ t (lk )sk ...γ t (l1 )s1 =
L−1 (x
γ t (li )si
1
Y
H(xi , yi , tw)
i=k
−1
i ), L (yi )
if we let
= H(xi , yi , tw). Then indeed
are the end points of the lift li . If
we changed the orientation of l, the signs s1 , ..., sk would be flipped, but we would also invert the
choice of γ t (l0 ) and hence of each γ t (li ), because H(y0 , x0 , t) = H(x0 , y0 , t)−1 , thus we would
keep the deformation the same.
We will now show that all the repelling fixed points xi ’s are on one side of A and the attracting
fixed points yi ’s are on the otherside. Let x∗ , y∗ ∈ S1∞ be the endpoints of the bi-infinite geodesic
that is A extended. Then L−1 (xi ), L−1 (yi ) are in S1∞ − {L−1 (x∗ ), L−1 (y∗ )} which is the union
of two disjoint open intervals I1o , I2o . We name these intervals such that a geodesic from I1o to I2o
intersects A at a positive intersection point. (Again refer to definition 2.2.) This is because if li is
from I1o to I2o then si = 1, so γ t (li ) = H(xi , yi , tw) and so L−1 (xi ) is the starting point of li which
is in I1o . If lj is from I2o to I1o then sj = −1, so γ t (lj )−1 = H(xj , yj , tw) so γ t (lj ) = H(yj , xj , tw)
which makes L−1 (yj ) the starting point of lj which is in I2o .
Remark 3.2. xi ∈ L(I1o ) and yi ∈ L(I2o ) for i = 1, ..., k.
3.3. Proof of convergence. For the rest of this section let λ ∈ ML(S) and A ∈ π1 (S). Our goal
is to prove that if a sequence of weighted simple closed curves (li ) converges to λ, then (Eli (ρ)(A))
converges. The limit can then be defined to be Eλ (ρ)(A). Our approach for the proof of convergence
loosely follow Kerckhoff’s [11].
Notation 3.3. For x a point in a metric space X, we denote Br (x) the open ball of radius r centered
at x.
Notation 3.4. For a subset X of a topological space, we denote cl(X) the closure of X.
Notation 3.5. Let X be any set, we denote
X (2) := ((X × X) − {(x, x)|x ∈ X})/Z2
12
SON LAM HO
the set of unordered distinct pairs of points in X.
Notation 3.6. Let v(x, y) ∈ g be such that et.v(x,y) = H(x, y, t) for all t ∈ R.
Note that for w ∈ R+ we have
d
|t=0 H(x, y, tw) = w.v(x, y).
dt
Remark 3.7. Let Rn−1 be the stereographic projection coordinate of ∂∞ Hn − {∞}, and let x, y ∈
Rn−1 . Then H(x, y, t) varies analytically in SO(n, 1) as x, y, t vary. That is, the map H :
(∂∞ Hn )(2) × R → G is analytic, where ∂∞ Hn is represented by either Rn−1 ∪ {∞} or S n−1 .
We also have v : (∂∞ Hn )(2) → g is analytic.
From this point we work with a chosen positive definite inner product on g, the corresponding
left invariant metric dG on G, and the standard metric dS on S n−1 = ∂∞ Hn which induces the
(2)
product metric on S n−1 .
(2)
Lemma 3.3. Let T > 0 be a fixed constant. Let (x0 , y0 ) ∈ S n−1 , there is ε̄ > 0 and K > 0
depending continuously on (x0 , y0 ) such that for any 0 < ε ≤ ε̄ and x, x0 ∈ Bε (x0 ) and y, y 0 ∈
Bε (y0 ) we have
ktv(x, y) − tv(x0 , y 0 )k < Ktε,
and also
dG (H(x, y, t), H(x0 , y 0 , t)) < Ktε
for 0 < t ≤ T , where K depends continuously on (x0 , y0 ).
Proof. We let ε̄ = (1/3)dS (x0 , y0 ) which ensures that cl(Bε̄ (x0 )) ∩ cl(Bε̄ (y0 )) = ∅. Since
v : (∂∞ Hn )(2) → g is analytic, it is locally lipschitz, and thus lipschitz on compact subsets of
(∂∞ Hn )(2) , in particular on cl(Bε̄ (x0 )) × cl(Bε̄ (y0 )). Let K 0 be the infimum of all lipschitz constant for v on this compact set. Indeed
kv(x, y) − v(x0 , y 0 )k
|(x, y), (x0 , y 0 ) ∈ cl(Bε̄ (x0 )) × cl(Bε̄ (y0 ))}
K 0 = sup{
d((x, y), (x0 , y 0 ))
which depends continuously on (x0 , y0 ).
Let 0 < ε < ε̄, for all (x, y), (x0 , y 0 ) ∈ Bε (x0 ) × Bε (y0 ),
√
kv(x, y) − v(x0 , y 0 )k ≤ K 0 d((x, y), (x0 , y 0 )) < K 0 ε 2
√
We let K1 = K 0 2 and scale both sides by t > 0 to get the first inequality.
The inverse exponential map from a neighborhood of I ∈ G to g is analytic and bijective, so it is
lipschitz on compact subsets, in particular on the set Cx0 ,y0 ,T = {H(x, y, t)|(x, y) ∈ cl(Bε̄ (x0 )) ×
cl(Bε̄ (y0 )), t ∈ [−T, T ]}. Again we let K 00 be the infimum of all lipschitz constants for the inverse
exponential map on Cx0 ,y0 ,T which depends continuously on (x0 , y0 ) once T is fixed. Then for all
(x, y), (x0 , y 0 ) ∈ Bε (x0 ) × Bε (y0 ) and 0 < t ≤ T ,
dG (H(x, y, t), H(x0 , y 0 , t)) < K 00 ktv(x, y) − tv(x0 , y 0 )k < K 00 K1 tε.
We let K = K 00 K1 .
Notation 3.8. Let A be the geodesic path from x̃0 to x̃0 A, and let λ(A) be the λ-measure of this
path. For our purpose, the constant T in the above lemma is λ(A) + 1.
Following the discussion in section 3.1, A and λ and a choice of base point x̃0 ∈ Se determines a
(2)
compact set I1 ×I2 ⊂ S1∞ , and Anosov representation ρ determines the limit set homeomorphism
L.
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
13
Lemma 3.4. For a compact set D ⊂ G, there exists a constant C > 0 such that for any β ∈ D,
(x, y), (x0 , y 0 ) ∈ L(I1 ) × L(I2 ), and weights |t|, |t0 | < λ(A) + 1 we have
dG (H(x, y, t)β, H(x0 , y 0 , t0 )β) < CdG (H(x, y, t), H(x0 , y 0 , t0 )).
Proof. We have that the map (x, y, t, β) 7→ H(x, y, t)β is analytic with respect to any reasonable
coordinates. So the result follows from locally lipschitz argument and compactness of the domain
of (x, y, t, β). Note that C depends on D, L(I1 ) × L(I2 ) and λ(A).
Lemma 3.5. There is a constant C > 0 depending on L(I1 ) × L(I2 ) and λ(A) such that if we have
0
0
0
(x1 , P
y1 ), ...,
P(x0k , yr ) ∈ L(I1 )×L(I2 ) and real positive weights t1 , t1 , ..., tr , tr such that |ti −ti | < δ,
and ti , ti < λ(A) + 1. Then
r
r
Y
Y
dG ( H(xi , yi , ti ),
H(xi , yi , t0i )) < Crδ.
i=1
i=1
Proof. First note that by left-invariance, dG (H(xi , yi , ti ), H(xi , yi , t0i )) = dG (I, H(xi , yi , t0i − ti ).
By compactness and locally lipschitz argument, there exists a constant C 0 > 0 depending on
L(I1 ) × L(I2 ) and λ(A) such that dG (I, H(x, y, t)) < C 0 |t| for all (x, y) ∈ L(I1 ) × L(I2 ) and
|t| < λ(A). So
dG (H(xi , yi , ti ), H(xi , yi , t0i )) < C 0 δ
for all i.
|(x, y) ∈ L(I1 ) × L(I2 ) and |t| ≤ λ(A) + 1}. Let D
Let constant R = max{ dG (I,H(x,y,t))
|t|
Q
be the compact subset of distance at most R(λ(A) + 1) from I. We have ki=1 H(xi , yi , ti ) and
Qk
0
i=1 H(xi , yi , ti ) are in D. Using lemma 3.4 we get for any β ∈ D,
dG (H(xi , yi , ti )β, H(xi , yi , t0i )β) < C 00 dG (H(xi , yi , ti ), H(xi , yi , t0i )) < C 00 C 0 δ.
Therefore by triangle inequality and replacing terms of the product one by one from the right, we
have
r
r
Y
Y
dG ( H(xi , yi , ti ),
H(xi , yi , t0i )) < rC 00 C 0 δ = Crδ
i=1
i=1
where C depends only on L(I1 ) × L(I2 ) and λ(A).
Theorem 3.6. Given ρ : π → SO(n, 1) Anosov, A ∈ π1 (S), λ ∈ ML(S), for all > 0 there exists
a neighborhood U ⊂ ML(S) of λ such that for any two weighted simple closed curves l1 , l2 ∈ U
we have
dG (El1 (ρ)(A), El2 (ρ)(A)) < .
Proof. Recall our notation, here Eli (ρ) is the representation obtained from ρ by algebraic deformation along the weighted simple closed curve li .
Notation 3.9. For any µ ∈ ML(S), we abbreviate µ∗ = L∗ µ|A the induced measure on L(I1 ) ×
L(I2 ).
From lemma 3.3 we have a continuous function ε̄ : L(I1 ) × L(I2 ) → R+ , and on this compact
set ε̄ reaches a non-zero minimum value ε̄min = min{ε̄(x, y)|(x, y) ∈ L(I1 ) × L(I2 )} > 0. The
K in lemma 3.3 depends continuously on the centers of the balls considered. So we let Kmax be a
constant that works for all (x, y) in the compact set L(I1 ) × L(I2 ). Following the proof of lemma
Q
3.5 we let D be the compact subset that contains
all transformation of the form ki=1 H(xi , yi , ti )
P
as long as (xi , yi ) ∈ L(I1 ) × L(I2 ) and
ti ≤ λ(A). Let C0 be the constant of lemma 3.4 that
works for D.
14
SON LAM HO
We choose ε0 < ε̄min , and also such that
4C0 Kmax (λ(A) + 1)
The reason for choosing as such will be apparent by the end.
We have for i = 1, 2, the compact set L(Ii ) can be partitioned into m disjoint intervals L(Ii )1 , ..., L(Ii )m
such that each interval is of diameter less than ε0 , in particular each interval lie inside an open ball
of radius ε0 center at some point in L(Ii ). We may use half-open-half-closed (topologically (0, 1])
intervals to ensure they are disjoint. So L(I1 ) × L(I2 ) is partitioned into m2 squares which we
name Si,j = L(I1 )i × L(I2 )j for 1 ≤ i, j ≤ m.
ε0 <
Notation 3.10. For a square S ∈ {Si,j } we let (xS , yS ) be its center. That is, (xS , yS ) ∈ S such
that S ⊂ Bε0 (xS ) × Bε0 (yS )
Since only a finite number of geodesic leaf of λ in I1 × I2 can have positive measure, we can
assume each Si,j to be a continuity set with respect to λ∗ , that is, their boundaries have λ∗ -measure
0.
Choose U ⊂ ML(S) to be a neighborhood of λ containing all measured laminations µ such
that |λ(A) − µ(A)| < 1 and λ∗ measure and µ∗ measure are δ/2 close on every square Si,j . We
choose δ such that
δ<
6(2m − 1)C
where the constant C is from lemma 3.5. Note that m depends on ε0 which in turn depends on
, ρ, λ, A.
Let l1 , l2 be weighted simple closed curves in U with weights t1 , t2 ∈ R+ respectively. We have
∗
l1 and l2∗ are δ close on Si,j . Since l1 is a simple curve, its lifts are disjoint from each other. So,
suppose Si,j contains the endpoints of a lift of l1 , then Si0 ,j 0 cannot contain endpoints of any lift
of l1 if either i < i0 , j > j 0 or i > i0 , j < j 0 . In other words if both Si,j , Si0 ,j 0 contain endpoints
of lifts of l1 then either i ≤ i0 , j ≤ j 0 or i ≥ i0 , j ≥ j 0 . So there are at most 2m − 1 squares
containing endpoints of lifts of l1 and there is a complete ordering on this set of 2m − 1 squares.
Same statements can be made about l2 or any other geodesic lamination. Let S1 be the ordered set
of squares in {Si,j } which contain the endpoints of lifts of l1 . Similarly we define the set S2 for l2 .
The set S1 ∩ S2 also has a complete ordering compatible with both S1 and S2 .
Note that for S ∈ S1 − (S1 ∩ S2 ), l2∗ (S) = 0, so l1∗ (S) < δ. Similarly for S ∈ S2 − (S1 ∩ S2 ).
Then by lemma 3.5 we have the following:
Y
Y
H(xS , yS , l1∗ (S)) < (2m − 1)Cδ,
dG
H(xS , yS , l1∗ (S)),
S∈S1 ∩S2
S∈S1
Y
dG
Y
H(xS , yS , l1∗ (S)),
S∈S1 ∩S2
S∈S1 ∩S2
dG
H(xS , yS , l2∗ (S)) < (2m − 1)Cδ,
Y
S∈S1 ∩S2
Y
H(xS , yS , l2∗ (S)),
S∈S2
H(xS , yS , l2∗ (S)) < (2m − 1)Cδ.
Here the order in the products are determined by the ordering of S1 , S2 and S1 ∩ S2 . Therefore
we have
Y
Y
(3)
dG
H(xS , yS , l1∗ (S)),
H(xS , yS , l2∗ (S)) < 3(2m − 1)Cδ <
2
S∈S1
S∈S2
DEFORMATIONS OF REPRESENTATIONS AND EARTHQUAKES ON SO(n, 1) SURFACE GROUPS
15
By the choice of δ.
Q
Now we will show that ρ(A)−1 El1 (ρ)(A) is close S∈S1 H(xS , yS , l1∗ (S)) and similarly for
l2 .Suppose (x11 , y11 ), (x12 , y21 ), ..., (x1k1 , yk11 ) (in order) are the pairs of end points in L(I1 ) × L(I2 )
corresponding to the lifts of l1 which intersect the geodesic path from x̃0 to x̃0 A, and let t1 ∈ R+
be the weight of l1 . We have
k1
Y
Y
Y
ρ(A)−1 El1 (ρ)(A) =
H(x1i , yi1 , t1 ) =
H(x1i , yi1 , t1 )
(4)
i=1
S∈S1
(x1i ,yi1 )∈S
On the other hand,
(5)
Y
H(xS , yS , l1∗ (S)) =
Y
S∈S1
S∈S1
Y
H(xS , yS , t1 )
(x1i ,yi1 )∈S
Q
Recall theP
we have the compact set D ⊂ G and that S∈S1 ∪S2 H(xS , yS , tS ) ∈ D for any tS
such that S∈S1 tS < λ(A) + 1. Applying lemma 3.4 and 3.3 we have for any β ∈ D and
(x1i , yi1 ) ∈ S ∈ S1 ,
dG (H(xS , yS , t1 )β, H(x1i , yi1 , t1 )β) < C0 dG (H(xS , yS , t1 ), H(x1i , yi1 , t1 ))
< C0 Kt1 ε0 .
We can now estimate distance between (4) and (5) by replacing the all the terms one by one from
the right, each time adding C0 Kt1 ε0 to the distance. So
k1
Y
X
dG ρ(A)−1 El1 (ρ)(A),
H(xS , yS , l1∗ (S)) <
C0 Kt1 ε0 = C0 Kl1∗ (A)ε0
(6)
i=1
S∈S
1
< C0 Kmax (λ(A) + 1)ε0 < /4
The analogous inequality holds for l2 as well. Therefore from (3) and (6) we have
dG (El1 (ρ)(A), El2 (ρ)(A)) = dG ρ(A)−1 El1 (ρ)(A), ρ(A)−1 El2 (ρ)(A) <
Following [11] we choose a set of generators A1 , ..., A2g for π1 (S) and say that two representations ρ1 , ρ2 are close if dG (ρ1 (Ai ), ρ2 (Ai )) < for each Ai . The induced topology on the space
of representations is independent of the choice of generating set. We have the following corollary
by applying Theorem 3.6 to each generator and taking the finite intersection of open neighborhoods.
Corollary 3.7. For any > 0, λ ∈ ML(S) an Anosov surface group representation ρ into
SO(n, 1), there is a neighborhood U 3 λ such that for any two weighted simple closed curves
l1 , l2 ∈ U , the corresponding representations El1 (ρ) and El2 (ρ) are close.
This implies that for any sequence of weighted simple closed curves (li ) converging to λ ∈
ML(S), the corresponding sequence of representations Eli (ρ) is Cauchy and thus converges. Moreover, the limit of this sequence does not depend on the choice of sequence converging to λ, so we
can define Eλ (ρ) := limi→∞ Eli (ρ) which is also a representation of π1 (S). Thus we have a continuous map from ML(S) to the connected components of representations near ρ.
16
SON LAM HO
R EFERENCES
[1] J. Aramayona and C. J. Leininger, Hyperbolic structures on surfaces and geodesic currents, Lecture notes (2014).
[2] F. Bonahon, The geometry of Teichmüller space via geodesic currents, Invent. Math. 92 (1988), 139–162.
[3] F. Bonahon, Shearing hyperbolic surfaces, bending pleated surfaces and Thurstons symplectic form, Ann. Fac. Sci.
Toulouse Math. 6 (1996), 5(2): 233–297
[4] B. H. Bowditch, Geometrical finiteness with variable negative curvature, Duke Math. J. 77 (1995), no. 1, 229–274.
[5] W. M. Goldman, The symplectic nature of fundamental groups of surfaces, Adv. in Math. 54 (1984), no. 2, 200–225.
[6] W. M. Goldman, Convex projective structures on compact surfaces, J. Differential Geom. 31 (1990), 791–845.
[7] O. Guichard and A. Wienhard, Anosov representations: domains of discontinuity and applications, Invent. math.
(2012) 190: 357. doi:10.1007/s00222-012-0382-7
[8] Y. Kamishima and S. P. Tan, Deformation spaces on geometric structures, Aspects of low-dimensional manifolds,
Kinokuniya, Tokyo (1992), 263–299.
[9] M. Kapovich, Kleinian groups in higher dimensions, Progress in Math. Vol. 265, 485–562.
[10] M. Kapovich and B. Leeb and J. Porti, Lectures on Anosov representations I: Dynamical and geometric characterizations, preprint (2016).
[11] S. P. Kerckhoff, The Nielsen realization problem, The Annals of Math. 117 (1983), no. 2, 235–265.
[12] C. Kourouniotis, Complex length coordinates for quasifuchsian groups, Mathematika, 41 (1994), 173–188.
[13] D. Johnson and J. J. Millson, Deformation spaces associated to compact hyperbolic manifolds, Discrete Groups in
Geometry and Analysis, Vol. 67 Progress in Math., 48–106.
[14] C. McMullen, Complex earthquakes and Teichmuller theory, J. Amer. Math. Soc., 11, (1998), no. 2, 283–320.
[15] S. P. Tan, Complex Fenchel-Nielsen coordinates for quasi-Fuchsian structures, Internat. J. Math 5 (1994), no. 2,
239–251.
[16] S. P. Tan and Y. L. Wong and Y. Zhang, Generalized Delambre-Gauss formulas for oriented, augmented, rightangled hexagons in hyperbolic 4-space, Adv. Math. 230, (2012), 927–956.
[17] W. P. Thurston, The geometry and topology of 3-manifolds, Princeton University Lecture Notes, 1982, online at
http://www.msri.org/publications/books/gt3m
D EPARTMENT OF M ATHEMATICS , U NIVERSIT É DE S HERBROOKE , S HERBROOKE , QC C ANADA .
| 4math.GR
|
Nonparametric intensity estimation from indirect point process
observations under unknown error distribution
Martin Kroll∗
arXiv:1703.05619v1 [math.ST] 16 Mar 2017
January 19, 2018
Synopsis
We consider the nonparametric estimation of the intensity function of a Poisson point process in a circular model from indirect observations N1 , . . . , Nn . These observations emerge
from hidden point process realizations with the target intensity through contamination with
additive error. Under the assumption that the error distribution is unknown and only available by means of an additional sample Y1 , . . . , Ym we derive minimax rates of convergence
with respect to the sample sizes n and m under abstract smoothness conditions and propose
an orthonormal series estimator which attains the optimal rate of convergence. The performance of the estimator depends on the correct specification of a dimension parameter whose
optimal choice relies on smoothness characteristics of both the intensity and the error density. Since a priori knowledge of such characteristics is a too strong assumption, we propose
a data-driven choice of the dimension parameter based on model selection and show that
the adaptive estimator either attains the minimax optimal rate or is suboptimal only by a
logarithmic factor.
Key words and phrases: Poisson point process, intensity function, nonparametric estimation,
minimax theory, adaptive estimation, statistical inverse problem
AMS 2010 Subject Classification: 60G55, 62G05
1. Introduction
Point process models are used in a wide variety of applications, including, amongst others,
stochastic geometry [Sto+13], extreme value theory [Res87], and queueing theory [Bré81]. Each
realization of a point process is a random set of points {xj } which can alternatively be represented
P
as an N0 -valued random measure j δxj where δ• denotes the Dirac measure concentrated at •.
Poisson point processes (PPPs) are of particular importance since they serve as the elementary
building blocks for more complex point process models. Let X be a locally compact second
countable Hausdorff space, X the corresponding Borel σ-field and Λ a locally finite measure on
the measurable space (X, X ), i.e., Λ(C) < ∞ for all relatively compact sets C in X . A random
P
set of points N = {xj } from X (resp. the random measure N = j δxj ) is called Poisson point
process with intensity measure Λ if
• the number NC = |N ∩ C| of points located in C follows a Poisson distribution with
parameter Λ(C) for all relatively compact C ∈ X , and
∗
Universität Mannheim. Institut für Mathematik. A5, 6. D-68131 Mannheim, Germany.
B: [email protected]. Financial support by the Deutsche Forschungsgemeinschaft
(DFG) through the Research Training Group RTG 1953 is gratefully acknowledged. I am indebted to Jan
Johannes and Martin Schlather for helpful comments on the paper.
• for all n ∈ N and disjoint sets A1 , . . . , An ∈ X , the random variables NA1 , . . . , NAn are
independent.
It is well-known that the distribution of a PPP is completely determined by its intensity measure.
Hence, from a statistical point of view, the (non-parametric) estimation of the intensity measure or its Radon-Nikodym derivative (the intensity function) with respect to some dominating
measure from observations of the point process is of fundamental importance.
Inference and testing problems for Poisson and more general point processes have been tackled in a wide range of scenarios. The monographs [Kar91] and [Kut98] offer a comprehensive
overview and discuss both parametric and nonparametric methods. From a methodological
point of view, our approach in this paper is related to the article [RB03] where the estimation
of the intensity function from direct observations was considered. As in the present paper, the
analysis of the adaptive estimator in [RB03] is based on appropriate concentration inequalities for Poisson point processes. Whereas the concentration inequalities developed and applied
in [RB03] represent analogues of results for random variables due to [Mas00], one main tool of
our approach are analogues of concentration inequalities due to [KR05] that we have derived in
a separate manuscript [Kro16]. Other approaches to nonparametric intensity estimation from
direct observations, without making a claim to be exhaustive, can be found in [BB09] (where
the performance of a histogram estimator under Hellinger loss is analysed), [Bir07] (using a testing approach to model selection), [GN00] (using a minimum complexity estimator in the Aalen
model), and [PW04] (suggesting a wavelet estimator in the multiplicative intensity model).
Theoretical work on intensity estimation has recently been motivated by applications to genomic data. The model considered in the article [Big+13] is motivated by data arising throughout the processing of DNA ChIP-seq data. The article [San14] takes its motivation from the
analysis of genomic data as well. In that paper, the author studies nonparametric inference
of a so-called reproduction function from one realization of an aggregated point process and
additional observations related to the model. The observations in that paper are not of the
same type as the ones that we will consider here, although the estimation problem can also
be ascribed to the area of intensity estimation from indirect observations. In addition, let us
mention two further articles where the development of nonparametric statistical methods for the
analysis of point processes was inspired by applications from biology: first, motivated through
DNA sequencing techniques, the article [SZ12] introduces a change-point model for nonhomogeneous Poisson processes occurring in molecular biology. Second, the article [ZK10] considered
the nonparametric inference of Cox process data by means of a kernel type estimator.
e1 , . . . , N
en
Usually one aims to estimate the intensity function λ from direct observations N
where
X
ei =
N
δxij
(1.1)
j
are realizations of a PPP with the target intensity λ.
In this paper, however, we assume that we are interested in the nonparametric estimation
of the intensity function λ without having access to the observations in (1.1). Instead, we are
in the setup of a Poisson inverse problem [AB06] where we can only observe N1 , . . . , Nn given
through
X
δyij .
(1.2)
Ni =
j
ei by the identity yij = xij + εij − ⌊xij +
The indirect observations Ni are related to the hidden N
εij ⌋. The definition of the yij as the fractional part of the additively contaminated xij yields a
circular model by means of the usual topological identification of the interval [0, 1) and the circle
of perimeter 1. Assumptions concerning the intensity and the errors will be discussed below in
more detail.
2
Note that the circular definition of the general model (1.2) is convenient to model the case of
periodic intensity functions which is of particular importance in applications: periodic intensity
functions are suitable to model the occurence of events that are subject to a natural temporal
period (day, week, . . . ), for instance financial transactions or gun crimes. We refer the interested
reader to [HMZ03] for references concerning the wide range of applications.
The model (1.2) is closely related to (circular) deconvolution models. In the circular deconvolution problem (CDP) one aims at estimating the density g of a random variable X with values
in [0, 1) from repeated observations Yi = Xi + εi − ⌊Xi + εi ⌋. Here, εi i.i.d. ∼ f for some error
density f . The CDP and its analogue extension on the real line (where X is real-valued and the
observations are Yi = Xi + εi ) have been treated in a wide range of research articles (cf. [Mei09]
for a comprehensive introduction to the subject).
Note that, in contrast to our approach, the few existing papers on Poisson inverse problems
([CJ02], [AB06], [Big+13]) assume the error distribution to be known. This conservative assumption is also present in most of the research literature dealing with (circular) deconvolution
problems. If the error density is unknown, even identifiability of the statistical model is not
guaranteed. Thus, several remedies have been introduced to overcome this problem: for instance, it is possible to impose additional assumptions on the statistical model (cf., for instance,
the article [SVB10] which deals with blind convolution under additive centred Gaussian noise
with unknown variance). Alternatively, one can consider a framework with panel data [Neu07].
Finally, one can assume the availability of an additional sample from the error density (cf., for
instance, [DH93], [Joh09], [CL10], [CL11]) to guarantee identifiability and enable inference. In
this paper, we will stick to this last option.
Let us assume that the errors εij contributing to the general model (1.2) are stationary in the
sense that εij ∼ f for some unknown error density f . Under this assumption, two models are of
particular interest:
1. the errors εij are i.i.d. ∼ f (this case will be referred to as the Poisson model throughout
the paper),
2. the errors coincide, that is εij ≡ εi ∼ f for all j (this case will be referred to as the Cox
model)
(the names Poisson resp. Cox model will be justified below). Note that in the classical (circular)
deconvolution problem a differentiation between distinct models as in the point process case is
not possible. We will study nonparametric estimation of the intensity function λ under the
Poisson and the Cox model from observations
N1 , . . . , Nn
i.i.d.
and
Y 1 , . . . , Ym
i.i.d. ∼ f
(1.3)
where the Ni are given as in (1.2). A natural aim here is to detect optimal rates of convergence
in terms of the sample sizes n and m and to construct adaptive estimators attaining these rates.
It has to be remarked that the Cox model has already been studied intensively in [Big+13]:
the authors of that paper exclusively consider the case that the error density f is known (making
the Y sample in (1.3) needless) and ordinary smooth, that is, the Fourier coefficients of f are
polynomially decreasing. Note that our investigation in this paper allows to consider error
densities with faster rates of decay. Under the stated assumptions, the article [Big+13] provides
a remarkable proof of a minimax lower bound over Besov spaces and suggests a hard-thresholding
wavelet series estimator which automatically adapts to unknown smoothness and attains a rate
which is optimal up to a logarithmic factor. Moreover the authors show (cf. Theorems 6.1
and 6.2 in [Big+13]) that it is impossible to construct a consistent estimator of the intensity on
the basis of a preceding ’alignment step’.
From a methodological point of view, our approach is inspired by the one conducted in [JS13].
In contrast to that paper, the proof of the minimax lower bound in our setup has to deal with
3
the different nature of the observations. The key argument here is that the Hellinger distance
between Poisson point processes can be bounded from above by the Hellinger distance between
the corresponding intensity measures. We consider orthonormal series estimators of the form
X
b =
λ
k
0≤|j|≤k
c e
[λ]
j j
(1.4)
c is an appropriate estimator of the Fourier coefficient [λ]
where ej (·) = exp(2πij·) and [λ]
j
j
corresponding to the basis function ej (·) (see Section 2 for details). Of course, this estimator
P
is motivated by the L2 -convergent representation λ = j∈Z [λ]j ej for square-integrable λ. It
b crucially depends on the choice of the
will turn out that the performance of the estimator λ
k
dimension parameter k and that its optimal value depends on smoothness characteristics of the
intensity that are usually not available in practice. In order to choose k in a completely datadriven manner, we follow an approach based on model selection (cf., for instance, [BBM99] or
[Com15]) and select the dimension parameter as the minimizer of a penalized contrast criterion,
b ) + pen },
kb := argmin {Υ(λ
k
k
0≤k≤Knm
where Knm ∈ N0 (depending both on the samples sizes n, m ∈ N and the random observations)
determines the set of admissible models, Υ is a contrast function and penk a penalty term
which will be specified in more detail below. Our choice of the penalty term is non-deterministic
but random already in the partially adaptive case where one assumes only the smoothness of
the intensity to be unknown but the smoothness of the error density to be known. For the
theoretical analysis of the adaptive estimator we need Talagrand type concentration inequalities
tailored to the framework with PPP observations which cannot be directly transferred from
results applied in the usual density estimation or deconvolution frameworks (cf. Remark 2.3
in [Kro16]). As already mentioned above, these inequalities have already been derived in a
separate manuscript [Kro16], and only the specific results needed for our application in this
paper are stated in the appendix.
The article is organized as follows: in Section 2 we introduce our methodological approach and
in Section 3 we consider our nonparametric estimation problems from a minimax point of view.
Then, Section 4 considers adaptive estimation of the intensity for the Poisson model, whereas
Section 5 deals with adaptive estimation for the Cox model.
2. Methodology
2.1. Notation
Throughout this work we will assume that the intensity λ and the density f belong to the space
L2 := L2 ([0, 1), dx) of square-integrable functions on the interval [0, 1). Let {ej }j∈Z be the
complex trigonometric basis of L2 given by ej (t) = exp(2πijt). The Fourier coefficients of a
function g ∈ L2 are denoted as follows:
[g]j =
Z
0
1
g(t)ej (−t)dt.
For a strictly positive symmetric sequence ω = (ωj )j∈Z we introduce the weighted norm k · kω
P
defined via kgk2ω := j∈Z ωj |[g]j |2 . The corresponding scalar product is denoted with hg, hiω =
P
j∈Z ωj [g]j [h]j . Throughout the paper, we use the notation a(n, m) . b(n, m) if a(n, m) ≤
C · b(n, m) for some numerical constant C independent of n and m.
4
2.2. The minimax point of view
e of λ by means of the mean inWe will evaluate the performance of an arbitrary estimator λ
e − λk2 ]. We will take up the minimax point of view and
tegrated weighted squared loss E[kλ
ω
consider the maximum risk defined by
e − λk2 ]
sup sup E[kλ
ω
(2.1)
λ∈Λ f ∈F
where Λ and F are classes of potential intensity functions λ and densities f , respectively. Note
that in the case of a known error density f one would only consider the supremum over all λ ∈ Λ
for this fixed error density. If one is able to show an upper risk bound which holds uniformly
for all f belonging to some class F, one obtains an upper bound for the maximum risk in (2.1).
In order to show minimax lower bounds in terms of the sample size m in (1.3), it will turn out
sufficient to reduce the class F even to a subset of two elements (see the proof of Theorem 3.3).
The minimax risk is defined via
e − λk2 ]
inf sup sup E[kλ
ω
e
λ
λ∈Λ f ∈F
e of λ. An estimator λ∗ is called rate optimal if
where the infimum is taken over all estimators λ
e − λk2 ].
sup sup E[kλ∗ − λk2ω ] . inf sup sup E[kλ
ω
e
λ
λ∈Λ f ∈F
λ∈Λ f ∈F
The classes Λ of intensity functions and F of densities to be considered in this article will be
specified in Section 3 below where we derive lower bounds on the minimax risk for these specific
choices and prove that this lower bound is attained up to a numerical constant by a suitably
defined orthonormal series estimator.
2.3. Sequence space representation for the Poisson model
The orthogonal series estimator that we will introduce in the next subsection is crucially motivated by a sequence space representation of the considered models. This representation forms
c of the Fourier coefficients in (1.4). We
the point of origin for the definition of the estimators [λ]
j
address ourselves now to the derivation of this sequence space model.
Under the Poisson model, the observed point processes N1 , . . . , Nn in (1.3) are generated
e1 , . . . , N
en with intensity function λ by independent
from independent Poisson point processes N
random contaminations of the individual points. We emphasize again that the (unobserved)
contaminations are assumed to follow a probability law given by an unknown density f and are
to be understood additively modulo 1. Thus, the observations Ni under the Poisson model are
given by
X
Ni =
δxij +εij −⌊xij +εij ⌋
j
P
ei =
where N
j δxij is the realization of a Poisson point process with intensity function λ and
the errors εij are i.i.d. ∼ f . Note that under the Poisson model each Ni is again a realization
of a Poisson point process whose intensity function is given by the circular convolution λ ⋆ f
modulo 1 of λ with the error density f . More precisely, ℓ = λ ⋆ f is given by the formula
ℓ(t) =
Z
0
1
λ((t − ε) − ⌊t − ε⌋)f (ε)dε,
t ∈ [0, 1).
(2.2)
By the convolution theorem, we have [ℓ]j = [λ]j · [f ]j for all j ∈ Z. From Campbell’s theorem
5
(cf. [Ser09], Chapter 3, Theorem 24) it can be deduced that for measurable functions g we have
Z
E
1
0
g(t)dNi (t) =
Z
1
ℓ(t)g(t)dt
0
provided that the integral on the right-hand side exists. Exploiting this equation for g(t) =
ej (−t) and setting
n Z 1
1X
c
ej (−t)dNi (t)
(2.3)
[ℓ]j :=
n i=1 0
c = [λ] · [f ] for all j ∈ Z. More precisely, we have
we thus obtain that E[ℓ]
j
j
j
c = [λ] · [f ] + ξ
[ℓ]
j
j
j
j
for all j ∈ Z
(2.4)
with centred random variables
n Z
1X
c
c
ξj = [ℓ]j − E[ℓ]j =
n
i=1
1
ej (−t)dNi (t) −
0
Z
0
1
ℓ(t)ej (−t)dt .
2.4. Sequence space representation for the Cox model
The Cox model permits a sequence space representation similar to the one of the Poisson
model which was obtained in [Big+13]. Under the Cox model, the independent point processes N1 , . . . , Nn are generated by a random contamination of the individual points of the
e1 , . . . , N
en as for the Poisson model. In contrast to the
unobservable Poisson point processes N
ei ,
Poisson model, however, the additive error is the same for all the points of one realization N
that is the observations Ni are given by
Ni =
X
j
δxij +εi −⌊xij +εi ⌋
(2.5)
P
ei =
where N
j δxij is the realization of a Poisson point process with intensity function λ and
εi ∼ f . Alternatively, the generation of the point processes Ni can be described by the following
two-step procedure: in the first step, random shifts εi ∼ f are generated. In the second step,
conditionally on εi , Ni is drawn as the realization of a Poisson point process on [0, 1) whose
intensity function is λ(t − εi − ⌊t − εi ⌋). Thus, in this second model the observations follow the
distribution of a Cox process which is directed by the random measure with random intensity
λ(t − ε − ⌊t − ε⌋) for ε ∼ f . Note that for i = 1, . . . , n and integrable functions g we have
E
Z
0
1
g(t)dNi (t) | εi =
Z
1
0
g(t)λ(t − εi − ⌊t − εi ⌋)dt,
which implies
E
Z
0
1
g(t)dNi (t) =
Z
0
1
g(t)
Z
1
0
λ(t − ε − ⌊t − ε⌋)f (ε)dεdt =
Z
1
g(t)ℓ(t)dt,
0
where ℓ = λ ⋆ f denotes the circular convolution of the function λ and the density f as in (2.2).
Thus, the mean measure of a generic realization N obeying the Cox model has the RadonNikodym derivative ℓ with respect to the Lebesgue measure. Note that the mean measures of
the observed point processes under the Poisson and the Cox model coincide, but the observations
c defined as in (2.3)
for the Cox model stem from a Cox instead of a Poisson process. With [ℓ]
j
6
the relation
f] =
holds with [f
j
model:
P
1
n
Pn
c | ε , . . . , ε ] = [λ] · [f
f]
E[[ℓ]
1
n
j
j
j
i=1 ej (−εi ).
Thus, we get the following representation as a sequence space
c = [λ] · [f
f] + ξ ,
[ℓ]
j
j
j
j
R
(2.6)
R
where ξj = n1 ni=1 [ 01 ej (−t)dNi (t)− 01 ej (−t)λ(t−εi −⌊t−εi ⌋)dt] are centred random variables
for all j ∈ Z. The connection between the sequence space model at hand and the stated sequence
space model formulation for statistical linear inverse problems is discussed in detail in Section
2.1 of [Big+13].
2.5. Orthonormal series estimator
Recall that each λ ∈ L2 can be represented by its Fourier series representation as λ =
Hence, in view of (2.4) and (2.6), a natural estimator of λ is given by
b =
λ
k
c
[ℓ]
j
X
c
0≤|j|≤k [f ]j
1 Ωj e j
P
j∈Z [λ]j ej .
(2.7)
P
m
c as defined in (2.3), [f
c] := 1
c 2
with [ℓ]
i=1 ej (−Yi ) and Ωj := {|[f ]j | ≥ 1/m}. Note that
j
j
m
[f ]j in (2.4) is not directly available and thus has to be estimated from the sample Y1 , . . . , Ym
f] in (2.6) cannot be observed. In contrast to the setup
in (1.3). For the Cox model, note that [f
j
f] cannot be substituted
in [Big+13] we do not assume the density f to be known and hence [f
j
by its expectation [f ]j which was suggested in [Big+13]. Since we have the additional sample
f] by [f
c] which
Y1 , . . . , Ym from f in (1.3) at hand, the most natural idea seems to substitute [f
j
j
leads to the same estimator as for the Poisson model. The additional threshold occurring in
b through the indicator function over the set Ω compensates for ’too small’
the definition of λ
j
k
c
absolute values of [f ]j and is imposed in order to avoid unstable behaviour of the estimator. The
definition of the event Ωj is in accordance with [NH97] and the chosen threshold corresponds
to the parametric rate at which [f ]j can be estimated from the sample Y1 , . . . , Ym . The optimal
choice kn∗ of the dimension parameter in the minimax framework will be determined in Section 3
b ∗ is not completely data-driven
and depends on the classes Λ and F. Thus, the estimator λ
kn
which is unacceptable in applications where the degree of smoothness of the functions λ and f
will usually not be available in advance. The data-driven choice of the dimension parameter is
discussed in Sections 4 and 5.
3. Minimax theory
3.1. Model assumptions
Let γ = (γj )j∈Z and α = (αj )j∈Z be strictly positive symmetric sequences and fix r > 0, d ≥ 1.
In this section, we derive minimax rates of convergence concerning the maximum risk defined
in (2.1) with respect to the classes
Λrγ := {λ ∈ L2 : λ ≥ 0 and
and
X
j∈Z
γj |[λ]j |2 =: kλk2γ ≤ r}
Fαd := {f ∈ L2 : f ≥ 0, [f ]0 = 1 and d−1 ≤ |[f ]j |2 /αj ≤ d}
7
of intensity functions and error densities, respectively. The regularity conditions imposed on the
sequences γ and α are summarized in the following assumption.
Assumption A γ = (γj )j∈Z , α = (αj )j∈Z and ω = (ωj )j∈Z are strictly positive symmetric
sequences such that γ0 = ω0 = α0 = 1, γj ≥ 1 for all j ∈ Z and the sequences (ωn /γn )n∈N0 and
P
(αn )n∈N0 are both non-increasing. Finally, ρ := j∈Z αj < ∞.
Note that in the special case ω ≡ 1, that is, the weighted norm k · kω coincides with the usual
the additional assumption γj ≥ 1 is contained in the requirement that the sequence
(ωn /γn )n∈N0 is non-increasing.
L2 -norm,
3.2. Minimax lower bounds for the Poisson model
We first derive lower bounds in terms of the sample sizes n and m in (1.3) for Poisson model.
Our first theorem provides such a lower bound Ψn in terms of the sample size n under mild
assumptions.
Theorem 3.1 For n ∈ N, set
ω
ωj
,
kn∗ := argmin max
γk
nαj
k∈N0
0≤|j|≤k
X
k
and
Ψn := max
Let Assumption A hold, and further assume that
(C1) Γ :=
P
−1
j∈Z γj
< ∞, and
(C2) 0 < η −1 = inf n∈N Ψ−1
n · min
Then, for any n ∈ N,
ωk ∗ P
ωj
n
∗
0≤|j|≤kn
γk∗ ,
nαj
n
e − λk2 ] ≥
inf sup sup E[kλ
ω
e
λ
λ∈Λrγ
f ∈Fαd
ω
∗
kn
γkn∗
,
X
∗
0≤|j|≤kn
ωj
.
nαj
(3.1)
for some 1 ≤ η < ∞.
ζr
· Ψn
16η
1
1
e of
√ } with δ = 1 − √
where ζ = min{ 2Γdη
, d2δ
, and the infimum is taken over all estimators λ
2
r
2 2
λ based on the observations from (1.3) under the Poisson model.
Before proceeding with the lower bound in m, let us state some remarks concerning Theorem 3.1. Firstly, it follows immediately from the proof that the lower bound Ψn holds already
P
in case of a known error density. Secondly, assuming the convergence of the series j∈Z γj−1
through condition (C1) is necessary only in order to establish the non-negativity of the hypotheses λθ considered in the proof. Finally, it is noteworthy that the proof of Theorem 3.1 can be
adapted to the case of direct observations of Poisson point processes with intensity function λ
(cf. [Kro16], Theorem 3.3 where the corresponding lower bound is obtained by replacing all the
αj with 1).
Remark 3.2 The key ingredient for the proof of Theorem 3.1 is the fact that the Hellinger
distance between two PPPs is bounded by the Hellinger distance of the corresponding intensity
measures. Since this relation holds only for the special case of Poisson processes, it cannot be
directly extended to the Cox model and the given proof fails. Thus, the derivation of minimax
lower bounds based on Fourier expansions for the Cox model in our framework remains open
and needs to be addressed in future research. Note that [Big+13] give a lower bound proof in
case of a known and ordinary smooth error density f .
The following theorem provides a lower bound Φm in terms of the sample size m.
8
Theorem 3.3 For m ∈ N, set
Φm := max
j∈N
(
1
1,
mαj
ωj γj−1 min
!)
.
(3.2)
Let Assumption A hold, and in addition assume that
√
(C3) there exists a density f in Fα d with f ≥ 1/2.
Then, for any m ∈ N,
√
e − λk2 ] ≥ 1 − 3/2 · ζ 2 rd−1/2 · Φm
inf sup sup E[kλ
ω
8
e
λ λ∈Λrγ f ∈Fαd
1
e of λ based on the
, 1 − d−1/4 } and the infimum is taken over all estimators λ
where ζ = min{ 4√
d
observations from (1.3) under the Poisson model.
Let us state some remarks concerning Theorem 3.3. First, for the proof of the theorem it
was sufficient to construct two hypotheses which are statistically indistinguishable but already
establish the lower bound Φm . This is in contrast to the proof of Theorem 3.1 where we had
∗
to construct 2kn +1 hypotheses. Second, the condition (C3) has to be imposed in order to
guarantee that the hypotheses fθ considered in the proof
belong to Fαd . It is easy to check that
√
P
condition (C3) is satisfied if ρ0 := j6=0 αj satisfies d ≥ max 4ρ20 , 1 .
Remark 3.4 The proof of Theorem 3.3 cannot be transferred to the Cox model neither. In the
proof, the equality λ−1 ⋆ f−1 = λ1 ⋆ f1 would imply only the equality of the mean measures of the
two Cox process hypotheses but not equality of their distributions (which holds true for PPPs).
The next corollary is an immediate consequence of Theorems 3.1 and 3.3.
Corollary 3.5 Under the assumptions of Theorems 3.1 and 3.3, for any n, m ∈ N,
e − λk2 ] & Ψ + Φ .
inf sup sup E[kλ
n
m
ω
3.3. Upper bound
e
λ
λ∈Λrγ f ∈Fαd
Let us now establish an upper bound for the maximum risk in terms of n and m for the estimator
b in (2.7) under a suitable choice of the dimension parameter k. More precisely, the following
λ
k
b ∗ with k ∗ defined in (3.1)
theorem establishes an upper bound for the rate of convergence of λ
kn
n
for the Poisson and the Cox model (an analysis of the proofs indicates only a slightly different
numerical constant). Thus, due to the lower bound proofs in the preceding subsection it is shown
b ∗ attains the minimax rates of convergence in terms of the samples sizes n and m under
that λ
kn
the Poisson model. Note that the optimal choice of the dimension parameter does not depend
on the sample size m.
Theorem 3.6 Let Assumption A hold and further assume that the samples N1 , . . . , Nn and
Y1 , . . . , Ym in (1.3) are drawn in accordance with the Poisson or the Cox model. Then, for any
n, m ∈ N,
b ∗ − λk2 ] . Ψ + Φ .
sup sup E[kλ
n
m
kn
ω
λ∈Λrγ f ∈Fαd
9
γ
α
Θ(Ψn )
m−
Restrictions
(p−s)∧a
a
(pol)
(pol)
(exp)
(pol)
(log n)2s+2a+1 · n−1
m−1
(pol)
(exp)
(log n)−2(p−s)
(log m)−2(p−s)
(exp)
(exp)
n
Θ(Φm )
2(p−s)
− 2p+2a+1
p
(log n)2s · n− p+a
(log m)
2s
m
·m
−p/a
−1
p ≥ s, a >
a>
if a ≥ p
1
2
1
2
p≥s
if a < p
Table 1: Exemplary rates of convergence for nonparametric intensity estimation. The rates are given in the
framework of Theorems 3.1, 3.3 and 3.6 which impose the given restrictions. In all examples ω0 = 1,
ωj = |j|2s for j 6= 0, whereas the choices (pol) and (exp) for the sequences γ and α are explained in
Section 3.4.
3.4. Examples of convergence rates
In order to flesh out the abstract results of this section, we consider special choices for the
sequences ω, γ and α and state the resulting rates of convergence with respect to both sample
sizes n and m. For the sequence ω, we will assume throughout that ω0 = 1 and ωj = |j|2s for
j 6= 0. The resulting weighted norm corresponds to the usual L2 -norm of the sth weak derivative.
Choices for the sequence γ:
narios:
Concerning the sequence γ we distinguish the following two sce-
(pol): γ0 = 0 and γj = |j|2p for all j =
6 0 and some p ≥ 0. This corresponds to the case
when the unknown intensity function belongs to some Sobolev space.
(exp): γj = exp(2p|j|) for all j ∈ Z and some p ≥ 0. In this case, λ belongs to some space
of analytic functions.
Choices for the sequence α:
Concerning the sequence α we consider the following scenarios:
(pol): α0 = 0 and αj = |j|−2a for all j 6= 0 and some a ≥ 0. This corresponds to the case
when the error density is ordinary smooth.
(exp): αj = exp(−2a|j|) for all j ∈ Z and some a ≥ 0.
Table 1 summarises the rates Ψn and Φm corresponding to the different choices of γ and α.
The rates with respect to n coincide with the classical rates for nonparametric inverse problems
(see for instance Table 1 in [Cav08] where the error variance ε2 corresponds to n−1 in our setup
and only the case s = 0 is considered).
4. Adaptive estimation for the Poisson model
The estimator considered in Theorem 3.6 is obtained by specializing the orthonormal series
estimator in (2.7) with kn∗ defined in (3.1). Thus, this procedure suffers from the apparent
drawback that it depends on the smoothness characteristics of both λ and f , namely on the
sequences γ and α. Since such characteristics are typically unavailable in advance, there is a
need for an adaptive selection of the dimension parameter which does not require any a priori
knowledge on λ and f . In order to reach such an adaptive definition for the Poisson model (the
Cox model will be dealt with in Section 5) we proceed in two steps. In the first step (treated in
Subsection 4.1), we assume that the class Λrγ is unknown but assume the class Fαd of potential
10
error densities f to be known. This assumption allows us to define a partially adaptive choice
ke of k. In the second step (treated in Subsection 4.2), we dispense with any knowledge on the
smoothness both of λ and f and propose a fully adaptive choice kb of the dimension parameter.
4.1. Partially adaptive estimation (Λrγ unknown, Fαd known)
In this subsection, we aim at choosing k equal to some ke that, in contrast to kn∗ in Section 3,
does no longer depend on the sequence γ but only on the sequence α. For the definition of ke
some terminology has to be introduced: for any k ∈ N0 , let
∆αk := max ωj α−1
j
0≤j≤k
and δkα := (2k + 1)∆αk
log(∆αk ∨ (k + 3))
.
log(k + 3)
For all n, m ∈ N, setting ωj+ := max0≤i≤j ωi , we define
Nnα
(
log(n + 3)ωj+
αj
:= inf 1 ≤ j ≤ n :
<
2j + 1
n
)
− 1 ∧ n,
α
:= inf{1 ≤ j ≤ m : αj < 640dm−1 log(m + 1)} − 1 ∧ m,
Mm
α := N α ∧ M α . Now, consider the contrast
and set Knm
n
m
b
Υ(t) := ktk2ω − 2ℜhλ
n∧m , tiω ,
t ∈ L2 .
g k )k∈N0 via
and define the random sequence of penalties (pen
g k :=
pen
δα
165 −1 c
dη · ([ℓ]0 ∨ 1) · k ,
4
n
where η ∈ (0, 1) is some additional tuning parameter. The parameter η finds its way into
the upper risk bound only as a numerical constant and does not have any effect on the rate
of convergence. The dependence of the adaptive estimator on the specific choice of η will be
suppressed for the sake of convenience in the sequel. Building on our definition of contrast and
penalty, we define the partially adaptive selection of the dimension parameter k as
b ) + pen
g k }.
ke := argmin {Υ(λ
k
α
0≤k≤Knm
b .
The following theorem provides an upper bound for the partially adaptive estimator λ
e
k
Theorem 4.1 Let Assumption A hold. Then, for any n, m ∈ N,
b − λk2 ] .
sup sup E[kλ
ω
e
k
r
d
λ∈Λγ f ∈Fα
ωk δkα
,
min α max
0≤k≤Knm
γk n
+ Φm +
1
1
+
m n
where the observations in (1.3) stem from the Poisson model.
4.2. Fully adaptive estimation (Λrγ and Fαd unknown)
We now also dispense with the knowledge of the smoothness of the error density f and propose
b
a fully data-driven selection kb of the dimension parameter such that the resulting estimator λ
b
k
adapts to the unknown smoothness of both λ and f and attains the optimal rate of convergence
in a wide range of scenarios. As in the case of partially adaptive estimation, we have to introduce
11
some notation first. For k ∈ N0 , let
b := max
∆
k
0≤j≤k
For n, m ∈ N, set
ωj
c] |2
|[f
j
1 Ωj
b
δbk := (2k + 1)∆
k
and
b ∨ (k + 4))
log(∆
k
.
log(k + 4)
c] |2 /(2j + 1) < log(n + 4)ω + /n} − 1 ∧ n,
bn := inf{1 ≤ j ≤ n : |[f
N
j
j
c] |2 < m−1 log(m)} − 1 ∧ m,
cm := inf{1 ≤ j ≤ m : |[f
M
j
cnm := N
bn ∧ M
cm . We consider the same contrast function as in the partially adaptive case
and K
d k )k∈N0 of penalities now by
but define the random sequence (pen
c ∨ 1) ·
d k := 1375η −1 · ([ℓ]
pen
0
δbk
.
n
Note that this definition does not depend on the knowledge of the sequence α. Using this
definition of a completely data-driven penalty, we define the fully adaptive selection kb of the
dimension parameter k by means of
b ) + pen
d k }.
kb := argmin {Υ(λ
k
bnm
0≤k≤K
b , we have to introduce some
In order to state and prove the upper risk bound of the estimator λ
b
k
α
further notation. We keep the definition of ∆k from Subsection 4.1 but slightly redefine δkα as
δkα := (2k + 1)∆αk
log(∆αk ∨ (k + 4))
.
log(k + 4)
For k ∈ N0 , we also define
ωj
0≤j≤k |[f ]j |2
∆k := max
and
δk := (2k + 1)∆k
log(∆k ∨ (k + 4))
,
log(k + 4)
which can be regarded as analogues of ∆αk and δkα in Subsection 4.1 in the case of a known error
density f . Finally, for n, m ∈ N, define
Nnα− := inf{1 ≤ j ≤ n : αj /(2j + 1) < 4d log(n + 4)ωj+ /n} − 1 ∧ n,
Nnα+ := inf{1 ≤ j ≤ n : αj /(2j + 1) < log(n + 4)ωj+ /(4dn)} − 1 ∧ n,
α−
:= inf{1 ≤ j ≤ m : αj < 4dm−1 log m} − 1 ∧ m,
Mm
α+
:= inf{1 ≤ j ≤ m : 4dαj < m−1 log m} − 1 ∧ m,
Mm
α− := N α− ∧ M α− , K α+ := N α+ ∧ M α+ . In contrast to the proof of Theorem 4.1 we
and set Knm
m
n
n
m
nm
b :
have to impose an additional assumption for the proof of an upper risk bound of λ
b
k
−5 for all m ∈ N.
Assumption B exp(−mαMm
α+
+1 /(128d)) ≤ C(α, d)m
Under this additional assumption, the following theorem establishes a uniform upper risk
bound for the completely data-driven estimator.
Theorem 4.2 Let Assumptions A and B hold. Then, for any n, m ∈ N,
b − λk2 ] .
sup sup E[kλ
ω
b
k
r
d
λ∈Λγ f ∈Fα
ωk δkα
,
min max
α−
γk n
0≤k≤Knm
12
+ Φm +
1
1
+
m n
where the observations in (1.3) stem from the Poisson model.
Note that the only additional prerequisite of Theorem 4.2 in contrast to 4.1 is the validity of
Assumption B.
4.3. Examples of convergence rates (continued from Subsection 3.4)
We consider the same configurations for the sequences ω, γ and α as in Subsection 3.4. In
particular, we assume that ω0 = 1 and ωj = |j|2s for all j 6= 0. The different configurations for γ
and α will be investigated in the following (compare also with the minimax rates of convergence
Assumption B is satisfied in all the considered cases.
given in Table 1). Note that the additional
n
αo
ωk δk
⋄
:=
argmink∈N0 max γk , n , that is, kn⋄ realizes the best compromise between
Let us define kn
squared bias and penalty.
Scenario (pol)-(pol):
1
1
In this scenario, it holds kn⋄ ≍ n 2p+2a+1 and Nnα− ≍ (n/ log n) 2s+2a+1 .
2(p−s)
α− . In case that s < p, the rate w.r.t. n is n− 2p+2a+1 which is the
First assume that Nnα− ≤ Mm
2(p−s)
minimax optimal rate. In case that s = p, it holds Nnα− kn⋄ and the rate is (n/ log n)− 2p+2a+1
α− ≤ N α− . If
which is minimax optimal up to a logarithmic factor. Assume now that Mm
n
α− , then the estimator obtains the optimal rate with respect to n. Otherwise, M α− ≍
kn⋄ . Mm
m
p−s
(m/ log m)1/(2a) yields the contribution (m/ log m)− a to the rate.
Scenario (exp)-(pol): Nnα− ≍ (n/ log n)1/(2a+2s+1) as in scenario (pol)-(pol). Since kn⋄ ≍ log n,
α− .
it holds kn⋄ . Nnα− and the optimal rate with respect to n holds in case that kn⋄ . Mm
2s
α−
α−
Otherwise, the bias-penalty tradeoff generates the contribution (Mm ) · exp(−2p · Mm ) to the
rate.
Scenario (pol)-(exp): It holds that kn⋄ ≍ Nnα− and again the sample size n is no obstacle for
α− , the optimal rate holds as well. If
attaining the optimal rate of convergence. If kn⋄ . Mm
α− k ⋄ , we get the rate (log m)−2(p−s) which coincides with the optimal rate with respect to
Mm
n
the sample size m.
Scenario (exp)-(exp): We have Nnα− ≍ log n and k1 ≤ kn⋄ ≤ k2 where k1 is the solution of
k12 exp((2a + 2p)k1 ) ≍ n and k2 the solution of exp((2a + 2p)k2 ) ≍ n. Thus, we have kn⋄ Nnα−
ω
and computation of γkk1 resp. δkα2 /n shows that only a loss by a logarithmic factor can occur as
1
α− . If M α− ≤ k ⋄ , the contribution to the rate arising from the trade-off
far as kn⋄ ≤ Nnα− ∧ Mm
m
n
α− )2s · exp(−2pM α− ) which deteriorates
between squared bias and penalty is determined by (Mm
m
the optimal rate with respect to m at most by a logarithmic factor.
Remark 4.3 In this paper, we have not considered the case that the Fourier coefficients of the
error density obey a power-exponential decay, that is αj = exp(−2κ|j|a ) for some κ > 0 and
α+ , Assumption B is not satisfied in
arbitrary a > 0. Indeed, for our definition of the quantity Mm
this case. This shortage can be removed by considering a more elaborate choice of the quantities
cm and M α+ as was considered in [JS13] but we do not include this here.
M
m
5. Adaptive estimation for the Cox model
Unfortunately, the approach from Section 4 cannot be transferred in order to obtain an upper
risk bound for an adaptive estimator in the case of Cox observations. Thus, in this section we
follow another approach. The price we have to pay is that we can only obtain rates that contain
13
an additional logarithmic factor. Again we split our investigation into the partially adaptive
and the fully adaptive case.
5.1. Partially adaptive case
P
ω
We define Dαk := 0≤|j|≤k αjj which might be interpreted as the dimension of the model corresponding to the linear subspace of L2 spanned by the ej with j ∈ {−k, . . . , k} in the considered
α , and K α as well as the contrast
inverse problem. In addition, we define the quantities Nnα , Mm
nm
function Υ exactly as in Section 4.1. However, we replace the definition of the penalty given for
the case of Poisson observations with
c ∨ 1) ·
g k := 2000η −1 · ([ℓ]
pen
0
α
dDαk log(n + 2)
c 2 ∨ 1) · dDk log(n + 2)
+ 2000η −2 · ([ℓ]
0
n
n
where η ∈ (0, 1). Based on this updated definition of penalty we define the adaptive choice of
the dimension parameter in the case of Cox observations by means of
b ) + pen
g k }.
ke := argmin {Υ(λ
k
α
0≤j≤Knm
Theorem 5.1 Let Assumption A hold. Then, for any n, m ∈ N,
b − λk2 ] .
sup sup E[kλ
ω
e
k
r
d
λ∈Λγ f ∈Fα
ωk Dαk log(n + 2)
,
min α max
0≤k≤Knm
γk
n
+ Φm +
1
1
+
m n
where the observations in (1.3) stem from the Cox model.
Note that the proof of Theorem 5.1 is more intricate than the one of Theorem 4.1 due to the
fact that we need to introduce some additional terms in the proof. In order to deal with these
terms we have to apply Talagrand type concentration inequalities both for Poisson processes
and random variables.
5.2. Fully adaptive case
In the fully adaptive case, we replace the dimension parameter Dαk from the previous subsection
by the estimate
X
ωj
b :=
D
1 Ωj .
k
c
2
0≤|j|≤k |[f ]j |
Moreover, as in the Poisson case, we have to adapt the definition of the penalty
c ∨ 1) ·
d k := 8000η −1 · ([ℓ]
pen
0
b
b log(n + 2)
D
k
c 2 ∨ 1) · Dk log(n + 2) .
+ 8000η −2 · ([ℓ]
0
n
n
We define the contrast function Υ exactly as in Subsection 4.1. For n, m ∈ N, set
c] |2 /(2j + 1) < log(n + 3)ω + /n} − 1 ∧ n
bn := inf{1 ≤ j ≤ n : |[f
N
j
j
c] |2 < m−1 log(m)} − 1 ∧ m,
cm := inf{1 ≤ j ≤ m : |[f
M
j
b of k in analogy to the approach
cnm := N
bn ∧ M
cm . We define the fully data-driven choice k
and K
for the Poisson model via
b ) + pen
d k }.
kb := argmin {Υ(λ
k
bnm
0≤k≤K
14
For the statement and the proof of the following theorem, define for n, m ∈ N the quantities
Nnα− := inf{1 ≤ j ≤ n : αj /(2j + 1) < 4d log(n + 3)ωj+ /n} − 1 ∧ n,
Nnα+ := inf{1 ≤ j ≤ n : αj /(2j + 1) < log(n + 3)ωj+ /(4dn)} − 1 ∧ n,
α−
:= inf{1 ≤ j ≤ m : αj < 4dm−1 log m} − 1 ∧ m,
Mm
α+
:= inf{1 ≤ j ≤ m : 4dαj < m−1 log m} − 1 ∧ m,
Mm
α− := N α− ∧ M α− , and K α+ := N α+ ∧ M α+ . Note that the proof of the following theorem
Knm
m
n
nm
m
n
requires the validity of Assumption B again.
Theorem 5.2 Let Assumptions A and B hold. Then, for any n, m ∈ N,
b − λk2 ] .
sup sup E[kλ
ω
b
k
r
d
λ∈Λγ f ∈Fα
min α− max
0≤k≤Knm
ωk Dαk log(n + 2)
,
γk
n
+ Φm +
1
1
+
m n
where the observations in (1.3) stem from the Cox model.
Remark 5.3 Using the approach presented in this subsection we are not able to dispense with
the additional logarithmic factor in the rates in case of the Cox model. Note that in case that
the error density f is known (which is informally equivalent to m = ∞) we regain the adaptive
rate established in [Big+13] for the case that the unknown intensity is ordinary smooth and the
Fourier coefficients of f obey a polynomial decay. However, our results are more general since
we do not exclusively consider the case of polynomially decreasing Fourier coefficients.
Remark 5.4 Needless to say, the numerical constants in the definition of the penalty are ridiculously large which makes our rate optimal estimator hardly applicable for small sample sizes.
Hence there is still research necessary to establish an estimator which performs well both from a
theoretical point of view and also yields good results for simulations with relatively small sample
sizes. Another approach would be to calibrate numerical constants in the penalty by means of
a simulation study as way done for example in [CRT06].
Remark 5.5 Of course, the approach presented in this subsection can also be applied to the
case of Poisson observations but since the logarithmic factor in the rates is unavoidable we would
obtain worse rates than using the approach from Section 4.
5.3. Examples of convergence rates (continued from Subsections 3.4 and 4.3)
Note that in all the scenarios considered in Table 1 we have kn⋄ . Nnα− where kn⋄ denotes the
optimal trade-off between the squared bias ωk /γk and the term Dαk log(n + 2)/n. Computations
similar to the ones leading to the rates in Table 1 show that the rates with respect to the sample
size n are those from the minimax framework in Table 1 with n replaced with n/ log(n + 2)
α− . If M α− ≤ k ⋄ , M α− determines the rate exactly with the same
as long as kn⋄ ≤ Nnα− ∧ Mm
m
n
m
contribution as in 4.3. It seems noteworthy to mention that in the scenario (pol)-(exp) we attain
the upper bound from the minimax theory in Theorem 3.6. In the case (pol)-(pol), however, one
can observe a loss by a logarithmic factor which was also observed in case of adaptive estimation
in [Big+13].
15
A. Proofs of Section 3
A.1. Proof of Theorem 3.1
∗
Let us define ζ as in the statement of the theorem and for each θ = (θj )0≤j≤kn∗ ∈ {±1}kn +1 the
function λθ through
λθ :=
=
1/2
r
4
1/2
r
4
+ θ0
+
rζ
4n
rζ
4n
1/2
1/2
+
rζ
4n
X
1/2
X
∗
1≤|j|≤kn
−1/2
∗
0≤|j|≤kn
−1/2
θ|j| αj
θ|j| αj
ej
ej .
Then each λθ is a real-valued function by definition which is non-negative since we have
rζ
4n
1/2
X
∗
0≤|j|≤kn
−1/2
θ|j|αj
ej
∞
≤
rζ
4n
1/2
≤
rζ
4
1/2
≤
≤
rζΓ
4
−1/2
αj
∗
0≤|j|≤kn
X
∗
0≤|j|≤kn
1/2
rζηΓ
4
X
γ ∗
kn
ωkn∗
1/2
≤
1/2
γj−1
X
∗
0≤|j|≤kn
1/2
r
4
1/2
X
γj
nαj
X
γj
nαj
∗
0≤|j|≤kn
1/2
ωj
nαj
.
∗
Moreover kλθ k2γ ≤ r holds for each θ ∈ {±1}kn +1 due to the estimate
kλθ k2γ =
X
∗
0≤|j|≤kn
|[λθ ]j |2 γj =
"
1/2
r
4
+ θ0
rζ
4n
≤
rζ
rζ γkn∗
r
+
+
2 2n
4 ωkn∗
≤
r rζ γkn∗
+
2
2 ωkn∗
X
1/2 #2
X
∗
1≤|j|≤kn
∗
0≤|j|≤kn
+
rζ
4
ωj
nαj
∗
1≤|j|≤kn
ωj
≤ r.
nαj
∗
This estimate and the non-negativity of λθ together imply λθ ∈ Λrγ for all θ ∈ {±1}kn +1 .
From now on let f ∈ Fαd be fixed and let Pθ denote the joint distribution of the i.i.d. samples
i
N1 , . . . , Nn and Y1 , . . . , Ym when the true parameters are λθ and f , respectively. Let PN
θ denote
the corresponding one-dimensional marginal distributions and Eθ the expectation with respect
e be an arbitrary estimator of λ. The key argument of the proof is the following
to Pθ . Let λ
reduction scheme:
e − λk2 ≥
sup sup Ekλ
ω
λ∈Λrγ
f ∈Fαd
=
sup
∗ +1
kn
θ∈{±1}
1
2kn∗ +1
X
∗
e − λ k2 ] ≥
Eθ [kλ
θ ω
X
∗
θ∈{±1}kn +1 0≤|j|≤kn
1
2kn∗ +1
X
e − λ ]j |2 ]
ωj Eθ [|[λ
θ
16
∗
θ∈{±1}kn +1
e − λ k2 ]
Eθ [kλ
θ ω
=
X
1
∗ +1
kn
2
∗
0≤|j|≤kn
X
ωj
2
∗
θ∈{±1}kn +1
e − λ (|j|) ]j |2 ]}, (A.1)
e − λ ]j |2 ] + E (j) [|[λ
{Eθ [|[λ
θ
θ
θ
(|j|)
∗
∗
where for θ ∈ {±1}kn +1 and j ∈ {−kn∗ , . . . , kn∗ } the element θ (|j|) ∈ {±1}kn +1 is defined by θk =
Rp
(|j|)
dPθ dPθ(|j|) .
θk for k 6= |j| and θ|j| = −θ|j|. Consider the Hellinger affinity ρ(Pθ , Pθ(|j|) ) :=
e of λ we have
For an arbitrary estimator λ
ρ(Pθ , Pθ(|j|) ) ≤
Z
≤
e − λ ]j | q
|[λ
θ
dPθ dPθ(|j|) +
|[λθ − λθ(|j|) ]j |
Z
e − λ ]j |2
|[λ
θ
dPθ
|[λθ − λθ(|j|) ]j |2
!1/2
+
Z
e − λ (|j|) ]j | q
|[λ
θ
dPθ dPθ(|j|)
|[λθ − λθ(|j|) ]j |
Z
e − λ (|j|) ]j |2
|[λ
θ
dP (|j|)
|[λθ − λθ(|j|) ]j |2 θ
!1/2
from which we conclude by means of the elementary inequality (a + b)2 ≤ 2a2 + 2b2 that
1
e − λ (|j|) ]j |2 ].
e − λ ]j |2 ] + E (|j|) [|[λ
|[λθ − λθ(|j|) ]j |2 ρ2 (Pθ , Pθ(|j|) ) ≤ Eθ [|[λ
θ
θ
θ
2
Introduce
the Hellinger distance between two probability measures P and Q as H(P, Q) :=
√
R √
two finite
ν and
( [ dP − dQ]2 )1/2 and, analogously, the Hellinger distance between
R √
√ measures
2
1/2
:=
µ (that not necessarily have total mass equal to one) by H(ν, µ)
( [ dν − dµ] ) (as usual,
the integral is formed with respect to any measure dominating both ν and µ). Let νθ denote
the intensity measure of a Poisson point process N on [0, 1) whose Radon-Nikodym derivative
with respect to the Lebesgue measure is given by ℓθ := λθ ⋆ f . Note that we have the estimate
√
∗
1
due to
ℓθ ≥ δ r for all θ ∈ {±1}kn +1 with δ = 12 − 2√
2
rζ
4n
1/2
X
+
∗
1≤|j|≤kn
|[λθ ]j · [f ]j | ≤
rdζ
4n
1/2
X
∗
0≤|j|≤kn
−1/2
αj
√
r
≤ √
2 2
which can be realized in analogy to the non-negativity of λθ shown above. We obtain
2
H (νθ , νθ(|j|) ) =
Z p
( ℓθ −
q
2
ℓθ(|j|) ) =
Z
√
kℓθ − ℓθ(|j|) k22
|ℓθ − ℓθ(|j|) |2
ζd r
1
√
p
√
≤
=
≤ .
2
4δ r
4δn
n
( ℓθ + ℓθ(|j|) )
Since the distribution of the sample Y1 , . . . , Ym does not depend on the choice of θ we obtain
H 2 (Pθ , Pθ(|j|) ) ≤
n
X
i=1
Ni
i
H 2 (PN
θ , Pθ (|j|) ) ≤
n
X
i=1
H 2 (νθ , νθ(|j|) ) ≤ 1,
where the first estimate follows from Lemma 3.3.10 (i) in [Rei89] and the second one is due to
Theorem 3.2.1 in [Rei93] which can be applied since each Ni is a Poisson point process for the
Poisson model. Thus, the relation ρ(Pθ , Pθ(|j|) ) = 1 − 12 H 2 (Pθ , Pθ(|j|) ) implies ρ(Pθ , Pθ(|j|) ) ≥ 21 .
Finally, putting the obtained estimates into the reduction scheme (A.1) leads to
e − λk2 ≥
sup sup Ekλ
ω
λ∈Λrγ f ∈Fαd
≥
1
2kn∗ +1
X
X
∗
X
∗
θ∈{±1}kn +1 0≤|j|≤kn
∗
0≤|j|≤kn
ωj
e − λ (|j|) ]j |2 ]}
e − λ ]j |2 ] + E (|j|) [|[λ
{Eθ [|[λ
θ
θ
θ
2
ωj
ζr X
ωj
ζr
|[λθ − λθ(|j|) ]j |2 =
· Ψn
≥
16
16 0≤|j|≤k∗ nαj
16η
n
e was arbitrary.
which finishes the proof of the theorem since λ
17
A.2. Proof of Theorem 3.3
The following reduction scheme follows along a general strategy that is well-known for the
establishment of lower bounds in nonparametric estimation (for a detailed account cf. [Tsy08],
e of λ and an
Chapter 2). Note that by Markov’s inequality we have for an arbitrary estimator λ
arbitrary A > 0 (which will be specified below)
2
2
e
e
E[Φ−1
m kλ − λkω ] ≥ A · P(kλ − λkω ≥ AΦm ),
which by reduction to two hypotheses implies
2
2
e
e
sup sup E[Φ−1
m kλ − λkω ] ≥ A sup sup P(kλ − λkω ≥ AΦm )
λ∈Λrγ f ∈Fαd
λ∈Λrγ f ∈Fαd
e − λ k2 ≥ AΦm )
≥ A sup Pθ (kλ
θ ω
θ∈{±1}
where Pθ denotes the distribution when the true parameters are λθ and fθ . The specific hypotheses λ1 , λ−1 and f1 , f−1 will be specified below. If λ−1 and λ1 can be chosen such that
kλ1 − λ−1 k2ω ≥ 4AΦm , application of the triangle inequality yields
e − λ k2 ≥ AΦ ) ≥ P (τ ∗ 6= θ)
Pθ (kλ
m
θ
θ ω
e − λ k2 .
where τ ∗ denotes the minimum distance test defined through τ ∗ = arg minθ∈{±1} kλ
θ ω
Hence, we obtain
e − λ k2 ≥ AΦm )
e − λk2 ≥ AΦm ) ≥ inf sup P (kλ
inf sup sup P(kλ
θ
θ ω
ω
e
λ
e
λ
λ∈Λrγ f ∈Fαd
θ∈{±1}
≥ inf sup Pθ (τ 6= θ)
τ θ∈{±1}
=: p∗ ,
(A.2)
where the infimum is taken over all {±1}-valued functions τ based on the observations. Thus,
it remains to find hypotheses λ1 , λ−1 ∈ Λrγ and f1 , f−1 ∈ Fαd such that
kλ1 − λ−1 k2ω ≥ 4AΦm ,
(A.3)
and which allow us to bound p∗ by a universal constant (independent of m) from below.
ωj
1
−1/2 α−1/2 ),
∗ := arg max
For this purpose, set km
∗
j≥1 { γj min(1, mαj )} and am := ζ min(1, m
km
where ζ is defined as in the statement of the theorem. Take note of the inequalities
1/d1/2 = (1 − (1 − 1/d1/4 ))2 ≤ (1 − am )2 ≤ 1
and
1 ≤ (1 + am )2 ≤ (1 + (1 − 1/d1/4 ))2 = (2 − 1/d1/4 )2 ≤ d1/2
which in combination imply 1/d1/2 ≤ (1 + θam )2 ≤ d1/2 for θ ∈ {±1}. These inequalities will be
used below without further reference. For θ ∈ {±1}, we define
λθ =
1/2
r
2
+ (1 − θam )
1/2
r
8
−1/2
∗ + e−k ∗ ).
(ekm
d−1/4 γkm
∗
m
Note that λθ is real-valued by definition. Furthermore, we have
kλθ k2γ =
r
r
3r
r
2
∗ |[λθ ]k ∗ | ≤
+ 2γkm
+ (1 + am )2 d−1/2 ≤
m
2
2
4
4
18
and
|λθ (t)| ≥
1/2
r
2
−2
1/2
r
8
≥0
∀t ∈ [0, 1),
which together imply that λθ ∈ Λrγ for θ ∈ {±1}. The identity
2 −1/2
−1
∗ γ ∗ = ζ rd
kλ1 − λ−1 k2ω = ra2m d−1/2 ωkm
· Φm
km
√
shows that the
condition in (A.3) is satisfied with A = ζ 2 r/(4 d).
√
Let f ∈ Fα d be such that f ≥ 1/2 (the existence is guaranteed through condition (C4)) and
define for θ ∈ {±1}
∗ ek ∗ + [f ]−k ∗ e−k ∗ ).
fθ = f + θam ([f ]km
m
m
m
∗ ≥ 1 we have
Since km
R1
0
fθ (x)dx = 1 and fθ ≥ 0 holds because of the estimate
1/2
1/2
≥0
|fθ (t)| ≥ 1/2 − 2am αkm
∗ d
for all t.
∗ since
∗ , we have [f ] = [f ] and thus trivially 1/d ≤ |[f ] |2 /α ≤ d for |j| =
6 km
For
|j| =
6 km
j
j
θ j
θ j
√
Fα d ⊂ Fαd . Moreover
1/d ≤ d−1/2
2
2
2
∗ |
∗ |
∗ |
|[f ]±km
(1 + θam )2 |[f ]±km
|[f ]±km
≤
≤ d1/2
≤d
∗
∗
∗
α±km
α±km
α±km
and hence fθ ∈ Fαd for θ ∈ {±1}.
To obtain a lower bound for p∗ defined in (A.2) consider the joint distribution Pθ of the
samples N 1 , . . . , N n and Y1 , . . . , Ym under λθ and fθ . Note that due to our construction we have
i
Ni
λ−1 ⋆ f−1 = λ1 ⋆ f1 . Thus PN
−1 = P1 for all i = 1, . . . , n (due to the fact that the distribution of
a Poisson point process is determined by its intensity) and the Hellinger distance between P−1
and P1 does only depend on the distribution of the sample Y1 , . . . , Ym . More precisely,
1 ,...,Ym
1
, PY1 1 ),
, PY1 1 ,...,Ym ) ≤ mH 2 (PY−1
H 2 (P−1 , P1 ) = H 2 (PY−1
1
and we proceed by bounding H 2 (PY−1
, PY1 1 ) from above. Recall that f ≥ 1/2 which is used to
obtain the estimate
1
H 2 (PY−1
, PY1 1 ) =
Z
1
0
|f1 (x) − f−1 (x)|2
dx ≤
2f (x)
Z
∗ ≤
|f1 (x) − f−1 (x)|2 dx ≤ 8da2m αkm
1
.
m
Hence we have H 2 (P−1 , P1√
) ≤ 1 and application of statement (ii) of Theorem 2.2 in [Tsy08] with
α = 1 implies p∗ ≥ 12 (1 − 3/2) which finishes the proof of the theorem.
A.3. Proof of Theorem 3.6
We give the proof for the Poisson model only. The proof for the Cox model follows in complete
analogy by exploiting statement ii) instead of i) in part a) of Lemma A.1.
e ∗ := P
Set λ
∗ [λ]j 1Ωj ej . The proof consists in finding appropriate upper bounds for
kn
0≤|j|≤kn
the quantities and △ in the estimate
b ∗ − λk2 ] ≤ 2 E[kλ
b ∗ −λ
e ∗ k2 ] + 2 E[kλ − λ
e ∗ k2 ] =: 2 + 2△.
E[kλ
kn ω
kn
kn
kn ω
ω
19
(A.4)
c = [f ] [λ] we obtain
Upper bound for : Using the identity E[ℓ]
j
j
j
=
X
∗
0≤|j|≤kn
≤2
X
c /[f
c] − [λ] |2 1 ]
ωj E[|[ℓ]
j
Ωj
j
j
∗
0≤|j|≤kn
c /[f
c] − E[ℓ]
c /[f
c] |2 1 ] + 2
ωj E[|[ℓ]
Ωj
j
j
j
j
X
∗
0≤|j|≤kn
=: 21 + 22 .
c] − 1|2 1 ]
ωj |[λ]j |2 E[|[f ]j /[f
Ωj
j
c] , the definition of Ω and the independence
Using the estimate |a|2 ≤ 2 |a − 1|2 +2 for a = [f ]j /[f
j
j
c and [f
c] we get
of [ℓ]
j
j
X
c /[f
c] − E[ℓ]
c /[f
c] |2 · [f ]j
1 =
ωj E |[ℓ]
j
j
j
j
[f ]j
0≤|j|≤k ∗
≤2
n
X
mωj
∗
0≤|j|≤kn
c ) Var([f
c] )
Var([ℓ]
j
j
|[f ]j |2
+2
2
X
1 Ωj
ωj
∗
0≤|j|≤kn
c )
Var([ℓ]
j
|[f ]j |2
.
Applying statements a) and b) from Lemma A.1 together with f ∈ Fαd yields
1 ≤ 4d
X
∗
0≤|j|≤kn
ωj
[λ]0
nαj
which using that γj ≥ 1 (which holds due to Assumption A) implies
√
1 ≤ 4d r
X
∗
0≤|j|≤kn
√
ωj
≤ 4d r · Ψn .
nαj
c] and the definition of
Now consider 2 . Using the estimate |a|2 ≤ 2 |a − 1|2 + 2 for a = [f ]j /[f
j
Ωj yields
c] − [f ] |4 ]
c] )
E[|[f
Var([f
j
j
j
c] − 1|2 1 ] ≤ 2m
E[|[f ]j /[f
+
2
(A.5)
Ω
j
j
2
2 .
|[f ]j |
|[f ]j |
c] −
Notice that Theorem 2.10 in [Pet95] implies the existence of a constant C > 0 with E[|[f
j
[f ]j |4 ] ≤ C/m2 . Using this inequality in combination with assertion b) from Lemma A.1 and
f ∈ Fαd implies
c] − 1|2 1 ] ≤ 2d(C + 1)/(mα ).
E[|[f ]j /[f
(A.6)
Ωj
j
j
c] − 1|2 1 ] ≤ m Var([f
c] ) ≤ 1 which in combination with (A.6) implies
In addition, E[|[f ]j /[f
Ωj
j
j
X
1
2 ≤ 2d(C + 1)
ωj |[λ]j | min 1,
mαj
0≤|j|≤k ∗
2
n
!
.
Exploiting the fact that λ ∈ Λrγ and the definition of Φm in (3.2) we obtain
2 ≤ 2dr(C + 1)(1 + γ1 /ω1 ) · Φm .
Putting together the estimates for 1 and 2 yields
√
≤ 8d r · Ψn + 4d(C + 1)(1 + γ1 /ω1 )r · Φm .
20
Upper bound for △: △ can be decomposed as
△=
X
j∈Z
ωj |[λ]j |2 E(1 − 1{0≤|j|≤kn∗ } · 1Ωj ) =
X
∗
|j|>kn
ωj |[λ]j |2 +
X
∗
0≤|j|≤kn
ωj |[λ]j |2 · P(Ωcj )
= △1 + △2 .
λ ∈ Λrγ implies △1 ≤ rωkn∗ /γkn∗ ≤ r · Ψn and Lemma A.1 yields the estimate △2 ≤ 4dr · Φm which
together imply △ ≤ r · Ψn + 4dr · Φm . Putting the obtained estimates for and △ into (A.4)
finishes the proof of the theorem.
A.4. Auxiliary results for the proof of Theorem 3.6
Lemma A.1 With the notations introduced in the main part of the article, the following assertions hold:
a)
c ) ≤ [λ] /n under the Poisson model and
i) Var([ℓ]
0
j
c ) ≤ 2(|[λ]|2 + [λ] )/n under the Cox model.
ii) Var([ℓ]
0
j
j
c] ) ≤ 1/m,
b) Var([f
j
c] |2 < 1/m) ≤ min {1, 4d/(mα )}
c) P(Ωcj ) = P(|[f
j
j
∀f ∈ Fαd .
Proof. The proof of statement i) in a) is given by the identity
c ) = 1 Var
Var([ℓ]
j
n
Z
1
ej (t)dN1 (t) =
0
1
n
Z
0
1
|ej (t)|2 (λ ⋆ f )(t)dt =
1
· [λ]0 .
n
c = [λ] [f ] implies
To prove ii), the identity E[ℓ]
j
j
j
c ) := E[|[ℓ]
c − E[ℓ]
c |2 ] ≤ 2E[|[f
f] [λ] − [f ] [λ] |2 ] + 2 E[|ξ |2 ] =: 2V + 2V
Var([ℓ]
j
j
j
j
1
2
j
j
j
j
f] ) ≤ |[λ] |2 /n. Here, the estimate Var([f
f] ) ≤ 1/n is easily derived in
where V1 ≤ |[λ]j |2 · Var([f
j
j
j
analogy to the proof of part b). In order to bound V2 from above, notice
" "Z
1
E[|ξj | ] = E E
n
2
Z
0
2
1
ej (−t) {dN1 (t) − λ(t − ε1 − ⌊t − ε1 ⌋)dt}
1
1
= E
|ej (−t)|2 λ(t − ε1 − ⌊t − ε1 ⌋)dt
n
0
Z 1
1
= E
λ(t − ε1 − ⌊t − ε1 ⌋)dt
n
0
= [λ]0 /n.
| ε1
##
The assertion follows now by combining the obtained bounds for V1 and V2 .
c] ) = 1 Var (e (−Y )) and the assertion follows
For the proof of b), note that we have Var([f
j
1
j
m
from the estimate
Var(ej (−Y1 )) = E[|ej (−Y1 )|2 ] − |E [ej (−Y1 )]|2 ≤ E[|ej (−Y1 )|2 ] = 1.
For the proof of c), we consider two cases: if |[f ]j |2 < 4/m we have 1 <
and the statement is evident. Otherwise, |[f ]j |2 ≥ 4/m which implies
4d
mαj
because f ∈ Fαd
c] |2 < 1/m) ≤ P(|[f
c] |/ |[f ] | < 1/2) ≤ P(|[f
c] /[f ] − 1| > 1/2).
P(|[f
j
j
j
j
j
21
Applying Chebyshev’s inequality and exploiting the definition of Fαd yields
c] |2 < 1/m) ≤ 4/ |[f ] |2 · Var([f
c] ) ≤ 4d/(mα )
P(|[f
j
j
j
j
and statement c) follows.
B. Proofs of Section 4
B.1. Proof of Theorem 4.1
c ∨ 1 ≤ η −1 ([ℓ] ∨ 1)} and
Define the events Ξ1 := {η([ℓ]0 ∨ 1) ≤ [ℓ]
0
0
Ξ2 :=
(
∀ 0 ≤ |j| ≤
α
Mm
c]−1 − [f ]−1 | ≤
: |[f
j
j
1
2|[f ]j |
and
The identity 1 = 1Ξ1 ∩Ξ2 + 1Ξc2 + 1Ξc1 ∩Ξ2 provides the decomposition
c] | ≥ 1
|[f
j
m
)
.
b − λk2 1Ξc ] + E[kλ
b − λk2 1Ξc ∩Ξ ],
b − λk2 ] = E[kλ
b − λk2 1Ξ ∩Ξ ] + E[kλ
E[kλ
ω
ω
2
ω
ω
1
2
e
e
e
e
2
1
k
k
k
k
{z
|
}
=:1
|
{z
}
=:2
|
{z
=:3
}
and we will establish uniform upper bounds over the ellipsoids Λrγ and Fαd for the three terms
on the right-hand side separately.
Uniform upper bound for 1 : Denote by Sk the linear subspace of L2 spanned by the functions
b k2 holds for all t ∈ S ,
b k2 − kλ
ej (·) for j ∈ {−k, . . . , k}. Since the identity Υ(t) = kt − λ
k
k ω
k ω
b . Using this identity and
k ∈ {0, . . . , n ∧ m}, we obtain for all such k that argmint∈Sk Υ(t) = λ
k
α } that
the definition of ke yields for all k ∈ {0, . . . , Knm
P
b ) + pen
b ) + pen
g e ≤ Υ(λ
g k ≤ Υ(λk ) + pen
gk
Υ(λ
k
e
k
k
where λk := 0≤|j|≤k [λ]j ej denotes the projection of λ on the subspace Sk . Elementary computations imply
b k2 ≤ kλ k2 + 2ℜhλ
b
b − λ i + pen
g k − pen
ge
kλ
(B.1)
n∧m , λe
k ω
k ω
e
k ω
k
k
α }. In addition to λ defined above, introduce the further abbreviations
for all k ∈ {0, . . . , Knm
k
e :=
λ
k
as well as
c
[ℓ]
j
ej
[f ]j
0≤|j|≤k
X
b − λ̌ − λ
e +λ ,
Θk := λ
k
k
k
k
and
λ̌k :=
X
0≤|j|≤k
e −λ ,
e := λ
Θ
k
k
k
and
[ℓ]j
c]
[f
j
1 Ωj e j ,
Θ̌k := λ̌k − λk .
b n∧m − λn∧m = Θn∧m + Θ
e n∧m + Θ̌n∧m , we deduce
Using these abbrevations and the identity λ
from (B.1) that
b − λk2 ≤ kλ − λ k2 + pen
e n∧m , λ
b − λ iω
g k − pen
g e + 2ℜhΘ
kλ
k ω
k
ω
e
e
k
k
k
b − λ i + 2ℜhΘ̌
b −λ i
+ 2ℜhΘn∧m , λ
n∧m , λe
k ω
k ω
e
k
k
(B.2)
α }. Define B := {λ ∈ S : kλk ≤ 1}. For every τ > 0 and t ∈ S , the
for all k ∈ {0, . . . , Knm
k
k
k
ω
estimate 2uv ≤ τ u2 + τ −1 v 2 implies
2 |hh, tiω | ≤ 2 ktkω sup |hh, tiω | ≤ τ ktk2ω +
t∈Bk
22
1
sup |hh, tiω |2 .
τ t∈Bk
b −λ ∈S
Because λ
, combining the last estimate with (B.2) we get
k
e
e
k
k∨k
b − λk2 ≤ kλ − λ k2 + 3τ kλ
b − λ k2 + pen
g k − pen
g e+
kλ
k ω
k ω
ω
e
e
k
k
k
e n∧m , tiω |2 + τ −1 sup |hΘn∧m , tiω |2 + τ −1 sup |hΘ̌n∧m , tiω |2 .
+ τ −1 sup |hΘ
t∈B
t∈B
e
t∈B
e
e
k∨k
k∨k
k∨k
b − λk2 + 2 kλ − λk2 and kλ − λ k2 ≤ rω γ −1 for all λ ∈ Λr since
b − λ k2 ≤ 2kλ
Note that kλ
k
k ω
k ω
k k
ω
γ
ω
e
e
k
k
ωγ −1 is non-increasing due to Assumption A. Specializing with τ = 1/8, we obtain
b − λk2 ≤ 7rω γ −1 + 4pen
e n∧m , tiω |2
g k − 4pen
g e + 32 sup |hΘ
kλ
k k
ω
e
k
k
t∈B
e
k∨k
+ 32 sup |hΘn∧m , tiω | + 32 sup |hΘ̌n∧m , tiω |2 .
2
t∈B
e
k∨k
t∈B
(B.3)
e
k∨k
α and K α ≤ M α by definition, we
Combining the facts that 1Ωj 1Ξ2 = 1Ξ2 for 0 ≤ |j| ≤ Mm
m
nm
α
α
obtain for all j ∈ {−Knm , . . . , Knm } the estimate
c] 1 − 1|2 1 = |[f ] |2 |1/[f
c] − 1/[f ] |2 1 ≤ 1/4.
|[f ]j /[f
Ξ2
j
j
Ξ2
j Ωj
j
Hence, supt∈Bk |hΘn∧m , tiω |2 1Ξ2 ≤
we obtain
b − λk2 1Ξ ∩Ξ
kλ
ω
1
2
e
k
1
4
e n∧m , tiω |2 for all 0 ≤ k ≤ K α . Thus, from (B.3)
supt∈Bk |hΘ
nm
33d([ℓ]0 ∨ 1)δα e
−1
2
k∨k
e
≤ 7rωk γk + 40 sup |hΘn∧m , tiω | −
8n
t∈B
+ (165d([ℓ]0 ∨
e
k∨k
1)δα e/n
k∨k
+
g k − 4pen
g e)1Ξ1 ∩Ξ2 + 32 sup |hΘ̌n∧m , tiω |2 .
+ 4pen
k
α
t∈BKnm
g and the event Ξ1 , we obtain
Exploiting the definition of both the penalty pen
ωk δkα
2
b
E[kλek − λkω 1Ξ1 ∩Ξ2 ] ≤ C(d, r) minα max
,
0≤k≤Knm
γk n
"
! #
α
Knm
X
33([ℓ]0 ∨ 1)dδkα
2
e
E
sup |hΘn∧m , tiω | −
+ 40
8n
t∈Bk
k=0
+ 32E sup |hΘ̌n∧m , tiω |2 .
α
t∈BKnm
+
(B.4)
Applying Lemma B.2 with δk∗ = dδkα and ∆∗k = d∆αk yields
E
"
α
e n∧m , tiω |2 − 33d([ℓ]0 ∨ 1)δk
sup |hΘ
8n
t∈Bk
! #
+
≤ K1
+
"
δkα
dkf kkλk∆αk
exp −K2
n
kf k2 kλk2 ∆αk
!
√
dδkα
exp(−K3 n) .
2
n
α ≤ n by definition, we obtain that
Using statement a) of Lemma B.1 and the fact that Knm
α
Knm
X
k=0
E
"
α
e n∧m , tiω | − 33d([ℓ]0 ∨ 1)δk
sup |hΘ
t∈Bk
! #
8n
+
√
∞
3/2
X
√
d
rρ
2K2 k log(∆αk ∨ (k + 3))
α
∆k exp − √
+ exp(−K3 n),
·
.
n
log(k + 3)
drρ
k=0
23
where the last estimate is due to the fact that kf k2 ≤ dρ for all f ∈ Fαd and kλk2 ≤ r for all
λ ∈ Λrγ . Note that we have
∞
X
∆αk exp
k=0
2K2 k log(∆αk ∨ (k + 3))
·
−√
log(k + 3)
drρ
≤C<∞
with a numerical constant C which implies
α
Knm
X
E
k=0
"
α
e n∧m , tiω | − 33d([ℓ]0 ∨ 1)δk
sup |hΘ
8n
t∈Bk
! #
1
.
n
.
+
The last term in (B.4) is bounded by means of Lemma B.3 which immediately yields
E sup |hΘ̌n∧m , tiω |2 . Φm .
α
t∈BKnm
Combining the preceeding estimates, which hold uniformly for all λ ∈ Λrγ and f ∈ Fαd , we
conclude from equation (B.4) that
h
i
b − λk2 1Ξ ∩Ξ .
sup sup E kλ
ω
1
2
e
k
r
d
λ∈Λγ f ∈Fα
ωk δkα
,
min α max
0≤k≤Knm
γk n
+ Φm +
1
.
n
P
b − λ̆ k2 ≤ kλ
b ′−
Uniform upper bound for 2 : Define λ̆k := 0≤|j|≤k [λ]j 1Ωj ej . Note that kλ
k
k ω
k
α
2
′
2
2
λ̆k′ kω for k ≤ k and kλ̆k − λkω ≤ kλkω for all k ∈ N0 . Consequently, since k ∈ {0, . . . , Knm },
we obtain the estimate
b − λk2 1Ξc ] ≤ 2E[kλ
b − λ̆ k2 1Ξc ] + 2 E[kλ̆ − λk2 1Ξc ]
E[kλ
ω
ω
e
e
e
e
2
2
2
k
k
k ω
k
b α − λ̆ α k2 1 c ] + 2 kλk2 P(Ξc ),
≤ 2E[kλ
Knm
Knm ω Ξ2
2
ω
and due to Assumption A and Lemma B.5 it is easily seen that kλk2ω · P(Ξc2 ) . m−4 . Using the
definition of Ωj , we further obtain
b α − λ̆ α k2 1 c ] ≤ 2m
E[kλ
Knm
Knm ω Ξ2
≤ 2m
X
α
0≤|j|≤Knm
X
α
0≤|j|≤Knm
+ 2m
X
c − [ℓ] |2 1 c ] + E[|[f ] [λ] − [f
c] [λ] |2 1 c ]}
ωj {E[|[ℓ]
j
Ξ2
j
j
j
Ξ2
j
j
c − [ℓ] |4 ])1/2 P(Ξc )1/2
ωj (E[|[ℓ]
j
2
j
α
0≤|j|≤Knm
. mP(Ξc2 )1/2
c] − [f ] |4 ])1/2 P (Ξc )1/2
ωj |[λ]j |2 (E[|[f
j
2
j
X
α
0≤|j|≤Knm
X
ωj
+ P(Ξc2 )1/2
ωj |[λ]j |2 ,
n
α
0≤|j|≤K
(B.5)
nm
where the last estimate follows by applying Theorem 2.10 from [Pet95] with p = 4 two times. If
α = 0, Lemma B.5 implies
Knm
b K α − λ̆K α k2 1Ξc ] .
E[kλ
nm
nm ω
2
1
1
+
.
nm m2
α > 0, we exploit ω ≤ ω + α−1 , K α ≤ N α and the definition of N α to bound
Otherwise, if Knm
j
n
n
nm
j j
the first term in (B.5). The second term in (B.5) can be bounded from above by noting that
24
ωj ≤ γj thanks to Assumption A, and we obtain
b K α − λ̆K α k2 1Ξc ] . mP(Ξc )1/2
E[kλ
2
nm
nm ω
2
X
0≤|j|≤Nnα
1
1
+ P(Ξc2 )1/2 .
2|j| + 1 log(n + 3)
Thanks to the logarithmic increase of the harmonic series, Nnα ≤ n and Lemma B.5, the last
estimate implies
b K α − λ̆K α k2 1Ξc ] . 1 + 1 ,
E[kλ
nm
nm ω
2
m m2
α
if Knm > 0, and thus
b K α − λ̆K α k2 1Ξc ] . 1 + 1 ,
E[kλ
nm
nm ω
2
m m2
α
independent of the actual value of Knm . Using the obtained estimates, we conclude
b − λk2 1Ξc ] .
E[kλ
ω
e
2
k
1
.
m
Uniform upper bound for 3 : In order to find a uniform upper bound for 3 , first recall the
P
definition λ̆k := 0≤|j|≤k [λ]j 1Ωj ej and consider the estimate
b − λk2 1Ξc ∩Ξ ] ≤ 2E[kλ
b − λ̆ k2 1Ξc ∩Ξ ] + 2E[kλ̆ − λk2 1Ξc ∩Ξ ].
E[kλ
ω
2
2
ω
2
e
e
e
e
1
1
1
k
k
k ω
k
(B.6)
Using the estimate kλ̆ek − λk2ω ≤ kλk2ω , we obtain for λ ∈ Λrγ by means of Lemma B.4 that
E[kλ̆ek − λk2ω 1Ξc1 ∩Ξ2 ] ≤ rP(Ξc1 ) .
1
n
which controls the second term on the right-hand side of (B.6). We now bound the first term on
α = 0, we have k
e = 0, and by means of the Cauchy-Schwarz
the right-hand side of (B.6). If Knm
inequality and Theorem 2.10 from [Pet95] it is easily seen that
b − λ̆ k2 1Ξc ∩Ξ ] .
E[kλ
2
e
e
1
k
k ω
1
.
n
α > 0, and we need the following further estimate, which is easily verified:
Otherwise, Knm
b − λ̆ k2 1Ξc ∩Ξ ] ≤ 3
E[kλ
2
e
e
1
k
k ω
X
α
0≤|j|≤Knm
+3
X
c] − [ℓ] /[f ] |2 1 c
ωj E[|[ℓ]j /[f
j
j
Ξ1 ∩Ξ2 ]
j
α
0≤|j|≤Knm
+3
X
α
0≤|j|≤Knm
c − [ℓ] |2 /|[f ] |2 1 c
ωj E[|[ℓ]
j
j
Ξ1 ∩Ξ2 ]
j
c − [ℓ] |2 · |1/[f
c] − 1/[f ] |2 1 c
ωj E[|[ℓ]
j
j
Ξ1 ∩Ξ2 ].
j
j
(B.7)
We start by bounding the first term on the right-hand side of (B.7). Using the definition of Ξ2
and ωj ≤ γj , we obtain for all λ ∈ Λrγ that
X
α
0≤|j|≤Knm
c] − [ℓ] /[f ] |2 1 c
ωj E[|[ℓ]j /[f
j
j
Ξ1 ∩Ξ2 ] ≤
j
1
r
· P(Ξc1 ) . .
4
n
Since |[f ]j |−2 ≤ dαj for f ∈ Fαd , the Cauchy-Schwarz inequality in combination with Theo-
25
rem 2.10 from [Pet95] implies for the second term on the right-hand side of (B.7) that
X
α
0≤|j|≤Knm
c 1/2
c − [ℓ] |2 /|[f ] |2 1 c
ωj E[|[ℓ]
j
j
Ξ1 ∩Ξ2 ] . P(Ξ1 )
j
X
α
0≤|j|≤Knm
ωj+
.
nαj
α ≤ N α to obtain
We exploit the definition of Nnα together with Knm
n
X
α
0≤|j|≤Knm
c − [ℓ] |2 /|[f ] |2 1 c
ωj E[|[ℓ]
j
j
Ξ1 ∩Ξ2 ] .
j
X
P(Ξc1 )1/2
1
,
log(n + 3) 0≤|j|≤N α 2|j| + 1
n
from which by the logarithmic increase of the harmonic series and Lemma B.4 we conclude that
X
α
0≤|j|≤Knm
c − [ℓ] |2 /|[f ] |2 1 c
ωj E[|[ℓ]
j
j
Ξ1 ∩Ξ2 ] .
j
1
,
n
α . Finally, the third and last term on the right-hand side
independent of the actual value of Knm
of (B.7) can be bounded from above the same way after exploiting the definition of Ξ2 , and we
obtain
X
1
c − [ℓ] |2 · |1/[f
c] − 1/[f ] |2 1 c
ωj E[|[ℓ]
.
j
j
Ξ1 ∩Ξ2 ] .
j
j
n
α
0≤|j|≤K
nm
Putting together the derived estimates, we obtain
b − λk2 1Ξc ∩Ξ ] .
E[kλ
2
e
1
k
1
.
n
Finally, the statement of the theorem follows by combining the obtained uniform upper bounds
for 1 , 2 , and 3 .
B.2. Proof of Theorem 4.2
Consider the event
α−
cnm ≤ N α+ ∧ M α+ }
Ξ3 := {Nnα− ∧ Mm
≤K
n
m
in addition to the event Ξ1 introduced in the proof of Theorem 4.1 and the slightly redefined
event Ξ2 defined as
α+
c] − 1/[f ] | ≤ 1/(2|[f ] |) and |[f
c] | ≥ 1/m}.
Ξ2 := {∀0 ≤ |j| ≤ Mm
: |1/[f
j
j
j
j
Defining Ξ := Ξ1 ∩ Ξ2 ∩ Ξ3 , the identity 1 = 1Ξ + 1Ξc2 + 1Ξc1 ∩Ξ2 + 1Ξ1 ∩Ξ2 ∩Ξc3 motivates the
decomposition
b − λk2 ] = E[kλ
b − λk2 1Ξ ] + E[kλ
b − λk2 1Ξc ]
E[kλ
ω
ω
ω
b
b
b
2
k
k
k
b − λk2 1
b − λk2 1 c
+ E[kλ
ω Ξ1 ∩Ξ2 ∩Ξc3 ]
ω Ξ1 ∩Ξ2 ] + E[kλb
b
k
k
=: 1 + 2 + 3 + 4 ,
and we establish uniform upper risk bounds for the four terms on the right-hand side separately.
b ≤ 9 ∆ , and thus
Uniform upper bound for 1 : On Ξ we have the estimate 41 ∆k ≤ ∆
k
4 k
1
b ∨ (k + 4) ≤ 9 [∆ ∨ (k + 4)]
[∆k ∨ (k + 4)] ≤ ∆
k
k
4
4
26
α+ }. This last estimate implies
for all k ∈ {0, . . . , Mm
log(k + 4)
log(∆k ∨ (k + 4))
log 4
2k + 1
∆k
1−
≤ δbk
4
log(k + 4)
log(k + 4) log(∆k ∨ (k + 4))
log(k + 4)
log(∆k ∨ (k + 4))
log(9/4)
9(2k + 1)
∆k
1+
,
≤
4
log(k + 4)
log(k + 4) log(∆k ∨ (k + 4))
from which we conclude
that on Ξ2 the estimate
3
100
· δk ≤ δbk ≤
17
5
· δk . Putting penk :=
dk ≤
penk ≤ pen
340
penk
3
165 −1 c
4 η ([ℓ]0
∨ 1) · δnk , we observe
α+ }. Note that on Ξ we have k
b ≤ M α+ which implies
holds for all k ∈ {0, . . . , Mm
m
d k − pen
d b)1Ξ ≤ (penk + penb + pen
d k − pen
d b)1Ξ ≤
(penk∨bk + pen
k
k
k
343
penk 1Ξ .
3
(B.8)
Now, we can proceed by mimicking the derivation of (B.4) in the proof of Theorem 4.1. More
g k used in that proof by pen
d k , using the definition of
precisely, replacing the penalty term pen
penk above and (B.8), we obtain
b − λk2 1 ] ≤ 7rω γ −1 + 40
E[kλ
k k
ω Ξ
b
k
α+
N
n
X
E
k=0
"
e n∧m , tiω | − 33([ℓ]0 ∨ 1)δk
sup |hΘ
8n
t∈Bk
2
! #
+
d k − pen
d b)1Ξ ]
+ 32E[ sup |hΘ̌n∧m , tiω |2 ] + 4E[(penk∨bk + pen
k
t∈BK α+
nm
≤ 7rωk γk−1 + 40
α+
N
n
X
k=0
E
"
e n∧m , tiω |2 − 33([ℓ]0 ∨ 1)δk
sup |hΘ
8n
t∈Bk
! #
+
1372
penk .
+ 32E[ sup |hΘ̌n∧m , tiω |2 ] +
3
t∈B α+
Knm
As in the proof of Theorem 4.1, the second and the third term are bounded applying Lemmata B.2 (with δk∗ := δk and ∆∗k := ∆) and B.3, respectively. Hence, by means of an obvious
adaption of statement a) in Lemma B.1 (with Nnα replaced by Nnα+ ) and the estimates
∆k ≤ d∆αk ,
δk ≤ dζd δkα ,
log(∆αk ∨ (k + 4))
δk
≥ 2kζd−1
∆k
log(k + 4)
with ζd = log(4d)/ log(4), we obtain in analogy to the way of proceeding in the proof of Theorem 4.1 that
b − λk2 1 ] .
sup sup E[kλ
ω Ξ
b
k
r
d
λ∈Λγ f ∈Fα
ωk δkα
min α− max
,
γk n
0≤k≤Knm
+ Φm +
1
.
n
(B.9)
Upper bound for 2 : The uniform upper bound for 2 can be derived in analogy to the bound
for 2 in the proof of Theorem 4.1 using Assumption B instead of statement b) from Lemma B.1
in the proof of Lemma B.5. Hence, we obtain
b − λk2 1Ξc ] . 1 .
sup sup E[kλ
ω
e
2
k
m
λ∈Λrγ f ∈Fαd
(B.10)
Upper bound for 3 : The term 3 can also be bounded analogously to the bound established for
3 in the proof of Theorem 4.1 (here, we do not have to exploit the additional Assumption B),
27
and we get
1
b − λk2 1 c
.
sup sup E[kλ
Ξ1 ∩Ξ2 ] .
e
k
n
λ∈Λrγ f ∈Fαd
(B.11)
Upper bound for 4 : To find a uniform upper bound for the term 4 , one can use exactly
the same decompositions as in the proof of the uniform upper bound for 3 in Theorem 4.1 by
replacing the probability of Ξc1 with the one of Ξc3 . Doing this, we obtain by means of Lemma B.6
that
1
b − λk2 1
.
(B.12)
sup sup E[kλ
Ξ1 ∩Ξ2 ∩Ξc3 ] .
e
k
r
m
d
λ∈Λγ f ∈Fα
The result of the theorem now follows by combining (B.9), (B.10), (B.11) and (B.12).
B.3. Auxiliary results
Lemma B.1 Let Assumption A hold. Then the following assertions hold true.
a) δjα /n ≤ 1 for all n ∈ N and j ∈ {0, . . . , Nnα },
−5 for all m ∈ N, and
α /(128d) ≤ C(d)m
b) exp −mαMm
2
−1 for all m ∈ N.
α |[f ]j | ≥ 2m
c) min1≤j≤Mm
α = 1 and there is nothing to show. Otherwise 0 < N α ≤
Proof. a) In case Nnα = 0, we have δN
α
n
n
α
n, and by definition of Nn we have (2j + 1)∆αj ≤ n/ log(n + 3) for 0 ≤ j ≤ Nnα which by the
definition of δjα implies that
δjα ≤
n
log(n/((2j + 1) log(n + 3)) ∨ (j + 3))
·
.
log(n + 3)
log(j + 3)
We consider two cases: In the first case, n/((2j + 1) log(n + 3)) ∨ (j + 3) = j + 3. Then n ≥ 1
directly implies the estimate δjα ≤ n. In the second case, we have n/((2j +1) log(n+3))∨(j +3) =
n/((2j + 1) log(n + 3)) and therefrom
δjα ≤ n log(n)/(log(n + 3) log(j + 3)) ≤ n,
and thus δjα ≤ n in both cases. Division by n yields the assertion of the lemma.
α > 0 for all sufficiently large m and that it is
b) Note that, due to Assumption A, we have Mm
α , we have
sufficient to show the desired inequality for such values of m. By the definition of Mm
−1
α ≥ 640dm
αMm
· log(m + 1) which implies
−5
α /(128d)) ≤ exp(−5 log m) = m
exp(−mαMm
,
and the assertion follows.
c) Take note of the observation that
min α |[f ]j |2 ≥
1≤j≤Mm
min α
1≤j≤Mm
α
αMm
αj
=
≥ 640m−1 · log(m + 1)
d
d
and 640m−1 · log(m + 1) ≥ 2m−1 for all m ≥ 1.
Lemma B.2 Let (δk∗ )k∈N0 and (∆∗k )k∈N0 be sequences such that for all k ≥ 1,
δk∗ ≥
X
ωj
|[f ]j |2
0≤|j|≤k
and
28
ωj
.
0≤|j|≤k |[f ]j |2
∆∗k ≥ max
Then, for any k ∈ {1, . . . , n ∧ m}, we have
E
"
∗
e n∧m , ti|2 − 33δk ([ℓ]0 ∨ 1)
sup |hΘ
8n
t∈Bk
≤ K1
(
! #
+
∗
kf k kλk ∆k
n
δk∗
exp −K2 ·
kf k kλk ∆∗k
!
)
√
δ∗
+ k2 exp −K3 n ,
n
with positive numerical constants K1 , K2 , and K3 .
Proof. The proof is a combination of the proofs of Lemma A.1 in [Kro16] (which deals with
the case ω ≡ 1) and Lemma A.4 in [JS13] (where general sequences ω are considered in the
framework with random variables instead of point processes). More precisely, one can apply
Proposition C.1 in [Kro16] with c(ε) from that statement replaced with c(ε) = 4(1 + 2ε) (this
δ∗
makes the proposition applicable also for complex-valued functions), M12 = δk∗ , H 2 = nk ([ℓ]0 ∨1),
1
υ := kλkkf k∆∗k ([ℓ]0 ∨ 1) and setting ε = 64
.
Lemma B.3 Let m ∈ N and k ∈ N0 . Then
"
2
sup E sup |hΘ̌n∧m , tiω |
λ∈Λrγ
t∈Bk
#
≤ C(d, r) · Φm .
Proof. Note that λ ∈ Λrγ implies
c] · 1 − 1|2 ]
E[ sup |hΘ̌n∧m , tiω |2 ] ≤ r sup ωj γj−1 E[|[f ]j /[f
Ωj
j
t∈Bk
−k≤j≤k
Thus, recalling the definition of Φm in (3.2), it suffices to show that
c] · 1 − 1|2 ] ≤ C(d, r) min{1, 1/(mα )},
E[|[f ]j /[f
Ωj
j
j
which can be realised by means of the identity
c] · 1 − 1|2 ] = E[|[f ] /[f
c] 1 − 1|2 · 1 ] + P(Ωc ) =: + △.
E[|[f ]j /[f
Ωj
j
Ωj
j
j
j Ωj
The bound ≤ C(d, r) min{1, 1/(mαj )} was already derived in the proof of Theorem 3.6. For
△, the corresponding upper bound can be obtained from statement c) of Lemma A.1.
Lemma B.4 Let Assumption A hold and consider the event Ξ1 defined in Theorem 4.1. Then,
for any n ∈ N, P(Ξc1 ) ≤ 2 exp(−Cn) with a numerical constant C = C(η) > 0.
Proof. Note that
c ∨ 1 < η([ℓ] ∨ 1)) + P([ℓ]
c ∨ 1 > η −1 ([ℓ] ∨ 1)),
P(Ξc1 ) = P([ℓ]
0
0
0
0
and the two terms on the right-hand side can be bounded by Chernoff bounds for Poisson
distributed random variables (see [MU05], Theorem 5.4). More precisely, we have
c ∨ 1 < η([ℓ] ∨ 1)) ≤ exp(−ω (η)n),
P([ℓ]
0
1
0
and
c ∨ 1 > η −1 ([ℓ] ∨ 1)) ≤ exp(−ω (η)n)
P([ℓ]
0
2
0
with ω1 (η) = 1 − η + η log η > 0 and ω2 (η) = 1 − η −1 − η −1 log η > 0 for all η ∈ (0, 1).
Lemma B.5 Let Assumption A hold and consider the event Ξ2 defined in the proof of Theorem 4.1. Then, for any m ∈ N, P(Ξc2 ) ≤ C(d)m−4 .
29
Proof. The complement Ξc2 of Ξ2 is
α
c] − 1| > 1/2 or |[f
c] |2 < 1/m}.
Ξc2 =:= {∃1 ≤ |j| ≤ Mm
: |[f ]j /[f
j
j
α }. In
Owing to statement c) from Lemma B.1 we have |[f ]j |2 ≥ 2/m for all j ∈ {1, . . . , Mm
c] |2 < 1/m a direct calculation using the reverse triangle inequality shows that
case that |[f
j
c] /[f ] −1| > 1/3,
c] /[f ] −1| ≥ 1/√2−1 > 1/4. In case that |[f ] /[f
c] −1| > 1 , one obtains |[f
|[f
j
j
j
j
j
j
2
and thus together we have
α
c] /[f ] − 1| > 1/4}.
Ξc2 ⊆ {∃1 ≤ |j| ≤ Mm
: |[f
j
j
Now, Hoeffding’s inequality implies
2
c] /[f ] − 1| > 1/4) ≤ 4 exp − m|[f ]j |
P(|[f
j
j
128
!
α
mαMm
≤ 4 exp −
128d
,
and the statement of the lemma follows from statement b) of Lemma B.1 and the estimate
α ≤ m which holds by definition of M α .
Mm
m
Lemma B.6 Let Assumptions A and B hold. The event Ξ3 defined in (B.2) satisfies P(Ξc3 ) ≤
C(α, d)m−4 for all m ∈ N.
Proof. Let us consider the random sets
α−
cnm } and
Ξ31 := {Nnα− ∧ Mm
>K
cnm > N α+ ∧ M α+ }.
Ξ32 := {K
n
m
Then, Ξc3 = Ξ31 ∪ Ξ32 and we establish bounds for P (Ξ31 ) and P (Ξ32 ), separately.
cm < K α− }. Owing to
bn < K α− } ∪ {M
Upper bound for P (Ξ31 ): We use the equality Ξ31 = {N
nm
nm
2
+
α−
the definition of Nn , we have |[f ]j | /((2j + 1)ωj ) ≥ 4 log(n + 4)/n for all j ∈ {0, . . . , Nnα− },
which yields
c] |2 /((2j + 1)ω + ) < log(n + 4)/n}
bn < K α− } ⊆ {∃1 ≤ j ≤ K α− : |[f
{N
nm
nm
j
j
⊆
⊆
[
α−
1≤j≤Knm
[
α−
1≤j≤Knm
c] |/|[f ] | ≤ 1/2}
{|[f
j
j
c] /[f ] − 1| ≥ 1/2}.
{|[f
j
j
cm < K α− } ⊆
In a similar way, we obtain {M
nm
α− ≤ M α+ by definition, we have
Mm
m
Ξ31 ⊆
[
α+
1≤j≤Mm
S
c
α− {|[f ] /[f ]j
j
0≤j≤Knm
− 1| ≥ 1/2}. Thus, since
c] /[f ] − 1| ≥ 1/2}.
{|[f
j
j
Applying Hoeffding’s inequality as in the proof of Lemma B.5 and exploiting Assumption B
yields
!
X
m|[f ]j |2
P(Ξ31 ) ≤ 4
exp −
≤ C(α, d) · m−4 .
(B.13)
128
α+
1≤|j|≤Mm
cm > K α+ }. In particular,
bn > K α+ } ∩ {M
Upper bound for P (Ξ32 ): First, note that Ξ32 = {N
nm
nm
α+
α+
α+
Knm < n ∧ m. If Knm = Nn < n, we obtain
c] |2 /((2j + 1)ω + ) ≥ log(n + 4)/n}
bn > N α+ } ⊆ {∀1 ≤ j ≤ N α+ + 1 : |[f
Ξ32 ⊆ {N
n
n
j
j
30
c] α+ |/|[f ] α+ | ≥ 2} ⊆ {|[f
c] α+ /[f ] α+ − 1| ≥ 1}.
⊆ {|[f
Nn +1
Nn +1
Nn +1
Nn +1
2
α+ = M α+ < m, using m−1 log m ≥ 4|[f ]
Analogously, if Knm
α+
m
Mm
+1 | yields
c] α+ /[f ] α+ − 1| ≥ 1}
cm > M α+ } ⊆ {|[f
Ξ32 ⊆ {M
m
Mm +1
Mm +1
c] α+ /[f ] α+
and thus Ξ32 ⊆ {|[f
Knm +1
Knm +1 − 1| ≥ 1}. Application of Hoeffding’s inequality and
exploiting Assumption B yields
P(Ξ32 ) ≤ 4 exp −
2
m|[f ]Knm
α+
+1 |
128
!
≤ 4 exp −
mαMm
α+
+1
128d
≤ C(α, d)m−5 .
(B.14)
The statement of the lemma follows by combining Equations (B.13) and (B.14).
C. Proofs of Section 5
C.1. Proof of Theorem 5.1
We define all the quantities appearing in this proof exactly as in the proof of Thereom 4.1 unless
otherwise stated. We use the decomposition
b − λk2 ] = + +
E[kλ
1
2
3
ω
e
k
established in the proof of Theorem 4.1 and use exactly the same arguments as in that proof to
bound the terms 2 and 3 . Thus, it remains to find an appropriate bound for 1 . In order to
get such a bound, we first proceed as in the proof of Theorem 4.1 in order to obtain on Ξ1 ∩ Ξ2
the estimate
b − λk2 ≤ 7rω γ −1 + 4pen
e n∧m , tiω |2 + 32 sup |hΘ̌n∧m , tiω |2 . (C.1)
g k − 4pen
g e + 40 sup |hΘ
kλ
k k
ω
e
k
k
t∈B
t∈B
e
Let us now introduce the quantity
X
λ̈k :=
0≤|j|≤k
e
k∨k
k∨k
c |ε]
E[[ℓ]
j
[f ]j
ej
where ε = (ε1 , . . . , εn ) is the vector containing the unobserved shifts εi in (2.5). Using the
e n∧m = λ
e n∧m − λn∧m = λ
e n∧m − λ̈n∧m + λ̈n∧m − λn∧m and setting
decomposition Θ
(1)
e n∧m − λ̈n∧m
Θn∧m := λ
and
(2)
Θn∧m := λ̈n∧m − λn∧m
we obtain from (C.1) that on Ξ1 ∩ Ξ2
(1)
b − λk2 ≤ 7rω γ −1 + 4pen
g k − 4pen
g e + 80 sup |hΘn∧m , tiω |2
kλ
k k
ω
e
k
k
t∈B
e
k∨k
+ 80 sup
t∈B
e
k∨k
(2)
|hΘn∧m , tiω |2
+ 32 sup |hΘ̌n∧m , tiω |2 .
t∈B
e
k∨k
Taking expectations, we obtain in analogy to the proof of Theorem 4.1 that
b − λk2 1Ξ ∩Ξ ] ≤ C
E[kλ
ω
1
2
e
k
min α max
0≤k≤Knm
ωk Dαk log(n + 2)
,
γk
n
31
X
E
"
X
E
"
α
Knm
+ 80
k=0
α
Knm
+ 80
k=0
E
100 log(n + 2)dDαk ([ℓ]0 ∨ 1)
−
n
! #
100 log(n + 2)dDαk ([ℓ]20 ∨ 1)
n
! #
(2)
sup |hΘn∧m , tiω |2 −
t∈Bk
+
+
+ 32E sup |hΘ̌n∧m , tiω |2 .
We have
"
sup
t∈Bk
(1)
|hΘn∧m , tiω |2
sup
t∈Bk
(1)
|hΘn∧m , tiω |2
t∈B
e
k∨k
(C.2)
! #
100 log(n + 2)dDαk ([ℓ]0 ∨ 1)
−
n
" "
=E E
+
100 log(n + 2)dDαk ([ℓ]0 ∨ 1)
(1)
sup |hΘn∧m , tiω |2 −
n
t∈Bk
!
+
##
|ε
We apply Lemma C.2 with δk∗ = dDαk in order to obtain
E
"
sup
t∈Bk
(1)
|hΘn∧m , tiω |2
100 log(n + 2)dDαk ([ℓ]0 ∨ 1)
−
n
!
+
.
|ε
#
q
Dαk
Dαk
+
exp(−K
n log(n + 2)).
2
n3
n2
Hence
E
"
sup
t∈Bk
(1)
|hΘn∧m , tiω |2
100 log(n + 2)dDαk ([ℓ]0 ∨ 1)
−
n
! #
.
+
q
Dαk
Dαk
+
exp(−K
n log(n + 2)).
2
n3
n2
α ≤ N α and hence by the definition of N α that
By definition of Ξ we have Knm
n
n
Dαk ≤ DαNnα =
X
0≤|j|≤Nnα
X
ωj
n
1
≤
.n
αj
log(n + 3) 0≤|j|≤N α 2|j| + 1
n
where we obtain the last estimate thanks to the logarithmic increase of the harmonic series. Due
α ≤ n we obtain
to Knm
α
Knm
X
E
k=0
"
sup
t∈Bk
(1)
|hΘn∧m , tiω |2
100 log(n + 2)dDαk ([ℓ]0 ∨ 1)
−
n
! #
.
+
1
.
n
Applying Lemma C.4 with δk∗ = dDαk we obtain that
E
"
sup
t∈Bk
(2)
|hΘn∧m , tiω |2
100 log(n + 2)dDαk ([ℓ]20 ∨ 1)
−
n
! #
+
.
Dαk
exp (−2 log(n + 2))
n
+
q
Dαk
exp(−K
n log(n))
2
n2
Using the relation Dαk . n from above we obtain
α
Knm
X
k=0
E
"
sup
t∈Bk
(2)
|hΘn∧m , tiω |2
100 log(n + 2)dDαk ([ℓ]20 ∨ 1)
−
n
32
! #
+
.
1
.
n
Finally, bounding the last term in (C.2) by means of Lemma B.3 we obtain from (C.2) using
the obtained estimates that
b − λk2 1Ξ ∩Ξ ] ≤
E[kλ
ω
1
2
e
k
min α max
0≤k≤Knm
ωk Dαk log(n + 2)
,
γk
n
+ Φm +
1
.
n
This shows the desired lower bound for 1 and combining it with the bounds for 2 and 3
yields the result.
C.2. Proof of Theorem 5.2
We use the same decomposition as in the Proof of Theorem 4.2. In particular, all the quantities
arising in the sequel are defined as in the proof of Theorem 4.2 unless otherwise stated. The
terms 2 , 3 , and 4 are bounded exactly as in the proof of Theorem 4.2 and it remains find
P
ω
an appropriate bound for 1 . Set Dk := 0≤|j|≤k |[f ]jj |2 and
c ∨ 1) ·
penk = 2000η −1 · ([ℓ]
0
Dk log(n + 2)
c 2 ∨ 1) · Dk log(n + 2) .
+ 2000η −2 · ([ℓ]
0
n
n
d k one immediately obtains that on Ξ
From the definition of penk and pen
d k ≤ 9penk
penk ≤ pen
from which one follows that
d k − pen
d b)1Ξ ≤ (penk + penb + pen
d k − pen
d b)1Ξ ≤ 10penk .
(penk∨bk + pen
k
k
k
Now, combining the arguments from the proofs of Theorem 4.2 and 5.1 one can show
b − λk2 1 ] .
sup sup E[kλ
ω Ξ
b
k
r
d
λ∈Λγ f ∈Fα
min α− max
0≤k≤Knm
ωk Dαk log(n + 2)
,
γk
n
+ Φm +
1
.
n
The statement of the Theorem follows now by combining the bounds established for 1 , 2 ,
3 , and 4 .
C.3. Auxiliary results
The following result is a conditional version of Proposition C.1 in [Kro16]. Since the proof is
exactly the same as the one in the unconditional case (with Poisson processes instead of Cox
processes) we omit its proof.
Proposition C.1 Let N1 , . . . , Nn be Cox processes onRa Polish space XR driven by finite random
P
measures η1 , . . . , ηn , respectively. Set νn (r) = n1 nk=1 { X r(x)dNk (x)− X r(x)dηk (x)} for r contained in a countable class R of complex-valued measurable functions. Denote η = (η1 , . . . , ηn ).
Then, for any ε > 0, there exist constants c1 , c2 = 16 , and c3 such that
E
"
2
sup |νn (r)| − c(ε)H
r∈R
2
!
≤ c1
+
(
|η
#
nH 2
2υ
exp −c2 ε
n
υ
33
!
√ nH
M2
+ 2 1 2 exp −c3 C(ε) ε
C (ε)n
M1
)
√
where C(ε) = ( 1 + ε − 1) ∧ 1, c(ε) = 4(1 + 2ε) and M1 , H and υ are such that
"
sup krk∞ ≤ M1 ,
#
E sup |νn (r)||η ≤ H, and sup Var
r∈R
r∈R
r∈R
Lemma C.2 Let (δk∗ )k∈N0 be a sequence such that δk∗ ≥
E
"
sup
t∈Bk
(1)
|hΘn∧m , ti|2
100 log(n + 2)δk∗ ([ℓ]0 ∨ 1)
−
n
≤ K1
!
+
P
#
Z
X
r(x)dNk (x)|η ≤ υ ∀k.
ωj
0≤|j|≤k |[f ]j |2
for all k ∈ N0 . Then,
|ε
q
δk∗ ([ℓ]0 ∨ 1)
δ∗
exp (−2 log(n + 2)) + k2 exp −K2 n log(n + 2)
n
n
,
with strictly positive numerical constants K1 and K2 .
Proof. Putting rt =
P
0≤|j|≤k
ωj [f ]−1
−j [t]−j ej , it is easy to check that given ε
(1)
hΘn∧m , tiω
n
1X
=
n i=1
Z
1
0
rt (x)(dNi (x) − λεi (x)dx)
where λε (x) = λ(x − ε − ⌊x − ε⌋). Thus, we are in the framework of Proposition C.1 and it
remains to find suitable constants M1 , H, and υ satisfying its preconditions.
Condition concerning M1 : We have
sup krt k2∞ = sup sup |rt (y)|2 ≤
t∈Bk y∈[0,1)
t∈Bk
X
ωj
≤ δk∗
2
|[f
]
|
j
0≤|j|≤k
1
and one can choose M1 = (δk∗ ) 2 .
Condition concerning H: We have
(1)
E[ sup |hΘn∧m , tiω |2 | ε] =
t∈Bk
([ℓ] ∨1)δ∗ log(n+2) 1/2
0
k
and one can choose H =
n
Condition concerning υ: It holds that
Var
Z
0
1
X
([ℓ]0 ∨ 1)δk∗ log(n + 2)
ωj
[ℓ]0
·
≤
n 0≤|j|≤k |[f ]j |2
n
rt (x)Nk (x) | ε =
Z
0
1
.
X
ωj
· [ℓ]0 ≤ δk∗ · ([ℓ]0 ∨ 1)
|rt (x)|2 λεk (x)dx ≤
2
|[f
]
|
j
0≤|j|≤k
and one can choose υ = δk∗ · ([ℓ]0 ∨ 1). The statement of the Lemma follows now by applying
Proposition C.1 with ε = 12.
Proposition C.3 Let X1 , . . . , Xn random variables with values in some Polish space. Let
P
νn (r) = n1 ni=1 r(Xi ) − E[r(Xi )] for r belonging to some countable set R of measurable complexvalued functions. Then, for all ε > 0, there are constants c1 , c2 = 61 and c3 such that
E
"
2
sup |νn (r)| − c(ε)H
r∈R
2
! #
+
≤ c1
(
nH 2
2υ
exp −c2 ε
n
υ
34
!
√ nH
M2
+ 2 1 2 exp −c3 C(ε) ε
C (ε)n
M1
)
,
√
with C(ε) = ( 1 + ε − 1) ∧ 1, c(ε) = 4(1 + 2ε) and
"
sup krk∞ ≤ M1 ,
#
E sup |νn (r)| ≤ H,
r∈R
r∈R
sup Var(r(Xk )) ≤ υ∀k.
r∈R
Proof. The proof consists of an easy adaption of the proof given in [Cha13] to the complex-valued
case and the statement follows by bookkeeping of the occuring numerical constants.
Lemma C.4 Let (δk∗ )k∈N0 be a sequence such that δk∗ ≥
E
"
sup
t∈Bk
(2)
|hΘn∧m , ti|2
100 log(n + 2)δk∗ ([ℓ]20 ∨ 1)
−
n
≤ K1
(
δk∗ ([ℓ]20 ∨
n3
1)
+
P
! #
ωj
0≤|j|≤k |[f ]j |2
+
([ℓ]20 ∨ 1)δk∗
n2
for all k ∈ N0 . Then
q
)
· exp(−K2 n log(n + 2)) .
P
Proof. We define rt′ (x) = 0≤|j|≤k ωj [f ]−1
−j [t]−j ej which coincides with the definition of rt in the
proof of Lemma C.2. Then, we have
(2)
hΘn∧m , tiω
R
n
1X
=
n i=1
Z
1
0
rt′ (x)λεi (x)dx
−
Z
1
0
rt′ (x)ℓ(x)dx.
Setting rt (εi ) = 01 rt′ (x)λεi (x)dx, we are in the framework of Proposition C.3 and its remains
to find suitable constants M1 , H and υ satisfying the preconditions of this proposition.
Condition concerning M1 : Note that the definition of rt′ is the same as the definition of rt in the
proof of Lemma C.2. Thus we obtain
sup krt k∞ = sup sup |
ε∈[0,1) t∈Bk
t∈Bk
Z
1
0
rt′ (x)λε (x)dx| ≤ (δk∗ )1/2 · sup
Z
1
ε∈[0,1) 0
λε (x)dx = (δk∗ )1/2 · ([ℓ]0 ∨ 1)
and we can take M1 = (δk∗ )1/2 · ([ℓ]0 ∨ 1).
Condition concerning H: We have
E[ sup
t∈Bk
(2)
|hΘn∧m , tiω |2 ]
ωj 1
E[|
≤
|[f ]j |2 n
0≤|j|≤k
≤
δ∗ log(n+2) 1/2
Var(rt (εi )) ≤ E
0
1
Z
1
0
ej (x)(λε1 (x)dx − ℓ(x)dx)|2 ]
δk∗ [ℓ]20
δ∗ [ℓ]2 log(n + 2)
≤ k 0
n
n
and we can set H = k n
Condition concerning υ: It holds
"Z
X
· ([ℓ]0 ∨ 1).
2
rt′ (x)λεi (x)dx
#
≤ [ℓ]20 · E
Z
1
0
|rt′ (x)|2
λεi (x)
dx ≤ ([ℓ]20 ∨ 1) · δk∗
[λ]0
and we define υ = ([ℓ]20 ∨ 1) · δk∗ . Now that statement of the lemma follows from Proposition C.3
with ε = 12.
References
[AB06]
Antoniadis, A. and Bigot, J. Poisson inverse problems. Ann. Statist. 34 (2006),
2132–2158.
35
[BB09]
Baraud, Y. and Birgé, L. Estimating the intensity of a random measure by histogram type estimators. Probab. Theory Related Fields 143 (2009), 239–284.
[BBM99]
Barron, A., Birgé, L., and Massart, P. Risk bounds for model selection via
penalization. Probab. Theory Related Fields 113 (1999), 301–413.
[Big+13]
Bigot, J. et al. Intensity estimation of non-homogeneous Poisson processes from
shifted trajectories. Electron. J. Stat. 7 (2013), 881–931.
[Bir07]
Birgé, L. Model selection for Poisson processes. In: IMS Lecture Notes - Monograph
Series. Institute of Mathematical Statistics, 2007, 32–64.
[Bré81]
Brémaud, P. Point processes and queues, martingale dynamics. Springer, 1981.
[Cav08]
Cavalier, L. Nonparametric statistical inverse problems. Inverse Problems 24 (2008).
[Cha13]
Chagny, G. Estimation adaptative avec des données transformées ou incomplètes.
Application à des modèles de survie. PhD thesis. 2013. url: https://tel.archives-ouvertes.fr/t
[CJ02]
Cavalier, L. and Ja-Yong Koo. Poisson intensity estimation for tomographic data
using a wavelet shrinkage approach. IEEE T. Inform. Theory 48 (2002), 2794–2802.
[CL10]
Comte, F. and Lacour, C. Pointwise deconvolution with unknown error distribution. C. R. Math. Acad. Sci. Paris 348 (2010), 323–326.
[CL11]
Comte, F. and Lacour, C. Data-driven density estimation in the presence of additive noise with unknown distribution: Data-driven Density Estimation. J. Roy.
Statist. Soc. Ser. B 73 (2011), 601–627.
[Com15]
Comte, F. Estimation non-paramétrique. Spartacus, Paris, 2015.
[CRT06]
Comte, F., Rozenholc, Y., and Taupin, M.-L. Penalized contrast estimator for
adaptive density deconvolution. Can. J. Stat. 34 (2006), 431–452.
[DH93]
Diggle, P. J. and Hall, P. A Fourier approach to nonparametric deconvolution of
a density estimate. J. Roy. Stat. Soc. Ser. B 55 (1993), 523–531.
[GN00]
Grègoire, G. and Nembè, J. Convergence rates for the minimum complexity estimator of counting process intensities. Nonparametric Statistics 12 (2000), 611–643.
[HMZ03]
Helmers, R., Mangku, I. W., and Zitikis, R. Consistent estimation of the intensity function of a cyclic Poisson process. J. Multivariate Anal. 84 (2003), 19–39.
[Joh09]
Johannes, J. Deconvolution with unknown error distribution. Ann. Statist. 37 (2009),
2301–2323.
[JS13]
Johannes, J. and Schwarz, M. Adaptive circular deconvolution by model selection
under unknown error distribution. Bernoulli 19 (2013), 1576–1611.
[Kar91]
Karr, A. F. Point processes and their statistical inference. Marcel Dekker, New
York, 1991.
[KR05]
Klein, T. and Rio, E. Concentration around the mean for maxima of empirical
processes. Ann. Probab. 33 (2005), 1060–1077.
[Kro16]
Kroll, M. Concentration inequalities for Poisson point processes with an application to intensity estimation from indirect observations. ArXiv e-prints (2016). arXiv:
1612.07901.
[Kut98]
Kutoyants, Y. A. Statistical inference for spatial Poisson processes. Springer, New
York, 1998.
[Mas00]
Massart, P. About the constants in Talagrand’s concentration inequalities for empirical processes. Ann. Probab. 28 (2000), 863–884.
36
[Mei09]
Meister, A. Deconvolution problems in nonparametric statistics. Springer, Berlin,
2009.
[MU05]
Mitzenmacher, M. and Upfal, E. Probability and computing: randomized algorithms and probabilistic analysis. Cambridge University Press, Cambridge, 2005.
[Neu07]
Neumann, M. H. Deconvolution from panel data with unknown error distribution.
J. Multivariate Anal. 98 (2007), 1955–1968.
[NH97]
Neumann, M. and Hössjer, O. On the effect of estimating the error density in
nonparametric deconvolution. J. Nonparametr. Stat. 7 (1997), 307–330.
[Pet95]
Petrov, V. V. Limit theorems of probability theory. Clarendon Press, Oxford, UK,
1995.
[PW04]
Patil, P. N. and Wood, A. T. A. Counting process intensity estimation by orthogonal wavelet methods. Bernoulli 10 (2004), 1–24.
[RB03]
Reynaud-Bouret, P. Adaptive estimation of the intensity of inhomogeneous Poisson processes via concentration inequalities. Probab. Theory Related Fields 126 (2003),
103–153.
[Rei89]
Reiss, R.-D. Approximate distributions of order statistics. Springer, New York, 1989.
[Rei93]
Reiss, R.-D. A course on point processes. Springer, New York, 1993.
[Res87]
Resnick, S. I. Extreme values, regular variation and point processes. Springer, 1987.
[San14]
Sansonnet, L. Wavelet thresholding estimation in a Poissonian interactions model
with application to genomic data. Scand. J. Statist. 41 (2014), 200–226.
[Ser09]
Serfozo, R. Basics of applied stochastic processes. Springer, Berlin, 2009.
[Sto+13]
Stoyan, D. et al. Stochastic Geometry and its Applications. Third edition. John
Wiley & Sons, 2013.
[SVB10]
Schwarz, M. and Van Bellegem, S. Consistent density deconvolution under partially known error distribution. Statist. Probab. Lett. 80 (3-4) (2010), 236–241.
[SZ12]
Shen, J. J. and Zhang, N. R. Change-point model on nonhomogeneous Poisson processes with application in copy number profiling by next-generation DNA sequencing.
Ann. Appl. Statist. 6 (2012), 476–496.
[Tsy08]
Tsybakov, A. B. Introduction to nonparametric estimation. Springer, New York,
2008.
[ZK10]
Zhang, T. and Kou, S. Nonparametric inference of doubly stochastic Poisson process data via the kernel method. Ann. Appl. Statist. 4 (2010), 1913–1941.
37
| 10math.ST
|
Community detection with spiking neural networks for
neuromorphic hardware∗
arXiv:1711.07361v1 [cs.NE] 20 Nov 2017
Kathleen E. Hamilton
Oak Ridge National Laboratory
Computing & Computational
Sciences Dir
One Bethel Valley Road
Oak Ridge, Tennessee 37831-6015
[email protected]
Neena Imam
Oak Ridge National Laboratory
Computing & Computational
Sciences Dir
One Bethel Valley Road
Oak Ridge, Tennessee 37831-6015
[email protected]
Travis S. Humble
Oak Ridge National Laboratory
Computing & Computational
Sciences Dir
One Bethel Valley Road
Oak Ridge, Tennessee 37831-6015
[email protected]
ABSTRACT
1
We present results related to the performance of an algorithm for
community detection which incorporates event-driven computation. We define a mapping which takes a graph G to a system
of spiking neurons. Using a fully connected spiking neuron system, with both inhibitory and excitatory synaptic connections,
the firing patterns of neurons within the same community can be
distinguished from firing patterns of neurons in different communities. On a random graph with 128 vertices and known community
structure we show that by using binary decoding and a Hammingdistance based metric, individual communities can be identified
from spike train similarities. Using bipolar decoding and finite rate
thresholding, we verify that inhibitory connections prevent the
spread of spiking patterns.
Graph partitioning and community detection are ubiquitous tasks
encountered in a diverse set of sciences and many methods have
been developed to sort the vertices of a graph, or nodes of a network into classes based on similarity measures. These methods
utilize graphical characteristics and structures, such as transitivity,
modularity or betweenness, and spectral-based analysis and often
require large scale matrix analysis [2, 4, 5, 24]. These methods can
be parallelized and many algorithms exist for the analysis of very
large networks. However, the emergence of unconventional processors, such as neuromorphic processors, requires approaches which
utilize event-based computation. We present work in this paper
related to the development of an algorithm which incorporates
event-based computation in the identification of related vertices in
networks or graphs.
Inspired by the recent work of Shaub et al [33] in which the
different approaches to community detection are organized according to the problem they are designed to solve (e. g. partitioning
problems, clustering problems, dynamical problems), we describe
our approach as a hybrid dynamical clustering method which incorporates the discrete time signals of a spiking neuron system. In this
paper we present results that serve as a proof-of-concept related
to the mapping of recurrent neural networks based on interacting
spin dynamics (Hopfield networks) to spiking neural systems.
Our goal is to construct a system of spiking neurons which can be
used to generate a set of spike responses which can identify vertex
communities in a graph. We choose to characterize a community
in a graph G(V, E) as a subset of vertices v ∈ V such that the
density of edges internal to this subset is higher than the density of
edges connecting to the remainder of the graph. This is similar to
definitions used in other cluster based models [27]. There is a well
known aphorism in Hebbian learning, attributed to Siegrid Löwel
[21]: “neurons that fire together are wired together.” We use the
statement inversion:“neurons that are wired together, fire together”
to construct our approach to community detection.
The vertices and edges of a given graph G are mapped to a network of symmetrically connected spiking neurons, which is then
selectively driven by time-dependent external currents. There must
be a degree of similarity between the resulting spike trains which
can be used to distinguish individual communities of G. We binary decoding and bipolar decoding of spike trains with similarity
between trains measured using a Hamming distance metric. The
ability to identify individual communities is dependent on the linear
CCS CONCEPTS
•Mathematics of computing → Graph algorithms; Random
graphs; •Hardware → Emerging tools and methodologies; Neural systems;
KEYWORDS
neuromorphic, community detection, spiking neural networks
ACM Reference format:
Kathleen E. Hamilton, Neena Imam, and Travis S. Humble. 2017. Community detection with spiking neural networks for neuromorphic hardware.
In Proceedings of ORNL Neuromorphic workshop, Oak Ridge, Tennessee USA,
July 2017 (Neuromorphic Computing), 7 pages.
DOI:
∗ This
work was supported by the United States Department of Defense and used
resources of the Computational Research and Development Programs at Oak Ridge
National Laboratory. This manuscript has been authored by UT-Battelle, LLC, under
Contract No. DE-AC0500OR22725 with the U.S. Department of Energy. The United
States Government retains and the publisher, by accepting the article for publication,
acknowledges that the United States Government retains a non-exclusive, paid-up,
irrevocable, world-wide license to publish or reproduce the published form of this
manuscript, or allow others to do so, for the United States Government purposes. The
Department of Energy will provide public access to these results of federally sponsored
research in accordance with the DOE Public Access Plan.
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be honored.
For all other uses, contact the owner/author(s).
Neuromorphic Computing, Oak Ridge, Tennessee USA
© 2017 Copyright held by the owner/author(s). .
DOI:
INTRODUCTION
Neuromorphic Computing, July 2017, Oak Ridge, Tennessee USA
separability of the Hamming distance metric values. This is controlled by the size of the bin width ∆t used in the binary decoding
of individual spike trains.
This approach incorporates Hopfield networks [13–15] and spin
glass models [1, 31, 32]. It has been shown that recurrent networks
with steady states can be used to find solutions to the problem
of graph partitioning [12, 36]. The use of positive and negatively
weighted edges is needed to drive the system to a solution which
meets the optimization conditions. However, these approaches
are often limited to finding partitions of equal sizes in a graph, or
require prior knowledge of the number of communities to find.
Hopfield networks have been implemented using spiking neurons for the task of content addressable memories and pattern
retrieval [23, 34], in this work we focus on the application of the
recurrent neural network model to a task related to graph partitioning. We show in this paper that in conjunction with carefully
chosen parameters for our neuron model, these spin-glass based
models can be used to find un-equal sized groups. We establish that
spiking data can be used to identify communities.
Recent works on community detection have focused on how
real-world networks may have ambiguous community structure
and there are limitations how much information can be inferred
from metadata based approaches [29]. In this work we focus on a
discussion of how spiking data can be used to identify communities
and we work with graphs generated with known communities and
fixed labels. The graphs analyzed in this paper are all instances
of a specific class of random graphs: Girvan-Newman benchmark
graphs [9]. These graphs have 128 vertices organized into 4 equalorder communities of 32 vertices each. The average degree is hdi =
16. Using these graphs we demonstrate our spike-based approach
to community detection, focusing on binary decoding and bipolar
decoding of spike trains.
A graph is mapped to a system of spiking neurons and driven
in such a manner that the generated spike trains can be used to
reconstruct the known community labels of the original graph.
Two neurons (ni , n j ) in Q i=j must have firing patterns that exhibit
a degree of similarity which distinguishes them from the spike
trains generated by neurons (ni , n j ) in Q j,i . In Section 2, we derive
the theoretical structure which underlies the main components
of our approach. We begin with how a graph G is mapped to a
spiking neural network (SNN). Then, we discuss how the physical
parameters associated with the spiking neuron system must be set
and how the selective driving of this SNN must be done in order to
generate a set of spike trains are generated that can distinguish a
single community Q i from the remaining Q j,i . In Sections 3 and 4
we describe how spike responses are decoded and we discuss the
metrics we use to analyze decoded spike trains. This paper presents
on results which establish proof-of-concept that a mapping and
driving pattern exists which can be used to generate spike trains
characteristic of a graph’s known community structure. In Section 5
we introduce how our spiking neural networks can be incorporated
into existing community detection algorithms.
K. Hamilton et al.
2
SPIKING NEURON MODEL
CONSTRUCTION
We focus on community detection in undirected, unweighted graphs.
A graph is defined by a vertex set and an edge set G = G(V, E).
Multiple edges and self-loops are not allowed. In this initial work,
we study graphs with clearly delineated (non-overlapping) communities.
SNNs are dynamical systems which compute without the use of
steady states [22, 23]. Information is transmitted through electrical pulses. The neurons which compose the spiking network are
nonlinear units and can exhibit a rich set of dynamics and firing
patterns based on the physical parameters. We use few parameters
to build our SNNs; they are leaky-integrate and fire neurons defined by a threshold voltage (vth ), a refractory period (tr ), and a time
constant (τ ). The full spiking network itself S(N, W) is defined by a
set of homogeneous neurons N = {ni }, and a set of symmetrically
connected synapsesW = {s(w)i j }, weighted edges which connect
neurons ni ↔ n j .
For a graph G(V, E), we assume there is a set of known vertex
Ð
communities {Q i } such that i Q i = V(G) and no vertex exists
in more than one community. The remainder of this paper will
develop how spiking systems can identify individual communities
Qi .
The mapping of an undirected, unweighted graph to SNN is analogous to the construction of a Hopfield recurrent neural network;
using symmetric connections which are either positive or negatively
weighted. The two-step mapping first defines a SNN by defining
a spiking neuron for each vertex on the graph: vi ∈ V → ni ∈ N,
and each edge on the graph defines a symmetric pair of excitatory
synapses ei j ∈ E → s(w + )i j , s(w + )ji ∈ W, w + > 0. This SNN is
then transformed to a fully connected SNN by the addition of symmetric pairs of inhibitory synapses s(w − )jk , s(w − )k j ∈ W, w − < 0
for any edges which do not exist on the original graph. The magnitudes of the excitatory and inhibitory synapses are equal |s(w + )| =
|s(w − )|.
Leaky integrate and fire neurons are simplified models of neuronal behavior [8]. We work with these models because of their
close proximity to the behavior of the IBM TrueNorth processor
[3, 25]. The resulting networks of spiking neurons do not require
extensive detail about the biological behavior, nor are they an attempt to describe cortical network dynamics. We focus on a model
of the membrane potential in which the potential vi (t) of a single
neuron is a time-dependent function which changes depending on
discrete or continuous inputs. Discrete signals are measured upon
the arrival of positively and negatively weighted spikes ∆v = s(w ± ),
any external driving force term in Vex t (t) is assumed to be continuous. Additionally, we use the existence of a non-zero leak τ to
continuously relax v(t) to an equilibrium value vr .
d(vi (t)) Vex t (t) − vi (t)
=
dt
τ
Õ
Vex t (t) = Iex t (t)R +
s(w)i j δ (t − t 0 )
(1)
(2)
t 0, j→i
If a neuron’s potential exceeds the firing threshold vth , it fires a
spike along its synaptic connections and enters a refractory period
t R during which its potential is not changed. The choice of the
Community detection with spiking neurons
Neuromorphic Computing, July 2017, Oak Ridge, Tennessee USA
neuron system parameters is determined by whether they are used
to generate similar spike trains, or to enhance dissimilarity between
spike trains. The refractory period t R is needed to impose a sense
of directionality to the spread of spiking patterns. Aided by the
positively weighted synapses, spike responses spread to neurons
that have not yet fired. These correspond to connected vertices
on the graph and lead to similarities in spike trains of neurons
ni , n j in the same community Q i . The parameters that lead to
dissimilar spike trains are those which help to impede the spread
of spiking patterns across several neurons in a system, primarily
the negatively weighted synaptic connections. Many parameters
play a dual role, necessary for both creating similar spike trains and
to inhibit spike pattern spread. The time constant (τ ) is balanced
to ensure arriving spikes can accumulate and lead to secondary
firing while also ensuring that the effects of spike impulses are not
long-lived, the firing threshold vt h ensures that a neuron fires in
response to incoming spike impulses only when multiple impulses
arrive in a short time window.
For a set of homogeneous spiking neurons, there are many system parameters which are tunable in order to generate spiking
patterns which are informative about the original graph’s community structure. Previously, we have studied how the simplest
Hopfield network could be mapped to a system of spiking networks
[11] we considered graphs with fully connected communities connected by a single bridge bond (barbell graphs). These networks
could be driven using a pair of sinusoidal currents out of phase
by 180 degrees. The negative driving current, as well as a careful tuning of neuron system parameters (refractory period, time
constant, firing threshold and synaptic weight) was sufficient to
generate spike trains characteristic of the two communities. In this
work we generalize our approach to a system connected as a spin
glass, the role of the negative driving current is replaced by the
negatively weighted synapses, which inhibit the growth and limit
the occurrences of spike cascades.
The neuron dynamics under square pulse driving are relatively
simple. Only one neuron is actively driven by a square pulse at
any time (t), and the effects from the refractory period t R allow
for the equations of motion in Eq. (2) to be separated as: a set of
equation to describe the firing dynamics under active driving, and
one set of equations to describe the firing dynamics as a reaction to
a neighbor being actively driven. The equation for the square pulse
is,
be found by integrating the equation of motion:
Vex t (t) = Amax [tanh (β[t − t 1 ]) − tanh (β[t 2 − t])]
(3)
The shape of the square pulse is determined by the pulse height
(Amax ), pulse width (t A = t 2 − t 1 ), and the parameter β which
determines the sharpness of the pulse’s rise. The gap between
subsequent pulses applied to different neurons is sufficiently large
such that any ∆V induced by Vex t on neuron ni has decayed away
before neuron n j is actively driven. The parameter β controls the
sharpness of the square pulse. A sharp step is needed to ensure
that spikes are fired only when the external current is a constant
driving force, Imax = 2Amax /R, however the function Vex t (t) must
remain continuous. Under active square pulse driving, effect of the
constant driving force leads to a constant firing rate (δ ), which can
d(v(t)) Vex t (t) − v(t)
=
,
(4)
dt
τ
and is found in terms of the time constant τ , the square pulse amplitude Amax , the reset voltage v 0 and the spike threshold voltage
vth :
δ
2Amax − v 0
.
(5)
= log
τ
2Amax − vth
The firing rate δ can be used to determine the synaptic weight sw
with this assumption that a neuron (n j ) will fire a spike in response
to one of its nearest neighbors (ni , s(w + )(i→j) > 0) being actively
driven when 2 spikes arrive at n j in a short time span. Setting
sw = αvth (0 < α < 1), the first spike arrives at t 0 and increases
the potential v j (t 0 ) = v 0 + s(w + ). The arrival of the second spike
happens at t = δ and the resulting potential must exceed the spike
threshold:
v j (t 0 + δ ) > vth .
(6)
Again integrating the dynamical equation for v j during time t :
[t 0 , t 0 + δ ] is straightforward since there is no active driving. The
inequality in Eq. (6) becomes:
sw e −δ /τ + 1 > vth ,
(7)
α
δ
< log
.
(8)
τ
1+α
3
BINARY DECODING AND SPIKE TRAIN
SIMILARITY
For each neuron ni ∈ N(S), there is an associated set of spike
times called a spike train. The spike train data is analyzed using a
comparison matrix, where similarity between trains is quantified
by a similar metric as one used in Ref. [16]. Binary decoding
(m)
converts the spike trains to binary vectors x i (∆t) using a discrete
time step ∆t; x i has a value of 1 if at least one spike occurs in
the time window ∆t. The label (m) assigned to a given neuron is
(m)
included for completeness. The set of all {x i (∆t)} binary vectors
of length |x i | are compared pairwise to construct entries in an
|N| × |N| comparison matrix H with entries Hi j defined by the
normalized Hamming distance between two binary decoded spike
(n) (m)
trains: Hi j = 1 − h(x i , x j )/|x i | [16]. We introduce a modified
version of this comparison matrix:
h
i
(n)
(m)
h x i (∆t), x j (∆t) ª
©
® (1T xi )(1T xj ).
Hi j = 1 −
(9)
®
|x i |
«
¬
The inclusion of the terms: 1T xi , 1T xj down weights the entries
of the matrix Hi j in which the spike train of a firing neuron is
compared to a non-firing neuron (e.g. x i = {0} ⊗ |x i | ). Later (see
Sec. 5), as we begin to develop scalable methods for real-world
analysis, these terms will be omitted and the Hamming metric will
be defined as 0 when either x i or x j corresponds to a non-firing
neuron.
In the initial tests of our algorithm, we use the benchmark graphs
of Girvan-Newman and Fortunato (see [9, 19, 20, 26]) which have
equal-sized, strongly-connected communities with minimal overlap
Neuromorphic Computing, July 2017, Oak Ridge, Tennessee USA
K. Hamilton et al.
Q1
Q2
Q3
Figure 1: The Girvan-Newman benchmark graph instance
generated by software available from [6] and used to generate the spiking data analyzed in this paper.The different
communities are distinguished by vertex color: Community
1 (red), Community 2 (blue), Community 3 (black), Community 4 (grey).
(see Fig. 1). Using the software available at [6], we generate instances of the random Girvan-Newman graphs (and the known community memberships), map them to a SNN of homogeneous neurons, and simulate the spiking dynamics using the Brian2 Python
library [10]. A SNN is constructed with the parameters: τ = 25 ms,
vth = 0.8V, |s(w + )| = |s(w − )| = 0.75 V, v 0 = 0 V and t R = 20 ms.
The spiking data analyzed in this paper are all generated from
the same graph instance (shown in Fig. 1). Three of the four communities are driven: Q 1 , Q 2 , Q 4 . Neurons are driven by individual
square pulses of maximum height Amax V, and width τA = 200 ms
with a gap between subsequent pulses of ∆tpul se = 800 ms. The
complete set of neurons which are driven is ordered by community:
Q 1 is driven first, then Q 2 , then Q 3 . During driving, the primary
firing neuron fires 10 spikes, separated by nearly uniform time
intervals: δ 1 ≈ 21 ms. The secondary firing neuron fires 5 spikes at
nearly uniform time intervals: δ 2 ≈ 42 ms. Slight variations in the
time interval between spikes are possible due to spikes fired when
Vex t / Imax R, and approximations introduced during numerical
integration of the equations of motion.
From the generated spike trains, the comparison matrix is constructed using binary decoding with ∆t = 8.00 sec. In Fig. 2 the
three driven communities can be identified by the magnitude of
Hi j and the block matrix structure. Along the diagonal, the value of
(n)
Hi j is significantly higher between a driven neuron x i
(n)
neuron x j
and target
in the same community, compared to an off-diagonal
(n)
(m)
block in which a driven neuron x i and target neuron x j are
different communities. The un-driven neurons of Q 3 do not exhibit
a strong similarity to any of the driven neurons in Q 1 , Q 2 , Q 4 .
4
BIPOLAR DECODING AND FIRING RATE
THRESHOLDING
The concept of a community in Section 1 is now used to decode
spiking output. During the community-ordered driving sequence
used in Section 3, we conjecture that neurons undergoing active
Q4
Figure 2: The comparison matrix for a Girvan-Newman
benchmark graph instance. Community three (Q 3 )was not
driven and is difficult to discern from the noisy background
as a coherent spiking pattern is not able to spread from one
community to the next. The Hamming metric used to generate this matrix included terms to down-weight low spiking
neurons.
driving and contained in the same community will exhibit higher
firing rates that those outside of the community. Only two neuronal
states, corresponding to the Hopfield network states +1 and −1, are
allowed. These states are mapped to spike train patterns through
the use of time window binning. This is a variation on the binary
code discussed in Section 3 but now we consider the total number
of spikes fired by a neuron during ∆t. The Hopfield network state
+1 is mapped to a neuron which has a firing rate over a fixed time
window ∆t which exceeds a pre-determined threshold value fi ≥ f 0 ,
this is considered to be an active state. The Hopfield network state
−1 is mapped to a neuron which has a firing threshold over a
fixed time window ∆t which does not exceed a pre-determined
threshold value fi < f 0 , this is an inactive state. Similar approaches
to mapping Hopfield networks to spiking neural networks have
been investigated for the task of pattern retrieval using FitzHughNagumo neuron models [17, 18].
An upper bound on f 0 can be found by looking at the spiking
response of a fully-connected K 32 community. For a fully connected
clique, where each neuron is actively driven once, the maximum
number of spikes that a neuron can fire is,
fmax = r 1 + (n − 1)r 2 ,
(10)
where r 1 is the active firing rate and r 2 is the response firing rate.
The minimum firing threshold value is still under investigation,
but we use a simple heuristic to approximate f 0 . For the GirvanNewman benchmark graphs studied in this paper, the communities
are known to each be of order 32 and hdi = 16. For a lower bound on
the minimum number of spikes a neuron can fire and still be counted
as being a member of a community, we make the assumption that
at least half of a vertex’s neighbors must be in the same community.
Neuromorphic Computing, July 2017, Oak Ridge, Tennessee USA
Spike count
1.0
200
Spike count for neurons with label 1
Spike count for neurons with label 2
200
175
175
150
150
125
0.8
100
125
Spike count
Community detection with spiking neurons
75
100
75
50
50
0.6
25
25
0
0
[0:00-0:33] [0:33-1:06] [1:06-1:39]
Time interval [mm:ss]
Figure 3: The full spike raster for a Girvan-Newman benchmark graph instance. Only communities Q 1 , Q 2 and Q 4 were
driven. Each neuron in the communities was actively driven
once. The vertical lines mark: t = 1 (sec), the start of Q 1 driving; t = 33 (sec), the end of Q 1 driving and the start of Q 2
driving; t = 65 (sec), the end of Q 2 driving and the start of Q 4
driving; and t = 97 (sec) the end of Q 4 driving.
We replace the factor of (n − 1) in Equation (10) with 16/2 + 1,
fmin = r 1 + 9r 2 .
(11)
Further study into a robust lower bound would require a stricter
definition of what is a community. For our task of reconstructing
a known set of labels, and with the non-overlapping community
structure of the Girvan-Newman benchmarks, this heuristic will
suffice. Inhibitory synapses impede the spread of spike cascades
throughout the entire neuron system, as shown in Fig. 2 and 4. For
an instance of the Girvan-Newman benchmark graph it is shown
that when 3 of the 4 communities are driven, the similarity between
spike trains in the same driven community is significantly higher
than the similarity between spike trains in different communities.
Additionally, the un-driven community never exhibits a significant degree of spike response, showing that the spread of spiking
synchronicity throughout the entire network is impeded.
5
IDENTIFYING UNKNOWN COMMUNITIES
Future development of spike-based community detection is dependent on how well spiking neuron systems can be incorporated
into existing algorithms. There exists a near linear algorithm for
community identification called “label propagation,” introduced in
2007 by Raghavan, Albert and Kumara [30]. The similarity between
this method and a Potts spin model have been noted [35], and we
consider label propagation to be an algorithm that can incorporate
spike-based data. However there are several obstacles to overcome
before spiking neuron systems can be incorporated into real-world
community identification tasks.
First, we need to know how a neuron’s spike response is affected
when the neurons are driven in a random order. We use the GirvanNewman benchmark graph shown in Fig. 1, but instead of the
200
0.4
175
200
150
150
125
125
100
0.2
75
175
100
75
50
50
25
25
0.00
0.0 [0:00-0:33] [0:33-1:06]
0.2
[1:06-1:39]
0.4
Time interval [mm:ss]
[0:00-0:33] [0:33-1:06] [1:06-1:39]
Time interval [mm:ss]
Spike count for neurons with label 4
Spike count
Spike count
Spike count for neurons with label 3
0
[0:00-0:33]
0.6
[0:33-1:06]
0.8
[1:06-1:39] 1.0
Time interval [mm:ss]
Figure 4: The spike counts for neurons in each labelled community during three time windows of width ∆t ≥ 32 seconds
showing how neurons in each community react when active
driving is applied to neurons in Q 1 , Q 2 , Q 4 (respectively). The
(red, dashed) horizontal is an upper bound on the total number of spikes that would be generated under square pulse
driving of a K 32 community. The (black,dashed) line is a
lower bound generated by using the mean degree hdi = 16
and the assumption that at least half of a neuron’s neighbors have the same community label.
community-ordered driving used in Sections 3 and 4, we randomly
permute and drive the entire neuron set. Randomly permuting
the neuron set reduces the usefulness of bipolar decoding and the
spiking data analysis in this section only uses binary decoding.
Additionally, when randomly driving neurons, ∆t must be carefully
chosen such that the response between subsequent driven neurons
are not covered by a single time window. If that happens, then any
distinction between signals belonging to individual neurons which
may have different community labels may be lost. There is now an
upper bound on the time window: ∆t < t A .
Second, the scalability of the Hamming metric of Eq. 9 is quite
poor. Analysis of larger graphs will require driving a large number of neurons and the length of the binary decoded spike trains
will rapidly increase. As the length a binary decoded spike train
increases, the similarity between two neurons that fire frequently
will become quite large. To remedy this, we return to the original
implementation of Hamming metric as defined in [16].
Returning to the Hamming metric as originally defined in [16]
does not affect the comparison matrix structure (see Fig. 5) and
using the Hamming metric, we show how spiking data can be
used in label propagation algorithms. Label propagation is done by
choosing a vertex to act as a “source,” fixing its label, then updating
Neuromorphic Computing, July 2017, Oak Ridge, Tennessee USA
Q1
Q2
Q3
Q4
Figure 5: The comparison metric of a Girvan-Newman graph
instance on 128 vertices: the complete neuron set is first randomly permuted, then every neuron is individually driven
by a square pulse. The time window ∆t = 30 ms was chosen
such that δ 1 < ∆t < δ 2 t A = 200 ms. The Hamming metric
does not include any down-weighting terms, and the scale
is now limited to the range [0.0, 1.0]. Along the matrix diagonal, it is seen that H (x i , x i ) = 1.00.
the labels of all its neighboring vertices. For spiking data to be
incorporated into this method, we need to ensure that the choice
of source does not significantly impact the linear separability of
the Hamming metric values. The role of ∆t in tuning this quality is
shown in Fig. 6: at ∆t = 3.2 (sec) the mean Hamming metric value
is defined as:
1 Õ
hH (x im , x jn )ii =
H (x im , x jn ).
(12)
|Qm |
i ∈Q n
i,j
If m = n, the self-similarity value H (x im , x im ) = 1.00 is excluded.
When the source and target are in different labelled communities
(n , m) the mean metric is nearly overlapping, but when the source
and target are in the same community, the mean is nearly 1.00. The
linear separability of the mean metric value is dependent on the
size of ∆t, as seen in Fig. 6.
6
CONCLUSIONS
Our approach to a community detection using spike-based computing depended on vertices within the same community exhibiting similar spiking patterns. We have studied how SNNs can be
constructed, driven by external current, and decoded in order to
generate such spiking patterns. An undirected graph is mapped to
a fully connected set of homogeneous spiking neurons, with both
excitatory and inhibitory synapses and selectively driven by square
pulse currents. The neurons contained within densely connected
regions exhibit synchronicity in their firing patterns.
Spike trains are decoded by time window binning, using varying
window widths (∆t). For ∆t < t A the resulting binned vectors
K. Hamilton et al.
are converted into binary codes, with entries {0, 1} only. From
these binary vectors and a Hamming-distance based metric, we
construct a comparison matrix which had dimension n × n for a
graph of order n. The degree of similarity between spike trains can
be quantified and used to infer the membership of communities
on the original graph. For ∆t ≈ |Q i |(t A + δpulse ) the resulting
vectors tabulate the number of spikes fired during ∆t and use a
pre-determined threshold to determine the appropriate label to
assign to the neurons.
Using binary decoding, the driven communities could be distinguished by the Hamming metric similarity. Simulations of spiking neuron dynamics demonstrated the ability to identify nonoverlapping, communities of equal order (see Figs. 2, 5) for graphs
with known community structure. In Fig. 2, it was seen that the
use of inhibitory synaptic connections prevented any large scale
spike cascade. The Hamming metric can distinguish a single community when a neuron system is driven sequentially according to
community, or when the neuron set is randomly permuted. Bipolar decoding, assigning community labels according to the spike
counts, can distinguish the driven communities by the dominant
spiking behavior. However, the bipolar decoding is only used when
a neuron system is driven sequentially according to community.
The results presented here are generated from one instance of the
Girvan-Newman benchmark graph (shown in Fig. 1), multiple
instances have been tested with similar results. Additional simulations have also been tested on graphs with unequal-sized communities. We explore how our method performs on un-ordered data,
by randomly permuting and driving the entire neuron set. In Fig. 6,
the linear separability of the Hamming metric value shows that for
small enough ∆t value, the Hamming metric can distinguish one
community from the remaining 3 communities.
Our results show that spiking data can be used to identify communities in undirected graphs. The separability of the Hamming
similarity measure (see Fig. 6) could be incorporated into a label
propagation workflow [7, 28, 30]. Community detection is a unique
use of neuromorphic hardware, utilizing neural systems that do
not have hidden units, or require training over large data sets.
Future work related to spike-based community detection will
investigate two areas: the applicability, and the scalability of this
method. Applicability focuses on quantifying the limits of a spikebased approach: effectiveness on other graph classes, identification
of overlapping communities, and establishing a resolution limit
(smallest community that can be identified in a large network).
Scalability addresses how this method can be applied to large network analysis. In particular, as presented in this work, the binary
analysis has the potential for poor scaling: a system of n vertices is
mapped to a densely connected system of n neurons and produces
a matrix of dimension n × n.
REFERENCES
[1] Marcelo Blatt, Shai Wiseman, and Eytan Domany. 1996. Superparamagnetic
Clustering of Data. Phys. Rev. Lett. 76 (Apr 1996), 3251–3254. Issue 18. https:
//doi.org/10.1103/PhysRevLett.76.3251
[2] Stefano Boccaletti, Vito Latora, Yamir Moreno, Martin Chavez, and D-U Hwang.
2006. Complex networks: Structure and dynamics. Physics reports 424, 4 (2006),
175–308.
[3] Andrew S Cassidy, Paul Merolla, John V Arthur, Steve K Esser, Bryan Jackson,
Rodrigo Alvarez-Icaza, Pallab Datta, Jun Sawada, Theodore M Wong, Vitaly
Feldman, et al. 2013. Cognitive computing building block: A versatile and efficient
Community detection with spiking neurons
Neuromorphic Computing, July 2017, Oak Ridge, Tennessee USA
Figure 6: For an instance of the Girvan-Newman graph on 128 vertices, the complete neuron set is randomly permuted, then
every neuron is individually driven by a square pulse. The mean Hamming metric hH (x im , x m
j )ii for source and target in the
same community (black) can be distinguished from the mean Hamming metric mean Hamming metric hH (x im , x jn )ii for source
and target in different communities (red, blue, green) if the bin width ∆t is small. The standard deviation in the mean is shown
by the shaded regions.
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
digital neuron model for neurosynaptic cores. In Neural Networks (IJCNN), The
2013 International Joint Conference on. IEEE, 1–10.
Aaron Clauset, M. E. J. Newman, and Cristopher Moore. 2004. Finding community
structure in very large networks. Phys. Rev. E 70 (Dec 2004), 066111. Issue 6.
https://doi.org/10.1103/PhysRevE.70.066111
Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3
(2010), 75–174.
Santo Fortunato. 2017. Santo Fortunato’s Website: Software. https://sites.google.
com/site/santofortunato/inthepress2. (2017). Accessed: 2017-05-10.
Brian Gallagher, Hanghang Tong, Tina Eliassi-Rad, and Christos Faloutsos. 2008.
Using Ghost Edges for Classification in Sparsely Labeled Networks. In Proceedings
of the 14th ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining (KDD ’08). ACM, New York, NY, USA, 256–264. https://doi.org/10.
1145/1401890.1401925
Wulfram Gerstner and Werner M Kistler. 2002. Spiking neuron models: Single
neurons, populations, plasticity. Cambridge university press.
Michelle Girvan and Mark EJ Newman. 2002. Community structure in social
and biological networks. Proceedings of the national academy of sciences 99, 12
(2002), 7821–7826.
Dan Goodman and Romain Brette. 2008. Brian: A Simulator for Spiking Neural
Networks in Python. Frontiers in Neuroinformatics 2 (2008).
Kathleen E. Hamilton, Neena Imam, and Travis S. Humble. 2017. Community
Identification with spiking neural networks. Poster presented at SIAM’s Network
Science Workshop 2017 July 13–14, Pittsburgh, PA.. (2017).
John Hertz, Anders Krogh, and Richard G Palmer. 1991. Introduction to the theory
of neural computation. Santa Fe Institute studies in the sciences of complexity,
Vol. 1. Addison-Wesley.
John J Hopfield. 1982. Neural networks and physical systems with emergent
collective computational abilities. Proceedings of the national academy of sciences
79, 8 (1982), 2554–2558.
John J Hopfield. 1984. Neurons with graded response have collective computational properties like those of two-state neurons. Proceedings of the national
academy of sciences 81, 10 (1984), 3088–3092.
John J Hopfield and David W Tank. 1985. Neural computation of decisions in
optimization problems. Biological cybernetics 52, 3 (1985), 141–152.
Mark D Humphries. 2011. Spike-train communities: finding groups of similar
spike trains. Journal of Neuroscience 31, 6 (2011), 2321–2336.
Takashi Kanamaru and Yoichi Okabe. 2000. Associative memory retrieval induced
by fluctuations in a pulsed neural network. Physical Review E 62, 2 (2000), 2629.
Takashi Kanamaru and Yoichi Okabe. 2001. Fluctuation-induced memory retrieval in a pulsed neural network storing sparse patterns with hierarchical
correlations. Physical Review E 64, 3 (2001), 031904.
Andrea Lancichinetti and Santo Fortunato. 2009. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping
communities. Physical Review E 80, 1 (2009), 016118.
Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark
graphs for testing community detection algorithms. Physical review E 78, 4 (2008),
046110.
S Lowel and W Singer. 1992.
Selection of intrinsic horizontal connections in the visual cortex by correlated neuronal activity.
Science 255, 5041 (1992), 209–212. https://doi.org/10.1126/science.1372754
arXiv:http://science.sciencemag.org/content/255/5041/209.full.pdf
[22] Wolfgang Maass and Christopher M Bishop. 2001. Pulsed neural networks. MIT
press.
[23] Wolfgang Maass and Thomas Natschläger. 1997. Networks of spiking neurons
can emulate arbitrary Hopfield nets in temporal coding. Network: Computation
in Neural Systems 8, 4 (1997), 355–371.
[24] Fragkiskos D Malliaros and Michalis Vazirgiannis. 2013. Clustering and community detection in directed networks: A survey. Physics Reports 533, 4 (2013),
95–142.
[25] Paul A Merolla, John V Arthur, Rodrigo Alvarez-Icaza, Andrew S Cassidy, Jun
Sawada, Filipp Akopyan, Bryan L Jackson, Nabil Imam, Chen Guo, Yutaka
Nakamura, et al. 2014. A million spiking-neuron integrated circuit with a scalable
communication network and interface. Science 345, 6197 (2014), 668–673.
[26] Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating community
structure in networks. Physical review E 69, 2 (2004), 026113.
[27] M. E. J. Newman. 2010. Networks: An Introduction. Oxford University Press.
[28] L. Peel. 2016. Graph-based semi-supervised learning for relational networks.
ArXiv e-prints (Dec. 2016). arXiv:1612.05001
[29] Leto Peel, Daniel B Larremore, and Aaron Clauset. 2017. The ground truth about
metadata and community detection in networks. Science Advances 3, 5 (2017),
e1602548.
[30] Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear
time algorithm to detect community structures in large-scale networks. Physical
Review E 76, 3 (2007), 036106.
[31] Jörg Reichardt and Stefan Bornholdt. 2004. Detecting fuzzy community structures
in complex networks with a Potts model. Physical Review Letters 93, 21 (2004),
218701.
[32] Jörg Reichardt and Stefan Bornholdt. 2006. Statistical mechanics of community
detection. Phys. Rev. E 74 (Jul 2006), 016110. Issue 1. https://doi.org/10.1103/
PhysRevE.74.016110
[33] Michael T. Schaub, Jean-Charles Delvenne, Martin Rosvall, and Renaud Lambiotte.
2017. The many facets of community detection in complex networks. Applied
Network Science 2, 1 (2017), 4. https://doi.org/10.1007/s41109-017-0023-6
[34] Hideki Tanaka, Takashi Morie, and Kazuyuki Aihara. 2005. Associative memory
operation in a Hopfield-type spiking neural network with modulation of resting
membrane potential. In Int. Symp. on Nonlinear Theory and its Applications, Bruges,
Belgium.
[35] Gergely Tibély and János Kertész. 2008. On the equivalence of the label propagation method of community detection and a Potts model approach. Physica A:
Statistical Mechanics and its Applications 387, 19 (2008), 4982–4984.
[36] David E Van Den Bout and Thomas K Miller. 1990. Graph partitioning using
annealed neural networks. IEEE Transactions on neural networks 1, 2 (1990),
192–203.
| 9cs.NE
|
Generalized SURE for optimal shrinkage of singular values in
low-rank matrix denoising
arXiv:1605.07412v3 [math.ST] 2 Oct 2017
Jérémie Bigot, Charles Deledalle & Delphine Féral
Institut de Mathématiques de Bordeaux et CNRS (UMR 5251)
Université de Bordeaux
October 3, 2017
Abstract
We consider the problem of estimating a low-rank signal matrix from noisy measurements
under the assumption that the distribution of the data matrix belongs to an exponential family. In this setting, we derive generalized Stein’s unbiased risk estimation (SURE) formulas
that hold for any spectral estimators which shrink or threshold the singular values of the
data matrix. This leads to new data-driven spectral estimators, whose optimality is discussed using tools from random matrix theory and through numerical experiments. Under
the spiked population model and in the asymptotic setting where the dimensions of the data
matrix are let going to infinity, some theoretical properties of our approach are compared
to recent results on asymptotically optimal shrinking rules for Gaussian noise. It also leads
to new procedures for singular values shrinkage in finite-dimensional matrix denoising for
Gamma-distributed and Poisson-distributed measurements.
Keywords: matrix denoising, singular value decomposition, low-rank model, Gaussian spiked
population model, spectral estimator, Stein’s unbiased risk estimate, random matrix theory,
exponential family, optimal shrinkage rule, degrees of freedom.
AMS classifications: 62H12, 62H25.
1
1.1
Introduction
Low rank matrix denoising in an exponential family
In various applications, it is of interest to estimate a signal matrix from noisy data. Typical
examples include the case of data that are produced in a matrix form, while others are concerned
with observations from multiple samples that can be organized in a matrix form. In such setting,
a typical inference problem involves the estimation of an unknown (non-random) signal matrix
X ∈ Rn×m from a noisy data matrix Y satisfying the model:
Y = X + W,
(1.1)
where W is an n × m noise matrix with real entries W ij assumed to be independent random
variables with E[W ij ] = 0 and Var(W ij ) = τij2 for 1 ≤ i ≤ n and 1 ≤ j ≤ m. In this paper, we
focus on the situation where the signal matrix X is assumed to have a low rank structure, and
we consider the general setting where the distribution of Y belongs to a continuous exponential
family parametrized by the entries of the matrix X = E[Y ]. For discrete observations (count
data), we also consider the specific case of Poisson noise.
The low rank assumption on X is often met in practice when there exists a significant
correlation between the columns of X. This can be the case when the columns of X represent
2D images at different wavelength of hyperspectral data, since images at nearby wavelengths are
strongly correlated [CSLT13]. Further applications, where low-rank modeling of X is relevant,
can be found in genomics [WDB01, ABB00], NMR spectroscopy [NPDL11], collaborative filtering
[CR09] or medical imaging [BD06, LBH+ 12], among many others.
Low-rank matrix estimation is classically done in the setting where the additive noise is
Gaussian with homoscedastic variance. The more general case of observations sampled from
an exponential family is less developed, but there exists an increasing research interest in the
study of low rank matrix recovery beyond the Gaussian case. Examples of low-rank matrix
recovering from Poisson distributed observations can be found in applications with count data
such as network traffic analysis [BMG13] or call center data [SH05]. A theory for low-rank matrix
recovery and completion in the case of Poisson observations has also been recently proposed in
[CX16]. Matrix completion under a low rank assumption with additive errors having a subexponential distribution and belonging to an exponential family has also been considered in
[Laf15]. The recent work [UHZB16] proposes a novel framework to approximate, by a low rank
matrix, a tabular data set made of numerical, Boolean, categorical or ordinal observations.
1.2
The class of spectral estimators
A standard approach to estimate a low rank matrix relies on the singular value decomposition
(SVD) of the data matrix
min(n,m)
Y =
X
σ̃k ũk ṽ tk ,
(1.2)
k=1
where σ̃1 ≥ σ̃2 ≥ . . . ≥ σ̃min(n,m) ≥ 0 denote its singular values, and ũk , ṽ k denote the associated
f
singular vectors. In this paper, we propose to consider the class of spectral estimators X̂ =
f (Y ), where f : Rn×m → Rn×m is a (possibly data-dependent) mapping that acts on the singular
values of the data matrix Y while leaving its singular vectors unchanged. More precisely, these
estimators take the form
f
X̂ = f (Y ) =
min(n,m)
X
fk (Y )ũk ṽ tk ,
(1.3)
k=1
where, for each 1 ≤ k ≤ min(n, m), fk (Y ) are real positive values that may depend only on σ̃k
(hence we write fk (σ̃k )) or on the whole matrix Y .
2
1.3
Investigated spectral estimators
Typical examples of spectral estimators include the classical principal component analysis (PCA)
applied to matrix denoising defined, for some 1 ≤ r ≤ min(n, m), as
r
X̂ =
r
X
σ̂k ũk ṽ tk
with σ̂k = fk (σ̃k ) = σ̃k
(1.4)
k=1
for all 1 ≤ k ≤ r and where it is implicitely understood that fk (σ̃k ) = 0 for k ≥ r + 1.
Another typical spectral estimator in matrix denoising with Gaussian measurements is the softthresholding [CSLT13] which corresponds to the choice
min(m,n)
X
X̂ soft =
σ̂k ũk ṽ tk
k=1
λ(Y )
σ̃k ,
with σ̂k = fk (Y ) = 1 −
σ̃k
+
(1.5)
for all 1 ≤ k ≤ min(n, m) and where λ(Y ) > 0 is a possibly data-dependent threshold parameter,
and (x)+ = max(x, 0) for any x ∈ R. Finaly, we will consider a more general class of shrinkage
estimators, encompassing the PCA and the soft-thresholding, that perform
min(m,n)
X̂ w =
X
σ̂k ũk ṽ tk
with σ̂k = fk (Y ) = wk (Y )σ̃k ,
(1.6)
k=1
where wk (Y ) ∈ [0, 1] is a possibly data-dependent shrinking weight.
1.4
Main contributions
Under the assumption that the distribution of Y belongs to an exponential family, the goal of this
paper is to derive data-driven choices for the weights wk (Y ) in (1.3). We construct estimators
via a two-step procedure. First, an active set of non-zero singular values is defined. Then, in a
second step, weights wk (Y ) associated with non-zero singular values are optimized, and shown
to reach desired asymptotical properties in the Gaussian spiked population model. The main
contributions of the paper are then the following ones.
1.4.1
An AIC inspired criterion for rank and singular values locations estimation
When no a priori is available on the rank of the signal matrix X, optimizing for the weights wk ,
for all 1 ≤ k ≤ min(m, n), can lead to estimators with large variance (i.e., overfitting the noise).
We propose an automatic rule to prelocalize the subset of non-zero singular values. An active
set s? ⊆ I = {1, 2, . . . , min(n, m)} of singular values is defined as the minimizer of a penalized
log-likelihood criterion that is inspired by the Akaike information criterion (AIC)
s
s∗ ∈ arg min − 2 log q(Y ; X̃ ) + 2|s|pn,m
with pn,m =
s⊆I
√ 2
1 √
m+ n ,
2
(1.7)
P
s
s
where X̃ = k∈s σ̃k ũk ṽ tk , |s| is the cardinal of s, and q(Y ; X̃ ) is the likelihood of the data in a
s
given exponential family with estimated parameter X̃ . For the case of Gaussian measurements
3
s
s
with homoscedastic variance τ 2 , one has that q(Y ; X̃ ) = kY − X̃ k2F /2τ 2 , where k · kF denotes
the Frobenius norm of a matrix, and we show that the active set of singular values boils down to
s? = {k ; σ̃k > cn,m
+ },
(1.8)
√
√
where cn,m
= τ ( m + n). For Gamma and Poisson measurements, we resort to a greedy
+
optimization procedure described in Section 4.
Once the active set has been determined, the subsequent shrinkage estimator is obtained by
optimizing only for the weights within this subset while setting the other ones to zero.
1.4.2
Novel data-driven shrinkage rules minimizing SURE-like formulas
We use the principle of Stein’s unbiased risk estimation (SURE) [Ste81] to derive unbiased
estimation formulas for the mean squared error (MSE) risk and mean Kullback-Leibler (MKL)
risks of spectral estimators. Minimizing such SURE-like formulas over an appropriate class of
spectral estimators is shown to lead to novel data-driven shrinkage rules of the singular values
of the matrix Y . In particular, our approach leads to novel spectral estimators in situations
where the variances τij2 of the entries W ij of the noise matrix are not necessarily equal, and may
depend on the signal matrix X.
As an illustrative example, let us consider spectral estimators of the form
1
X̂ w = f (Y ) = w1 (Y )σ̃1 ũ1 ṽ t1 ,
(1.9)
which only act on the first singular value σ̃1 of the data while setting all the other ones to zero.
In this paper, examples of data-driven choices for the weight w1 (Y ) are the following ones:
• for Gaussian measurements with n ≤ m and known homoscedastic variance τ 2
!!
n
X
τ2
σ̃12
w1 (Y ) = 1 − 2 1 + |m − n| + 2
11{σ̃1 >cn,m } ,
+
σ̃1
σ̃12 − σ̃`2
`=2
(1.10)
+
• for Gamma measurements with τij2 = X 2ij /L and L > 2 (see Section 2.1 for a precise definition),
−1
1
min(n,m)
n X
m
2
X
X
X̂ ij
L
−
1
1
σ̃
1
1 + |m − n| + 2
11{1∈s∗ } ,
w1 (Y ) = min 1,
+
Lmn
Y ij
Lmn
σ̃12 − σ̃`2
i=1 j=1
`=2
(1.11)
• for Poisson measurements with τij2 = X ij (see Section 2.1 for a precise definition)
Pn Pm
w1 (Y ) = min 1, P
j=1 Y ij
i=1
11{1∈s∗ } .
1
n Pm
X̂
ij
i=1
j=1
4
(1.12)
Beyond the case of rank one, closed-form solutions for the weights cannot be obtained, except
for the case of Gaussian measurements with homoscedastic variance τ 2 . In this latter case, the
rule for w1 (Y ) in (1.10) generalizes to other eigenvalues wk (Y ) as
min(n,m)
2
2
X
σ̃k
τ
11{σ̃ >cn,m } .
(1.13)
wk (Y ) = 1 − 2 1 + |m − n| + 2
2
k
+
σ̃k
σ̃k − σ̃`2
`=1;`6=k
+
For Gamma or Poisson distributed measurements, we propose fast algorithms to get numerical
approximations of the weights wk (Y ) (see Section 5.2 for more details).
1.4.3
Asymptotic properties in the Gaussian spiked population model
Another contribution of the paper is to discuss the optimality of the shrinking weights (1.13)
for Gaussian noise in the asymptotic setting where the dimensions of the matrix Y are let going
to infinity. These theoretical results are obtained for the so-called spiked population model that
has been introduced in the literature on random matrix theory and high-dimensional covariance
matrix estimation (see e.g. [BS06, BN12, DS07, SN13]). All the theoretical and asymptotic
results of the paper (other than derivation of proposed estimators) assume this model.
Definition 1.1. The Gaussian spiked population model corresponds to the following setting:
• the W ij in (1.1) are iid Gaussian random variables with zero mean and variance τ 2 = 1/m,
• the X ij ’s in (1.1) are the entries of an unknown n×m matrix X that has a low rank structure,
Pr∗
t
meaning that it admits the SVD X =
k=1 σk uk v k , where uk and v k are the left and
right singular vectors associated to the singular value σk > 0, for each 1 ≤ k ≤ r∗ , with
σ1 > σ2 > . . . > σr∗ ,
• the rank r∗ of the matrix X is assumed to be fixed,
• the dimensions of the data matrix Y = X + W are let going to infinity in the asymptotic
n
framework where the sequence m = mn ≥ n is such that limn→+∞ m
= c with 0 < c ≤ 1.
In the Gaussian spiked population model, the asymptotic locations of the empirical singular
values σ̃1 ≥ . . . ≥ σ̃min(n,m) are well understood in the random matrix theory (further details are
given in Section 3.1). Note that the setting where the rank r∗ is not held fixed but allowed to
grow with min(n, m) is very different, see e.g. [LW12] and references therein.
Under the Gaussian spiked population model, our contributions are then as follows:
• we prove the convergence of the SURE formula when the dimensions of Y tend to infinity,
• it is shown that minimizing the asymptotic value of SURE leads to the same estimator as the
limiting value of the estimator obtained by minimizing the SURE,
• this model allows to show that the novel data-driven spectral estimators derived in this paper
are asymptotically connected to existing optimal shrinkage rules [SN13, GD14a, Nad14] for
low-rank matrix denoising,
• in this setting, we are also able to connect the choice of the penalty function 2|s|pn,m in (1.7)
with Stein’s notion of degrees of freedom (see e.g. [Efr04]) for spectral estimators.
5
1.4.4
Numerical experiments and publicly available source code
As the theoretical properties of our estimators are studied in an asymptotic setting, we report the
results of various numerical experiments to analyze the performances of the proposed estimators
for finite-dimensional matrices. These experiments allow the comparison with existing shrinkage
rules for Gaussian-distributed measurements and they are also used to shed some lights on the
finite sample properties of the method for Gamma-distributed or Poisson-distributed measurements. We also exhibit the settings where the signal matrix X is either easy or more difficult to
recover. From these experiments, the main findings are the following ones:
• the use of an appropriate active set s of singular values is an essential step for the quality
of shrinkage estimators whose weights are data-driven by SURE-like estimators; taking
s = {1, . . . , min(n, m)} leads to poor results while the choice of s = s∗ minimizing the AIC
criterion (1.7) appears to yield the best performances,
• for Gaussian noise, the performances of our approach are similar to those obtained by the
asymptotically optimal spectral estimator proposed in [GD14a] when the true rank r∗ of
the signal matrix X is sufficiently small, but for large to moderate values of the signal-tonoise ratio our approach may perform better than existing methods in the literature,
• for Gamma or Poisson distributed measurements, the spectral estimators proposed in this
paper give better results than estimators based on PCA (restricted to the active set s∗ ) or
soft-thresholding of singular values.
Beyond the case of Gaussian noise, the implementation of the estimators is not straightforward, and we thus provide publicly available source code at
https://www.math.u-bordeaux.fr/~cdeledal/gsure_low_rank
to reproduce the figures and the numerical experiments of this paper.
1.5
Related results in the literature
Early work on singular value thresholding began with the work in [EY36] on the best approximation of fixed rank to the data matrix Y . Spectral estimators with different amounts of shrinkage
for each singular value of the data matrix have then been proposed in [EM72, EM76]. In the case
of Gaussian measurements with homoscedastic variance, the problem of estimating X under a
low-rank assumption has recently received a lot of attention in the literature on high-dimensional
statistics, see e.g. [CSLT13, DG14, JS15, SN13]. Recent works [GD14a, Nad14] also consider the
more general setting where the distribution of the additive noise matrix W is orthogonally invariant, and such that its entries are iid random variables with zero mean and finite fourth moment.
In all these papers, the authors have focused on spectral estimators which shrink or threshold the
singular values of Y , while its singular vectors are left unchanged. In this setting, the main issue
is to derive optimal shrinkage rules that depends on the class of spectral estimators that is considered, on the loss function used to measure the risk of an estimator of X, and on appropriate
assumptions for the distribution of the additive noise matrix W .
6
1.6
Organization of the paper
Section 2 is devoted to the analysis of a data matrix whose entries are distributed according to
a continuous exponential family. SURE-like formula are first given for the mean squared error
risk, and then for the Kullback-Leibler risk. As an example of discrete exponential family, we
also derive such risk estimators for Poisson distributed measurements. The computation of datadriven shrinkage rules is then discussed for Gaussian, Gamma and Poisson noises. In Section 3,
we restrict our attention to the Gaussian spiked population model in order to derive asymptotic
properties of our approach. We study the asymptotic behavior of the SURE formula proposed
in [CSLT13, DG14] for spectral estimators using tools from RMT. This result allows to make a
connection between data-driven spectral estimators minimizing the SURE for Gaussian noise, and
the asymptotically optimal shrinkage rules proposed in [SN13, Nad14] and [GD14a]. In Section
4, we study the penalized log-likelihood criterion (1.7) used to select an active set of singular
values. Its connection to the degrees of freedom of spectral estimators and rank estimation in
matrix denoising is discussed. Various numerical experiments are finally proposed in Section 5
to illustrate the usefulness of the approach developed in this paper for low-rank denoising and
to compare its performances with existing methods. The proofs of the main results of the paper
are gathered in a technical Appendix A, and numerical implementation details are described in
Appendix B.
2
SURE-like formulas in exponential families
For an introduction to exponential families, we refer to [Bro86]. The idea of unbiased risk
estimation in exponential families dates back to [Hud78]. More recently, generalized SURE
formulas have been proposed for the estimation of the MSE risk, for denoising under various
continuous and discrete distributions in [RS07], and for inverse problems whithin the continuous
exponential families in [Eld09]. In [Del17], SURE-like formula are derived for the estimation of
the Kullback-Leibler risk that applies to both continuous and discrete exponential families. In
what follows, we borrow some ideas and results from these works. We first treat the case of
continuous exponential families, and then we focus on Poisson data in the discrete case.
2.1
Data sampled from a continuous exponential family
We recall that Y is an n×m matrix with independent and real entries Y ij . For each 1 ≤ i ≤ n and
1 ≤ j ≤ m, we assume that the random variable Y ij is sampled from a continuous exponential
family, in the sense that each Y ij admits a probability density function (pdf) q(y; X ij ) with
respect to the Lebesgue measure dy on the real line Y = R. The pdf q(y; X ij ) of Y ij can thus
be written in the general form:
q(y; X ij ) = h(y) exp (η(X ij )y − A(η(X ij ))) , y ∈ Y,
(2.1)
where η (the link function) is a one-to-one and smooth function, A (the log-partition function)
is a twice differentiable mapping, h is a known function, and X ij is an unknown parameter of
interest belonging to some open subset X of R. Throughout the paper, we will suppose that the
following assumption holds:
7
Assumption 2.1. The link function η and the log-partition function A are such that
A0 (η(x)) = x for all x ∈ X ,
where A0 denotes the first derivative of A.
Since E[Y ij ] = A0 (η(X ij )) for exponential families in the general form (2.1), Assumption 2.1
implies that E[Y ij ] = X ij , and thus the data matrix satisfies the relation Y = X + W where
W is a centered noise matrix, which is in agreement with model (1.1). Now, if we let Θ = η(X ),
it will be also convenient to consider the expression of the pdf of Y ij in the canonical form:
p(y; θ ij ) = h(y) exp (θ ij y − A(θ ij )) , y ∈ Y,
(2.2)
where θ ij = η(X ij ) ∈ Θ is usually called the canonical parameter of the exponential family.
Finally, we recall the relation Var(Y ij ) = A00 (θ ij ) = A00 (η(X ij )) where A00 denotes the second
derivative of A. Then, we denote by θ the n × m matrix whose entries are the θ ij ’s.
Examples of data satisfying model (2.1) are the following ones:
Gaussian noise with known variance τ 2 :
(y − X ij )2
1
q(y; X ij ) = √ exp −
, E[Y ij ] = X ij , Var(Y ij ) = τ 2 ,
2τ 2
2π
1
y2
x
θ2
√
Y = R, X = R, Θ = R, h(y) =
exp − 2 , η(x) = 2 , A(θ) = τ 2 .
2τ
τ
2
2πτ
Gamma-distributed measurements with known shape parameter L > 0:
X 2ij
LL y L−1
y
q(y; X ij ) =
exp −L
,
11]0,+∞[ (y), E[Y ij ] = X ij , Var(Y ij ) =
X ij
L
Γ(L)X L
ij
LL y L−1
L
θ
Y = R, X =]0, +∞[, Θ =]−∞, 0[, h(y) =
11
(y), η(x) = − , A(θ) = −L log −
.
Γ(L) ]0,+∞[
x
L
f
f
The matrix θ = η(X) can then be estimated via the n × m matrix θ̂ = θ̂ (Y ) whose entries
are given by
f
f
θ̂ ij (Y ) = η X̂ ij , for all 1 ≤ i ≤ n, 1 ≤ j ≤ m,
(2.3)
f
where X̂ ij is a spectral estimator as defined in eq. (1.3).
In the rest of this section, we follow the arguments in [Eld09] and [Del17] to derive SURE-like
f
f
formulas under the exponential family for the estimators θ̂ and X̂ , using either the meansquared error (MSE) risk or the Kullback-Leibler (KL) risk.
8
2.1.1
Unbiased estimation of the MSE risk
We consider the following MSE risk which provides a measure of discrepancy in the space Θ of
natural parameters, and then indirectly in the space of interest X .
f
f
f
Definition 2.1. The squared error (SE) risk of θ̂ is SE(θ̂ h, θ) = kθ̂ i− θk2Fh, and the meani
f
f
f
f
squared error (MSE) risk of θ̂ is defined as MSE(θ̂ , θ) = E SE(θ̂ , θ) = E kθ̂ − θk2F .
f
Using the above MSE risk to compare θ̂ and θ implies that the discrepancy between the
f
f
estimator X̂ and the matrix of interest X is measured by the quantity MSEη (X̂ , X) =
f
f
f
MSE(η(
), η(X))
h X̂
i which is different from MSE(X̂ , X). For Gaussian noise, MSEη (X̂ , X) =
f
1
2
E kX̂ − XkF , while for Gamma distributed measurements with known shape parameter
τ2
L > 0, it follows that
2
f
n X
m
X
X
−
X̂
f
ij
ij
.
MSEη (X̂ , X) = L2
f
X ij X̂ ij
i=1 j=1
The following proposition gives a SURE formula for the MSE risk introduced in Definition 2.1.
Proposition 2.1. Suppose that the data are sampled from a continuous exponential family.
Assume that the function h, in the definition (2.2) of the exponential family, is twice continuously
differentiable on Y = R. If the following condition holds
h f
i
E θ̂ ij (Y ) < +∞, for all 1 ≤ i ≤ n, 1 ≤ j ≤ m,
(2.4)
then, the quantity
n X
m
X
h00 (Y ij )
h0 (Y ij ) f
f
θ̂ ij (Y ) +
+ 2 div θ̂ (Y ),
GSURE(θ̂ ) = kθ̂ (Y )k +
2
h(Y ij )
h(Y ij )
f
f
2
(2.5)
i=1 j=1
f
where div θ̂ (Y ) =
f
n X
m
X
∂ θ̂ ij (Y )
∂Y ij
i=1 j=1
f
, is an unbiased estimator of MSE(θ̂ , θ)
f
f
f
Note that GSURE(θ̂ ) is an unbiased estimator of MSE(θ̂ , θ) and not of MSE(X̂ , X). It
is shown in Section 3.3 that the results of Proposition 2.4 coincide with the approach in [CSLT13]
on the derivation of a SURE formula in the case of Gaussian noise for smooth spectral estimators.
In the case of Gamma noise, assuming L > 2 implies that the conditions on the function h in
Proposition 2.1 is satisfied, hence assuming that conditions (2.4) holds as well, and using that
f
θ̂ ij (Y
L
)=−
fij (Y )
f
and
it follows that
f
GSURE(θ̂ ) =
n X
m
X
i=1 j=1
∂ θ̂ ij (Y )
∂fij (Y )
L
=
,
2
∂Y ij
|fij (Y )| ∂Y ij
∂fij (Y ) (L − 1)(L − 2)
L2
2L(L − 1)
2L
−
+
−
.
|fij (Y )|2 Y ij fij (Y ) |fij (Y )|2 ∂Y ij
|Y ij |2
(2.6)
9
2.1.2
Unbiased estimation of KL risks
Following the terminology in [Del17], let us now introduce two different notions of KullbackLeibler risk, which arise from the non-symmetry of this discrepancy measure.
Definition 2.2. Let f : Rn×m → Rn×m be a smooth spectral function. Consider the estimator
f
θ̂ defined by (2.3), where Y is a matrix whose entries Y ij are independent random variables
sampled from the exponential family (2.2) in canonical form:
f
• the Kullback-Leibler synthesis (KLS) risk of θ̂ is defined as
f
n X
m Z
X
p(y; θ̂ ij )
f
p(y; θ̂ fij ) dy,
KLS(θ̂ , θ) =
log
p(y; θ ij )
R
i=1 j=1
h
i
f
f
f
and the mean KLS risk of θ̂ is defined as MKLS(θ̂ , θ) = E KLS(θ̂ , θ) ,
f
• the Kullback-Leibler analysis (KLA) risk of θ̂ is defined as
n X
m Z
X
p(y;
θ
)
f
ij
p(y; θ ij ) dy,
KLA(θ̂ , θ) =
log
f
R
p(y;
θ̂
)
i=1 j=1
ij
h
i
f
f
f
and the mean KLA risk of θ̂ is defined as MKLA(θ̂ , θ) = E KLA(θ̂ , θ) .
A key advantage of the Kullback-Leibler risk is that it measures the discrepancy between the
f
unknown distribution p(y; θ ij ) and its estimate p(y; θ̂ ij ). It is thus invariant with respect to the
f
f
f
reparametrization θ̂ = η(X̂ ) (unlike the MSE risk), and we may also write MKLS(θ̂ , θ) =
f
f
f
MKLS(X̂ , X) and MKLA(θ̂ , θ) = MKLA(X̂ , X). As suggested in [Del17], the MKLA risk
f
represents how well the distribution p(y; θ̂ ij ) explain a random variable Y ij sampled from the
pdf p(y; θ ij ). The MKLA risk is a natural loss function in many statistical problems since it
takes as a reference measure the true distribution of the data, see e.g. [Hal87]. The MKLS risk
represents how well one may generate an independent copy of Y ij by sampling a random variable
f
from the pdf p(y; θ̂ ij ). The MKLS risk has also been considered in various inference problems in
statistics [HL06, Yan94].
By simple calculation, it follows that
f
MKLS(θ̂ , θ) =
f
and MKLA(θ̂ , θ) =
n X
m
X
i=1 j=1
n X
m
X
i=1 j=1
E
i
h
i
h f
f
f
θ̂ ij − θ ij A0 (θ̂ ij ) + A(θ ij ) − E A(θ̂ ij ) ,
(2.7)
E
h
i
h
i
f
f
θ ij − θ̂ ij A0 (θ ij ) + E A(θ̂ ij ) − A(θ ij ).
(2.8)
10
Hence, in the case of Gaussian measurements with known
τi2 , we easily retrieve that
h variance
f
f
f
f
2
MKLS(θ̂ , θ) = MKLA(θ̂ , θ) = τ2 MSE(θ̂ , θ) = 2τ12 E kX̂ − Xk2F . In the case of Gamma
distributed measurements with known shape parameter L > 0, it follows that
f
f
n X
m
X
X̂
X̂
f
ij
ij
− log
− 1 ,
MKLS(θ̂ , θ) = L
E
X ij
X ij
i=1 j=1
n X
m
X
X
X
f
ij
ij
MKLA(θ̂ , θ) = L
E f − log f − 1 .
X̂ ij
X̂ ij
i=1 j=1
Below, we use some of the results in [Del17] whose main contributions are the derivation of
new unbiased estimators of the MKLS and MKLA risks. For continuous exponential family, the
risk estimate derived in [Del17] is unbiased for the MKLS risk, while it is only asymptotically
unbiased for the MKLA risk with respect to the signal-to-noise ratio. For data sampled from a
continuous exponential family, this makes simpler the use of the MKLS risk to derive data-driven
shinkage in low rank matrix denoising, and we have therefore chosen to concentrate our study
on this risk in this setting. The following proposition establishes a SURE formula to estimate
the MKLS risk in the continuous case.
Proposition 2.2. Suppose that the data are sampled from a continuous exponential family.
Assume that the function h, in the definition (2.2) of the exponential family, is continuously
differentiable on Y = R. Suppose that the function A, in the definition (2.2) of the exponential
family, is twice continuously differentiable on Θ. If the following condition holds
h
i
f
E A0 (θ̂ ij (Y )) < +∞, for all 1 ≤ i ≤ n, 1 ≤ j ≤ m,
(2.9)
then, the quantity
f
SUKLS(θ̂ ) =
n X
m
X
f
θ̂ ij (Y
i=1 j=1
h0 (Y ij )
)+
h(Y ij )
A
0
f
(θ̂ ij (Y
)) −
f
A(θ̂ ij (Y
)) + div f (Y ),
(2.10)
where div f (Y ) =
m X
n
X
∂fij (Y )
∂Y ij
i=1 j=1
f
, is an unbiased estimator of MKLS(θ̂ , θ) −
n X
m
X
A(θ ij ).
i=1 j=1
A key difference in the formula of unbiased estimates for the MSE and the KL risks is the
Pmin(n,m)
f
computation of the divergence term in (2.5) and (2.10), when X̂ = k=1
fk (σ̃k )ũk ṽ tk is
a smooth spectral estimator in the sense where each function fk : R+ → R+ is assumed to be
(almost everywhere) differentiable for 1 ≤ k ≤ min(n, m). In this setting, the divergence term in
f
f
f
the expression of GSURE(θ̂ ) depends upon the matrix θ̂ (Y ) = η(X̂ ). Therefore, when η is a
f
nonlinear mapping, it is generally not possible to obtain a simpler expression for div θ̂ (Y ). To
f
the contrary, for SUKLS(θ̂ ), the divergence term is div f (Y ) which has the following closed-form
11
expression for any smooth spectral estimators
min(n,m)
div f (Y ) = |m − n|
X
k=1
fk (σ̃k )
+
σ̃k
min(n,m)
X
min(n,m)
fk0 (σ̃k )
k=1
+2
X
k=1
min(n,m)
fk (σ̃k )
X
σ̃ 2
`=1;`6=k k
σ̃k
,
− σ̃`2
(2.11)
thanks to the results from Theorem IV.3 in [CSLT13].
r
r
2
Note that SUKLS(X̂ w ) = τ2 SURE(X̂ w ) for Gaussian measurements, hence, the GSURE
and SUKLS strategies match in this case. In the case of Gamma measurements, assuming that
L > 2 implies that the conditions on the function h in Proposition 2.2 is satisfied, and by
assuming that condition (2.9) holds as well, it follows that
n X
m
X
fij (Y )
f
SUKLS(θ̂ ) =
(L − 1)
− L log (fij (Y )) − Lmn + div f (Y ),
Y ij
i=1 j=1
where the expression of div f (Y ) is given by (2.11).
Note that it is implicitly understood in the definition of div f (Y ) that each mapping fij :
Rn×m → R is differentiable. The differentiability of the spectral function f (and thus of its
components fij ) is a consequence of the assumption that the functions f1 , . . . , fmin(n,m) (acting on
the singular values) are supposed to be differentiable. For further details, on the differentiability
of f and the fij ’s, we refer to Section IV in [CSLT13]. From the arguments in [CSLT13], it
follows that formula (2.11) for the divergence of f is also valid under the assumption that each
function fk is differentiable on R+ except on a set of Lebesgue measure zero.
2.2
The case of Poisson data
For Poisson data, the key result to obtain unbiased estimate of a given risk is the following lemma
which dates back to the work in [Hud78].
Lemma 2.1. Let f : Zn×m → Rn×m be a measurable mapping. Let 1 ≤ i ≤ n and 1 ≤ j ≤ m,
and denote by fij : Zn×m → R a measurable function. Let Y ∈ Zn×m be a matrix whose entries
are independently sampled from a Poisson distribution on Z. Then,
n X
m
n X
m
X
X
E
X ij fij (Y ) = E
Y ij fij (Y − ei etj ) ,
i=1 j=1
i=1 j=1
where, for each 1 ≤ i ≤ n and 1 ≤ j ≤ m, fij (Y ) denotes the (i, j)-th entry of the matrix f (Y ),
and ei (resp. ej ) denotes the vector of Zn (resp. Zm ) with the i-th entry (resp. j-th entry) equals
to one and all others equal to zero.
Hudson’s lemma provides a way to estimate (in an unbiased way) the expectation of the
Frobenius inner product between the matrix X and the matrix f (Y ). To see the usefulness of
this result, one may consider the following mean-squared error
n X
m
X
2
2
f
f
f
f
MSE(X̂ , X) = E X̂ − X
= E X̂
−2
X ij X̂ ij (Y ) + kXk2F .
F
F
12
i=1 j=1
Therefore, by Lemma 2.1, one immediately obtains that
f
PURE(θ̂ ) = X̂
f 2
F
−2
n X
m
X
i=1 j=1
Y ij fij (Y − ei etj ),
(2.12)
f
is an unbiased estimate for the quantity MSE(X̂ , X) − kXk2F .
For Poisson data, one may also define the following KL risks
n X
m
X
X ij
f
f
f
MKLS(θ̂ , θ) =
E X ij − X̂ ij − X̂ ij log f ,
X̂ ij
i=1 j=1
f
n X
m
X
X̂
f
f
ij
MKLA(θ̂ , θ) =
,
E X̂ ij − X ij − X ij log
X ij
(2.13)
(2.14)
i=1 j=1
which are in agreement with Definition 2.2 of KL risks for data sampled from a Poisson distribution. From the arguments in [Del17], there does not currently exist an approach to derive a
SURE formula for the MKLS risk in the Poisson case since they are no unbiased formula for
f
X̂ ij log X ij . Nevertheless, as shown in [Del17], Hudson’s Lemma 2.1 provides an unbiased estif
mator for X ij log X̂ ij , and then it is possible to unbiasedly estimate the MKLA risk as follows.
Proposition 2.3. For data sampled from a Poisson distribution, the quantity
f
PUKLA(θ̂ ) =
n X
m
X
i=1 j=1
f
X̂ ij − Y ij log fij (Y − ei etj ) ,
f
is an unbiased estimator of MKLA(θ̂ , θ) +
n X
m
X
i=1 j=1
2.3
(2.15)
X ij − X ij log (X ij ).
Data-driven shrinkage in low-rank matrix denoising
For a matrix X with entries X ij ∈ X = R, we consider shrinkage estimators of the form
X
s
X̂ w = f (Y ) =
wk σ̃k ũk ṽ tk ,
(2.16)
k∈s
with s ⊆ I = {1, 2, . . . , min(n, m)} and wk ∈ [0, 1], for all k ∈ s.
When the underlying matrix X is constrained to have positive entries, e.g. X =]0, +∞[ in
the Gamma and Poisson cases, we consider instead estimators of the form
"
#
X
s
X̂ w = f (Y ) = max
wk σ̃k ũk ṽ tk , ε ,
(2.17)
k∈s
where ε > 0 is an a priori lower bound on the smallest value of X ij , where for any matrix X,
max[X, ε]ij = max[X ij , ε], for all 1 ≤ i ≤ m and 1 ≤ j ≤ n.
13
The construction of the subset s is postponed to Section 4, and we focus here in selecting
the weights in a data-driven way for a fixed given s. In the following,
we denote by sc the
s
s
complementary set of s in I, i.e., sc = I \ s, and we let θ̂ w = η X̂ w . When X =]0, +∞[, we
have found that considering estimators of the form (2.17) is more appropriate
than trying to find
P
shrinking weights (wk )k∈s such that all the entries of the matrix k∈s wk σ̃k ũk ṽ tk are positive,
for a given subset s.
Gaussian noise with known homoscedastic variance τ 2
By applying the GSURE formula (2.5) for Gaussian distributed measurements and thanks to the
s
expression (2.11) for the divergence of smooth spectral estimators, we obtain for X̂ w , as defined
in (2.16), the SURE expression given by
min(n,m)
s
2
X
X
X
X
σ̃
s
k
1 + |m − n| + 2
wk
SURE(X̂ w ) = −mnτ 2 +
(wk − 1)2 σ̃k2 +
σ̃k2 + 2τ 2
2 − σ̃ 2
σ̃
`
k∈s
k∈sc
k=1
`=1;`6=k k
s
which unbiasedly estimate MSE(X̂ w , X). Hence, for each k ∈ s, by differentiating the above
expression with respect to wk , it follows that a data-driven weight for the k-th empirical singular
value is given by
min(n,m)
2
2
X
σ̃k
τ
wk (Y ) = 1 − 2 1 + |m − n| + 2
,
(2.18)
2
σ̃k
σ̃k − σ̃`2
`=1;`6=k
+
s
2
s
which fullfils the requirement that wk (Y ) ∈ [0, 1]. Note that as SUKLS(X̂ w ) = τ2 SURE(X̂ w )
for Gaussian measurements, the exact same data-driven weight would be obtained by minimizing
s
an estimate of the MKLS(X̂ w , X).
The case of estimators with rank one. Consider the case of estimators with rank 1, i.e., let
1
{1}
1
s = {1}. It follows that X̂ w = X̂ w = w1 X̂ where w1 ∈ [0, 1] is given by
min(n,m)
2
2
X
τ
σ̃1
w1 (Y ) = 1 − 2 1 + |m − n| + 2
.
σ̃1
σ̃12 − σ̃`2
`=1;`6=1
+
Gamma and Poisson distributed measurements
In Gamma and Poisson cases, it is not possible to follow the same strategy as in the Gaussian case
to derive optimal weights for (2.17) in a closed-form using the established SURE-like formulas.
We shall investigate how data-driven shinkage can be approximated in Section 5 on numerical
experiments using fast algorithms. Nevertheless, when the estimator is restricted to rank 1,
optimizing KL risk estimators lead to closed-form expressions under the assumption that all the
entries of the data matrix Y are strictly positive.
14
The case of estimators with rank one under Gamma noise. Consider again the case of esti1
mators with rank 1, i.e., let s = {1}, and let X̂ = σ̃1 ũ1 ṽ t1 denote the PCA approximation of
rank 1 of X. If all the entries of the matrix Y are strictly positive, by the Perron-Frobenius
theorem, all the entries of the first singular vectors ũ1 and ṽ 1 are strictly positive. Therefore, all
1
1
{1}
the entries of X̂ belong to the set X =]0, +∞[, and we can consider X̂ w = X̂ w = w1 σ̃1 ũ1 ṽ t1
as defined in (2.16) instead of (2.17). Assuming L > 2 for the SUKLS formula to hold, it follows
by simple calculations that
1
1 !
n X
m
X
X̂ ij
X̂ ij
1
SUKLS(θ̂ w ) =
(L − 1)w1
− mnL log (w1 ) − L log
− Lmn
Y ij
Y ij
i=1 j=1
min(n,m)
+ (1 + |m − n|)w1 + 2w1
X
`=2
σ̃12
.
σ̃12 − σ̃`2
Hence, by differentiating the above expression with respect to w1 and as it is monotonic on both
1
sides of its unique minimum, the optimal value of w1 ∈ [0, 1] minimizing SUKLS(θ̂ w ) is given by
−1
1
min(n,m)
n X
m
2
X
X
X̂
σ̃1
L−1
1
ij
,
1 + |m − n| + 2
w1 (Y ) = min 1,
+
2 − σ̃ 2
Lmn
Y ij
Lmn
σ̃
1
`
i=1 j=1
`=2
which yields the shrinking rule (1.11) stated in the introduction of this paper. Note that it is
not possible to obtain, in a closed-form, the optimal value of the weight w1 that minimizes the
1
criterion GSURE(θ̂ w ).
The case of estimators with rank one under Poisson noise. Using again that all the assumption that the entries of Y are positive, we can consider (by the Perron-Frobenius theorem)
1
{1}
X̂ w = X̂ w = w1 σ̃1 ũ1 ṽ t1 as defined in (2.16) instead of (2.17).
Then, the PURE formula (2.12)
1
1
and Proposition 2.3 apply to the estimator θ̂ w = log X̂ w which yield to
1
PURE(θ̂ w ) = w12 σ̃12 − 2
1
and PUKLA(θ̂ w ) =
n X
m
X
i=1 j=1
1
(ij)
where X̂ ij = σ̃1 ũ1,i ṽ 1,j , σ̃1
(ij)
n X
m
X
(ij) (ij) (ij)
Y ij w1 σ̃1 ũ1,i ṽ 1,j ,
i=1 j=1
1
(ij) (ij) (ij)
w1 X̂ ij − Y ij log (w1 ) + log σ̃1 ũ1,i ṽ 1,j
,
(ij)
is the largest singular value of the matrix Y − ei etj , and ũ1
(resp. ṽ 1 ) denotes its left (resp. right) singular vectors. Therefore, by differentiating the above
expression with respect to w1 and as it is monotonic on both sides of its unique minimum, an
1
optimal value for w1 ∈ [0, 1] which minimizes PURE(θ̂ w ) is given by
n X
m
X
1
(ij) (ij) (ij)
w1 (Y ) = min 1, 2
Y ij σ̃1 ũ1,i ṽ 1,j .
σ̃1 i=1 j=1
15
However, this optimal shrinking rule cannot be used in practice since evaluating the values of
(ij)
(ij) (ij)
σ̃1 , ũ1 , ṽ 1 for all 1 ≤ i ≤ n and 1 ≤ j ≤ m is not feasible from a computational point of view
for large values of n and m. Nevertheless, a fast algorithm to find a numerical approximation of
the optimal value w1 (Y ) is proposed in Section 5.
1
To the contrary, using again that all the X̂ ij are positive by the Perron-Frobenius theorem,
1
the value of w1 ∈ [0, 1] minimizing PUKLA(θ̂ w ) is
P P
m
n
Y
ij
j=1
i=1
,
w1 (Y ) = min 1, P P
1
n
m
X̂
ij
i=1
j=1
which is straightforward to compute. This corresponds to the shrinkage rule (1.12) given in the
introduction.
3
Gaussian spiked population model
In this section, we restrict our analysis to the Gaussian spiked population model and the asymptotic setting introduced in Definition 1.1.
3.1
Asymptotic location of empirical singular values
We summarize below the asymptotic behavior of the singular values of the data matrix Y =
Pmin(n,m)
σ̃k ũk ṽ tk in the Gaussian spiked population model.
k=1
In the case where X = 0, it is well known [AGZ10, BS10] that the empirical distribution
of the singular values of Y = W (with τ = √1m ) converges, as n → +∞, to the quarter circle
distribution if c = 1 and to its generalized version if c < 1. This distribution is supported on the
compact interval [c− , c+ ] with
√
c± = 1 ± c
where c+ is the so-called bulk (right) edge.
When X 6= 0 has a low rank structure, the asymptotic behavior of the singular values of
Y = X + W is also well understood [BN12, DS07, SN13], and generalizations to noise matrix
W whose distribution is orthogonally invariant have also been recently considered in [BN12].
Below, we recall some of these results that will be needed in this paper. To this end, let us
introduce the real-valued function ρ defined by
r
(1 + σ 2 )(c + σ 2 )
ρ (σ) =
for any σ > 0.
σ2
Then, the following result holds (see e.g. Theorem 2.8 in [BN12] and Proposition 9 in [SN13]).
Proposition 3.1. Assume that Y = X + W isPa random matrix sampled from the Gaussian
∗
spiked population model with τ = √1m and X = rk=1 σk uk v tk . Then, for any fixed k ≥ 1, one
16
has that, almost surely,
ρ (σk )
lim σ̃k =
n→+∞
c+
if k ≤ r∗ and σk > c1/4 ,
otherwise.
Moreover,
lim σ̃min(n,m) = c− .
n→+∞
In what follows, we shall also use the relation
p
ρ2 (σ) − (c + 1) − (ρ2 (σ) − (c + 1))2 − 4c
1
=
that holds for any σ > c1/4 ,
σ2
2c
which is a consequence of e.g. the results in Section 3.1 in [BN12].
3.2
(3.1)
Existing asymptotically optimal shrinkage rules
Below, we briefly summarize some results in [GD14a] and [Nad14] on the construction of asymptotically optimal spectral estimators. Let
min(n,m)
f
X
X̂ = f (Y ) =
fk (σ̃k )ũk ṽ tk
(3.2)
k=1
f
be a given smooth spectral estimator, and consider the standard squared error SE(X̂ , X) =
f
f
kX̂ − Xk2F as a measure of risk. The set of spectral functions minimizing SE(X̂ , X) is given
by fk (σ̃k ) = ũtk X ṽ k , for 1 ≤ k ≤ min(n, m). However, it cannot be used in practice since X is
obviously unknown. A first alternative suggested in [GD14a] and [Nad14] is to rather study the
asymptotic risk
f
f
SE∞ (X̂ ) = lim SE(X̂ , X) (in the almost sure sense)
(3.3)
n→∞
in the Gaussian spiked population model. Then, it is proposed in [GD14a] and [Nad14] to find
f
an asymptotically optimal choice of f by minimizing SE∞ (X̂ ) among a given class of smooth
spectral functions. The results in [GD14a] show that, among spectral estimators of the form
Pmin(n,m)
η
X̂ = k=1
η(σ̃k )ũk ṽ tk , where η : R+ → R+ is a continuous shrinker such that η(σ) = 0
whenever σ ≤ c+ , an asymptotically optimal shrinkage rule is given by the choice
( q
1
(σ 2 − (c + 1))2 − 4c if σ > c+ ,
σ
η ∗ (σ) =
(3.4)
0
otherwise.
P
δ
In [Nad14], it is proposed to consider spectral estimators of the form X̂ = rk=1 δk ũk ṽ tk where
δ1 , . . . , δr are positive weights. By Theorem 2.1 in [Nad14], it follows that, if σk > c1/4 for all
δ
1 ≤ k ≤ r with r ≤ r∗ , then the weights which minimize SE∞ (X̂ ) over Rr+ are given by
δk∗ = δk (σk ) =
σk
q
σk4 − c
(1 + σk2 )(c + σk2 )
, for all 1 ≤ k ≤ r.
17
(3.5)
In what follows, the shrinkage rules (3.4) and (3.5) are shown to be equivalent, and they
will serve as a reference of asymptotic optimality. It should be stressed that the estimators in
[GD14a] and [Nad14] are not equivalent. Indeed, the method in [Nad14] requires an estimate
of the rank, while the approach in [GD14a] applies the same shrinker to all empirical singular
values. Nevertheless, the shrinkage function that is applied to significant singular values (either
above the bulk edge in [GD14a] or up to a given rank in [Nad14]) is the same.
3.3
Asymptotic behavior of data-driven estimators based on SURE
Following the principle of SURE, a second alternative to choose a smooth spectral estimator
of the form (3.2) is to study the problem of selecting a set of functions (fk )1≤k≤min(n,m) that
h
i
f
f
minimize an unbiased estimate of MSE(X̂ , X) = E kX̂ − Xk2F . For any 1 ≤ i ≤ m and
f
1 ≤ j ≤ n, we recall that fij (Y ) denotes the (i, j)-th entry of the matrix X̂ = f (Y ). Under
the condition that
∂fij (Y )
E |Y ij fij (Y )| +
< +∞, for all 1 ≤ i ≤ n, 1 ≤ j ≤ m.
(3.6)
∂Y ij
it follows from the results in [CSLT13] (or equivalently from Proposition 2.1 for Gaussian noise
with τ 2 = 1/m) that
f
2
SURE X̂ = −n + kf (Y ) − Y k2F + div f (Y ),
m
(3.7)
f
is an unbiased estimate of MSE(X̂ , X), where the divergence div f (Y ) admits the closed-form
expression (2.11). The SURE formula (3.7) has been used in [CSLT13] to find a data-driven value
for λ = λ(Y ) in the the case of singular values shrinkage by soft-thresholding which corresponds
to the choice
fk (σ̃k ) = (σ̃k − λ)+ , for all 1 ≤ k ≤ min(n, m).
We study now the asymptotic behavior of the SURE formula (3.7). To this end, we shall
use Proposition 3.1, but we will also need the following result (whose proof can be found in the
Appendix) to study some of the terms in expression (2.11) of the divergence of f (Y ).
Proposition 3.2. Assume that Y = X + W isPa random matrix sampled from the Gaussian
∗
spiked population model with τ = √1m and X = rk=1 σk uk v tk . Then, for any fixed 1 ≤ k ≤ r∗
such that σk > c1/4 , one has that, almost surely,
n
1 X
σ̃k
1
1
lim
=
1+ 2 .
n→+∞ n
ρ (σk )
σ̃k2 − σ̃`2
σk
`=1;`6=k
In what follows, we restrict our analysis to the following class of spectral estimators (the
terminology in the definition below is borrowed from [GD14a]).
18
Pmin(n,m)
f
Definition 3.1. Let X̂ = f (Y ) = k=1
fk (σ̃k )ũk ṽ tk be a smooth spectral estimator. For
a given 1 ≤ r ≤ min(n, m), the estimator f is said to be a spectral shrinker of order r that
collapses the bulk to 0 if
fk (σ) = 0 whenever σ ≤ c+ and 1 ≤ k ≤ r,
fk (σ) = 0 for all σ ≥ 0 and k > r.
The reason for restricting the study to spectral estimators such that fk (σ̃k ) = 0 whenever
σ̃k < c+ is linked to the choice of the active set s∗ (1.8) of singular values in the Gaussian case,
f
as detailed in Section 4. Now, for a spectral shrinker X̂ of order r that collapses the bulk to 0,
we study the asymptotic behavior of the terms in expression (3.7) that only depend on f , namely
r
r
r
f
X
2 X 0
n X fk (σ̃k )
SURE X̂
=
+
fk (σ̃k )
(fk (σ̃k ) − σ̃k )2 + 2 1 −
m
σ̃k
m
k=1
k=1
k=1
r
n
X
1
σ̃
n X
k
fk (σ̃k )
+4
m
n
σ̃k2 − σ̃`2
(3.8)
`=1;`6=k
k=1
f
The reason for studying SURE X̂ is that finding an optimal shrinkage rule that minimizes
f
SURE X̂
is equivalent to minimizing expression (3.8) over spectral shrinkers of order r that
f
f
P
f
collapses the bulk to 0, since SURE X̂ − SURE X̂ = −n + nk=r+1 σ̃k2 for such X̂ .
Then, using Proposition 3.1, Proposition 3.2, and the assumption that the fk ’s are continuously differentiable functions on R+ , we immediately obtain the following result.
Lemma 3.1. Assume that Y = X + W is a random matrix sampled from the Gaussian spiked
P∗
f
population model with τ = √1m and X = rk=1 σk uk v tk . Let X̂ be a spectral shrinker of order
r ≤ r∗ that collapses the bulk to 0, such that each function fk , for 1 ≤ k ≤ r, is continuously
differentiable on ]c+ , +∞[. Moreover, assume that σk > c1/4 for all 1 ≤ k ≤ r. Then, one has
that, almost surely,
lim SURE X̂
n→+∞
f
2
r
X
σk (1 + c) + 2c
2
(fk (ρ(σk )) − ρ(σk )) + 2fk (ρ(σk ))
=
σk2 ρ(σk )
(3.9)
k=1
Asymptotically optimal shrinkage of singular values. Thanks to Lemma 3.1, one
may
f
determine an asymptotic optimal spectral shrinker as the one minimizing limn→+∞ SURE X̂ .
For this purpose, let us define the class of estimators
r
X̂ w =
r
X
wk σ̃k 11{σ̃k >c+ } ũk ṽ tk ,
(3.10)
k=1
where 1 ≤ r ≤ r∗ is a given integer, and the wk ’s are positive weights. In practice,
p n the estimator
r
X̂ w is computed by replacing the bulk edge c+ by its approximation cn,m
=
1+
+
m in eq. (3.10).
19
For moderate to large values of n and m, the quantities c+ and cn,m
are very close, and this
+
r
replacement does not change the numerical performances of X̂ w .
Then, provided that σk > c1/4 for all 1 ≤ k ≤ r, it follows from Lemma 3.1 that
2
r
r X
σk (1 + c) + 2c
2
2
.
lim SURE X̂ w =
ρ (σk )(wk − 1) + 2wk
n→+∞
σk2
k=1
Differentiating the above expression with respect to each weight wk leads to the following choice
of asymptotically optimal weights
wk∗ = 1 −
σk2 (1 + c) + 2c
for all 1 ≤ k ≤ r.
σk2 ρ2 (σk )
(3.11)
Therefore, if the singular values of the matrix X to be estimated are sufficiently large (namely
σk > c1/4 for all 1 ≤ k ≤ r), by using Proposition 3.1 and eq. (3.11), one has that an asymptotically optimal spectral shrinker of order r ≤ r∗ is given by the choice of functions
(
σk2 (1+c)+2c
ρ(σk ) if ρ(σk ) > c+ ,
1
−
2
σk ρ2 (σk )
for all 1 ≤ k ≤ r.
(3.12)
fk∗ (ρ(σk )) =
0
otherwise,
Using, the relation (3.1) one may also express the asymptotically optimal shrinking rule (3.12)
either as a function of ρ(σk ) only,
(
p
1
(ρ2 (σk ) − (c + 1))2 − 4c if ρ(σk ) > c+ ,
∗
ρ(σk )
fk (ρ(σk )) =
(3.13)
0
otherwise.
or as function of σk only (using that ρ(σk ) > c+ is equivalent to σk > c1/4 ),
(
4
√ σk −c
if σk > c1/4 ,
∗
2
2
σ
(1+σ
k
fk (ρ(σk )) =
k )(c+σk )
0
otherwise.
(3.14)
Therefore, for spectral shrinker of order r, we remark that the shrinkage rule (3.13) coincides
with the rule (3.4) which has been obtained in [GD14a]. Similarly, when the quantity fk∗ (ρ(σk ))
is expressed as a function of σk only in (3.14), then we retrieve the shrinking rule (3.5) derived
in [Nad14]. Therefore, itappears
that minimizing either the asymptotic behavior of the SURE,
f
that is limn→+∞ SURE X̂ , or the limit of SE risk (3.3) leads to the same choice of an
asymptotically optimal spectral estimator.
Data-driven shrinkage of empirical singular values. From the results in Section 2.3, the
principle of SURE minimisation leads to the following data-driven choice of spectral shrinker of
order r that collapses the bulk to 0
r
X̂ w =
r
X
fk (σ̃k )ũk ṽ tk ,
(3.15)
k=1
20
where fk (σ̃k ) = wk (Y )σ̃k 11{σ̃k >c+ } , for all 1 ≤ k ≤ r, with wk (Y ) given by (2.18). From Proposition 3.1 and Proposition 3.2 it follows that, if σk > c1/4 , then, almost surely,
σk2 (1 + c) + 2c
lim fk (σ̃k ) = 1 −
ρ(σk ), for all 1 ≤ k ≤ r ≤ r∗ .
n→+∞
σk2 ρ2 (σk )
r
Therefore, the data-driven spectral estimator X̂ w (3.15) asymptotically leads to the optimal
shrinking rule of singular values given by (3.12) which has been obtained by minimizing the
asymptotic behavior of the SURE.
√
√
√
Note that when τ 6= 1/ m, it suffices to replace the condition σ̃k > c+ by σ̃k > τ ( m + n)
r
in the definition of X̂ w , which yields the shrinking rule (1.13) stated in the introduction of this
paper.
4
Estimating active sets of singular values in exponential families
In this section, we propose to formulate a new Akaike information criterion (AIC) to select
an appropriate set of singular values over which aPshrinkage procedure might be applied. To
s
t
this end, we shall consider the estimator X̃ =
k∈s σ̃k ũk ṽ k defined for a subset s ⊆ I =
{1, 2, . . . , min(n, m)}, and we address the problem of selecting an optimal subset s? from the
data Y .
In the case of Gaussian measurements, the shrinkage estimators that we use in our numerical
P
f
experiments are of the form X̂ = k∈s? fk (σ̃k )ũk ṽ tk where
r
n
n,m
n,m
?
s = {k ; σ̃k > c+ } with c+ = 1 +
,
m
for some (possibly data-dependent) shrinkage functions fk . The set s? is based on the knowledge
of an approximation cn,m
of the bulk edge c+ . Thanks to Proposition 3.1, the bulk edge c+
+
is interpreted as the threshold which allows to distinguish the locations of significant singular
values in the data from those due to the presence of additive noise. Interestingly, the following
result shows that the active set s? may be interpreted through the prism of model selection using
the minimisation of a penalized log-likelihood criterion.
Proposition 4.1. Assume that Y = X + W where the entries of W are iid Gaussian variables
√
with zero mean and standard deviation τ = 1/ m. Then, we have
√ 2
1 √
s 2
∗
,
(4.1)
s = arg min mkY − X̃ kF + 2|s|pn,m with pn,m =
m+ n
2
s⊆I
s
t
k∈s σ̃k ũk ṽ k
P
for s ∈ I = {1, 2, . . . , min(n, m)}, and |s| is the cardinal of s.
P
s
t
Proof. We remark that Y − X̃ = k∈s
/ σ̃k ũk ṽ k . It results that
where X̃ =
mkY −
s
X̃ k2F
+ 2|s|pn,m = m
X
σ̃k2
+ 2|s|pn,m
k∈s
/
n
X
mσ̃k2 if k ∈
/s
=
.
2pn,m otherwise
k=1
21
(4.2)
p
n,m
?
Using that 2pn,m /m = cn,m
+ , it follows that the set s = {k ; σ̃k > c+ } is by definition such
s
that k ∈ s? if and only if 2pn,m < mσ̃k2 . Therefore, by (4.2), the criterion s 7→ mkY − X̃ k2F +
2|s|pn,m is minimum at s = s? which concludes the proof.
In the model Y = X + W , where the entries of W are iid Gaussian variables with zero mean
and variance τ 2 , it is well known that the degrees of freedom (DOF) of a given estimator X̂ is
defined as
n m
n m
1 XX
1 XX
DOF(X̂) = 2
Cov(X̂ ij , Y ij ) = 2
E[X̂ ij W ij ].
τ
τ
i=1 j=1
i=1 j=1
The DOF is widely used in statistics to define various criteria for model selection among a
collection of estimators, see e.g. [Efr04]. In low rank matrix denoising, the following proposition
shows that it is possible to derive the asymptotic behavior of the DOF of spectral estimators.
Proposition 4.2. Assume that Y = X + W is a random matrix sampled from the Gaussian
P∗
f
spiked population model with τ = √1m and X = rk=1 σk uk v tk . Let X̂ be a spectral shrinker of
order r ≤ r∗ that collapses the bulk to 0, such that each function fk , for 1 ≤ k ≤ r, is continuously
differentiable on ]c+ , +∞[. Moreover, assume that σk > c1/4 for all 1 ≤ k ≤ r. Then, one has
that, almost surely,
r
X
1
fk (ρ(σk ))
2c
f
lim
DOF(X̂ ) =
1+c+ 2 .
n→+∞ m
ρ(σk )
σk
k=1
Proof. Thanks to the derivation of the SURE in [Ste81] and formula (2.11) on the divergence of
spectral estimators, one has that
r
r
r
n
h
i
X
X
X
X
f
(σ̃
)
σ̃
f
f
k k
k
.
DOF(X̂ ) = E div X̂ = E |m − n|
+
fk0 (σ̃k ) + 2
fk (σ̃k )
σ̃k
σ̃k2 − σ̃`2
k=1
k=1
k=1
`=1;`6=k
By Proposition 3.1, Proposition 3.2, and our assumptions on the fk ’s, one has that, almost surely,
r
X
1
fk (ρ(σk ))
2c
f
lim
div X̂ =
1+c+ 2 .
n→+∞ m
ρ(σk )
σk
k=1
which completes the proof.
√
Hence, in the Gaussian spiked population model, by Proposition 4.2 and using that σk2 > c
for all 1 ≤ k ≤ r, it follows that if s ⊆ {1, . . . , r} then
√ 2
1
2c
s
lim
DOF(X̃ ) = |s| 1 + c + 2 ≤ |s| 1 + c = |s|c2+ .
(4.3)
n→+∞ m
σk
√
√ 2
s
1
Hence, the quantity 2|s| 2 ( m + n) is asymptotically an upper bound of DOF(X̃ ) (when
normalized by 1/m) for any given set s ⊆ {1, . . . , r}.
22
Let us now consider the more general case where the entries of Y are sampled from an
exponential family. To the best of our knowledge, extending the notion of the bulk edge to nonGaussian data sampled from an exponential family has not been considered so far in the literature
on random matrices and low rank perturbation model. Therefore, except in the Gaussian case,
it is far from being trivial to find an appropriate threshold value c̄ to define an active set in the
form s̄ = {k ; σ̃k > c̄}.
Nevertheless, to select an appropriate active set of singular values, we introduce the following
s
criterion that is inspired by the previous results on the DOF of the estimator X̃ in the Gaussian
case and the statistical literature on the well known AIC for model selection [Aka74].
P
s
Definition 4.1. The AIC associated to X̃ = k∈s σ̃k ũk ṽ tk is
s
s
AIC(X̃ ) = −2 log q(Y ; X̃ ) + 2|s|pn,m
with
pn,m =
√ 2
1 √
m+ n .
2
(4.4)
Q Q
s
s
where |s| is the cardinal of s, and q(Y ; X̃ ) = ni=1 m
j=1 q(Y ij ; X̃ ij ) is the likelihood of the data
s
in the general form (2.1) at the estimated parameters X ij = X̃ ij .
s
In the above definition of AIC(X̃ ), the quantity 2|s|pn,m is an approximation of the degree
s
of freedom of X̃ , i.e., of the numbers of its free parameters as it is justified by Proposition 4.2
in the case of Gaussian measurements. The AIC allows us to define an optimal subset of active
variables as
s
s∗ = arg min AIC(X̃ ).
s⊆I
For Gaussian measurements, Proposition 4.1 gives the value of the optimal set s∗ in a closed-form.
Following the arguments in Section 2.3, for Gamma or Poisson measurements and for a given
subset s, we consider the estimator
#
"
X
s
(4.5)
X̃ = max
σ̃k ũk ṽ tk , ε ,
k∈s
when > 0 is an a priori value to satisfy the positivity constraint on the entries of an estimator
in this setting. However, contrary to the case of Gaussian noise, the search of an optimal subset
s
s? ⊂ arg min AIC(X̃ ) becomes a combinatorial problem in this context. In our numerical
s⊆I
experiments, we thus choose to construct an approximation s̃ of s? with a greedy search strategy
that reads as follows
n
o
I\{k}
I
s̃ = I \ k ∈ I ; AIC(X̃
) ≤ AIC(X̃ ) .
(4.6)
For Gaussian measurements, s̃ = s? since the optimisation problem (4.6) becomes separable.
In our numerical experiments, we have found that s̃ selects a relevant set of active singular values
which separates well the structural content of X while removing most of the noise component.
Further details are given in Section 5 below.
23
For Gaussian noise, the computation of the active set s∗ of singular values may also be
interpreted as a way to estimate the unknown rank r∗ of the signal matrix X. In this setting,
one has that s? = {k ; σ̃k > cn,m
+ } which suggests the choice
r̂ = max{k ; σ̃k > cn,m
+ },
(4.7)
as an estimator of r∗ .
There exists an abundant literature of the problem of estimating the rank of an empirical
covariance matrix for the purpose of selecting the appropriate number of significant components
to be kept in PCA or factor analysis. It is much beyond the scope of this paper to give an
overview of this topic. We point to the review in [Jol02] for a summary of existing methods to
determine the number of components in PCA that are grouped into three categories: subjective
methods, distribution-based test tools, and computational procedures. For recent contributions
in the matrix denoising model (1.1) with Gaussian noise, we refer to the works [CTT14, GD14b]
and references therein. For example for Gaussian data with know variance τ 2 = 1/m, Eq. (11)
in [GD14b] on optimal hard thresholding of singular values suggest to take
s
8c
√
r̂ = max{k ; σ̃k > λ(c)}, with λ(c) = 2(c + 1) +
,
(4.8)
(c + 1) + c2 + 14c + 1
as a simple method to estimate the rank. It should be remarked that the problem of estimating
the true rank r∗ of X in model (1.1) is somewhat ill-posed as, in the Gaussian spiked population
model, Proposition 3.1 implies that one may only expect to estimate the so-called effective rank
reff = max{k ; σk > c1/4 } (see e.g. Section II.D in [Nad14]).
In our numerical experiments, we shall compare different choices for the active set of singular
values of the form ŝ = {1, . . . , r̂} where r̂ is either given by (4.7), (4.8), or by the “oracle choices”
r̂ = r∗ and r̂ = reff .
Other methods based on hypothesis testing [CTT14] could be used for rank estimation in the
Gaussian model (1.1), but it is beyond the purpose of this paper to give a detailed comparison.
For Poisson or Gamma noise, it is more difficult to interpret the computation of s∗ as a way
to estimate the rank of X since, in our numerical experiments, we have found that the cardinality
of s∗ is generally not equal to max{k ; k ∈ s∗ }. Moreover, to the best of our knowledge, there
is not so much work on the estimation of the true rank of a noisy matrix beyond the Gaussian
case. Therefore, we have not included a numerical comparison with other methods for the choice
of the active set of singular values in these two cases.
5
Numerical experiments
In this section, we assess of the performance of data-driven srhinkage rules under various numerical experiments involving Gaussian, Gamma and Poisson measurements.
24
5.1
The case of a signal matrix of rank one
We consider the simple setting where the rank r∗ of the matrix X is known and equal to one
meaning that
X = σ1 u1 v t1 ,
where u1 ∈ Rn and v 1 ∈ Rm are vectors with unit norm that are fixed in this numerical
experiment, and σ1 is a positive real that we will let varying. We also choose to fix n = m = 100,
n
= 1 and c+ = 2. For the purpose of sampling data from Gamma and Poisson
and so to take c = m
distribution, we took singular vectors u1 and v 1 with positive entries. The i-th entry (resp. j-th
entry) of u1 (resp. v 1 ) is chosen to be proportional to 1 − (i/n − 1/2)2 (resp. 1 − (j/m − 1/2)2 ).
Pmin(n,m)
Let Y = k=1
σ̃k ũk ṽ tk be an n × m matrix whose entries are sampled from model (2.1) and
then satisfying E[Y ] = X.
Gaussian measurements
We first consider the case of Gaussian measurements, where Y = X + W with E[W ij ] = 0,
Var(W ij ) = τ 2 with τ = √1m . In this context, we compare the following spectral shrinkage
estimators:
• Rank-1 PCA shrinkage
1
X̂ = σ̃1 ũ1 ṽ t1 ,
• Rank-1 SURE-driven soft-thresholding
1
X̂ soft = σ̂1 ũ1 ṽ t1
with σ̂1 = (σ̃1 − λ(Y ))+ ,
• Rank-1 asymptotically optimal shrinkage proposed in [Nad14] and [GD14a]
q
1
X̂ ∗ = σ̂1 ũ1 ṽ t1 with σ̂1 = σ̃12 − 4 11{σ̃1 >2} ,
• Rank-1 SURE-driven weighted estimator that we have derived in Section 2.3
!!
n
1
1
2 X σ̃12
1
t
X̂ w = σ̂1 ũ1 ṽ 1 with σ̂1 = 1 − 2
+
σ̃1 11{σ̃1 >2} ,
σ̃1 m m
σ̃12 − σ̃`2
`=2
+
where the above formula follows from the results in Section 3.3 using that c = 1 and c+ = 2
in these numerical experiments, and where, for the soft-thresholding, the value λ(Y ) > 0 is
obtained by a numerical solver in order to minimize the SURE. As a benchmark, we will also
consider the oracle estimator X 1∗ that performs shrinkage by using the knowledge of the true
singular-value σ1 defined as
p
X 1∗ = σ̂1 ũ1 ṽ t1 with σ̂1 = ρ(σ1 )2 − 4 11{ρ(σ1 )>2}
25
which corresponds to the asymptotically optimal shrinking rule (3.13) as a function of ρ(σk ) in
the setting c = 1 and c+ = 2. Note that form the formula above ŵ1 = σˆ1 /σ˜1 is necessary in the
range [0, 1] for all considered estimators.
In Figure 1, we compare the estimated singular-values σ̂1 and the estimated weights ŵ1 =
σ̂1 /σ̃1 as functions of σ1 for the four aforementionned estimators. Because all estimators are
subject to noise variance, we display, for all estimators, the median values and the 80% confidence
intervals obtained from M = 100 noise realizations. It can be seen that the median curves for
1
1
the eigenvelues and the weights of X̂ w and X̂ ∗ coincide (up to variations that are slightly larger
for the former) which is in agreement with the asymptotic analysis of shrinkage rules that has
been carried out in Section 3.3. Spectral estimator obtained by SURE-driven soft-thresholding
also leads to an optimal shrinkage rule.
In Figure 2, for each of the four spectral estimators above, we display for M = 100 noise
realizations, as functions of σ1 , the following normalized MSE
NMSE(X̂) =
kX̂ − Xk2F
.
kXk2F
1
1
1
The normalized MSE of the estimators X̂ soft , X̂ ∗ and X̂ w are the same for values of σ1 larger than
c1/4 = 1, and they only differ for values of σ1 close or below the threshold c1/4 = 1 (corresponding
to values of ρ(σ1 ) below the bulk edge c+ = 2). More remarkably, above c1/4 = 1, they offer
similar NMSE values to the oracle shrinkage estimator X 1∗ , not only in terms of median but also in
1
terms of variability, as assessed by the confidence intervals. The performances of the estimator X̂
(standard PCA) are clearly poorer. These numerical experiments also illustrate that, for finitedimensional low rank matrix denoising with r∗ = 1, data-driven spectral estimators obtained by
minimizing a SURE criterion achieve performances that are similar to asymptotically optimal
shrinkage rules.
Gamma and Poisson distributed measurements
Let us now consider the case where the entries of Y ij ≥ 0 of the data matrix Y are independently
sampled from a Gamma or Poisson distribution with mean X ij > 0. To satisfy the constraint
that the estimators must be matrices with positive entries, we consider estimators of the form
(2.17). In this context, we compare the following spectral shrinkage estimators, set for ε = 10−6 ,
as:
• Rank-1 PCA shrinkage
1
X̂ = max σ̃1 ũ1 ṽ t1 , ε ,
• Rank-1 GSURE/SUKLS/PURE/PUKLA-driven soft-thresholding
1
X̂ soft = max σ̂1 ũ1 ṽ t1 , ε
with σ̂1 = (σ̃1 − λ(Y ))+ ,
26
5
X̂1
X̂1w
X1∗
X̂1soft
X1∗
4
Estimated singular value
Estimated singular value
4
5
X̂1
3
2
0
1
2
3
4
3
2
3
2
1
0
5
X̂1∗
X1∗
4
1
1
1
2
3
4
0
5
1
(a)
(b)
0.8
0.8
X̂1
0.2
2
3
4
Singular value σ1 of X
(d)
0.6
0.4
X̂1
0.2
X̂1w
X1∗
1
Estimated weight
0.8
Estimated weight
1
0.4
5
0
2
5
3
4
0.6
0.4
X̂1
0.2
X̂1soft
X1∗
1
4
(c)
1
0.6
3
Singular value σ1 of X
1
0
2
Singular value σ1 of X
Singular value σ1 of X
Estimated weight
X̂1
Estimated singular value
5
5
0
Singular value σ1 of X
(e)
X̂1∗
X1∗
1
2
3
4
5
Singular value σ1 of X
(f)
Figure 1: The case of Gaussian measurements with m = n = 100. Estimated first
singular value σ̂1 as a function of the true underlying one σ1 , for (a) our proposed
1
1
1
estimator X̂ w , (b) the soft-thresholding X̂ soft and (c) the asymptotical one X̂ ∗ . All
of them are compared to the first singular value σ̃1 of Y 1 and the one of the oracle
asymptotical estimator X 1∗ . (c,d,e) Same but for the corresponding weight ŵ1 = σ̂1 /σ̃1 .
Curves have been computed on M = 100 noise realizations, only the median and an
80% confidence interval are represented respectively by a stroke and a shadded area of
the same color.
• Rank-1 GSURE/SUKLS/PURE/PUKLA-driven weighted estimator
1
X̂ w = max σ̂1 ũ1 ṽ t1 , ε
with σ̂1 = w1 (Y )σ̃1 11{1∈s̃} ,
where s̃ is the approximated active subset as defined in Section 4. For the soft-thresholding, the
value λ(Y ) > 0 is obtained by a numerical solver in order to minimize either the GSURE or the
SUKLS criterion (in the Gamma case) and either the PURE or the PUKLA criterion (in the
Poisson case). The weight w1 (Y ) ∈ [0, 1] is obtained by a numerical solver in order to minimize
the GSURE and the PURE, as described in Section B. According to Section 2.3, the weight
27
1.6
1.4
1.4
1.2
1.2
1.2
1
1
1
0.8
0.6
0.8
0.6
0.4
X̂1
0.2
X̂1w
X1∗
0
NMSE
1.6
1.4
NMSE
NMSE
1.6
0.5
1
1.5
2
2.5
3
0.8
0.6
0.4
X̂1
0.4
X̂1
0.2
X̂1soft
X1∗
0.2
X̂1∗
X1∗
0
0.5
Singular value σ1 of X
1
1.5
2
2.5
3
Singular value σ1 of X
(a)
0
0.5
1
1.5
2
2.5
3
Singular value σ1 of X
(b)
(c)
Figure 2: Same as Fig. 1 but for the normalized MSE of the corresponding estimators.
w1 (Y ) ∈ [0, 1], minimizing the SUKLS criterion, has the following closed-form formula
!−1
1
n X
m
n
2
X
X
X̂ ij
L
−
1
1
σ̃
1
,
w1 (Y ) = min 1,
+
1+2
Lmn
Y ij
Lmn
σ̃12 − σ̃`2
i=1 j=1
`=2
and for the PUKLA criterion, we have
P P
n
m
Y
ij
i=1
j=1
.
w1 (Y ) = min 1, P P
1
n
m
X̂
ij
i=1
j=1
To evaluate the performances of these estimators, we perform again a study involving M = 100
noise realizations.
In the Gamma case with shape parameter L = 3, results are reported in Figure 3 where σ1
ranges from 0.1 to 5. In the Poisson case, results are reported in Figure 4. To generate data
from a Poisson distribution with mean value X = σ1 u1 v t1 , we took σ1 ranging from 25 to 400.
In this context, the entries X i,j are in average ranging from 0.25 to 4. When σ1 = 25, about
78% of the entries of Y are 0 and 20% are equals to 1 which correspond to an extreme level of
noise, while when σ1 = 400, the entries of Y concentrate around 4 with a standard deviation of
2 which correspond to a simpler noisy setting.
In these experiments, it can be seen that all the data-dependent spectral estimators achieve
comparable results with really small errors in terms of MSE and MKL risks. Their performances
1
are similar to X̂ = σ̃1 ũ1 ṽ t1 meaning that optimizing either SURE-like criteria leads to a spectral
estimator closed to correspond to matrix denoising by ordinary PCA. However, unlike the Gamma
case, it might be observed in the Poisson case that when reaching a stronger noise level, i.e, for
small value of σ1 , the NMSE of all estimator increases as the denoising problem becomes more
1
challenging. Nevertheless, only the weight of X̂ w driven by PUKLA does not present a drop wich
allows reaching a slightly smaller MKLA. In the Gamma case, the noise level being proportional
to the signal level, the NMSE/MKLS remain constant for all σ1 .
28
2.0
1.0
1
2
3
0.8
0.1
1
4
2
3
0
4
Singular value σ1 of X
(a)
1
2
3
1.0
1
2
3
4
Singular value σ1 of X
(e)
1
2
4
(d)
X̂1
MKLS
0.2
0.8
3
Singular value σ1 of X
(c)
NMSE
Estimated weight
2.0
0.1
0
4
1
3.0
GSURE X̂1soft
Singular value σ1 of X
(b)
4.0
GSURE X̂1w
0.6
Singular value σ1 of X
Estimated singular value
MKLS
3.0
X̂1
0.2
NMSE
Estimated weight
Estimated singular value
1
4.0
0.1
SUKLS X̂1w
SUKLS X̂1soft
0.1
0.6
1
2
3
0
4
Singular value σ1 of X
(f)
1
2
3
4
Singular value σ1 of X
(g)
0
1
2
3
4
Singular value σ1 of X
(h)
Figure 3: The case of Gamma measurements with m = n = 100. (a) Estimated first
1
eigenvalue σ̂1 as a function of the true underlying one σ1 for our proposed estimator X̂ w
1
and the soft-thresholding X̂ soft when both are guided by the GSURE. Both of them
are compared to the first singular value σ̃1 of Y 1 . Same but for (b) the corresponding
weights ŵ1 = σ̂1 /σ̃1 , (c) the NMSE risk and (d) the MKLS risk. (e-h) Exact same
esperiments but when our proposed estimator and the soft-thresholding are both guided
by SUKLS. Curves have been computed on M = 100 noise realizations, only the median
and an 80% confidence interval are represented respectively by a stroke and a shadded
area of the same color.
1
Finally, as mentionned by [GD14a], to use the estimator X̂ ∗ in a Gaussian model with
√
√
1
1
homoscedastic variance τ 2 6= m
, one may take the estimator X̂ ∗ = mτ f1∗ (σ̃1 /( mτ ))ũ1 ṽ t1 .
Hence, provided the variance of the entries of the data matrix Y is known, it is always possible
1
to use a scaled version of the shrinkage rule from [GD14a] when τ 2 6= m
. However, in the setting
of Gamma or Poisson noise, the variance of the additive noise varies from one entry to another
and depends on the entries of the unknown signal matrix X to recover. For this reason, it is not
possible to use a scaled version of the shrinkage rule from [GD14a] as this would require to use
scaling factors depending on the unknown values of the entries of X. Therefore, a comparison
between our approach and the asymptotically optimal shrinkage proposed in [Nad14] and [GD14a]
(for Gaussian noise) is not possible in the case of Gamma or Poisson measurements. Note that
for Gamma measurements one has that Var(Y ij ) = X 2ij /L, and, in our numerical experiments,
it is assumed that the constant L is known.
A typical example where this assumption is reasonable, is the one of the statistical models of
29
150
0.8
150
250
50
350
150
250
0
350
Singular value σ1 of X
Singular value σ1 of X
(a)
50
150
250
0.8
150
250
350
Singular value σ1 of X
(e)
250
350
(d)
X̂1
0.2
0.1
PUKLA X̂1w
PUKLA X̂1soft
0.1
0.6
50
50
150
Singular value σ1 of X
MKLA
150
50
(c)
NMSE
250
0.1
0
350
1
350
PURE X̂1soft
Singular value σ1 of X
(b)
Estimated weight
Estimated singular value
0.1
PURE X̂1w
0.6
50
50
MKLA
250
X̂1
0.2
NMSE
Estimated weight
Estimated singular value
1
350
50
150
250
350
Singular value σ1 of X
(f)
0
50
100
150
200
Singular value σ1 of X
(g)
0
50
150
250
350
Singular value σ1 of X
(h)
Figure 4: The case of Poisson measurements with m = n = 100. (a) Estimated first
eigenvalue σ̂1 as a function of the true underlying one σ1 for our proposed estimator
1
1
X̂ w and the soft-thresholding X̂ soft when both are guided by the PURE. Both of them
are compared to the first singular value σ̃1 of Y 1 . Same but for (b) the corresponding
weights ŵ1 = σ̂1 /σ̃1 , (c) the NMSE risk and (d) the MKLA risk. (e-h) Exact same
esperiments but when our proposed estimator and the soft-thresholding are both guided
by PUKLA. Curves have been computed on M = 100 noise realizations, only the
median and an 80% confidence interval are represented respectively by a stroke and a
shadded area of the same color.
speckle used in coherent imagery, such as, Synthetic Aperture Radar (SAR) and SOund Navigation And Ranging (SONAR) imagery. In such imaging systems, the observed irradiance Y ij of a
pixel with indices (i, j) is obtained as the square modulus of a complex signal modeled as being
zero-mean circular complex Gaussian distributed (consequence of the Central Limit Theorem)
[Goo76]. It follows that Y ij has an exponential distribution1 with mean X ij corresponding to the
underlying irradiance to be estimated. In order to improve the contrast of such images (namely,
the signal to noise ratio), an average of L independent and identically distributed images is often
performed, and the resulting pixel value becomes Gamma distributed with parameter L [UD89].
Because the number L of images to be averaged is chosen by the practitioner, the parameter L is
absolutely known without uncertainties, and for this reason it does not require to be estimated.
Nevertheless the variance Var(Y ij ) = X 2ij /L remains unknown.
1
The exponential distribution is a particular instance of the Gamma distribution with parameter L = 1
30
While all estimators behave similarly in the rank 1 setting, we will see in the next section
that they can significantly differ when the rank is let to be larger than 2.
5.2
The case of a signal matrix of rank larger than two
We now consider the more complex an realistic setting where the rank r∗ of the matrix X is
unknown and potentially larger than two, i.e.,
∗
X=
r
X
σk uk v tk ,
k=1
where uk ∈ Rn and v k ∈ Rm are vectors with unit norm that are fixed in this numerical
experiment, and σk are positive real values also fixed in this experiment. We also choose to fix
n = 100 and m = 200, while the true rank is r∗ = 9 as shown by the red curve in Figure 5(i).
Pmin(n,m)
Again, let Y = k=1
σ̃k ũk ṽ tk be an n × m matrix whose entries are sampled from model
(2.1) and then satisfying E[Y ] = X.
Gaussian distributed measurements
We first consider the case of Gaussian measurements, where Y = X + W with E[W ij ] = 0,
Var(W ij ) = τ 2 with τ = 80. In the following numerical experiments, we study the behavior of
the spectral estimator:
• PCA shrinkage
r
X̂ =
r
X
σ̃k ũk ṽ tk 11{k ≤ r̂} ,
k=1
• SURE-driven soft-thresholding
min(m,n)
X
X̂ soft =
σ̂k ũk ṽ tk
k=1
with σ̂k = (σ̃k − λ(Y ))+ ,
• Asymptotically optimal shrinkage proposed in [Nad14] and [GD14a]
r
X̂ ∗ =
r
X
σ̂k ũk ṽ tk
k=1
with σ̂k =
1
σ̃k
q
σ̃k2 − (c + 1)
2
− 4c 11{k ≤ r̂} ,
• SURE-driven weighted estimator that we have derived in Section 2.3
!!
r
n
X
1
k
2 X σ̃k2
r
t
X̂ w =
σ̂k ũk ṽ k with σ̂k = 1 − 2
+
σ̃k 11{k ≤ r̂} ,
σ̃k m m
σ̃k2 − σ̃`2
k=1
`=2
31
+
•
•
(e)
(f)
X
Y
105
X̂∗
Xsoft
X̂soft
Xrw
3
10
•
◦
(c)
•
(d)
•
◦
(g)
(h)
10−2
X̂r
104
•
10−2
NMSE
Singular values
(b)
NMSE
(a)
X̂rw
102
10−3
10−3
101
100
101
100
102
101
102
100
Rank r (restricted to the bulk edge)
Indices
(i)
(j)
NMSE
10−2
NMSE
10−3
10−3
100
101
Rank r (restricted to the oracle/true rank)
(l)
102
102
(k)
10−2
NMSE
10−2
101
Rank r (no restriction)
100
10−3
101
102
Rank r (restricted to the effective rank [Nad14])
(m)
100
101
Rank r (restricted as in [GD14b])
(n)
Figure 5: (a) Zoom on a 100 × 200 noise-free matrix and (e) a single realization of
corrupted version by Gaussian noise (τ = 80). (b,c) Oracle soft-thresholding X soft and
rmax
data-driven soft-thresholding X̂ soft . (d) PCA full rank X̂
, i.e., rmax = min(n, m).
rmax
(f,g,h) Oracle full rank approximation X w , and data-driven full rank estimation
rmax
rmax
X̂ w
and X̂ ∗ . (i) Their corresponding singular values. (j) NMSE of the various
approximations as a function of the rank r. (k) Same but without knowledge the bulk
edge, namely c+ = 0. (l,m,n) Same when the active set of singular values is of the form
ŝ = {1, . . . , r̂} where r̂ is either given by r̂ = r∗ (oracle/true rank), r̂ = reff (effective
rank) or by (4.8). In all the figures, the solid curves correspond to oracle estimators
and the dashed curves correspond to data-driven estimators, obtained over M = 1, 000
noise realizatrions. The grey areas represent a 80% confidence interval.
32
102
where r ∈ [1, min(n, m)], and for the soft-thresholding, the value λ(Y ) > 0 is obtained
by a numerical solver in order to minimize the SURE. Otherwise specified, we consider
r̂ = max{k ; σ̃k > cn,m
+ }, i.e., an estimator of the rank using knowledge of the bulk edge
n,m
c+ ≈ c+ , hence, 11{k ≤ r̂} = 11{σ̃k >cn,m } . As discussed in Section 4, we compare, in these exper+
iments, the influence of rank estimation by analyzing the performances of the same estimators
when either r̂ = rmax = min(n, m) (i.e. without knowledge the bulk edge, namely c+ = 0),
r̂ = r∗ (oracle/true rank), r̂ = reff (effective rank [Nad14]) or by (4.8) (from hard-thresholding
of singular values in [GD14b]).
In order to assess the quality of SURE as an estimator of the MSE, we also compare the
aforementioned approach with their oracle counterparts given by
min(m,n)
X soft =
X
σ̂k ũk ṽ tk
k=1
X rw =
r
X
σ̂k ũk ṽ tk
with σ̂k = (σ̃k − λoracle (Y ))+ ,
and
with σ̂k = ṽ tk X ũk ,
k=1
where λoracle (Y ) minimizes the squared error SE (non-expected risk) over the sets and softthresholding approximations respectively. Note that X rw and X soft are ideal approximations of
X that cannot be used in practice but serve as benchmarks to evaluate the performances of the
r
r
r
data-driven estimators X̂ , X̂ soft , X̂ ∗ and X̂ w . In order to shed some light on the variance of
these estimators, and indirectly on the variance of the SURE, we perform this experiments over
M = 1000 independent realizations of Y .
The results are reported on Figure 5. For an estimator of the rank given either by r̂ =
∗
max{k ; σ̃k > cn,m
+ } (knowledge of the bulk edege), r̂ = r (oracle/true rank), r̂ = reff (effective
r
r
rank) or by (4.8), it can be observed that X̂ w , X̂ ∗ and X rw achieve comparable performances for
all r ∈ [1, min(m, n)] even though the two first do not rely on the unknown matrix X. Similarly
X̂ soft and X soft achieve also comparable performances showing again that the SURE accurately
r
r
estimates the MSE. In terms of error bands for the NMSE, X̂ w , X̂ ∗ and X rw outperform X̂ soft
r
and X soft provided that r is large enough. Moreover, the performance of X̂ w plateaus to its
optimum when the rank r becomes large. This allows us to choose r = min(n, m) when we do
not have a priori on the true or effective rank.
Interestingly, Fig. 5.(k) shows that when the above estimators are used without thepknowledge
n,m
n
of the bulk edge (i.e. by taking cn,m
+ = 0 in their computation instead of c+ = 1 +
m , which
r
corresponds to the choice r̂ = rmax = min(n, m)), the performance of X̂ w actually decreases
when the rank r becomes too large. Indeed, it is clear from Fig. 5.(k), that the the error band of
r
the NMSE of X̂ w becomes much larger as the rank r increases. This illustrates that the SURE
suffers from estimation variance in the case of over parametrization when r becomes too large,
and thus it cannot be used to estimate jointly a too large number of weights. Therefore, the
knowledge of an appropriate estimator r̂ of the rank (e.g. using the bulk edge) seems to provide
a relevant upper bound on the number of weights that can be jointly and robustly estimated
with the SURE.
33
•
X
Y
104
X̂r
SEη Xsoft
103
GSURE X̂soft
KLS Xsoft
102
SUKLS X̂soft
SEη Xrw
GSURE X̂rw
KLS Xrw
101
SUKLS X̂rw
101
(d)
(i)
10−2
◦
(e)
◦
(j)
10−2
10−3
10−3
100
102
•
•
◦
(h)
NMSE
105
101
102
100
Rank r (restricted to the active set)
Indices
(k)
101
102
Rank r (no restriction)
(l)
(m)
10−0.5
10−0.5
MKLS
100
•
(g)
◦
(c)
MKLS
Singular values
(f)
•
(b)
NMSE
•
(a)
10−1
10−1
100
101
Rank r (restricted to the active set)
(n)
102
100
101
Rank r (no restriction)
(o)
Figure 6: (a) A single realization of corrupted version by Gamma noise (L = 80)
with zoom on a 100 × 200 matrix. (b,c,d,e) Oracle soft-thresholding X soft and datadriven soft-thresholding X̂ soft respectively for SEη , GSURE, KLS and SUKLS. (f)
rmax
PCA X̂
with full rank approximation i.e. rmax = min(n, m). (g,h,i,j) Oracle full
rmax
rank approximation X rwmax , and data-driven full rank estimation X̂ w respectively for
SEη , GSURE, KLS and SUKLS. (k) Their corresponding singular values averaged over
M = 100 noise realizations. (l,m) NMSE averaged over M = 100 noise realizations as
a function of the rank r with and without using the active set. (n,o) Same but with
respect to MKLS.
34
102
•
•
105
X
Y
104
X̂r
SEη Xsoft
103
PURE X̂soft
KLA Xsoft
PUKLA X̂soft
SEη Xrw
PURE X̂rw
KLA Xrw
102
101
NMSE
(g)
◦
(c)
(d)
◦
(h)
(i)
10−4
•
◦
(e)
•
◦
(j)
10−4
PUKLA X̂rw
101
100
102
101
102
100
Rank r (restricted to the active set)
Indices
(k)
101
102
Rank r (no restriction)
(l)
(m)
0.8
0.8
MKLA
100
100
MKLA
Singular values
(f)
•
(b)
NMSE
•
(a)
0.2
100
0.2
101
Rank r (restricted to the active set)
(n)
102
100
101
Rank r (no restriction)
(o)
Figure 7: (a) A single realization of corrupted version by Poisson noise with zoom
on a 100 × 200 noise-free matrix (b,c,d,e) Oracle soft-thresholding X soft and datadriven soft-thresholding X̂ soft respectively for SE, PURE, KLA and PUKLA. (f) PCA
rmax
X̂
with full rank approximation i.e. rmax = min(n, m). (g,h,i,j) Oracle full rank
rmax
approximation X rwmax , and data-driven full rank estimation X̂ w respectively for SE,
PURE, KLA and PUKLA. (k) Their corresponding singular values averaged over 200
noise realizations. (l,m) NMSE averaged over 200 noise realizations as a function of the
rank r with and without using the active set. (n,o) Same but with respect to MKLA.
(Matrix entries are displayed in log-scale for better visual assessment.)
35
102
Gamma and Poisson measurements
Let us now consider the case where the entries of Y ij > 0 of the data matrix Y are independently
sampled from a Gamma or Poisson distribution with mean X ij > 0. We again consider estimators
of the form (2.17). In this context, we compare the following spectral shrinkage estimators, set
for ε = 10−6 , as:
• PCA shrinkage
r
X̂ =
r
X
max σ̃k ũk ṽ tk , ε
with σ̂k = σ̃k 11{k∈s̃} ,
k=1
• GSURE/SUKLS/PURE/SUKLA driven soft-thresholding
min(m,n)
X
X̂ soft =
max σ̂k ũk ṽ tk , ε
k=1
with σ̂k = (σ̃k − λ(Y ))+ ,
• GSURE/SUKLS/PURE/SUKLA driven weighted estimator
r
X̂ w =
r
X
max σ̂k ũk ṽ tk , ε
with σ̂k = wk (Y )σ̃k 11{k∈s̃} ,
k=1
where r ∈ [1, min(n, m)], and s̃ is the approximated active subset as defined in Section 4. For the
soft-thresholding, the value λ(Y ) > 0 is obtained by a numerical solver in order to minimize either
the GSURE or the SUKLS criterion (in the Gamma case) and either the PURE or the PUKLA
criterion (in the Poisson case). As shown in Section 2.3, in the case of Gamma (resp. Poisson)
measurements, the value of wk (Y ) for k ∈ s̃ which minimizes the GSURE (resp. PURE) or the
SUKLS (resp. PUKLA), cannot be obtained in closed form. As an alternative, we adopt a greedy
one-dimensional optimization strategy starting from the matrix σ̃1 ũ1 ṽ t1 and next updating the
weights w` sequentially by starting ` = 1 to ` = min(n, m), with the constraint that, for all ` ∈
/ s̃,
the weight w` is set to zero. To this end, we resort to one-dimensional optimization techniques in
the interval [0, 1] using Matlab’s command fminbnd. This strategy is used for GSURE, SUKLS,
PURE and PUKLA by evaluating them as described in Section B. As in the Gaussian setting,
we compare this spectral estimators with their oracle counterparts given by
min(m,n)
X soft =
X
max σ̂k ũk ṽ tk , ε
k=1
X rw =
r
X
max σ̂k ũk ṽ tk , ε
with σ̂k = (σ̃k − λoracle (Y ))+ ,
and
with σ̂k = wkoracle (Y )σ̃k 11{k∈s̃} .
k=1
where wkoracle (X) and λoracle (Y ) minimizes one of the objective SEη , KLS, SE or KLA (nonexpected risks) over the set of matrices sharing with Y the same r first left and right singular
vectors, and soft-thresholding approximations respectively. Note again that X rw and X soft are
36
ideal approximations of X that cannot be used in practice but serve as benchmarks to evaluate
r
the performances of the data-driven estimators X̂ w and X̂ soft .
The results for the Gamma noise are reported on Figure 6. As in the Gaussian setting, it
r
can be observed that X̂ w and X rw achieve comparable performances, as well as X̂ soft and X soft
showing that the GSURE (resp. SUKLS) accurately estimates the MSEη (resp. KLS). Visual
inspection of the restored matrices tends to show that the estimators driven by MSEη or GSURE
produce less relevant results compared to KLS or SUKLS, as confirmed by the curves of NMSE
and MKLS. Performance in terms of NMSE also illustrates that minimizers of SEη do not
r
coincides with those of SE. As in the Gaussian setting, X̂ w and X r outperform X̂ soft , X soft and
r
r
standard PCA X̂ provided that r is large enough. Moreover, the performance of X̂ w obtained
with KL objectives plateaus to its optimum when the rank r becomes large. Again, this allows
us to choose r = min(n, m) when we do not have a priori on the true rank r? .
The results for the Poisson noise are reported on Figure 7. The conclusions are similar to the
Gaussian and Gamma cases. Obviously, the NMSE is smaller for approximations that minimizes
SE (or PURE) than for those minimizing KLA (or PUKLA). However, visual inspection of the
obtained matrices tends to demonstrate that minimizing such objectives might be less relevant
r
than minimizing KL objectives. In this setting, the performance of X̂ w is on a par with the one
r
of X̂ soft based on PUKLA. In fact, for other choices of matrices X, X̂ w based on PUKLA might
r
improve, in terms of MKLS, much more on X̂ soft , and might improve not as much on X̂ w based
r
on PURE. Nevertheless, whatever X, we observed that X̂ w driven by PUKLA always reaches
r
at least as good performance in terms of MKLS as the best of X̂ w driven by SE and X̂ soft .
Fig. 6.(m), Fig. 6.(o), Fig. 7.(m) and Fig. 7.(o) show that when the above estimators are
r
used without the active set (i.e., by choosing s̃ = [1, min(n, m]), the performance of X̂ w actually
decreases when the rank r becomes too large. As in the Gaussian setting, this can be explained
by the fact that the GSURE, SUKLS, PURE and PUKLA suffer from estimation variance in the
case of over parametrization, hence, they cannot be used to estimate jointly a too large number
of weights. The active set s̃ (in the same manner as the bulk edge) seems to provide a relevant
selection of the weights that can be jointly and robustly estimated in a data driven way.
5.3
Signal matrix with equal singular values and increasing rank
We propose now to highlight
limitations of our approach in the situation where the
Prpotential
∗
∗
t
rank r of the matrix X = k=1 σk uk v k is let growing and all positive singular values σk of X
are equal, namely
∗
Y =
r
X
k=1
σk uk v tk + W
1/4
with σk = γcn,m
for all 1 ≤ k ≤ r∗ ,
(5.1)
n
where uk ∈ Rn and v k ∈ Rm are vectors with unit norm that are fixed, cn,m = m
and W
is centered random matrix whose entries are iid Gaussian variables with variance τ 2 = 1/m.
We again choose to fix n = 100 and m = 200, while the true rank is r∗ let growing from 1 to
min(n, m) in the following numerical experiments. The constant γ is chosen to be larger than
1. Hence, eq. (5.1) corresponds to the Gaussian spiked population model in the setting where
37
1/4
1/4
all positive singular values are equal and larger than the threshold cn,m . The choice σk = γcn,m
with γ > 1 is motivated by the results from Proposition 3.1.
For a given value of the true rank r∗ , we performed experiments involving M = 1000 realizations from model (5.1) to compare the NMSE of the estimators by oracle soft-thresholding
rmax
X soft , data-driven soft-thresholding X̂ soft , PCA full rank X̂
i.e. rmax = min(n, m), oracle
rmax
rmax
rmax
full rank approximation X w , and data-driven full rank estimation X̂ w and X̂ ∗ . All these
estimators have been introduced in Section 5.2.
In Figure 8, we report the results of numerical experiments by displaying errors bars of the
NMSE of these estimators as functions of the true rank r∗ . For low values of the true rank
rmax
rmax
(r∗ ≤ 20), the data-driven estimators X̂ w
(our approach) and X̂ ∗
(shrinkage rule from
[GD14a]) achieve the best performances that are similar in term of median value of the NMSE.
However, our approach has some limitations with respect to the performances of the estimator
from [GD14a] or data-driven soft-thresholding [CSLT13] in the setting where the signal matrix
has equal positive singular values and when its rank is increasing. Moreover, the error bands
of the NMSE for our approach becomes significantly larger than those of the other data-driven
estimators when the true rank r∗ increases. This illustrates that SURE minimization may lead
to estimators with a high variance in the case of over parametrization, that is, when there exists
a large number of significant and close singular values in the signal matrix.
5.4
Influence of the dimension and the signal-to-noise ratio
In Section 5.3, we used simulated data consisting of a signal matrix with equal positive singular
values and an increasing rank. In such a setting , it is likely that the empirical weights wk (Y ),
Pmin(n,m) σ̃k2
used in our approach, will have a high variance due to the term `=1;`6=k σ̃2 −σ̃
2 in their expresk
`
sion (1.13). However, the numerical experiments carried out in Section 5.3 correspond to a very
specific configuration of the signal matrix (with many equal singular values and a high rank)
which is not likely to be encountered with real data.
To conclude these numerical experiments, we finally analyze the influence of the dimension
of the data and the signal-to-noise ratio on the performances of our approach and the estimator
from [GD14a] in a more realistic setting (with Gaussian noise). These two estimators are the
ones giving the best results, and it is thus of interest to compare them with further experiments.
We use real and square signal matrices X ∈ Rn×n having a relatively fast decay of their
singular values, see Figure 9 and Figure 10. We choose to re-size them to let n varying from 20
to 250, and we define the root of the signal-to-noise ratio (RSNR) as
q P
n
1
2
n
i,j=1 (X ij − X̄)
1 X
n2
RSNR =
with X̄ = 2
X ij .
τ
n
i,j=1
For each value of n and RSNR (ranging from 5 to 10), we performed experiments involving
M = 400 realizations from model (5.1) to compare the NMSE of the estimators by data-driven full
rmax
rmax
rank estimation X̂ w (our approach) and X̂ ∗
(shrinkage rule from [GD14a]) with rmax = n.
In Figure 9 and Figure 10, we report the results of these numerical experiments by displaying
38
X̂
X̂
0.1
X̂rw
0.1
8 · 10−2
8 · 10−2
6 · 10−2
6 · 10−2
6 · 10−2
4 · 10−2
4 · 10−2
4 · 10−2
20
40
60
80
100
20
40
True rank
(a) γ = 6
80
20
0.15
X̂soft
Xrw
X̂rw
X̂
X̂rw
0.2
80
0.15
100
0.15
0.1
20
40
60
80
100
20
True rank
(d) γ = 4
r
Xrw
0.7
0.5
0.4
0.3
0.3
0.3
60
True rank
(g) γ = 2
80
100
20
40
60
True rank
(h) γ = 2
80
r
100
X̂soft
0.5
0.4
40
X̂
0.6
0.4
20
100
X̂∗
Xsoft
NMSE
NMSE
X̂rw
0.5
80
0.7
X̂rw
0.6
X̂soft
Xrw
60
(f) γ = 4
X̂∗
Xsoft
0.6
40
True rank
(e) γ = 4
X̂
r
X̂soft
True rank
0.7
100
X̂∗
Xsoft
0.2
0.1
60
80
Xrw
0.1
40
60
(c) γ = 6
NMSE
X̂∗
Xsoft
20
40
True rank
r
0.2
NMSE
100
(b) γ = 6
NMSE
NMSE
60
True rank
X̂
r
X̂∗
Xsoft
X̂soft
NMSE
X̂soft
Xrw
8 · 10−2
0.12
Xrw
X̂rw
X̂∗
Xsoft
0.1
NMSE
0.12
r
NMSE
0.12
20
40
60
80
True rank
(i) γ = 2
Figure 8: Comparison of NMSE as a function of the true rank r∗ in model (5.1) for
different values of γ for the estimator by roracle soft-thresholding X soft , data-driven
max
soft-thresholding X̂ soft , PCA full rank X̂
i.e. rmax = min(n, m), oracle full rank
rmax
rmax
rmax
approximation X w , and data-driven full rank estimation X̂ w
and X̂ ∗ . The
active set set of singular values is of the form ŝ = {1, . . . , r̂} where r̂ = max{k ; σ̃k >
n,m
cn,m
(a),
+ } is an estimator of the rank using knowledge of the bulk edge c+ ≈ c+
(d), (g) Median value of the NMSE of the various estimators over M = 1000 Gaussian
noise realizations in model (5.1) as a function of the true rank r∗ . (b), (c), (e), (f),
(h), (i) The grey areas represent error bands of the NMSE of data-driven and oracle
estimators.
39
100
10 4
10 2
10 0
10 0
(a) Signal matrix X
1.05
·10−3
2
10 1
10 3
(b) Singular values of X
·10−3
3.4
·10−3
X̂∗
X̂∗
X̂∗
X̂rw
1
10 2
X̂rw
1.9
X̂rw
3.2
0.9
1.8
NMSE
NMSE
NMSE
0.95
1.7
3
2.8
0.85
1.6
0.8
0.75
50
100
150
200
250
1.5
2.6
50
100
(c) RSNR = 10
150
Size n
Size n
(d) RSNR = 7
200
250
2.4
50
100
150
200
Size n
(e) RSNR = 5
Figure 9: Comparison of NMSE as a function of the dimension n in model (5.1) with
rmax
rmax
a square matrix X for different values of RSNR for the estimator X̂ w
and X̂ ∗
with rmax = n. The active set set of singular values is of the form ŝ = {1, . . . , r̂} where
r̂ = max{k ; σ̃k > cn,m
+ } is an estimator of the rank using knowledge of the bulk edge
c+ ≈ cn,m
.
(a)
Signal
matrix of size 250 × 250, (b) Decay of the singular values of
+
rmax
rmax
X in log-log scale, (c), (d), (e) Median value of the NMSE of X̂ w
and X̂ ∗
over
M = 400 Gaussian noise realizations in model (5.1) as a function of the dimension n.
The orange and grey areas represent error bands of the NMSE of these two estimators.
errors bars of the NMSE of these estimators as functions of the dimension n. It can be seen that
our approach dominates numerically the estimator from [GD14a] (for all values of n and RSNR)
in settings that are more likely to be encountered in practice than the simulated data used in
Section 5.3.
A
A.1
Proof of the main results
Proof of Proposition 3.2
Let us first introduce some notation and definitions to be used in the proof. For all 1 ≤ ` ≤ n,
let λ̃` be the eigenvalues of Y Y t namely λ̃` = σ̃`2 . For a fixed 1 ≤ k ≤ r∗ such that σk > c1/4 ,
40
250
10 4
10 2
10 0
10 0
(a) Signal matrix X
·10−3
5.5
1
2.2
2
1.8
100
150
200
Size n
250
0.8
4
0.7
3.5
0.6
3
0.5
2.5
X̂rw
0.9
4.5
2.4
50
·10−2
X̂∗
X̂rw
5
NMSE
NMSE
·10−3
X̂∗
X̂rw
2.6
1.6
10 3
(b) Singular values of X
X̂∗
2.8
10 2
NMSE
3
10 1
50
100
150
200
250
0.4
50
Size n
(c) RSNR = 10
(d) RSNR = 7
100
150
200
Size n
(e) RSNR = 5
Figure 10: Same as Fig. 9 with another signal matrix X.
let us introduce the complex-valued function gk defined by
gk (z) =
n
1
1 X
n
z − λ̃`
`=1;`6=k
for z ∈ C \ supp(µk ),
n
o
where supp(µk ) = λ̃` ; 1 ≤ ` ≤ n, ` 6= k is the support of the random measure µk =
1 Pn
`=1;`6=k δλ̃` on R+ , where δλ denotes the Dirac measure at λ. It is clear that
n
Z
gk (z) =
1
dµk (λ).
z−λ
The main difficulty in the proof is to show that, almost surely,
1
1
2
1+ 2 ,
lim gk (σ̃k ) = 2
n→+∞
ρ (σk )
σk
which is the purpose of what follows.
For a matrix A ∈ Rn×m (with n ≤ m), we denote its singular values by σ1 (A) ≥ σ2 (A) ≥
. . . ≥ σn (A) ≥ 0. Hence, one has that σ̃` = σ` (Y ) for all 1 ≤ ` ≤ n. Now, we recall that
Y = X + W where X is a fixed matrix of rank r∗ and W is a random matrix with iid entries
41
250
1
sampled from a Gaussian distribution with zero mean and variance m
. The first step in the proof
is to show that the random measure µk behaves asymptotically as the almost sure limit of the
empirical spectral measure µW W t of the Wishart matrix W W t . By definition, the eigenvalues
of W W t are λ` (W ) = σ`2 (W ) for all 1 ≤ ` ≤ n and µW W t is thus defined as
n
µW W t
1X
=
δλ` (W ) .
n
`=1
n
It is well know (see e.g. Theorem 3.6 in [BS10]) that, once m = mn ≥ n and limn→+∞ m
=c
with 0 < c ≤ 1, then, almost surely, the empirical spectral measure µW W t converges weakly to
the so-called Marchenko-Pastur
distribution µM P which is deterministic and has the following
q
1
(c2+ − λ)(λ − c2− ) 1I[c2− ,c2+ ] (λ). We recall that such a convergence can
density dµMdλP (λ) = 2πcλ
also be characterized through the so-called Cauchy or Stieltjes transform which is defined for
any probability measure µ on R as
Z
1
dµ(λ).
∀z ∈ C outside the support of µ, gµ (z) =
z−λ
By eq. (3.3.2) in [BS10], one obtains that, almost surely,
Z
1
t (λ) = gM P (z) for any z ∈ C \ R,
dµ
lim
n→∞
z − λ WW
where gM P is the Cauchy transform of µM P and
p
Z
z − (1 − c) − (z − (c + 1))2 − 4c
1
dµM P (λ) =
gM P (z) =
z−λ
2cz
(A.1)
for all z ∈ C \ [c2− , c2+ ].
Moreover, by Proposition 6 in [PL03], the convergence (A.1) is uniform over any compact subset
of C \ R.
Then, it follows from the so-called Weyl’s interlacing inequalities (see e.g. Theorem 3.1.2 in
[HJ91]) that for all 1 ≤ ` ≤ n
σ`+r∗ (W ) ≤ σ` (Y ) ≤ σ`−r∗ (W ),
(A.2)
with the convention that σk (W ) = −∞ if k > n and σk (W ) = +∞ if k ≤ 0. Thanks to
the results that have been recalled above on the asymptotic properties of µW W t , one may use
inequalities (A.2) to prove that, almost surely, the random measure µk converges weakly to
the Marchenko-Pastur distribution µM P . Under the assumptions of Proposition 3.2 and using
Proposition 3.1, it can be shown that there exists ηk > 0 such that, almost surely and for all
sufficiently large n
λ̃` ∈
/ Kk := [ρ2 (σk ) − ηk , ρ2 (σk ) + ηk ]
fornany 1 ≤ ` ≤ n with `o6= k. Now, recall that the support supp(µk ) of the random measure µk
is λ̃` ; 1 ≤ ` ≤ n, ` 6= k , and that supp(µMP ) = [c2− , c2+ ]. Hence, for all sufficiently large n, one
has that
supp(µk ) ∩ Kk = ∅
and
supp(µMP ) ∩ Kk = ∅.
42
Therefore, thanks to the weak convergence of µk to µM P and using Ascoli’s Theorem, one may
prove that
lim sup |gk (z) − gM P (z)| = 0 almost surely.
n→∞ z∈K
(A.3)
k
Thanks to our assumptions, one has that, almost surely, limn→+∞ σ̃k2 = ρ2 (σk ) by Proposition
3.1. Hence, almost surely and for all sufficiently large n, one has that σ̃k2 ∈ Kk and so
|gk (σ̃k2 ) − gM P (ρ2 (σk ))| ≤ sup |gk (z) − gM P (z)| + |gM P (σ̃k2 ) − gM P (ρ2 (σk ))|.
z∈Kk
Therefore, using the uniform convergence (A.3) of gk to gM P and the continuity of gM P at
z = ρ2 (σk ), one obtains that, almost surely,
p
2 (σ ) − 1 + c −
ρ
(ρ2 (σk ) − (c + 1))2 − 4c
1
k
lim gk (σ̃k2 ) = gM P (ρ2 (σk )) = 2
×
.
n→+∞
ρ (σk )
2c
P
1
Since gk (σ̃k2 ) = n1 n`=1;`6=k σ̃2 −σ̃
2 , using the above equation and relation (3.1), it follows immek
`
1
1
1
+
so that, almost surely,
diately that gM P (ρ2 (σk )) = ρ2 (σ
2
)
σ
k
k
n
1 X
σ̃k
1
1
2
2
lim
1+ 2 ,
= lim σ̃k gk (σ̃k ) = ρ (σk ) gM P (ρ (σk )) =
n→+∞ n
ρ (σk )
σ̃k2 − σ̃`2 n→+∞
σk
`=1;`6=k
which completes the proof.
A.2
A technical result to prove SURE-like formulas
We recall the key lemma needed to prove the SURE-like formulas in an exponential family in
the continuous case. Similar results have already been formulated in different papers in the
literature, see e.g. the review proposed in [Del17].
Lemma A.1. Let Y ∈ Rn×m be a random matrix whose entries Y ij are independently sampled
from the continuous exponential family (2.2) in canonical form (that is the distribution of Y ij is
absolutely continuous with respect to the Lebesgue measure dy on R). Suppose that the function
h is continuously differentiable on Y = R. Let 1 ≤ i ≤ n and 1 ≤ j ≤ m, and denote by
Fij : Rn×m → R a continuously differentiable function such that
E [|Fij (Y )|] < +∞.
(A.4)
Then, the following relation holds
0
∂Fij (Y )
h (Y ij )
Fij (Y ) +
.
E [θ ij Fij (Y )] = −E
h(Y ij )
∂Y ij
43
Proof. Using the expression (2.2) of the pdf of the random varibles Y ij , one has that
Z
n
Y
p(yk` ; θ k` ) dyk` .
Fij (Y )h(yij )θ ij exp (θ ij yij − A(θ ij )) dyij
E [θ ij Fij (Y )] =
Rn×m
1≤k≤n
1≤`≤m
(k,`)6=(i,j)
where Y = (yk` )1≤k≤n,1≤`≤m . Thanks to condition (A.4), it follows that
Z
n
Y
p(yk` ; θ k` ) dyk` < +∞.
Fij (Y )h(yij ) exp (θ ij yij − A(θ ij )) dyij
Rn×m
(A.5)
1≤k≤n
1≤`≤m
(k,`)6=(i,j)
∂ exp(θ y −A(θ ))
ij ij
ij
Therefore, given that θ ij exp (θ ij yij − A(θ ij )) =
, an integration by part and
∂yij
eq. (A.5) imply that
Z
n
Y
∂Fij (Y )h(yij )
exp (θ ij yij − A(θ ij )) dyij
p(yk` ; θ k` ) dyk` .
E [θ ij Fij (Y )] = −
∂yij
Rn×m
1≤k≤n
1≤`≤m
(k,`)6=(i,j)
∂F (Y )
∂Fij (Y )h(yij )
∂yij
ij
= h0 (yij )Fij (Y ) + ∂y
h(yij ), we finally obtain that
ij
0
h (Y ij )
∂Fij (Y )
E [θ ij Fij (Y )] = −E
Fij (Y ) +
,
h(Y ij )
∂Y ij
Now, since
which completes the proof.
A.3
Proof of Proposition 2.1
We remark that
n X
m h
i
X
f
f
MSE(θ̂ , θ) =
E |θ̂ ij (Y )|2 − 2θ ij θ̂ ij (Y ) + θ 2ij .
f
(A.6)
i=1 j=1
f
Using Lemma A.1 with Fij (Y ) = θ̂ ij (Y ) and condition (2.4), it follows that
f
0
h
i
∂ θ̂ ij (Y )
h (Y ij ) f
f
.
θ̂ (Y ) + E
E θ ij θ̂ ij (Y ) = E
h(Y ij ) ij
∂Y ij
(A.7)
Then, by definition (2.2) of the exponential family, we remark that
00
Z
h (Y ij )
E
=
h00 (yij ) exp (θ ij yij − A(θ ij )) dyij .
h(Y ij )
R
Hence, using an integration by parts twice, we arrive at
00
Z
h (Y ij )
2
E
= θ ij
h(yij ) exp (θ ij yij − A(θ ij )) dyij = θ 2ij .
h(Y ij )
R
To complete the proof, it suffices to insert equalities (A.7) and (A.8) into (A.6).
44
(A.8)
A.4
Proof of Proposition 2.2
Thanks to eq. (2.8), one has that
f
MKLS(θ̂ , θ) =
n X
m
X
i=1 j=1
h f
i
f
f
f
E θ̂ ij (Y )A0 (θ̂ ij (Y )) − θ ij A0 (θ̂ ij (Y )) − A(θ̂ ij (Y )) + A(θ ij ).
(A.9)
f
Using Lemma A.1 with Fij (Y ) = A0 (θ̂ ij (Y )) and condition (2.9), it follows that
f
0
h
i
∂
θ̂
(Y
)
h
(Y
)
f
f
f
ij
ij
A00 (θ̂ ij (Y )) .
A0 (θ̂ ij (Y )) − E
E θ ij A0 (θ̂ ij (Y )) = −E
h(Y ij )
∂Y ij
(A.10)
Thus, inserting equality (A.10) into (A.9) implies that
f
X
n X
m
n X
m
X
∂ θ̂ ij (Y )
h0 (Y ij )
f
f
0 f
00 f
A (θ̂ ij (Y )) − A(θ̂ ij (Y )) +
SUKLS(θ̂ ) =
A (θ̂ ij (Y ))
θ̂ ij (Y ) +
h(Y ij )
∂Y ij
f
i=1 j=1
i=1 j=1
P P
f
A(θ ij ). Now recall that fij (Y ) =
is an unbiased estimator of MKLS(θ̂ , θ) − ni=1 m
j=1
f
f
f
∂f (Y )
η −1 θ̂ ij (Y ) and that A0 (θ̂ ij (Y )) = η −1 θ̂ ij (Y ) by Assumption 2.1. Therefore, ∂ijY
=
ij
f
f
∂ θ̂ (Y )
A00 (θ̂ ij (Y )) ∂ijY , and thus
ij
X
n X
m
n X
m
X
h0 (Y ij )
∂fij (Y )
f
f
f
0 f
SUKLS(θ̂ ) =
A (θ̂ ij (Y )) − A(θ̂ ij (Y )) +
θ̂ ij (Y ) +
,
h(Y ij )
∂Y ij
i=1 j=1
i=1 j=1
which completes the proof.
A.5
Proof of Proposition 2.3
Thanks to the expression (2.14) of the MKLA risk for data sampled from a Poisson distribution,
it follows that
n X
m
n X
m
h f
f i
X
X
f
X ij − X ij log (X ij ) =
E X̂ ij − X ij log X̂ ij
MKLA(θ̂ , θ) +
i=1 j=1
i=1 j=1
h(Y −1)
In the case of Poisson data, one has that exp (θ ij ) = X ij and h(Yij ) = Y ij . Therefore, by
ij
f
applying Hudson’s Lemma 2.1 with Fij (Y ) = log X̂ ij , it follows that
m
n X
m
n X
f
X
X
X ij log X̂ ij = E
Y ij log fij (Y − ei etj ) ,
E
i=1 j=1
i=1 j=1
which completes the proof.
45
B
Implementation details
We discuss below an algorithmic approach to find data-driven spectral estimators.
First, we discuss on how to compute data-driven spectral estimators from the expression of
risk estimators. For SUKLS in continuous exponential families, and for SURE in the Gaussian
case only, eq. (3.7) and (2.10) provide respectively a closed-form solution that can be evaluated
in linear time O(nm). On the contrary, the computations of GSURE (beyond the Gaussian
case), PURE and PUKLA, given respectively in eq. (2.6), (2.12) and (2.15), cannot be evaluated
f
in reasonable time. They rely respectively
of the divergence div θ̂ (Y ),
on the computation
PP
PP
t
t
Y ij fij (Y − ei ej ) and
Y ij log fij (Y − ei ej ) . Without further assumptions, such
quantities requires O(n2 m2 ) operations in general. A standard approach for the computation
of the divergence, suggested in [Gir89, RBU08], is to unbiasedly estimate it with Monte-Carlo
simulations by sampling the following relation
!#
"
f
∂
θ̂
(Y
)
f
δ
div θ̂ (Y ) = Eδ tr δ t
∂Y
at random directions δ ∈ Rn×m satisfying E[δ] = 0, E[δ i δ i ] = 1 and E[δ i δ j ] = 0. Following
[Del17], a similar first order approximation can be used for the other two quantities as
"
#
XX
XX
∂f
(Y
)
Y ij fij (Y − ei etj ) ≈
Y ij fij (Y ) − δ i,j
δ
, and
∂Y
i,j
"
#
XX
XX
∂f
(Y
)
δ
Y ij log fij (Y − ei etj ) ≈
Y ij log fij (Y ) − δ i,j
∂Y
i,j
where the entries of δ should be chosen Bernoulli distributed with parameter p = 0.5. The
advantage of these three approximations is that they can be computed in linear time O(nm) by
making use of the results of [LS01, SS03, Ede05, CSLT13, DVP+ 12] that provide an expression
for the directional derivative given by
∂f (Y )
t
δ = Ũ (D + S + A)Ṽ
∂Y
(B.1)
where Ũ and Ṽ are the matrices whose columns are ũk and ṽ k , and D, S and A are n × m
matrices defined, for all 1 ≤ i ≤ n and 1 ≤ j ≤ m, as
0
fi (σ̃i ) if i = j
Di,j = δ̄ i,j ×
0
otherwise,
(
0
if i = j
δ̄ i,j + δ̄ j,i
S i,j =
×
fi (σ̃i )−fj (σ̃j )
otherwise,
2
σ̃i −σ̃j
(
0
if i = j
δ̄ i,j − δ̄ j,i
Ai,j =
×
fi (σ̃i )+fj (σ̃j )
otherwise,
2
σ̃i +σ̃j
t
where σ̃k and fk (σ̃k ) are extended to 0 for k > min(n, m) and δ̄ = Ũ δ Ṽ ∈ Rn×m .
46
References
[ABB00]
O. Alter, P. O. Brown, and D. Botstein. Singular value decomposition for genomewide expression data processing and modeling. Proceedings of the National Academy
of Sciences (PNAS), 97(18), august 2000.
[AGZ10]
G. W. Anderson, A. Guionnet, and O. Zeitouni. An introduction to random matrices,
volume 118 of Cambridge Studies in Advanced Mathematics. Cambridge University
Press, Cambridge, 2010.
[Aka74]
H. Akaike. A new look at the statistical model identification. Automatic Control,
IEEE Transactions on, 19(6):716–723, 1974.
[BD06]
M. Bydder and J. Du. Noise reduction in multiple-echo data sets using singular value
decomposition. Magn Reson Imaging, 24(7):849–56, 2006.
[BMG13] J. Bazerque, G. Mateos, and G. Giannakis. Inference of Poisson count processes using
low-rank tensor data, pages 5989–5993. ICASSP, IEEE International Conference on
Acoustics, Speech and Signal Processing - Proceedings, 10 2013.
[BN12]
F. Benaych-Georges and R. R. Nadakuditi. The singular values and vectors of low
rank perturbations of large rectangular random matrices. J. Multivariate Analysis,
111:120–135, 2012.
[Bro86]
L. D. Brown. Fundamentals of statistical exponential families: with applications in
statistical decision theory. Institute of Mathematical Statistics, 1986.
[BS06]
J. Baik and J. W. Silverstein. Eigenvalues of large sample covariance matrices of
spiked population models. Journal of Multivariate Analysis, 97(6):1382 – 1408, 2006.
[BS10]
Z. Bai and J. W. Silverstein. Spectral analysis of large dimensional random matrices.
Springer Series in Statistics. Springer, New York, second edition, 2010.
[CR09]
D. J. Candès and B. Recht. Exact matrix completion via convex optimization. Found.
Comput. Math., 9(6):717–772, 2009.
[CSLT13] E. J. Candès, C. A. Sing-Long, and J. D. Trzasko. Unbiased risk estimates for singular
value thresholding and spectral estimators. IEEE Trans. Signal Process., 61(19):4643–
4657, 2013.
[CTT14]
Y. Choi, J. Taylor, and R. Tibshirani. Selecting the number of principal components:
Estimation of the true rank of a noisy matrix. Preprint arXiv:1405.7511, 2014.
[CX16]
Y. Cao and Y. Xie. Poisson matrix recovery and completion. IEEE Trans. Signal
Processing, 64(6):1609–1620, 2016.
[Del17]
C.-A. Deledalle. Estimation of kullback-leibler losses for noisy recovery problems
within the exponential family. Electronic Journal of Statistics, 11(2):3141–3164, 2017.
47
[DG14]
D. Donoho and M. Gavish. Minimax risk of matrix denoising by singular value
thresholding. Ann. Statist., 42(6):2413–2440, 12 2014.
[DS07]
R. B. Dozier and J. W. Silverstein. On the empirical distribution of eigenvalues of large
dimensional information-plus-noise-type matrices. J. Multivariate Anal., 98(4):678–
694, 2007.
[DVP+ 12] C.-A. Deledalle, S. Vaiter, G. Peyré, J. Fadili, and C. Dossal. Risk estimation for
matrix recovery with spectral regularization. In arXiv:1205.1482, 2012. Presented at
ICML’2012 workshop on Sparsity, Dictionaries and Projections in Machine Learning
and Signal Processing, Edinburgh, United Kingdom, 2012.
[Ede05]
A. Edelman. Matrix jacobians with wedge products. MIT Handout for 18.325, 2005.
[Efr04]
B. Efron. The estimation of prediction error: Covariance penalties and crossvalidation. Journal of the American Statistical Association, pages 99–467, 2004.
[Eld09]
Y. C. Eldar. Generalized sure for exponential families: Applications to regularization.
IEEE Transactions on Signal Processing, 57(2):471–481, 2009.
[EM72]
B. Efron and C. Morris. Empirical Bayes on Vector Observations: An Extension of
Stein’s Method. Biometrika, 59(2):335–347, 1972.
[EM76]
B. Efron and C. Morris. Multivariate empirical bayes and estimation of covariance
matrices. Ann. Statist., 4(1):22–32, 01 1976.
[EY36]
C. Eckart and G. Young. The approximation of one matrix by another of lower rank.
Psychometrika, 1(3):211–218, 1936.
[GD14a]
M. Gavish and D. Donoho.
arXiv:1405.7511, 2014.
[GD14b]
M. Gavish and D. L. Donoho. The optimal hard threshold for singular values is
\(4/\sqrt {3}\). IEEE Trans. Information Theory, 60(8):5040–5053, 2014.
[Gir89]
A. Girard. A fast monte-carlo cross-validation procedure for large least squares problems with noisy data. Numerische Mathematik, 56(1):1–23, 1989.
[Goo76]
J. W. Goodman. Some fundamental properties of speckle. JOSA, 66(11):1145–1150,
1976.
[Hal87]
P. Hall. On Kullback-Leibler loss and density estimation. Ann. Statist., 15(4):1491–
1519, 1987.
[HJ91]
R. A. Horn and C. R. Johnson. Topics in matrix analysis. Cambridge University
Press, Cambridge, New York, Melbourne, 1991. Suite de : Matrix analysis. 1985.
[HL06]
J. Hannig and T. C. M. Lee. On Poisson signal estimation under Kullback-Leibler
discrepancy and squared risk. J. Statist. Plann. Inference, 136(3):882–908, 2006.
Optimal shrinkage of singular values.
48
Preprint
[Hud78]
H. M. Hudson. A natural identity for exponential families with applications in multiparameter estimation. Ann. Statist., 6(3):473–484, 05 1978.
[Jol02]
I. T. Jolliffe. Principal component analysis. Springer Series in Statistics. SpringerVerlag, New York, second edition, 2002.
[JS15]
J. Josse and S. Sardy. Adaptive shrinkage of singular values. Statistics and Computing,
pages 1–10, 2015.
[Laf15]
J. Lafond. Low rank matrix completion with exponential family noise. In Proceedings
of The 28th Conference on Learning Theory, COLT 2015, Paris, France, July 3-6,
2015, pages 1224–1243, 2015.
[LBH+ 12] F. Lam, S. D. Babacan, J. P. Haldar, N. Schuff, and Z.-P. Liang. Denoising diffusionweighted MR magnitude image sequences using low rank and edge constraints. In
ISBI, pages 1401–1404. IEEE, 2012.
[LS01]
A. Lewis and H. Sendov. Twice differentiable spectral functions. SIAM Journal on
Matrix Analysis on Matrix Analysis and Applications, 23:368–386, 2001.
[LW12]
O. Ledoit and M. Wolf. Nonlinear shrinkage estimation of large-dimensional covariance matrices. Ann. Statist., 40(2):1024–1060, 04 2012.
[Nad14]
R. R. Nadakuditi. OptShrink: an algorithm for improved low-rank signal matrix
denoising by optimal, data-driven singular value shrinkage. IEEE Trans. Inform.
Theory, 60(5):3002–3018, 2014.
[NPDL11] H. M. Nguyen, X. Peng, M. N. Do, and Z.-P. Liang. Spatiotemporal denoising of
mr spectroscopic imaging data by low-rank approximations. In ISBI, pages 857–860.
IEEE, 2011.
[PL03]
L. Pastur and A. Lejay. Matrices aléatoires: statistique asymptotique des valeurs
propres. In Séminaire de Probabilités, XXXVI, volume 1801 of Lecture Notes in
Math., pages 135–164. Springer, Berlin, 2003.
[RBU08]
S. Ramani, T. Blu, and M. Unser. Monte-Carlo SURE: a black-box optimization of
regularization parameters for general denoising algorithms. IEEE Trans. on Image
Processing, 17(9):1540–1554, 2008.
[RS07]
M. Raphan and E. P. Simoncelli. Learning to be Bayesian without supervision. In
Advances in Neural Inf. Process. Syst. (NIPS), volume 19, pages 1145–1152. MIT
Press, 2007.
[SH05]
H. Shen and J. Z. Huang. Analysis of call centre arrival data using singular value
decomposition: Research articles. Appl. Stoch. Model. Bus. Ind., 21(3):251–263, May
2005.
[SN13]
A. A. Shabalin and A. B. Nobel. Reconstruction of a low-rank matrix in the presence
of Gaussian noise. J. Multivariate Anal., 118:67–76, 2013.
49
[SS03]
D. Sun and J. Sun. Nonsmooth matrix valued functions defined by singular values.
Technical report, Department of Decision Sciences, National University of Singapore,
2003.
[Ste81]
C. M. Stein. Estimation of the mean of a multivariate normal distribution. Ann.
Statist., 9(6):1135–1151, 1981.
[UD89]
F. T. Ulaby and M. C. Dobson. Handbook of Radar Scattering Statistics for Terrain.
Norwood, MA: Artech House, 1989.
[UHZB16] M. Udell, C. Horn, R. Zadeh, and S. Boyd. Generalized low rank models. Foundations
and Trends in Machine Learning, 9(1):1–118, 2016.
[WDB01] M. Wall, P. Dyck, and T. Brettin. Svdman-singular value decomposition analysis of
microarray data. Bioinformatics, 17(6):566–568, 2001.
[Yan94]
T. Yanagimoto. The Kullback-Leibler risk of the Stein estimator and the conditional
MLE. Ann. Inst. Statist. Math., 46(1):29–41, 1994.
50
| 10math.ST
|
On the complexity of computing the
k-restricted edge-connectivity of a graph?
Luis Pedro Montejano1 and Ignasi Sau2
arXiv:1502.07659v2 [cs.DS] 17 Sep 2016
1
Département de Mathématiques, Université de Montpellier, Montpellier, France.
[email protected]
2
AlGCo project team, CNRS, LIRMM, Montpellier, France.
[email protected]
Abstract. The k-restricted edge-connectivity of a graph G, denoted by
λk (G), is defined as the minimum size of an edge set whose removal leaves
exactly two connected components each containing at least k vertices.
This graph invariant, which can be seen as a generalization of a minimum edge-cut, has been extensively studied from a combinatorial point
of view. However, very little is known about the complexity of computing λk (G). Very recently, in the parameterized complexity community
the notion of good edge separation of a graph has been defined, which
happens to be essentially the same as the k-restricted edge-connectivity.
Motivated by the relevance of this invariant from both combinatorial and
algorithmic points of view, in this article we initiate a systematic study of
its computational complexity, with special emphasis on its parameterized
complexity for several choices of the parameters. We provide a number
of NP-hardness and W[1]-hardness results, as well as FPT-algorithms.
Keywords: Graph cut; k-restricted edge-connectivity; Good edge separation; Parameterized complexity; FPT-algorithm; Polynomial kernel.
1
Introduction
Motivation. The k-restricted edge-connectivity is a graph invariant that has
been widely studied in the literature from a combinatorial point of view [1, 4,
17, 22, 32, 33]. Since the classical edge-connectivity may not suffice to measure
accurately how connected a graph is after deleting some edges, Esfahanian and
Hakimi [16] proposed in 1988 the notion of restricted edge-connectivity. Given
a graph G, a non-empty set S ⊆ E(G) is an edge-cut if G − S has at least
two connected components. An edge-cut S is called a restricted edge-cut if there
are no isolated vertices in G − S. The restricted edge-connectivity λ0 (G) is the
minimum cardinality over all restricted edge-cuts S.
Inspired by the above definition, Fàbrega and Fiol [17] proposed in 1994 the
notion of k-restricted edge-connectivity, where k is a positive integer, generalizing
this notion. An edge-cut S is called a k-restricted edge-cut if every component
?
An extended abstract of this article appeared in the Proceedings of the 41st International Workshop on Graph-Theoretic Concepts in Computer Science (WG), pages
219-233, volume 9224 of LNCS, Garching, Germany, June 2015.
2
L. P. Montejano and I. Sau
of G − S has at least k vertices. Assuming that G has k-restricted edge-cuts, the
k-restricted edge-connectivity of G, denoted by λk (G), is defined as the minimum
cardinality over all k-restricted edge-cuts of G, i.e.,
λk (G) = min{|S| : S ⊆ E(G) is a k-restricted edge-cut}.
Note that for any graph G, λ1 (G) is the size of a minimum edge-cut, and
λ2 (G) = λ0 (G). A connected graph G is called λk -connected if λk (G) exists. Let
[X, Y ] denote the set of edges between two disjoint vertex sets X, Y ⊆ V (G),
and let X denote the complement X = V (G) \ X of vertex set X. It is clear that
for any k-restricted cut [X, X] of size λk (G), the graph G − [X, X] has exactly
two connected components.
Very recently, Chitnis et al. [6] defined the notion of good edge separation for
algorithmic purposes. For two positive integers k and `, a partition (X, X) of
the vertex set of a connected graph G is called a (k, `)-good edge separation if
|X|, |X| > k, |[X, X]| ≤ `, and both G[X] and G[X] are connected. That is, it
holds that λk (G) ≤ ` if and only if G admits a (k − 1, `)-good edge separation.
Thus both notions, which have been defined independently and for which there
existed no connection so far, are essentially the same.
Good edge separations turned out to be very useful for designing parameterized algorithms for cut problems [6], by using a technique known as recursive understanding, which basically consists in breaking up the input graph into highly
connected pieces in which the considered problem can be efficiently solved. It
should be mentioned that Kawarabayashi and Thorup [23] had defined before a
very similar notion for vertex-cuts and introduced the idea of recursive understanding. This technique has also been subsequently used in [10, 24, 29].
Very little is known about the complexity of computing the k-restricted edgeconnectivity of a graph, in spite of its extensive study in combinatorics. In this
article we initiate a systematic analysis on this topic, with special emphasis on
the parameterized complexity of the problem. In a nutshell, the main idea is
to identify relevant parameters of the input of some problem, and study how
the running time of an algorithm solving the problem depends on the chosen
parameters. See [8, 13, 18, 28] for introductory textbooks to this area.
Our results. We consider the following two problems concerning the krestricted edge-connectivity of a graph.
Existential Restricted Edge-connectivity (EREC)
Instance: A graph G = (V, E) and a positive integer k.
Question: Is G λk -connected ?
Restricted Edge-connectivity (REC)
Instance: A connected graph G = (V, E) and a positive integer k.
Output: λk (G), or a correct report that G is not λk -connected.
Computing the k-restricted edge-connectivity of a graph
3
The latter problem can be seen as a generalization of computing a Minimum Cut in a graph, which is polynomial-time solvable [30]. In Section 2 we
prove that it is NP-hard, even restricted to λk -connected graphs. In Section 3
we study the parameterized complexity of the REC problem. More precisely,
given a connected graph G and two integers k and `, we consider the problem of
determining whether λk (G) ≤ `. Existing results concerning good edge separations imply that the problem is FPT when parameterized by k and `. We prove
that it is W[1]-hard when parameterized by k, and that it is FPT when parameterized by ` but unlikely to admit polynomial kernels. Moreover, we prove that
the EREC problem is FPT when parameterized by k. Finally, in Section 4 we
also consider the maximum degree ∆ of the input graph as a parameter, and
we prove that the EREC problem remains NP-complete in graphs with ∆ ≤ 5,
and that the REC problem is FPT when parameterized by k and ∆. Note that
this implies, in particular, that the REC problem parameterized by k is FPT in
graphs of bounded degree. Table 1 below summarizes the results of this article.
Problem
Is G
λk -connected ?
λk (G) ≤ ` ?
Classical
complexity
Parameterized complexity with parameter
k+`
k
`
k+∆
NPc, even
FPT
FPT
if ∆ ≤ 5
?
(Thm 4)
?
(Thm 8)
(Thm 7)
NPh, even if G
FPT W[1]-hard FPT (Thm 5)
FPT
is λk -connected (Thm 2, (Thm 3) No poly kernels (Thm 8)
(Thm 1)
by [6])
(Thm 6)
Table 1. Summary of our results, where ∆ denotes the maximum degree of the
input graph G, and NPc (resp. NPh) stands for NP-complete (resp. NP-hard).
The symbol ‘?’ denotes that the problem is not defined for that parameter.
Further research. Some open questions are determining the existence of
polynomial kernels for the REC problem with parameters k + ` or k + ∆,
speeding-up the FPT algorithm of Theorem 5 (which is quite inefficient), improving the bound on the maximum degree in Theorem 7, and studying the
(parameterized) complexity of the REC problem in planar graphs and other
sparse graph classes.
Notation. We use standard graph-theoretic notation; see for instance [11].
For a graph G, let ∆(G) denote its maximum degree, and for a vertex v, its
degree in G is denoted by dG (v). If S ⊆ V (G), we define G − S = G[V (G) \ S],
and if S ⊆ E(G), we define G − S = (V (G), E(G) \ S). Unless stated otherwise,
throughout the article n denotes the number of vertices of the input graph of
the problem under consideration. We will always assume that the input graphs
are connected.
4
2
L. P. Montejano and I. Sau
Preliminary results
Clearly, any connected graph G is λ1 -connected, and λ1 (G) can be computed in
polynomial time by a Minimum Cut algorithm (cf. [30]). However, for k ≥ 2,
there exist infinitely many connected graphs which are not λk -connected, such
as the graphs containing a cut vertex u such that every component of G − u
has at most k − 1 vertices (these graphs are called flowers in the literature [4],
and correspond exactly to stars when k = 2). Moreover, the EREC problem is
hard. Indeed, given a graph G, if n is even and k = n/2, by [14, Theorem 2.2] it
is NP-complete to determine whether G contains two vertex-disjoint connected
subgraphs of order n/2 each. We can summarize this discussion as follows.
Remark 1. The EREC problem is NP-complete.
In Section 4 we will strengthen the above hardness result to the case where
the maximum degree of the input graph is at most 5.
Note that Remark 1 implies that the REC problem problem is NP-hard. Furthermore, even if the input graph G is guaranteed to be λk -connected, computing
λk (G) remains hard, as shown by the following theorem.
Theorem 1. The REC problem is NP-hard restricted to λk -connected graphs.
Proof: We prove it for n even and k = n/2. The reduction is from the Minimum
Bisection problem1 restricted to connected 3-regular graphs, which is known
to be NP-hard [2]. Given a 3-regular connected graph G with even number of
vertices as instance of Minimum Bisection, we construct from it an instance
G0 of REC by adding two non-adjacent universal vertices v1 and v2 . Note that
G0 is λn/2 -connected, since any bipartition of V (G0 ) containing v1 and v2 in
different parts induces two connected subgraphs.
We claim that v1 and v2 should necessarily belong to different connected
subgraphs in any optimal solution in G0 . Indeed, let (V1 , V2 ) be a bipartition of
V (G) such that |[V1 , V2 ]| = λn/2 (G0 ), and assume for contradiction that v1 , v2 ∈
V1 . Since G is connected, there is a vertex u ∈ V2 with at least one neighbor
in V1 \ {v1 , v2 }. Let V10 := V1 ∪ {u} \ {v2 } and V20 := V2 ∪ {v2 } \ {u}, and note
that both G[V10 ] and G[V20 ] are connected. Since u has at least one neighbor in
V1 \ {v1 , v2 }, G is 3-regular, and v1 and v2 are non-adjacent and adjacent to all
other vertices of G0 , it can be checked that |[V10 , V20 ]| ≤ |[V1 , V2 ]|−1 = λn/2 (G0 )−1,
contradicting the definition of λn/2 (G0 ).
Therefore, solving the REC problem in G0 corresponds exactly to solving the
Minimum Bisection problem in G, concluding the proof.
1
Given a graph G with even number of vertices, the Minimum Bisection problem
consists in partitioning V (G) into two equally-sized parts minimizing the number of
edges with one endpoint in each part.
Computing the k-restricted edge-connectivity of a graph
3
5
A parameterized analysis
The NP-hardness results of the previous section naturally lead to considering
parameterized versions of the problem. In this section we consider the following
three distinct parameterizations.
Parameterized Restricted Edge-connectivity (p-REC)
Instance: A connected graph G = (V, E) and two integers k and `.
Parameter 1: The integers k and `.
Parameter 2: The integer k.
Parameter 3: The integer `.
Question: λk (G) ≤ ` ?
As mentioned in the introduction, determining whether λk (G) ≤ ` corresponds exactly to determining whether G admits a (k − 1, `)-good edge separation. This latter problem has been recently shown to be solvable in time
2O(min{k,`} log(k+`)) · n3 log n by Chitnis et al. [6, Lemma II.2].
Theorem 2 (Chitnis et al. [6]). The p-REC problem is FPT when parameterized by both k and `.
We would like to note that any improvement on the running time of the
algorithm behind Theorem 2 would answer an open question raised in [7,9], and
would have direct consequences and improve the algorithms described in [6, 10,
24].
As pointed out in [16,21], the p-REC problem can be solved in time O∗ (n2k ).
Roughly, the idea is to guess two sets of k vertices inducing a connected subgraph, contract them into two vertices s and t, and then call a polynomial-time
Minimum Cut algorithm between s and t (cf. [30]). In other words, it is in XP
when parameterized by k. The following theorem shows that this is essentially
the best algorithm we can hope for when the parameter is only k. Indeed, since
the blow-up of the parameter in the reduction is linear, the fact that k-Clique
cannot be solved in time f (k) · no(k) unless an unlikely collapse occurs in parameterized complexity theory [5] implies that the p-REC problem cannot be
solved in time f (k) · no(k) either.
Theorem 3. The p-REC problem is W[1]-hard when parameterized by k.
Proof: We reduce from k-Clique, which is known to be W[1]-hard [13]. The
parameterized reduction is the same as the one given by Downey et al. in [12,
Theorem 2] to show the W[1]-hardness of the Cutting k Vertices from a
Graph problem, only the analysis changes.
Let G = (V, E) be an n-vertex graph for which we wish to determine whether
it has a k-clique. We construct a graph G0 as follows:
(1) We start with a clique C of size n3 and n representative vertices corresponding bijectively with the vertices of G.
6
L. P. Montejano and I. Sau
(2) Every representative vertex v is connected to n2 − dG (v) arbitrary vertices
of C.
(3) If uv ∈ E(G) then uv ∈ E(G0 ).
C = Kn3
n2 − dG(v)
v
G
n representative vertices
Fig. 1. Illustration of the graph G0 in the proof of Theorem 3.
See Fig. 1 for an illustration of G0 . Consider ` = kn2 −2 k2 and take k ≤ n/2.
We claim that G has a k-clique if and only if G0 is a Yes-instance of p-REC.
Suppose first that K ⊆ V (G) is a k-clique in G. Obviously, K is connected in
G0 and has k vertices. On the other hand, G0 − K is also connected with at least
n3 −|K| >k vertices. Finally, it is straightforward to check that |[K, V (G0 )\K]| =
kn2 − 2 k2 = `.
In the other direction, suppose G0 has a k-restricted edge-cut with at most
` edges, i.e., there exists K ⊆ V (G0 ) such that G[K] and G0 − K are connected,
|K| ≥ k, |V (G0 ) \ K| ≥ k, and |[K, V (G0 ) \ K]| ≤ `. Two cases need to be
distinguished.
Case 1. C ∩ K = ∅. Then every vertex of K must be a representative vertex.
Hence |[K, V (G0 ) \ K]| = |K|n2 − 2|E(G0 [K])| since every representative
vertex
has degree n2 . As by hypothesis |[K, V (G0 ) \ K]| ≤ ` = kn2 − 2 k2 , it follows
that |E(G0 [K])| = k2 , hence K must be a k-clique.
Case 2. C ∩ K 6= ∅. Note that for every bipartition (C1 , C2 ) of C we have
that |[C1 , C2 ]| ≥ n3 − 1 > `. Now suppose C ∩ (V (G0 ) \ K) 6= ∅ and consider the
bipartition C1 = C ∩ K and C2 = C ∩ (V (G0 ) \ K) of C. Then |[K, V (G0 ) \ K]| ≥
|[C1 , C2 ]| ≥ n3 −1 > `, a contradiction. Therefore, we have that C ∩(V (G0 )\K) =
∅. The proof concludes by applying Case 1 to V (G0 ) \ K instead of K.
In contrast to Theorem 3 above, we now prove that the EREC problem
(which is NP-complete by Remark 1) is FPT when parameterized by k. The
proof uses the technique of splitters introduced by Naor et al. [27], which has
also been recently used for designing parameterized algorithms in [6,10,24]. Our
main tool is the following lemma.
Lemma 1 (Chitnis et al. [6]). There exists an algorithm that given a set U of
size n and two integers a, b ∈ [0, n], outputs in time 2O(min{a,b}·log(a+b)) · n log n
a set F ⊆ 2U with |F| = 2O(min{a,b}·log(a+b)) · log n such that for every two sets
A, B ⊆ U , where A ∩ B = ∅, |A| ≤ a, and |B| ≤ b, there exists a set S ∈ F with
A ⊆ S and B ∩ S = ∅.
Computing the k-restricted edge-connectivity of a graph
7
Theorem 4. The EREC problem is FPT when parameterized by k. More precisely, it can be solved by an algorithm running in time 2O(k log k) · n2 log n.
Proof: We use the easy property that G is λk -connected if and only if G contains
two vertex-disjoint trees T1 and T2 such that |V (T1 )| ≥ k and |V (T2 )| ≥ k. In
order to apply Lemma 1, we take U = V (G) and a = b = k, obtaining in time
k O(k) · n log n the desired family F of subsets of vertices of G. Now, if such trees
T1 and T2 exist, then necessarily there exists a set S ∈ F such that V (T1 ) ⊆ S
and V (T2 ) ∩ S = ∅. Therefore, in order to determine whether G is λk -connected
or not, it suffices to check, for each set S ∈ F, whether both G[S] and G − S
contain a connected component with at least k vertices. (Note that for each such
set S ∈ F, this can be done in linear time.) Indeed, if such a set S exists, then
clearly G is λk -connected. Otherwise, by the property of the family F, G does
not contain two disjoint trees T1 and T2 of size k each, and therefore G is not
λk -connected.
Concerning the parameterized complexity of the p-REC problem, in view of
Theorems 2 and 3, it just remains to settle the case when the parameter is `
only. The following theorem provides an answer to this question. We will need
the following result, which is a reformulation of [31, Corollary 1].
Lemma 2 (van Bevern et al. [31]). Given a graph G on n vertices and an
integer `, determining whether λbn/2c (G) ≤ ` can be solved in time f (`) · n11 for
some explicit function f depending only on `.
Theorem 5. The p-REC problem is FPT when parameterized by `.
Proof: If k ≤ `, we solve the problem using the FPT algorithm given by Theorem 2 with parameter k + ` ≤ 2`. Otherwise, in the case where k > `, we proceed
to Turing-reduce the problem to the particular case where k = bn/2c, which is
FPTwith parameter ` by Lemma 2 above, as follows. For each vertex v of the
n-vertex input graph G, and for each integer p with 0 ≤ p ≤ n − 2k, let Gpv be
the graph obtained from G by adding a clique Kp on p vertices and all the edges
between vertex v and the vertices in Kp .
Claim. It holds that λk (G) ≤ ` if and only if there exist a vertex v ∈ V (G) and
an integer p with 0 ≤ p ≤ n − 2k such that λb n+p c (Gpv ) ≤ `.
2
Proof: Assume first that λk (G) ≤ `. Let (X, X) be a partition of V (G)
achieving λk (G), where we assume without loss of generality that X ≥ X, let
p = |X| − |X|, and let v be any vertex in X. Then p ≤ (n − k) − k = n − 2k and
by construction it holds that λb n+p c (Gpv ) ≤ λk (G) ≤ `.
2
Conversely, suppose that there exist a vertex v ∈ V (G) and an integer p
with 0 ≤ p ≤ n − 2k such that λb n+p c (Gpv ) ≤ `. Let (X, X) be a partition of
2
V (Gpv ) achieving λb n+p c (Gpv ), and assume without loss of generality that v ∈ X.
2
We claim that the clique Kp is entirely contained in X. Indeed, suppose for
contradiction that Kp ∩ X 6= ∅, and let K = Kp ∩ X. Since Gpv [X] is connected
8
L. P. Montejano and I. Sau
and v ∈ X, necessarily X = K. We distinguish
two cases. If p < k, then
|X| = |K| ≤ p − 1 ≤ k − 2 ≤ n/2 − 2 < n+p
, contradicting the definition
2
of λb n+p c (Gpv ). Otherwise, if p ≥ k, then we use that the number of edges in
2
[X, X] is at least the minimum cut of the clique of size p+1 induced by Kp ∪{v},
which is equal to p. That is, |[X, X]| ≥ p ≥ k > `, contradicting the hypothesis
that (X, X) is a partition of V (Gpv ) achieving λb n+p c (Gpv ) ≤ `.
2
We now claim that the partition of V (G) given by (X, X \ Kp ) defines a
k-restricted edge-cut of G with at most ` edges, concluding the proof. First note
that both G[X] and G[X \ Kp ] are connected, since both Gpv [X] and Gpv [X] are
p
connected by hypothesis, and the removal of Kp from G
v [X]
n+p
clearly
n preserves
connectivity. On the other hand, we have that |X| ≥
≥
≥ k and
2
2
n+p
n−(n−2k)−1
n−p−1
1
≥
= k − 2 , and since
|X \ Kp | = |X| − p ≥
−p ≥
2
2
2
both |X \ Kp | and k are integers, the latter inequality implies that |X \ Kp | ≥ k.
Finally, since Kp ⊆ X, it holds that |[X, X \ Kp ]| = |[X, X]| ≤ `.
3
Note that the above claim yields the theorem, as it implies that the problem
of deciding whether λk (G) ≤ ` can be solved by invoking O(n2 ) times the FPT
algorithm given by Lemma 2.
To complement Theorem 5, in the next theorem we prove that the p-REC
problem does not admit polynomial kernels when parameterized by `, unless
coNP ⊆ NP/poly.
Theorem 6. Unless coNP ⊆ NP/poly, the p-REC problem does not admit
polynomial kernels when parameterized by `.
Proof: The proof is strongly inspired by the one given by van Bevern et al. [31,
Theorem 3] to prove that the Minimum Bisection problem does not admit
polynomial kernels, which in turn resembles the proof given by Garey et al. [20]
to prove the NP-hardness of Minimum Bisection. The main difference with
respect to the proof given in [31] is that we need to make the appropriate modifications to guarantee that both parts left out by the edge-cut are connected,
which is not an issue in the Minimum Bisection problem.
We will first rule out the existence of polynomial kernels for the generalization
of p-REC where the edges have non-negative integer weights, and the objective
is to decide whether the input graph can be partitioned into two connected
subgraphs with at least k vertices each by removing a set of edges whose total
weight does not exceed `. We call this problem Edge-Weighted p-REC. Then
it will just remain to get rid of the edge weights. This is done at the end of the
proof of the theorem.
As shown by Bodlaender et al. [3], in order to prove that Edge-Weighted
p-REC does not admit polynomial kernels when parameterized by ` (assuming
that coNP ⊆ NP/poly), it is sufficient to define a cross composition from an NPhard problem to Edge-Weighted p-REC. In our case, the NP-hard problem is
Maximum Cut (see [19]), which is defined as follows. Given a graph G = (V, E)
and an integer p, one has to decide whether V can be partitioned into two sets
Computing the k-restricted edge-connectivity of a graph
9
A and B such that there are at least p edges with an endpoint in A and an
endpoint in B.
A cross composition from Maximum Cut to Edge-Weighted p-REC parameterized by ` consists of a polynomial-time algorithm that, given t instances
(G1 , p1 ), . . . , (Gt , pt ) of Maximum Cut, constructs an instance (G∗ , k, `) of
Edge-Weighted p-REC such that (G∗ , k, `) is a Yes-instance if and only
if one of the t instances of Maximum Cut is a Yes-instance, and such that ` is
polynomially bounded as a function of max1≤i≤t |V (Gi )|. Similarly to [31], we
may safely assume that for each 1 ≤ i ≤ t we have |V (Gi )| =: n and pi =: p
(by the arguments given in [3]), that 1 ≤ p ≤ n2 (as if p = 0 all instances
are Yes-instances, and if p > n2 all instances are No-instances), and that t is
odd (otherwise, we can add a No-instance consisting of an edgeless graph on n
vertices).
Given (G1 , p), . . . , (Gt , p), we create G∗ as follows; see Fig. 2 for an illustration. Let w1 := 5n2 and w2 := 5. For each graph Gi = (Vi , Ei ) add to G∗ the
vertices in Vi and a clique Vi0 with |Vi | = n vertices whose edges have weight
w1 . Add an edge of weight w1 between each vertex in Vi and each vertex in
Vi0 . For each pair of vertices u, v ∈ Vi , add the edge {u, v} to G∗ with weight
w1 − w2 if {u, v} ∈ Ei , and with weight w1 otherwise. Let s1i , s2i be two arbitrary distinct vertices in Vi0 , which we call link vertices. For 1 ≤ i ≤ t − 1,
add two edges with weight 1 between s1i and s1i+1 and between s2i and s2i+1 ,
and two edges with weight 1 between s1t and s11 and between s2t and s21 . This
completes the construction of G∗ . These 2t edges among distinct Vi0 ’s are called
chain edges (cf. the thicker edges in Fig. 2). Finally, we set k := |V (G∗ )|/2 and
` := w1 n2 − w2 p + 4. Note that k is not polynomially bounded in terms of n, but
this is not a problem since the parameter we consider is `, which is bounded by
5n4 . This construction can be clearly performed in polynomial time in t · n. We
claim that (G∗ , k, `) is a Yes-instance of Edge-Weighted p-REC if and only
if there exists i ∈ {1, . . . , t} such that (Gi , p) is a Yes-instance of Maximum
Cut.
V10
V1
V20
V2
1
Vi0
Vi
1
s11
s12
w1
w1−w2
s22
w1
1
s1t
w1
w1
w1
w1
s21
Vt0
Vt
s1i
s2i
1
Fig. 2. Illustration of the graph G∗ in the proof of Theorem 6.
s2t
10
L. P. Montejano and I. Sau
Assume first that there exists i ∈ {1, . . . , t} such that (Gi , p) is a Yesinstance of Maximum Cut. Assume without loss of generality that i = 1, and
let V1 = A ] B such that there are at least p edges in E1 between A and B.
We proceed to partition V (G∗ ) into two equally-sized sets A0 and B 0 such that
both G∗ [A0 ] and G∗ [B 0 ] are connected, and such that the total weight of the
edges in G∗ with one endpoint in A0 and one endpoint in B 0 is at most `. The
set A0 contains V1 ∩ A, any set of |B| vertices in V10 containing exactly one of
Sdt/2e
s11 and s21 (this is possible since 1 ≤ |B| ≤ n − 1), and i=2 Vi ∪ Vi0 . Then
B 0 = V (G∗ ) \ A0 . Since t is odd, |A0 | = |B 0 |. Let us now see that G∗ [A0 ] is
connected. As 1 ≤ |A| ≤ n − 1, the set V1 ∩ A0 is connected to V10 ∩ A0 , which is
connected to V20 since A0 contains exactly one of the link vertices s11 and s21 . The
Sdt/2e
graph G∗ [ i=2 Vi ∪ Vi0 ] is clearly connected because of the chain edges, which
implies that G∗ [A0 ] is indeed connected. The proof for the connectivity of G∗ [B 0 ]
is similar, using that V1 ∩ B 0 is connected to V10 ∩ B 0 since 1 ≤ |B| ≤ n − 1, which
is in turn connected to Vt0 since B 0 contains exactly one of the link vertices s11
and s21 . Finally, let us show that the total weight of the edges between A0 and
B 0 is at most `. Note first that two chain edges incident to V10 and two chain
0
edges incident to Vdt/2e
belong to the cut defined by A0 and B 0 , and no other
chain edge belongs to the cut. Beside the chain edges, only edges in the graph
G∗ [V1 ∪ V10 ] are cut. Note that G∗ [V1 ∪ V10 ] is a clique on 2n vertices and each of
(V1 ∪ V10 ) ∩ A0 and (V1 ∪ V10 ) ∩ B 0 contains n vertices. Since |[A, B]| ≥ p, at least
p of the edges of weight w1 − w2 belong to the cut. Therefore, the total weight
of the cut is at most w1 n2 − w2 p + 4 = `.
Conversely, assume that for all i ∈ {1, . . . , t}, (Gi , p) is a No-instance of
Maximum Cut, and we want to prove that (G∗ , k, `) is a No-instance of EdgeWeighted p-REC. Let A ] B be a partition of V (G∗ ) such that |A| = |B| and
both G∗ [A] and G∗ [B] are connected, and such that the weight of the edges
between A and B is minimized among all such partitions. For 1 ≤ i ≤ t, we let
ai := |(Vi ∪ Vi0 ) ∩ A|. Since for 1 ≤ i ≤ t, (Gi , p) is a No-instance of Maximum
Cut, any bipartition of Vi cuts at most p−1 edges. Therefore, the total weight of
the edges between (Vi ∪Vi0 )∩A and (Vi ∪Vi0 )∩B is at least w1 ai (2n−ai )−(p−1)w2 .
Since t is odd, necessarily at least one of the graphs Gi is cut by A]B. Assume
first that exactly one graph Gi is cut by A ] B. Since |A| = |B|, we have that
ai = n, so the value of the cut is at least w1 n2 − (p − 1)w2 = w1 n2 − pw2 + w2 >
w1 n2 − pw2 + 4 = `, and thus (G∗ , k, `) is a No-instance of Edge-Weighted
p-REC.
We claim that there is always exactly one graph Gi cut by A ] B. Assume for
contradiction that it is not the case, that is, that there are two strictly positive
values ai , aj for some i 6= j. By symmetry between A and B, we may assume
that ai +aj ≤ 2n. The total weight of the edges cut in G∗ [Vi ∪Vi0 ] and G∗ [Vj ∪Vj0 ]
is at least
w1 ai (2n − ai ) − (p − 1)w2 + w1 aj (2n − aj ) − (p − 1)w2 =
2nw1 (ai + aj ) − w1 (a2i + a2j ) − 2w2 (p − 1).
Computing the k-restricted edge-connectivity of a graph
11
Now we construct another solution A0 ] B 0 of Edge-Weighted p-REC in
G where the ai + aj vertices are cut in only one of Vi ∪ Vi0 and Vj ∪ Vj0 , say
Vi ∪ Vi0 (note that this is possible since ai + aj ≤ 2n). In order to do so, as far
as there exists such a pair ai , aj , we proceed as follows. If ai + aj = 2n, then
Vi ∪ Vi0 is entirely contained in A0 or B 0 . Otherwise, if ai + aj < 2n, then we
choose (Vi ∪ Vi0 ) ∩ A0 such that it contains exactly one of s1i and s2i . At the end
of this procedure, exactly one graph Gi is cut. Finally, we arrange the other
G` ’s, with ` 6= i, consecutively into A0 and B 0 . That is, we put the vertices of
Si+bt/2c
Si−1
0
0
0
0
`=i+dt/2e V` ∪V` into B , where the
`=i+1 V` ∪V` into A , and the vertices of
indices are counted cyclically from 1 to t. The connectivity of both G∗ [A0 ] and
G∗ [B 0 ] is guaranteed by the chain edges and the choice of the selector vertices
s1i and s2i .
Let i, j be two indices for which the above procedure has been applied. Taking
into account that each Vi0 has four incident chain edges, the total weight of the
edges cut in G∗ [Vi ∪ Vi0 ] and G∗ [Vj ∪ Vj0 ] by the new solution is at most
∗
w1 (ai + aj )(2n − ai − aj ) + 8 =
2nw1 (ai + aj ) − w1 (a2i + a2j ) − 2w1 ai aj + 8.
That is, the weight of the cut defined by A ] B minus the weight of the cut
defined by A0 ] B 0 is at least
−2w2 (p − 1) + 2w1 ai aj − 8 =
2(w1 ai aj − w2 (p − 1) − 4) ≥
2(w1 − w2 (n2 − 1) − 4) > 0,
where we have used that ai , aj ≥ 1, p ≤ n2 , w1 = 5n2 , and w2 = 5. In
other words, A0 ] B 0 defines a cut of strictly smaller weight, contradicting the
definition of A ] B.
To conclude the proof of the theorem, it just remains to deal with the
edge weights. As in [31], we show how to convert the instance (G∗ , k, `) of
Edge-Weighted p-REC that we just constructed into an equivalent instance
of p-REC such that the resulting parameter remains polynomial in n. Given
(G∗ , k, `), we define (Ĝ, k, `) as the instance of p-REC, where Ĝ is an unweighted
graph obtained from G∗ as follows. We replace each vertex v of G∗ with a clique
Cv of size w1 + ` + 1, and for each edge {u, v} of G∗ with weight w, we add w
pairwise disjoint edges between the cliques Cu and Cv . Since no cut of size at
most ` in Ĝ can separate a clique Cv introduced for a vertex v, it follows that
(G∗ , k, `) is a Yes-instance of Edge-Weighted p-REC if and only if (Ĝ, k, `)
is a Yes-instance of p-REC. Finally, it is clear that the desired cut size ` is still
polynomial in n.
4
Considering the maximum degree as a parameter
Towards understanding the parameterized complexity of the REC problem, one
may wonder whether considering the maximum degree of the input graph as
12
L. P. Montejano and I. Sau
an extra parameter turns the problem easier (this is a classical approach in
parameterized complexity, see for instance [25, 26]). We first prove that, from a
classical complexity point of view, bounding the degree of the input graph does
not turn the problem easier. Before stating the hardness result, we need the
define the 3-Dimensional Matching problem, 3DM for short.
An instance of 3DM consists of a set W = R ∪ B ∪ Y , where R, B, Y are
disjoint sets with |R| = |B| = |Y | = m, and a set of triples T ⊆ R × B × Y . The
question is whether there exists a matching M ⊆ T covering W , i.e., |M | = m
and each element of W = R ∪ B ∪ Y occurs in exactly one triple of M .
An instance of 3DMScan be represented by a bipartite graph GI = (W ∪
T, EI ), where EI =
{{r, t}, {b, t}, {y, t}}; see Fig. 3.
t=(r,b,y)∈T
r
b
y
Elements W = R ∪ B ∪ Y
Triples T
(r, b, y)
Fig. 3. Representation of an instance of 3DM.
It is known that 3DM is NP-complete even if each element of W appears in
2 or 3 triples only [14, 15]. In [14, Theorem 2.2] it is proved that partitioning a
graph G into two connected subgraphs of equal size is NP-hard, using a reduction
from 3DM. It is worth noting that the graph constructed in the NP-hardness
reduction contains only two vertices of degree greater than five. In Theorem 7 we
appropriately modify the reduction of [14, Theorem 2.2] so that the constructed
graph has maximum degree at most 5.
Theorem 7. The EREC problem is NP-complete even if the maximum degree
of the input graph is 5.
Proof: Given an instance (W, T ) of 3DM with W = R ∪ B ∪ Y , |R| = |B| =
|Y | = m, and T ⊆ R × B × Y such that each element of W appears in 2 or 3
triples only, we define an n-vertex graph G = (V, E) with maximum degree 5 as
follows (see Fig. 4 for an illustration).
The set of vertices of G is
V = W ∪ T ∪ Ta ∪ Tb ∪ P ∪ {a},
Computing the k-restricted edge-connectivity of a graph
13
nb
Elements
W
Triples
T
Pa
a
Ta
na
Tb
b
nb
Fig. 4. Construction of the graph G in the proof of Theorem 7, with ∆(G) = 5.
where Ta = {ta1 , . . . , ta|T | }, Tb = {b = tb1 , tb2 , . . . , tb|T | }, T = {t1 , . . . , t|T | } is the
S
set of triples, and P =
Pσ , where Pσ = {(σ, t) : t = 1, . . . , nσ } with
σ∈W ∪Tb ∪{a}
na = (3m + |T |)nb + 5m − |T | − 1, nb = 2m3 , and nσ = nb for every σ ∈ W ∪ Tb .
The set of edges of G is
[
E = EI ∪ ETa ∪ ETb ∪ ET +
Eσ ,
σ∈W ∪Tb ∪{a}
where ETa = {{tai , tai+1 } : 1 ≤ i ≤ |T | − 1}, ETb = {{tbi , tbi+1 } : 1 ≤ i ≤ |T | − 1},
ET + = {{ti , tai }, {ti , tbi } : 1 ≤ i ≤ |T |}, and Eσ = {{σ, (σ, 1)}} ∪ {{(σ, t), (σ, t +
1)} : 1 ≤ t ≤ nσ − 1} ∪ {a, ta1 } for every σ ∈ W ∪ Tb ∪ {a}.
Note that the maximum degree of G is indeed 5 (only vertices of T could get
degree 5, all other vertices have degree at most 4). Since n = 1 + 3m + 3|T | +
na + (3m + |T |)nb , we can observe that
n = 2(na + 1 + 2|T | − m).
Next, we show that for k = n/2, G is Yes-instance of the REC problem if
and only if T contains a matching covering W .
One direction is easy. Suppose first that T contains a matching M covering
W . Let S = {a} ∪ Pa ∪ Ta ∪ (T \ M ). It is straightforward to check that |S| = n/2
and that G[S], G[V \ S] are both connected.
Conversely, suppose that G can be partitioned into 2 connected subgraphs
G[S], G[V \S] with |S| = n/2. We can assume that a ∈ S, and then it follows that
14
L. P. Montejano and I. Sau
Pa ⊆ S. Now |S \ (Pa ∪ {a})| = 2|T | − m < 2m3 = nb since |T | ≤ m3 . As Pσ ⊆ S
if and only if σ ∈ S ∩ (W ∪ Tb ), then S ∩ (W ∪ Tb ) = ∅ since |S \ (Pa ∪ {a})| < nb
and |Pσ | = nb for every σ ∈ W ∪ Tb . Hence S \ (Pa ∪ {a}) ⊆ T ∪ Ta . Let
M = (V \ S) ∩ T . Then |M | ≤ m since |S \ (Pa ∪ {a})| = 2|T | − m. Finally,
as G[V \ S] is connected and W ∪ Tb ⊆ V \ S, it follows that |M | ≥ m. Hence
|M | = m and M must be a matching covering W .
In order to understand to which extent the vertices of high degree make the
complexity of computing the restricted edge-connectivity of a graph hard, we
also consider the maximum degree of the input graph as a parameter for the
p-REC problem.
Theorem 8. The p-REC problem is FPT when parameterized by k and the
maximum degree ∆ of the input graph.
Proof: The algorithm is based on a simple exhaustive search. We use the property that, for any graph G and any two integers k, `, λk (G) ≤ ` if and only if G
contains two vertex-disjoint trees T1 and T2 with |V (T1 )| ≥ k and |V (T2 )| ≥ k,
such that there exists an edge set S in G with |S| ≤ ` such that in G − S the
trees T1 and T2 belong to different connected components. Hence, we just have
to determine whether these trees exist in G or not. For doing so, for every pair
of distinct vertices v1 and v2 of G, we exhaustively consider all trees T1 and T2
with k vertices containing v1 and v2 , respectively. Note that the number of such
trees is at most ∆2k . For every pair of vertex-disjoint trees T1 and T2 , we proceed
as follows. We contract tree T1 (resp. T2 ) to a single vertex t1 (resp. t2 ), keeping
edge multiplicities, and then we run in the resulting graph a polynomial-time
Minimum Cut algorithm between t1 and t2 (cf. [30]). If the size of the returned
edge-cut is at most `, then T1 and T2 are the desired trees. Otherwise, we continue searching. It is clear that the overall running time of this algorithm is
O(∆2k · nO(1) ).
Acknowledgement. We would like to thank the anonymous referees for helpful
remarks that improved the presentation of the manuscript. We are particularly
grateful for the ideas to prove Theorem 5, a result that we had left as an open
question in the conference version of this article.
References
1. C. Balbuena, A. Carmona, J. Fàbrega, and M. A. Fiol. Extraconnectivity of graphs
with large minimum degree and girth. Discrete Mathematics, 167:85–100, 1997.
2. P. Berman and M. Karpinski. Approximation hardness of bounded degree MINCSP and MIN-BISECTION. Electronic Colloquium on Computational Complexity,
8(26), 2001.
3. H. L. Bodlaender, B. M. P. Jansen, and S. Kratsch. Kernelization lower bounds by
cross-composition. SIAM Journal on Discrete Mathematics, 28(1):277–305, 2014.
4. P. Bonsma, N. Ueffing, and L. Volkmann. Edge-cuts leaving components of order
at least three. Discrete Mathematics, 256(1):431–439, 2002.
Computing the k-restricted edge-connectivity of a graph
15
5. J. Chen, X. Huang, I. A. Kanj, and G. Xia. Strong computational lower bounds via
parameterized complexity. Journal of Computer and System Sciences, 72(8):1346–
1367, 2006.
6. R. Chitnis, M. Cygan, M. Hajiaghayi, M. Pilipczuk, and M. Pilipczuk. Designing
FPT algorithms for cut problems using randomized contractions. SIAM Journal
on Computing, 45(4):1171–1229, 2016.
7. M. Cygan, F. Fomin, B. M. Jansen, L. Kowalik, D. Lokshtanov, D. Marx,
M. Pilipczuk, and M. Pilipczuk. Open problems from School on Parameterized
Algorithms and Complexity, http://fptschool.mimuw.edu.pl/opl.pdf, 2014.
8. M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk,
M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer, 2015.
9. M.
Cygan,
L.
Kowalik,
and
M.
Pilipczuk.
Open
problems
from
Update
Meeting
on
Graph
Separation
Problems,
http://worker2013.mimuw.edu.pl/slides/update-opl.pdf, 2013.
10. M. Cygan, D. Lokshtanov, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Minimum
bisection is fixed parameter tractable. In Proc. of the 46th ACM Symposium on
Theory of Computing (STOC), pages 323–332, 2014.
11. R. Diestel. Graph Theory. Springer-Verlag, Berlin, 3rd edition, 2005.
12. R. G. Downey, V. Estivill-Castro, M. R. Fellows, E. Prieto, and F. A. Rosamond.
Cutting up is hard to do: the parameterized complexity of k-cut and related problems. Electronic Notes in Theoretical Computer Science, 78:209–222, 2003.
13. R. G. Downey and M. R. Fellows. Parameterized Complexity. Springer-Verlag,
1999.
14. M. E. Dyer and A. M. Frieze. On the complexity of partitioning graphs into
connected subgraphs. Discrete Aplied Mathematics, 10:139–153, 1985.
15. M. E. Dyer and A. M. Frieze. Planar 3DM is NP-complete. Journal of Algorithms,
7(2):174–184, 1986.
16. A.-H. Esfahanian and S. L. Hakimi. On computing a conditional edge-connectivity
of a graph. Information Processing Letters, 27(4):195–199, 1988.
17. J. Fàbrega and M. A. Fiol. Extraconnectivity of graphs with large girth. Discrete
Mathematics, 127:163–170, 1994.
18. J. Flum and M. Grohe. Parameterized Complexity Theory. Springer-Verlag, 2006.
19. M. R. Garey and D. S. Johnson. Computers and intractability. A guide to the
theory of NP-completeness. W. H. Freeman and Co., 1979.
20. M. R. Garey, D. S. Johnson, and L. J. Stockmeyer. Some simplified NP-complete
graph problems. Theoretical Computer Science, 1(3):237–267, 1976.
21. A. Holtkamp. Connectivity in Graphs and Digraphs. Maximizing vertex-, edgeand arc-connectivity with an emphasis on local connectivity properties. PhD thesis,
RWTH Aachen University, 2013.
22. A. Holtkamp, D. Meierling, and L. P. Montejano. k-restricted edge-connectivity in
triangle-free graphs. Discrete Applied Mathematics, 160(9):1345–1355, 2012.
23. K. Kawarabayashi and M. Thorup. The Minimum k-way Cut of Bounded Size is
Fixed-Parameter Tractable. In Proc. of the 52nd Annual Symposium on Foundations of Computer Science (FOCS), pages 160–169, 2011.
24. E. J. Kim, C. Paul, I. Sau, and D. M. Thilikos. Parameterized algorithms for minmax multiway cut and list digraph homomorphism. In Proc. of the 10th International Symposium on Parameterized and Exact Computation (IPEC), volume 43
of LIPIcs, pages 78–89, 2015.
25. D. Marx. Parameterized graph separation problems. Theoretical Computer Science,
351(3):394–406, 2006.
16
L. P. Montejano and I. Sau
26. D. Marx and M. Pilipczuk. Everything you always wanted to know about the
parameterized complexity of subgraph isomorphism (but were afraid to ask). In
Proc. of the 31st International Symposium on Theoretical Aspects of Computer
Science (STACS), volume 25 of LIPIcs, pages 542–553, 2014.
27. M. Naor, L. J. Schulman, and A. Srinivasan. Splitters and near-optimal derandomization. In Proc. of the 36th Annual Symposium on Foundations of Computer
Science (FOCS), pages 182–191, 1995.
28. R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University
Press, 2006.
29. A. Rai, M. S. Ramanujan, and S. Saurabh. A parameterized algorithm for mixedcut. In Proc. of the 12th Latin American Symposium on Theoretical Informatics
(LATIN), volume 9644 of LNCS, pages 672–685, 2016.
30. M. Stoer and F. Wagner. A simple min-cut algorithm. Journal of the ACM,
44(4):585–591, 1997.
31. R. van Bevern, A. E. Feldmann, M. Sorge, and O. Suchý. On the parameterized complexity of computing graph bisections. In Proc. of the 39th International
Workshop on Graph-Theoretic Concepts in Computer Science (WG), volume 8165
of LNCS, pages 76–87, 2013.
32. J. Yuan and A. Liu. Sufficient conditions for λk -optimality in triangle-free graphs.
Discrete Mathematics, 310:981–987, 2010.
33. Z. Zhang and J. Yuan. A proof of an inequality concerning k-restricted edgeconnectivity. Discrete Mathematics, 304(1-3):128–134, 2005.
| 8cs.DS
|
AN EFFICIENT DEEP LEARNING HASHING NEURAL NETWORK FOR MOBILE VISUAL
SEARCH
Heng Qi, Wu Liu, Liang Liu
arXiv:1710.07750v1 [cs.CV] 21 Oct 2017
Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia,
Beijing University of Posts and Telecommunications, Beijing 100876, China
{qiheng, liuwu, liangliu}@bupt.edu.cn
ABSTRACT
Mobile visual search applications are emerging that enable
users to sense their surroundings with smart phones. However, because of the particular challenges of mobile visual
search, achieving a high recognition bitrate has becomes a
consistent target of previous related works. In this paper,
we propose a few-parameter, low-latency, and high-accuracy
deep hashing approach for constructing binary hash codes for
mobile visual search. First, we exploit the architecture of
the MobileNet model, which significantly decreases the latency of deep feature extraction by reducing the number of
model parameters while maintaining accuracy. Second, we
add a hash-like layer into MobileNet to train the model on labeled mobile visual data. Evaluations show that the proposed
system can exceed state-of-the-art accuracy performance in
terms of the MAP. More importantly, the memory consumption is much less than that of other deep learning models. The
proposed method requires only 13 MB of memory for the neural network and achieves a MAP of 97.80% on the mobile
location recognition dataset used for testing.
Index Terms— Mobile visual search, Supervised hashing, Binary code, Deep learning
1. INTRODUCTION
With the proliferation of mobile devices, it is becoming possible to use mobile perception functionalities (e.g., cameras,
GPS, and Wi-Fi) to perceive the surrounding environment [1].
Among such techniques, mobile visual search plays a key role
in mobile localization, mobile media search, and mobile social networking. However, rather than simply porting traditional visual search methods to mobile platforms, for mobile
visual search, one must face the challenges of a large auralvisual variance of queries, stringent memory and computation
constraints, network bandwidth limitations, and the desire for
an instantaneous search experience.
This work was partially supported by the CCF-Tencent Open Research
Fund (No. AGR20160113), the National Natural Science Foundation of
China (No. 61632008), and the Fundamental Research Funds for the Central
Universities (No. 2016RCGD32).
Input image
Convolutional layers
latent layer
loss
256
256
K
DK
DK
M kernel
Depthwise Convolutional Filters
1
1
N kernel
Pointwise Convolutional Filters
Fig. 1. The architecture of the proposed deep learning hashing
neural network for mobile visual search
Most research on mobile visual search has predominantly
focused on achieving high recognition bitrates [2, 3, 4]. Recently, an increasing number of researchers are attempting to
exploit feature signatures produced through hashing in mobile
visual search because of the good balance that can be achieved
among computation and memory requirements, training efficiency, quantization complexity, and search performance.
However, most of the existing hashing-based mobile visual
search methods attempt to compress existing classical handcrafted features into binary code. These methods all focus on
how to decrease the loss suffered during compression. Only
a few of them attempt to automatically learn effective binary
code features from a large-scale image dataset using a deep
neural network. There are two main reasons for this: 1) the
lack of effective deep learning hashing methods for mobile
visual search and 2) the high computational complexity of existing deep neural networks.
For traditional visual search, convolutional neural networks have become ubiquitous [5][6]. Studies have shown
that the deep features learned using such networks capture
rich image representations and enable better performance
than handcrafted features in visual classification [7][8][9]
[10], object detection [11][12], semantic segmentation [13],
and image retrieval [14][15]. The general trend in research on
deep learning methods is to construct deeper and more complicated networks to achieve higher accuracy [16][17][18].
In the field of mobile visual search, however, a deeper neural network model consumes more memory and time, which
cannot be easily supplied by mobile devices. To adapt deeper
neural networks for mobile devices, a new network architecture called MobileNet has recently been proposed by Google
[19]. In the MobileNet model, a standard convolutional layer
is decomposed into a depthwise convolutional layer and a
pointwise convolutional layer, thereby greatly reducing the
amount of calculation necessary and the model size. This
model works very well on image classification problems.
Inspired by the works presented in [1] and [19], to develop
a more effective and efficient mobile visual search system,
this paper proposes to combine a few-parameter, low-latency,
and high-accuracy network architecture with a hash function.
We incorporate the hash function as a latent layer between the
image representations and the classification outputs in MobileNet, which allows us not only to maintain the accuracy
of the visual search but also to adapt the model to the mobile environment. An overview of the system is illustrated in
Figure 1. The final binary hash codes can be learned by minimizing an objective function defined over the classification
error. Experimental results on a mobile location recognition
dataset show that our method achieves superior performance
compared with other hashing approaches.
2. ARCHITECTURE
In this section, we first describe the MobileNet network structure and the convolution layer structure, which is based on
depthwise separable filters and pointwise separable filters.
Then, we describe the hash layer in our convolutional neural
network and train a convolutional neural network model that
exploits semantic labels to automatically create binary codes.
2.1. MobileNet
The MobileNet model is built on depthwise separable convolutions. These convolutions factorize a standard convolution
into a depthwise convolution and a 1 × 1 convolution called
a pointwise convolution. The MobileNet architecture is defined in Table 1. In MobileNet, the depthwise convolution
involves the application of a single filter to each input channel. The pointwise convolution then involves the application
of a 1×1 convolution to combine the outputs of the depthwise
convolution. A standard convolutional layer takes as input a
DF × DF × M feature map F and produces a DF × DF × N
feature map G, where DF is the spatial width and height of
the square input feature map, M is the number of input chan-
Table 1. The MobileNet-based hashing network for mobile
visual search
Type / Stride
Conv / s2
Conv dw / s1
Conv / s1
Conv dw / s2
Conv / s1
Conv dw / s1
Conv / s1
Conv dw / s2
Conv / s1
Conv dw / s1
Conv / s1
Conv dw/ s2
Conv / s1
Conv dw / s1
Conv / s1
Conv dw / s2
Conv / s1
Conv dw/ s2
Conv / s1
Avg Pool / s1
FC / s1
Sigmoid
FC / s1
Softmax
Filter Shape
3 × 3 × 3 × 32
3 × 3 × 32 dw
1 × 1 × 32 × 64
3 × 3 × 64 dw
1 × 1 × 64 × 128
3 × 3 × 128 dw
1 × 1 × 128 × 128
3 × 3 × 128 dw
1 × 1 × 128 × 256
3 × 3 × 256 dw
1 × 1 × 256 × 256
3 × 3 × 256 dw
1 × 1 × 256 × 512
3 × 3 × 512 dw
1 × 1 × 512 × 512
3 × 3 × 512 dw
1 × 1 × 512 × 1024
3 × 3 × 1024 dw
1 × 1 × 1024 × 1024
Pool 7 × 7
1024 × 64
In place
1024 × 162
Classifier
Input Size
224 × 224 × 3
112 × 112 × 32
112 × 112 × 32
112 × 112 × 64
56 × 56 × 64
56 × 56 × 128
56 × 56 × 128
56 × 56 × 128
28 × 28 × 128
28 × 28 × 256
28 × 28 × 256
28 × 28 × 256
14 × 14 × 256
14 × 14 × 512
14 × 14 × 512
14 × 14 × 512
7 × 7 × 512
7 × 7 × 1024
7 × 7 × 1024
7 × 7 × 1024
1 × 1 × 64
1 × 1 × 64
1 × 1 × 162
1 × 1 × 162
nels (input depth), DG is the spatial width and height of the
square output feature map, and N is the number of output
channel.
A standard convolution has the following computational
cost:
DK · DK · M · N · DF · DF
(1)
The corresponding cost of depthwise separable convolutions
is as follows:
DK · DK · M · DF · DF + M · N · DF · DF
(2)
which is the sum of the costs of the depthwise and 1×1 pointwise convolutions. By expressing a standard convolution as
a two-step process of filtering and combining, we achieve the
following reduction in computational cost:
DK · DK · M · DF · DF + M · N · DF · DF
DK · DK · M · N · DF · DF
(3)
MobileNet uses 3 × 3 depthwise separable convolutions,
which require 8∼9 times less computation than standard convolutions with only a small reduction in accuracy.
Table 2 compares MobileNet with other popular models
in terms of accuracy as assessed on the ImageNet database,
number of multi-adds (million), and number of parameters
(million). MobileNet is nearly as accurate as VGG-16 [16]
while being 32 times smaller and 27 times less compute intensive. It is more accurate than GoogleNet [20] while being
smaller and requiring more than 2.5 times less computation.
Table 2. Comparisons between MobileNet and other popular
deep learning models [19].
Model
Accuracy
Multi-Adds (106 )
Parameters (106 )
AlexNet
Squeezenet
GoogleNet
VGG-16
MobileNet
57.2%
57.5%
69.8%
71.5%
70.6%
720
1700
1550
15300
569
60
1.25
6.8
138
4.2
MobileNet [19] is also more accurate than Squeezenet [21]
and AlexNet [14] with a nearly identical model size and less
computation.
2.2. Hash Function
Hash mapping, which is required for learning from images,
is based on the following principles. The hash codes should
respect the semantic similarity between image labels. Images
that share the same class labels should be mapped to similar binary codes. Let I = {In }N
n=1 denote N images, and
let Y = yn M ×N be their associated label vectors, where
M is the total number of class labels. An entry in yn has
a value of 1 if the image In belongs to the corresponding
class and is 0 otherwise. Our goal is to learn a mapping
F : I → {0, 1}K×N that maps the images to their k-bit
binary codes B = bn ∈ {0, 1}K×N while preserving the
semantic similarity relationships among the image data [22].
Our network is built on MobileNet. Each layer is followed
by a batchnorm layer and a nonlinear ReLU layer, with the
exception of the fully connected layer for classification. A final average pooling layer reduces the spatial resolution to 1
before the fully connected layer. To incorporate the learned
features into the binary codes, we add a latent layer H with K
units to the top of layer pool6, as illustrated in Figure 1. This
latent layer is fully connected to pool6 and uses sigmoid units
so that the activations are bounded between 0 and 1 [23]. Let
WH ∈ Rd×K denote the weights (i.e., the projection matrix)
in the latent layer. For a given image In with the feature vector a6 ∈ Rd in layer pool6, the activations of the units in H
6
H
can be computed as aH
+ eH ). Here, eH is the
n = σ(an · W
bias term, and σ(·) is the logistic sigmoid function, which is
defined as σ(z) = 1/(1 + exp(−z)), where z is a real value.
The binary encoding function is given by
bn = sign(σ(a6n · W H + eH ) − 0.5) = sign(aH
n − 0.5) (4)
where sign(v) = 1 if v > 0 and sign(v) = 0 otherwise.
sign(·) performs element-wise operations on a matrix or a
vector.
3. EXPERIMENTS
To evaluate the proposed method, we conducted experiments
on the mobile location recognition dataset presented in [24].
Table 3. The MAPs of different hashing methods for mobile
location recognition.
Method
VHB [4]
SSFS [24]
DLBH [25]
SSDH [22]
Our method
16-bit
59.80
78.26
96.66
MAP
32-bit
78.68
91.82
97.61
64-bit
19.36
20.22
87.15
92.43
97.80
The dataset contains 8,062 images, which were captured from
162 locations. We used the same experimental parameters
as in [24] and [1]. We implemented our approach using the
open-source CAFFE [26] package. We initialized the network
parameters by adopting the parameters of a MobileNet trained
on the 14 million images of the ImageNet [14] dataset. The
parameters in the hash layer were randomly initialized. The
learning rate was initialized as 0.01 and was decreased to 1/10
of its previous value after every 10,000 iterations. The entire training procedure terminated after 30,000 iterations. For
the learning of the network parameters, in conjunction with
backpropagation, we exploited the mini-batch stochastic gradient descent algorithm with a mini-batch size of 32 images to
minimize the classification error. Our model is a lightweight
modification of MobileNet and thus is easy to implement.
In the evaluation, we used the Mean Average Precision
(MAP) as the evaluation criterion. We ranked all of the images according to their Hamming distances from the query
image, selected the top k images from the ranked list as the
retrieval results, and computed the MAP on these retrieved
images. We set k to 100 in these experiments. We used the
class labels as the ground truth and adopted the common
settings for computing the MAP by examining whether the
retrieved images and the query shared common class labels.
We compared our method with Visual Hash Bits (VHB) [4]
and Space-Saliency Fingerprint Selection-based hash codes
(SSFS) [24], which are both traditional hashing methods for
mobile location recognition. The other two methods considered for comparison, Deep Learning of Binary Hash Codes
(DLBH) [25] and Supervised Semantics-Preserving Deep
Hashing (SSDH) [22], are both deep-learning-based hashing
methods.
Table 3 compares the performances on the dataset of the
different hashing methods for different hash code lengths.
From the results, we can see that the accuracies of the deep
learning hashing methods greatly exceed those of the traditional hashing methods, which demonstrates the power of
deep learning technology for binary code learning. Furthermore, because SSDH learns the feature representations and
binary codes simultaneously and imposes more constraints
for binary code learning, it achieves higher performance than
DLBH. Our method achieves the best results on this dataset
for all of the different hash code lengths. Especially when the
hash code length is relatively short, our method can achieve
extremely high accuracy. This can be attributed to the fact
that MobileNet networks enable the joint learning of representations and hash functions from images. Moreover, the
learned representations are more effective and stable than
those of AlexNet-based models such as DLBH and SSDH.
Finally, the sizes of the DLBH and SSDH models are greater
than 230 MB, whereas for MobileNet, the model size is only
13 MB. Thus, the memory demand for a mobile device is
reduced by a factor of approximately 18.
[10] Chuang Gan, Ming Lin, Yi Yang, Gerard de Melo, and Alexander G Hauptmann, “Concepts not alone: Exploring pairwise relationships for zero-shot video activity recognition,” in AAAI,
2016.
4. CONCLUSION
[12] R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature
hierarchies for accurate object detection and semantic segmentation,” in CVPR, 2014, pp. 580–587.
We present an effective deep learning framework based on
MobileNet for creating hash-like binary codes for mobile visual search. In this framework, we incorporate the hash function as a latent layer between the feature layer and the output layer in the MobileNet network. By optimizing an objective function defined over the classification error, our method
jointly learns the binary codes, features, and classification results. To evaluate the performance of the proposed network,
we applied it to a mobile location recognition dataset. The
experimental results demonstrate that it can achieve a MAP
improvement of 5.5% compared with state-of-the-art methods. The model requires only 13 MB of memory.
5. REFERENCES
[1] W. Liu, H. Ma, H. Qi, D. Zhao, and Z. Chen, “Deep learning hashing for mobile visual search,” EURASIP J. Image and
Video Processing, vol. 2017, pp. 17, 2017.
[2] W. Liu, T. Mei, and Y.D. Zhang, “Instant mobile video search
with layered audio-video indexing and progressive transmission,” IEEE Trans. on Multimedia, vol. 16, no. 8, pp. 2242–
2255, 2014.
[3] V. Chandrasekhar, G. Takacs, and D. Chen, “Compressed histogram of gradients: A low-bitrate descriptor,” IJCV, vol. 96,
no. 3, pp. 384–399, 2012.
[4] J. He, J. Feng, and X. Liu, “Mobile product search with bag of
hash bits and boundary reranking,” in CVPR, 2012, pp. 3005–
3012.
[5] O. Russakovsky, J. Deng, H. Su, and J. Krause, “Imagenet
large scale visual recognition challenge,” IJCV, vol. 115, no.
3, pp. 211–252, 2015.
[6] W. Liu, T. Mei, Y.D. Zhang, C. Che, and J.B. Luo, “Multitask deep visual-semantic embedding for video thumbnail selection,” in CVPR, 2015, pp. 3707–3715.
[7] R. Xia, Y. Pan, and H. Lai, “Supervised hashing for image
retrieval via image representation learning,” in AAAI, 2014,
pp. 2156–2162.
[8] C. Gan, T. Yao, K.Y. Yang, Y. Yang, and T. Mei, “You lead, we
exceed: Labor-free video concept learning by jointly exploiting web videos and images,” in IEEE Computer Vision and
Pattern Recognition, 2016, pp. 923–932.
[9] C. Gan, Y. Yang, L.C. Zhu, D.L. Zhao, and Y.T. Zhuang, “Recognizing an action using its name: A knowledge-based approach,” International Journal of Computer Vision, vol. 120,
no. 1, pp. 61–77, 2016.
[11] D. Ciresan, U. Meier, and J. Schmidhuber, “Multi-column deep
neural networks for image classification,” in CVPR, 2012, pp.
3642–3649.
[13] P. Sermanet, D. Eigen, and X. Zhang, “Overfeat: Integrated
recognition, localization and detection using convolutional networks,” CoRR, vol. abs/1312.6229, 2013.
[14] A. Krizhevsky, I. Sutskever, and G. Hinton, “Imagenet classification with deep convolutional neural networks,” in NIPS,
2012, pp. 1106–1114.
[15] L.Y. Chu, S.Q. Jiang, S.H. Wang, Y.Y. Zhang, and Q.M.
Huang, “Robust spatial consistency graph model for partial
duplicate image retrieval,” IEEE Trans. on Multimedia, vol.
15, no. 8, pp. 1982–1996, 2013.
[16] K. Simonyan and A. Zisserman, “Very deep convolutional
networks for large-scale image recognition,” CoRR, vol.
abs/1409.1556, 2014.
[17] C. Szegedy, V. Vanhoucke, and S. Ioffe, “Rethinking the
inception architecture for computer vision,” CoRR, vol.
abs/1512.00567, 2015.
[18] C. Gan, N.Y. Wang, Y. Yang, D.Y. Yeung, and A.G. Hauptmann, “Devnet: A deep event network for multimedia event
detection and evidence recounting,” in CVPR, 2015, pp. 2568–
2577.
[19] A. Howard, M. Zhu, B. Chen, and D. Kalenichenko, “Mobilenets: Efficient convolutional neural networks for mobile
vision applications,” CoRR, vol. abs/1704.04861, 2017.
[20] C. Szegedy, W. Liu, and Y. Jia, “Going deeper with convolutions,” in CVPR, 2015, pp. 1–9.
[21] F. N. Iandola, M. Moskewicz, and K. Ashraf, “Squeezenet:
Alexnet-level accuracy with 50x fewer parameters and <1mb
model size,” CoRR, vol. abs/1602.07360, 2016.
[22] H. Yang, K. Lin, and C. Chen, “Supervised learning of
semantics-preserving hashing via deep neural networks for
large-scale image search,” CoRR, vol. abs/1507.00101, 2015.
[23] X. Glorot, A. Bordes, and Y. Bengio, “Deep sparse rectifier
neural networks,” in AIS, 2011, pp. 315–323.
[24] H. Wang, D. Zhao, H.D. Ma, and H. Xu, “SSFS: A spacesaliency fingerprint selection framework for crowdsourcing
based mobile location recognition,” in AMIP, 2016, pp. 650–
659.
[25] K. Lin, H. Yang, J. Hsiao, and C.Chen, “Deep learning of binary hash codes for fast image retrieval,” in CVPR Workshops,
2015, pp. 27–35.
[26] Y. Jia, E. Shelhamer, and J. Donahue, “Caffe: Convolutional
architecture for fast feature embedding,” in ACM MM, 2014,
pp. 675–678.
| 1cs.CV
|
Boltzmann machines for time-series
Takayuki Osogami
arXiv:1708.06004v2 [cs.NE] 22 Sep 2017
IBM Research - Tokyo
[email protected]
version 1.0.1
Abstract
We review Boltzmann machines extended for time-series. These models often have recurrent
structure, and back propagration through time (BPTT) is used to learn their parameters. The perstep computational complexity of BPTT in online learning, however, grows linearly with respect
to the length of preceding time-series (i.e., learning rule is not local in time), which limits the
applicability of BPTT in online learning. We then review dynamic Boltzmann machines (DyBMs),
whose learning rule is local in time. DyBM’s learning rule relates to spike-timing dependent
plasticity (STDP), which has been postulated and experimentally confirmed for biological neural
networks.
1
Introduction
The Boltzmann machine is a stochastic model for representing probability distributions over binary
patterns [28]. In this paper, we review Boltzmann machines that have been studied as stochastic
(generative) models of time-series. Such Boltzmann machines define probability distributions over
time-series of binary patterns. They can also be modified to deal with time-series of real-valued
patterns, similar to Boltzmann machines modified for real-valued patterns (e.g., Gaussian Boltzmann
machines; see Section 6.3 from [28]). We will follow the probabilistic representations of [28] for intuitive
interpretations in terms of probabilities.
In Section 3, we start with a Conditional Restricted Boltzmann Machine (CRBM) [40], which is
a conditional Boltzmann machine (Section 4 from [28]) that gives conditional probability of the next
pattern given a fixed number of preceding patterns. A limitation of a CRBM is that it can take into
account only the dependency within a fixed horizon, and as we increase the length of this horizon, the
complexity of learning grows accordingly.
To overcome this limitation of CRBMs, researchers have proposed Boltzmann machines having
recurrent structures, which we review in Section 4. These include spiking Boltzmann machines [12],
temporal restricted Boltzmann machines (TRBMs) [37], recurrent temporal restricted Boltzmann machines (RTRBMs) [38], and extensions of those models. A standard approach to learning those models
having recurrent structures is back propagation through time (BPTT).
However, BPTT is undesirable when we learn time-series in an online manner, where we update the
parameters of a model every time a new pattern arrives. Such online learning is needed when we want
to quickly adapt to a changing environment or when we do not have sufficient memory to store the
time-series. Unfortunately, the per-step computational complexity of BPTT in online learning grows
linearly with respect to the length of preceding time-series. This computational complexity limits the
applicability of BPTT to online learning.
In Section 5, we review the dynamic Boltzmann machine (DyBM) [32, 31] and its extensions. The
DyBM’s per-step computational complexity in online learning is independent of the length of preceding
1
time-series. We discuss how the learning rule of the DyBM relates to spike-timing dependent plasticity
(STDP), which has been postulated and experimentally confirmed for biological neural networks.
This survey paper is based on a personal note prepared for the third of the four parts of a tutorial
given at the 26th International Joint Conference on Artificial Intelligence (IJCAI-17) held in Melbourne, Australia on August 21, 2017. See a tutorial webpage1 for information about the tutorial. A
survey corresponding to the first part of the tutorial (Boltzmann machines and energy-based models)
can be found in [28]. We follow the definitions and notations used in [28].
2
Learning energy-based models for time-series
Consider a possibly multi-dimensional time-series:
x ≡ (x[t] )Tt=0 ,
(1)
where x[t] denotes the binary pattern (vector) at time t. We will use x[s,t] to denote the time-series of
the patterns from time s to t.
A goal of learning time-series is to maximize the log-likelihood of a given time-series x (or a
collection of multiple time-series) with respect to the distribution Pθ (·) defined by a model under
consideration, where we use θ to denote the set of the parameters of the model:
f (θ) ≡ log Pθ (x) =
T
X
log Pθ (x[t] | x[0,t−1] ),
(2)
t=0
where Pθ (x[t] | x[0,t−1] ) denotes the conditional probability that the pattern at time t is x[t] given that
the patterns up to time t − 1 is x[0,t−1] . Here, Pθ (x[0] | x[0,−1] ) denotes the probability that the pattern
at time 0 is x[0] , where x[0,−1] should be interpreted as an empty history.
We study models where the probability is represented with energy Eθ (·) as follows:
X
Pθ (x) =
Pθ (x, h̃),
(3)
h̃
where
exp − Eθ (x, h)
,
Pθ (x, h) = X X
exp − Eθ (x̃, h̃)
x̃
(4)
h̃
the summation with respect to x̃ is over all of the possible binary time-series of length T , and the
summation with respect to h̃ is over all of the possible hidden values.
The gradient of f (θ) can then be represented as follows (see (73)):
∇f (θ) = −Etarget [Eθ [∇Eθ (X, H) | X]] + Eθ [∇Eθ (X, H)] ,
(5)
where X represents the random time-series, H represents the random hidden values, Eθ denotes the
expectation with respect to the model distribution Pθ , and Etarget denotes the expectation with respect
to the target distribution, which in our case is the empirical distribution of time-series. When a single
time-series x is given as the target, (5) is reduced to
∇f (θ) = −Eθ [∇Eθ (x, H)] + Eθ [∇Eθ (X, H)] ,
1 https://researcher.watson.ibm.com/researcher/view
group.php?id=7834
2
(6)
In other words, f (θ) can be maximized by maximizing the sum of
ft (θ) ≡ log Pθ (x[t] | x[0,t−1] ),
(7)
where
Pθ (x[t] | x[0,t−1] ) =
X
Pθ (x[t] , h̃ | x[0,t−1] )
(8)
h̃
exp − Eθ (x[t] , h | x[0,t−1] )
,
Pθ (x[t] , h | x[0,t−1] ) = X X
exp − Eθ (x̃[t] , h̃ | x[0,t−1] )
x̃[t]
(9)
h̃
and Eθ (x[t] , h | x[0,t−1] ) is the conditional energy of (x[t] , h) given x[0,t−1] .
The gradient of ft (θ) is given analogously to ∇f (θ):
h h
ii
h
i
∇ft (θ) = −Etarget Eθ ∇Eθ (X [t] , H | X [t] , x[0,t−1] ) + Eθ ∇Eθ (X [t] , H | x[0,t−1] ) .
(10)
When the target is a single time-series x, we have
h
i
h
i
∇ft (θ) = −Eθ ∇Eθ (x[t] , H | x[0,t−1] ) + Eθ ∇Eθ (X [t] , H | x[0,t−1] ) .
(11)
3
Non-recurrent Boltzmann machines for time-series
By (2), any model that can represent the conditional probability Pθ (x[t] | x[0,t−1] ) can be used for
time-series. In this section, we start with a Boltzmann machine that can be used to model a D-th
order Markov model for an arbitrarily determined D. In D-th order Markov models, the conditional
probability can be represented as
Pθ (x[t] | x[0,t−1] ) = Pθ (x[t] | x[t−D,t−1] ).
3.1
(12)
Conditional restricted Boltzmann machines
Figure 1a shows a particularly structured Boltzmann machine called Conditional Restricted Boltzmann
Machine (CRBM) [40]. A CRBM represents the conditional probability on the right-hand side of (12).
In the figure, we set D = 2.
The CRBM consists of D + 1 layers of visible units and a layer of hidden units. The units within
each layer have no connections, but units between different layers may be connected to each other.
Each visible layer corresponds to a pattern at a time s ∈ [t − D, t].
The CRBM is a conditional Boltzmann machine shown in Figure 2c from [28] but with a particular
structure to represent time-series. The visible layers corresponding to x[t−D,t−1] are the input, and
the visible layer corresponding to x[t] is the output. The parameters θ of the CRBM are independent
of t.
More formally, the energy of a CRBM is given by
D
X
Eθ x[t] , h | x[t−D,t−1] = −(bV )> x[t] − (bH )> h − h> WHV x[t] −
(x[t−d] )> W[d] x[t] ,
(13)
d=1
where x[t] is output, x[t−D,t−1] is input, and h is hidden.
We can then represent the conditional probability as follows (see (14) from [28]):
X
Pθ (x[t] | x[t−D,t−1] ) =
Pθ (x[t] , h̃ | x[t−D,t−1] ),
h̃
3
(14)
...
Hidden
...
...
...
𝑡−2
𝑡−1
𝑡−2
𝑡
(a) Single hidden layer
Visible
Output
Input
Output
Input
...
...
...
Visible
...
...
Hidden
𝑡−1
𝑡
(b) Multiple hidden layers
Figure 1: Conditional restricted Boltzmann machines.
where
exp − Eθ x[t] , h̃ | x[t−D,t−1]
Pθ (x[t] , h̃ | x[t−D,t−1] ) = X
,
exp − Eθ x̃[t] , h̃ | x[t−D,t−1]
(15)
x̃[t]
and the summation with respect to h̃ is over all of the possible binary hidden patterns, and the
summation with respect to x̃[t] is defined analogously.
One can then learn the parameters θ = (bV , hh , WHV , W[1] , . . . , WD ) of the model by following a
gradient-based method in Section 4 from [28].
3.2
Extensions of conditional restricted Boltzmann machines
The CRBM has been extended in various ways. Taylor et al. study a CRBM with multiple layers of
hidden units [40] (see Figure 1b). Memisevic and Hinton study a CRBM extended with three-way
interactions (i.e., a higher order Boltzmann machine), which they refer to as a gated CRBM [24].
Specifically, the energy of the gated CRBM involves
X
−
wi,j,k xi yj hk ,
(16)
i,j,k
where x denotes input values, y denotes output values, and h denotes hidden values. A drawback of
the gated CRBM is its increased number of parameters due to the three-way interactions. Taylor and
Hinton study a factored CRBM, where the three-way interaction is represented with a reduced number
of parameters as follows [39]:
XX
y
v
h
−
wi,f
wj,f
wk,f
xi yj hk ,
(17)
f
i,j,k
where the summation with respect to f is over a set of factors under consideration.
4
that these forward connections are not required f
e, but only for the purposes of extrapolating into
0.16
0.14
...
...
...
...
Hidden
0.12
r(t)
0.1
0.08
0.06
0.04
...
...
...
...
Input
Visible
Output
0.02
0
𝑡−2
𝑡−1
𝑡
0
5
10
15
20
25
30
Time
(a) Structure of a spiking Boltzmann machine
(b) r(·) used in [12]
Figure 3: The form of the temporal k
1
Figure 2: A spiking Boltzmann machine studied in [12]. In (b), we use the figure in the version available
at http://www.cs.toronto.edu/∼fritz/absps/nips00-ab.pdf.
4
4.1
Boltzmann machines for time-series with recurrent structures
Spiking Boltzmann machines
A spiking Boltzmann machine studied in [12] can be shown to be essentially equivalent to the Boltzmann machine illustrated in Figure 2. This Boltzmann machine consists of input units, output units,
and hidden units. The input units represent historical values of visible units and hidden units. Although hidden units are random and cannot be simply given as input, Hinton and Brown make the
approximation of using sampled values H (−∞,t−1] (ω) as the input hidden units [12].
Specifically, given the visible values x[<t] ≡ x(−∞,t−1] and sampled hidden values H [<t] (ω) up to
time t − 1, the energy with the visible values x[t] and hidden values h[t] at time t can be represented
as follows:
Eθ (x[t] , h[t] | x[<t] , H [<t] (ω)) = −(bV )> x[t] − (bH )> h[t] − (h[t] )> r(τ ) WHV x[t]
∞
∞
X
X
−
(H [t−τ ] (ω))> r(τ ) WHH h[t] −
(x[t−τ ] )> r(τ ) WVH h[t]
−
τ =1
∞
X
∞
X
τ =1
τ =1
τ =1
(H [t−τ ] (ω))> r(τ ) WHV x[t] −
(x[t−τ ] )> r(τ ) WVV x[t] , (18)
where r(·) is an arbitrarily chosen function and is not the target of learning. Namely, the Boltzmann
machine has an infinite number of units but can be characterized by a finite number of parameters
θ ≡ (bV , bH , WVV , WVH , WHV , WHH ). Figure 2(b) shows the specific r(·) used in [12]2 .
Notice that the Boltzmann machine in Figure 2 can be seen as a restricted Boltzmann machine
(RBM) whose bias and weight can depend on x[<t] and H [<t] (ω), because (18) can be represented as
Eθ (x[t] , h[t] | x[<t] , H[<t] (ω)) = −bH (t, ω) h[t] − bV (t, ω) x[t] − h[t] W x[t] ,
(19)
2 Although it is not clear from the descriptions in [12], the labels in the horizontal axis should probably be shifted by
one, so that r(0) = 0, r(1) ≈ 0.1, and so on.
5
where bH (t, ω) is the time-varying bias for hidden units, bV (t, ω) is the time-varying bias for visible
units, and W is the weight between visible units and hidden units:
H
H
b (t, ω) ≡ b +
bV (t, ω) ≡ bV +
∞
X
(H
τ =1
∞
X
>
(ω)) r(τ ) W
HH
+
(H [t−τ ] (ω))> r(τ ) WHV +
τ =1
HV
W ≡ r(0) W
[t−τ ]
∞
X
(x[t−τ ] )> r(τ ) WVH
τ =1
∞
X
(x[t−τ ] )> r(τ ) WVV
(20)
(21)
τ =1
(22)
.
We can then represent the conditional probability as follows:
X
Pθ (x[t] | x[<t] , H (−∞,t−1 (ω)) =
Pθ x[t] , h̃[t] | x[<t] , H (−∞,t−1] (ω)
(23)
h̃[t]
where
exp − Eθ x[t] , h̃[t] | x[<t] , H (−∞,t−1] (ω)
Pθ (x[t] , h̃[t] | x[<t] , H [<t] (ω)) = X
.
exp − Eθ x̃[t] , h̃[t] | x[<t] , H [<t] (ω)
(24)
x̃[t]
We now discuss the choice of r(0) = 0, which appears to be the case in Figure 2(b). In this case,
the energy is reduced to
Eθ (x[t] , h[t] | x[<t] , H [<t] (ω)) = −(bH (t, ω))> h[t] − (bV (t, ω))> x[t] .
(25)
Because there are no connections between visible units and hidden units at time t, the hidden values
at t do not affect the distribution of the visible values at t. The only role of the hidden units is that
the sampled hidden values are used to update the time-varying bias, bV (s, ω) and bH (s, ω) for s > t.
A problem is that there is no mechanism that allows us to learn appropriate values of WVH and
WHH until we observe succeeding visible values. Namely, the hidden values h[t] are sampled with the
dependency on WVH and WHH , but whether the sampled hidden values are good or not can only be
known when those hidden values are used as input. This helps us to learn appropriate values of WHV ,
but not WVH or WHH . See [30] for further discussion.
4.2
Temporal restricted Boltzmann machines
Sutskever and Hinton study a model related to a CRBM, which they refer to as a temporal restricted
Boltzmann machine (TRBM) [37]. While a CRBM defines the conditional distribution of the (visible
and hidden) values at time t given only the visible values from time t − D to t − 1, a TRBM defines the
corresponding conditional probability given both the visible values and the hidden values from time
t − D to t − 1. See Figure 3a. Similar to the CRBM, the parameters θ of the TRBM do not depend
on time t.
Unlike the CRBM, the TRBM is not a conditional RBM. This is because the TRBM with a single
parameter is used for every t, and the distribution of hidden values is shared among those TRBM at
varying t. In particular, hidden values of the TRBM can depend on the future visible values.
Because this dependency makes learning and inference hard, it is ignored in [37]. Namely, the
values at each time t is conditionally independent of the values after time t given the values at and
before time t. In particular, the distribution of the hidden values at time t is completely determined
by the visible values up to time t. The distribution of the hidden values before time t can thus be
considered as input when we use the TRBM to define the conditional distribution of the values at time
t (see Figure 3b). For each sampled values of hidden units, TRBM in 3b is a CRBM.
6
...
...
...
...
𝑡−1
...
...
...
𝑡−2
...
...
...
Visible
Output
Input
...
...
Hidden
𝑡−2
(a) TRBM
Visible
Output
Input
𝑡
Hidden
𝑡−1
𝑡
(b) TRBM with approximations in [37]
Figure 3: Temporal restricted Boltzmann machines. In (b), the gray circles indicate that expected
values are used for the input hidden units.
Furthermore, in [37], the expected values (see Section 5.4 from [28]) are used for the hidden values.
Then the input hidden units in Figure 3b takes real values in [0, 1] that are completely determined by
the visible values before time t.
More formally, with the approximations in [37], the TRBM with parameter θ defines the probability
distribution over the time-series of visible and hidden values as follows:
Pθ (x) =
T X
Y
Pθ (x[t] , h̃[t] | x[t−D,t−1] , r[t−D,t−1] ),
(26)
t=0 h̃[t]
where
exp − Eθ (x[t] , h̃[t] | x[t−D,t−1] , r[t−D,t−1] )
Pθ (x[t] , h̃[t] | x[t−D,t−1] , r[t−D,t−1] ) = X
exp − Eθ (x̃[t] , h̃[t] | x[t−D,t−1] , r[t−D,t−1] )
(27)
x̃[t]
is the conditional distribution defined by the Boltzmann machine shown in Figure 3b, where r[t−D,t−1]
are expected hidden values. Specifically, (27) is used to compute
r[t] = Eθ [H [t] | x[0,t] ],
(28)
which is subsequently used with (27) for t ← t + 1, where the expectation in (28) is with respect to
Pθ (x[t] , h[t] | x[t−D,t−1] , r[t−D,t−1] )
.
Pθ (h[t] | x[0,t−1] ) = X
Pθ (x̃[t] , h[t] | x[t−D,t−1] , r[t−D,t−1] )
(29)
x̃[t]
Notice that r[t] can be computed from x[0,t] in a deterministic manner with dependency on θ.
However, this dependency on θ is ignored in learning TRBMs.
4.3
Recurrent temporal restricted Boltzmann machines
To overcome the intractability of the TRBM without approximations, Sutskever et al. study a refined
model of TRBM, which they refer to as a recurrent temporal restricted Boltzmann machine (RTRBM)
7
...
...
Hidden
...
...
Input
Visible
Output
𝑡−1
𝑡
Figure 4: A recurrent temporal restricted Boltzmann machine.
[38]. The RTRBM simplifies the TRBM by removing connections between visible layers and connections between hidden layers that are separated by more than one lag. This means that the (visible and
hidden) values at time t are conditionally independent of the the visible values before time t and the
hidden values before time t − 1 given the hidden values at time t − 1. Similar to the approximation
made for the TRBM in Figure 3b, the RTRBM uses the expected values for the hidden values at time
t − 1 but defines the conditional distribution of the (visible and hidden) values at time t over their
binary values. See Figure 4.
More formally, let r[t−1] denote the expected values of the hidden units at time t − 1:
r[t−1] ≡ Eθ H[t−1] | x[0,t−1] ,
(30)
where H[t−1] is the random vector representing the hidden values at time t, and Eθ [· | x[0,t−1] ] represents
the conditional expectation given the visible values up to time t − 1. The probability distribution of
the values at time t is then given by
exp − Eθ (x[t] , h[t] | r[t−1] )
,
(31)
Pθ (x[t] , h[t] | r[t−1] ) = X
exp − Eθ (x̃[t] , h̃[t] | r[t−1] )
x̃,h̃
where the conditional energy is given by
Eθ (x[t] , h[t] | r[t−1] ) ≡ −(bV )> x[t] − (bH )> h[t] − (r[t−1] )> U h[t] − (x[t] )> W h[t]
(32)
for parameters
θ ≡ (bV , bH , W, U),
(33)
where bV is the bias for visible units, bH is the bias for hidden units, W is the weight matrix between
visible units and hidden units, and U is the weight matrix between previous expected value of hidden
units (at t − 1) and hidden units (at t).
8
4.3.1
Inference
The marginal conditional distribution of visible values at time t − 1 can then be represented as follows:
exp − Fθ (x[t] | r[t−1] )
,
Pθ (x[t] | r[t−1] ) = X
(34)
exp − Fθ (x̃[t] | r[t−1] )
x̃[t]
where the conditional free-energy is given by
Fθ (x[t] | r[t−1] ) ≡ − log
X
exp − Eθ (x[t] , h̃[t] | r[t−1] ) .
(35)
h̃[t]
Once the visible values at time t is given, the conditional probability distribution of the hidden
values at time t can be represented as follows:
exp − Eθ (h[t] | r[t−1] , x[t] )
,
Pθ (h[t] | r[t−1] , x[t] ) = X
(36)
exp − Eθ (h̃[t] | r[t−1] , x[t] )
h̃[t]
where the (bV )> x[t] term is canceled out between the numerator and the denominator, and the conditional energy is given by
>
Eθ (h[t] | r[t−1] , x[t] ) ≡ − bH + U> r[t−1] + W> x[t] h[t] .
(37)
By Corollary 1 from [28], the hidden values at time t are conditionally independent of each other given
r[t−1] and x[t] :
Y
[t]
Pθ (h[t] | r[t−1] , x[t] ) =
Pθ (hi | r[t−1] , x[t] ),
(38)
i
where
[t]
[t]
Pθ (hi
[t−1]
[t]
[t]
exp − bi hi
,
(39)
b[t] ≡ bH + U> r[t−1] + W> x[t]
(40)
b[0] ≡ binit + W> x[0] .
(41)
|r
,x ) =
[t]
1 + exp − bi
[t]
where bi is the i-th element of
for t ≥ 1, and
where we now follow [38] and allow the hidden units at time 0 to have own bias binit that can differ
from bH . The expected values are thus given by
r[t] =
1
,
1 + exp b[t]
where the operations are defined elementwise.
9
(42)
...
𝐡𝑡
...
...
...
...
...
...
...
...
...
...
𝑡=1
...
...
...
...
𝑡=0
𝐫𝑡
𝐱𝑡
𝑡=𝑇
Figure 5: A recurrent temporal restricted Boltzmann machine unfolded through time, where T = 4.
4.3.2
Learning
The parameters of an RTRBM can be trained through back propagation through time, analogous to
recurrent neural networks, but with contrastive divergence. To understand how we can train RTRBMs,
Figure 5 shows an RTRBM unfolded through time. Recall that the expected values of hidden units
are deterministically updated from r[t−1] to r[t] according to (40)-(42). Hence, r[t] can be understood
as hidden values of a recurrent neural network (RNN) [34]. An RTRBM can then be seen as an RNN
but gives an RBM as an output instead of real values, which would be given as an output from the
standard RNN. We will derive the learning rule of the RTRBM, closely following [25] but using our
notations.
When an RTRBM is unfolded through time, its energy can be represented as follows:
Eθ (x, h) = −
T
T
T
T
X
X
X
X
(bV )> x[t] − (binit )> h[0] −
(bH )> h[t] −
(x[t] )> W h[t] −
(r[t−1] )> U h[t] .
t=0
t=1
t=0
t=1
(43)
By (5), we can maximize the log-likelihood of a given time-series x with a gradient-based approach.
What we need in (5) is the gradient of the energy with respect to the parameter. A caveat is that the
energy in (43) depends on r[·] , which in turn depends on θ in a recursive manner. Also, expectation
with respect to Pt heta in (5) needs to be computed with approximation such as contrastive divergence
(see Section 5.2).
We first study the last term of (43). Let
Qs ≡
T
X
(r[t−1] )> U h[t]
t=s
[s−1] >
= (r
) U h[s] + Qs+1 ,
(44)
(45)
for s ∈ [1, T ], where QT +1 ≡ 0, so that Q ≡ Q1 is the last term of (43). Taking the partial derivative
10
[s−1]
with respect to ri
, we obtain
∂Qs
[s−1]
∂ri
=
∂
(r[s−1] )> U h[s] +
[s−1]
X ∂rj[s] ∂Qs+1
∂ri
[s−1]
j
= Ui,: h[s] +
X
[s]
∂ri
[s]
rj (1 − rj ) ui,j
∂Qs+1
j
[s]
∂rj
[s]
(46)
(47)
,
∂rj
where Ui,: denotes the i-th row of U, ui,j denotes the (j, i)-th element of U, and the last equality
follows from (40)-(42). In vector-matrix notations, we can write
∇r[s−1] Qs = U h[s] + r[s] · (1 − r[s] ) · ∇r[s] Qs+1 ,
(48)
where · denotes elementwise multiplication. Because Qs is not a function of r[0] , . . . , r[s−2] , we have
∇r[s−1] Q = ∇r[s−1] Qs .
(49)
Therefore, the partial derivative of Q with respect to r[s−1] is given recursively as follows:
∇r[s−1] Q = U h[s] + r[s] · (1 − r[s] ) · ∇r[s] Q
(50)
for s = 1, . . . , T and
∇r[T ] Q = 0.
(51)
We now take the derivative of Q with respect to the parameters in θ, starting with U:
T
[t]
X X ∂r
∂Q
∂Q
dQ
k
+
=
[t]
dui,j
∂u
∂u
i,j
i,j
∂rk
t=0 k
=
T
X
[t]
[t]
[t−1]
rj (1 − rj ) ri
t=1
∂Q
[t]
∂rj
(52)
+
T
X
[t−1]
ri
[t]
hj ,
(53)
t=1
where the last equality follows from (40)-(42). In vector-matrix notations, we can write
∇U Q =
T
X
>
r[t−1] r[t] · (1 − r[t] ) · ∇r[t] Q + h[t] ,
(54)
t=1
where ∇r[t] Q is given by (50)-(51).
The gradient of Q with respect to other parameters can be derived as follows:
∇W Q =
T
X
>
x[t] r[t] · (1 − r[t] ) · ∇r[t] Q
(55)
r[t] · (1 − r[t] ) · ∇r[t] Q
(56)
· (1 − r[0] ) · ∇r[0] Q
(57)
t=0
∇bH Q =
T
X
t=1
[0]
∇binit Q = r
∇bV Q = 0
(58)
11
The gradients of Q can be used to show the following gradients of the energy:
∇U Eθ (x, h) = −
T
X
>
r[t−1] r[t] · (1 − r[t] ) · ∇r[t] Q + h[t]
(59)
t=1
∇W Eθ (x, h) = −
T
X
x[t] (h[t] )> −
t=0
∇bH Eθ (x, h) = −
T
X
t=1
[0]
∇binit Eθ (x, h) = −h
∇bV Eθ (x, h) = −
T
X
T
X
>
x[t] r[t] · (1 − r[t] ) · ∇r[t] Q
(60)
t=0
h[t] −
T
X
r[t] · (1 − r[t] ) · ∇r[t] Q
(61)
t=1
− r[0] · (1 − r[0] ) · ∇r[0] Q
(62)
x[t] ,
(63)
t=0
where ∇r[t] Q is given by (50)-(51). The gradient of the log-likelihood of the given time-series x now
follows from (72) in [28].
4.3.3
Extensions
The RTRBM has been extended in various ways. Mittleman et al. study a structured RTRBM, where
units are partitioned into blocks, and only the connections between particular blocks are allowed [25].
Lyu et al. replaces the RNN of RTRBM with the one with Long Short-Term Memory (LSTM) [22].
Schrauwen and Buesing replaces the RNN of RTRBM with an echo state network [36].
An RNN-RBM slightly generalizes RTRBM by relaxing the constraint of the RTRBM that r[t] must
be the expected value of h[t] [7]. Namely, an RNN-RBM is an RNN but gives an RBM as an output,
where the RNN and RBM do not share parameters, while an RTRBM shares parameters between an
RNN and an RBM.
5
Dynamic Boltzmann machines
BPTT is not desirable for online learning, where we update θ every time a new pattern x[t] is observed.
The per-step computational complexity of BPTT in online learning grows linearly with the length of
the preceding time-series. Such online learning, however, is needed for example when we cannot store
all observed patterns in memory or when we want to adapt to changing environment.
The dynamic Boltzmann machine (DyBM) is proposed as a time-series model that allows efficient
online learning [31, 32]. The per-step computational complexity of the learning rule of a DyBM is
independent of the length of the preceding time-series. In Section 5.1, we start by reviewing the
DyBM introduced in [31, 32] with relation of its learning rule to spike-timing dependent plasticity
(STDP).
In Section 5.2, we study the relaxation of some of the constraints that the DyBM has required in
[31, 32] in a way that it becomes more suitable for inference and learning [27]. The primary purpose of
these constraints in [31, 32] was to mimic a particular form of STDP. The relaxed DyBM generalizes
the original DyBM and allows us to interpret it as a form of logistic regression for time-series data.
In Section 5.3, we review DyBMs dealing with real-valued time-series [27, 8]. These DyBMs are
analogous to how Gaussian Boltzmann machines [23, 43, 13] deal with real-valued patterns as opposed
to Boltzmann machines [2, 14] for binary values. The Gaussian DyBM can be related to a vector
autoregressive (VAR) model [21]. Specifically, we show that a special case of the Gaussian DyBM is a
VAR model having additional variables that capture long term dependency of time-series. These additional variables correspond to DyBM’s eligibility traces, which represent how recently and frequently
spikes arrived from a neuron to another. We also review an extension of the Gaussian DyBM to deal
with time-series patterns in continuous space [17].
12
i
Wij[d]
j
Figure 6: A dynamic Boltzmann machine unfolded through time (Figure 1(c) from [31]).
Some of the models and learning algorithms in this section have been implemented in Python or
Java and open-sourced at https://github.com/ibm-research-tokyo/dybm.
5.1
Dynamic Boltzmann machines for binary-valued time-series
5.1.1
Finite dynamic Boltzmann machines3
The DyBM in [31, 32] is defined as a limit of a sequence of Boltzmann machines (DyBM-T ) consisting
of T layers as T tends to infinity (see Figure 6). Formally, the DyBM-T is defined as the CRBM (see
Section 3.1) having T layers of N visible units (T − 1 layers of input units and one layer of output
units) and no hidden units, so that its conditional energy is defined as
Eθ (x[t] | x[t−T +1,t−1] ) = −b> x[t] −
T
−1
X
(x[t−δ] )> W[δ] x[t] ,
(64)
δ=1
where the weight of the DyBM-T (W[1] , . . . , W[T −1] ) assumes a particular parametric form with a
finite number of parameters that are independent of T , which we discuss in the following.
The parametric form of the weight in the DyBM-T is motivated by observations from biological
neural networks [1] but leads to particularly simple, exact, and efficient learning rule. In biological
neural networks, STDP has been postulated and supported experimentally. In particular, the weight
from a pre-synaptic neuron to a post-synaptic neuron is strengthened, if the post-synaptic neuron fires
(generates a spike) shortly after the pre-synaptic neuron fires (i.e., long term potentiation or LTP).
This weight is weakened, if the post-synaptic neuron fires shortly before the pre-synaptic neuron fires
(i.e., long term depression or LTD). These dependency on the timing of spikes is missing in the Hebbian
rule for the Boltzmann machine (see (36) from [28]).
To have a learning rule with the characteristics of STDP with LTP and LTD, the DyBM-T assumes
[δ]
the weight of the form illustrated in Figure 7. For δ > 0, we define the weight, wi,j , as the sum of two
[δ]
[−δ]
weights, ŵi,j and wj,i :
[δ]
[δ]
[−δ]
wi,j = ŵi,j + ŵj,i ,
3 This
section closely follows [31].
13
(65)
weight
^
Wij[d]
Wij[d]
- dji
d
dij
^
Wji[-d]
Figure 7: The figure illustrates Equation (65) with particular forms of Equation (66) (Figure 2 from
[δ]
[31]). The horizontal axis represents δ, and the vertical axis represents the value of wi,j (solid curves),
[δ]
[−δ]
[δ]
ŵi,j (dashed curves), or ŵj,i (dotted curves). Notice that wi,j is defined for δ > 0 and is discontinuous
[δ]
[−δ]
at δ = d. On the other hand, ŵi,j and ŵj,i are defined for −∞ < δ < ∞ and discontinuous at δ = di,j
and δ = −dj,i , respectively, where recall that we assume di,j = dj,i = d in this paper.
where
[δ]
ŵi,j
0
ui,j λδ−d
=
−vi,j µ−δ
if δ = 0
if δ ≥ d
otherwise.
(66)
for λ, µ ∈ [0, 1). For simplicity, we assume a single decay rate λ for δ ≥ d and a single decay rate µ
for δ < d, as opposed to multiple ones in [31, 32]. For simplicity, we assume that the conduction delay
d is uniform for all connections, as opposed to variable conduction delay in [32]. See also [9, 29] for
ways to tune the values of the conduction delay.
[δ]
In Figure 7, the value of ŵi,j is high when δ = d, the conduction delay from i-th (pre-synaptic)
[0]
unit to the j-th (post-synaptic) unit. Namely, the post-synaptic neuron is likely to fire (i.e., xj = 1)
[−d]
immediately after the spike from the pre-synaptic unit arrives with the delay of d (i.e., xi
= 1). This
[δ]
likelihood is controlled by the LTP weight ui,j . The value of ŵi,j gradually decreases, as δ increases
from d. That is, the effect of the stimulus of the spike arrived from the i-th unit diminishes with time
[1].
[d−1]
[0]
The value of ŵi,j is low, suggesting that the post-synaptic unit is unlikely to fire (i.e., xj = 1)
immediately before the spike from the i-th (pre-synaptic) unit arrives. This unlikelihood is controlled
[δ]
by the LTD weight vi,j . As δ decreases from d − 1, the magnitude of ŵi,j gradually decreases [1].
[δ]
Here, δ can get smaller than 0, and ŵi,j with δ < 0 represents the weight between the spike of the
pre-synaptic neuron that is generated after the spike of the post-synaptic neuron.
14
Neural eligibility trace: 𝛾𝑖
𝑡
Synaptic eligibility trace: 𝛼𝑖
𝑡
FIFO queue
𝑥𝑖
𝑡
𝑥𝑖
𝑡−1
𝑥𝑖
𝑡−2
𝑥𝑖
𝑡−𝑑+1
𝑥𝑗
Pre-synaptic
neuron
𝑡
Post-synaptic
neuron
Figure 8: A connection from a (pre-synaptic) neuron i to a (post-synaptic) neuron j in a DyBM.
5.1.2
Dynamic Boltzmann machine as a limit of a sequence of finite dynamic Boltzmann
machines4
The DyBM is defined as a limit of the sequence of DyBM-T as T → ∞. Because each DyBM-T
is a CRBM, we can also define the limit of the sequence of the conditional probability defined by
DyBM-T , and this limit is considered as the conditional probability defined by the DyBM. Likewise,
the conditional energy of the DyBM is defined as the limit of the sequence of the conditional energy
of DyBM-T .
Specifically, as T → ∞, the conditional energy of DyBM-T in (64) converges to
Eθ (x[t] | x[<t] ) = −b> x[t] −
∞
X
(x[t−d] )> W[d] x[t] ,
(67)
d=1
where the convergence is due to the parametric form (66). This conditional energy in turn defines
the conditional distribution via (9), where we now have no hidden units. Although the conditional
energy (67) of the DyBM involves an infinite sum, it can be evaluated with a finite sum because of the
parametric form (66).
In fact, the DyBM can be understood as an artificial model of a spiking neural network where all
computation for inference and learning is performed locally at each synapse using only the information
available around the synapse. Specifically, a (pre-synaptic) neuron is connected to a (post-synaptic)
neuron via a first-in-first-out (FIFO) queue and a synapse (see Figure 8). At each discrete time t, a
[t]
[t]
neuron i either fires (xi = 1) or not (xi = 0). The spike travels along the FIFO queue and reaches
the synapse after conduction delay, d. In other words, the FIFO queue has the length of d − 1 and
stores, at time t, the spikes that have been generated by the pre-synaptic neuron from time t − d + 1
to time t − 1.
Each synapse in a DyBM stores a quantity called a synaptic eligibility trace. The value of the
synaptic eligibility increases when a spike arrives at the synapse from the FIFO queue; otherwise, it is
[t]
decreased by a constant factor. Specifically, at time t, the value of the synaptic eligibility trace, αi ,
that is stored at the synapse from a pre-synaptic neuron i is updated as follows:
[t]
[t−1]
αi = λ (αi
[t−d+1]
+ xi
),
(68)
where λ is a decay rate and satisfies 0 ≤ λ < 1. Figure 9 shows an example of how the value of
the synaptic eligibility trace changes depending on the spikes arrived at the synapse. Observe that
[t]
αi represents how recently and frequently spikes arrived from a pre-synaptic neuron i and can be
represented non-recursively as follows:
[t−1]
αi
=
t−d
X
s=−∞
15
[s]
λt−s−d xi .
(69)
Eligibility and spike values
2.5
2.0
1.5
1.0
0.5
0.00
5
10
15
Time (DyBM step)
20
Figure 9: The value of a synaptic or neural eligibility trace as a function of time. For a synaptic
eligibility trace at a synapse, the bars represent the spikes arrived from a FIFO queue at that synapse.
For a neural eligibility trace at a neuron, the bars represent the spikes generated by that neuron.
Each neuron in a DyBM stores a quantity called a neural eligibility trace5 . The value of the neural
eligibility increases when the neuron fires; otherwise, it is decreased by a constant factor. Specifically,
[t]
at time t, the value of the neural eligibility trace, γi , at a neuron i is updated as follows:
[t]
[t−1]
γi = µ (γi
[t]
+ xi ),
(70)
[t]
where µ is a decay rate and satisfies 0 ≤ µ < 1. Observe that γi represents how recently and frequently
the neuron i has fired and can be represented non-recursively as follows:
[t−1]
γi
=
t−1
X
[s]
µt−s xj
(71)
s=−∞
A neuron in a DyBM fires according to the probability distribution that depends on the energy of
the DyBM. A neuron is more likely to fire when the energy becomes lower if it fires than otherwise.
[t]
Let Eθ,j xj |x[<t] be the energy associated with a neuron j at time t, which can depend on whether
[t]
j fires at time t (i.e., xj ) as well as the preceding spiking activities of the neurons in the DyBM (i.e.,
x[<t] ). The firing probability of a neuron j is then given by
[t]
Pθ,j (xj |x[<t] )
=
[t]
exp − Eθ,j (xj |x[<t] )
X
exp − Eθ,j (x̃|x[<t] )
(72)
x̃∈{0,1}
[t]
[t]
for xj ∈ {0, 1}. Specifically, Eθ,j xj |x[<t] can be represented as follows:
[t]
[t]
[t]
[t]
LTP
LTD
Eθ,j xj |x[<t] = −bj xj + Eθ,j
xj |x[<t] + Eθ,j
xj |x[<t] ,
(73)
where bj is the bias parameter of a neuron j and represents how likely j spikes (j is more likely to fire
4 This
5 We
section closely follows [27].
assume a single neural eligibility trace, as opposed to multiple ones in [32], at each neuron.
16
if bj has a large positive value), and we define
N
X
[t]
[t−1] [t]
LTP
Eθ,j
xj |x[<t] ≡ −
ui,j αi
xj
(74)
i=1
N
N
X
X
[t]
[t−1] [t]
[t−1] [t]
LTD
Eθ,j
xj |x[<t] ≡
vi,j βi
xj +
vj,k γk
xj ,
i=1
(75)
k=1
[t−1]
where βi
represents how soon and frequently spikes will arrive at the synapse from the FIFO queues
from i to j:
[t−1]
βi
≡
t−1
X
[s]
µs−t xi .
(76)
s=t−d+1
[t−1]
[t−1]
Although βi
can also be represented in a recursive manner, recursively computed βi
is prone to
numerical instability.
In (74), the summation with respect to i is over all of the pre-synaptic neurons that are connected to
j. Here, ui,j is the weight parameter from i to j and represents the strength of Long Term Potentiation
(LTP). This weight parameter is thus referred to as LTP weight. A neuron j is more likely to fire
[t]
[t−1]
(xj = 1) when αi
is large for a pre-synaptic neuron i connected to j (spikes have recently arrived
at j from i) and the corresponding ui,j is positive and large (LTP from i to j is strong).
In (75), the summation with respect to i is over all of the pre-synaptic neurons that are connected
to j, and the summation with respect to k is over all of the post-synaptic neurons which j is connected
to. Here, vi,j represents the strength of Long Term Depression from i to j and referred to as LTD
weight. The neuron j is less likely to fire when βi is large for a pre-synaptic neuron i connected to j
(spikes will soon and frequently reach j from i) and the corresponding vi,j is positive and large (LTD
from i to j is strong). The second term in (75) represents that a pre-synaptic neuron j is less likely to
fire if a post-synaptic neuron has recently and frequently fired (γk is large), and the strength of this
LTD is given by vj,k . Notice that the timing of a spike is measured with respect to when the spike
reaches synapse, where the spike from a pre-synaptic neuron has the delay d, and the spike from a
post-synaptic neuron reaches immediately.
The learning rule of the DyBM has been derived in a way that it maximizes the log likelihood of
given time-series with respect to the probability distribution given by (72) [32]. Specifically, at time t,
the DyBM updates its parameters according to
[t]
[t]
bj ← bj + η xj − Eθ,j [Xj | x[<t] ]
(77)
[t−1]
[t]
[t]
ui,j ← ui,j + η αi
xj − Eθ,j [Xj | x[<t] ]
(78)
[t]
[t]
[t−1]
[t]
[t]
[t−1]
hXi i − xi
(79)
vi,j ← vi,j + η βi
Eθ,j [Xj | x[<t] ] − xj + η γj
[t]
for each of neurons i and j, where η is a learning rate, xj is the training data given to j at time t,
[t]
[t]
and Eθ,j [Xj | x[<t] ] denotes the expected value of xj (i.e., firing probability of a neuron j at time
t) according to the probability distribution given by (72). By following stochastic gradient methods
[6, 18, 10, 41, 33], the learning rate η may be adjusted over time t.
5.1.3
Relation to spike-timing dependent plasticity6
In spike-timing dependent plasticity (STDP), the amount of the change in the weight between two
neurons that fired together depends on the precise timings when the two neurons fired. STDP supplements the Hebbian rule [11] and has been experimentally confirmed in biological neural networks
[5].
6 This
section closely follows [27].
17
[t]
In (78), ui,j is increased (LTP gets stronger) when xj = 1 is given to j. Then j becomes more
[·]
likely to fire when spikes from i have recently and frequently arrived at j (i.e., αi is large). This
[t−1]
amount of the change in ui,j depends on αi
, exhibiting a key property of STDP. In particular, ui,j
is increased by a large amount if spikes from i have recently and frequently arrived at j.
According to the second term on the right-hand side of (79), vi,j is increased (LTD gets stronger)
[t]
when xj = 0 is given to a post-synaptic neuron j. Then j becomes less likely to fire when spikes from
[·]
i are expected to reach j soon (i.e., βi is large). This amount of the change in vi,j is large if there
are spikes in the FIFO queue from i to j and they are close to j. According to the last term of (79),
[t]
vi,j is increased when xi = 0 is given to the pre-synaptic i, and this amount of the change in vi,j is
proportional to γj (i.e., how frequently and recently the post-synaptic j has fired). This learning rule
of (79) thus exhibits some of the key properties of LTD with STDP.
[t]
In (77), bj is increased when xj = 1 is given to j, so that j becomes more likely to fire (in
accordance with the training data), but the amount of the change in bj is small if j is already likely
[t]
[t]
to fire (Eθ,j [Xj | x[<t] ] ≈ 1). This dependency on Eθ,j [Xj | x[<t] ] can be considered as a form of
homeostatic plasticity [42, 20].
Related work There has been a significant amount of the prior work towards understanding STDP
from the perspectives of machine learning [26, 4, 35]. For example, Nessler et al. show that STDP
can be understood as approximating the expectation maximization (EM) algorithm [26]. Nessler et
al. study a particularly structured (winner-take-all) network and its learning rule for maximizing the
log likelihood of given static patterns. On the other hand, the DyBM does not assume particular
structures in the network, and the learning rule having the properties of STDP applies for any synapse
in the network. Also, the learning rule of the DyBM maximizes the log likelihood of given time-series,
and its learning rule does not involve approximations beyond what is assumed in stochastic gradient
methods [6].
5.2
Giving flexibility to the DyBM7
It has been shown in [32] that the DyBM in Section 5.1 has the capability of associative memory and
anomaly detection for sequential patterns, but the applications of the DyBM have been limited to
simple tasks with relatively low dimensional time-series. In [27], we relax some of the constraints of
this DyBM in a way that it gives more flexibility that is useful for learning and inference.
Specifically, observe that the first term on the right-hand side of (75) can be rewritten with the
[t−1]
definition of βi
in (76) as follows:
N
X
[t−1]
vi,j βi
[t]
xj =
i=1
N
X
t−1
X
[s]
[t]
vi,j µs−t xi xj
(80)
i=1 s=t−d+1
=
N X
d−1
X
[δ]
[t−δ]
vi,j xi
[t]
xj ,
(81)
i=1 δ=1
[δ]
[δ]
where we let vi,j ≡ vi,j µ−δ . Here, vi,j represents how unlikely j fires at time t if i fired at time
[δ]
t − δ. The parametric form of vi,j ≡ vi,j µ−δ assumes that this LTD weight decays geometrically as
the interval, δ, between the two spikes increases.
[δ]
In the following, we relax this constraint on vi,j for δ = 1, . . . , d − 1 and assumes that these LTD
weights can take independent values. Then the energy of the DyBM with N neurons can be represented
7 This
section closely follows [27].
18
conveniently with matrix and vector operations:
Eθ (x[t] |x[<t] ) ≡
N
X
[t]
Eθ,j (xj |x[<t] )
(82)
j=1
[t−1] >
− b> x[t] − (αλ
) U x[t] +
d−1
X
(x[t−δ] )> V[δ] x[t] + (x[t] )> V γµ[t−1] ,
(83)
δ=1
where b ≡ (bj )j=1,...,N is a vector, U ≡ (ui,j )(i,j)∈{1,...,N }2 is a matrix, and other boldface letters are
[t−1]
defined analogously (a vector is lowercase and a matrix is uppercase). For eligibility traces (αλ
and
[t−1]
γµ ), we append the subscript to explicitly represent the dependency on the decay rate (λ and µ).
The functional form of the energy completely determines the dynamics of a DyBM, and relaxing its
constraints allows the DyBM to represent a wider class of dynamical systems.
Notice that the last term of (83) can be divided into two terms:
(x[t] )> V γµ[t−1] = (γµ[t−1] )> V x[t]
(84)
= (α[t−1]
)> V x[t] +
µ
d−1
X
(x[t−δ] )> V̂[δ] x[t] ,
(85)
δ=1
[t−1]
is the same as the vector of synaptic eligibility traces but with the decay rate µ, and
where αµ
V̂[δ] ≡ µ−δ V. Comparing (85) and (83), we find that, without loss of generality, the energy of the
DyBM can be represented with the following form:
[t]
Eθ (x |x
[<t]
d−1
L
X
X
[t−1] > [`]
>
[t−δ] >
[δ]
)=− b +
(x
) W +
(αλ` ) U
x[t] ,
δ=1
(86)
`=1
where we define W[δ] = −V[δ] − V̂[δ] . The energy in (86) reduces to the original energy in (73) when
W[δ] = −µ−δ V − µδ V> , U[1] = U, U[2] = −µd V> , λ1 = λ, λ2 = µ, and L = 2. With L > 2, one
can also incorporate multiple synaptic or neural eligibility traces with varying decay rates in [32].
Equivalently, we can represent the energy using neural eligibility traces, γµ` , instead of synaptic
eligibility traces, αλ` , as follows:
[t]
Eθ (x |x
[<t]
d−1
L
X
X
>
[t−δ] >
[δ]
[t−1] >
)=− b +
(x
) W +
(γµ` ) V` x[t] .
δ=1
5.2.1
(87)
`=1
Learning rule in vector-matrix notations
The learning rule corresponding to the representation with (86) is as follows:
b ← b + η (x[t] − Eθ [X [t] | x[<t] ])
W
[δ]
U
[`]
←W
←U
[δ]
[`]
+ηx
+
[t−δ]
[t−1]
η αλ`
(x
(x
[t]
[t]
− Eθ [X
− Eθ [X
[t]
[t]
(88)
|x
|x
[<t]
[<t]
>
])
>
])
(89)
(90)
for each δ and each `, where Eθ [X [t] | x[<t] ] is the conditional expectation with respect to
exp(−Eθ (x[t] | x[<t] ))
.
Pθ (x[t] | x[<t] ) = X
exp(−Eθ (x̃[t] | x[<t] ))
x̃[t]
19
(91)
Specifically,
Eθ [X [t] | x[<t] ] =
exp(m[t] )
1 + exp(m[t] )
(92)
with
[t]
m
>
≡b +
d−1
X
(x
[t−δ] >
) W
[δ]
+
L
X
δ=1
[t−1] >
(αλ`
) U[`] ,
(93)
`=1
where exponentiation and division of vectors are elementwise.
The form of (92) implies that the DyBM is a kind of a logit model, where the feature vector,
[t−1]
[t−1]
[t−d+1]
(x
, . . . , x[t−1] , αλ , αµ ), depends on the prior values, x[<t] , of the time-series. By applying
the learning rules given in (77)-(79) to given time-series, we can learn the parameters of the DyBM
or equivalently the parameters of the logit model (i.e., b, W[δ] for δ = 1, . . . , d − 1, and U[`] for
` = 1, . . . , L) in (92).
5.3
Dynamic Boltzmann machines for real-valued time-series
5.3.1
Gaussian dynamic Boltzmann machines8
In this section, we show how a DyBM can deal with real-valued time-series in the form of a Gaussian
[t]
DyBM [27, 8]. A Gaussian DyBM assumes that xj follows a Gaussian distribution for each j:
(j) [t]
pθ (xj |x[<t] )
[t]
[t] 2
xj − mj
exp −
=q
2 σj2
2
2 π σj
1
(94)
,
[t]
where mj is given by (93), and σj2 is a variance parameter. This Gaussian distribution is in contrast
to the Bernoulli distribution of the DyBM given by (72).
The conditional energy of the Gaussian DyBM can be represented as follows:
Eθ (x[t] | x[<t] ) =
[t]
[t]
N
X
(xj − mj )2
j=1
=
[t]
N
X
(xj − bj )2
j=1
(95)
2 σj2
2 σj2
−
N
N X
d−1 X
X
[t−δ]
xi
[δ]
[t]
wi,j xj −
N X
N
L X
X
[t−1]
[`]
[t]
αi,λ` ui,j xj + C,
(96)
`=1 i=1 j=1
δ=1 i=1 j=1
where C is the term that does not depend on x[t] . Because C is canceled out between the numerator
[δ]
and the denominator in (9), we omit it from the conditional energy. By letting Wσ be the matrix
[δ]
[`]
[`]
whose (i, j)) element is wi,j /σj2 and Uσ be the matrix whose (i, j)) element is ui,j /σj2 , the conditional
energy of the Gaussian DyBM can be represented as follows:
Eθ (x[t] | x[<t] ) =
[t]
N
X
(xj − bj )2
j=1
2 σj2
−
d−1
L
X
X
[t−1]
[t]
(x[t−δ] )> Wσ[δ] x[t] −
(αλ` )> U[`]
σ x .
δ=1
(97)
`=1
The conditional energy of the Gaussian DyBM may be compared against the energy of the Gaussian
Bernoulli restricted Boltzmann machine (see [19] or (181) from [28]).
8 This
section closely follows [27].
20
We now derive a learning rule for the Gaussian DyBM in a way that it maximizes the log-likelihood
of given time-series x:
X
log pθ (x[t] |x[<t] ) =
N
XX
t
t
[t]
log pi (xi |x[−∞,t−1] ),
(98)
i=1
where the summation over t is over all of the time steps of x, and the conditional independence between
[t]
[t]
xi and xj for i 6= j given x[<t] is the fundamental property of the DyBM as shown in [32].
The approach of stochastic gradient is to update the parameters of the Gaussian DyBM at each
step, t, according to the gradient of the conditional probability density of x[t] :
∇ log pθ (x[t] |x[<t] ) = −
N
X
1
i=1
2
[t]
∇ log σi2 + ∇
[t]
xi − mi )2
,
2 σi2
(99)
where the equality follow from (94). From (99) and (93), we can derive the derivative with respect to
each parameter as follows:
[t]
[t]
xj − µj [t]
∂
xj
log pθ (x[t] |x[−∞,t−1] ) =
∂bj
σj2
[t]
(100)
[t]
xj − µj [t−1]
∂
log pθ (x[t] |x[−∞,t−1] ) =
αi,j
∂ui,j
σj2
∂
[δ]
∂wi,j
[t]
log pθ (x[t] |x[−∞,t−1] ) =
(101)
[t]
xj − µj [t−δ]
xi
σj2
(102)
[t] 2
[t]
xj − µj
∂
1
log pθ (x[t] |x[−∞,t−1] ) = − +
∂σj
σj
σj3
,
(103)
where δ ∈ {1, . . . , d − 1}, ` ∈ {1, . . . , }, and i, j ∈ {1, . . . , N }.
These parameters are thus updated with learning rate η as follows:
x[t] − m[t]
σ2
2
[t]
x − m[t] − σ 2
σ ←σ+η
σ3
b←b+η
(104)
(105)
!>
W[δ] ← W[δ] + η x[t−δ]
[t−1]
U[`] ← U[`] + η αλ`
x[t] − m[t]
σ2
!>
x[t] − m[t]
σ2
(106)
(107)
where division and exponentiation of vectors are elementwise, and m[t] is given by (93).
The maximum likelihood estimator of x[t] by the Gaussian DyBM is given by m[t] in (93). The
Gaussian DyBM can thus be understood as a modification to the standard vector autoregressive (VAR)
model. Specifically, the last term in the right-hand side of (93) involves eligibility traces, which can
be understood as features of historical values, x(−∞,t−d] , and are added as new variables to the VAR
model. Because the value of the eligibility traces can depend on the infinite past, the Gaussian DyBM
can take into account the history beyond the lag d − 1.
21
5.3.2
Natural gradients9
In this section, we study a learning rule based on natural gradient for the Gaussian DyBM. Consider
a stochastic model that gives the probability density of a pattern x as pθ (x). With natural gradients
[3], the parameters, θ, of the stochastic model are updated as follows:
θt+1 = θt − η G−1 (θt ) ∇ log pθ (x)
(108)
at each step t, where η is the learning rate, and G(θ) denotes the Fisher information matrix:
Z
G(θ) ≡ pθ (x) ∇ log pθ (x) ∇ log pθ (x)> dx.
(109)
Due to the conditional independence in (98), it suffices to derive a natural gradient for each Gaussian
unit. Here, we consider the parametrization with mean m and variance v ≡ σ 2 . The probability density
function of a Gaussian distribution is represented with this parametrization as follows:
(x − m)2
1
exp −
.
(110)
p(x; m, v) = √
2v
2π v
The log likelihood of x is then given by
log p(x; m, v) = −
(x − m)2
1
1
− log v − log 2π.
2v
2
2
(111)
Hence, the gradient and the inverse Fisher information matrix in (108) are given as follows:
!
∇ log pθ (x) =
G−1 (θ) =
x−m
v
(x−m)2
1
− 2v
2
2v
−1
1
0
v
0 2v12
(112)
=
0
2v 2
v
0
(113)
,
The parameters θt ≡ (mt , vt ) are then updated as follows:
mt+1 = mt + η (x − mt )
(114)
2
vt+1 = vt + η (x − mt ) − vt .
(115)
[t]
In the context of a Gaussian DyBM, the mean is given by (93), where mj is linear with respect
[`]
to bj , wi,j , and ui,j . Also, the variance is given by σj2 . Hence, the natural gradient gives the learning
rules for these parameters as follows:
b ← b + η (x[t] − m[t] )
2
σ 2 ← σ 2 + η x[t] − m[t] − σ 2
(117)
W[δ] ← W[δ] + η x[t−δ] (x[t] − m[t] )>
(118)
[t−1]
η αλ`
(119)
U[`] ← U[`] +
(x[t] − m[t] )> ,
(116)
where the exponentiation of a vector is elementwise. We can compare (116)-(119) against what the
standard gradient gives in (104)-(107).
9 This
section closely follows [27].
22
5.3.3
Using nonlinear features in Gaussian DyBMs
The Gaussian DyBM is a linear model and has limited capability in modeling complex time-series. A
way to take into account non-linear features of time-series with a Gaussian DyBM is to apply nonlinear mapping to input time-series and feed the resulting non-linear features as additional input to
the Gaussian DyBM. An example of such non-linear mapping is an echo state network (ESN) [16].
An ESN maps an input sequence, x, into ψ recursively as follows:
(120)
ψ [t] = (1 − ρ) ψ [t−1] + ρ tanh Wrec ψ [t−1] + Win x[t] ,
where Wrec and Win are randomly chosen and fixed parameters10 , and ρ is a leak parameter satisfying
0 < ρ < 1. In (120), tanh is a hyperbolic tangent function but may be replaced with other nonlinear
functions such as a sigmoid function.
An eligibility trace may be considered as a linear counterpart of the nonlinear features created by
an ESN. Because these features are generated by mappings with fixed parameters and just given as
input to a Gaussian DyBM, the learning rules for the Gaussian DyBM stay unchanged. The nonlinear
DyBM in [8] uses an ESN in a slightly different manner.
5.4
Functional dynamic Boltzmann machines
We now review a functional DyBM, which models time-series of functions (patterns over a continuous
space Z) [17]. Recall that a Gaussian DyBM defines the conditional distribution of the next real-valued
vector given the preceding sequence of real-valued vectors. A functional DyBM defines the conditional
distribution of the next function (i.e., g [t] ) given the preceding sequence of partial observations of
[s]
preceding functions. At each time s, a set of points Z [s] ≡ (zi )i=1,...,Ns is observed, where Ns is the
number of points that are observed at s.
The functional DyBM assumes that the conditional distribution of g [t] (·) is given by a Gaussian
process, whose mean µ[t] (·) varies over time depending on preceding functions as follows:
µ[t] (z) = b(z) +
d−1 Z
X
δ=1
w[δ] (z, z 0 ) g [t−δ] (z 0 ) dz 0 +
Z
L Z
X
`=1
[t−1]
Z
u` (z, z 0 ) α`
(z 0 ) dz 0
(121)
for x ∈ Z, where b(·) is a functional bias, w[δ] (·, ·) and u` (·, ·) are functional weight for each δ and for
each `, and
[t−1]
α`
(·) =
t−d
X
λ`t−s−d g [s] (·)
(122)
s=−∞
is a functional eligibility trace for each `. The covariance kσ2 (·, ·) of the Gaussian process consists of
two components such that
kσ2 (z, z 0 ) = k(z, z 0 ) + σ 2 δ(z, z 0 ),
(123)
where k(·, ·) is a arbitrary kernel, δ(·, ·) is a delta function, and σ is a hyperparameter.
For tractability, Kajino proposes particular parametrization for the functional bias and functional
weight [17]. Let P = (p1 , . . . , pM ) be a set of arbitrarily selected M points in Z
b(z) = kσ2 (z, P ) b
[δ]
0
(124)
w (z, z ) = kσ2 (z, P ) W
0
u` (z, z ) = kσ2 (z, P ) U
10 The
spectral radius of Wrec is set smaller than 1.
23
0
(125)
kσ2 (P, z )
(126)
[δ]
[`]
kσ2 (P, z )
0
for each δ and each `, where
kσ2 (z, P ) ≡ (kσ2 (z, pi ))i=1,...,M
(127)
kσ2 (P, z 0 ) ≡ (kσ2 (pi , z 0 ))i=1,...,M
(128)
is a row vector, and
is a column vector.
Because g [t] is in the reproducing kernel Hilbert space with kernel kσ2 , substituting (124)-(126)
into (121) gives the following expression:
d−1
L
X
X
[t]
[t−1]
µθ (z) = kσ2 (z, P ) b +
W[δ] g [t−δ] (P ) +
U[`] α` (P ) ,
δ=1
(129)
`=1
where g [t−δ] (P ) is a column vector with i-th element being g [t−δ] (pi ), and the eligibility-trace vector
[t−1]
α` (P ) can be recursively updated as follows:
[t]
[t−1]
α` (P ) = λ` α`
(P ) + g [t−d+1] (P ) .
(130)
Here, we use θ ≡ (b, W[1] , . . . , W[d−1] , U[1] , . . . , U[L] ) to collectively denote the parameters.
While g [s] (pi ) for i ∈ [1, M ] is not observed, Kajino uses a maximum a posteriori (MAP) estimator
[s]
ĝ (pi ) in [17]:
[s]
[t]
ĝ [s] (pi ) = µθ (pi ) + k(pi , Z [t] ) kσ2 (Z [t] , Z [t] )−1 g [t] (Z [t] ) − µθ (Z [t] )) ,
[t]
[t]
(131)
[t]
where kσ2 (Z [t] , Z [t] ) is an Ns × Ns matrix with (i, j)-th element being kσ2 (zi , zj ), and µθ (Z [t] ) is a
column vector defined analogously to g [t] (Z [t] ).
The objective of learning a functional DyBM is to maximize the log likelihood of observed values.
The conditional probability density of the functional values of locations Z [t] at time t is given by
1
>
[t]
[t]
pθ (g [t] (Z [t] ) | g [<t] ) ∼ exp − g [t] (Z [t] ) − µθ (Z [t] ) kσ2 (Z [t] , Z [t] )−1 g [t] (Z [t] ) − µθ (Z [t] ) .
2
(132)
The objective is thus to maximize
X
f (θ) ≡
ft (θ),
(133)
t
where
ft (θ) ≡ log pθ (g [t] (Z [t] ) | g [<t] )
>
1
[t]
[t]
= − g [t] (Z [t] ) − µθ (Z [t] ) kσ2 (Z [t] , Z [t] )−1 g [t] (Z [t] ) − µθ (Z [t] ) + C,
2
(134)
(135)
where C is the term independent of θ.
The gradient of ft (θ) is given by
[t]
[t]
∇ft (θ) = ∇µθ (Z [t] )> kσ2 (Z [t] , Z [t] )−1 g [t] (Z [t] ) − µθ (Z [t] ) ,
24
(136)
𝐙𝛿
𝐡 𝑡−𝛿
𝐙1
𝐡 𝑡−1
𝐡𝑡
𝐕1
𝐕𝛿
𝐔𝛿
𝐱 𝑡−𝛿
𝐔1
𝐱 𝑡−1
𝐖1
𝐱𝑡
𝐛
𝐖𝛿
Figure 10: A dynamic Boltzmann machine with hidden units (modified Figure 1 from [30]).
where (129) gives
∂ [t] [t] >
µ (Z ) = kσ2 (pi , Z [t] )
∂bi θ
∂
[t]
µ (Z [t] )> = kσ2 (pi , Z [t] ) g [t−δ] (pj )
[δ] θ
∂wi,j
∂
[t]
[`]
∂ui,j
[t−1]
µθ (Z [t] )> = kσ2 (pi , Z [t] ) α`
(137)
(138)
(pj )
(139)
for each i, j, δ, `.
The gradient implies the following learning rule with stochastic gradient:
[t]
b ← b + η kσ2 (P, Z [t] ) kσ2 (Z [t] , Z [t] )−1 g [t] (Z [t] ) − µθ (Z [t] )
W
[δ]
←
U[`] ←
[t]
W + η kσ2 (P, Z ) kσ2 (Z , Z )
g (Z ) − µθ (Z [t] ) g [t−δ] (P )>
[t−1]
[t]
U[`] + η kσ2 (P, Z [t] ) kσ2 (Z [t] , Z [t] )−1 g [t] (Z [t] ) − µθ (Z [t] ) α` (P )> ,
[δ]
[t]
[t]
[t] −1
[t]
[t]
(140)
(141)
(142)
where η is a learning rate, and g [t−δ] (P ) is estimated with the MAP estimator ĝ [t−δ] (P ) in (131).
5.5
Dynamic Boltzmann machines with hidden units11
In this section, we study a DyBM with hidden units (see Figure 10). Each layer of this DyBM
corresponds to a time t − δ for 0 ≤ δ < ∞ and has two parts: visible and hidden. The visible part
x[t−δ] at the δ-th layer represents the values of the time-series at time t − δ. The hidden part h[t−δ]
represents the values of hidden units at time t−δ. Here, units within each layer do not have connections
to each other. We let x[<t] ≡ (x[s] )s<t and define h[<t] analogously.
The Boltzmann machine in Figure 10 has bias parameter b and weight parameter (U, V, W, Z).
Let θ ≡ (V, W, b) be the parameters connected to visible units x[t] (from the units in the past, x[s] or
h[s] for s < t) and φ ≡ (U, Z). The conditional energy of this Boltzmann machine is given as follows:
Eθ,φ (x[t] , h[t] | x[<t] , h[<t] ) = Eθ (x[t] | x[<t] , h[<t] ) + Eφ (h[t] | x[<t] , h[<t] ),
11 This
section closely follows [30].
25
(143)
where we define
Eθ (x[t] | x[<t] , h[<t] ) = −b> x[t] −
Eθ (h[t] | x[<t] , h[<t] ) = −b> h[t] −
∞
X
(x[t−δ] )> W[δ] x[t] −
∞
X
(h[t−δ] )> V[δ] x[t]
(144)
(h[t−δ] )> Z[δ] h[t] .
(145)
δ=1
∞
X
δ=1
∞
X
δ=1
δ=1
(x[t−δ] )> U[δ] h[t] −
and assume the following parametric form for δ ≥ d:
W[δ] = λδ−d W[d]
V
[δ]
Z
[δ]
U
[δ]
=λ
δ−d
=λ
δ−d
=λ
δ−d
(147)
[d]
(148)
[d]
(149)
V
Z
(146)
[d]
U ,
where λ is a decay rate satisfying 0 ≤ λ < 1. Then the conditional energy can be represented as
follows:
Eθ (x[t] | x[<t] , h[<t] )
= −b> x[t] −
d−1
X
(x[t−δ] )> W[δ] x[t] −
d−1
X
(h[t−δ] )> V[δ] x[t] − (α[t−1] )> W[d] x[t] − (β [t−1] )> V[d] x[t] ,
δ=1
δ=1
(150)
Eφ (h[s] | x[<s] , h[<s] )
=−
d−1
X
δ=1
(x[s−δ] )> U[δ] h[s] −
d−1
X
(h[s−δ] )> Z[δ] h[s] − (α[s−1] )> U[d] h[s] − (β [s−1] )> Z[d] h[s] .
(151)
δ=1
where α[t−1] corresponds to the eligibility trace in the DyBM in (69), and we define an eligibility trace
β [t−1] for the hidden part analogously:
α
[t−1]
≡
β [t−1] ≡
∞
X
δ=d
∞
X
λδ−d x[t−δ]
(152)
λδ−d h[t−δ] .
(153)
δ=d
The energy in (150)-(151) gives the conditional probability distribution over x[t] and h[t] given x[<t]
and h[<t] . Specifically, we have
exp(−Eθ (x[t] | x[<t] , h[<t] ))
Pθ (x[t] | x[<t] , h[<t] ) = X
exp(−Eθ (x̃[t] | x[<t] , h[<t] ))
(154)
x̃[t]
exp(−Eφ (h[s] | x[<s] , h[<s] ))
Pφ (h[s] | x[<s] , h[<s] ) = X
exp(−Eφ (h̃[s] | x[<s] , h[<s] ))
h̃[t]
for any binary vectors x[t] and h[t] .
26
(155)
5.5.1
Learning a dynamic Boltzmann machine with hidden units
The DyBM with hidden units gives the probability of a time-series, x ≡ (x[t] )t=`,...,u , by
Pθ,φ (x) =
X
Pφ (h̃ | x)
u
Y
Pθ (x[t] | x[<t] , h̃[<t] )
(156)
t=`
h̃
P
where h̃ denotes the summation over all of the possible values of hidden units from time t = ` to
t = u, and
Pφ (h̃ | x) ≡
u
Y
Pφ (h̃[s] | x[<s] , h̃[<s] ),
(157)
s=`
where we arbitrarily define x[s] = 0 and h̃[s] = 0 for s < `.
We seek to maximize the log likelihood of a given x by maximizing a lower bound given by Jensen’s
inequality:
log Pθ,φ (x) = log
X
Pφ (h̃ | x)
X
Pφ (h̃ | x) log
X
Pφ (h̃ | x)
u
Y
Pθ (x[t] | x[<t] , h̃[<t] )
(159)
u
X
log Pθ (x[t] | x[<t] , h̃[<t] )
(160)
t=`
h̃
=
(158)
t=`
h̃
=
Pθ (x[t] | x[<t] , h̃[<t] )
t=`
h̃
≥
u
Y
u X
X
Pφ (h̃[<t] | x[<t−1] ) log Pθ (x[t] | x[<t] , h̃[<t] )
t=` h̃[<t]
≡ Lθ,φ (x),
(161)
where the summation with respect to h̃[<t] is over all of the possible values of h̃[s] for s ≤ t − 1, and
[<t]
Pφ (h̃
|x
[<t−1]
)≡
t−1
Y
Pφ (h̃[s] | x[<s] , h̃[<s] ).
(162)
s=`
Learning weight to visible units The gradient of the lower bound with respect to θ is then given
by
∇θ Lθ,φ (x) =
u X
X
t=`
Pφ (h̃[<t] | x[<t−1] ) ∇θ log Pθ (x[t] | x[<t] , h̃[<t] ).
(163)
h̃[<t]
The right-hand side of (163) is a summation of expected gradients, which suggests a method of stochastic gradient. Namely, at each step t, we sample H [t−1] (ω) according to Pφ (h[t−1] | x[<t−1] , h[<t−1] )
and update θ on the basis of
∇θ log Pθ (x[t] | x[<t] , H [<t] (ω)).
(164)
This learning rule is equivalent to the one for the model where all of the units are visible, except
that the values for the hidden units are given by sampled values. Therefore, the learning rule for θ
27
follows directly from Section 5.1.2:
b ← b + η x[t] − Eθ X [t] | x[<t] , H [<t] (ω)
>
W[d] ← W[d] + η α[t−1] x[t] − Eθ X [t] | x[<t] , H [<t] (ω)
>
V[d] ← V[d] + η β [t−1] (ω) x[t] − Eθ X [t] | x[<t] , H [<t] (ω)
>
W[δ] ← W[δ] + η x[t−δ] x[t] − Eθ X [t] | x[<t] , H [<t] (ω)
>
V[δ] ← V[δ] + η H [t−δ] (ω) x[t] − Eθ X [t] | x[<t] , H [<t] (ω)
(165)
(166)
(167)
(168)
(169)
for 1 ≤ δ < d, where Eθ [X [t] | x[<t] , H [<t] (ω)] denotes the conditional expectation with respect to
Pθ (· | x[<t] , H [<t] (ω)), and we make explicit that β [s−1] is computed with sampled hidden values:
β [s−1] (ω) =
∞
X
λδ−d H [s−δ] (ω).
(170)
δ=d
Now we take the gradient of Lθ,φ (x) with respect to φ:
Learning weight to hidden units
∇φ Lθ,φ (x) =
u X
X
∇φ pφ (h̃[<t] | x[<t−1] ) log pθ (x[t] | x[<t] , h̃[<t] ),
(171)
t=` h̃[<t]
where
∇φ pφ (h̃[<t] | x[<t−1] ) = ∇φ
t−1
Y
pφ (h̃[s] | x[<s] , h̃[<s] )
(172)
s=`
=
t−1
X
∇φ log pφ (h̃[s] | x[<s] , h̃[<s] )
t−1
Y
0
0
0
pφ (h̃[s ] | x[<s ] , h̃[<s ] )
s0 =`
s=`
= pφ (h̃[<t] | x[<t−1] )
t−1
X
∇φ log pφ (h̃[s] | x[<s] , h̃[<s] ).
(173)
s=`
Plugging (173) into the right-hand side of (171), we obtain
∇φ Lθ,φ (x) =
u X
X
pφ (h̃[<t] | x[<t−1] ) log pθ (x[t] | x[<t] , h̃[<t] )
t=` h̃[<t]
t−1
X
∇φ log pφ (h̃[s] | x[<s] , h̃[<s] ).
s=`
(174)
Similar to (163), the expression of (174) suggests a method of stochastic gradient: at each time t, we
sample H [t−1] (ω) according to pφ (h[t−1] | x[<t−1] ) and update φ on the basis of the following stochastic
gradient:
log pθ (x[t] | x[<t] , H [<t] (ω)) Gt−1 ,
(175)
where
Gt−1 ≡
t−1
X
∇φ log pφ (H [s] (ω) | x[<s] , H [<s] (ω)).
s=`
28
(176)
The learning rules for U and Z are derived from (175)-(176) as follows:
U[d] ← U[d] + η log pθ (x[t] | x[<t] , h[<t] )
t−1
X
>
α[s−1] H [s] (ω) − Eφ H[s] | x[<s] , H [<s] (ω)
(177)
s=`
t−1
X
Z[d] ← Z[d] + η log pθ (x[t] | x[<t] , h[<t] )
>
β [s−1] (ω) H [s] (ω) − Eφ H [s] | x[<s] , H [<s] (ω)
(178)
s=`
U
[δ]
←U
[δ]
+ η log pθ (x
[t]
[<t]
|x
[<t]
,h
)
t−1
X
>
x[s−δ] H [s] (ω) − Eφ H[s] | x[<s] , H [<s] (ω)
(179)
s=`
Z[δ] ← Z[δ] + η log pθ (x[t] | x[<t] , h[<t] )
t−1
X
>
H [s−δ] (ω) H [s] (ω) − Eφ H [s] | x[<s] , H [<s] (ω)
s=`
(180)
for 1 ≤ δ < d, where Eφ [H [s] (ω) | x[<s] , H [<s] (ω)] denotes the conditional expectation with respect to
Pφ (· | x[<s] , H [<s] (ω)).
Computation of (174) involves mainly two interrelated inefficiencies. First, although (174) can be
approximately computed using sampled hidden values H [<t] (ω) in the same way as (163), the samples
cannot be reused after updating φ because it was sampled from the distribution with the previous
parameter. Second, since each summand of Gt−1 depends on φ, Gt−1 also has to be recomputed after
each update. Thus, the computational complexity of (175) grows linearly with respect to the length
of the time-series (i.e., t − `), in contrast to (164), whose complexity is independent of that length.
Observe in (175) that ∇φ Lθ,φ (x) consists of the products of log pθ (x[t] | x[<t] , H [<t] (ω)) and
∇φ log pφ (H [s] (ω) | x[<s] , H [<s] (ω)) for s < t. Without the dependency on log pθ (x[t] | x[<t] , H [<t] (ω)),
the parameter φ is updated in a way that H [s] (ω) is more likely to be generated (i.e., the learning rule
would be equivalent to that for visible units). Such an update rule is undesirable, because H [s] (ω) has
been sampled and is not necessarily what we want to sample again. The dependency on log pθ (x[t] |
x[<t] , H [<t] (ω)) suggests that φ is updated by a large amount if the sampled H [s] (ω) happens to make
the future values, x[t] for t > s, likely. Intuitively, weighting ∇φ log pφ (H [s] (ω) | x[<s] , H [<s] (ω)) by
log pθ (x[t] | x[<t] , H [<t] (ω)) for t > s is inevitable, because whether the particular values of hidden
units are good for the purpose of predicting future values will only be known after seeing future values.
Approximations
One could approximately compute (176) recursively:
Gt ← γ Gt−1 + (1 − γ)∇φ log pφ (H [t] (ω) | x[<t] , H [<t] (ω)),
(181)
where γ ∈ [0, 1) is a discount factor. The recursive update rule with γ < 1 puts exponentially small
weight γ t−s on ∇φ log pφ (H [s] (ω) | x[<s] , H [<s] (ω)) computed with an old value of φ (i.e., s t).
This recursively computed Gt is related to the momentum in gradient descent [33].
In (177)-(180), the value of Eφ [H [s] | x[<s] , H [<s] (ω)] is computed with the latest values of φ.
Let φ[t−1] be the value of φ immediately before step t. With the recursive computation of (181), the
29
learning rules of (177)-(180) are approximated with the following learning rules:
U[d] ← U[d] + η (1 − γ) log pθ (x[t] | x[<t] , H [<t] (ω))
t−1
X
>
γ t−1−s α[s−1] H [s] (ω) − Eφ[s−1] H [s] | x[<s] , H [<s] (ω)
(182)
s=`
Z[d] ← Z[d] + η (1 − γ) log pθ (x[t] | x[<t] , H [<t] (ω))
t−1
X
>
γ t−1−s β [s−1] H [s] (ω) − Eφ[s−1] H [s] | x[<s] , H [<s] (ω)
(183)
s=`
U[δ] ← U[δ] + η (1 − γ) log pθ (x[t] | x[<t] , H [<t] (ω))
t−1
X
>
γ t−1−s x[s−δ] H [s] (ω) − Eφ[s−1] H [s] | x[<s] , H [<s] (ω)
(184)
s=`
Z[δ] ← Z[δ] + η (1 − γ) log pθ (x[t] | x[<t] , H [<t] (ω))
t−1
X
>
γ t−1−s H [s−δ] (ω) H [s] (ω) − Eφ[s−1] H [s] | x[<s] , H [<s] (ω)
(185)
s=`
for 1 ≤ δ < d, where H [s] (ω) is a sample according to Pφ[s−1] (· | x[<s] , H [<s] (ω)) for each s. In
(182)-(182), the quantity such as
G0t−1 ≡
t−1
X
>
γ t−1−s α[s−1] H [s] (ω) − Eφ[s−1] H [s] | x[<s] , H [<s] (ω)
(186)
s=`
can be computed recursively as
>
G0t ← γ G0t−1 + (1 − γ) α[t−1] H [t] (ω) − Eφ[s−1] H [t] | x[<t] , H [<t] (ω)
.
(187)
In [30], we present an alternative approach of learning the DyBM with hidden units in a bidirectional
manner, where we consider a backward DyBM that shares the parameters of the (forward) DyBM. Our
key observation is that the parameters that are difficult to learn in the forward DyBM are relatively
easy to learn in the backward DyBM. By training both the forward DyBM and the backward DyBM,
we can effectively learn the parameters of the forward DyBM.
6
Conclusion
We have reviewed Boltzmann machines for time-series modeling. Such Boltzmann machines can be
used for prediction [8, 30, 17, 38, 7, 22] and anomaly detection based on observed time-series. They
may be also used to generate time-series such as human motion [40, 39, 38], music [22], and movies.
The use of Boltzmann machines is only one approach to modeling and learning time-series. Popular
time-series models include but not limited to recurrent neural networks [34], long short term memory
[15], autoregressive models, and hidden Markov models. As we have seen some of the examples, the
best time-series model for a particular application might be obtained by appropriately combining some
of existing time-series models.
Acknowledgments
This work was supported by JST CREST Grant Number JPMJCR1304, Japan. The author thanks
Diyuan Lu for pointing out several typographical errors in the original version.
30
References
[1] L. F. Abbott and S. B. Nelson. Synaptic plasticity: Taming the beast. Nature Neuroscience,
3:1178–1183, 2000.
[2] D. H. Ackley, G. E. Hinton, and T. J. Sejnowski. A learning algorithm for Boltzmann machines.
Cognitive Science, 9:147–169, 1985.
[3] S. Amari and H. Nagaoka. Methods of Information Geometry. Oxford University Press, 2000.
[4] Y. Bengio, T. Mesnard, A. Fischer, S. Zhang, and Y. Wu. STDP as presynaptic activity times
rate of change of postsynaptic activity. arXiv:1509.05936v2, 2016.
[5] G. Bi and M. Poo. Synaptic modifications in cultured hippocampal neurons: Dependence on spike
timing, synaptic strength, and postsynaptic cell type. Journal of Neuroscience, 18:10464–10472,
1998.
[6] L. Bottou. Online learning and stochastic approximations. In D. Saad, editor, On-Line Learning
in Neural Networks, chapter 2, pages 9–42. Cambridge University Press, 2009.
[7] N. Boulanger-Lewandowski, Y. Bengio, and P. Vincent. Modeling temporal dependencies in
high-dimensional sequences: Application to polyphonic music generation and transcription. In
Proceedings of the 29th International Conference on Machine Learning (ICML-12), pages 1159–
1166, 2012.
[8] S. Dasgupta and T. Osogami. Nonlinear dynamic Boltzmann machines for time-series prediction.
In The 31st AAAI Conference on Artificial Intelligence (AAAI-17), January 2017.
[9] S. Dasgupta, T. Yoshizumi, and T. Osogami. Regularized dynamic Boltzmann machine with delay
pruning for unsupervised learning of temporal sequences. In Proceedings of the 23rd International
Conference on Pattern Recognition, 2016.
[10] J. Duchi, E. Hazan, and Y. Singer. Adaptive subgradient methods for online learning and stochastic optimization. Journal of Machine Learning Research, 12:2121–2159, 2011.
[11] D. O. Hebb. The organization of behavior: A neuropsychological approach. Wiley, 1949.
[12] G. E. Hinton and A. D. Brown. Spiking Boltzmann machines. In Advances in Neural Information
Processing Systems 12, pages 122–128. November 1999.
[13] G. E. Hinton and R. Salakhutdinov. Reducing the dimensionality of data with neural networks.
Science, 313:504–507, 2006.
[14] G. E. Hinton and T. J. Sejnowski. Optimal perceptual inference. In Proc. IEEE Conference on
Computer Vision and Pattern Recognition, pages 448–453, June 1983.
[15] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–
1780, 1997.
[16] H. Jaeger and H. Haas. Harnessing nonlinearity: Predicting chaotic systems and saving energy in
wireless communication. Science, 304(5667):78–80, 2004.
[17] H. Kajino. A functional dynamic Boltzmann machine. In Proceedings of the International Joint
Conference on Artificial Intelligence (IJCAI-17), pages 1987–1993, 2017.
[18] D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. In Proceedings of the
International Conference on Learning Representations (ICLR), arXiv:1412.6980, 2015.
31
[19] A. Krizhevsky. Learning multiple layers of features from tiny images. Master’s thesis, Computer
Science Department, University of Toronto, Toronto, Canada, 2009.
[20] A. Lazar, G. Pipa, and J. Triesch. SORN: A self-organizing recurrent neural network. Frontiers
in Computational Neurosci., 3:Article 23, 2009.
[21] H. Lütkepohl. New Introduction to Multiple Time Series Analysis. Springer-Verlag Berlin Heidelberg, 2005.
[22] Q. Lyu, Z. Wu, and J. Zhu. Polyphonic music modelling with LSTM-RTRBM. In Proceedings of
the 23rd ACM international conference on Multimedia, pages 991–994, October 2015.
[23] T. Marks and J. Movellan. Diffusion networks, products of experts, and factor analysis. In
Proceedings of the Third International Conference on Independent Component Analysis and Blind
Source Separation, 2001.
[24] R. Memisevic and G. E. Hinton. Unsupervised learning of image transformations. In Proceedings
of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2007), pages 1–8,
2007.
[25] R. Mittelman, B. Kuipers, S. Savarese, and H. Lee. Structured recurrent temporal restricted
Boltzmann machines. In Proc. 31st Annual International Conference on Machine Learning (ICML
2014), pages 1647–1655, June 2014.
[26] B. Nessler, M. Pfeiffer, L. Buesing, and W. Maass. Bayesian computation emerges in generic
cortical microcircuits through spike-timing-dependent plasticity. PLoS Computational Biology,
9(4):e1003037.
[27] T. Osogami. Learning binary or real-valued time-series via spike-timing dependent plasticity.
CoRR, abs/1612.04897 (presented at Computing with Spikes NIPS 2016 Workshop, Barcelona,
Spain, December 2016), 2016.
[28] T. Osogami. Boltzmann machines and energy-based models. Technical Report RT0979, IBM
Research - Tokyo, 2017.
[29] T. Osogami and S. Dasgupta. Learning the values of the hyperparameters of a dynamic Boltzmann
machine. IBM Journal of Research and Development, 61(4/5):to appear, 2017.
[30] T. Osogami, H. Kajino, and T. Sekiyama. Bidirectional learning for time-series models with
hidden units. In Proceedings of the 34th International Conference on Machine Learning (ICML
2017), pages 2711–2720, August 2017.
[31] T. Osogami and M. Otsuka. Learning dynamic Boltzmann machines with spike-timing dependent
plasticity. Technical Report RT0967, IBM Research, 2015.
[32] T. Osogami and M. Otsuka. Seven neurons memorizing sequences of alphabetical images via
spike-timing dependent plasticity. Scientific Reports, 5:14149, 2015.
[33] N. Qian. On the momentum term in gradient descent learning algorithms. Neural Networks: The
Official Journal of the International Neural Network Society, 12(1):145–151, 1999.
[34] D. E. Rumelhart, G. E. Hinton, and R. J. Williams. Learning internal representations by error
propagation. In D. E. Rumelhart, J. L. McClelland, and PDP Research Group, editors, Parallel
Distributed Processing: Explorations in the Microstructure of Cognition, vol. 1: Foundations,
chapter 8. MIT Press, 1986.
[35] B. Scellier and Y. Bengio. Equilibrium propagation: Bridging the gap between energy-based
models and backpropagation. arXiv:1602.05179v4, 2016.
32
[36] B. Schrauwen and L. Buesing. A hierarchy of recurrent networks for speech recognition. In NIPS
Workshop on Deep Learning for Speech Recognition and Related Applications, 2009.
[37] I. Sutskever and G. E. Hinton. Learning multilevel distributed representations for high-dimensional
sequences. In Proceedings of the Eleventh International Conference on Artificial Intelligence and
Statistics (AISTATS-07), volume 2, pages 548–555. Journal of Machine Learning Research - Proceedings Track, 2007.
[38] I. Sutskever, G. E. Hinton, and G. W. Taylor. The recurrent temporal restricted Boltzmann
machine. In Advances in Neural Information Processing Systems 21, pages 1601–1608. December
2008.
[39] G. W. Taylor and G. E. Hinton. Factored conditional restricted Boltzmann machines for modeling
motion style. In Proc. 26th Annual International Conference on Machine Learning (ICML 2009),
pages 1025–1032, June 2009.
[40] G. W. Taylor, G. E. Hinton, and S. T. Roweis. Modeling human motion using binary latent
variables. In P. B. Schölkopf, J. C. Platt, and T. Hoffman, editors, Advances in Neural Information
Processing Systems 19, pages 1345–1352. MIT Press, 2007.
[41] T. Tieleman and G. E. Hinton. Lecture 6.5—Rmsprop: Divide the gradient by a running average
of its recent magnitude. COURSERA: Neural Networks for Machine Learning, 2012.
[42] G. G. Turrigiano and S. B. Nelson. Homeostatic plasticity in the developing nervous system.
Nature Rev. Neurosci., 5:97107, 2004.
[43] M. Welling, M. Rosen-Zvi, and G. E. Hinton. Exponential family harmoniums with an application
to information retrieval. In Advances in Neural Information Processing Systems 17, pages 1481–
1488. 2004.
33
| 9cs.NE
|
Cascade and locally dissipative realizations of linear quantum systems
for pure Gaussian state covariance assignment ⋆
arXiv:1604.03182v1 [quant-ph] 12 Apr 2016
Shan Ma a , Matthew J. Woolley a , Ian R. Petersen a , Naoki Yamamoto b
a School
of Engineering and Information Technology, University of New South Wales at the Australian Defence Force Academy, Canberra
ACT 2600, Australia
b Department
of Applied Physics and Physico-Informatics, Keio University, Yokohama 223-8522, Japan
Abstract
This paper presents two realizations of linear quantum systems for covariance assignment corresponding to pure Gaussian states. The
first one is called a cascade realization; given any covariance matrix corresponding to a pure Gaussian state, we can construct a cascaded
quantum system generating that state. The second one is called a locally dissipative realization; given a covariance matrix corresponding
to a pure Gaussian state, if it satisfies certain conditions, we can construct a linear quantum system that has only local interactions with
its environment and achieves the assigned covariance matrix. Both realizations are illustrated by examples from quantum optics.
Key words: Linear quantum system, Cascade realization, Locally dissipative realization, Covariance assignment, Pure Gaussian state.
1 Introduction
For stochastic systems, many of the performance objectives
are expressed in terms of the variances (or covariances) of
the system states. In a large space structure, for example,
the vibration at certain points on the structure must be reduced to an acceptable level. This objective in fact involves
keeping the variances of some variables such as deflections
within prescribed bounds. One way to achieve this is to assign an appropriate matrix value to the covariance of the
state vector. This method, referred to as covariance assignment, has been extensively studied in a series of papers by
Skelton and colleagues, e.g., in [1–3]. For linear stochastic systems with white noises, the covariance matrix can be
computed by solving the Lyapunov equation for the system.
In this case, the covariance assignment problem reduces to
designing system matrices such that the corresponding Lyapunov equation has a prescribed solution.
Turning our attention to the quantum case, we find that a
⋆ This work was supported by the Australian Research Council
and JSPS Grant-in-Aid No. 40513289. The material in this paper
was partially presented at the 2014 IEEE Conference on Control Applications (CCA), Oct. 8-10, 2014, Antibes, France. Corresponding author S. Ma. Tel. +61 2 62688818.
Email addresses: [email protected] (Shan Ma),
[email protected] (Matthew J. Woolley),
[email protected] (Ian R. Petersen),
[email protected] (Naoki Yamamoto).
Preprint submitted to Automatica
covariance matrix plays an essential role as well in the field
of quantum information. In particular for a linear quantum
system, the importance of a covariance matrix stands out,
because it can fully characterize the entanglement property,
which is indeed crucial for conducting quantum information
processing [4,5]. Therefore it should be of great use to investigate the covariance assignment problem for linear quantum
systems. In fact, there are several such proposals; [6] studies
a quantum feedback control problem for covariance assignment, and [7–10] analyze systems that generate a pure Gaussian state. Note that, since a Gaussian state (with zero mean)
is uniquely determined by its covariance matrix, the aforementioned covariance assignment problem is also known as
the Gaussian state generation problem; thus, if a linear quantum system achieves a covariance matrix corresponding to a
target Gaussian state, we call that the system generates this
Gaussian state.
Let us especially focus on Refs. [7–10], which provide the
basis of this paper. As mentioned before, in those papers
pure Gaussian states are examined, which are a particularly
important subclass of Gaussian states such that the highest
performance of Gaussian quantum information processing
can be realized [4, 5, 11, 12]. Then they provided several
methods to construct a stable linear quantum system generating a given pure Gaussian state. Moreover, conditions
for generating an arbitrary pure entangled Gaussian state are
given there; surely these are important results, because such
a state serves as an essential resource for Gaussian quan-
8 January 2018
tum information processing tasks. Of course in the literature several methods for generating various pure entangled
Gaussian states have been proposed. For instance, [13] gives
a systematic method to generate an arbitrary pure entangled
Gaussian state; the idea is to construct a coherent process by
applying a sequence of prescribed unitary operations (composed of beam splitters and squeezers in optics case) to an
initial state. Thus this method is essentially a closed-system
approach. In contrast, the approach we take here is an opensystem one; that is, we aim to construct dissipative processes
such that the system is stable and uniquely driven into a desired target pure Gaussian state. This strategy is categorized
into the so-called reservoir engineering method [14–18]; in
general, this approach has a clear advantage that the system
has good robustness properties with respect to initial states
and evolution time.
the cubic-phase gate or photon counting on that extracted
Gaussian state, we can realize, e.g., entanglement distillation
and universal quantum computation [5]. On the other hand, a
generated internal Gaussian state is not necessarily extracted
to outside for the purpose of precision measurement in the
scenario of quantum metrology; for instance a spin squeezed
state of an atomic ensemble can be directly used for ultraprecise magnetometry [30].
Notation. For a matrix A = [A jk ] whose entries A jk are
complex numbers or operators, we define A⊤ = [Ak j ],
A† = [A∗k j ], where the superscript ∗ denotes either the
complex conjugate of a complex number or the adjoint
of an operator. diag[τ1 , · · · , τn ] denotes an n × n diagonal matrix with τ j , j = 1, 2, · · · , n, on its main diagonal. PN is a 2N × 2N permutation matrix defined by
PN [x1 x2 x3 x4 · · · x2N ]⊤ = [x1 x3 · · · x2N−1 x2 x4 · · · x2N ]⊤
for any column vector [x1 x2 x3 x4 · · · x2N ]⊤ .
Now we describe the problem considered in this paper. The
methods developed in [7–10] lead to infinitely many linear
quantum systems that uniquely generate a target pure Gaussian state. Some of these systems are easy to implement,
while others are not. Then a natural question is how to find
a linear quantum system that is simple to implement, while
still uniquely generates the desired pure Gaussian state.
2 Preliminaries
We consider a linear quantum system G of N modes. Each
mode is characterized by a pair of quadrature operators
{q̂ j , p̂ j }, j = 1, 2, · · · , N. Collecting them into an operatorvalued vector x̂ , [q̂1 · · · q̂N p̂1 · · · p̂N ]⊤ , we write the
canonical commutation relations as
In this paper, we provide two convenient realizations of a
linear quantum system generating a target pure Gaussian
state. The first one is a cascade realization, which is a typical
system structure found in the literature [19–21]. We show
that, given any covariance matrix corresponding to a pure
Gaussian state, we can construct a cascaded quantum system
uniquely generating that state. This cascaded system is a
series connection of several subsystems in which the output
of one is fed as the input to the next. A clear advantage of the
cascade realization is that those subsystems can be placed at
remote sites. Note that the cascade structure has also been
widely studied in the classical control literature [22–24].
h
x̂, x̂
⊤
i
⊤
, x̂x̂ − x̂x̂⊤ = iΣ,
⊤
Σ,
"
0 IN
−IN 0
#
.
(1)
Here we emphasize that the transpose operation ⊤, when applied to an operator-valued matrix (say, x̂x̂⊤ ), only exchanges
the indices of the matrix and leaves the entries unchanged.
⊤
Therefore x̂x̂⊤ 6= x̂x̂⊤ . Let Ĥ be the Hamiltonian of the
system, and let {ĉ j }, j = 1, 2, · · · , K, be Lindblad operators
that represent the interactions between the system and its
environment. For convenience, we collect all the Lindblad
h
i⊤
operators as an operator-valued vector L̂ = ĉ1 ĉ2 · · · ĉK
The second one is a locally dissipative realization, which
is motivated by the specific system structure found in, e.g.
[9,25–27]. Note that in these references the notion of quasilocality has been studied, but in this paper we focus on a
stronger notion, locality. Here “locally dissipative” means
that all the system-environment interactions act only on one
system component. Implementations of locally dissipative
systems should be considerably easier than that of systems
which have non-local interactions [28]. In this paper, we
show that, given a covariance matrix corresponding to a
pure Gaussian state, if it satisfies certain conditions, we can
construct a locally dissipative quantum system generating
that state.
and call L̂ the coupling vector. Suppose Ĥ is quadratic in x̂,
i.e., Ĥ = 21 x̂⊤ M x̂, with M = M ⊤ ∈ R2N×2N , and L̂ is linear
in x̂, i.e., L̂ = Cx̂, with C ∈ CK×2N , then the quantum system G can be described by the following quantum stochastic
differential equations (QSDEs)
Lastly we remark that the state generated by our method is
an internal one confined in the system (e.g. an intra-cavity
state in optics), rather than an external optical field state. This
means that, if we aim to perform some quantum information
processing with that Gaussian state, it must be extracted to
outside by for instance the method developed in [29]. In
particular by acting some non-Gaussian operations such as
h
i⊤
d x̂(t) = A x̂(t)dt + B d Â⊤ (t) d † (t) ,
(2)
dŶ (t) = C x̂(t)dt + d Â(t),
where A = Σ(M + Im(C†C)), B = iΣ[−C† C⊤ ], C = C [8],
⊤
[31, Chapter 6]. The input d Â(t) = d Â1 (t) · · · d ÂK (t)
represents K independent quantum stochastic processes,
with d  j (t), j = 1, 2, · · · , K, satisfying the following quan2
tum Itō rules:
(
d  j (t)d Â∗k (t) = δ jk dt,
d  j (t)d Âk (t) = d Â∗j (t)d Â∗k (t) = d Â∗j (t)d Âk (t) = 0,
corresponding to a given pure Gaussian state. Since a pure
Gaussian state (with zero mean) is uniquely specified by its
covariance matrix, so if a linear quantum system achieves a
covariance matrix corresponding to a pure Gaussian state, we
can simply say that such a linear quantum system uniquely
generates the pure Gaussian state. The problem can be expressed mathematically as:
(3)
where δ jk is the Kronecker δ -function. The output
⊤
dŶ (t) = dŶ1 (t) · · · dŶK (t) satisfies quantum Itō rules
similar to (3) [8, 31–35]. The quantum expectation of the
vector x̂ is denoted by hx̂i and the covariance matrix is given
by V = 12 h△x̂△x̂⊤ + (△x̂△x̂⊤ )⊤ i, where △x̂ = x̂ − hx̂i; see,
e.g., [7,8,11]. The time evolutions of the mean vector hx̂(t)i
and the covariance matrix V (t) can be derived from (2) by
using the quantum Itō rule. They are given by
dhx̂(t)i
= A hx̂(t)i,
dt
dV (t) = A V (t) + V (t)A ⊤ + 1 BB † .
dt
2
find
subject to
where V is the covariance matrix corresponding to the desired target pure Gaussian state. Here a matrix A is said to
be Hurwitz if all its eigenvalues have strictly negative real
parts. A system described by (2) is said to be asymptotically stable if the matrix A is a Hurwitz matrix. Recently, a
necessary and sufficient condition has been developed in [7]
for solving the pure Gaussian state covariance assignment
problem. The result is summarized as follows.
(4)
(5)
As in the classical case, a Gaussian state is completely characterized by the mean vector hx̂i and the covariance matrix V . Since the mean vector hx̂i contains no information
about noise and entanglement, we will restrict our attention to zero-mean Gaussian states (i.e., hx̂i = 0). A Gaussian
state is pure if and only if its covariance matrix V satisfies
det(V ) = 2−2N . In fact, when a Gaussian state is pure, its
covariance matrix V can always be factored as
1
V = SS⊤,
2
S=
"
Y
− 12
XY
− 21
0
Y
1
2
#
,
M = M ⊤ ∈ R2N×2N and C ∈ CK×2N
A is Hurwitz,
1
A V + V A ⊤ + BB † = 0,
2
Lemma 1 ( [7, 8]). Let V be the covariance matrix corresponding to a given N-mode pure Gaussian state. Assume
that V is expressed in the factored form (6). Then this pure
Gaussian state is uniquely generated by the linear quantum
system (2) if and only if
M=
(6)
where X = X ⊤ ∈ RN×N , Y = Y ⊤ ∈ RN×N and Y > 0 [11,
36]. For example, the N-mode vacuum state is a special
pure Gaussian state with X = 0 and Y = IN . It can be seen
from (6) that a pure Gaussian state is uniquely specified by
a complex, symmetric matrix Z , X + iY , which is referred
to as the graph corresponding to a pure Gaussian state [11].
Note also that the matrix S satisfies SΣS⊤ = Σ, which means
that S is a symplectic matrix. The symplectic nature of S
guarantees that the mapping x̂ 7−→ x̂′ , Sx̂ preserves the
canonical commutation relations (1), that is
"
XRX + Y RY − ΓY −1 X − XY −1 Γ⊤ −XR + ΓY −1
−RX + Y −1 Γ⊤
R
#
,
(7)
and
C = P⊤ [−Z IN ],
(8)
where R = R⊤ ∈ RN×N , Γ = −Γ⊤ ∈ RN×N , and P ∈ CN×K
are free matrices satisfying the following rank condition
rank
h
i
−1
P QP · · · QN−1 P = N, Q , −iRY + Y Γ. (9)
Remark 2. From (8), we see that the resulting coupling vector L̂ of the engineered system is L̂ = Cx̂ = P⊤ [−Z IN ]x̂ =
P⊤ ([ p̂1 · · · p̂N ]⊤ − Z [q̂1 · · · q̂N ]⊤ ). Therefore, all the components of L̂ are nullifiers for the desired target pure Gaussian state [11]. As a special example, one can engineer a
purely dissipative system (with Ĥ = 0) to generate a pure
Gaussian state. In this case, one could take R = Γ = 0N×N
and P = IN in Lemma 1. Then the resulting coupling vector
L̂ is the so-called nullifier vector for the desired target pure
Gaussian state.
i
i
h
i h
h
x̂′ , x̂′⊤ = Sx̂, (Sx̂)⊤ = S x̂, x̂⊤ S⊤ = S (iΣ) S⊤ = iΣ.
Note that if the system G is initially in a Gaussian state,
then the system G will always be Gaussian, with the mean
vector hx̂(t)i and the covariance matrix V (t) obeying (4)
and (5), respectively. We shall be particularly interested in
the steady-state covariance matrix V (∞).
Assume that the system G is initially in a Gaussian state.
The problem of pure Gaussian state covariance assignment
is to find a Hamiltonian Ĥ and a coupling vector L̂ such that
the corresponding linear quantum system described by (2)
is asymptotically stable and achieves the covariance matrix
Remark 3. Lemma 1 has a simple interpretation in terms
of symplectic transformations [8, 37]. As mentioned before,
vacuum states are a special class of pure Gaussian states.
3
quantum systems that uniquely generate a given pure Gaussian state. Based on this fact, we provide two feasible realizations of linear quantum systems for covariance assignment corresponding to pure Gaussian states, and this section
is devoted to the first one, the cascade realization.
The covariance matrix corresponding to the N-mode vacuum
state is V = 12 IN . By using physical realizability conditions,
it can be proved that the N-mode vacuum state can only be
generated by an N-mode passive linear quantum system [37].
The converse is also true. That is, an N-mode passive linear
quantum system, if it is asymptotically stable, must evolve
toward the N-mode vacuum state [38]. Recall that for a
passive linear quantum system, the Hamiltonian is always of
"
#
R̃ Γ̃
1 ⊤
, R̃ = R̃⊤ ∈ RN×N ,
the form Ĥ = 2 x̂ M̃ x̂, with M̃ =
Γ̃⊤ R̃
and Γ̃ = −Γ̃⊤ ∈ RN×N , and the coupling vector is always of
the form L̂ = C̃x̂, with C̃ = P̃⊤ [−iIN IN ], P̃ ∈ CN×K [21,39–
41]. Now we apply a symplectic transformation to x̂, that is,
we define x̂′ , Sx̂. Then, in terms of x̂′ , the Hamiltonian is
rewritten as Ĥ = 21 x̂′⊤ S−⊤ M̃S−1 x̂′ and the coupling vector
is rewritten as L̂ = C̃S−1 x̂′ . We also observe that the relation
between the covariance matrix V ′ of x̂′ and the covariance
matrix V of x̂ is given as follows:
3.1 The cascade realization
For convenience, we denote a linear quantum system G with
the Hamiltonian Ĥ and the coupling vector L̂ as G = (Ĥ, L̂).
Suppose we have two linear quantum systems G1 = (Ĥ1 , L̂1 )
and G2 = (Ĥ2 , L̂2 ). If we feed the output of the system
G1 into the input of the system G2 , we will obtain a cascaded quantum system G = G2 ✁ G1 , as shown in Fig. 1.
Based on the quantum theory of cascaded linear quantum
Â(t)
Ŷ (t)
systems [43], the Hamiltonian Ĥ and the coupling vector L̂
of the cascaded system G are, respectively, given by
Ĥ = Ĥ + Ĥ + 1 L̂† L̂ − L̂† L̂ ,
2
1
1 2
2 1
2i
L̂ = L̂2 + L̂1 .
If the passive linear quantum system is asymptotically stable,
then based on the result in [38], we have V → 12 IN , as t →
+∞. As a result, V ′ → 12 SS⊤, which gives the desired pure
Gaussian state. Combining the results above, we conclude
that for a given pure Gaussian state V = 12 SS⊤, a complete parametrization of the linear quantum system G that
uniquely generates this pure Gaussian state is given by
M = S−⊤ M̃S−1 ,
C = C̃S−1 ,
G2
G
Fig. 1. The cascade connection of two linear quantum systems:
G = G2 ✁ G1 .
1
V ′ = h△x̂′ △x̂′⊤ + (△x̂′ △x̂′⊤ )⊤ i
2
1
= Sh△x̂△x̂⊤ + (△x̂△x̂⊤ )⊤ iS⊤
2
= SV S⊤ .
G1
(12)
This result can be extended to the cascade connection of N
one-dimensional harmonic oscillators. Suppose we have N
one-dimensional harmonic oscillators G j with the Hamilto2×2 , ξ̂ , [q̂ p̂ ]⊤ , and
nian Ĥ j = 21 ξ̂ j⊤ M j ξ̂ j , M j = M ⊤
j
j j
j ∈R
the coupling vector L̂ j = C j ξ̂ j , C j ∈ CK×2 , j = 1, 2, · · · , N.
The system G is obtained by a cascade connection of these
harmonic oscillators, that is, G = GN ✁ · · · ✁ G2 ✁ G1 , as
shown in Fig. 2. By repeatedly using (12), the Hamiltonian
Ĥ and the coupling vector L̂ of the cascaded system G are
given by the following lemma.
(10)
(11)
where (M̃, C̃) form an asymptotically stable passive lin"
#
R̃ Γ̃
ear quantum system. Substituting M̃ =
and C̃ =
Γ̃⊤ R̃
P̃⊤ [−iIN , IN ] into (10), (11) and using some additional matrix transformations, we will obtain the formulas (7), (8),
respectively. This is the idea behind Lemma 1. The rank
constraint (9) indeed gives a sufficient and necessary stability condition for the original passive linear quantum system [40, 41]. As a result, it also guarantees the stability of
the linear quantum system G based on the linear transformation theory in the control field [42].
Â(t)
G1
G2
G
GN
Ŷ (t)
Fig. 2. The cascade connection of N one-dimensional harmonic
oscillators: G = GN ✁ · · · ✁ G2 ✁ G1 .
Lemma 4 ( [20]). Suppose that the system G is obtained
via a cascade connection of the aforementioned N onedimensional harmonic oscillators G j , j = 1, 2, · · · , N, that
is, G = GN ✁ · · ·✁ G2 ✁ G1 . Then the Hamiltonian Ĥ and the
coupling vector L̂ of the system G are, respectively, given by
3 The cascade realization
Ĥ = 1 x̂⊤ M x̂, M = P MP ⊤
N
N
2
L̂ = Cx̂, C = [C1 C2 · · · CN ] PN⊤ ,
As we have seen in Lemma 1, the matrices R, Γ and P
are free matrices, although they must satisfy the rank condition (9). By varying them we can obtain different linear
4
where M = [M jk ] j,k=1,··· ,N is a symmetric block matrix with
M j j = M j , M jk = Im(C†j Ck ) whenever j > k and M jk = M⊤
kj
whenever j < k.
The stability of A and the Lyapunov equation (13) guarantee that the cascaded system G constructed above is asymptotically stable and achieves the covariance matrix V . In
other words, the cascaded system G uniquely generates the
desired target pure Gaussian state.
It can be seen from Lemma 4 that due to the cascade feature, the Hamiltonian matrix M and the coupling matrix C
of the cascaded system G depend on each other in a complicated way. Nevertheless, given any pure Gaussian state, we
can always construct a cascade connection of several onedimensional harmonic oscillators such that this cascaded
quantum system is asymptotically stable and achieves the
covariance matrix corresponding to the desired target pure
Gaussian state. The result is stated as follows.
3.2 Example
Example 6. We consider the generation of two-mode
squeezed states [11]. Two-mode squeezed states are highly
symmetric entangled states, which are very useful in several
quantum information protocols such as quantum teleportation [44]. The covariance matrix V corresponding to a
two-mode squeezed state is
0
0
cosh(2α ) sinh(2α )
0
0
1
sinh(2α ) cosh(2α )
V=
,
2
0
0
cosh(2α ) − sinh(2α )
0
0
− sinh(2α ) cosh(2α )
(14)
Theorem 5. Any N-mode pure Gaussian state can be
uniquely generated by constructing a cascade of N onedimensional harmonic oscillators.
Proof. We prove this result by construction. Recall that for
an arbitrary N-mode pure Gaussian state, the corresponding
covariance matrix V has the factorization shown in (6). Using the matrices X and Y obtained from (6), we construct a
cascaded system G = GN ✁ · · · ✁ G2 ✁ G1 with the Hamiltonian Ĥ j and the coupling vector L̂ j , j = 1, 2, · · · , N, given by
Ĥ j = 0,
0(2 j−2)×2
where α is the squeezing parameter. Using the factoriza#
"
cosh(2α ) − sinh(2α )
.
tion (6), we have X = 0 and Y =
− sinh(2α ) cosh(2α )
Therefore, the graph corresponding to a two-mode squeezed
"
#
i cosh(2α ) −i sinh(2α )
state is given by Z = X + iY =
.
−i sinh(2α ) i cosh(2α )
1
.
L̂ j = C j ξ̂ j , C j = iY − 2 [−Z IN ] PN
I2
0(2N−2 j)×2
Next we provide two different cascade realizations. The first
one, Realization 1, is constructed based on a heuristic derivation, while the second one, Realization 2, is constructed
based on the proof of Theorem 5.
Using Lemma 4, we can calculate the Hamiltonian Ĥ =
1 ⊤
2 x̂ M x̂ and the coupling vector L̂ = Cx̂ for the cascaded
system G. We find that M = 0 and C = iY −1/2 [−Z IN ]. Then
it follows from the QSDE (2) that
Realization 1. In this cascade realization, the subsystems
G1 = (Ĥ1 , L̂1 ) and G2 = (Ĥ2 , L̂2 ) are, respectively, given by
A = Σ(M + Im(C†C))
"
#!
(X − iY )Y −1 (X + iY ) −(X − iY )Y −1
= Σ Im
−Y −1 (X + iY )
Y −1
"
#
2 Q1
1
⊤
Ĥ = ξ̂
ξ̂1 , L̂1 = [iQ2 1]ξ̂1 ,
1 2 1 Q1 2
"
#
2
Q
1
1
⊤
Ĥ2 = − ξ̂
ξ̂2 , L̂2 = [iQ2 1]ξ̂2 ,
2 2 Q1 2
= ΣΣ = −I2N ,
1
D , BB † = Σ Re(C†C)Σ⊤
2
"
#!
(X − iY )Y −1 (X + iY ) −(X − iY )Y −1
= Σ Re
Σ⊤
−Y −1 (X + iY )
Y −1
"
#
Y −1
Y −1 X
.
=
XY −1 XY −1 X + Y
(2α )
− sinh(2α ) and Q2 , sinh(2α ) −
where Q1 , sinh
cosh(2α )
cosh(2α ). It can be proved that the cascaded system
G = G2 ✁ G1 is asymptotically stable and achieves the
covariance matrix (14). The proof is similar to that of Theorem 5, and hence is omitted. Using the result in [45], a
corresponding quantum optical realization is provided in
Fig. 3. For each subsystem G j , j = 1, 2, the Hamiltonian
Ĥ j is realized by a nonlinear crystal pumped by a classical
field, and the coupling operator L̂ j is realized by implementing an auxiliary cavity. This auxiliary cavity interacts
2
Clearly, A is Hurwitz. Furthermore, it can be verified that
A V + V A ⊤ + D = 0.
(13)
5
^
with the subsystem via a cascade of a pumped crystal and
a beam splitter. It has a fast mode that can be adiabatically
eliminated.
Y(t)
eiπ
eiπ
Auxiliary
cavity
e
Auxiliary
cavity
^
G2
A 1(t)
Auxiliary
cavity
Auxiliary
cavity
G2
iπ
a^1
^
^
A(t)
G1
Y1(t)
G1
^
eiπ
a^ 2
A 2(t)
^
Y2 (t)
^
a^ 2
a1
Fig. 4. Another optical cascade realization of the two-mode linear
quantum system that uniquely generates a two-mode squeezed
state.
Fig. 3. An optical cascade realization of the two-mode linear
quantum system that uniquely generates a two-mode squeezed
state. The square with an arrow represents a pumped crystal. The
symbol eiπ with a square on it represents a phase shift π . Solid
(dark) rectangles denote perfectly reflecting mirrors, while unfilled
rectangles denote partially transmitting mirrors. The dark line “”
represents an optical beam splitter.
locally dissipative realization cannot generate all pure Gaussian states, but as shown later the class of stabilizable states
is fairly broad.
4.1 The locally dissipative realization
Realization 2. The second realization is constructed according to the method shown in the proof of Theorem 5.
By direct calculation, the subsystems G1 = (Ĥ1 , L̂1 ) and
G2 = (Ĥ2 , L̂2 ) are, respectively, given by
Ĥ = 0,
1
Ĥ2 = 0,
L̂1 =
L̂2 =
"
#
cosh(α ) i cosh(α )
− sinh(α ) i sinh(α )
"
#
− sinh(α ) i sinh(α )
cosh(α ) i cosh(α )
As we have noted in Section 2, the coupling vector L̂ is
an operator-valued vector that consists of K elements, i.e.,
L̂ = [ĉ1 ĉ2 · · · ĉK ]⊤ . Each element ĉ j , j = 1, 2, · · · , K, called
a Lindblad operator, represents an interaction between the
system and its environment. A Lindblad operator ĉ j is said
to be local if it acts only on one system mode. As an example, consider the system depicted in Fig. 5. The Lindblad
operator ĉ1 = q̂1 + p̂1 acts only on the first system mode, so
it is a local operator. On the other hand, the Lindblad operator ĉ2 = q̂1 + q̂2 acts on two system modes, so by definition
it is not a local operator. If all the Lindblad operators in L̂ are
local, then the system is called a locally dissipative quantum
system. A locally dissipative quantum system could be relatively easy to implement in practice. Therefore, we would
like to characterize the class of pure Gaussian states that
can be generated using locally dissipative quantum systems.
The result is given by the following theorem.
ξ̂1 ,
ξ̂2 .
Using the result in [45], a corresponding quantum optical
realization of such a cascaded quantum system G = G2 ✁ G1
is provided in Fig. 4. This cascaded system G has two crucial features. First, because Ĥ1 = Ĥ2 = 0, implementations
of the Hamiltonians involve no pumped crystals. Second,
the first component of the coupling vector L̂1 = [ĉ1,1 ĉ1,2 ]⊤
" #
h
i q̂
√
1
is ĉ1,1 = cosh(α ) i cosh(α )
= 2 cosh(α )â1 , where
p̂1
√
â1 = (q̂1 + i p̂1 )/ 2 denotes the annihilation operator of the
first mode. This operator ĉ1,1 represents the standard linear dissipation of a cavity mode into a continuum of field
modes outside of the cavity. A similar case also occurs in the
coupling vector L̂2 . As can be seen in Fig. 4, Realization 2
requires two pumped crystals, in contrast to the case of Realization 1, where four pumped crystals are used. From this
viewpoint, Realization 2, which is constructed based on our
result, has a clear advantage over Realization 1.
1
2
c^ 2= q^ 1 + q^ 2
c^ 1= q^ 1 + p^ 1
Fig. 5. An illustration of local Lindblad operators. ĉ1 is a local
Lindblad operator, while ĉ2 is not a local one.
Theorem 7. Let V be the covariance matrix corresponding
to a given N-mode pure Gaussian state. Assume that it is
expressed in the factored form (6). Then this pure Gaussian
state can be uniquely generated in an N-mode locally dissipative quantum system if and only if there exists an integer
ℓ, 1 ≤ ℓ ≤ N, such that
4 The locally dissipative realization
Z(ℓ, j) = Z( j,ℓ) = 0,
In this section, we describe the second realization of linear
quantum systems for covariance assignment corresponding
to pure Gaussian states. Unlike the cascade realization, the
∀ j 6= ℓ and 1 ≤ j ≤ N,
(15)
where Z(ℓ, j) denotes the (ℓ, j) element of the graph matrix
Z = X + iY for the pure Gaussian state.
6
Proof. We prove the sufficiency part by construction.
Equation h (15) implies that ithere exists a row vector ϒ = 01×(ℓ−1) τ1 01×(N−ℓ) with τ1 6= 0, such that
i
h
ϒZ = 01×(ℓ−1) τ2 01×(N−ℓ) , where τ2 = τ1 Z(ℓ,ℓ) . Using
the Gram-Schmidt method, we can create three N × N matrices U1 , U2 and Λ, where U1 is a unitary matrix with the
1/2 ⊤
first column being YY 1/2 ϒϒ⊤ ; U2 is a unitary matrix with
k
k
h
i⊤
the first column being √1N 1 1 · · · 1 and Λ is a purely
imaginary matrix Λ = i diag[α1 , · · · , αN ], with α j ∈ R,
j = 1, · · · , N, and α j 6= αk , ∀ j 6= k.
operator ĉk = Pk⊤ [−Z IN ] x̂ is local. Suppose that ĉk acts on
the ℓth mode of the system. Then we have
Let P = ϒ⊤ , R = −Y −1/2 Im(U1U2† ΛU2U1† )Y −1/2 and Γ =
Y 1/2 Re(U1U2† ΛU2U1† )Y 1/2 in (7), (8). Then it can be verified
that R = R⊤ , Γ = −Γ⊤ . Moreover, substituting Q = −iRY +
Y −1 Γ = Y −1/2U1U2† ΛU2U1†Y 1/2 into (9) yields
Substituting (17) into (16) gives
h
i
P QP · · · QN−1 P
h
= rank U2U1†Y 1/2 ϒ⊤ ΛU2U1†Y 1/2 ϒ⊤ · · ·
Pk⊤ [−Z IN ]
h
i
= 01×(ℓ−1) τ3 01×(N−ℓ) 01×(ℓ−1) τ4 01×(N−ℓ) ,
where τ3 and τ4 are complex numbers. It follows that
i
h
Pk⊤ Z = 01×(ℓ−1) −τ3 01×(N−ℓ) ,
i
h
Pk⊤ = 01×(ℓ−1) τ4 01×(N−ℓ) , τ4 6= 0.
Y 1/2 ϒ⊤
= rank √
N
=N.
1
1
.
..
1
(17)
h
i
Pk⊤ Z =τ4 Z(ℓ,1) Z(ℓ,2) · · · Z(ℓ,N)
h
i
= 01×(ℓ−1) −τ3 01×(N−ℓ) .
rank
ΛN−1U2U1†Y 1/2 ϒ⊤
(iα1 ) · · · (iα1 )N−1
(iα2 ) · · · (iα2 )N−1
..
..
. ···
.
(iαN ) · · · (iαN )N−1
(16)
Since τ4 6= 0, we have Z(ℓ, j) = 0, ∀ j 6= ℓ. Since Z = Z ⊤ , we
have Z(ℓ, j) = Z( j,ℓ) = 0, ∀ j 6= ℓ. That is, Equation (15) holds.
This completes the proof.
i
Remark 8. The basic idea of Theorem 7 is that for any
choice of P 6= 0, there always exist matrices R = R⊤ and
Γ = −Γ⊤ such that the rank condition (9) is satisfied. So we
can first specify a matrix P such that the coupling matrix C
in (8) has a local structure. After obtaining P, we determine
the other two matrices R and Γ to get a system Hamiltonian,
under the rank constraint (9). Generally, for a given nonzero
matrix P, we have infinite solutions (R, Γ) that satisfy the
rank condition (9). Different choices of (R, Γ) lead to different system Hamiltonians. The optimization problem over
these Hamiltonians is beyond the scope of this paper and is
not considered, but in the next subsection we will show a
specific recipe for determining those matrices (R, Γ).
Here we have used the full rank property of a Vandermonde
matrix. Hence the rank condition (9) is satisfied. Based on
Lemma 1, we now obtain an N-mode locally dissipative
quantum system that is asymptotically stable and achieves
the given covariance matrix. The coupling vector L̂ of the
system, which consists of only one Lindblad operator, is
given by
Remark 9. Suppose an N-mode pure Gaussian state is generated in an N-mode dissipative quantum system and the
ℓth mode is locally coupled to the environment. Then from
Equation (15), it is straightforward to see that the ℓth mode
is not entangled with the rest of the system modes when the
system achieves the steady state.
C = P⊤ [−Z IN ] = [−ϒZ ϒ]
h
i
= 01×(ℓ−1) −τ2 01×(N−ℓ) 01×(ℓ−1) τ1 01×(N−ℓ) ,
L̂ = Cx̂ = −τ2 q̂ℓ + τ1 p̂ℓ .
4.2 Examples
We see that L̂ acts only on the ℓth mode, and hence it is
local. The Hamiltonian Ĥ of the system can also be obtained
by directly substituting the matrices R and Γ above into (7).
This completes the sufficiency part of the proof.
Example 10. We consider the generation of canonical Gaussian cluster states, which serve as an essential
resource in quantum computation with continuous variables [4,11,12]. We mention that an interesting class of cluster states, called bilayer square-lattice continuous–variable
cluster states, has been proposed recently in [46]. This class
of cluster states has some practical advantages over canonical Gaussian cluster states for quantum computation [46].
For the sake of simplicity, we use canonical Gaussian cluster states to illustrate the developed theory. The covariance
Next we prove the necessity part. Suppose an N-mode pure
Gaussian state can be uniquely generated in an N-mode locally dissipative quantum system. Based on Lemma 1, there
exists a P ∈ CN×K , P 6= 0, such that the coupling vector
L̂ = P⊤ [−Z IN ] x̂ is local. Let Pk , 1 ≤ k ≤ K, be a nonzero
column in the matrix P. Then the corresponding Lindblad
7
(BS)
where Ĥ jk = (q̂ j p̂k − p̂ j q̂k ) = i(â j â∗k − â∗j âk ), where â j =
√
√
(q̂ j + i p̂ j )/ 2 and â∗j = (q̂ j − i p̂ j )/ 2, is the Hamiltonian
representing the coupling between the jth and kth optical
modes at a beam splitter. Also the coupling vector is given
by
matrix V corresponding to an N-mode canonical Gaussian
"
#
2α B
2α I
e
e
N
cluster state is given by V = 12
,
e2α B e−2α IN + e2α B2
where B = B⊤ ∈ RN×N and α is the squeezing parameter.
Note that in the limit α → ∞, the canonical Gaussian cluster state approximates the corresponding ideal cluster state.
Using (6), we obtain X = B and Y = e−2α IN . The graph
corresponding to a canonical Gaussian cluster state is given
by Z = X + iY = B + ie−2α IN .
√
L̂ = −( 2 + e−2α i)q̂4 + p̂4,
which acts only on the fourth mode and hence it is local.
Finally, using the result in [45], a corresponding optical realization of this linear quantum system is shown in Fig. 6.
Note that three pumped crystals are used; we conjecture that
this is the minimum number required for constructing a desired locally dissipative system.
Let us consider a simple case where
0
1
X =
0
0
10 0
01 0
,
10 0
√
00 2
Y = e−2α I4 .
(18)
a^ 2
a1
These matrices satisfy X4 j = 0 and Y4 j = 0 for all j 6= 4. Thus
by Theorem 7, the corresponding canonical Gaussian cluster state can be generated in a f our-mode locally dissipative
system. To construct such a system, let us take P = [0 0 0 1]⊤
in Lemma 1. The next step is to determine the other system
parameters R and Γ. For a practical implementation, one of
the basic requirements on the system is that, as mentioned
before, the system has as few pumped crystals as possible.
Motivated by the structure of the passive quantum systems
described in Remark 3, we choose
R = 04×4. As a result,
"
# the
2α
⊤
2α
−e (ΓX + XΓ ) e Γ
Hamiltonian matrix is M =
. The
04×4
e2α Γ⊤
(1, 2) block in M is a skew matrix e2α Γ. So if we can additionally take the (1, 1) block to be a diagonal matrix, then
the interaction Hamiltonian between the modes is passive
and can be simply realized by beam splitters. According to
this guideline, we now seek Γ such that −e2α (ΓX + XΓ⊤ )
is a diagonal matrix. By direct calculation, we obtain
γ1
a^ 4
0
iπ
e
^
A(t)
Fig. 6. The optical dissipative system that uniquely generates the
canonical Gaussian cluster state (18). The coupling vector L̂ acts
only on the fourth mode, and hence it is local.
Example 11. We next consider a canonical Gaussian cluster
state specified by the following matrices X and Y :
0
1
X =
0
0
1 0 0
0 1 0
,
1 0 1
0 1 0
Y = e−2α I4 .
(19)
The strength of Theorem 7 is that it readily tells us that this
canonical Gaussian cluster state cannot be generated in any
four-mode locally dissipative system. Nonetheless let us take
the same matrix P as before, i.e., P = [0 0 0 1]⊤ , and follow
the same guideline as discussed in Example 10. That is, we
set R = 04×4 and seek Γ such that ΓX + XΓ⊤ is a diagonal
matrix. Then, again by direct calculation, we find
where γ1 ∈ R and γ2 ∈ R. Substituting the matrices P, R and
Γ above into the rank condition (9), we obtain that if γ1 γ2 6= 0,
the resulting linear quantum system is asymptotically stable
and achieves the covariance matrix corresponding to (18).
The Hamiltonian of this linear quantum system is now determined as
0
γ1
0
γ2
−γ
γ1 + γ2 0
0
1
Γ=
.
0 − (γ1 + γ2 )
γ
0
1
0
−γ1 0
−γ2
Ĥ = −γ1 e2α q̂21 + γ1 e2α q̂23 + e2α γ1 (Ĥ12 + Ĥ23 )
√ (BS)
(BS)
(BS)
+ e2α γ2 (Ĥ14 + 2Ĥ24 + Ĥ34 ),
(BS)
Auxiliary
cavity
^
Y (t)
γ2
√
−γ
0
γ1
2γ2
1
Γ=
,
0
γ2
−γ1
0
√
−γ2 − 2γ2 −γ2 0
0
a^ 3
^
(BS)
8
Let us take γ1 = 1 and γ2 = 0. Then the corresponding system
Hamiltonian is given by
Ĥ = −e2α (q̂21 − q̂24 ) + e2α (Ĥ12
(BS)
(BS)
+ Ĥ23
Remark 12. The method in [9] is based on essentially
the same idea; given an N-mode pure Gaussian state with
graph Z = X + iY , instead of generating it directly, we enlarge the system by adding a single-mode auxiliary system and then specify the target state as X̃ = diag[X, λ ] and
Ỹ = diag[Y, 1]. By Theorem 7, this (N + 1)-mode target state
can be uniquely generated in an (N + 1)-mode locally dissipative system. The original N-mode pure Gaussian state is
then obtained as a reduced state of the target state.
(BS)
+ Ĥ34 ). (20)
It can be verified that the rank condition (9) is satisfied,
hence the system constructed here is asymptotically stable
and achieves the desired covariance matrix corresponding
to (19), though in this case the system needs to have the
following non-local interaction with its environment:
5 Conclusion
h
i
L̂ = 0 0 −1 −e−2α i 0 0 0 1 x̂ = −q̂3 − ie−2α q̂4 + p̂4 .
In this paper, we have provided two feasible realizations
of linear quantum systems for covariance assignment corresponding to pure Gaussian states: a cascade realization
and a locally dissipative realization. First, we have shown
that given any covariance matrix corresponding to a pure
Gaussian state, we can construct a cascaded quantum system that achieves the assigned covariance matrix. This cascaded quantum system is constructed as a cascade connection of several one-dimensional harmonic oscillators, without any direct interaction Hamiltonians between these oscillators. Second, we have given a complete characterization of
the class of pure Gaussian states that can be generated using
locally dissipative quantum systems. In particular, we have
shown a specific recipe for constructing a system having a
relatively simple Hamiltonian coupling between the system
modes. The results developed in this paper are potentially
useful for the preparation of pure Gaussian states. In the examples, we have provided realizations of (Ĥ, L̂) in quantum
optics using the result in [45]. The circuit figures shown in
the examples are not necessarily the simplest realizations in
quantum optics. Also, a system with (Ĥ, L̂) could be realized by other instances of linear quantum systems such as
atomic ensembles and optomechanical systems [18, 47].
An optical realization, which yet contains an abstract component corresponding to this non-local interaction, is depicted
in Fig. 7. A practical implementation of the non-local inter^
Y (t)
^
A(t)
a^ 1
a^ 3
a^ 4
a^ 2
Fig. 7. The optical linear quantum system that uniquely generates
the canonical Gaussian cluster state (19). The coupling vector L̂
acts on the third and fourth modes, and hence it is not local.
action depicted in Fig. 7 could be experimentally difficult.
Nonetheless this issue can be resolved by taking the following method: add an auxiliary system with a single mode
x̂A = [q̂A p̂A ]⊤ , and specify the target canonical Gaussian
cluster state as
0
1
X̃ = 0
0
1 00 0
0 1 0 0
1 0 1 0,
0 1 0 0
0 0 00 λ
Appendix
Ỹ = e−2α I5 .
Here we briefly review the synthesis theory of linear quantum systems in quantum optics developed in [45].
(21)
1. Realization of a quadratic Hamiltonian
Suppose a quadratic Hamiltonian is given by Ĥd = 21 ξ̂ ⊤ Md ξ̂ ,
where ξ̂ = [q̂ p̂]⊤ and Md = Md⊤ ∈ R2×2 . This Hamiltonian
can be realized by placing a crystal with a classical pump
inside an optical cavity, as shown in Fig. 8. Working in the
frame rotating at half the pump frequency, the Hamiltonian
is written as
Since X̃5 j = 0 and Ỹ5 j = 0 for all j 6= 5, by Theorem 7,
we can construct a five-mode locally dissipative system that
uniquely generates the above canonical Gaussian cluster
state (21). By choosing P = [0 0 0 0 1]⊤ and then taking a
similar procedure as in the case of Example 10, we can obtain such a desired locally dissipative quantum system. Now
we obtain an important observation: for an N-mode canonical Gaussian cluster state with the graph matrix X = B and
the squeezing matrix Y = e−2α IN , it is always possible to
generate this state in a locally dissipative quantum system
by adding a single-mode auxiliary system and specifying the
target state as X̃ = diag[B, λ ] and Ỹ = e−2α IN+1 .
i
Ĥr = △â∗ â + ε (â∗ )2 − ε ∗ â2
" 2
#
1 ⊤ △ − Im(ε ) Re(ε )
△
= ξ̂
ξ̂ − ,
2
2
Re(ε ) △ + Im(ε )
9
(22)
where △ = ωcav − ω p/2 is the detuning between the cavity
mode frequency and the half pump frequency. ε is a measure
of the effective pump intensity [34]. From (22), we see that
by choosing the values of △ and ε , one can make Ĥr =
△
Ĥd − △
2 . Note that the constant term − 2 does not affect
the dynamics of a linear quantum system, and hence can
be ignored. Therefore, the desired Hamiltonian Ĥd can be
realized in this scheme.
a^
a^ 1
(r2 , t 2)
a^ 2
a^ 4
( r1 , t 1 )
Â(t)
a^ 3
Ŷ(t)
Fig. 9. A beam-splitter-like interaction Hamiltonian can be realized
by placing a beam splitter for the two incoming modes â1 and â2 .
Fig. 8. A quadratic Hamiltonian can be realized by placing a
crystal with a classical pump inside an optical cavity.
the frame rotating at half the pump frequency, the interaction
Hamiltonian is written as
2. Realization of a beam-splitter-like interaction Hamiltonian
Ĥab =
where ε1 determines the effective pump intensity and ε2
determines the parameters of the beam splitter. Assume that
the coupling coefficient γ of the partially transmitting mirror
is large so that the mode b̂ is heavily damped and can be
adiabatically eliminated. Then after elimination of b̂, the
resulting coupling operator is given by
Suppose a Hamiltonian is given by Ĥd = hd â∗1 â2 + h∗d â∗2 â1 ,
where hd ∈ C. This Hamiltonian can be realized by implementing a beam splitter for the two incoming modes â1 and
â2 , as shown in Fig. 9. At the beam splitter, we have the
following transformations
" #
â3
â4
=
"
t2 r1
r2 t1
#" #
â1
â2
i
i
ε1 â∗ b̂∗ − ε1∗ âb̂ + ε2 â∗ b̂ − ε2∗ âb̂∗ ,
2
2
1
L̂r = √ (−ε2∗ â + ε1 â∗ ).
γ
,
From (24), we see that by choosing the values of ε1 , ε2 ,
and γ with γ being large, we can make L̂r = L̂d . That is, the
desired coupling operator L̂d can be realized in this scheme.
See [45] for details.
where â3 and â4 denote the outgoing modes, and r1 , t1 ∈ C
denote the (complex) reflectance and transmittance of the
beam splitter, respectively. Note that r1 , t1 , r2 and t2 satisfy
the following relations: |r2 | = |r1 |, |t2 | = |t1 |, |r1 |2 + |t1 |2 = 1,
r1∗t2 + r2t1∗ = 0, and r1∗t1 + r2t2∗ = 0 [48]. Let us parametrize
them as r1 = e−iφ sinθ , r2 = −eiφ sinθ , and t1 = t2 = cosθ .
Then the interaction Hamiltonian Ĥ (BS) for this beam splitter
is given by
Ĥ (BS) = iθ e−iφ â∗1 â2 − iθ eiφ â∗2 â1 .
(24)
Â(t)
ei
π
^
A
c
Y (t)
^
(23)
a^
From (23), we see that by choosing the values of θ and φ , one
can make Ĥ (BS) = Ĥd . That is, the desired beam-splitter-like
interaction Hamiltonian Ĥd can be realized in this scheme.
b
Fig. 10. Realization of a dissipative coupling operator L̂.
3. Realization of a dissipative coupling L̂
References
c1√
−ic2
2
To realize a coupling operator L̂d = c1 q̂+c2 p̂ =
â+
c1√
+ic2
â∗ , we consider the configuration shown in Fig. 10.
2
The configuration consists of a ring cavity with mode â and
an auxiliary ring cavity with mode b̂. The cavity modes â
and b̂ interact through a crystal pumped by a classical beam,
and a beam splitter. The frequency of the auxiliary cavity
mode b̂ is matched to half the pump frequency. Working in
[1] A. Hotz and R. E. Skelton, “Covariance control theory,” International
Journal of Control, vol. 46, no. 1, pp. 13–32, 1987.
[2] J. E. G. Collins and R. E. Skelton, “A theory of state covariance
assignment for discrete systems,” IEEE Transactions on Automatic
Control, vol. 32, no. 1, pp. 35–41, 1987.
[3] R. E. Skelton and M. Ikeda, “Covariance controllers for linear
continuous-time systems,” International Journal of Control, vol. 49,
no. 5, pp. 1773–1785, 1989.
10
[23] S. Huang, M. R. James, and Z. P. Jiang, “L∞ -bounded robust control
of nonlinear cascade systems,” Systems & Control Letters, vol. 54,
no. 3, pp. 215–224, 2005.
[4] S. L. Braunstein and A. K. Pati, Quantum Information with
Continuous Variables. Springer, 2003.
[5] C. Weedbrook, S. Pirandola, R. Garcı́a-Patrón, N. J. Cerf, T. C.
Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,”
Reviews of Modern Physics, vol. 84, no. 2, pp. 621–669, 2012.
[24] L. Liu and J. Huang, “Global robust stabilization of cascadeconnected systems with dynamic uncertainties without knowing the
control direction,” IEEE Transactions on Automatic Control, vol. 51,
no. 10, pp. 1693–1699, 2006.
[6] K. Ohki, S. Hara, and N. Yamamoto, “On quantum-classical
equivalence for linear systems control problems and its application
to quantum entanglement assignment,” in Proceedings of IEEE 50th
Annual Conference on Decision and Control (CDC), December 2011,
pp. 6260–6265.
[25] B. Kraus, H. P. Büchler, S. Diehl, A. Kantian, A. Micheli, and
P. Zoller, “Preparation of entangled states by quantum Markov
processes,” Physical Review A, vol. 78, no. 4, p. 042307, 2008.
[26] M. Rafiee, C. Lupo, H. Mokhtari, and S. Mancini, “Stationary and
uniform entanglement distribution in qubit networks with quasilocal
dissipation,” Physical Review A, vol. 85, p. 042320, 2012.
[7] K. Koga and N. Yamamoto, “Dissipation-induced pure Gaussian
state,” Physical Review A, vol. 85, no. 2, p. 022103, 2012.
[8] N. Yamamoto, “Pure Gaussian state generation via dissipation: a
quantum stochastic differential equation approach,” Philosophical
Transactions of the Royal Society A: Mathematical, Physical and
Engineering Sciences, vol. 370, no. 1979, pp. 5324–5337, 2012.
[27] F. Ticozzi and L. Viola, “Stabilizing entangled states with quasi-local
quantum dynamical semigroups,” Philosophical Transactions of the
Royal Society A: Mathematical, Physical and Engineering Sciences,
vol. 370, no. 1979, pp. 5259–5269, 2012.
[9] Y. Ikeda and N. Yamamoto, “Deterministic generation of Gaussian
pure states in a quasilocal dissipative system,” Physical Review A,
vol. 87, no. 3, p. 033802, 2013.
[28] H. A. Bachor and T. C. Ralph, A Guide to Experiments in Quantum
Optics. Wiley, 2004.
[29] T. Tufarelli, A. Ferraro, A. Serafini, S. Bose, and M. S. Kim,
“Coherently opening a high-Q cavity,” Physical Review Letters, vol.
112, no. 13, p. 133605, 2014.
[10] S. Ma, M. J. Woolley, I. R. Petersen, and N. Yamamoto,
“Preparation of pure Gaussian states via cascaded quantum systems,”
in Proceedings of IEEE Conference on Control Applications (CCA),
October 2014, pp. 1970–1975.
[30] G. Tóth and I. Apellaniz, “Quantum metrology from a quantum
information science perspective,” Journal of Physics A: Mathematical
and Theoretical, vol. 47, no. 42, p. 424006, 2014.
[11] N. C. Menicucci, S. T. Flammia, and P. van Loock, “Graphical
calculus for Gaussian pure states,” Physical Review A, vol. 83, no. 4,
p. 042335, 2011.
[31] H. M. Wiseman and G. J. Milburn, Quantum Measurement and
Control. Cambridge University Press, 2010.
[12] N. C. Menicucci, P. van Loock, M. Gu, C. Weedbrook, T. C. Ralph,
and M. A. Nielsen, “Universal quantum computation with continuousvariable cluster states,” Physical Review Letters, vol. 97, no. 11, p.
110501, 2006.
[32] R. L. Hudson and K. R. Parthasarathy, “Quantum Ito’s formula and
stochastic evolutions,” Communications in Mathematical Physics,
vol. 93, no. 3, pp. 301–323, 1984.
[13] G. Adesso, “Generic entanglement and standard form for N-mode
pure Gaussian states,” Physical Review Letters, vol. 97, p. 130502,
2006.
[33] V. P. Belavkin, “Quantum stochastic calculus and quantum nonlinear
filtering,” Journal of Multivariate Analysis, vol. 42, no. 2, pp. 171–
201, 1992.
[14] J. I. Cirac, A. S. Parkins, R. Blatt, and P. Zoller, “‘Dark’ squeezed
states of the motion of a trapped ion,” Physical Review Letters,
vol. 70, no. 5, pp. 556–559, 1993.
[34] C. W. Gardiner and P. Zoller, Quantum Noise: A Handbook of
Markovian and Non-Markovian Quantum Stochastic Methods with
Applications to Quantum Optics. Springer, 2000.
[15] J. F. Poyatos, J. I. Cirac, and P. Zoller, “Quantum reservoir
engineering with laser cooled trapped ions,” Physical Review Letters,
vol. 77, no. 23, pp. 4728–4731, 1996.
[35] L. Bouten, R. V. Handel, and M. R. James, “An introduction to
quantum filtering,” SIAM Journal on Control and Optimization,
vol. 46, no. 6, pp. 2199–2241, 2007.
[16] Y. D. Wang and A. A. Clerk, “Reservoir-engineered entanglement in
optomechanical systems,” Physical Review Letters, vol. 110, no. 25,
p. 253601, 2013.
[36] M. M. Wolf, G. Giedke, O. Krüger, R. F. Werner, and J. I. Cirac,
“Gaussian entanglement of formation,” Physical Review A, vol. 69,
no. 5, p. 052320, 2004.
[17] H. Krauter, C. A. Muschik, K. Jensen, W. Wasilewski, J. M. Petersen,
J. I. Cirac, and E. S. Polzik, “Entanglement generated by dissipation
and steady state entanglement of two macroscopic objects,” Physical
Review Letters, vol. 107, no. 8, p. 080503, 2011.
[37] O. Techakesari and H. I. Nurdin, “On the quasi-balanceable class
of linear quantum stochastic systems,” Systems & Control Letters,
vol. 78, pp. 25–31, 2015.
[38] H. I. Nurdin, “Structures and transformations for model reduction of
linear quantum stochastic systems,” IEEE Transactions on Automatic
Control, vol. 59, no. 9, pp. 2413–2425, 2014.
[18] M. J. Woolley and A. A. Clerk, “Two-mode squeezed states in
cavity optomechanics via engineering of a single reservoir,” Physical
Review A, vol. 89, no. 6, p. 063805, 2014.
[39] I. R. Petersen, “Low frequency approximation for a class of linear
quantum systems using cascade cavity realization,” Systems &
Control Letters, vol. 61, no. 1, pp. 173–179, 2012.
[19] C. W. Gardiner, “Driving a quantum system with the output field from
another driven quantum system,” Physical Review Letters, vol. 70,
no. 15, pp. 2269–2272, 1993.
[40] M. Guţă and N. Yamamoto, “System identification for passive linear
quantum systems,” IEEE Transactions on Automatic Control, vol. 61,
no. 4, pp. 921–936, 2016.
[20] H. I. Nurdin, “On synthesis of linear quantum stochastic systems by
pure cascading,” IEEE Transactions on Automatic Control, vol. 55,
no. 10, pp. 2439–2444, 2010.
[41] J. E. Gough and G. Zhang, “On realization theory of quantum linear
systems,” Automatica, vol. 59, pp. 139–151, 2015.
[21] I. R. Petersen, “Cascade cavity realization for a class of complex
transfer functions arising in coherent quantum feedback control,”
Automatica, vol. 47, no. 8, pp. 1757–1763, 2011.
[42] K. Zhou, J. C. Doyle, and K. Glover, Robust and Optimal Control.
Prentice Hall, 1996.
[43] J. Gough and M. R. James, “The series product and its application
to quantum feedforward and feedback networks,” IEEE Transactions
on Automatic Control, vol. 54, no. 11, pp. 2530–2544, 2009.
[22] P. Seibert and R. Suarez, “Global stabilization of nonlinear cascade
systems,” Systems & Control Letters, vol. 14, no. 4, pp. 347–352,
1990.
11
[44] S. Iida, M. Yukawa, H.Yonezawa, N. Yamamoto, and A. Furusawa,
“Experimental demonstration of coherent feedback control on optical
field squeezing,” IEEE Transactions on Automatic Control, vol. 57,
no. 8, pp. 2045–2050, 2012.
[45] H. I. Nurdin, M. R. James, and A. C. Doherty, “Network synthesis
of linear dynamical quantum stochastic systems,” SIAM Journal on
Control and Optimization, vol. 48, no. 4, pp. 2686–2718, 2009.
[46] R. N. Alexander, P. Wang, N. Sridhar, M. Chen, O. Pfister, and
N. C. Menicucci, “One-way quantum computing with arbitrarily
large time-frequency continuous-variable cluster states from a
single optical parametric oscillator,” 2015. [Online]. Available:
http://arxiv.org/abs/1509.00484
[47] C. A. Muschik, E. S. Polzik, and J. I. Cirac, “Dissipatively driven
entanglement of two macroscopic atomic ensembles,” Physical Review
A, vol. 83, no. 5, p. 052312, 2011.
[48] C. Gerry and P. Knight, Introductory Quantum Optics.
University Press, 2004.
Cambridge
12
| 3cs.SY
|
Network Synchronization with Nonlinear Dynamics and
Switching Interactions∗
arXiv:1401.6541v3 [cs.SY] 24 Aug 2015
Tao Yang†, Ziyang Meng‡, Guodong Shi§, Yiguang Hong¶and Karl Henrik Johanssonk
Abstract
This paper considers the synchronization problem for networks of coupled nonlinear dynamical systems under switching communication topologies. Two types of nonlinear agent
dynamics are considered. The first one is non-expansive dynamics (stable dynamics with
a convex Lyapunov function ϕ(·)) and the second one is dynamics that satisfies a global
Lipschitz condition. For the non-expansive case, we show that various forms of joint connectivity for communication graphs are sufficient for networks to achieve global asymptotic
ϕ-synchronization. We also show that ϕ-synchronization leads to state synchronization provided that certain additional conditions are satisfied. For the globally Lipschitz case, unlike
the non-expansive case, joint connectivity alone is not sufficient for achieving synchronization. A sufficient condition for reaching global exponential synchronization is established in
terms of the relationship between the global Lipschitz constant and the network parameters.
We also extend the results to leader-follower networks.
Keywords: Multi-agent systems, nonlinear agents, switching interactions, synchronization.
∗
This work has been supported in part by the Knut and Alice Wallenberg Foundation and the Swedish Research
Council.
†
T. Yang is with the Pacific Northwest National Laboratory, 902 Battelle Boulevard, Richland, WA 99352
USA (e-mail: [email protected]).
‡
Z. Meng is with the Institute for Information-Oriented Control, Technische Universität München, D-80290
Munich, Germany (e-mail: [email protected]).
§
G. Shi is with the College of Engineering and Computer Science, The Australian National University, Canberra
ACT 0200, Australia (e-mail: [email protected]).
¶
Y. Hong is with the Key Laboratory of Systems and Control, Institute of Systems Science, Chinese Academy
of Science, Beijing 100190, China (e-mail: [email protected]).
k
K. H. Johansson is with the ACCESS Linnaeus Centre, School of Electrical Engineering, Royal Institute of
Technology, Stockholm 10044, Sweden (e-mail: [email protected]).
1
1
Introduction
We consider the synchronization problem for a network of coupled nonlinear agents with agent
set V = {1, 2, . . . , N }. Their interactions (communications in the network) are described by
a time-varying directed graph Gσ(t) = (V, Eσ(t) ), with σ : [0, ∞) → P as a piecewise constant
signal, where P is a finite set of all possible graphs over V. The state of agent i ∈ V at time t is
denoted as xi (t) ∈ Rn and evolves according to
ẋi = f (t, xi ) +
X
aij (t)(xj − xi ),
(1)
j∈Ni (σ(t))
where f (t, xi ) : [0, ∞) × Rn → Rn is piecewise continuous in t and continuous in xi representing
the uncoupled inherent agent dynamics, Ni (σ(t)) is the set of agent i’s neighbors at time t, and
aij (t) > 0 is a piecewise continuous function marking the weight of edge (j, i) at time t.
Systems of the form (1) have attracted considerable attention. Most works focus on the case
where the communication graph Gσ(t) is fixed, e.g., [1–7]. It is shown that for the case where
f (t, xi ) satisfies a Lipschitz condition, synchronization is achieved for a connected graph provided
that the coupling strength is sufficiently large. However, for the case where the communication
graph is time-varying, the synchronization problem becomes much more challenging and existing
literature mainly focuses on a few special cases when f (t, xi ) is linear, e.g., the single-integrator
case [8–10], the double-integrator case [11], and the neutrally stable case [12, 13]. Other studies
assume some particular structures for the communication graph [14–16]. In particular, in [14],
the authors focus on the case where the adjacency matrices associated with all communication
graphs are simultaneously triangularizable. The authors of [15] consider switching communication graphs that are weakly connected and balanced at all times. A more general case where
the switching communication graph frequently has a directed spanning tree has been considered
in [16]. These special structures on the switching communication graph are rather restrictive
compared to joint connectivity where the communication can be lost at any time.
This paper aims to investigate whether joint connectivity for switching communication
graphs can render synchronization for the nonlinear dynamics (1). We distinguish two classes
depending on whether the nonlinear agent dynamics f (t, xi ) is expansive or not. For the nonexpansive case, we focus on the case where the nonlinear agent dynamics is stable with a convex
Lyapunov function ϕ(·). We show that various forms of joint connectivity for communication
graphs are sufficient for networks to achieve global asymptotic ϕ-synchronization, that is, the
2
function ϕ of the agent state converges to a common value. We also show that ϕ-synchronization
implies state synchronization provided that additional conditions are satisfied. For the expansive case, we focus on when the nonlinear agent dynamics is globally Lipschitz, and establish
a sufficient condition for networks to achieve global exponential synchronization in terms of a
relationship between the Lipschitz constant and the network parameters.
The remainder of this paper is organized as follows. Section 2 presents the problem definition
and main results. Section 3 provides technical proofs. In Section 4, we extend the results to
leader-follower networks. Finally, Section 5 concludes the paper.
2
Problem Definition and Main Results
2.1
Problem Set-up
Throughout the paper we make a standard dwell time assumption [17] on the switching signal
σ(t): there is a lower bound τD > 0 between two consecutive switching time instants of σ(t).
We also assume that there are constants 0 < a∗ ≤ a∗ such that a∗ ≤ aij (t) ≤ a∗ for all t ≥ 0.
We denote x = [xT1 , xT2 , . . . , xTN ]T ∈ RnN and assume that the initial time is t = t0 ≥ 0, and the
initial state x(t0 ) = (xT1 (t0 ), . . . , xTN (t0 ))T ∈ RnN . A digraph is strongly connected if it contains a
directed path from every node to every other node. The joint graph of Gσ(t) in the time interval
[t1 , t2 ) with t1 < t2 ≤ ∞ is denoted as G([t1 , t2 )) = ∪t∈[t1 ,t2 ) G(t) = (V, ∪t∈[t1 ,t2 ) Eσ(t) ). For the
communication graph, we introduce the following definition.
Definition 1 (i). Gσ(t) is uniformly jointly strongly connected if there exists a constant T > 0
such that G([t, t + T )) is strongly connected for any t ≥ 0.
(ii). Assume that Gσ(t) is undirected for all t ≥ 0. Gσ(t) is infinitely jointly connected if
G([t, ∞)) is connected for any t ≥ 0.
In this paper, we are interested in the following synchronization problems.
Definition 2 The multi-agent system (1) achieves global asymptotic ϕ-synchronization, where
ϕ : Rn → R is a continuously differentiable function, if for any initial state x(t0 ), there exists a
constant d⋆ (x(t0 )), such that limt→∞ ϕ(xi (t)) = d⋆ (x(t0 )) for any i ∈ V and any t0 ≥ 0.
3
Definition 3 (i) The multi-agent system (1) achieves global asymptotic synchronization if
limt→∞ (xi (t) − xj (t)) = 0 for any i, j ∈ V, any t0 ≥ 0 and any x(t0 ) ∈ RnN .
(ii) Multi-agent system (1) achieves global exponential synchronization if there exist γ ≥ 1
and λ > 0 such that
max
{i,j}∈V×V
kxi (t) − xj (t)k2 ≤ γe−λ(t−t0 )
max
{i,j}∈V×V
kxi (t0 ) − xj (t0 )k2 , t ≥ t0 ,
(2)
for any t0 ≥ 0 and any x(t0 ) ∈ RnN .
Remark 1 ϕ-synchronization is a type of output synchronization where the output of agent
i ∈ V is chosen to be ϕ(xi ). It is related to but different from χ-synchronization [18, 19] since ϕ
is a function of an individual agent state while χ is a function of all agent states.
2.2
Non-expansive Inherent Dynamics
In this section, we focus on when the nonlinear inherent agent dynamics is non-expansive as
indicated by the following assumption.
Assumption 1 ϕ : Rn → R is a continuously differentiable positive definite convex function
satisfying
(i). limkηk→∞ ϕ(η) = ∞;
(ii). h∇ϕ(η), f (t, η)i ≤ 0 for any η ∈ Rn and any t ≥ 0.
The following lemma shows how Assumption 1 enforces non-expansive dynamics.
Lemma 1 Let Assumption 1 hold. Along the multi-agent dynamics (1), maxi∈V ϕ(xi (t)) is
non-increasing for all t ≥ 0.
We now state main results for the non-expansive case.
Theorem 1 Let Assumption 1 hold. The multi-agent system (1) achieves global asymptotic
ϕ-synchronization if Gσ(t) is uniformly jointly strongly connected.
Theorem 2 Let Assumption 1 hold. Assume that Gσ(t) is undirected for all t ≥ t0 . The multiagent system (1) achieves global asymptotic ϕ-synchronization if Gσ(t) is infinitely jointly connected.
4
Remark 2 For the linear time-varying case f (t, x) = A(t)x, if there exists a matrix P = P T > 0
such that
P A(t) + AT (t)P ≤ 0,
∀t ≥ 0,
(3)
then ϕ(x) = xT P x for x ∈ Rn satisfies Assumption 1. For the linear time-invariant case
f (t, x) = Ax, the condition (3) is equivalent to that the matrix A is neutrally stable [13].
2.3
ϕ-synchronization vs. State Synchronization
The following result establishes conditions under which ϕ-synchronization may imply state synchronization.
Theorem 3 Let Gσ(t) ≡ G with G being a fixed, strongly connected digraph under which the
multi-agent system (1) achieves global asymptotic ϕ-synchronization for some positive definite
function ϕ : Rn → R. Let Assumption 1 hold. Moreover, assume that
(i). f (t, η) is bounded for any t ≥ 0 and any η ∈ Rn .
(ii). c1 kηk2 ≤ ϕ(η) ≤ c2 kηk2 for some 0 < c1 ≤ c2 ; and
(iii). ϕ(·) is strongly convex.
Then the multi-agent system (1) achieves global asymptotic synchronization.
2.4
Lipschitz Inherent Dynamics
We consider also the case when the nonlinear inherent agent dynamics is possibly expansive.
We focus on when the dynamics satisfies the following global Lipschitz condition.
Assumption 2 There exists a constant L > 0 such that
kf (t, η) − f (t, ζ)k ≤ Lkη − ζk,
∀η, ζ ∈ Rn , ∀t ≥ 0.
(4)
Our main result for this case is given below.
Theorem 4 Let Assumption 2 hold. Assume that Gσ(t) is uniformly jointly strongly connected.
Global exponential synchronization is achieved for the multi-agent system (1) if L < ρ∗ /2, where
ρ∗ is a constant depending on the network parameters.
5
Remark 3 Assumption 2 and its variants have been considered in the literature for fixed communication graphs, e.g., [1–7]. Compared with the existing literature, we here study a more
challenging case, where the communication graphs are time-varying. Unlike the fixed case where
the global Lipschitz condition is sufficient to guarantee synchronization, Theorem 4 established a
sufficient synchronization condition related to the Lipschitz constant and the network parameters.
3
Proofs of the Main Results
In this section, we provide proofs of the main results.
3.1
Proof of Lemma 1
Recall that the upper Dini derivative of a function h(t) : (a, b) → R at t is defined as D + h(t) =
lim sups→0+
h(t+s)−h(t)
.
s
The following lemma from [10, 20] is useful for the proof.
Lemma 2 Let Vi (t, x) : R × Rn → R (i = 1, . . . , N ) be continuously differentiable and V (t, x) =
maxi=1,...,N Vi (t, x). If I(t) = {i ∈ {1, 2, . . . , N } : V (t, x(t)) = Vi (t, x(t))} is the set of indices
where the maximum is reached at t, then D + V (t, x(t)) = maxi∈I(t) V̇i (t, x(t)).
Denote I(t) = {i ∈ V : maxi∈V ϕ(xi (t)) = ϕ(xi (t))}. We first note that the convexity property
of ϕ(·) implies that [21, pp.69]
h∇ϕ(η), ζ − ηi ≤ ϕ(ζ) − ϕ(η),
∀η, ζ ∈ Rn .
(5)
It then follows from Lemma 2, Assumption 1(ii) and (5) that
D + max ϕ(xi (t)) = max ∇ϕ(xi ), f (t, xi ) +
i∈V
i∈I(t)
≤ max
i∈I(t)
X
aij (t)(xj − xi )
j∈Ni (σ(t))
X
aij (t)(ϕ(xj ) − ϕ(xi )) ≤ 0,
j∈Ni (σ(t))
where the last inequality follows from ϕ(xj ) ≤ ϕ(xi ). This proves the lemma.
3.2
Proof of Theorem 1
It follows from Lemma 1 that for any initial state x(t0 ) ∈ RnN , there exists a constant d∗ =
d⋆ (x(t0 )) ≥ 0, such that limt→∞ maxi∈V ϕ(xi ) = d⋆ . We shall show that d⋆ is the required
constant in Definition 2 of ϕ-synchronization.
6
We first note that by Lemma 1 that for all i ∈ V, there exist constants 0 ≤ αi ≤ βi ≤ d⋆ ,
such that
lim inf ϕ(xi (t)) = αi ,
lim sup ϕ(xi (t)) = βi .
t→∞
t→∞
Also note that it follows from limt→∞ maxi∈V ϕ(xi (t)) = d⋆ that for any ε > 0, there exists
T1 (ε) > 0 such that
ϕ(xi (t)) ∈ [0, d⋆ + ε],
∀i ∈ V, ∀t ≥ T1 (ε).
(6)
The proof of Theorem 1 is based on a contradiction argument and relies on the following
lemma.
Lemma 3 Let Assumption 1 hold. Assume that Gσ(t) is uniformly jointly strongly connected.
If there exists an agent k0 ∈ V such that 0 ≤ αk0 < d⋆ , then there exists 0 < ρ̄ < 1 and t̄ such
that for all i ∈ V, ϕ(xi (t̄ + (N − 1)T0 )) ≤ ρ̄M0 + (1 − ρ̄)(d⋆ + ε), where
T0 , T + 2τD ,
(7)
with T given in Definition 1(i) and τD is the dwell time.
Proof: Let us first define M0 ,
αk0 +βk0
2
< d⋆ . Then there exists an infinite time sequence
t0 < t̃1 < . . . < t̃k < . . . with limk→∞ t̃k = ∞ such that ϕ(x(t̃k )) = M0 for all k = 1, 2, . . .. We
then pick up one t̃k , k = 1, 2, . . . such that it is greater than or equal to T1 (ε) and denote it as
t̃k0 .
We now prove the lemma by estimating an upper bound of the scalar function ϕ(xi ) agent
by agent. The proof is based on a generalization of the method proposed in the proof of [22,
Lemma 4.3] but with substantial differences on the agent dynamics and Lyapunov function.
Moreover, the convexity of ϕ(·) plays an important role.
Step 1. Focus on agent k0 . By using Assumption 1(ii), (5), and (6), we obtain that for all
t ≥ t̃k0 ,
d
ϕ(xk0 (t)) = ∇ϕ(xk0 ), f (t, xk0 ) +
dt
≤
X
X
ak0 j (t)(xj − xk0 )
j∈Nk0 (σ(t))
ak0 j (t) (ϕ(xj ) − ϕ(xk0 ))
j∈Nk0 (σ(t))
≤ a∗ (N − 1)(d⋆ + ε − ϕ(xk0 )).
7
(8)
It then follows that for all t ≥ t̃k0 ,
ϕ(xk0 (t)) ≤ e−λ1 (t−t̃k0 ) ϕ(xk0 (t̃k0 )) + 1 − e−λ1 (t−t̃k0 ) (d⋆ + ε),
(9)
where λ1 = a∗ (N − 1).
Step 2. Consider agent k1 6= k0 such that (k0 , k1 ) ∈ Eσ(t) for t ∈ [t̃k0 , t̃k0 + T0 ). The existence of
such an agent can be shown as follows. Since Gσ(t) is uniformly jointly strongly connected, it is
not hard to see that there exists an agent k1 6= k0 ∈ V and t1 ≥ t̃k0 such that (k0 , k1 ) ∈ Eσ(t) for
t ∈ [t1 , t1 + τD ) ⊆ [t̃k0 , t̃k0 + T0 ).
From (9), we obtain for all t ∈ [t̃k0 , t̃k0 + (N − 1)T0 ],
ϕ(xk0 (t)) ≤ κ0 , ρM0 + (1 − ρ)(d⋆ + ε),
∗ (N −1)2 T
0
where ρ = e−λ1 (N −1)T0 = e−a
(10)
.
We next estimate ϕ(xk1 (t)) by considering two different cases.
Case I: ϕ(xk1 (t)) > ϕ(xk0 (t)) for all t ∈ [t1 , t1 + τD ).
By using Assumption 1(ii), (5), (6), and (10), we obtain for all t ∈ [t1 , t1 + τD ),
d
ϕ(xk1 (t)) ≤
dt
X
j∈Nk1 (σ(t))\{k0 }
ak1 j (t) ϕ(xkj ) − ϕ(xk1 ) + ak1 k0 (t)(ϕ(xk0 ) − ϕ(xk1 ))
≤ a∗ (N − 2)(d⋆ + ε − ϕ(xk1 )) + a∗ (κ0 − ϕ(xk1 )) .
From the preceding relation, we obtain for t ∈ [t1 , t1 + τD ),
ϕ(xk1 (t)) ≤ e−λ2 (t−t1 ) ϕ(xk1 (t1 )) +
[a∗ (N − 2)(d⋆ + ε) + a∗ κ0 ] (1 − e−λ2 (t−t1 ) )
,
λ2
where λ2 = a∗ (N − 2) + a∗ . Therefore, we have
ϕ(xk1 (t1 + τD )) ≤ κ1 , µ(d⋆ + ε) + (1 − µ)κ0 ,
(11)
where
µ=
λ2 − a∗ (1 − e−λ2 τD )
.
λ2
(12)
By applying the same analysis as we obtained (9) to the agent k1 , we obtain for all t ≥ t1 + τD ,
i
h
ϕ(xk1 (t)) ≤ e−λ1 (t−(t1 +τD )) κ1 + 1 − e−λ1 (t−(t1 +τD )) (d⋆ + ε).
8
(13)
By combining the inequalities (10), (11) and (13), we obtain for all t ∈ [t1 + τD , t̃k0 + (N − 1)T0 ],
ϕ(xk1 (t)) ≤ ϕ1 M0 + (1 − ϕ1 )(d⋆ + ε),
(14)
where ϕ1 = (1 − µ)ρ2 .
Case II: There exists a time instant t̄1 ∈ [t1 , t1 + τD ) such that
ϕ(xk1 (t̄1 )) ≤ ϕ(xk0 (t̄1 )) ≤ κ0 .
(15)
By applying the similar analysis as we obtained (8) to the agent k1 , we obtain for all t ≥ t̃k0 ,
d
ϕ(xk1 (t)) ≤ a∗ (N − 1)(d⋆ + ε − ϕ(xk1 (t))).
dt
This leads to
ϕ(xk1 (t)) ≤ e−λ1 (t−t̄1 ) ϕ(xk1 (t̄1 )) + (1 − e−λ1 (t−t̄1 ) )(d⋆ + ε).
By combining the preceding relation, (10), and (15), and using 0 < ϕ1 = (1 − µ)ρ2 < ρ2 which
follows from 0 < µ < 1, we obtain for all t ∈ [t1 + τD , t̃k0 + (N − 1)T0 ],
ϕ(xk1 (t)) ≤ ρ2 M0 + (1 − ρ2 )(d⋆ + ε) < ϕ1 M0 + (1 − ϕ1 )(d⋆ + ε).
From the preceding relation and (14), it follows that for both cases, we have for all t ∈ [t1 +
τD , t̃k0 + (N − 1)T0 ],
ϕ(xk1 (t)) ≤ ϕ1 M0 + (1 − ϕ1 )(d⋆ + ε).
From the preceding relation, (10) and 0 < ϕ1 < ρ < 1, it follows that for all t ∈ [t1 + τD , t̃k0 +
(N − 1)T0 ],
ϕ(xj (t)) ≤ ϕ1 M0 + (1 − ϕ1 )(d⋆ + ε),
j ∈ {k0 , k1 }.
(16)
Step 3. Consider agent k2 ∈
/ {k0 , k1 } such that there exists an edge from the set {k0 , k1 } to the
agent k2 in Eσ(t) for t ∈ [t2 , t2 + τD ) ⊆ [t̃k0 + T0 , t̃k0 + 2T0 ). The existence of such an agent k2
and t2 follows similarly from the argument in Step 2.
Similarly, we can bound ϕ(xk2 (t)) by considering two different cases and obtain that for all
t ∈ [t2 + τD , t̃k0 + (N − 1)T0 ],
ϕ(xk2 (t)) ≤ ϕ2 M0 + (1 − ϕ2 )(d⋆ + ε),
where ϕ2 = ((1 − µ)ρ2 )2 .
9
(17)
By combining (16) and (17), and using 0 < ϕ2 < ϕ1 < 1, we obtain that for all t ∈
[t2 + τD , t̃k0 + (N − 1)T0 ],
ϕ(xj (t)) ≤ ϕ2 M0 + (1 − ϕ2 )(d⋆ + ε),
j ∈ {k0 , k1 , k2 }.
Step 4. By repeating the above process on time intervals [t̃k0 + 2T0 , t̃k0 + 3T0 ), . . . , [t̃k0 + (N −
2)T0 , t̃k0 + (N − 1)T0 ), we eventually obtain that for all i ∈ V,
ϕ(xi (t̃k0 + (N − 1)T0 )) ≤ ϕN −1 M0 + (1 − ϕN −1 )(d⋆ + ε).
where ϕN −1 = ((1 − µ)ρ2 )N −1 . The result of the lemma then follows by choosing ρ̄ = ϕN −1 and
t̄ = t̃k0 .
We are now ready to prove Theorem 1 by contradiction. Suppose that there exists an agent
k0 ∈ V such that 0 ≤ αk0 < d⋆ . It then follows from Lemma 3 that ϕ(xi (t̄ + (N − 1)T0 )) < d⋆ for
all i ∈ V, provided that ε <
ρ̄(d⋆ −M0 )
.
1−ρ̄
This contradicts the fact that limt→∞ maxi∈V ϕ(xi ) = d⋆ .
Thus, there does not exist an agent k0 ∈ V such that 0 ≤ αk0 < d⋆ . Hence, limt→∞ ϕ(xi (t)) = d⋆
for all i ∈ V.
3.3
Proof of Theorem 2
The proof relies on the following lemma.
Lemma 4 Let Assumption 1 hold. Assume that Gσ(t) is infinitely jointly connected. If there
exists an agent k0 ∈ V such that 0 ≤ αk0 < d⋆ , then there exist 0 < ρ̃ < 1 and t̃ such that
ϕ(xi (t̃ + τD )) ≤ ρ̃M0 + (1 − ρ̃)(d⋆ + ε),
∀i ∈ V.
Proof: The proof of Lemma 4 is similar to that of Lemma 3 and based on estimating an upper
bound for the scalar quantity ϕ(xi ) agent by agent. However, since Gσ(t) is infinitely jointly
connected, the method that we get the order of the agents based on the intervals induced by
the uniform bound T cannot be used here. We can however apply the strategy in [22] for the
analysis as shown below:
Step 1. In this step, we focus on agent k0 . Since Gσ(t) is infinitely jointly connected, we can
define
t̂1 ,
inf
{∃ i ∈ V | (k0 , i) ∈ Eσ(t) },
t∈[t̃k0 ,∞)
10
and the set
V1 , {i ∈ V | (k0 , i) ∈ Eσ(t̂1 ) }.
For t̃k0 ≤ t < t̂1 , agent k0 has no neighbor, it follows from Assumption 1(ii) that
d
dt ϕ(xk0 (t))
=
h∇ϕ(xk0 ), f (t, xk0 )i ≤ 0. Thus, ϕ(xk0 (t)) ≤ ϕ(xk0 (t̃k0 )) for t̃k0 ≤ t < t̂1 . By applying a similar
analysis as we obtained (10), we have for all t ∈ [t̂1 , t̂1 + τD ),
ϕ(xk0 (t)) ≤ κ̂0 , ρ̂M0 + (1 − ρ̂)(d⋆ + ε),
∗ (N −1)τ
D
where ρ̂ = e−a
.
Step 2. In this step, we focus on all k1 ∈ V1 . We then estimate ϕ(xk1 (t)) for all k1 ∈ V1 by
considering two different cases, i.e., Case I: If ϕ(xk1 (t)) > ϕ(xk0 (t)) for all t ∈ [t̂1 , t̂1 + τD ), and
Case II: If there exists a time instant t̄1 ∈ [t̂1 , t̂1 + τD ) such that ϕ(xk1 (t̄1 )) ≤ ϕ(xk0 (t̄1 )) ≤ κ̂0 .
By using the similar argument as the two-case analysis for agent k1 in the proof of Theorem 1,
we eventually obtain for all j ∈ k0 ∪ V1 ,
ϕ(xj (t̂1 + τD )) < ϕ̂1 M0 + (1 − ϕ̂1 )(d⋆ + ε),
(18)
where ϕ̂1 = (1 − µ)ρ̂2 with µ given by (12).
Step 3. We then view the set {k0 } ∪ V1 as a subsystem. Define t̂2 as the first time when there
is an edge between this subsystem and the remaining agents and V2 accordingly. By using the
similar analysis for agent k1 in Step 2, we can estimate the upper bound for all the agent in the
set {k0 } ∪ V1 ∪ V2 ,
Step 4. Since Gσ(t) is infinitely jointly connected, we can continue the above process until
V = {k0 } ∪ V1 ∪ · · · ∪ Vℓ for some ℓ ≤ N − 1. Eventually, we have
ϕ(xi (t̂ℓ + τD )) < ϕ̂N −1 M0 + (1 − ϕ̂N −1 )(d⋆ + ε),
∀i ∈ V.
The result of lemma then follows by choosing t̃ = t̂ℓ and ρ̃ = ϕ̂N −1 .
The remaining proof of Theorem 2 follows from a contradiction argument and Lemma 4 in
the same way as the proof of Theorem 1.
11
3.4
Proof of Theorem 3
If the multi-agent system (1) reaches asymptotic ϕ-synchronization, i.e., limt→∞ ϕ(xi (t)) = d⋆
for all i ∈ V, then for any ǫ > 0, there exists a Tǫ > 0 such that
d⋆ − ǫ ≤ ϕ(xi (t)) ≤ d⋆ + ǫ,
∀i ∈ V,
∀t ≥ Tǫ .
(19)
If d⋆ = 0 the desired conclusion holds trivially, i.e., limt→∞ xi (t) = 0 for all i ∈ V due to the
positive definiteness of ϕ(·). In the remainder of the proof we assume d⋆ > 0. We shall prove
the result by contradiction. Suppose that state synchronization is not achieved, then there exist
two agents i0 , j0 ∈ V such that lim supt→∞ kxi0 (t) − xj0 (t)k > 0. In other words, there exist an
infinite time sequence t1 < · · · < tk < . . . with limk→∞ tk = ∞, and a constant δ > 0 such that
p
kxi0 (tk ) − xj0 (tk )k = 2N −1 δ/c1 for all k ≥ 1, where c1 is given in condition (ii) of Theorem 3.
We divide the following analysis into three steps.
Step 1. In this step, we prove the following crucial claim.
Claim. For any tk , there are two agents i∗ , j∗ ∈ V with (i∗ , j∗ ) ∈ E such that kxi∗ (tk )−xj∗ (tk )k ≥
p
δ/c1 .
We establish this claim via a recursive analysis. If either (i0 , j0 ) ∈ E or (j0 , i0 ) ∈ E then
the result follows trivially. Otherwise we pick up another agent k0 satisfying that there is an
edge between k0 and {i0 , j0 }. This k0 always exists since G is strongly connected. Then either
p
p
kxk0 (tk ) − xi0 (tk )k ≥ 2N −2 δ/c1 or kxk0 (tk ) − xj0 (tk )k ≥ 2N −2 δ/c1 must hold. Thus, we have
again either established the claim, or we can continue to select another agent different from i0 ,
j0 , and k0 and repeat the argument. Since we have a finite number of agents, the desired claim
holds.
Furthermore, since there is a finite number of agent pairs, without loss of generality, we
assume that the given agent pair i∗ , j∗ does not vary for different tk (otherwise we can always
select an infinite subsequence of tk for the following discussions).
Step 2. In this step, we establish a lower bound of kxi∗ (t)−xj∗ (t)k2 for a small time interval after
a particular tk satisfying tk > Tǫ . From (19) and limkxk→∞ ϕ(x) = ∞ given in Assumption 1(i),
we see that xi (t) and ∇ϕ(xi (t) − xj (t)) are bounded for all i, j ∈ V and for all t ≥ Tǫ . It then
follows from condition (i) of Theorem 3 and (1) that
d
ϕ(xi∗ − xj∗ ) ≤
dt
∇ϕ(xi∗ − xj∗ ), f (t, xi∗ ) − f (t, xj∗ )i
12
+
∇ϕ(xi∗ − xj∗ ),
X
ai∗ k1 (t)(xk1 − xi∗ )i
X
aj∗ k2 (t)(xk2 − xj∗ )i ≤ L∗
k1 ∈Ni∗ (σ(t))
+
∇ϕ(xi∗ − xj∗ ),
k2 ∈Nj∗ (σ(t))
for all t ≥ tk and some L∗ > 0. Without loss of generality we assume that ǫ ≤ 1. Then L∗ will
be independent of ǫ.
By plugging in the fact that kxi∗ (tk ) − xj∗ (tk )k ≥
Theorem 3, we obtain that
kxi∗ (t) − xj∗ (t)k2 ≥
δ
,
2c2
p
δ/c1 and using the condition (ii) of
δ
t ∈ tk , tk +
.
2L∗
(20)
Step 3. We first note that the strong convexity of ϕ(·) implies that [21, pp.459] there exists an
m > 0 such that
h∇ϕ(η), ζ − ηi ≤ ϕ(ζ) − ϕ(η) −
m
kη − ζk2 , ∀η, ζ ∈ Rn .
2
(21)
By using Assumption 1(ii) and (21), we obtain for t ≥ Tǫ ,
d
m
ϕ(xj∗ (t)) ≤ aj∗ i∗ (t) ϕ(xi∗ ) − ϕ(xj∗ ) − kxi∗ − xj∗ k2
dt
2
X
aj∗ k (t) ϕ(xk ) − ϕ(xj∗ )
+
k∈Nj∗ (σ(t))\{i∗ }
m
≤ aj∗ i∗ (t) ϕ(xi∗ ) − ϕ(xj∗ ) − aj∗ i∗ (t)kxi∗ (t) − xj∗ (t)k2
2
X
aj∗ k (t) ϕ(xk ) − ϕ(xj∗ ) ,
+
(22)
k∈Nj∗ (σ(t))\{i∗ }
h
By using (19), (20), (22), and condition (ii) of Theorem 3, we obtain that for t ∈ tk , tk +
a∗ mδ
d
ϕ(xj∗ (t)) ≤ 2(N − 1)a∗ ǫ −
,
dt
4c2
δ
2L∗
i
,
which yields
δ
a∗ mδ
δ
∗
)) ≤ d⋆ + ǫ + 2(N − 1)a ǫ −
.
ϕ(xj∗ (tk +
2L∗
4c2 2L∗
It is then straightforward to see that
ϕ(xj∗ (tk +
δ
a∗ mδ2
)) < d⋆ −
2L∗
32c2 L∗
if we take
ǫ < min
n a mδ2
o
a∗ mδ
∗
.
,
32c2 L∗ 16(N − 1)a∗ c2
However, this contradicts the definition of ϕ-synchronization since tk is arbitrarily chosen. This
completes the proof and the desired conclusion holds.
13
3.5
Proof of Theorem 4
The proof is based on the convergence analysis of the scalar quantity
V (t, x(t)) =
max
{i,j}∈V×V
Vij (t, x(t)),
(23)
where
1
Vij (t, x(t)) = e−2L(t−t0 ) kxi (t) − xj (t)k2 , ∀{i, j} ∈ V × V.
2
(24)
Unlike the contradiction argument used for proof of Theorem 1, where the convergence rate is
unclear, here we explicitly characterize the convergence rate. The proof relies on the following
lemmas.
Lemma 5 Let Assumption 4 hold. Along the multi-agent dynamics (1), V (t, x(t)) is nonincreasing for all t ≥ 0.
Proof: This lemma establishes a critical non-expansive property along the multi-agent dynamics
(1) for the globally Lipschitz case. The proof follows from the same techniques as those for
proving Lemma 1 by investigating the Dini derivative of V (t, x(t)).
Let V 1 × V 2 be the set containing all the node pairs that reach the maximum at time t, i.e.,
V 1 (t) × V 2 (t) = {{i, j} ∈ V × V : Vij (t) = V (t)}. It is not hard to obtain that
D+ V =
max
{i,j}∈V 1 ×V 2
×
n
e−2L(t−t0 ) (xi − xj )T (f (t, xi ) − f (t, xj )) + e−2L(t−t0 ) (xi − xj )T
X
aik1 (t)(xk1 − xi ) − e−2L(t−t0 ) (xi − xj )T
X
ajk2 (t)(xk2 − xj )
k2 ∈Nj (σ(t))
k1 ∈Ni (σ(t))
o
−Le−2L(t−t0 ) kxi − xj k2
X
1
e−2L(t−t0 )
max
≤
2 {i,j}∈V 1 ×V 2
aik1 (t)(kxj − xk1 k2 − kxi − xj k2 )
k1 ∈Ni (σ(t))
X
+e−2L(t−t0 )
k2 ∈Nj (σ(t))
≤
max
X
{i,j}∈V 1 ×V 2
k1 ∈Ni (σ(t))
ajk2 (t)(kxi − xk2 k2 − kxi − xj k2 )
aik1 (t)(Vjk1 − Vij ) +
X
k2 ∈Nj (σ(t))
ajk2 (t)(Vik2
− Vij ) ≤ 0,
(25)
where the first equality follows from Lemma 2 and (1), the first inequality follows from (4) and
ab ≤
a2 +b2
2
and −ab ≤
a2 +b2
2
for all a, b ∈ Rn , and the second inequality follows from (24).
14
Lemma 6 Let Assumption 4 hold. Assume that Gσ(t) is uniformly jointly strongly connected.
Then there exists 0 < β̃ < 1 such that
Vij (N T0 , x(N T0 )) ≤ β̃V ∗ ,
∀{i, j} ∈ V × V,
where N = N − 1, T0 is given by (7) and V ∗ = V (t0 , x(t0 )).
Proof: The proof is based on the convergence analysis of Vij (t, x(t) for all agent pairs {i, j} ∈
V × V in several steps, which is similar to the proof of Lemma 3. Without loss of generality,
we assume that t0 = 0. We also sometimes denote V (t, x(t)) and Vij (t, x(t)) as V and Vij ,
respectively, for notational simplification.
Step 1. We begin by considering any agent i1 ∈ V. Since Gσ(t) is uniformly jointly strongly
connected, we know that i1 is the root and that there exists a time t1 and an agent i2 ∈ V \ {i1 }
such that (i1 , i2 ) ∈ E during t ∈ [t1 , t1 + τD ) ⊂ [0, T0 ].
We first note that it follows from (23) and Lemma 5 that for all t ∈ [0, N T0 ],
Vij (t, x(t)) ≤ V (t, x(t)) ≤ V ∗ , ∀{i, j} ∈ V × V.
(26)
Taking the derivative of Vij along the trajectories of (1), we obtain that for all t ∈ [t1 , t1 +τD ),
X
ai1 k1 (t)(xk1 − xi1 )
V̇i1 i2 = − Le−2L(t−t0 ) kxi1 − xi2 k2 + e−2L(t−t0 ) (xi1 − xi2 )T
k1 ∈Ni1 (σ(t))
X
−
ai2 k2 (t)(xk2 − xi2 ) + (f (t, xi1 ) − f (t, xi2 ))
k2 ∈Ni2 (σ(t))
≤
X
ai1 k (t)(Vi2 k1 − Vi1 i2 ) − ai2 i1 (t)Vi1 i2 +
k1 ∈Ni1 (σ(t))
X
ai2 k2 (t)(Vi1 k2 − Vi1 i2 )
k2 ∈Ni2 (σ(t))\{i1 }
≤ (N − 1)a∗ (V ∗ − Vi1 i2 ) − a∗ Vi1 i2 + (N − 2)a∗ (V ∗ − Vi1 i2 )
= − α(Vi1 i2 −
(2N − 3)a∗ ∗
V ),
α
where α = (2N − 3)a∗ + a∗ . The first inequality follows from (4) and (24), while the second
inequality follows from (26).
It thus follows that
Vi1 i2 (t1 + τD , x(t1 + τD )) ≤ α̂1 V ∗ ,
where α̂1 = 1 −
a∗
α (1
− e−ατD ) ∈ (0, 1).
15
(27)
Similarly we obtain that for all t ∈ [t1 +τD , N T0 ], V̇i1 i2 ≤ α(V ∗ −Vi1 i2 ), where α = 2(N −1)a∗ .
It then follows from (27) that
Vi1 i2 (t, x(t)) ≤ α∗1 V ∗ ,
∀t ∈ [t1 + τD , N T0 ],
(28)
where α∗1 = 1 − (1 − e−ατD ) aα∗ e−αN T0 ∈ (0, 1).
Step 2. Since Gσ(t) is uniformly jointly strongly connected, we know that that there exists a
time instant t2 and an arc from h ∈ V1 , {i1 , i2 } to i3 ∈ V \ V1 during [t2 , t2 + τD ) ⊂ [T0 , 2T0 ].
We then estimate an upper bound for Vhi3 by considering two different cases: h = i1 and
h = i2 . We eventually obtain that for all t ∈ [t2 + τD , N T0 ],
Vhi3 (t, x(t)) ≤ (1 − β∗2 )V ∗ ,
∀h ∈ V1 .
(29)
where
β∗ = (1 − e−ατD )
a∗ −αN T0
e
∈ (0, 1).
α
(30)
It then follows from (28), (29) and 1 − β∗2 > 1 − β∗ = α∗1 that for all t ∈ [2T0 , N T0 ],
Vi1 k (t, x(t)) ≤ (1 − β∗2 )V ∗ ,
∀k ∈ V2 \{i1 },
where V2 , {i1 , i2 , i3 }.
Step 3. By continuing the above process, we obtain that for all k ∈ V\{i1 },
Vi1 k (N T0 , x(N T0 )) ≤ (1 − β∗N )V ∗ .
(31)
Step 4. Since Gσ(t) is uniformly jointly strongly connected, (31) holds for any i1 ∈ V. By using
the same analysis, we eventually obtain that for all i, j ∈ V,
Vij (N T0 , x(N T0 )) ≤ (1 − β∗N )V ∗ .
Hence the result follows by choosing β̃ = 1 − β∗N with β∗ given by (30).
We are now ready to prove Theorem 4. By using Lemma 6 and (23), we obtain that
V (t, x(t)) ≤ β̃
⌊
t
⌋
N T0
V∗ ≤
1 −ρ∗ t ∗
e
V ,
β̃
where ⌊ NtT ⌋ denotes the largest integer that is not greater than
0
16
t
N T0
and ρ∗ =
1
N T0
ln β̃1 .
It then follows from (23) and (24) that
max
{i,j}∈V×V
kxi (t) − xj (t)k2 ≤
1 −(ρ∗ −2L)t
e
max kxi (0) − xj (0)k2 .
{i,j}∈V×V
β̃
Hence, global exponential synchronization is achieved with γ =
1
β̃
and λ = ρ∗ − 2L provided
that ρ∗ > 2L. This concludes the proof of the desired theorem.
4
Leader-follower Networks
Our focus so far has been on achieving synchronization for leaderless networks. In this section
we consider the synchronization problem for leader-follower networks. Suppose that there is an
additional agent, labeled as agent 0, which plays as a reference or leader for the agents in the
set V. In view of this we also call an agent in V a follower, and denote V̄ = V ∪ {0} as the overall
agent set. The overall communication in the network is described by a time-varying directed
graph Ḡσ(t) = (V̄, E¯σ(t) ). Here for the sake of simplicity we continue to use σ(·) to denote the
piecewise constant graph signal. We also make a standard dwell time assumption [17] on the
switching signal σ(t).
For the leader-follower communication graph, we introduce the following definition.
Definition 4 (i). Ḡσ(t) is leader connected if for any follower agent i ∈ V there is a directed
path from the leader 0 to follower agent i in Ḡσ(t) at time t. Moreover, Ḡσ(t) is jointly leader
connected in the time interval [t1 , t2 ) if the union graph Ḡ([t1 , t2 )) is leader connected.
(ii). Ḡσ(t) is uniformly jointly leader connected if there exists a constant T > 0 such that
the union graph Ḡ([t, t + T )) is leader connected for any t ≥ 0.
(iii). Ḡσ(t) is infinitely jointly leader connected if the union graph Ḡ([t, ∞)) is leader connected for any t ≥ 0.
For leader-follower networks, the evolutions of the follower state xi (t) and the leader state
y(t) are given by
P
ẋi = f (t, xi ) +
j∈Ni (σ(t)) aij (t)(xj − xi ) + bi (t)(y − xi ),
i ∈ V,
(32)
ẏ = f (y, t),
where the nonlinear function f (xi , t) and aij (t) follow from the same definitions as those of the
leaderless case in (1), and bi (t) > 0 is a piecewise continuous function marking the strength of
17
the edge (0, i), if any. Assume that there is a constant b∗ > 0 such that b∗ ≤ bi (t) for all t ≥ 0.
We also assume that the initial time is t = t0 ≥ 0 and denote the initial state for the leader as
y(t0 ) ∈ Rn .
For the leader-follower networks, we are interested in the following synchronization problems.
Definition 5 (i) The multi-agent system (32) achieves global asymptotic synchronization if
limt→∞ (xi (t) − y(t)) = 0 for any i ∈ V, any t0 ≥ 0, any x(t0 ) ∈ RnN , and y(t0 ) ∈ Rn .
(ii) Multi-agent system (32) achieves global exponential synchronization if there exist γ ≥ 1
and λ > 0 such that there exist γ ≥ 1 and λ > 0 such that
max kxi (t) − y(t)k2 ≤ γe−λ(t−t0 ) max kxi (t0 ) − y(t0 )k2 ,
i∈V
i∈V
t ≥ t0 ,
(33)
for any t0 ≥ 0, any x(t0 ) ∈ RnN , and y(t0 ) ∈ Rn .
4.1
Non-expansive Inherent Dynamics
In this section, we extend the results for the case when the agent dynamics is non-expansive to
leader-follower networks. We make the following assumption on the agent dynamics.
Assumption 3 ϕ∗ : Rn → R is a continuously differentiable positive definite function such that
the following conditions hold:
(i). limkηk→∞ ϕ∗ (η) = ∞;
(ii). h∇ϕ∗ (η − ζ), f (t, η) − f (t, ζ)i ≤ 0 for all η, ζ ∈ Rn and t ≥ 0.
Assumption 3 is similar to Assumption 1 however with possibly different functions ϕ∗ (·) and
Assumption 3(ii) holds in the relative coordinate.
The convexity property guarantees the non-expansive property along the leader-follower
multi-agent dynamics (32) as shown in the following lemma whose proof is similar to that of
Lemma 1 and thus omitted.
Lemma 7 Let Assumption 3 hold. Along the leader-follower multi-agent dynamics (32),
maxi∈V ϕ∗ (xi (t)) is non-increasing for all t ≥ 0..
We now state our results for the non-expansive case.
18
Theorem 5 Let Assumption 3 hold. The multi-agent system (32) achieves global asymptotic
synchronization if Ḡσ(t) is uniformly jointly leader connected.
Theorem 6 Let Assumption 3 hold. Assume that Gσ(t) is undirected for all t ≥ t0 . The multiagent system (32) achieves global asymptotic synchronization is achieved if Ḡσ(t) is infinitely
jointly leader connected.
The proofs of Theorems 5 and 6 are given in Appendices A and B, respectively, and based
on a generalization of the methods proposed in [9, 23] however the nonlinear agent dynamics
results in a different Lyapunov function maxi∈V ϕ∗ (x̄i (t)). The analysis are based on estimating
the scalar function ϕ∗ (x̄i (t)) agent by agent and thus yields an estimate of the convergence rate.
They are different from the contradiction arguments used in the proofs of Theorems 1 and 2
where the convergence rate is unclear.
Remark 4 If the scalar function ϕ∗ (·) satisfies an additional condition, i.e., there exist 0 <
c1 ≤ c2 , such that
c1 kηk2 ≤ ϕ∗ (η) ≤ c2 kηk2 , ∀η ∈ Rn ,
then Theorem 5 leads to global exponential synchronization.
Remark 5 For the leader-follower case, Theorems 5 and 6 show that global asymptotic synchronization is achieved while for the leaderless case, while global asymptotic ϕ-synchronization
is achieved as shown in Theorems 1 and 2. For the leader-follower case, the uniformly jointly
leader connected in Theorem 5 requires the leader to be a center node, while for the leaderless
case, the uniformly jointly strongly connected in Theorem 1 requires every node to be a center node. Thus, the connectivity condition of the leaderless case is stronger than that of the
leader-follower case.
4.2
Lipschitz Inherent Dynamics
In this section, we extend the result for the case when the agent dynamics is globally Lipschitz
to leader-follower networks.
Our main result for this case is given in the following theorem whose proof can be found in
Appendix C.
19
Theorem 7 Let Assumption 2 hold. Suppose that Ḡσ(t) is uniformly jointly leader connected.
The multi-agent system (32) achieves global exponential synchronization if L < ρ̂∗ /2, where ρ̂∗
is a constant depending on the network parameters.
5
Conclusions
In this paper, synchronization problems for networks with nonlinear inherent agent dynamics and
switching topologies have been investigated. Two types of nonlinear dynamics were considered:
non-expansive and globally Lipschitz. For the non-expansive case, we found that the convexity
of the Lyapunov function plays a crucial rule in the analysis and showed that the uniformly
joint strong connectivity is sufficient for achieving global asymptotic ϕ-synchronization. When
communication graphs are undirected, the infinitely joint connectivity is a sufficient synchronization condition. Moreover, we established conditions under which ϕ-synchronization implies
state synchronization. For the globally Lipschitz case, we found that joint connectivity alone is
not sufficient to achieve synchronization but established a sufficient synchronization condition.
The proposed condition reveals the relationship between the Lipschitz constant and the network
parameters. The results were also extended to leader-follower networks. An interesting future
direction is to study the synchronization problem for coupled non-identical nonlinear inherent
dynamics under general switching topologies.
References
[1] C. W. Wu and L. O. Chua, “Application of graph theory to the synchronization in an array
of coupled nonlinear oscillators,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl.,
vol. 42, no. 8, pp. 494–497, 1995.
[2] C. W. Wu, Synchronization in Complex Networks of Nonlinear Dynamical Systems.
Sin-
gapore: World Scientific: Singapore, 2007.
[3] V. Belykh, I. Belykh, and M. Hasler, “Connection graph stability method for synchronized
coupled chaotic systems,” Physica D, vol. 195, no. 1-2, pp. 159–187, 2004.
20
[4] P. DeLellis, M. D. Bernardo, and G. Russo, “On QUAD, Lipschitz, and contracting vector
fields for consensus and synchronization of networks,” IEEE Trans. Circuits Syst. I, Reg.
Papers, vol. 58, no. 3, pp. 576–583, 2011.
[5] W. Yu, G. Chen, and M. Cao, “Consensus in directed networks of agents with nonlinear
dynamics,” IEEE Trans. Autom. Control, vol. 56, no. 6, pp. 1436–1441, 2011.
[6] U. Münz, A. Papachristodoulou, and F. Allgöwer, “Consensus in multi-agent systems with
coupling delays and switching topology,” IEEE Trans. Autom. Control, vol. 56, no. 12, pp.
2976 –2982, 2011.
[7] H. Liu, M. Cao, and C. W. Wu, “Coupling strength allocation for synchronization in complex networks using spectral graph theory,” IEEE Trans. Circuits Syst. I, Reg. Papers,
vol. 61, no. 5, pp. 1520–1530, 2014.
[8] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of groups of mobile autonomous
agents using nearest neighbor rules,” IEEE Trans. Autom. Control, vol. 48, no. 6, pp.
988–1001, 2003.
[9] L. Moreau, “Stability of multiagent systems with time-dependent communication links,”
IEEE Trans. Autom. Control, vol. 50, no. 2, pp. 169–182, 2005.
[10] Z. Lin, B. Francis, and M. Maggiore, “State agreement for continuous-time coupled nonlinear systems,” SIAM J. Contr. & Opt., vol. 46, no. 1, pp. 288–307, 2007.
[11] W. Ren and R. W. Beard, “Consensus seeking in multiagent systems under dynamically
changing interaction topologies,” IEEE Trans. Autom. Control, vol. 50, no. 5, pp. 655–661,
2005.
[12] L. Scardovi and R. Sepulchre, “Synchronization in networks of identical linear systems,”
Automatica, vol. 45, no. 11, pp. 2557–2562, 2009.
[13] Y. Su and J. Huang, “Stability of a class of linear switching systems with applications to
two consensus problem,” IEEE Trans. Autom. Control, vol. 57, no. 6, pp. 1420–1430, 2012.
[14] J. Zhao, D. J. Hill, and T. Liu, “Synchronization of complex dynamical networks with
switching topology: a switched system point of view,” Automatica, vol. 45, no. 11, pp.
2502–2511, 2009.
21
[15] J. Qin, H. Gao, and W. Zheng, “Exponential synchronization of complex networks of linear
systems and nonlinear oscillators: a unified analysis,” IEEE Trans. Neural Netw. Learn.
Syst., vol. 61, no. 2, pp. 499–511, 2014.
[16] G. Wen, Z. Duan, G. Chen, and W. Yu, “Consensus tracking of multi-agent systems with
Lipschitz-type node dynamics and switching topologies,” IEEE Trans. Circuits Syst. I, Reg.
Papers, vol. 61, no. 2, pp. 499–511, 2014.
[17] D. Liberzon and A. S. Morse, “Basic problem in stability and design of switched systems,”
IEEE Control Syst. Mag., vol. 19, no. 5, pp. 59–70, 1999.
[18] J. Cortés, “Distributed algorithms for reaching consensus on general functions,” Automatica, vol. 44, no. 3, pp. 726–737, 2008.
[19] X. Wang and Y. Hong, “Distributed finite-time χ-consensus algorithms for multi-agent
systems with variable coupling topology,” Journal of Systems Science and Complexity,
vol. 23, no. 2, pp. 209–218, 2010.
[20] J. Danskin, “The theory of max-min, with applications,” SIAM J. Appl. Math., vol. 14,
no. 6, pp. 641–664, 1996.
[21] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY: Cambridge University
Press, 2004.
[22] G. Shi, K. H. Johansson, and Y. Hong, “Reaching an optimal consensus: dynamical systems
that compute intersections of convex sets,” IEEE Trans. Autom. Control, vol. 58, no. 3, pp.
610–622, 2013.
[23] G. Shi and K. H. Johansson, “Robust consensus for continuous-time multi-agent dynamics,”
SIAM J. Contr. and Opt., vol. 51, no. 5, pp. 3673–3691, 2013.
A
Proof of Theorem 5
The proof of Theorems 5 relies on the following lemma whose proof is similar to that of Lemmas 3.
22
Lemma 8 Let Assumption 3 hold. Assume that Ḡσ(t) is uniformly jointly leader connected.
Then there exists 0 < ρ̄∗ < 1 such that
ϕ∗ (x̄i (t0 + T ∗ )) ≤ ρ̄∗ max ϕ∗ (x̄i (t0 )),
i∈V
∀i ∈ V,
where T ∗ = N T0 , with T0 given in (7).
Proof: Without loss of generality, we assume the initial time t0 = 0. Similar to the proof
of Lemma 3, we estimate ϕ∗ (x̄i (t)) agent by agent on the subintervals t ∈ [(j − 1)T0 , jT0 ] for
j = 1, . . . , N in several steps.
Step 1. In this step, we focus on an follower agent k1 ∈ V such that (0, k1 ) ∈ Ēσ(t) for t ∈
[t1 , t1 + τD ) ⊆ [0, T0 ]. The existence of such a follower agent k1 and t1 and follows from the fact
Ḡσ(t) is uniformly jointly leader connected. For convenience, we introduce x̄i = xi − y for all
i ∈ V as the relative state from the leader agent. From (32), we obtain the following dynamics.
x̄˙ i = f (t, xi ) − f (t, y) +
X
aij (t)(x̄j − x̄i ) − bi (t)x̄i .
(34)
j∈Ni (σ(t))
Similar to (8), we obtain that for all t ∈ [t1 , t1 + τD ],
d
∗
ϕ∗ (x̄k1 (t)) ≤ a (N − 1) max ϕ∗ (x̄i (0)) − ϕ∗ (x̄k1 ) − b∗ ϕ∗ (x̄k1 ).
i∈V
dt
We then obtain that
ϕ∗ (x̄k1 (t1 + τD )) ≤ δ̂1 max ϕ∗ (x̄k1 (0)),
i∈V
(35)
where
δ̂1 =
λ̂1 − b∗ (1 − e−λ̂1 τD )
λ̂1
,
(36)
with
λ̂1 = a∗ (N − 1) + b∗ .
(37)
For t ∈ [t1 + τD , T ∗ ], the edge (0, k1 ) may no longer exist. Nevertheless, we have for t ∈ [0, T ∗ ],
d
∗
ϕ∗ (x̄k1 (t)) ≤ a (N − 1) max ϕ∗ (x̄i (0)) − ϕ∗ (x̄k1 ) .
(38)
i∈V
dt
It then follows from (35) and (38) that for all t ∈ [T0 , T ∗ ],
ϕ∗ (x̄k1 (t)) ≤ δ1 max ϕ∗ (x̄k1 (0)),
i∈V
23
(39)
where δ1 = 1 − e−λ̄1 N T0 (1 − δ̂1 ) and λ̄1 = a∗ (N − 1).
Step 2. In this step, we analysis a follower agent k2 ∈ V \ {k1 } such that there either an edge
(0, k2 ) or an edge (k1 , k2 ) in Ēσ(t) for t ∈ [t2 , t2 + τD ) ⊆ [T0 , 2T0 ]. Again, the existence of k2 and
t2 due to the uniform joint leader connectivity. By going through the similar analysis as Step 2
of the proof for Lemma 3, we eventually obtain that for t ∈ [2T0 , T ∗ ],
ϕ∗ (x̄j (t)) < δ2 max ϕ∗ (x̄i (0)),
i∈V
j ∈ {k1 , k2 },
where δ2 = 1 − e−λ̄1 (N −1)T0 (1 − δ̂2 ), with
δ̂2 =
λ̄2 − a∗ (1 − δ1 )(1 − e−λ̄2 τD )
λ̄2
and λ̄2 = a∗ (N − 2) + a∗ .
Step 3. By applying the similar analysis on the subintervals [(ℓ − 1)T0 , ℓT0 ] for ℓ = 3, . . . , N , we
obtain that for all t ∈ [ℓT0 , T ∗ ] and for all j ∈ {k1 , . . . , kℓ },
ϕ∗ (x̄j (t)) < δℓ max ϕ∗ (x̄i (0)),
(40)
δℓ = 1 − e−λ̄1 (N −ℓ+1)T0 (1 − δ̂ℓ ),
(41)
i∈V
where
and
δ̂ℓ =
a∗ (N − 2) + a∗ − a∗ (1 − δℓ−1 )(1 − e−λ̄2 τD )
.
a∗ (N − 2) + a∗
(42)
It follows from (41) and (42) that δk ≤ δN for all k = 2, . . . , N . This together with (40) leads
to ϕ∗ (x̄j (T ∗ )) ≤ δN maxi∈V ϕ∗ (x̄i (0)) for all j ∈ V, where
δN = 1 − η N −1 e
(N−2)(N+1)
λ̄1 T0
2
b∗ (1 − e−λ̂1 τD )/(a∗ (N − 1) + b∗ ),
(43)
with
η=
e−λ̄1 (N +1)T0 (1 − e−λ̄2 τD )a∗
.
a∗ (N − 2) + a∗
The result of lemma then follows by choosing ρ̄∗ = δN .
We are ready to prove Theorem 5. Without loss of generality, we assume that t0 = 0, it then
follows from Lemma 8 that maxi∈V ϕ∗ (x̄i (T ∗ )) ≤ ρ̄∗ maxi∈V ϕ∗ (x̄i (0)). Thus, for s = 0, 1, . . ., we
have
max ϕ∗ (x̄i (sT ∗ )) ≤ ρ̄s∗ max ϕ∗ (x̄i (0)).
i∈V
i∈V
24
It then follows that
t
max ϕ∗ (x̄i (t)) ≤ ρ̄∗T ∗
−1
i∈V
max ϕ∗ (x̄i (0)),
i∈V
This together with the fact that ϕ∗ (·) is positive definite as given in Assumption 3 implies that
the multi-agent system (32) achieves global asymptotic synchronization.
B
Proof of Theorem 6
The proof of Theorems 6 relies on the following lemma whose proof is similar to that of Lemmas 3.
Lemma 9 Let Assumption 3 hold. Assume that Ḡσ(t) is infinitely jointly leader connected. Then
there exist 0 < ρ̃∗ < 1, Tp and t̃∗ such that
ϕ∗ (x̄i (t̃∗ + τD )) ≤ ρ̃∗ max ϕ∗ (x̄i (Tp )),
i∈V
∀i ∈ V.
Proof: Since Ḡσ(t) is infinitely jointly leader connected, there exist a sequence of time instants
0 = T0 < T1 < . . . < Tp < Tp+1 < . . .
(44)
Tp , tp1 < tp2 < . . . < tpN+1 , Tp+1
(45)
such that
for p = 0, 1, . . ., and Ḡ([tpℓ , tpℓ+1 )) is leader connected for ℓ = 1, . . . , N . Moreover, each edge
in Ḡ([tpℓ , tpℓ+1 )) exists for at least the dwell time τD during [tpℓ , tpℓ+1 ) for p = 0, 1, . . . and
ℓ = 1, . . . , N .
We shall estimate ϕ∗ (x̄i (t)) agent by agent on the subintervals [tpℓ , tpℓ+1 ], ℓ = 1, . . . , N for
the interval [Tp , Tp+1 ], p = 0, 1, . . ..
Step 1. In this step, we focus all the follower agent i ∈ V1 , where
V1 , {i ∈ V | (0, i) ∈ Ēσ(t1 ) }.
and
t1 ,
inf
t∈[tp1 ,tp2 )
{∃ i ∈ V | (0, i) ∈ E¯σ(t) }.
The existence of V1 and t1 due to the fact that Ḡ([tp1 , tp2 )) is leader connected. It then follows
from the similar analysis as we obtained (35) that
ϕ∗ (x̄k1 (t1 + τD )) ≤ δ̂1 max ϕ∗ (x̄i (Tp )),
i∈V
25
∀k1 ∈ V1 ,
(46)
where δ̂1 is given by (36).
Step 2. In this step, similar to Step 3 of the proof for Lemma 4, we view the set {0} ∪ V1 as
a subsystem. Define t2 as the first time when there is an edge between this subsystem and the
remaining follower agents and V2 accordingly.
By going through the similar analysis as Step 2 of the proof for Lemma 3, we eventually
obtain that for j ∈ V1 ∪ V2 ,
ϕ∗ (x̄j (t2 + τD )) < δ̃2 max ϕ∗ (x̄j (Tp )),
i∈V
where
δ̃2 =
λ̄2 − a∗ e−λ̄1 τD (1 − δ̃1 )(1 − e−λ̄2 τD )
,
λ̄2
(47)
with
δ̃1 = 1 − e−λ̄1 τD (1 − δ̂1 ),
(48)
and δ̂1 given by (36).
Step 3. Since Ḡσ(t) is infinitely jointly leader connected, we proceed the above analysis until
V = V1 ∪ . . . ∪ Vm0 for some m0 ≤ N such that
ϕ∗ (x̄j (tm0 + τD )) < δ̃m0 max ϕ∗ (x̄i (Tp )),
i∈V
∀j ∈ V,
with tm0 defined similarly to t1 and t2 , and
δ̃ℓ =
λ̄2 − a∗ e−λ̄1 τD (1 − δ̃ℓ−1 )(1 − eλ̄2 τD )
,
λ̄2
ℓ = 3, . . . , m0 .
From the preceding relation and (47), we obtain for ℓ = 2, . . . , m0 ,
a∗ e−λ̄1 τD (1 − e−λ̄2 τD )
1 − δ̃ℓ
=
, η̃ < 1.
a∗ (N − 2) + a∗
1 − δ̃ℓ−1
It is then easy to see that δ̃ℓ−1 < δ̃ℓ for all ℓ = 2, . . . , m0 . This together with (36), (48), and
m0 ≤ N implies that for all j ∈ V,
ϕ∗ (x̄j (tm0 + τD )) ≤ δ̃N max ϕ∗ (x̄i (Tp )),
i∈V
where
δ̃N = 1 − η̃ N −1 b∗ e−λ̄1 τD (1 − e−λ̂1 τD )/(a∗ (N − 1) + b∗ ),
with λ̂1 given by (37). The result then follows by choosing Tp as defined in (44) and (45),
t̃∗ = tm0 and ρ̃∗ = δ̃N .
26
We are ready to prove Theorem 5. Without loss of generality, we assume that t0 = 0, it
follows then follows from Lemma 7, Lemma 9, and the fact that t̃∗ + τD ≤ Tp+1 for t̃∗ = tm0 ,
which follows from the definition of Tp+1 given in (44) and (45), that for p = 0, 1, . . .
max ϕ∗ (x̄i (Tp+1 )) ≤ max ϕ∗ (x̄i (tm0 + τD )) ≤ ρ̃∗ max ϕ∗ (x̄i (Tp )).
i∈V
i∈V
i∈V
Thus, we have for s = 0, 1, . . ., maxi∈V ϕ∗ (x̄i (Ts )) ≤ ρ̃s∗ maxi∈V ϕ∗ (x̄i (0)). This together with the
fact that ϕ∗ (·) is positive definite as given in Assumption 3 implies that the multi-agent system
(32) achieves global asymptotic synchronization.
C
Proof of Theorem 7
The proof is similar to that of Theorem 4 however in the relative coordinate x̄i = xi − y whose
evolution is given by (34), Again, without loss of generality, we assume the initial time t0 = 0.
The proof is based on the convergence analysis of the nonnegative scalar
V (t, x̄(t)) = max Vi (t, x̄i (t)),
(49)
i∈V
where x̄(t) = [x̄T1 (t), x̄T2 (t), . . . , x̄TN (t)]T and
1
Vi (t, x̄i (t)) = e−2Lt kx̄i (t)k2 ,
2
∀i ∈ V.
(50)
Let us define I(t) = {i ∈ V : Vi (t, x̄i (t)) = V (t, x̄(t))}. Similar to Lemma 5, we obtain that
D + V (t, x̄(t)) ≤ 0 for all t ≥ 0 along the multi-agent dynamics (32). By combining the preceding
relation we have Vi (t, x̄i ) ≤ V (t, x̄) ≤ V (t0 , x̄(0)) , V∗ , for all t ≥ t0 and all i ∈ V. Following
the similar analysis as the proof of Theorem 5, we can show that
V (t, x̄(t)) ≤
1 −ρ̂∗ t
e
V∗ ,
δN
where δN is given by (43) and ρ̂∗ is given by (51),
ρ̂∗ =
1
1
ln
.
∗
T
δN
(51)
with T ∗ = (N − 1)T0 . It then follows that
max kx̄i (t)k2 ≤
i∈V
1 −(ρ̂∗ −2L)t
e
max kx̄i (0)k2 .
i∈V
δN
Hence, global exponential synchronization is achieved with γ =
that ρ̂∗ > 2L.
27
1
δN
and λ = ρ̂∗ − 2L provided
| 3cs.SY
|
Neural Networks for Joint Sentence Classification
in Medical Paper Abstracts
Franck Dernoncourt∗
MIT
[email protected]
Ji Young Lee∗
MIT
[email protected]
arXiv:1612.05251v1 [cs.CL] 15 Dec 2016
Abstract
Existing models based on artificial neural networks (ANNs) for sentence classification often do not incorporate the context in which sentences appear, and classify sentences individually. However, traditional sentence classification approaches
have been shown to greatly benefit from
jointly classifying subsequent sentences,
such as with conditional random fields. In
this work, we present an ANN architecture
that combines the effectiveness of typical
ANN models to classify sentences in isolation, with the strength of structured prediction. Our model achieves state-of-theart results on two different datasets for sequential sentence classification in medical
abstracts.
1
Introduction
Over 50 million scholarly articles have been published (Jinha, 2010), and the number of articles published every year keeps increasing (Druss
and Marcus, 2005; Larsen and Von Ins, 2010).
Approximately half of them are biomedical papers. While this repository of human knowledge
abounds with useful information that may unlock
new, promising research directions or provide conclusive evidence about phenomena, it has become
increasingly difficult to take advantage of all available information due to its sheer amount. Therefore, a technology that can assist a user to quickly
locate the information of interest is highly desired,
as it may reduce the time required to locate relevant information.
When researchers search for previous literature,
for example, they often skim through abstracts in
order to quickly check whether the papers match
∗
These authors contributed equally to this work.
Peter Szolovits
MIT
[email protected]
their criteria of interest. This process is easier
when abstracts are structured, i.e., the text in an
abstract is divided into semantic headings such as
objective, method, result, and conclusion. However, a significant portion of published paper abstracts is unstructured, which makes it more difficult to quickly access the information of interest.
Therefore, classifying each sentence of an abstract
to an appropriate heading can significantly reduce
time to locate the desired information.
We call this the sequential sentence classification task, in order to distinguish it from general
text classification or sentence classification that
does not have any context. Besides aiding humans,
this task may also be useful for automatic text
summarization, information extraction, and information retrieval.
In this paper, we present a system based on
ANNs for the sequential sentence classification
task. Our model makes use of both token and
character embeddings for classifying sentences,
and has a sequence optimization layer that is
learned jointly with other components of the
model. We evaluate our model on the NICTAPIBOSO dataset as well as a new dataset we compiled based on the PubMed database.
2
Related Work
Existing systems for sequential sentence classification are mostly based on naive Bayes
(NB) (Ruch et al., 2007; Huang et al., 2013),
support vector machines (SVMs) (McKnight and
Srinivasan, 2003; Yamamoto and Takagi, 2005;
Hirohata et al., 2008), Hidden Markov models
(HMMs) (Lin et al., 2006), and conditional random fields (CRFs) (Kim et al., 2011; Hassanzadeh et al., 2014; Hirohata et al., 2008). They
often require numerous hand-engineered features
based on lexical (bag-of-words, n-grams, dic-
tionaries, cue words), semantic (synonyms, hyponyms), structural (part-of-speech tags, headings), and sequential (sentence position, surrounding features) information.
On the other hand, recent approaches to natural language processing (NLP) based on artificial neural networks (ANNs) do not require manual features, as they are trained to automatically
learn features based on word as well as character embeddings. Moreover, ANN-based models
have achieved state-of-the-art results on various
NLP tasks. For short-text classification, many
ANN models use word embeddings (Socher et al.,
2013; Kim, 2014; Kalchbrenner et al., 2014), and
most recent works are based on character embeddings (Zhang et al., 2015; Conneau et al., 2016;
Xiao and Cho, 2016). Dos Santos and Gatti (2014)
use both word and character embeddings.
However, most existing works using ANNs for
short-text classification do not use any context.
This is in contrast with sequential sentence classification, where each sentence in a text is classified
taking into account its context. The context utilized for the classification could be the surrounding sentences or possibly the whole text. One exception is a recent work on dialog act classification (Lee and Dernoncourt, 2016), where each utterance in a dialog is classified into its dialog act,
but only the preceding utterances were used, as the
system was designed with real-time applications
in mind.
3
yj
y2
…
a1
yn-1
yn
an-1
an
…
aj
a2
Feed forward
s
bi-LSTM
concatanate
e1
…
…
…
…
concatenate
c
bi-LSTM
em
ei
e2
t
concatanate
Token
embeddings
…
…
c1
c2
cl-1
cl
Character embeddings
z1
z2
zl-1
zl
x
Figure 1: ANN model for sequential sentence classification. x: token, t: token embeddings (300), zi : ith character
of x, ci : character embeddings (25), c: character-based token embeddings (50), ei : hybrid token embeddings (350), s:
sentence vector (200), aj : sentence label vector (number of
classes), yj : sentence label. The numbers in parenthesis indicate the dimensions of the vectors. Token embeddings are
initialized with GloVe (Pennington et al., 2014) embeddings
pretrained on Wikipedia and Gigaword 5 (Parker et al., 2011).
Model
In the following, we denote scalars in italic lowercase (e.g., k, bf ), vectors in bold lowercase
(e.g., s, xi ), and matrices in italic uppercase
(e.g., Wf ) symbols. We use the colon notations
xi:j and vi:j to denote the sequences of scalars
(xi , xi+1 , . . . , xj ) and vectors (vi , vi+1 , . . . , vj ),
respectively.
3.1
y1
ANN model
Our ANN model (Figure 1) consists of three components: a hybrid token embedding layer, a sentence label prediction layer, and a label sequence
optimization layer.
3.1.1 Hybrid token embedding layer
The hybrid token embedding layer takes a token
as an input and outputs its vector representation
utilizing both the token embeddings and as well as
the character embeddings.
Token embeddings are a direct mapping VT (·)
from token to vector, which can be pre-trained on
large unlabeled datasets using programs such as
word2vec (Mikolov et al., 2013b; Mikolov et al.,
2013a; Mikolov et al., 2013c) or GloVe (Pennington et al., 2014). Character embeddings are also
defined in an analogous manner, as a direct mapping VC (·) from character to vector.
Let z1:` be the sequence of characters that comprise a token x. Each character zi is first mapped
to its embedding ci = VC (zi ), and the resulting
sequence c1:` is input to a bidirectional LSTM,
which outputs the character-based token embedding c.
The output e of the hybrid token embedding
layer for the token x is the concatenation of the
character-based token embedding c and the token
embedding t = VT (x).
3.1.2 Sentence label prediction layer
Let x1:m be the sequence of tokens in a given sentence, and e1:m be the corresponding embedding
output from the hybrid token embedding layer.
The sentence label prediction layer takes as input the sequence of vectors e1:m , and outputs a,
where the k th element of a, denoted a[k], reflects
the probability that the given sentence has label k.
To achieve this, the sequence e1:m is first input
to a bidirectional LSTM, which outputs the vector
representation s of the given sentence. The vector s is subsequently input to a feedforward neural
network with one hidden layer, which outputs the
corresponding probability vector a.
3.1.3 Label sequence optimization layer
The label sequence optimization layer takes the sequence of probability vectors a1:n from the label
prediction layer as input, and outputs a sequence
of labels y1:n , where yi is the label assigned to the
token xi .
In order to model dependencies between subsequent labels, we incorporate a matrix T that contains the transition probabilities between two subsequent labels; we define T [i, j] as the probability
that a token with label i is followed by a token with
the label j. The score of a label sequence y1:n is
defined as the sum of the probabilities of individual labels and the transition probabilities:
s(y1:n ) =
n
X
i=1
ai [yi ] +
n
X
T [yi−1 , yi ].
i=2
These scores can be turned into probabilities of the
label sequences by taking a softmax function over
all possible label sequences. During the training
phase, the objective is to maximize the log probability of the gold label sequence. In the testing
phase, given an input sequence of tokens, the corresponding sequence of predicted labels is chosen
as the one that maximizes the score.
4
4.1
Experiments
Datasets
We evaluate our model on the sentence classification task using the following two medical abstract
datasets, where each sentence of the abstract is annotated with one label. Table 1 presents statistics
on each dataset.
NICTA-PIBOSO This dataset was introduced
in (Kim et al., 2011) and was the basis of the
ALTA 2012 Shared Task (Amini et al., 2012).
PubMed 20k RCT We assembled this corpus
consisting of randomized controlled trials (RCTs)
from the PubMed database of biomedical literature, which provides a standard set of 5 sentence
labels: objectives, background, methods, results
and conclusions.
Dataset |C| |V |
Train
Validation
Test
PubMed 5 68k 15k (195k) 2.5k (33k) 2.5k (33k)
NICTA
6 17k 722 (8k)
77 (0.9k)
200 (2k)
Table 1: Dataset overview. |C| denotes the number of
classes, |V | the vocabulary size. For the train, validation and
test sets, we indicate the number of number of abstracts followed by the number of sentences in parentheses.
4.2
Training
The model is trained using stochastic gradient descent, updating all parameters, i.e., token embeddings, character embeddings, parameters of bidirectional LSTMs, and transition probabilities, at
each gradient step. For regularization, dropout
with a rate of 0.5 is applied to the characterenhanced token embeddings and before the label
prediction layer.
5
Results and Discussion
Table 2 compares our model against several baselines as well as the best performing model (Lui,
2012) in the ALTA 2012 Shared Task, in which
8 competing research teams participated to build
the most accurate classifier for the NICTAPIBOSO corpus.
The first baseline (LR) is a classifier based on
logistic regression using n-gram features extracted
from the current sentence: it does not use any information from the surrounding sentences. The
second baseline (Forward ANN) uses the model
presented in (Lee and Dernoncourt, 2016): it computes sentence embeddings for each sentence, then
classifies the current sentence given a few preceding sentence embeddings as well as the current
sentence embedding. The third baseline (CRF) is
a CRF that uses n-grams as features: each output variable of the CRF corresponds to a label for
a sentence, and the sequence the CRF considers
is the entire abstract. The CRF baseline therefore uses both preceding and succeeding sentences
when classifying the current sentence. Lastly, the
model presented in (Lui, 2012) developed a new
NICTA
71.6
75.1
81.2
82.0
82.7
Background
Conclusion
Methods
Objectives
Results
Total
Support
3621
4571
9897
2333
9713
30135
Table 3: Detailed results of our model on the PubMed 20k
RCT dataset.
End -0.24
0.14
-0.10
0.08
-0.23 -0.01 -0.20
Start -0.26 -0.08 -0.14
0.26
0.23
0.02
Objectives -0.03
0.13
-0.23
0.11
0.27
-0.04 -0.19
Background -0.02
0.08
-0.38
0.35
0.07
-0.06
0.04
Conclusion -0.24 -0.14
0.28
0.01
-0.10 -0.01
0.22
-0.13
0.20
-0.18 -0.20 -0.02 -0.02
< -0.3
En
rou
-0.1
Ob
sio
ckg
Ba
clu
0.1
-0.08
d
Results 0.25
nd
jec
tiv
es
Sta
rt
-0.24 -0.17
n
0.05
ds
0.25
Co
n
0.04
> 0.3
-0.02
Methods 0.17
tho
approach called feature stacking, which is a metalearner that combines multiple feature sets, and
is the best performing system on NICTA-PIBOSO
published in the literature.
The LR system performs honorably on PubMed
20k RCT (F1-score: 83.0), but quite poorly on
NICTA-PIBOSO (F1-score: 71.6): this suggests
that using the surrounding sentences may be more
important in NICTA-PIBOSO than in PubMed
20k RCT.
The Forward ANN system performs better than
the LR system, and worse than the CRF: this is unsurprising, as the Forward ANN system only uses
the information from the preceding sentences but
does not use any information from the succeeding
sentences, unlike the CRF.
Our model performs better than the CRF system and the (Lui, 2012) system. We hypothesize
that the following four factors give an edge to our
model.
No human-engineered features: Unlike most
other systems, our model does not rely on any
human-engineered features.
No n-grams: While other systems heavily rely
on n-grams, our model maps each token to a token embedding, and feeds it as an input to an
RNN. This helps combat data scarcity: for example, “chronic tendonitis” and “chronic tendinitis”
are two different bigrams, but their token embeddings should be very similar since they share the
same meaning.
Structured prediction: The labels for all sentences in an abstract are predicted jointly, which
improves the coherence between the predicted labels in a given abstract.
Joint learning: Our model learned the features
and token embeddings jointly with the sequence
optimization.
PubMed 20k RCT
Recall F1-score
88.2
79.1
92.9
93.2
96.2
94.9
48.1
59.6
93.1
93.9
89.8
89.9
Precision
71.8
93.5
93.7
78.2
94.8
90.0
lts
Table 2: F1-scores on the test set with several baselines, the
best published method (Lui, 2012) from the literature, and
our model. Since PubMed 20k was introduced in this work,
there is no previous best published method for this dataset.
The presented results for the ANN-based models are the F1scores on the test set of the run with the highest F1-score on
the validation set.
Label
Me
PubMed 20k
83.0
86.1
89.3
–
89.9
Re
su
Model
LR
Forward ANN
CRF
Best published
Our model
Figure 2: Transition matrix learned on PubMed 20k. The
rows represent the label of the previous sentence, the columns
represent the label of the current sentence.
Figure 2 presents an example of a transition matrix after the model has been trained on PubMed
20k RCT. We can see that it effectively reflects
transitions between different labels. For example,
it learned that the first sentence of an abstract is
most likely to be either discussing objective (0.23)
or background (0.26). By the same token, a sentence pertaining to the methods is typically followed by a sentence pertaining to the methods
(0.25) or the results (0.17).
Table 3 details the result of our model for each
label in PubMed 20k RCT: the main difficulty the
classifier has is distinguishing background sentences from objective sentences.
6
Conclusions
In this article we have presented an ANN architecture to classify sentences that appear in sequence.
We demonstrate that jointly predicting the classes
of all sentences in a given text improves the quality
of the predictions and yields better performance
than a CRF. Our model achieves state-of-the-art
results on two datasets for sentence classification
in medical abstracts.
References
[Amini et al.2012] Iman Amini, David Martinez, and
Diego Molla. 2012. Overview of the ALTA 2012
Shared Task. In Australasian Language Technology
Association Workshop 2012, volume 7, page 124.
[Kim2014] Yoon Kim. 2014. Convolutional neural
networks for sentence classification. In Proceedings of the 2014 Conference on Empirical Methods
in Natural Language Processing (EMNLP), pages
1746–1751. Association for Computational Linguistics (ACL).
[Conneau et al.2016] Alexis
Conneau,
Holger
Schwenk, Loı̈c Barrault, and Yann Lecun.
2016.
Very deep convolutional networks for
natural language processing.
arXiv preprint
arXiv:1606.01781.
[Larsen and Von Ins2010] Peder Olesen Larsen and
Markus Von Ins. 2010. The rate of growth in scientific publication and the decline in coverage provided by science citation index. Scientometrics,
84(3):575–603.
[dos Santos and Gatti2014] Cı́cero Nogueira dos Santos and Maira Gatti. 2014. Deep convolutional neural networks for sentiment analysis of short texts.
In International Conference on Computational Linguistics (COLING), pages 69–78.
[Lee and Dernoncourt2016] Ji Young Lee and Franck
Dernoncourt. 2016. Sequential short-text classification with recurrent and convolutional neural networks. In Human Language Technologies 2016:
The Conference of the North American Chapter
of the Association for Computational Linguistics,
NAACL HLT.
[Druss and Marcus2005] Benjamin G Druss and
Steven C Marcus. 2005. Growth and decentralization of the medical literature: implications for
evidence-based medicine. Journal of the Medical
Library Association, 93(4):499.
[Hassanzadeh et al.2014] Hamed Hassanzadeh, Tudor
Groza, and Jane Hunter. 2014. Identifying scientific artefacts in biomedical literature: The evidence
based medicine use case. Journal of biomedical informatics, 49:159–170.
[Hirohata et al.2008] Kenji Hirohata, Naoaki Okazaki,
Sophia Ananiadou, Mitsuru Ishizuka, and Manchester Interdisciplinary Biocentre. 2008. Identifying sections in scientific abstracts using conditional
random fields. In International Joint Conference
on Natural Language Processing (IJCNLP), pages
381–388.
[Huang et al.2013] Ke-Chun Huang, I-Jen Chiang,
Furen Xiao, Chun-Chih Liao, Charles Chih-Ho Liu,
and Jau-Min Wong. 2013. PICO element detection in medical text without metadata: Are first sentences enough? Journal of biomedical informatics,
46(5):940–946.
[Jinha2010] Arif E Jinha. 2010. Article 50 million: an
estimate of the number of scholarly articles in existence. Learned Publishing, 23(3):258–263.
[Lin et al.2006] Jimmy Lin, Damianos Karakos, Dina
Demner-Fushman, and Sanjeev Khudanpur. 2006.
Generative content models for structural analysis of
medical abstracts. BioNLP06 Linking Natural Language Processing and Biology: Towards Deeper Biological Literature Analysis, 6:65–72.
[Lui2012] Marco Lui. 2012. Feature stacking for sentence classification in evidence-based medicine. In
Australasian Language Technology Workshop 2012:
ALTA Shared Task, page 134.
[McKnight and Srinivasan2003] Larry McKnight and
Padmini Srinivasan. 2003. Categorization of sentence types in medical abstracts. In American Medical Informatics Association (AMIA).
[Mikolov et al.2013a] Tomas Mikolov, Kai Chen, Greg
Corrado, and Jeffrey Dean. 2013a. Efficient estimation of word representations in vector space. arXiv
preprint arXiv:1301.3781.
[Mikolov et al.2013b] Tomas Mikolov, Ilya Sutskever,
Kai Chen, Greg S Corrado, and Jeff Dean. 2013b.
Distributed representations of words and phrases
and their compositionality. In Advances in neural
information processing systems, pages 3111–3119.
[Mikolov et al.2013c] Tomas Mikolov, Wen-tau Yih,
and Geoffrey Zweig. 2013c. Linguistic regularities
in continuous space word representations. In HLTNAACL, pages 746–751.
[Kalchbrenner et al.2014] Nal Kalchbrenner, Edward
Grefenstette, and Phil Blunsom. 2014. A convolutional neural network for modelling sentences. In
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics. Proceedings of the 52nd Annual Meeting of the Association
for Computational Linguistics.
[Parker et al.2011] Robert Parker, David Graff, Junbo
Kong, Ke Chen, and Kazuaki Maeda. 2011. English
Gigaword fifth edition. Technical report, Linguistic
Data Consortium, Philadelphia.
[Kim et al.2011] Su Nam Kim, David Martinez,
Lawrence Cavedon, and Lars Yencken. 2011.
Automatic classification of sentences to support
evidence based medicine. BioMed Central (BMC)
Bioinformatics, 12(2):1.
[Pennington et al.2014] Jeffrey Pennington, Richard
Socher, and Christopher D Manning. 2014. GloVe:
global vectors for word representation. Proceedings
of the Empiricial Methods in Natural Language Processing (EMNLP 2014), 12:1532–1543.
[Ruch et al.2007] Patrick Ruch, Celia Boyer, Christine Chichester, Imad Tbahriti, Antoine Geissbühler,
Paul Fabry, Julien Gobeill, Violaine Pillet, Dietrich
Rebholz-Schuhmann, Christian Lovis, et al. 2007.
Using argumentation to extract key sentences from
biomedical abstracts. International journal of medical informatics, 76(2):195–200.
[Socher et al.2013] Richard Socher, Alex Perelygin,
Jean Y Wu, Jason Chuang, Christopher D Manning,
Andrew Y Ng, and Christopher Potts. 2013. Recursive deep models for semantic compositionality over
a sentiment treebank. In Proceedings of the conference on empirical methods in natural language processing (EMNLP), volume 1631, page 1642. Citeseer.
[Xiao and Cho2016] Yijun Xiao and Kyunghyun Cho.
2016. Efficient character-level document classification by combining convolution and recurrent layers.
arXiv preprint arXiv:1602.00367.
[Yamamoto and Takagi2005] Yasunori Yamamoto and
Toshihisa Takagi. 2005. A sentence classification system for multi biomedical literature summarization. In 21st International Conference on Data
Engineering Workshops (ICDEW’05), pages 1163–
1163. IEEE.
[Zhang et al.2015] Xiang Zhang, Junbo Zhao, and Yann
LeCun. 2015. Character-level convolutional networks for text classification. In Advances in Neural
Information Processing Systems (NIPS), pages 649–
657.
| 9cs.NE
|
Quantum Predicative Programming
Anya Tafliovich and E.C.R. Hehner
arXiv:quant-ph/0602156v1 17 Feb 2006
University of Toronto
Abstract. The subject of this work is quantum predicative programming — the study of developing of programs intended for execution on
a quantum computer. We look at programming in the context of formal
methods of program development, or programming methodology. Our
work is based on probabilistic predicative programming, a recent generalisation of the well-established predicative programming. It supports
the style of program development in which each programming step is
proven correct as it is made. We inherit the advantages of the theory,
such as its generality, simple treatment of recursive programs, time and
space complexity, and communication. Our theory of quantum programming provides tools to write both classical and quantum specifications,
develop quantum programs that implement these specifications, and reason about their comparative time and space complexity all in the same
framework.
1
Introduction
Modern physics is dominated by concepts of quantum mechanics. Today, over
seventy years after its recognition by the scientific community, quantum mechanics provides the most accurate known description of nature’s behaviour.
Surprisingly, the idea of using the quantum mechanical nature of the world to
perform computational tasks is very new, less than thirty years old. Quantum
computation and quantum information is the study of information processing
and communication accomplished with quantum mechanical systems. In recent
years the field has grown immensely. Scientists from various fields of computer
science have discovered that thinking physically about computation yields new
and exciting results in computation and communication. There has been extensive research in the areas of quantum algorithms, quantum communication
and information, quantum cryptography, quantum error-correction, adiabatic
computation, measurement-based quantum computation, theoretical quantum
optics, and the very new quantum game theory. Experimental quantum information and communication has also been a fruitful field. Experimental quantum
optics, ion traps, solid state implementations and nuclear magnetic resonance
all add to the experimental successes of quantum computation.
The subject of this work is quantum programming — the study of developing
programs intended for execution on a quantum computer. We assume a model
of a quantum computer proposed by Knill [24]: a classical computer with access
to a quantum device that is capable of storing quantum bits, performing certain
2
operations and measurements on these bits, and reporting the results of the
measurements.
We look at programming in the context of formal methods of program development, or programming methodology. This is the field of computer science
concerned with applications of mathematics and logic to software engineering
tasks. In particular, the formal methods provide tools to formally express software specifications, prove correctness of implementations, and reason about various properties of specifications (e.g. implementability) and implementations (e.g.
time and space complexity). Today formal methods are successfully employed in
all stages of software development, such as requirements elicitation and analysis,
software design, and software implementation.
In this work the theory of quantum programming is based on probabilistic
predicative programming, a recent generalisation of the well-established predicative programming [19,20], which we deem to be the simplest and the most elegant
programming theory known today. It supports the style of program development
in which each programming step is proven correct as it is made. We inherit the
advantages of the theory, such as its generality, simple treatment of recursive
programs, and time and space complexity. Our theory of quantum programming provides tools to write both classical and quantum specifications, develop
quantum programs that implement these specifications, and reason about their
comparative time and space complexity all in the same framework.
The rest of this work is organised as follows. Section 2.1 is the introduction
to quantum computation. It assumes that the reader has some basic knowledge
of linear algebra and no knowledge of quantum computing. Section 2.2 contains the introduction to probabilistic predicative programming. The reader is
assumed to have some background in logic, but no background in programming
theory is necessary. The contribution of this work is section 3 which defines
the quantum system, introduces programming with the quantum system, and
several well-known problems, their classical and quantum solutions, and their
formal comparative time complexity analyses. Section 4 states conclusions and
outlines directions for future research.
1.1
Related work
Traditionally, quantum computation is presented in terms of quantum circuits.
Recently, there has been an attempt to depart from this convention for the same
reason that classical computation is generally not presented in terms of classical
circuits. As we develop more complex quantum algorithms, we will need ways to
express higher-level concepts with control structures in a readable fashion.
In 2000 Ömer [28] introduced the first quantum programming language QCL.
Following his work, Bettelli et. al. developed a quantum programming language
with syntax based on C++. These two works did not involve any verification
techniques.
Sanders and Zuliani in [29] introduced a quantum language qGCL, which is an
extension of pGCL [26], which in turn generalises Dijkstra’s guarded-command
language to include probabilism. Zuliani later extends this attempt at formal
3
program development and verification in [36], which discusses treatment of nondeterminism in quantum programs, and in [38], where the attempt is made to
build on Aharonov’s work to reason about mixed states computations. Zuliani
also provides tools to approach the task of compiling quantum programs in [37].
A large amount of work in the area was performed in the past two years.
In [4], [25], and [22] process algebraic approaches were explored. Tools developed in the field of category theory were successfully employed by [1], [2], [3],
[11], [30], and others to reason about quantum computation. In [7] and [8] a functional language with semantics in a form of a term rewrite system is introduced
and a notion of linearity and how it pertains to quantum systems are examined.
A functional language QML with design guided by its categorical semantics is
defined in [5]. Following on this work, [6] provides a sound and complete equational theory for QML. Weakest preconditions appropriate for quantum computation are introduced in [15]. This work is interesting, in part, because it diverts
from the standard approach of reducing quantum computation to probabilistic
one. It also provides semantics for the language of [30]. Other interesting work
by the same authors include reasoning about knowledge in quantum systems
([16]) and developing a formal model for distributed measurement-based quantum computation ([12]). A similar work is introduced in [17], where a language
CQP for modelling communication in quantum systems is defined. The latter
approaches have an advantage over process algebraic approaches mentioned earlier in that they explicitly allow a quantum state to be transmitted between
processes. Building of the work of [31], [33] defines a higher order quantum programming language based on a linear typed lambda calculus, which is similar to
the work of [34].
1.2
Our contribution
Our approach to quantum programming amenable to formal analysis is very
different from almost all of those described above. Work of [29], [36], [38] is the
only one which is similar to our work. The contribution of this paper is twofold.
Firstly, by building our theory on that in [20], we inherit the advantages it offers. The definitions of specification and program are simpler: a specification is
a boolean (or probabilistic) expression and a program is a specification. The
treatment of recursion is simple: there is no need for additional semantics of
loops. The treatment of termination simply follows from the introduction of a
time variable; if the final value of the time variable is ∞, then the program is
a non-terminating one. Correctness and time and space complexity are proved
in the same fashion; moreover, after proving them separately, we naturally obtain the conjunction. Secondly, the way Probabilistic Predicative Programming
is extended to Quantum Predicative Programming is simple and intuitive. The
use of Dirac-like notation makes it easy to write down specifications and develop
algorithms. The treatment of computation with mixed states does not require
any additional mechanisms. Quantum Predicative Programming fully preserves
Predicative Programming’s treatment of parallel programs and communication,
4
which provides for a natural extension to reason about quantum communication protocols, such as BB84 ([9]), distributed quantum algorithms, such as distributed Shor’s algorithm ([35]), as well as their time, space, and entanglement
complexity.
2
2.1
Preliminaries
Quantum Computation
In this section we introduce the basic concepts of quantum mechanics, as they
pertain to the quantum systems that we will consider for quantum computation.
The discussion of the underlying physical processes, spin- 21 -particles, etc. is not of
our interest. We are concerned with the model for quantum computation only. A
reader not familiar with quantum computing can consult [27] for a comprehensive
introduction to the field.
The Dirac notation, invented by Paul Dirac, is often used in quantum mechanics. In this notation a vector v (a column vector by convention) is written
inside a ket : |vi. The dual vector of |vi is hv|, written inside a bra. The inner products are bra-kets hv|wi. For n-dimensional vectors |ui and |vi and m-dimensional
vector |wi, the value of the inner product hu|vi is a scalar and the outer product
operator |vihw| corresponds to an m by n matrix. The Dirac notation clearly
distinguishes vectors from operators and scalars, and makes it possible to write
operators directly as combinations of bras and kets.
In quantum mechanics, the vector spaces of interest are the Hilbert spaces of
dimension 2n for some n ∈ N. A convenient orthonormal basis is what is called
a computational basis, in which we label 2n basis vectors using binary strings of
length n as follows: if s is an n-bit string which corresponds to the number xs ,
then |si is a 2n -bit (column) vector with 1 in position xs and 0 everywhere else.
The tensor product |ii ⊗ |ji can be written simply as |iji. An arbitrary vector
in a Hilbert space can be written as a weighted sum of the computational basis
vectors.
Postulate 1 (state space) Associated to any isolated physical system is a
Hilbert space, known as the state space of the system. The system is completely described by its state vector, which is a unit vector in the system’s
state space.
Postulate 2 (evolution) The evolution of a closed quantum system is described by a unitary transformation.
Postulate 3 (measurement) Quantum measurements are described by a collection {Mm } of measurement operators, which act on the state space of the
system being measured. The index m refers to the possible measurement
outcomes. If the state of the system immediately prior to the measurement
is described by a vector |ψi, then the probability of obtaining result m is
†
Mm |ψi, in which case the state of the system immediately after the
hψ|Mm
5
measurement is described by the vector √
operators satisfy the completeness equation
Mm |ψi
. The measurement
†
hψ|Mm
P Mm |ψi
†
m · Mm
Mm
= I.
An important special class of measurements is projective measurements, which
are equivalent to general measurements provided that we also have the ability
to perform unitary transformations.
A projective measurement is described by an observable M , which is a Hermitian operator on the state space of the
P system being measured. This observable
has a spectral decomposition M =
m · λm × Pm , where Pm is the projector
onto the eigenspace of M with eigenvalue λm , which corresponds to the outcome
of the measurement. The probability of measuring m is hψ|Pm |ψi, in which case
immediately after the measurement the system is found in the state √ Pm |ψi .
hψ|Pm |ψi
Given an orthonormal basis |vm i, 0 ≤ m < 2n , measurement with respect to
this basis
P is the corresponding projective measurement given by the observable
M = m · λm × Pm , where the projectors are Pm = |vm ihvm |.
Measurement with respect to the computational basis is the simplest and the
most commonly used class of measurements. In terms of the basis |mi, 0 ≤ m <
2n , the projectors are Pm = |mihm| and hψ|Pm |ψi = |ψm |2 . The state of the
system immediately after measuring m is |mi.
In the case of a single qubit, for example, measurement of the state α ×
|0i + β × |1i results in the outcome 0 with probability |α|2 and outcome 1 with
probability |β|2 . The state of the system immediately after the measurement is
|0i or |1i, respectively.
Suppose the result of the measurement is ignored and we continue the computation. In this case the system is said to be in a mixed state. A mixed state is
not the actual physical state of the system. Rather it describes our knowledge
of the state the system is in. In the above example, the mixed state is expressed
by the equation |ψi = |α|2 × {|0i} + |β|2 × {|1i}. The equation is meant to
say that |ψi is |0i with probability |α|2 and it is |1i with probability |β|2 . An
application of operation U to the mixed state results in another mixed state,
U (|α|2 × {|0i} + |β|2 × {|1i}) = |α|2 × {U |0i} + |β|2 × {U |1i}.
Postulate 4 (composite systems) The state space of a composite physical
system is the tensor product of the state spaces of the component systems.
If we have systems numbered 0 up to and excluding n, and each system i,
0 ≤ i < n, is prepared in the state |ψi i, then the joint state of the composite
system is |ψ0 i ⊗ |ψ1 i ⊗ . . . ⊗ |ψn−1 i.
While we can always describe a composite system given descriptions of the component systems, the reverse is not true. Indeed, given a state vector that describes a composite system, it may not be possible to factor it to obtain the
state vectors
systems. A well-known example is the state
√
√ of the component
|ψi = |00i/ 2 + |11i/ 2. Such state is called an entangled state.
6
2.2
Probabilistic Predicative Programming
This section introduces the programming theory of our choice, on which our work
on quantum programming is based — probabilistic predicative programming.
We briefly introduce parts of the theory necessary for understanding section 3 of
this work. For a course in predicative programming the reader is referred to [19].
Introduction to probabilistic predicative programming can be found in [20].
Predicative programming In predicative programing a specification is a
boolean expression. The variables in a specification represent the quantities of
interest, such as prestate (inputs), poststate (outputs), and computation time
and space. We use primed variables to describe outputs and unprimed variables
to describe inputs. For example, specification x′ = x + 1 in one integer variable x
states that the final value of x is its initial value plus 1. A computation satisfies
a specification if, given a prestate, it produces a poststate, such that the pair
makes the specification true. A specification is implementable if for each input
state there is at least one output state that satisfies the specification.
We use standard logical notation for writing specifications: ∧ (conjunction), ∨
(disjunction), ⇒ (logical implication), = (equality, boolean equivalence), 6= (nonequality, non-equivalence), and if then else. == and =⇒ are the same as = and
⇒, but with lower precedence. We use standard mathematical notation, such as
+ − ∗ / mod. We use lowercase letters for variables of interest and uppercase
letters for specifications.
In addition to the above, we use the following notations: σ (prestate), σ ′
(poststate), ok (σ ′ = σ), and x := e (x′ = e ∧ y ′ = y ∧ . . .). ok specifies that
the values of all variables are unchanged. In the assignment x := e, x is a state
variable (unprimed) and e is an expression (in unprimed variables) in the domain
of x.
If R and S are specifications in variables x, y, . . . , R′′ is obtained from R
by substituting all occurrences of primed variables x′ , y ′ , . . . with double-primed
variables x′′ , y ′′ , . . . , and S ′′ is obtained from S by substituting all occurrences
of unprimed variables x, y, . . . with double-primed variables x′′ , y ′′ , . . . , then the
sequential composition of R and S is defined by
R; S == ∃x′′ , y ′′ , . . . · R′′ ∧ S ′′
.
Various laws can be proven about sequential composition. One of the most
important ones is the substitution law, which states that for any expression e of
the prestate, state variable x, and specification P ,
x := e; P == (for x substitute e in P )
Specification S is refined by specification P if and only if S is satisfied whenever P is satisfied:
∀σ, σ ′ · S ⇐ P
7
Specifications S and P are equal if and only if they are satisfied simultaneously:
∀σ, σ ′ · S = P
Given a specification, we are allowed to implement an equivalent specification
or a stronger one.
Informally, a bunch is a collection of objects. It is different from a set, which
is a collection of objects in a package. Bunches are simpler than sets; they don’t
have a nesting structure. See [20] for an introduction to bunch theory. A bunch of
one element is the element itself. We use upper-case to denote arbitrary bunches
and lower-case to denote elements (an element is the same as a bunch of one
element). A, B denotes the union of bunches A and B. A : B denotes bunch
inclusion — bunch A is included in bunch B. We use notation x, ..y to mean
from (including) x to (excluding) y.
If x is a fresh (previously unused) name, D is a bunch, and b is an arbitrary
expression, then λx : D · b is a function of a variable (parameter) x with domain
D and body b. If f is a function, then ∆f denotes the domain of f . If x : ∆f ,
then f x (f applied to x) is the corresponding element in the range. A function of
n variables is a function of 1 variable, whose body is a function of n− 1 variables,
for n > 0. A predicate is function whose body is a boolean expression. A relation
is a function whose body is a predicate. A higher-order function is a function
whose parameter is a function.
A quantifier is a unary prefix operator that applies to functions. If p is a
predicate, then ∀p is the boolean result, obtained by first applying p to all the
elements in its domain and then taking the conjunction of those results. Taking
the disjunction
of the results produces ∃p. Similarly, if f is a numeric function,
P
then
f is the numeric result, obtained by first applying f to all the elements
in its domain and then taking the sum ofPthose results.
For example, applyingPthe quantifier
to the function λi : 0, ..2n · |ψi|2 , for
n
2
some functionP
ψ, yields:
λi : 0, ..2 · |ψi| , which for the sake of simplicity we
abbreviate to i : 0, ..2n ·|ψi|2 . In addition, we allow a few other simplifications.
For example, we can omit the domain of a variable if it is clear from the context.
P
We canP
also group variables from several quantifications.
For example,
i :
P
0, ..2n · j : 0, ..2n · 2−m−n can be abbreviated to
i, j : 0, ..2n · 2−m−n .
A program is an implemented specification. For simplicity we only take the
following to be implemented: ok, assignment, if then else, sequential composition, booleans, numbers, bunches, and functions.
Given a specification S, we proceed as follows. If S is a program, there is no
work to be done. If it is not, we build a program P , such that P refines S, i.e.
S ⇐ P . The refinement can proceed in steps: S ⇐ . . . ⇐ R ⇐ Q ⇐ P .
One of the best features of Hehner’s theory, is its simple treatment of recursion. In S ⇐ P it is possible for S to appear in P . No additional rules are
required to prove the refinement. For example, it is trivial to prove that
x ≥ 0 ⇒ x′ = 0 ⇐= if x = 0 then ok else (x := x − 1; x ≥ 0 ⇒ x′ = 0)
8
The specification says that if the initial value of x is non-negative, its final
value must be 0. The solution is: if the value of x is zero, do nothing, otherwise
decrement x and repeat.
How long does the computation take? To account for time we add a time
variable t. We use t to denote the time, at which the computation starts, and t′
to denote the time, at which the computation ends. In case of non-termination,
t′ = ∞. This is the only characteristic by which we distinguish terminating
programs from non-terminating ones. See [21] for a discussion on treatment of
termination. We choose to use a recursive time measure, in which we charge 1
time unit for each time P is called. We replace each call to P to include the time
increment as follows:
P ⇐= if x = 0 then ok else (x := x − 1; t := t + 1; P )
It is easy to see that t is incremented the same number of times that x is
decremented, i.e. t′ = t + x, if x ≥ 0, and t′ = ∞, otherwise. Just as above, we
can prove:
x ≥ 0 ∧ t′ = t + x ∨ x < 0 ∧ t′ = ∞
⇐= if x = 0 then ok
else (x := x − 1; t := t + 1; x ≥ 0 ∧ t′ = t + x ∨ x < 0 ∧ t′ = ∞)
Probabilistic predicative programming Probabilistic predicative programming was introduced in [19] and was further developed in [20]. It is a generalisation of predicative programming that allows reasoning about probability
distributions of values of variables of interest. Although in this work we apply
this reasoning to boolean and integer variables only, the theory does not change
if we want to work with real numbers: we replace summations with integrals.
A probability is a real number between 0 and 1, inclusive. A distribution is an
expression whose value is a probability and whose sum over all values of variables
is 1. For example, if n is a positive natural
then 2−n is a distribution,
Pvariable,
since for any n, 2−n is a probability, and
n · 2−n = 1. In two positive natural
variables m and n, 2−n−m is also a distribution. If a distribution of several
variables can be written as a product of distributions of the individual variables,
then the variables are independent. For example, m and n in the previous example
are independent. Given a distribution of several variables, we can sum out some
of the variables
to obtain a distribution of the rest of the variables. In our
P
example,
n · 2−n−m = 2−m , which is a distribution of m.
To generalise boolean specifications to probabilistic specifications, we use
1 and 0 for boolean true and f alse, respectively.1 If S is an implementable
deterministic specification and p is a distribution of the initial state x, y, ..., then
the distribution of the final state is
X
x, y, ... · S × p
1
Readers familiar with ⊤ and ⊥ notation can notice that we take the liberty to equate
⊤ = 1 and ⊥ = 0.
9
If R and S are specifications in variables x, y, . . . , R′′ is obtained from R by
substituting all occurrences of primed variables x′ , y ′ , . . . with double-primed
variables x′′ , y ′′ , . . . , and S ′′ is obtained from S by substituting all occurrences
of unprimed variables x, y, . . . with double-primed variables x′′ , y ′′ , . . . , then the
sequential composition of R and S is defined by
X
R; S ==
x′′ , y ′′ , . . . · R′′ × S ′′
If p is a probability and R and S are distributions, then
if p then R else S == p × R + (1 − p) × S
Various laws can be proven about sequential composition. One of the most
important ones, the substitution law, introduced earlier, applies to probabilistic
specifications as well.
To implement a probabilistic specification we use a pseudo-random number
generator. Since we cannot, even in theory, produce a real random number generator by means of traditional computing, we assume that a pseudo-random
number generator generates truly random numbers and we simply refer to it
as random number generator. For a positive natural variable n, we say that
rand n produces a random natural number uniformly distributed in 0, ..n. To
reason about the values supplied by the random number generator consistently,
we replace every occurrence of rand n with a fresh variable r whose value has
probability (r : 0, ..n)/n. If rand occurs in a context such as r = rand n, we
replace the equation by r : (0, ..n)/n. If rand occurs in the context of a loop, we
parametrise the introduced variables by the execution time.
Recall the earlier example. Let us change the program slightly by introducing
probabilism:
P ⇐= if x = 0 then ok else (x := x − rand 2; t := t + 1; P )
In the new program at each iteration x is either decremented by 1 or it is unchanged, with equal probability. Our intuition tells us that the revised program
should still work, except it should take longer. Let us prove it. We replace rand
with r : time → (0, 1) with rt having probability 1/2. Ignoring time we can
prove:
x ≥ 0 ⇒ x′ = 0
⇐= if x = 0 then ok else (x := x − rand 2; x ≥ 0 ⇒ x′ = 0)
As for the execution time, we can prove that it takes at least x time units to
complete:
t′ ≥ t + x
⇐= if x = 0 then ok else (x := x − rand 2; t := t + 1; t′ ≥ t + x)
How long should we expect to wait for the execution to complete? In other
words, what is the distribution of t′ ? Consider the following distribution of the
10
final states:
(0 = x′ = x = t′ − t) + (0 = x′ < x ≤ t′ − t) ×
n!
n
where
=
m
m! × (n − m)!
′
t −t−1
1
× t′ −t ,
2
x−1
We can prove that:
X
rt ·
1
×
2
if x = 0 then ok
else
x := x − rt; t := t + 1;
(0 = x′ = x = t′ − t) +
′
1
t −t−1
× t′ −t
2
x−1
′
1
t
−
t
−
1
== (0 = x′ = x = t′ = t) + (0 = x′ < x ≤ t′ − t) ×
× t′ −t
2
x−1
(0 = x′ < x ≤ t′ − t) ×
Now, since for positive x, t′ is distributed according to the negative binomial
distribution with parameters x and 12 , its mean value is
X
′
1
t −t−1
′
′
t · (t − t) × (0 = x = t − t) + (0 < x ≤ t − t) ×
× t′ −t
2
x−1
′
′
== 2 × x + t
Therefore, we should expect to wait 2 × x time units for the computation to
complete.
3
Quantum Predicative Programming
This section is the contribution of the paper. Here we define the quantum system, introduce programming with the quantum system and several well-known
problems, their classical and quantum solutions, and their formal comparative
time complexity analyses. The proofs of refinements are omitted for the sake of
brevity. The reader is referred to [32] for detailed proofs of some of the algorithms.
3.1
The quantum system
Let C be the set of all complex numbers with the absolute value operator | · |
∗
and the complex conjugate operator
n-qubit system is a
P . Then na state2 of an
n
function ψ : 0, ..2 → C, such that
x : 0, ..2 · |ψx| = 12 .
2
We should point out that this kind of function operations is referred to as lifting
11
If ψ and φ are two states of an n-qubit system, then their inner product,
hψ|φi : C, is defined by:
X
hψ|φi =
x : 0, ..2n · (ψx)∗ × (φx)
A basis of an n-qubit system is a collection of 2n quantum states b0,..2n , such
that ∀i, j : 0, ..2n · hbi |bj i = (i = j).
We adopt the following Dirac-like notation for the computational basis: if
x : 0, ..2n , then x denotes the corresponding n-bit binary encoding of x and
|xi : 0, ..2n → C is the following quantum state:
|xi = λi : 0, ..2n · (i = x)
If ψ is a state of an m-qubit system and φ is a state of an n-qubit system,
then ψ ⊗ φ, the tensor product of ψ and φ, is the following state of a composite
m + n-qubit system:
ψ ⊗ φ = λi : 0, ..2m+n · ψ(i div 2n ) × φ(i mod 2n )
We write ⊗n to mean tensored with itself n times.
An operation defined on a n-qubit quantum system is a higher-order function,
whose domain and range are maps from 0, ..2n to the complex numbers. An
identity operation on a state of an n-qubit system is defined by
I n = λψ : 0, ..2n → C · ψ
For a linear operation A, the adjoint of A, written A† , is the (unique) operation,
such that for any two states ψ and φ, hψ|Aφi = hA† ψ|φi. The unitary transformations that describe the evolution of a n-qubit quantum system are operations
U defined on the system, such that U † U = I n . In this setting, the tensor product
of operators is defined in the usual way. If ψ is a state of an m-qubit system, φ
is a state of an n-qubit system, and U and V are operations defined on m and
n-qubit systems, respectively, then the tensor product of U and V is defined on
an m + n qubit system by (U ⊗ V )(ψ ⊗ φ) = (U ψ) ⊗ (V φ).
Just as with tensor products of states, we write U ⊗n to mean operation U
tensored with itself n times.
Suppose we have a system of n qubits in state ψ and we measure it. Suppose
also that we have a variable r from the domain 0, ..2n , which we use to record the
result of the measurement, and variables x, y, . . ., which are not affected by the
measurement. Then the measurement corresponds to a probabilistic specification
that gives the probability distribution of ψ ′ and r′ (these depend on ψ and on
the type of measurement) and states that the variables x, y, . . . are unchanged.
For a general quantum measurement described by a collection MP= M0,..2n of
measurement operators, which satisfy the completeness equation
m : 0, ..2n ·
†
Mm Mm = I, the specification is measureM ψ r, where
′
ψ
M
r
× (σ ′ = σ)
measureM ψ r == hψ|Mr†′ Mr′ ψi × ψ ′ = q
†
hψ|Mr′ Mr′ ψi
12
where σ ′ = σ is an abbreviation of (x′ = x) × (y ′ = y) × . . . and means “all other
other variables are unchanged”. To obtain the distribution of, say, r′ we sum
out the rest of the variables as follows:
X
′
ψ
M
r
×(σ ′ = σ)
ψ ′ , x′ , y ′ , . . . · hψ|Mr†′ Mr′ ψi × ψ ′ = q
†
hψ|Mr′ Mr′ ψi
== hψ|Mr†′ Mr′ ψi
P
For projective measurements defined by an observable O =
m · λm × Pm ,
where Pm is the projector on the eigenspace of O with eigenvalue λm :
!
Pr′ ψ
′
measureO ψ r == hψ|Pr′ ψi × ψ = p
× (σ ′ = σ)
hψ|Pr′ ψi
Given an arbitrary orthonormal basis B = b0,..2n , measurement of ψ in basis B
is:
measureB ψ r == |hbr′ |ψi|2 × (ψ ′ = br′ ) × (σ ′ = σ)
Finally, the simplest and the most commonly used measurement in the computational basis is:
measure ψ r == |ψr′ |2 × (ψ ′ = |r’i) × (σ ′ = σ)
In this case the distribution of r′ is |ψr′ |2 and the distribution of the quantum
state is:
X
r′ · |ψr′ |2 × (ψ ′ = |r’i)
which is precisely the mixed quantum state that results from the measurement.
In order to develop quantum programs we need to add to our list of implemented things from section 2.2. We add variables of type quantum state as
above and we allow the following three kinds of operations on these variables.
If ψ is a state of an n-qubit quantum system, r is a natural variable, and M is
a collection of measurement operators that satisfy the completeness equation,
then:
1. ψ := |0i⊗n is a program
2. ψ := U ψ, where U is a unitary transformation on an n-qubit system, is a
program
3. measureM ψ r is a program
The special cases of measurements, described in section 2.1, are therefore also
allowed: for an observable O, measureO q r is a program; for an orthonormal
basis B, measureB q r is a program; finally, measure q r is a program.
13
3.2
Deutsch-Jozsa algorithm
Deutsch-Jozsa problem ([14]), an extension of Deutsch’s Problem ([13]), is an
example of the broad class of quantum algorithms that are based on quantum
Fourier transform ([23]). The task is: given a function f : 0, ..2n → 0, 1 , such
that f is either constant or balanced, determine which case it is. Without any
restrictions on the number of calls to f , we can write the specification (let us
call it S) as follows:
(f is constant ∨ f is balanced) =⇒ b′ = f is constant
where b is a boolean variable and the informally stated properties of f are defined
formally as follows:
f is constant == ∀i : 0, ..2n · f i = f 0
X
f is balanced ==
i : 0, ..2n · (−1)f i = 0
It is easy to show that
(f is constant ∨ f is balanced)
=⇒ (f is constant == ∀i : 0, ..2n−1 + 1 · f i = f 0)
In our setting, we need to implement the specification R defined as follows:
b′ == ∀i : 0, ..2n−1 + 1 · f i = f 0
The Hadamard transform, widely used in quantum algorithms, is defined on a
1-qubit system and in our setting is a higher-order function from 0, 1 → C to
0, 1 → C:
√
H = λψ : 0, 1 → C · i : 0, 1 · (ψ0 + (−1)i × ψ1)/ 2
The operation H ⊗n on a n-qubit system applies H to every qubit of the system.
Its action on a zero state of an n-qubit system is:
X
√
H ⊗n |0i⊗n =
x : 0, ..2n · |xi/ 2n
On a general state |xi, the action of H ⊗n is:
H ⊗n |xi =
X
√
y : 0, ..2n · (−1)x·y × |yi/ 2n
where x · y is the bitwise inner product of x and y modulo 2 (bitwise XOR).
Another important definition is that of the quantum analog of a classical
oracle f :
Uf = λψ : 0, 1 → C · x : 0, 1 · (−1)f x × ψx
14
The quantum solution, in one quantum variable ψ and an integer variable r
is:
ψ := |0i⊗n ; ψ := H ⊗n ψ; ψ := Uf ψ; ψ := H ⊗n ψ; measure ψ r; b := (r′ = 0)
Let us add to the specification a restriction on the number of calls to the oracle
by introducing a time variable. Suppose the new specification is:
(f is constant ∨ f is balanced =⇒ b′ = f is constant) ∧ (t′ = t + 1)
where we charge 1 unit of time for each call to the oracle and all other operations
are free. Clearly, the above quantum solution works. Classically the specification
is unimplementable. In fact, the strongest classically implementable specification
is
(f is constant ∨ f is balanced =⇒ b′ = f is constant) ∧ (t′ = t + 2n−1 + 1)
3.3
Grover’s search
Grover’s quantum search algorithm ([18]) is well-known for the quadratic speedup it offers in the solutions of NP-complete problems. The algorithm is optimal
up to a multiplicative constant ([10]). The task is: given a function f : 0, ..2n →
0, 1, find x : 0, ..2n , such that f x = 1. For simplicity we assume that there is only
a single solution, which we denote x1 , i.e. f x1 = 1 and f x = 0 for all x 6= x1 .
The proofs are not very different for a general case of more than one solutions.
As before, we use a general quantum oracle, defined by
Uf |xi = (−1)f x × |xi
In addition, we define the inversion about mean operator as follows:
M : (0, ..N → C) → (0, ..N → C)
X
M ψ == λx : 0, ..N · 2 ×
i : 0, ..N · ψi/N − ψx
where N = 2n .
Grover’s algorithm initialises the quantum system to an equally weighted
superposition of all basis states |xi, x : 0, ..N . It then repeatedly applies Uf
followed by M to the system. Finally, the state is measured. The probability of
error is determined by the number of iterations performed by the algorithm.
The algorithm is easily understood with the help of a geometric analysis of
the operators. Let α be the sum over all x, which are not solutions, and let β be
the solution:
X
1
×
x 6= x1 · |xi
α= √
N −1
β = |x1 i
15
Then the oracle Uf performs a reflection about the vector α in the plane defined
by α and β. In other words, Uf (a × α + b × β) = a × α − b × β. Similarly, the
inversion about mean operator is a reflection about the vector ψ in the plane
defined by α and β. Therefore, the result of Uf followed by M is a rotation in
this plane. The quantum solution, in a quantum variable ψ, natural variables r,
i, and k, and time variable t, is,
2
p
S == sin (2 × (t′ − t) + 1) × arcsin 1/N
× (r′ = x1 ) +
2
p
′
×
1 − sin (2 × (t − t) + 1) × arcsin 1/N
(r′ 6= x1 )/(N − 1)
== P ; measure ψ r
P ⇐= i := 0; ψ := |0i⊗n ; ψ := H ⊗n ψ; R
R ⇐= if i = k then ok
else (i := i + 1; t := t + 1; ψ := Uf ψ; ψ := M ψ; R)
Specification S carries a lot of useful information. For example, it tells us that
the probability of finding a solution after k iterations is
2
p
sin((2 × k + 1) × arcsin 1/N )
Or we might ask how many iterations should be performed to minimise the
probability of an error. Examining first and second derivatives,p
we find that the
above probability is minimised when t′ − t = (π × i)/(4 × arcsin 1/N ) − 1/2 for
integer i. Of course, the number of iterations performed must be a natural number. It is interesting to note that probability of error is periodic in the number of
iterations, but since we don’t gain anything by performing extra iterations, we
pick i = 1. Finally, assuming 1 ≪ N = 2n ,√we obtain
an elegant approximation
to the optimal number of iterations: π × 2n /4 , with the probability of error
approximately 1/2n .
3.4
Computing with Mixed States
As we have discussed in section 2.1, the state of a quantum system after a
measurement is traditionally described as a mixed state. An equation ψ =
{|0i}/2 + {|1i}/2 should be understood as follows: the state ψ is |0i with probability 1/2 and it is |1i with probability 1/2. In contrast to a pure state, a mixed
state does not describe a physical state of the system. Rather, it describes our
knowledge of in what state the system is.
In our framework, there is no need for an additional mechanism to compute
with mixed states. Indeed, a mixed state is not a system state, but a distribution
over system states, and all our programming notions apply to distributions.
The above mixed state is the following distribution over a quantum state ψ:
(ψ = |0i)/2 + (ψ = |1i)/2. This expression tells us, for each possible value in
16
the domain of ψ, the probability of ψ having that value. For example, ψ is
the state |0i with probability (|0i = |0i)/2 + (|0i = |1i)/2, which is 1/2; it is
|1i with probability (|1i = |0i)/2 + (|1i = |1i)/2, which is also 1/2; for any
scalars α and β, not equal to 0 or 1, ψ is α × |0i + β × |1i with probability
(α × |0i + β × |1i = |0i)/2 + (α × |0i + β × |1i = |1i)/2, which is 0. One way to
obtain this distribution is to measure an equally weighted superposition of |0i
and |1i:
√
√
ψ ′ = |0i/ 2 + |1i/ 2; measure ψ r
√
√
== ψ = |0i/ 2 + |1i/ 2; |ψr′ |2 × (ψ ′ = |r’i)
measure
′
==
X
sequential composition
√
√
′′ ′ 2
r , ψ · (ψ = |0i/ 2 + |1i/ 2) × |ψ r | × (ψ ′ = |r’i)
′′
′′
′′
one point law
√
√
== |(|0i/ 2 + |1i/ 2) r′ |2 × (ψ ′ = |r’i)
== (ψ ′ = |r’i)/2
Distribution of the quantum state is then:
X
r′ · (ψ ′ = |r’i)/2 == (ψ ′ = |0i)/2 + (ψ ′ = |1i)/2
as desired.
Similarly, there is no need to extend the application of unitary operators.
Consider the following toy program:
ψ := |0i; ψ := Hψ; measure ψ r; if r = 0 then ψ := Hψ else ok
In the second application of Hadamard the quantum state is mixed, but this is
not evident from the syntax of the program. It is only in the analysis of the final
quantum state that the notion of a mixed state is meaningful. The operator is
applied to a (pure) system state, though we are unsure what that state is.
ψ := |0i; ψ := Hψ; measure ψ r ;
if r = 0 then ψ := Hψ else ok
as before
′
== (ψ = |r’i)/2;
if r = 0 then ψ := Hψ else ok
sequential composition
X
==
r′′ , ψ ′′ · (ψ ′′ = |r”i)/2 ×
((r′′ = 0) × (ψ ′ = Hψ ′′ ) × (r′ = r′′ ) +
′
(r′′ = 1) × (ψ ′ = ψ ′′ ) × (r′ = r′′ ))
′
′
′
== ((ψ = H|0i) × (r = 0) + (ψ = |1i) × (r = 1)) /2
√
√
== (ψ ′ = |0i/ 2 + |1i/ 2) × (r′ = 0)/2 +
(ψ ′ = |1i) × (r′ = 1)/2
one point law
17
The distribution of the quantum state after the computation is:
X
√
√
r′ · (ψ ′ = |0i/ 2 + |1i/ 2) × (r′ = 0)/2 + (ψ ′ = |1i) × (r′ = 1)/2
√
√
== (ψ ′ = |0i/ 2 + |1i/ 2)/2 + (ψ ′ = |1i)/2
A lot of properties of measurements and mixed states can be proven from the
definitions of measurement and sequential composition. For example, the fact
that a measurement in the computational basis, performed immediately following
a measurement in the same basis, does not change the state of the system and
yields the same result as the first measurement with probability 1, is proven as
follows:
measure ψ r; measure ψ r
′ 2
′
′ 2
measure
′
== |ψ r | × (ψ = |r’i); |ψ r | × (ψ = |r’i)
sequential composition
X
==
ψ ′′ , r′′ · |ψ r′′ |2 × (ψ ′′ = |r”i) × |ψ ′′ r′ |2 × (ψ ′ = |r’i) one point law
== |ψ r′ |2 × (ψ ′ = |r’i)
measure
== measure ψ r
In case of a general quantum measurement, the proof is similar, but a little more
computationally involved.
4
Conclusion and Future Work
We have presented a new approach to developing, analysing, and proving correctness of quantum programs. Since we adopt Hehner’s theory as the basis for
our work, we inherit its advantageous features, such as simplicity, generality, and
elegance. Our work extends probabilistic predicative programming in the same
fashion that quantum computation extends probabilistic computation. We have
provided tools to write quantum as well as classical specifications, develop quantum and classical solutions for them, and analyse various properties of quantum
specifications and quantum programs, such as implementability, time and space
complexity, and probabilistic error analysis uniformly, all in the same framework.
Current research an research in the immediate future involve reasoning about
distributed quantum computation. Current work involves expressing quantum
teleportation, dense coding, and various games involving entanglement, in a way
that makes complexity analysis of these quantum algorithms simple and natural. These issues will be described in a forthcoming paper. We can easily express
teleportation as refinement of a specification φ′ = ψ, for distinct qubits φ and
ψ, in a well-known fashion. However, we are more interested in the possibilities
of simple proofs and analysis of programs involving communication, both via
quantum channels and exhibiting the LOCC (local operations, classical communication) paradigm. Future work involves formalising quantum cryptographic
protocols, such as BB84 [9], in our framework and provide formal analysis of
these protocols. This will naturally lead to formal analysis of distributed quantum algorithms (e.g. distributed Shor’s algorithm of [35]).
18
References
1. S. Abramsky. High-level methods for quantum computation and information. In
Proceedings of the 19th Annual IEEE Symposium on Logic in Computer Science,
2004.
2. S. Abramsky and B. Coecke. A categorical semantics of quantum protocols. In
LICS 2004, 2004.
3. S. Abramsky and R. Duncan. A categorical quantum logic. In QPL 2004, pages
3–20, 2004.
4. P. Adao and P. Mateus. A process algebra for reasoning about quantum security.
In QPL 2005, 2005.
5. T. Altenkirch and J. Grattage. A functional quantum programming language. In
Proceedings of the 20th Annual IEEE Symposium on Logic in Computer Science,
2005.
6. T. Altenkirch, J. Grattage, J. K. Vizzotto, and A. Sabry. An algebra of pure
quantum programming. In QPL 2005, 2005.
7. P. Arrighi and G. Dowek. Operational semantics for formal tensorial calculus. In
QPL 2004, pages 21–38, 2004.
8. P. Arrighi and G. Dowek. Linear-algebraic lambda-calculus. In QPL 2005, 2005.
9. C. H. Bennet and G. Brassard. Quantum cryptography: Public key distribution
and coin tossing. In IEEE Int. Conf. Computers, Systems and Signal Processing,
pages 175–179, 1984.
10. M. Boyer, G. Brassard, P. Høyer, and A. Tapp. Tight bounds on quantum searching. In Fortschritte der Physik, pages 493–506, 1998.
11. B. Coecke. The logic of entanglement. 2004. quant-ph/0402014.
12. V. Danos, E. D’Hondt, E. Kashefi, and P. Panangaden. Distributed measurementbased quantum computation. In QPL 2005, 2005.
13. D. Deutsch. Quantum theory, the Church-Turing principle and the universal quantum computer. In Proceedings of the Royal Society of London, pages 97–117, 1985.
14. D. Deutsch and R. Jozsa. Rapid solution of problems by quantum computation.
Proceedings of the Royal Society of London, 439:553–558, 1992.
15. E. D’Hondt and P. Panangaden. Quantum weakest precondition. In QPL 2004,
pages 75–90, 2004.
16. E. D’Hondt and P. Panangaden. Reasoning about quantum knowledge. 2005.
quant-ph/0507176.
17. S. J. Gay and R. Nagarajan. Communicating quantum processes. In Proceedings
of the 32nd ACM SIGACT-SIGPLAN Symposium on Principles of Programming
Languages, 2005.
18. L. K. Grover. A fast quantum mechanical algorithm for database search. In
Twenty-Eighth Annual ACM Symposium on Theory of Computing, pages 212–219,
1996.
19. E.C.R. Hehner. a Practical Theory of Programming. Springer, New York, second
edition, 2004. Available free at www.cs.utoronto.ca/~hehner/aPToP.
20. E.C.R. Hehner. Probabilistic predicative programming. In Mathematics of Program
Construction, 2004.
21. E.C.R. Hehner. Retrospective and prospective for unifying theories of programming. In Symposium on Unifying Theories of Programming, 2006.
22. P. Jorrand and M. Lalire. Toward a quantum process algebra. In Proceedings of
the 1st ACM Conference on Computing Frontiers, 2004.
19
23. R. Jozsa. Quantum algorithms and the fourier transform. Proceedings of the Royal
Society of London, pages 323–337, 1998.
24. E. Knill. Conventions for quantum pseudocode. Technical Report LAUR-96-2724,
Los Alamos National Laboratory, 1996.
25. M. Lalire and P. Jorrand. A process algebraic approach to concurrent and distributed quantum computation: operational semantics. In QPL 2004, pages 109–
126, 2004.
26. C. Morgan and A. McIver. pQCL: formal reasoning for random algorithms. South
African Computer Journal, 22:14–27, 1999.
27. M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information.
Cambridge University Press, 2000.
28. B. Ömer. Quantum programming in QCL. Master’s thesis, TU Vienna, 2000.
29. J. W. Sanders and P. Zuliani. Quantum programming. In Mathematics of Program
Construction, pages 80–99, 2000.
30. P. Selinger. Towards a quantum programming language. Mathematical Structures
in Computer Science, 2004.
31. P. Selinger. Towards a semantics for higher-order quantum computation. In QPL
2004, 2004.
32. A. Tafliovich. Quantum programming. Master’s thesis, University of Toronto,
2004.
33. B. Valiron. Quantum typing. In QPL 2004, pages 163–178, 2004.
34. A. van Tonder. A lambda calculus for quantum computation. SIAM Journal on
Computing, 33(5):1109–1135, 2004.
35. A. Yimsiriwattana and S. J. Lomonaco Jr. Distributed quantum computing: A
distributed shor algorithm. 2004. quant-ph/0403146.
36. P. Zuliani. Non-deterministic quantum programming. In QPL 2004, pages 179–
195, 2004.
37. P. Zuliani. Compiling quantum programs. Acta Informatica, 41(7-8):435–474, 2005.
38. P. Zuliani. Quantum programming with mixed states. In QPL 2005, 2005.
| 6cs.PL
|
Are we Done with Object Recognition? The iCub robot’s
Perspective.
arXiv:1709.09882v1 [cs.RO] 28 Sep 2017
Giulia Pasquale · Carlo Ciliberto · Francesca Odone · Lorenzo Rosasco ·
Lorenzo Natale
Abstract We report on an extensive study of the current benefits and limitations of deep learning approaches
to robot vision and introduce a novel dataset used for
our investigation. To avoid the biases in currently available datasets, we consider a human-robot interaction
setting to design a data-acquisition protocol for visual
object recognition on the iCub humanoid robot. Considering the performance of off-the-shelf models trained
on off-line large-scale image retrieval datasets, we show
the necessity for knowledge transfer. Indeed, we analyze different ways in which this last step can be done,
and identify the major bottlenecks in robotics scenarios.
By studying both object categorization and identification tasks, we highlight the key differences between object recognition in robotics and in image retrieval tasks,
for which the considered deep learning approaches have
been originally designed. In a nutshell, our results confirm also in the considered setting the remarkable improvements yield by deep learning, while pointing to
specific open challenges that need to be addressed for
seamless deployment in robotics.
Keywords Humanoid Robotics · iCub · Machine
Learning · Deep Learning · Object Recognition ·
Transfer Learning · Dataset · Invariance
G. Pasquale · C. Ciliberto · L. Rosasco · L. Natale
iCub Facility,
Laboratory for Computational and Statistical Learning,
Istituto Italiano di Tecnologia
Via Morego 30, 16163, Genova, IT
E-mail: [email protected]
G. Pasquale · F. Odone · L. Rosasco
Dipartimento di Informatica, Bioingegneria, Robotica e Ingegneria dei Sistemi, Universitá degli Studi di Genova
Via Dodecaneso 35, 16100, Genova, IT
1 Introduction
Artificial intelligence has recently progressed dramatically, largely thanks to the advance in deep learning.
Computational vision, specifically object classification,
is perhaps the most obvious example where deep learning has achieved so stunning results to raise the question of whether this problem is actually solved (Krizhevsky
et al 2012b; Simonyan and Zisserman 2015; Szegedy
et al 2015; He et al 2016). Should this be the case,
robotics would be a main field where the benefits could
have far reaching effect. Indeed, the lack of reliable visual skills is largely considered a main bottleneck for the
successful deployment of robotics systems in everyday
life (Kemp et al 2007).
With this perspective in mind, we have recently
started an effort to isolate and quantify the benefits and
limitations, if any, of deep learning approaches to object recognition in robotics (Pasquale et al 2015, 2016a).
Clearly, visual perception is only one of the possible sensory modalities enabling object recognition in robotics
(Montesano et al 2008; Chitta et al 2011; Dahiya et al
2010; Natale et al 2004; Gorges et al 2010; Sinapov
et al 2014a; Hosoda and Iwase 2010; Moldovan et al
2012) and indeed, the comparison with human intelligence suggests there is more than “just” vision to object
recognition (Metta et al 2006; Fitzpatrick et al 2008;
Pinto et al 2016). Nonetheless, current deep learning
based artificial vision systems perform so well, that it
seems natural to ask how far they can go, before further
perceptual cues/modalities are needed. To this end, in
this work we mainly focus on object recognition tasks
in robotics using only visual cues.
To investigate the effectiveness of deep learning approaches in robotic applications, we designed a dataset
tailored to reflect a prototypical visual “experience” of
a humanoid robot. Indeed, the remarkable performance
of deep learning methods in object recognition has been
2
primarily reported on computer vision benchmarks such
as (Griffin et al 2007; Everingham et al 2010, 2015;
Russakovsky et al 2015), which have been essentially
designed for image retrieval tasks, and hardly are representative of a robotics scenario. In fact, this is a motivation common to other recent works such as (Lai et al
2011; Oberlin et al 2015; Borji et al 2016), where new
datasets have been proposed.
Using the iCub robot (Metta et al 2010), we devised
a human-robot interaction framework to acquire a corresponding dataset, named iCWT (iCubWorld Transformations). This dataset is rich and easy to expand to
include more data and complex perceptual scenarios. It
includes several object categories with many instances
per category, hence allowing to test both categorization
and identification capabilities. Notably, the dataset is
segmented in different sets of views, with the purpose
of testing specifically robustness and invariance properties of recognition systems within a realistic robotic
scenario.
Provided with the iCWT dataset, we performed extensive empirical investigation using different state of
the art Convolutional Neural Networks (CNN) architectures (Krizhevsky et al 2012a; Simonyan and Zisserman 2015; Szegedy et al 2015; He et al 2016). We began
checking to which extent systems already trained (on
other data) could be directly tested on iCWT. While
obtaining results much better than chance, these systems do not perform accurately enough in this case as perhaps one could expect. We hence followed a recent trend based on the general idea of transfer learning (Schwarz et al 2015; Oquab et al 2014; Sünderhauf
et al 2015; Pasquale et al 2016b; Chatfield et al 2014;
Simonyan and Zisserman 2015), where the pretrained
networks are adapted (fine-tuned) to the data at hand.
Indeed, our results confirm the effectiveness of these
strategies obtaining substantial improvements.
While impressive, these methods did not quite provide the close to perfect accuracy one would wish for.
We hence proceeded taking a closer look at the results, starting from the question of whether the missing
gap could be imputed to lack of data. Indeed, CNNs
are known to need massive amount of data to work
and data-augmentation is often used to improve results. As we discuss in detail later in the paper, investigating this latter question highlighted some differences between iCWT and other datasets such as ImageNet (Russakovsky et al 2015). More generally, we
identified clear differences between the object recognition task in robotics with respect to scenarios typically
considered in learning and vision.
Along the way, our analysis allowed to test invariance properties of the considered deep learning net-
Giulia Pasquale et al.
works and quantify their merits not only for categorization but also for identification. The description and
discussion of our empirical findings is concluded with a
critical review of some of the main venue of improvements, from a pure machine learning perspective but
also taking extensive advantage of the robotic platform.
Indeed, bridging the gap in performance appears to be
an exciting avenue for future multidisciplinary research.
In the next subsection we discuss several related
works, while the rest of the paper is organized as follows: Sec. 2 introduces the iCWT dataset and its acquisition setting. In Sec. 3 we review the deep learning
methods considered for our empirical analysis, which
is reported in Sec. 4 for the categorization task and
in Sec. 5 for object identification. Sec. 6 concludes our
study with the review of possible directions of improvement for visual recognition in robotics.
1.1 Deep Learning for Robotics
Deep Learning methods are receiving growing attention
in robotics, and are being adopted for a variety of problems such as object recognition (Schwarz et al 2015;
Pinto et al 2016; Held et al 2016; Pasquale et al 2016a),
place recognition and mapping (Sünderhauf et al 2016,
2015), object affordances (Nguyen et al 2016), grasping
(Redmon and Angelova 2014; Pinto and Gupta 2015;
Levine et al 2016) and tactile perception (Baishya and
Bäuml 2016). We limit our discussion to the work on
object recognition, which is more relevant to the work
described in this paper.
In (Schwarz et al 2015) the authors demonstrate
transfer learning from pre-trained deep Convolutional
Neural Networks (CNNs) and propose a way to include
depth information from an RGB-D camera. The main
idea is to extract a feature vector from the CNN and
train a cascade of Support Vector Machines (SVMs) to
discriminate objects’ class, identity and position. Depth
data is encoded in a planar image using a colorization
scheme. The authors report performance increase on
the Washington RGB-D benchmark (Lai et al 2011).
The work in (Pinto et al 2016) shows how the robot
can use self-generated explorative actions (like pushing
and poking objects) to autonomously extract training
data and train a CNN.
In this paper we employ a less constrained setting
than (Schwarz et al 2015), in that CNNs are trained
with data acquired by the robot during natural interaction (which undergo therefore more challenging viewpoint transformations). We employ similar techniques
for transfer learning, but we consider a wider range of
architectures and fine tuning techniques. In contrast
to (Pinto et al 2016) the use of a human teacher (see
Are we Done with Object Recognition? The iCub robot’s Perspective.
Sec. 2 for details on the acquisition setup) gives us more
control on the object trasformations. Clearly, our work
could be extended by introducing self-supervision using
explorative actions similar to the ones in (Pinto et al
2016).
The work in (Held et al 2016) and our work in
(Pasquale et al 2016a) are similar to the work presented in this paper in that they investigate invariance
properties of CNNs and learning from few examples.
They focus, however, on instance recognition, whereas
in this paper we consider – thus significantly extending (Pasquale et al 2016a) – the problem of object categorization. In addition we perform a detailed investigation of various fine-tuning techniques and systematic
evaluation of the recognition performance for specific
object transformations.
1.2 Datasets for Visual Recognition in Robotics
In the literature, several datasets for visual recognition
in robotics have been proposed: COIL (Nene et al 1996),
ALOI (Geusebroek et al 2005), Washington RGB-D (Lai
et al 2011), KIT (Kasper et al 2012), SHORT-100 (RiveraRubio et al 2014), BigBIRD (Singh et al 2014), Rutgers Amazon Picking Challenge RGB-D Dataset (Rennie et al 2016). One of the main characteristic of these
datasets is to capture images of an object while it undergoes specific viewpoint transformations. However,
these datasets are usually acquired in strictly controlled
“turntable” settings, aiming to provide accurate 3D annotations (e.g., information about the object’s pose in
each image) as a ground truth for grasping or manipulation, rather than substantial variations in the objects’ appearance. As a consequence, they mainly contain changes in the 3D point of view, under-representing
other visual transformations, such as scaling, background
changes and so forth, which are fundamental to benchmark visual recognition tasks. For instance, (Bakry et al
2015) use the Washington RGB-D and the Pascal 3D+
(Xiang et al 2014) datasets in order to evaluate the invariance of deep learning methods, and their analysis
consequently focuses mainly to 3D viewpoint changes.
Moreover, since the object is typically positioned on
a turntable that is subsequently rotated, these dataset
do not show more natural object transformations that
often occur in practice. See (Leitner et al 2015) for a
review of the major limitations of current datasets.
The NORB dataset (LeCun et al 2004) was also acquired in a similar turntable setting, but it is one of the
first to be released specifically in support of the investigation of invariance properties of recognition methods,
and in fact the images in the dataset have been artificially perturbed in order to increase variability. Re-
3
cently, (Borji et al 2016), motivated by similar considerations, presented the iLab-20M dataset: specifically,
the authors aim to create a large-scale visual recognition benchmark which, beyond representing a high
number of object instances, provides also a sufficient
number of images per object, in order to study invariance properties of deep learning methods. Also iLab20M is acquired in a turntable setting, in order to collect annotations for each image in terms of the object’s
pose.
The iCWT dataset presented in this paper separates from most previous work in that objects are captured while undergoing “natural” transformations. Acquisition is performed in a “semi-controlled” setting
intended to be a benchmark reproducing typical uncertainties faced by the visual recognition system of a
robot during a real-world task. In the following, we discuss the iCWT dataset and the related acquisition setting in detail.
2 The iCubWorld Dataset
In this section we present a novel dataset for visual
recognition, iCubWorld Transformations (iCWT), which
is used for the empirical analysis in this work. iCWT is
the latest release of the iCubWorld1 project, whose goal
is to benchmark and improve visual recognition systems
for robotics. iCubWorld datasets (Ciliberto et al 2013;
Fanello et al 2013b; Pasquale et al 2015) are designed
to record a prototypical visual “experience” of a robot,
the humanoid iCub (Metta et al 2010), while it is performing vision-based tasks. To this end, we devised and
implemented a simple human-robot interaction application, during which we directly acquire images for the
dataset from the robot’s cameras.
There is a remarkable advantage in collecting iCubWorld directly from the robot platform. Indeed, the resulting dataset offers a natural testbed for visual recognition in robotics, which is as close as possible to the
real application. In particular, this ensures that performance measured off-line on iCubWorld can be expected to generalize well when the system is deployed
on the actual robot. Note that this aspect of iCubWorld is extremely relevant since visual biases make it
typically difficult to generalize prediction performances
across different datasets and applications, as already
well-known from previous work (Pinto et al 2008; Torralba and Efros 2011; Khosla et al 2012; Hoffman et al
2013; Rodner et al 2013; Model and Shamir 2015; Stamos et al 2015; Tommasi et al 2015) and shown empirically in Sec. 4.1 of this paper.
1
https://robotology.github.io/iCubWorld/
4
Giulia Pasquale et al.
Fig. 1 iCWT categories. For each category in iCWT, we report one example image for one instance. (Red) categories appear
also in the ILSVRC 2012 dataset. (Black) categories appear in ImageNet but not in ILSVRC (see supplementary material for
more details).
Currently, to acquire iCubWorld releases we did not
make extensive use of the robot’s physical capabilities
(e.g., manipulation, exploration, etc.). This was done
because current deep learning methods achieve already
remarkable performance by relying solely on visual cues
and our goal was to evaluate their accuracy in isolation on in a robotic setting. Indeed, while exploiting the
robot body could provide further dramatic advantages
to modeling and recognition (see for instance (Montesano et al 2008) and, more recently, (Moldovan et al
2012), (Leitner et al 2014) and (Dansereau et al 2016)),
it would also prevent us to correctly assess the contribution of the purely visual components.
possibly contribute to) iCubWorld. Indeed, there are
few datasets for visual recognition in the literature that
were acquired directly on a robotic platform (Ramisa
et al 2011; Meger and Little 2013; Oberlin et al 2015).
One common reason is that scaling up the dataset size
is extremely expensive and time consuming when using
a single robot. To this end, an appealing solution, proposed in the Million Object Challenge project (Oberlin
et al 2015), is to involve multiple robots to collect a
shared dataset of visual experiences.
Note that, while we used an initial subset of iCWT
in (Pasquale et al 2016a), in this paper we present the
dataset for the first time in its entirety.
2.1 Acquisition Setup
2.2 Dataset Overview
Data acquisition for iCWT followed a protocol similar to the one in (Fanello et al 2013a), which was
adopted for previous iCubWorld releases (Ciliberto et al
2013; Fanello et al 2013b; Pasquale et al 2015): a human “teacher” shows an object to the robot and pronounces the associated label to annotate subsequent
images. The robot exploits bottom-up visual cues to
track and collect images of the object while the human
actor moves it and shows it from different poses. In
this work we decided to adopt an object tracker using
depth information (Pasquale et al 2016b), in place of
one exploiting the detection of independent motion in
the scene (Ciliberto et al 2011, 2012) (which has been
used to collect previous iCubWorld releases). In fact,
as shown in (Pasquale et al 2016b), this allows us to
extract a more precise bounding box around the object
of interest.
We developed an application to scale this acquisition procedure to hundreds of objects, which were
collected during multiple interactive sessions. iCWT is
available on-line and we plan to make also this application publicly available in order for other laboratories to use the same protocol to collect their own (or
iCWT is the largest iCubWorld release so far, comprising 200 objects evenly organized into 20 categories that
can be typically found in a domestic environment. Fig. 1
reports a sample image for each category in iCWT: 11
categories (in red in the figure) are also in the ImageNet
Large-Scale Visual Recognition Challenge (ILSVRC)
2012 (Russakovsky et al 2015), i.e. we found semantically and visually similar classes among the 1000 of
the classification challenge. The remaining 9 categories
do not appear ILSVRC but belong (or are similar) to
a synset in the larger ImageNet dataset (Deng et al
2009). To provide a qualitative intuition of the semantic
variability within a given category, namely the different visual appearance of objects in the same category,
Fig. 2 shows a sample image from the 10 instances in
the mug category. We refer the reader to the supplementary material (Fig. 13) for example images of all
object instances in iCWT.
The peculiarity of iCWT, motivating its name, is
that each object is shown in multiple image sequences
while it undergoes specific visual transformations (such
as rotations, scaling or background changes). This is
done to test the invariance of visual models in robotics.
Are we Done with Object Recognition? The iCub robot’s Perspective.
5
Table 1 Summary of the iCubWorld - Transformations
dataset
Fig. 2 Semantic variability. Sample images for the different object instances in the mug category to provide a qualitative intuition of the semantic variability in iCubWorld. See
Fig. 13 in the supplementary material for more examples.
# Categories
# Obj. per
Category
# Days
Transformations
20
10
2
2D ROT, 3D ROT
SCALE, BKG
MIX
# Frames per
Session
150
300
the image. No change in the object orientation (no
2D or 3D rotation) was applied (Fig. 3, third row).
Background The human moved the object around the
robot, keeping approximately the same distance (scale)
and pose of the object with respect to the camera plane. During this acquisition process only the
background changes while the object appearance remains approximately the same (Fig. 3, fourth row).
Mix The human moved the object freely in front of the
robot, as a person would naturally do when showing
a new item to a child. In this sequence all nuisances
in all combinations can appear (Fig. 3, fifth row).
Fig. 3 Visual transformations. Excerpts from the sequences acquired for one mug, representing the object while
it undergoes specific visual transformations.
Indeed, since very few works study “real” (i.e. nonsynthetic) visual transformations (Goodfellow et al 2009)
in order to evaluate the invariance properties of visual
representations, we believe that iCWT could be a significant contribution in this direction. To our knowledge, iCWT is the first dataset to address invariancerelated questions in robotics and accounts a much wider
range of visual transformations with respect to previous
datasets.
For each object instance, we acquired 5 different image sequences, each while the human supervisor performed a different visual transformation to the object.
Fig. 3 reports excerpts of these sequences, that contain,
respectively:
2D Rotation The human rotated the object parallel
to the camera image plane. The same scale and position of the object were mantained (see Fig. 3, first
row).
3D Rotation Similarly to 2D rotations, the object was
kept at same position and scale. However, this time
the human applied a generic rotation to the object
(not parallel to the image plane). As a consequence
different “faces” of the object where shown to the
camera (Fig. 3, second row).
Scale The human moved the object towards the cameras and back, thus changing the object’s scale in
Each sequence is composed by approximately 150
images acquired at 8 frames per second in the time interval of 20s, except for the Mix one that lasted 40s
and comprises ∼ 300 images. As anticipated, the acquisition of the 200 objects was split in multiple sessions
performed in different days. The acquisition location
was always the same (with little uncontrolled changes
in the background across days). The lighting condition
was not artificially controlled, since we wanted to investigate its role as a further nuisance: to this end, we
acquired objects at different times of the day and in
different days, so that lighting conditions are slightly
changing across the 200 objects (but not within the
five sequences of an object, which were all acquired in
the span of few minutes). Moreover, we repeated the
acquisition of each object in two different days, so that
we ended up with 10 sequences per object, containing
5 visual transformations in 2 different light conditions.
The adopted iCub’s cameras resolution is 640 × 480.
We recorded the centroid and bounding box provided
by the tracker at each frame (for details about this
procedure see (Pasquale et al 2016b)). Both left and
right images were acquired, to allow for offline computation of the disparity map and potentially further
improvement of the object’s localization and segmentation. Tab. 1 summarizes the main characteristics of
iCubWorld-Transformations.
3 Methods
In this section we review the learning methods considered in this work. In particular we briefly introduce the
principal concepts behind deep Convolutional Neural
6
Giulia Pasquale et al.
Networks (CNNs), describe the architectures used in
our analysis and the algorithms adopted to train and
apply them. We refer the interested reader to (Goodfellow et al 2016) for an in-depth introduction to CNNs
and deep learning in general.
3.1 Deep Convolutional Neural Networks
Deep Convolutional Neural Networks (CNNs) are hierarchical models organized as the concatenation of multiple processing layers. This structure allows mapping
the input signal (such as images, speech, etc.) through
a series of subsequent representations to progressively
select the features that are most relevant to the considered task. The prototypical structure of a CNN (see
Fig. 4) performs at each layer (usually referred to as
convolution layer) the following set of operations:
• Convolutions: local convolution with respect to a
bank of (learned) linear filters.
• Spatial Downsampling for instance using strided
convolutions.
• Element-wise Non Linearity such as sigmoid functions (Bishop 2006) or, more recently Rectifying Linear Units (He et al 2015).
• Spatial Pooling to aggregate local responses to the
signal in a single component, for instance by taking
the maximum value observed (max-pooling).
Each CNN architecture is characterized by the specific choice and implementation of the operations above.
The filters, locally processing the input signal at each
layer, are typically learned by minimizing a desired loss
function, such as the overall classification accuracy in
supervised settings or the reconstruction error in unsupervised ones. The spatial downsampling and pooling operations make the representation more robust
to transformations of the input at increasingly larger
scales. The non-linearities selectively retain only features that are relevant to the task, while suppressing
the others.
Until recently, the most common strategy in image
classification settings was to follow convolution layers
(C) with a set of fully connected layers (FC), namely
a standard multi-layer Neural Network. In the last few
years however, architectures with fewer or even just one
FC layer have started to be preferred since they achieve
comparable or better performance while optimizing significantly fewer parameters (Szegedy et al 2015; He et al
2016). In classification settings, the final layer of a network is typically a softmax function that maps the CNN
output into individual class likelihood scores. The CNN
3
https://www.clarifai.com/technology
prediction is then obtained by choosing the class with
maximum score.
The modular structure of CNNs allows training their
parameters simultaneously for all layers (also known as
end-to-end learning) via back-propagation (LeCun et al
1989). Given the large number of parameters to be optimized (in the order of millions), CNNs typically need
large amounts of training data to achieve good performance. Various forms of data augmentation are often
needed to artificially increase the number of training examples (e.g. by synthetically modifying the images via
geometrical or illumination changes). To further mitigate the risk of overfitting, regularization techniques
such as weights L2 regularization, dropout (Hinton et al
2012; Srivastava et al 2014) or, more recently, batch
normalization (Ioffe and Szegedy 2015), have proved
helpful.
In this work we investigate the performance of modern CNNs on the robotic setting of iCubWorld. For this
analysis we selected recent architectures achieving the
highest accuracy on the ImageNet Large-Scale Visual
Recognition Challenge (ILSVRC) (Russakovsky et al
2015) between 2012 and 2015. We used their corresponding implementation trained on ILSVRC 2012 and
publicly available within the Caffe (Jia et al 2014)
framework. Below we summarize their structures:
CaffeNet4 A small variation of the AlexNet model,
winner of ILSVRC 2012 (Krizhevsky et al 2012a).
Concatenates 5C + 3FC layers comprising ∼ 60M
parameters.
VGG-165 Second classified at ILSVRC 2014 (Simonyan
and Zisserman 2015). It maintains the general structure of AlexNet (but with 13C + 3FC layers comprising ∼ 140M parameters). It is relatively expensive to train in terms of memory and time because
of the large FC layers.
GoogLeNet6 Winner of ILSVRC 2014 (Szegedy et al
2015). It diverges from previous architectures in that
it concatenates so called inception modules and uses
just one FC layer at the very end, reducing the parameters number to ∼ 4M for 22 layers.
ResNet-507 The name is short for residual networks,
which won the ILSVRC 2015 (He et al 2016), of
which ResNet-50 is a smaller version stacking 50
layers in ∼ 20M parameters.
4
https://github.com/BVLC/caffe/tree/master/models/
bvlc_reference_caffenet
5
http://www.robots.ox.ac.uk/$\sim$vgg/research/
very_deep/
6
https://github.com/BVLC/caffe/tree/master/models/
bvlc_googlenet
7
https://github.com/KaimingHe/
deep-residual-networks
Are we Done with Object Recognition? The iCub robot’s Perspective.
7
Fig. 4 Example of a Convolutional Neural Network (Sec. 3.1) and of the two knowledge transfer approaches considered in this
work (Sec. 3.2). (Blue pipeline) feature extraction: in this case the response of one of the layers is used as a feature vector
for a “shallow” predictor like RLSCs, SVMs (see Sec. 3.2.1), which is trained on the new task. (Red pipeline) fine-tuning:
in this case the network is trained end-to-end to the new task by replacing the final layer and using the original model as a
“warm-restart” (see Sec. 3.2.2). Network image from3 .
3.2 Transfer Learning Techniques
Deep learning methods typically require very large datasets
to be successfully trained. While this could in principle
prevent their applicability to problems where training
data is scarce, recent empirical evidence has shown that
knowledge acquired by training a network on a largescale problem can be “transferred” to the new domain.
Different approaches to implement this strategy have
been proposed in the literature. In this section we review two of the most well-established method, which
we empirically assess in our experiments, namely feature extraction and fine-tuning.
3.2.1 Feature Extraction
It has been observed that deeper layers of a CNN selectively respond to specific properties of the visual scene
that are typically characteristic of specific objects or
object parts. (Chatfield et al 2014; Yosinski et al 2014;
Donahue et al 2014; Zeiler and Fergus 2014). These responses can be interpreted as representations of the visual input responding only to features that are most relevant to the task at hand. Following this intuition, it has
been shown that CNNs trained on large-scale datasets
can be indeed used as “feature extractors” on smaller
datasets, leading to remarkable performance (Schwarz
et al 2015; Oquab et al 2014; Sünderhauf et al 2015;
Pasquale et al 2016b). This is typically done by training a standard classifier such as a Support Vector Machine (SVM) or a Regularized Least Squares Classifier
(RLSC) (Bishop 2006) on top of feature vectors obtained from one or multiple layer responses. This strategy, depicted in Fig. 4 (Blue pipeline), can be interpreted as changing the last layer of the CNN and train-
ing it on the new dataset while keeping all other parameters of the network fixed.
Implementation Details. In the empirical analysis
of this work we used feature extraction as a strategy
to transfer knowledge from CNNs trained on ImageNet
to iCWT. The specific layers used for our experiments
are reported in Tab. 2 for the four architectures considered in this paper. We used RLSC with a Gaussian
Kernel as classifier for the CNN-extracted features. In
particular we implemented the Nystrom sub-sampling
approach considered in (Rudi et al 2015, 2016), which
is computationally appealing for mid and large-scale
settings and indeed allowed to significantly speed up
our experimental evaluation. We refer the reader to the
supplementary material for details about the model selection and image preprocessing protocols adopted in
this work.
3.2.2 Fine-tuning
A CNN trained on a large-scale dataset can be used
to “warm-start” the learning process on other (potentially smaller) domains. This strategy, known as finetuning (Chatfield et al 2014; Simonyan and Zisserman
2015), consists in performing back-propagation on the
new training set by initializing the parameters of the
network to those previously learned (see Fig. 4 (Red
pipeline)). In these settings it is necessary to adapt the
final layer to the new task (e.g. by changing the number of units in order to account to the new number of
classes to discriminate).
A potential advantage of fine-tuning is that it adapts
the parameters of all networks’ layers to the new problem rather than only those in the final layers. How-
8
Giulia Pasquale et al.
Table 2 Feature extraction layers for the four architectures
considered in this work. We used the notation adopted in the
literature, in which the number identifies the layer number
and the label specifies its type (i.e. fully connected or pooling
layer).
Model
CaffeNet
GoogLeNet
VGG-16
ResNet-50
refer to the supplementary material of this work for
an analysis of using other fine-tuning parameters and a
discussion on the model selection protocols used in our
experiments.
Output Layer
fc6 or fc7
pool5/7x7 s1
fc6 or fc7
pool5
Table 3 Fine-tuning protocols for CaffeNet and GoogLeNet.
Base LR is the starting learning rate of all layers that are
initialized with the original model. The FC layers that are
learned from scratch are indicated using their names in Caffe
models (2nd row), specifying the starting learning rate used
for each of them. For the other parameters, we refer the reader
to Caffe documentation.
4 Results (Categorization)
In this section we present our empirical investigation of
Deep Learning methods in the robotic setting of iCubWorld.
4.1 Deep Learning and (the Need for) Knowledge
Transfer
Modern datasets for visual recognition comprise an extremely large number of images (e.g. 1 Million for the
Base LR
1e-3
0
1e-5
0
ILSVRC challenge) depicting objects in a wide range of
fc8: 1e-4
loss3/classifier: 1e-2
natural scenes. This extreme variability opens the quesLearned
fc8: 1e-2
fc7: 1e-4
loss1(2)/classifier: 1e-3
FC Layers
tion of whether datasets such as iCubWorld, which repfc6: 1e-4
loss1(2)/fc: 1e-3
resent a smaller “reality”, could be interpreted simply
fc7: 50
pool5/drop 7x7 s1: 60
Dropout (%)
fc6: 50
loss1(2)/drop fc: 80
as sub-domains of larger ones. If this was the case, deep
Solver
SGD
Adam
learning models trained on ImageNet would achieve
LR Decay Policy
Polynomial (exp 0.5)
No decay
high recognition performance on iCubWorld as well,
# Epochs
6
36
6
without any re-training or adaptation.
Batch Size
256
32
While this result would lead to the appealing scenario where a robot can simply download and use a viever, this flexibility comes at the price of a more insual classifier “off-the-shelf” (i.e. trained off-line), prevolved training process. Indeed, the performance of a
vious analysis has shown that most computer vision
fine-tuned network are extremely dependent on the choice datasets are essentially biased, ultimately preventing a
of the (many) hyper-parameters available. Fine-tuning
learning algorithm to generalize from one domain to the
has been recently used to adapt network models learned
other (Pinto et al 2008; Torralba and Efros 2011; Model
on ImageNet to robotic tasks (see, e.g., (Eitel et al 2015;
and Shamir 2015; Khosla et al 2012; Stamos et al 2015;
Pinto and Gupta 2016; Redmon and Angelova 2015a;
Tommasi et al 2015; Hoffman et al 2013; Rodner et al
Pasquale et al 2016a; Nguyen et al 2016)).
2013). Similarly, it was recently observed that conventional “non-deep” models trained on ImageNet perform
poorly when applied to robotic settings (Goehring et al
Implementation Details. In our experiments we per2014).
formed fine-tuning only for CaffeNet and GoogLeNet,
To address this question, we evaluated four off-thewhich are representative of most recent architectures
shelf CNNs (the ones reviewed in Sec. 3.1) for the task
and were significantly faster to fine-tune than VGG-16
of image classification on iCWT. For these experiments
and ResNet-50. We considered two main regimes for
we restricted the test set to the 11 categories of iCWT
fine-tuning a network: one updating only one or more
that appear also in the ILSVRC challenge (see Sec. 2
FC layers while keeping the others fixed, and another
and Fig. 1). As a reference, we compared these results
one more aggressively adapting all layers, comprising
with the average accuracy of the same networks on the
the C layers, to the training dataset. This was done by
corresponding 11 categories of the ImageNet dataset.
selecting different learning rates for the neurons in each
The test set for iCWT was composed, for each category,
layer, i.e., the size of gradient steps at each iteration
by the images of all 10 object instances, comprising all
of back-propagation. We refer to these two protocols as
5 transformations for one day and the left camera (unconservative and adaptive and report the corresponding
less differently specified we always used this camera for
parameters in Tab. 3 as a reference. In the experiments
the experiments), for a total of ∼ 9000 images per catediscussed in this paper we consider only these strategory. For ImageNet, we downloaded the images for the
gies since we did not observe significant performance
corresponding 11 categories (refer to the supplementary
differences following other choices of parameters. We
CaffeNet
adaptive conservative
GoogLeNet
adaptive conservative
Are we Done with Object Recognition? The iCub robot’s Perspective.
100
90
80
accuracy (%)
70
60
50
40
iCWT off the shelf
iCWT adapted
ImageNet
Random Choice
30
20
10
0
CaffeNet
GoogLeNet
VGG-16
ResNet-50
Fig. 5 Average classification accuracy of off-the-shelf networks (trained on ILSVRC) tested on iCubWorld (Dark Blue)
or on ImageNet itself (Gray). The test sets for the two
datasets are restricted to the 11 shared categories (see Sec. 2).
(Light Blue) reports the classification accuracy when the
same networks are “transferred” to iCubWorld (see Sec. 4.1
for details). The (Orange line) shows the recognition chance
of a random classifier.
material for the corresponding synsets), comprising on
average ∼ 1300 images per category.
Fig. 5 reports the average classification accuracy on
iCWT (Dark Blue) and ImageNet (Gray). It can be
immediately observed that there is a substantial drop
in performance of ∼ 50 − 60% when testing on iCWT
rather than ImageNet, suggesting that differences between the two datasets exist, and in particular that
iCubWorld is not a sub-domain of ImageNet. This drop
is likely due to biases in ImageNet (see also (Tommasi
et al 2015; Hoffman et al 2013; Rodner et al 2013)).
While an in-depth analysis of bias is outside the scope
of this work, in the supplementary material we provide
some further evidence of this effect. We care to point
out that for a fair comparison we have restricted the
output of the off-the-shelf networks to the 11 classes
considered in the experiment with iCWT (from the
original 1000-dimensional output vector provided by
the off-the-shelf networks). We refer again to the supplementary material for the experiments reporting the
same performance when considering the entire 1000dimensional prediction.
Knowledge Transfer. The drop in performance observed in Fig. 5 implies that it is necessary to train the
recognition system on the target domain. However, the
experiment also shows that all the networks performed
substantially better than chance (Orange line). This
suggests that the networks retained some knowledge
about the objects’ appearance. Therefore, rather than
training a novel architecture “from scratch” (which typ-
9
ically requires large amounts of training data, time and
computational resources), a viable alternative is to transfer such knowledge, essentially by “adapting” the networks trained on ImageNet to the new setting (see Sec. 3.2).
The idea of knowledge transfer has recently received
considerable attention from the Deep Learning community (Hoffman et al 2013; Agrawal et al 2014; Azizpour
et al 2015; Huh et al 2016) because it provides a robust
approach to apply Deep Learning methods to smaller
datasets.
In Fig. 5 we report the classification performance
achieved by systems where knowledge transfer has been
applied (Light Blue). For these experiments we followed
the protocol described in Sec. 3.2.1, where RLSC predictors are trained on feature vectors extracted from
the deeper layers of the CNNs. We created a separate
training set from iCWT, by choosing 9 instances for
each category for training while keeping the 10th instance for testing. We repeated these experiments for
10 trials in order to allow each instance of a category to
be used in the test set. Fig. 5 reports the average accuracy over these trials. We observe a sharp improvement
for all networks, which achieve a remarkable classification accuracy in the range of ∼ 70 − 90%. On ImageNet
however, the corresponding performance is still significantly higher, although such gap seems to be reduced
for more recent architectures.
What are the reasons for this gap? In the following we empirically address this question, showing that
the observed behavior is due to fundamental differences
between robot vision and image retrieval settings.
4.2 Do we need more data?
Deep learning methods require large amounts of data
in order to be trained effectively. This is particularly
true when training a network from “scratch”, but valid
also (albeit on a smaller scale) to knowledge transfer
techniques. Indeed, as mentioned in Sec. 3, a common
practice when training a CNN is to perform data augmentation, namely to artificially increase the dataset
size by applying synthetic transformations to the original images (e.g. rotations, reflections, crops, illumination changes, etc.).
From this perspective the robotic setting seems particularly favorable. Indeed, data augmentation can be
performed by simply acquiring more and more frames
depicting an object while viewpoint or illumination change
naturally. While acquiring more frames of an object is
particularly convenient, in robotics it is typically expensive to gather instead images depicting different objects instances, since the robot needs to directly observe
each of them. In this section we investigate the impact
10
Giulia Pasquale et al.
RLSC
FINE-TUNING
RLSC
100
100
100
90
90
90
90
80
80
80
80
70
70
70
70
60
60
60
60
50
50
40
30
20
10
40
CaffeNet adapt
CaffeNet cons
GoogLeNet adapt
GoogLeNet cons
50
30
150
#frames/seq
300
20
10
accuracy (%)
accuracy (%)
FINE TUNING
100
CaffeNet
GoogLeNet
VGG-16
ResNet-50
50
50
50
40
30
150
300
#frames/seq
Fig. 6 Recognition accuracy vs # frames. (Left) Accuracy of CaffeNet and GoogLeNet models fine-tuned according
to the conservative and adaptive strategies (see Sec. 3.2.2).
(Right) Accuracy of RLSC classifiers trained over features
representations extracted from the 4 architectures considered
in this work (see Sec. 3.2.1).
of these aspects in robot vision, taking iCubWorld as
a testbed for our analysis. Note that in the following
we use the term instance to refer to a specific object
belonging to a given category, while frame denotes a
single image depicting a scene or an object.
4.2.1 What do we gain by adding more frames?
We considered a 15-class categorization task on iCWT
to compare the performance of learning models trained
on an increasing number of examples. We created training sets of different size by sampling respectively N =
10, 50, 150 and 300 frames from each transformation sequence of an object. For each category (see the supplementary material for the list of categories) we used 7
objects for training, 2 for validation and 1 for test. Validation and test sets contained all images available for
the corresponding instances. In order to account for statistical variability, we repeated these experiments for 10
trials, each time leaving out one different instance for
testing. For this experiment we trained and tested on
one of the two available days in iCWT (and one -the
left- camera).
Fig. 6 reports the average classification accuracy
of different learning models as more training examples
are provided. Surprisingly, most architecture achieve remarkably high accuracy already when trained on the
smallest training set and show little or no improvement
when new data is available. This finding is in contrast
with our expectations, since increasing the dataset size
does not seem key to a significant improvement in performance.
Secondary observations:
• Fine-tuning and RLSC achieve comparable accuracy (both for CaffeNet and GoogLeNet).
20
40
CaffeNet adapt
CaffeNet cons
GoogleNet adapt
GoogleNet cons
1
3
5
#obj/cat
CaffeNet
GoogleNet
VGG-16
ResNet-50
30
7
20
1
3
5
7
#obj/cat
Fig. 7 Recognition accuracy vs # instances (number
of object instances available during training). (Left) Accuracy of CaffeNet and GoogLeNet models fine-tuned according
to the conservative and adaptive strategies (see Sec. 3.2.2).
(Right) Accuracy of RLSC classifiers trained over features extracted from the 4 architectures considered in this work (see
Sec. 3.2.1).
• We confirm the ILSVRC trends, with more recent
networks outperforming older versions but with VGG16 features being better than those of GoogLeNet
when using feature extraction with RLSC.
• Note that CaffeNet performs worse when training
data is scarce because of the high number of parameters to be learned in the 3 FC layers (see Sec. 3
and the supplementary material).
• To further support these findings, in the supplementary material we report results for the same experiment performed using less example instances per
category.
4.2.2 What do we gain by adding more
instances?
We evaluated the impact of adding new object instances
when training a recognition system. We consider this
process as increasing the semantic variability of the
training set, in contrast to increasing the geometric
variability by showing more frames of a known object
instance. We considered the same 15-class categorization task of Sec. 4.2.1 and created four training sets
containing frames sampled from an increasing number
of instances per category, namely 1, 3, 5 and 7. For all
dataset, training data was randomly sub-sampled from
all available transformation sequences to achieve identical total size of 900 images per category. Validation and
test sets contained all frames for the remaining 2 and 1
instance (per category). We repeated the experiments
for 10 trials.
Fig. 7 reports the accuracy of different models tested
on this problem. Results show that increasing the semantic variability dramatically improves the accuracy
of all models by a similar margin (around 15 − 20%).
Are we Done with Object Recognition? The iCub robot’s Perspective.
# instances
per category
∞
IMAGE RETRIEVAL
ImageNet
ROBOT VISION
iCubWorld
1
# frames
per
instance
∞
Fig. 8 Different training regimes from robot vision and image retrieval settings.
Moreover, from the observed trends we would expect
these model to achieve even higher accuracy if more
object instances were available.
Secondary observations:
• Fine-tuning the networks seems to lead to worse performance than RLSC on feature extraction both for
CaffeNet and GoogLeNet.
• Also in this setting we confirm ILSVRC results, with
more recent networks outperforming previous ones
but with VGG-16 outperforming GoogLeNet when
using feature extraction with RLSC.
• To further support our findings, in the supplementary material we report results for a similar experiment but discriminating only between 10 or 5 categories.
4.2.3 Robot Vision and Image Retrieval
In this section we considered some of the main challenges associated to robot vision. While both robot vision and image retrieval address the same visual recognition problem, they are cast within two very different
training regimes. We have identified here the two main
causes of such difference (depicted in Fig. 8): 1) semantic variability, namely the amount of different object
instances available for each category and 2) the amount
of frames per instance.
Typically, in image retrieval settings a large number of images depicting different object instances for
each category is available, but for each such instance
very few images are provided. As an example, ILSVRC
training set comprises ∼ 1000 instances for each of the
1000 object categories, while only 1 image per instance
is provided. On the opposite end of the spectrum, in
robot vision settings it is easy to gather large amounts
11
of example images for a single instance (since the robot
can move around and observe an object from multiple
points of view). However there is a remarkable limitation in the total number of categories and instances that
can be experienced.
Our analysis has shown that the limited availability
of semantic variation that naturally occurs in robotics
applications can dramatically affect the recognition accuracy of a learning system. Moreover, contrarily to
our expectations, we observed that this limitation cannot be alleviated by simply feeding more training data
(frames) to the network. Indeed, classifiers trained on
datasets of different size (but same semantic variability) achieved identical performance. This can be extremely problematic since in robotics the overhead of
collecting and acquiring examples of a novel instance is
extremely expensive, while collecting more views of an
object comes at a low cost. Unfortunately, we cannot
adopt “data augmentation” strategies to artificially increase the semantic variability of a dataset as it is done
for the case of view-point variability.
From our findings it appears clear that bridging the
gap between robot vision and image retrieval needs a
deeper analysis. To this end, in the following we deepen
our analysis on the performance of CNNs on iCWT,
with particular focus on the concept of invariance.
4.3 Invariance
In Sec. 4.2.1 we saw that models trained on few frames
achieve comparable or even better accuracy to those
trained larger datasets. These results suggest that the
corresponding networks could leverage on a robust data
representation and indeed in this section we investigate
to what extent such models are invariant to the visual
transformations in iCWT. Indeed, invariance, i.e. robustness to identity-preserving visual transformations
of a scene, is a highly desirable behavior when designing and training a visual recognition system, since it can
dramatically reduce the “complexity” of the learning
problem (Anselmi et al 2016, 2015), increasing the capability of generalizing the visual appearance of an object
category from a limited number of examples (ideally,
just one). This is even more appealing in robotics applications where, usually, the robot is required to learn
new objects on the fly, and recognize them reliably in
unpredictable conditions.
To test the invariance of the CNNs, we considered
again the 15-class categorization problem introduced
in Sec. 4.2.2, where we used 7 object instances per category for training, 2 for validation and 1 for testing.
However, we did not mix examples from all the five
available sequences (2D Rotation, 3D Rotation, Scale,
12
Giulia Pasquale et al.
test: MIX
100
test: 3D ROT
test: SCALE
test: BKG
100
100
100
90
90
90
90
80
80
80
80
70
70
70
70
70
60
60
60
60
60
50
50
50
50
50
40
40
40
40
40
30
30
30
30
30
20
MIX 2DR 3DR SC BKG ALL
20
MIX 2DR 3DR SC BKG ALL
20
MIX 2DR 3DR SC BKG ALL
20
MIX 2DR 3DR SC BKG ALL
20
MIX 2DR 3DR SC BKG ALL
90
80
accuracy (%)
test: 2D ROT
100
CaffeNet
GoogLeNet
VGG-16
ResNet-50
Fig. 9 Generalization performance across different visual transformations. Learning models were trained on one of
the 5 transformations present in iCWT (specified in the horizontal axis), and then tested on all transformations. Accuracy is
reported separately in each plot for each tested transformation. Shaded areas represent the improvement achieved by including
all frames of a sequence instead of subsampling ∼ 20 of them.
Background and Mix). Instead we performed training
(and validation) using only an individual transformation, and then tested the learned model on the others.
We repeated these experiments for 10 trials. We considered two “regimes”: one with including all images
from a sequence, and another one subsampling images
of a factor of 7 (as we did in Sec. 4.2.2, Fig. 7), since
we previously observed that, while including more instances in the training set is important, including more
frames is not.
As in Sec. 4.2.1 and 4.2.2, we limit our analysis to
only one of the two available days in iCWT. Indeed,
in this setting we aim to study the effect of isolated
viewpoint transformations, without considering other
nuisances due to, for example, the changes in the light
and setting conditions that can appear from one day to
another.
For this experiment we report only the accuracy of
approaches that rely on the application of RLSC on
top of feature representations extracted using off-theshelf models (see Sec. 3.2.1). This is done to isolate the
invariance properties of the networks trained on ImageNet. Note however that we performed these experiments also by fine-tuning the networks, as for previous
tests, observing similar results.
Fig. 9 reports the generalization capabilities of models trained on a single transformation and tested on a
different one. As a reference, we considered also a 6th training set (All ), obtained by randomly sampling
points from all other 5 training sets, keeping similar
size. This training set is analogous to those used in
the experiments in Sec. 4.2.2 and 4.2.1 but with size
reduced to be ∼ 150 ∗ 7 = 1050 images per category
(and to only 150 images per category in the subsampled regime). We report the accuracy of the subsam-
pled training sets with a bold line, and the improvement
achieved by considering all frames from the sequences
with a shaded area of the same color.
We first confirm that adding example frames for a
transformation does not significantly improves the networks’ invariance (even to the transformation itself).
We then notice that overall the models exhibit invariance to transformations that have been included in the
training set. It is worth noticing that in all cases the
best performance are obtained when training and testing are performed on the same transformation and when
all transformations are included in the training set (All).
This demonstrates that enriching the dataset to include
more transformations does not degrade performance.
Moreover, training on Mix achieves as good performance as All when tested on every specific transformation. This suggests that showing an object to the robot
in a natural way, with all transformations appearing in
random combinations, instead of systematically collecting sequences comprising individual transformations, is
a feasible approach to obtain predictors invariant to
these transformations.
It is interesting to note that rather different models trained on ImageNet exhibit the same invariance
pattern. In particular, performance drops substantially
when testing on a transformation that was not present
on the training set. While this can be expected for
transformations involving 3D rotations of the object,
it is quite surprising for affine ones, namely Scale, 2D
Rotation and Background to which the convolutional
structure of the CNN should be invariant “by design”,
or learned during the training on ImageNet. We will
further investigate this fact in Sec. 5.2, where we study
the invariance of CNN models in the context of object
identification rather than categorization.
Are we Done with Object Recognition? The iCub robot’s Perspective.
5.1 Knowledge Transfer: from Categorization to
Identification
In Sec. 4.1 we have seen how knowledge acquired on
ImageNet can be transferred to the iCubWorld domain
to successfully tackle categorization tasks. A natural
question is whether the same strategy would be similarly favorable for object identification. Indeed, in object identification settings there is no semantic variability (there is only one instance per class), but for categorization we have observed that semantic variability
is extremely useful to the learning process (Sec. 4.2.2),
while simply adding more images of a given instance is
almost redundant (Sec. 4.2.1).
We addressed this question by considering an object identification task on iCWT, where we compared
CNN models trained with an increasing number of examples. The setting is similar to the one used for categorization but for a 50-class object identification problem: we chose the 50 object instances from the book,
flower, glass, hairbrush and hairclip categories, which
do not appear in the ILSVRC dataset. We created four
training sets containing respectively 10, 50, 150 and 300
RLSC
FINE TUNING
accuracy (%)
5 Results (Object Identification)
So far in this work we focused on visual categorization
problems, namely to assign a given object instance to
the corresponding category. In this section we move instead to the task of object identification (or instance
recognition), which consists in labeling a given image
according to the object instance appearing in it. This
problem is indeed very relevant to robotics settings,
since reliable instance recognition skills would provide
the system with finer control over tasks such as manipulation, grasping, etc. Also, considering a domestic
scenario, the robot could be asked to use a specific object rather than some object in a category (e.g. “iCub,
bring me my phone” instead of “a phone”).
Therefore, in parallel to the experiments on categorization, in this work we assessed the performance of
Deep Learning methods on the task of object identification in robotics. Note that until recently, this problem
has been approached with methods based on keypoints
extraction and template matching (Lowe 2004; Philbin
et al 2008; Collet et al 2011b; Crowley and Zisserman
2014; Collet et al 2011a, 2009; Muja et al 2011), however it has been recently observed that appraoches relying on more holistic visual representations perform
typically better in low/mid-resolution settings such as
iCubWorld (Ciliberto et al 2013). Following this, in this
section we will focus only on the CNN architectures
considered in Sec. 3.
13
100
100
90
90
80
80
70
70
60
60
50
40
30
20
10
50
40
CaffeNet adapt
CaffeNet cons
GoogLeNet adapt
GoogLeNet cons
50
30
150
#frames/seq
300
20
10
CaffeNet
GoogLeNet
VGG-16
ResNet-50
50
150
300
#frames/seq
Fig. 10 Recognition accuracy vs # frames (Identification). (Left) Accuracy of CaffeNet and GoogleNet models
fine-tuned according to the conservative and adaptive strategies (see Sec. 3.2.2). (Right) Accuracy of RLSC classifiers
trained over features representations extracted from the 4 architectures considered in this work (see Sec. 3.2.1).
images per object, sampled randomly from the 4 transformation sequences 2D Rot, 3D Rot, Scale and Bkg
(see Sec. 2). From each dataset, 20% images were retained for model selection. The images from the Mix
sequence were used to test the classification accuracy of
the methods considered. As for the categorization experiment, only the images from a single day were used
for these experiments.
Fig. 10 reports the average accuracy of CNN architectures trained on a growing number of examples.
These results are in stark contrast with their counterpart on categorization (Sec. 4.2.1): we can clearly notice
that adding more training data dramatically improves
the recognition capabilities of all networks. This suggests that having access to more views of an instance
allows the learning systems to create a more nuanced
model of the object. Apparently, this richer model does
not provide any advantage in categorization settings,
but is extremely useful to recognize the same object
in new images. In line with this observations, we notice also that in this setting the adaptive fine-tuning
strategy significantly outperforms the competitors, suggesting that the representation learned for categorization on ImageNet, albeit already beneficial to the task,
can be further improved to adapt to the object identification setting. These findings confirm and extend
recent similar results from the instance retrieval literature (Babenko et al 2014; Gordo et al 2016).
5.2 Invariance
In Sec. 4.1, we have seen that the accuracy of an object
identification system is greatly improved when it is provided with more examples of an instance. This observation seems to contradict the assumption that CNN are
14
Giulia Pasquale et al.
100
90
100
ResNet-50
VGG-15
GoogLeNet
CaffeNet
test: 2D ROT
100
test: 3D ROT
100
test: SCALE
100
90
90
90
90
80
80
80
80
70
70
70
70
70
60
60
60
60
60
50
50
50
50
50
40
40
40
40
40
30
30
30
30
30
80
accuracy (%)
test: MIX
20
2DR
3DR
SC
BKG
20
MIX
3DR
SC
BKG
20
MIX
2DR
SC
BKG
20
MIX
2DR
3DR
BKG
20
MIX
test: BKG
2DR
3DR
SC
Fig. 11 Generalization performance across different visual transformations (Identification). RLSC are trained on
one of the 5 transformations present in iCWT (specified in the horizontal axis), and then tested on the other transformations.
Accuracy is reported separately in each plot for each tested transformation.
designed to be already invariant to view-point transformations. We addressed this question by considering a
learning scenario similar to the one adopted in Sec. 4.3
to investigate invariance in categorization settings, but
focused here on object identification. Specifically, we
considered the same 50-class identification task, but restricted the training set to contain only images from
a single transformation sequence of the 5 available in
iCubWorld (Sec. 2). The resulting models were tested
separately on the remaining transformations to assess
the ability of the learning systems to generalize to new
viewpoints. Similarly to Sec. 4.3 we considered only one
day and evaluated only learning methods based on feature extraction (plus RLSC), in order to evaluate viewpoint invariance of off-the-shelf networks.
Fig. 11 reports the average accuracy of models trained
a single transformation using respectively 10 or 150
frames per object and tested on another. We notice
that the performance varies remarkably from one tested
transformation to another, suggesting that the representations considered in these experiments are not invariant to transformations observed in iCWT. Interestingly, by comparing the two training regimes (i.e. large
Vs small training set) we notice that the remarkable improvement observed in Sec. 5 when adding more frames
is confirmed and extended also to the setting where
the system is trained on a single transformation at the
time. As expected, more recent networks significantly
outperform previous models, with ResNet-50 achieving
the highest accuracy by a large margin.
Similarly to what we observed in the categorization
setting, Fig. 11 reports quite low performance when
generalizing across transformations. In the following we
discuss possible strategies to address this problem.
5.2.1 Improving the Invariance
In this section we consider different fine-tuning strategies to improve the invariance properties of off-the-shelf
CNNs in identification settings. This analysis is motivated by the observation in Fig. 10 that adaptive finetuning performs significantly better than conservative
and feature extraction based strategies. Indeed, this
suggests that adapting the representation of the CNNs
to the identification task is helpful to recognition, possibly because the network is actually learning the transformations to which it needs to be invariant. To this
end, here we investigate whether fine-tuning a CNN
on the iCubWorld domain can indeed improve/adapt
the invariance properties of the network to the identification task. We have performed a preliminary set of
experiments related to this question in (Pasquale et al
2016a), where we considered a smaller set of transformations and fine-tuning strategies, and focused only on
the CaffeNet architecture.
We consider the same learning setting of the experiments reported in Fig. 11, but we evaluate learning
models that are first “pre-fine-tuned” on one of the following datasets to improve their invariance:
• iCubWorld identification (iCWT id). This dataset
contains images of all instances of the 5 object categories of iCWT that were not used in the previous
experiments, namely oven glove. squeezer, sprayer,
body lotion and soda bottle. Fine-tuning was performed with the adaptive strategy on the identification task. Training and validation sets were obtained
following the same protocol of Sec. 5.1.
• iCubWorld categorization (iCWT cat). The
same dataset as (iCW id) but fine-tuning was performed on the categorization task for the 5 objects
Are we Done with Object Recognition? The iCub robot’s Perspective.
accuracy (%)
100
80
100
off-the-shelf
iCWT cat
iCWT id
iCWT + ImNet
ImNet
test: 2D ROT
100
test: 3D ROT
100
test: SCALE
100
80
80
80
80
60
60
60
60
60
40
40
40
40
40
20
2DR
100
accuracy (%)
test: MIX
15
80
3DR
SC
BKG
test: MIX
20
MIX
100
off-the-shelf
iCWT cat
iCWT id
iCWT + ImNet
ImNet
3DR
SC
BKG
test: 2D ROT
20
MIX
100
2DR
SC
BKG
test: 3D ROT
20
MIX
100
2DR
3DR
BKG
test: SCALE
20
MIX
100
80
80
80
80
60
60
60
60
60
40
40
40
40
40
20
2DR
3DR
SC
BKG
20
MIX
3DR
SC
BKG
20
MIX
2DR
SC
BKG
20
MIX
2DR
3DR
BKG
20
MIX
test: BKG
2DR
3DR
SC
test: BKG
2DR
3DR
SC
Fig. 12 Same experiment setting as in Fig. 11, but using different image representations, provided by CaffeNet (top, Orange)
or GoogLeNet (bottom, Blue) network models fine-tuned according to different strategies (see Sec. 5.2.1).
considered. Again, the adaptive strategy was used.
Train and validation sets were obtained following
the same protocol as in Sec. 4.2.1.
• iCubWorld + ImageNet (iCWT + ImNet).
This dataset contains images of the 5 categories
above but sampled from both iCWT and ImageNet.
Note that most iCWT categories do not appear in
ILSVRC but are in synsets in the larger ImageNet
dataset (see the supplementary material for a list of
the corresponding synsets). All images in the synset
were used. Fine-tuning was performed on the 5-class
categorization task. This dataset is conceived to test
the possibility to have the CNN directly learn the
relation between ImageNet examples on which it has
been originally trained and iCWT images.
• ImageNet (ImNet). This dataset contains the 5
ImageNet synsets corresponding to the 5 object categories on which the CNNs will be later trained
and tested for invariance, namely book, flower, glass,
hairbrush and hairclip. Fine-tuning was performed
on the 5-class categorization task. This dataset allows the network to focus on data available on-line
about the task at hand, but different from the images that the robot will observe.
Fig. 12 reports the accuracy of RLSC classifiers when
trained on features extracted by the CNNs fine-tuned
on the datasets described above. Training was performed
separately for each transformation similarly to previ-
ous section, on the dataset containing only 10 example images per object instance. It can be noticed that
pre-fine-tuning on the identification task is particularly
advantageous, leading to a dramatic improvement over
the model trained on off-the-shelf features. In particular, comparing these results with those in Fig. 11, we
see that (iCWT id) trained on 10 examples per object
performs on par with the off-the-shelf method trained
on 150 images per object. Moreover, the performance
of (iCWT id) are in general more stable across different viewpoint transformations, suggesting that the
preliminary fine-tuning could have indeed allowed the
CNNs to become partially invariant to transformations
in iCubWorld. Interestingly the other CNNs do not provide similar improvements to identification and, in some
cases, they even have worse performance than the offthe-shelf based classifier.
We conclude with a note related to categorization.
Indeed, following these experiments we could wonder
whether a similar pre-fine-tuning strategy could improve invariance also in the categorization setting of
Sec. 4.3. However, empirical evidence showed that when
performing fine-tuning on the datasets described above,
the performance of the CNNs does not change significantly on the categorization task. We refer to the supplementary material for the analysis of this specific setting. We hypothesize this to be due to two possible reasons: 1) networks trained on the ILSVRC are already
16
highly optimized for categorization and there is no gain
in adapting the visual representation or 2), the negative
effect of the limited semantic variability in iCubWorld
with respect to ImageNet may “overcome” the potential benefits of increasing the invariance to viewpoint
transformations. This motivates some of the proposed
directions of future investigation that we discuss in the
following section.
6 Discussion and Future Work
In this work we studied the application of modern Deep
Learning methods to visual recognition tasks in robotics.
We challenged Deep Learning methods on an object
recognition task that was specifically designed to represent a prototypical visual recognition problem in a
real robotics application. Our experiments show that
Deep Learning leads to remarkable performance for the
visual tasks of object classification and instance recognition. Proper adoption of knowledge transfer strategies
– in particular mixing Deep Learning with conventional
“shallow” classifiers based on Kernel methods – plays
a fundamental role, in that they leverage on the visual
representation learned on large-scale datasets to achieve
high performance in the robotic domain.
However, a substantial gap still exists between the
performance that can be obtained on the two domains.
Our analysis shows that this performance gap is due
to scarce semantic variability, which characterizes the
robotic domain and is due to the intrinsic cost of acquiring training samples. Yet, adoption of robotic systems in real applications requires to push further these
requirements to achieve performance that approaches
100%. Indeed, in real-world robotics applications, failures due to object mis-detection or mis-classification
can potentially lead to dramatically more critical and
harmful consequences than in standard image retrieval
scenarios. Therefore, the error rate of these systems will
need to be as close as possible to zero to be considered
for production and deployment in environments shared
with humans.
In this section we consider possible directions for future research, aimed at mitigating the impact of such
differences when performing visual recognition in robotics.
The goal of our discussion is to consider them together
in the same picture to present how, in our opinion, the
robot vision problem could be addressed.
Improving invariance. The experiments in Sec. 4.3
show that models tested in this work are mostly locally
invariant, namely their representation is robust to small
view-point changes. While local invariance has been of
main interest to computer vision in the past (Lowe
Giulia Pasquale et al.
2004; Mikolajczyk and Schmid 2004), current research
on invariance is instead focused on designing learning
systems able to learn and encode representations that
are robust to more dramatic (more “global”) transformations of an object (Anselmi et al 2016, 2015). Clearly,
the more robust the visual representation is to viewpoint changes, small deformations, background variations etc., the less the corresponding model trained on
an off-line large-scale dataset such as ImageNet will be
biased to the specific training conditions. Research on
invariant representations could therefore lead to both
robust off-the-shelf robotics systems that do not need
knowledge transfer and also allow to train on-the-fly
classifier that can be trained from very few examples of
a novel object and reliably recognize it from very different poses.
Multi-task learning. In this work we followed a typical approach to categorization, where no similarity or
relation is assumed among different classes. However, in
visual recognition settings object categories often have
a number of visual features in common (e.g. wheels,
windows, legs, handles and so on). Incorporating information about similarities across object classes within
the learning model could significantly improve the overall accuracy of a recognition system, especially in presence of scarce training data. In particular, in the literature on multi-task learning there have been proposed
several approaches to model relations across tasks (i.e.
object categories) to directly enforce them on the learning problem when they are available a-priori (Crammer and Singer 2000; Micchelli and Pontil 2004; Evgeniou et al 2005; Joachims et al 2009; Fergus et al 2010;
Lozano and Sindhwani 2011) or learn them when unknown (Argyriou et al 2008; Jacob et al 2008; Minh and
Sindhwani 2011; Dinuzzo et al 2011; Sindhwani et al
2012; Ciliberto et al 2015a,b).
“Augmenting” the Semantic Variability. The simplest method for increasing semantic variability is to
share data acquired in parallel from different robotic
systems. Indeed, a similar strategy has been used to
learn hand-eye coordination in a robotic setting, by
training networks using data acquired in parallel by
several robots (Levine et al 2016). Similarly, the Million Object Challenge (Oberlin et al 2015) aims to acquire a large dataset of object models by sharing data
acquired from different laboratories owning a Baxter
robot8 . Along a similar direction we plan to extend
iCubWorld with the help of the community of the iCub
robot (at the time of writing more than 30 research
groups in the world). Beyond expanding the dataset in
8
http://www.rethinkrobotics.com/
Are we Done with Object Recognition? The iCub robot’s Perspective.
the direction of semantic variability, this would also allow to collect multiple acquisitions of the same object
in different conditions, in order to extend the analysis
presented in this work to nuisances like changes in the
light and setting. Indeed, this is another critical aspect
that we started to consider in the supplementary material of this work.
An alternative, or complementary approach is data
augmentation. This method is often adopted in image
retrieval settings to increase the viewpoint (and also illumination) variability during training by applying synthetic transformations to each image in the dataset
(e.g. by rotating, flipping, cropping or changing the hue
value). Visual augmentation to cope for semantic variability is a much more challenging problem, although
recent work on inverse graphics (Mansinghka et al 2013;
Kulkarni et al 2014, 2015) is a starting point in this direction.
Exploiting Contextual Information. Most work in
visual recognition considers frames independently and
rarely uses contextual information. A robot is typically
exposed to a continuous stream of visual information,
in which information is highly correlated. Exploiting
these correlations can be done in many ways ranging
from trivial solutions (like temporal averaging of the
classification results) to more complex ones that rely
on scene reconstruction and object tracking (Song et al
2015)).
Integrating 3D Information. In robotics, the problem of integrating 3D informationwith RGB has been
recently investigated within a Deep Learning framework (Schwarz et al 2015; Redmon and Angelova 2015b).
These results, although very promising, leverage only
on off-the-shelf representations learned on large-scaled
datasets of RGB-only images. In the future, the challenge will be to determine how to best encode and process 3D information within a CNN but also to acquire
large-scale datasets for directly training such RGBDbased systems.
Self-supervised learning. One way to reduce the cost
of supervision is to implement explorative strategies in
which the robot autonomously interacts with the environment to collect training samples. Training instances
in this scenario could be extracted autonomously by
detecting invariances in the data which correspond to
physical entities (e.g. coherent motion pattern (Wang
and Gupta 2015) or bottom-up salency cues). Strategies specific to the robotic domain could be devised by
integrating multiple sensory modalities (Sinapov et al
2014b; Higy et al 2016) and a repertoire of explorative
17
actions designed specifically to extract these cues (like
grasping or pushing objects (Montesano et al 2008; Fitzpatrick et al 2003; Hgman et al 2016; Pinto et al 2016)).
7 Conclusions
In this paper we have described a systematic study
on the benefits of deep learning methods to robot vision. For our tests we have devised a prototypical vision task for a humanoid robot in which human-robot
interaction is exploited to obtain realistic supervision
and train an object recognition system. We presented
the iCWT dataset and an in-depth investigation of the
performance of state-of-the-art deep learning methods
applied to our task. Our results confirm deep learning is a remarkable step forward. However, there is still
a lot that needs to be done to reach the level of robustness and reliability required by real applications.
We identified specific challenges and possible directions
of research to bridge this gap. We are confident that
the next few years will be rich of exciting progress in
robotics.
Acknowledgements The work described in this paper is
supported by the Center for Brains, Minds and Machines
(CBMM), funded by NSF STC award CCF-1231216; and by
FIRB project RBFR12M3AC, funded by the Italian Ministry of Education, University and Research. We gratefully
acknowledge NVIDIA Corporation for the donation of the
Tesla k40 GPU used for this research.
References
Agrawal P, Girshick R, Malik J (2014) Analyzing the performance of multilayer neural networks for object recognition. In: Proceedings of the European Conference on
Computer Vision (ECCV)
Anselmi F, Leibo JZ, Rosasco L, Mutch J, Tacchetti A, Poggio T (2015) Unsupervised learning of invariant representations. Theoretical Computer Science DOI 10.1016/
j.tcs.2015.06.048, URL http://www.sciencedirect.com/
science/article/pii/S0304397515005587
Anselmi F, Rosasco L, Poggio T (2016) On invariance and selectivity in representation learning. Information and Inference 5(2):134–158, URL http:
//imaiai.oxfordjournals.org/content/5/2/134.full.
pdf+html?sid=932cd117-4307-409b-9fc0-3acd9be20af0
Argyriou A, Evgeniou T, Pontil M (2008) Convex multi-task
feature learning. Machine Learning 73
Azizpour H, Razavian AS, Sullivan J, Maki A, Carlsson S (2015) From generic to specific deep representations for visual recognition. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp 36–45, DOI 10.1109/CVPRW.2015.
7301270
Babenko A, Slesarev A, Chigorin A, Lempitsky V (2014)
Neural Codes for Image Retrieval, Springer International Publishing, Cham, pp 584–599. DOI 10.
18
1007/978-3-319-10590-1 38, URL http://dx.doi.org/
10.1007/978-3-319-10590-1_38
Baishya S, Bäuml B (2016) Robust material classification
with a tactile skin using deep learning. In: IEEE International Conference on Intelligent Robots and Systems
Bakry A, Elhoseiny M, El-Gaaly T, Elgammal A (2015) Digging Deep into the Layers of CNNs: In Search of How
CNNs Achieve View Invariance. arXiv preprint pp 1–20,
URL http://arxiv.org/abs/1508.01983, 1508.01983
Bishop CM (2006) Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag
New York, Inc., Secaucus, NJ, USA
Borji A, Izadi S, Itti L (2016) ilab-20m: A large-scale controlled object dataset to investigate deep learning. In:
The IEEE Conference on Computer Vision and Pattern
Recognition (CVPR)
Bottou L (2012) Stochastic Gradient Tricks, vol
7700, Springer, p 430445. URL https://www.
microsoft.com/en-us/research/publication/
stochastic-gradient-tricks/
Chatfield K, Simonyan K, Vedaldi A, Zisserman A (2014)
Return of the devil in the details: Delving deep into convolutional nets. In: British Machine Vision Conference,
1405.3531
Chitta S, Sturm J, Piccoli M, Burgard W (2011) Tactile
Sensing for Mobile Manipulation. IEEE Transactions on
Robotics 27(3):558–568, DOI 10.1109/TRO.2011.2134130
Ciliberto C, Pattacini U, Natale L, Nori F, Metta G (2011)
Reexamining lucas-kanade method for real-time independent motion detection: Application to the icub humanoid
robot. In: 2011 IEEE/RSJ International Conference on
Intelligent Robots and Systems, IEEE, pp 4154–4160
Ciliberto C, Fanello SR, Natale L, Metta G (2012) A heteroscedastic approach to independent motion detection
for actuated visual sensors. In: 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems,
IEEE, pp 3907–3913
Ciliberto C, Fanello SR, Santoro M, Natale L, Metta G,
Rosasco L (2013) On the impact of learning hierarchical representations for visual recognition in robotics. In:
2013 IEEE/RSJ International Conference on Intelligent
Robots and Systems, pp 3759–3764, DOI 10.1109/IROS.
2013.6696893
Ciliberto C, Mroueh Y, Poggio T, Rosasco L (2015a) Convex
learning of multiple tasks and their structure. In: International Conference on Machine Learning
Ciliberto C, Rosasco L, Villa S (2015b) Learning multiple visual tasks while discovering their structure. In: Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, pp 131–139
Collet A, Berenson D, Srinivasa SS, Ferguson D (2009) Object
recognition and full pose registration from a single image
for robotic manipulation. In: Robotics and Automation,
2009. ICRA’09. IEEE International Conference on, IEEE,
pp 48–55
Collet A, Martinez M, Srinivasa SS (2011a) The moped
framework: Object recognition and pose estimation for
manipulation. The International Journal of Robotics Research p 0278364911401765
Collet A, Srinivasay SS, Hebert M (2011b) Structure discovery in multi-modal data: a region-based approach. In:
Robotics and Automation (ICRA), 2011 IEEE International Conference on, IEEE, pp 5695–5702
Crammer K, Singer Y (2000) On the learnability and design of
output codes for multiclass problems. In: In Proceedings
of the Thirteenth Annual Conference on Computational
Giulia Pasquale et al.
Learning Theory, pp 35–46
Crowley E, Zisserman A (2014) The state of the art: Object retrieval in paintings using discriminative regions. In:
BMVC
Dahiya RS, Metta G, Valle M, Sandini G (2010) Tactile Sensing - From Humans to Humanoids. IEEE Transactions on
Robotics 26(1):1–20, DOI 10.1109/TRO.2009.2033627
Dansereau DG, Singh SP, Leitner J (2016) Interactive computational imaging for deformable object analysis. In: 2016
International Conference on Robotics and Automation
(ICRA), IEEE
Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009)
ImageNet: A Large-Scale Hierarchical Image Database.
In: CVPR09
Dinuzzo F, Ong CS, Gehler P, Pillonetto G (2011) Learning output kernels with block coordinate descent. International Conference on Machine Learning
Donahue J, Jia Y, Vinyals O, Hoffman J, Zhang N, Tzeng E,
Darrell T (2014) Decaf: A deep convolutional activation
feature for generic visual recognition. In: Jebara T, Xing
EP (eds) Proceedings of the 31st International Conference
on Machine Learning (ICML-14), JMLR Workshop and
Conference Proceedings, pp 647–655, URL http://jmlr.
org/proceedings/papers/v32/donahue14.pdf
Eitel A, Springenberg JT, Spinello L, Riedmiller M, Burgard W (2015) Multimodal deep learning for robust rgbd object recognition. In: Intelligent Robots and Systems
(IROS), 2015 IEEE/RSJ International Conference on, pp
681–687, DOI 10.1109/IROS.2015.7353446
Everingham M, Van Gool L, Williams CKI, Winn J, Zisserman A (2010) The pascal visual object classes (voc)
challenge. International Journal of Computer Vision
88(2):303–338, DOI 10.1007/s11263-009-0275-4, URL
http://dx.doi.org/10.1007/s11263-009-0275-4
Everingham M, Eslami SMA, Van Gool L, Williams CKI,
Winn J, Zisserman A (2015) The pascal visual object
classes challenge: A retrospective. International Journal
of Computer Vision 111(1):98–136
Evgeniou T, Micchelli CA, Pontil M (2005) Learning multiple tasks with kernel methods. In: Journal of Machine
Learning Research, pp 615–637
Fanello SR, Ciliberto C, Natale L, Metta G (2013a) Weakly
supervised strategies for natural object recognition in
robotics. IEEE International Conference on Robotics
and Automation pp 4223–4229, DOI 10.1109/ICRA.2013.
6631174
Fanello SR, Ciliberto C, Santoro M, Natale L, Metta G,
Rosasco L, Odone F (2013b) iCub World: Friendly Robots
Help Building Good Vision Data-Sets. In: 2013 IEEE
Conference on Computer Vision and Pattern Recognition
Workshops, pp 700–705, DOI 10.1109/CVPRW.2013.106
Fergus R, Bernal H, Weiss Y, Torralba A (2010) Semantic
label sharing for learning with many categories. European
Conference on Computer Vision
Fitzpatrick P, Metta G, Natale L, Rao S, Sandini G (2003)
Learning About Objects Through Action – Initial Steps
Towards Artificial Cognition. vol 3, pp 3140–3145, DOI
10.1109/ROBOT.2003.1242036
Fitzpatrick P, Needham A, Natale L, Metta G (2008) Shared
challenges in object perception for robots and infants. Infant and Child Development 17(1):7–24
Geusebroek JM, Burghouts GJ, Smeulders AW (2005) The
amsterdam library of object images. International Journal of Computer Vision 61(1):103–112, DOI 10.1023/B:
VISI.0000042993.50813.60, URL http://dx.doi.org/10.
1023/B:VISI.0000042993.50813.60
Are we Done with Object Recognition? The iCub robot’s Perspective.
Goehring D, Hoffman J, Rodner E, Saenko K, Darrell T
(2014) Interactive adaptation of real-time object detectors. In: Proceedings - IEEE International Conference on
Robotics and Automation, IEEE, pp 1282–1289, DOI
10.1109/ICRA.2014.6907018
Goodfellow I, Lee H, Le QV, Saxe A, Ng AY (2009)
Measuring invariances in deep networks. In: Bengio Y, Schuurmans D, Lafferty JD, Williams CKI,
Culotta A (eds) Advances in Neural Information
Processing Systems 22, Curran Associates, Inc.,
pp 646–654, URL http://papers.nips.cc/paper/
3790-measuring-invariances-in-deep-networks.pdf
Goodfellow I, Bengio Y, Courville A (2016) Deep learning,
URL http://www.deeplearningbook.org, book in preparation for MIT Press
Gordo A, Almazán J, Revaud J, Larlus D (2016) Deep Image Retrieval: Learning Global Representations for Image Search, Springer International Publishing, Cham, pp
241–257. DOI 10.1007/978-3-319-46466-4 15, URL http:
//dx.doi.org/10.1007/978-3-319-46466-4_15
Gorges N, Navarro SE, Gger D, Wrn H (2010) Haptic object
recognition using passive joints and haptic key features.
In: 2010 IEEE International Conference on Robotics and
Automation, pp 2349–2355, DOI 10.1109/ROBOT.2010.
5509553
Griffin G, Holub A, Perona P (2007) Caltech-256 object
category dataset. Tech. Rep. 7694, California Institute
of Technology, URL http://authors.library.caltech.
edu/7694
He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: Surpassing human-level performance on imagenet
classification. In: The IEEE International Conference on
Computer Vision (ICCV)
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning
for image recognition. In: Computer Vision and Pattern
Recognition (CVPR), 2016 IEEE Conference on
Held D, Thrun S, Savarese S (2016) Robust single-view instance recognition. In: 2016 IEEE International Conference on Robotics and Automation (ICRA), pp 2152–2159,
DOI 10.1109/ICRA.2016.7487365
Herranz L, Jiang S, Li X (2016) Scene Recognition With
CNNs: Objects, Scales and Dataset Bias. In: Conference
on Computer Vision and Pattern Recognition, pp 571–
579, DOI 10.1109/CVPR.2016.68
Higy B, Ciliberto C, Rosasco L, Natale L (2016) Combining
sensory modalities and exploratory procedures to improve
haptic object recognition in robotics. In: IEEE-RAS International Conference on Humanoid Robots
Hinton GE, Srivastava N, Krizhevsky A, Sutskever I,
Salakhutdinov RR (2012) Improving neural networks by
preventing co-adaptation of feature detectors. ArXiv eprints 1207.0580
Hoffman J, Tzeng E, Donahue J, Jia Y, Saenko K, Darrell T
(2013) One-Shot Adaptation of Supervised Deep Convolutional Models. ArXiv e-prints 1312.6204
Hosoda K, Iwase T (2010) Robust haptic recognition by
anthropomorphic bionic hand through dynamic interaction. In: Intelligent Robots and Systems (IROS), 2010
IEEE/RSJ International Conference on, IEEE, pp 1236–
1241
Huh M, Agrawal P, Efros AA (2016) What makes ImageNet
good for transfer learning? ArXiv e-prints 1608.08614
Hgman V, Bjrkman M, Maki A, Kragic D (2016) A Sensorimotor Learning Framework for Object Categorization.
IEEE Transactions on Cognitive and Developmental Systems 8(1):15–25, DOI 10.1109/TAMD.2015.2463728
19
Ioffe S, Szegedy C (2015) Batch normalization: Accelerating deep network training by reducing internal covariate shift. vol 37, pp 448–456, URL http://www.jmlr.org/
proceedings/papers/v37/ioffe15
Jacob L, Bach F, Vert JP (2008) Clustered multi-task learning: a convex formulation. Advances in Neural Information Processing Systems
Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick
R, Guadarrama S, Darrell T (2014) Caffe: Convolutional
architecture for fast feature embedding. In: Proceedings
of the ACM International Conference on Multimedia MM ’14, ACM Press, pp 675–678, DOI 10.1145/2647868.
2654889
Joachims T, Hofmann T, Yue Y, Yu CN (2009) Predicting
structured objects with support vector machines. Commun ACM 52(11):97–104, DOI 10.1145/1592761.1592783,
URL http://doi.acm.org/10.1145/1592761.1592783
Kasper A, Xue Z, Dillmann R (2012) The kit object
models database: An object model database for object recognition, localization and manipulation in service
robotics. The International Journal of Robotics Research
31(8):927–934
Kemp CC, Edsinger A, Torres-Jara E (2007) Challenges for
robot manipulation in human environments [grand challenges of robotics]. IEEE Robotics Automation Magazine
14(1):20–29, DOI 10.1109/MRA.2007.339604
Khosla A, Zhou T, Malisiewicz T, Efros AA, Torralba
A (2012) Undoing the Damage of Dataset Bias,
Springer Berlin Heidelberg, Berlin, Heidelberg, pp 158–
171. DOI 10.1007/978-3-642-33718-5 12, URL http://
dx.doi.org/10.1007/978-3-642-33718-5_12
Kingma D, Ba J (2015) Adam: A Method for Stochastic Optimization. In: 3rd International Conference for Learning
Representations (ICLR)
Krizhevsky A, Sutskever I, Hinton G (2012a) Imagenet classification with deep convolutional neural networks. In:
Advances in Neural Information Processing Systems, pp
1097–1105
Krizhevsky A, Sutskever I, Hinton GE (2012b) Imagenet classification with deep convolutional neural
networks. In: Pereira F, Burges CJC, Bottou L,
Weinberger KQ (eds) Advances in Neural Information Processing Systems 25, Curran Associates, Inc.,
pp 1097–1105, URL http://papers.nips.cc/paper/
4824-imagenet-classification-with-deep-convolutional-neural-net
pdf
Kulkarni TD, Mansinghka VK, Kohli P, Tenenbaum JB
(2014) Inverse graphics with probabilistic cad models.
arXiv preprint arXiv:14071339
Kulkarni TD, Whitney WF, Kohli P, Tenenbaum J (2015)
Deep convolutional inverse graphics network. In: Advances in Neural Information Processing Systems, pp
2539–2547
Lai K, Bo L, Ren X, Fox D (2011) A large-scale hierarchical multi-view RGB-D object dataset. In: 2011 IEEE
International Conference on Robotics and Automation,
IEEE, pp 1817–1824, DOI 10.1109/ICRA.2011.5980382,
URL
http://ieeexplore.ieee.org/articleDetails.
jsp?arnumber=5980382
LeCun Y, Boser B, Denker JS, Henderson D, Howard RE,
Hubbard W, Jackel LD (1989) Backpropagation applied
to handwritten zip code recognition. Neural computation
1(4):541–551
LeCun Y, Huang FJ, Bottou L (2004) Learning methods for
generic object recognition with invariance to pose and
lighting. In: Computer Vision and Pattern Recognition,
20
2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on, vol 2, pp II–97–104 Vol.2,
DOI 10.1109/CVPR.2004.1315150
Leitner J, Förster A, Schmidhuber J (2014) Improving robot
vision models for object detection through interaction. In:
2014 International Joint Conference on Neural Networks
(IJCNN), IEEE, pp 3355–3362
Leitner J, Dansereau DG, Shirazi S, Corke P (2015) The
need for more dynamic and active datasets. In: CVPR
Workshop on The Future of Datasets in Computer Vision, IEEE
Levine S, Pastor P, Krizhevsky A, Quillen D (2016)
Learning Hand-Eye Coordination for Robotic Grasping
with Deep Learning and Large-Scale Data Collection.
arXiv:160302199 [cs] URL http://arxiv.org/abs/1603.
02199, arXiv: 1603.02199
Lowe DG (2004) Distinctive image features from
scale-invariant
keypoints.
International
Journal of Computer Vision 60(2):91–110, DOI
10.1023/B:VISI.0000029664.99615.94,
URL
http:
//dx.doi.org/10.1023/B:VISI.0000029664.99615.94
Lozano A, Sindhwani V (2011) Block variable selection in
multivariate regression and high-dimensional causal inference. Advances in Neural Information Processing Systems
Mansinghka V, Kulkarni TD, Perov YN, Tenenbaum J (2013)
Approximate bayesian image interpretation using generative probabilistic graphics programs. In: Advances in Neural Information Processing Systems, pp 1520–1528
Meger D, Little JJ (2013) The UBC Visual Robot Survey: A Benchmark for Robot Category Recognition,
Springer International Publishing, Heidelberg, pp 979–
991. DOI 10.1007/978-3-319-00065-7 65, URL http://
dx.doi.org/10.1007/978-3-319-00065-7_65
Metta G, Sandini G, Natale L, Craighero L, Fadiga L (2006)
Understanding mirror neurons: a bio-robotic approach.
Interaction studies 7(2):197–232
Metta G, Natale L, Nori F, Sandini G, Vernon D, Fadiga L,
von Hofsten C, Rosander K, Lopes M, Santos-Victor J,
Bernardino A, Montesano L (2010) The icub humanoid
robot: an open-systems platform for research in cognitive development. Neural networks : the official journal of
the International Neural Network Society 23(8-9):1125–
34, DOI 10.1016/j.neunet.2010.08.010
Micchelli CA, Pontil M (2004) Kernels for multi-task learning.
Advances in Neural Information Processing Systems
Mikolajczyk K, Schmid C (2004) Scale & affine invariant
interest point detectors. International journal of computer vision 60(1):63–86, URL http://link.springer.
com/article/10.1023/B:VISI.0000027790.02288.f2
Minh HQ, Sindhwani V (2011) Vector-valued manifold regularization. International Conference on Machine Learning
Model I, Shamir L (2015) Comparison of Data Set Bias
in Object Recognition Benchmarks. IEEE Access
3:1953–1962, DOI 10.1109/ACCESS.2015.2491921, URL
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.
htm?arnumber=7299607
Moldovan B, Moreno P, van Otterlo M, Santos-Victor J,
De Raedt L (2012) Learning relational affordance models for robots in multi-object manipulation tasks. In:
Robotics and Automation (ICRA), 2012 IEEE International Conference on, IEEE, pp 4373–4378
Montesano L, Lopes M, Bernardino A, Santos-Victor J (2008)
Learning object affordances: From sensory–motor coordination to imitation. IEEE Transactions on Robotics
24(1):15–26
Giulia Pasquale et al.
Muja M, Rusu RB, Bradski G, Lowe DG (2011) Rein-a fast,
robust, scalable recognition infrastructure. In: Robotics
and Automation (ICRA), 2011 IEEE International Conference on, IEEE, pp 2939–2946
Natale L, Metta G, Sandini G (2004) Learning
haptic
representation
of
objects.
URL
http:
//www.lira.dist.unige.it/projects/mirror/docs/
thirdyear/papers/img04.pdf
Nene SA, Nayar SK, Murase H (1996) Columbia object image
library (coil-100. Tech. rep.
Nguyen A, Kanoulas D, Caldwell DG, Tsagarakis NG (2016)
Detecting Object Affordances with Convolutional Neural Networks. In: Intelligent Robots and Systems (IROS),
2016 IEEE/RJS International Conference on (to appear)
Oberlin J, Meier M, Kraska T, Tellex S (2015) Acquiring Object Experiences at Scale. In: AAAI-RSS Special Workshop on the 50th Anniversary of Shakey: The Role of AI
to Harmonize Robots and Humans, blue Sky Award.
Oquab M, Bottou L, Laptev I, Sivic J (2014) Learning and
transferring mid-level image representations using convolutional neural networks. In: The IEEE Conference on
Computer Vision and Pattern Recognition (CVPR)
Pasquale G, Ciliberto C, Odone F, Rosasco L, Natale L (2015)
Teaching iCub to recognize objects using deep Convolutional Neural Networks. vol 43, pp 21–25, URL http:
//www.jmlr.org/proceedings/papers/v43/pasquale15
Pasquale G, Ciliberto C, Rosasco L, Natale L (2016a) Object Identification from Few Examples by Improving the
Invariance of a Deep Convolutional Neural Network. In:
Intelligent Robots and Systems (IROS), 2016 IEEE/RJS
International Conference on (to appear)
Pasquale G, Mar T, Ciliberto C, Rosasco LA, Natale
L (2016b) Enabling depth-driven visual attention on the icub humanoid robot: Instructions for
use and new perspectives. Frontiers in Robotics
and AI 3(35), DOI 10.3389/frobt.2016.00035, URL
http://www.frontiersin.org/humanoid_robotics/10.
3389/frobt.2016.00035/abstract
Philbin J, Chum O, Isard M, Sivic J, Zisserman A (2008) Lost
in quantization: Improving particular object retrieval in
large scale image databases. In: Computer Vision and
Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, IEEE, pp 1–8
Pinto L, Gupta A (2015) Supersizing self-supervision: Learning to grasp from 50k tries and 700 robot hours. arXiv
preprint arXiv:150906825 URL http://arxiv.org/abs/
1509.06825
Pinto L, Gupta A (2016) Supersizing self-supervision: Learning to grasp from 50k tries and 700 robot hours. In: 2016
IEEE International Conference on Robotics and Automation (ICRA), pp 3406–3413, DOI 10.1109/ICRA.2016.
7487517
Pinto L, Gandhi D, Han Y, Park YL, Gupta A (2016)
The Curious Robot: Learning Visual Representations via
Physical Interactions. arXiv:160401360 [cs] URL http:
//arxiv.org/abs/1604.01360, arXiv: 1604.01360
Pinto N, Cox DD, DiCarlo JJ (2008) Why is real-world
visual object recognition hard? PLoS computational biology 4(1):e27, DOI 10.1371/journal.pcbi.0040027, URL
http://journals.plos.org/ploscompbiol/article?id=
10.1371/journal.pcbi.0040027
Ramisa A, Aldavert D, Vasudevan S, Toledo R, Lopez de
Mantaras R (2011) The iiia30 mobile robot object recognition dataset. In: Robotica 2011
Redmon J, Angelova A (2014) Real-Time Grasp Detection
Using Convolutional Neural Networks. arXiv:14123128
Are we Done with Object Recognition? The iCub robot’s Perspective.
[cs] URL http://arxiv.org/abs/1412.3128, arXiv:
1412.3128
Redmon J, Angelova A (2015a) Real-time grasp detection using convolutional neural networks. In: 2015 IEEE International Conference on Robotics and Automation (ICRA),
pp 1316–1322, DOI 10.1109/ICRA.2015.7139361
Redmon J, Angelova A (2015b) Real-time grasp detection
using convolutional neural networks. In: IEEE International Conference on Robotics and Automation, IEEE,
pp 1316–1322, URL http://ieeexplore.ieee.org/xpls/
abs_all.jsp?arnumber=7139361
Rennie C, Shome R, Bekris KE, Ferreira De Souza A
(2016) A dataset for improved rgbd-based object detection and pose estimation for warehouse pick-and-place.
IEEE Robotics and Automation Letters (RA-L) [Also accepted to appear at the 2016 IEEE International Conference on Robotics and Automation (ICRA)] 1:1179
– 1185, URL http://www.cs.rutgers.edu/~kb572/pubs/
icra16_pose_estimation.pdf
Rivera-Rubio J, Idrees S, Alexiou I, Hadjilucas L, Bharath
AA (2014) Small hand-held object recognition test
(SHORT). In: 2014 IEEE Winter Conference on Applications of Computer Vision (WACV), pp 524–531, DOI
10.1109/WACV.2014.6836057
Rodner E, Hoffman J, Donahue J, Darrell T, Saenko K
(2013) Towards Adapting ImageNet to Reality: Scalable
Domain Adaptation with Implicit Low-rank Transformations. ArXiv e-prints 1308.4200
Rudi A, Camoriano R, Rosasco L (2015) Less is more: Nystrom computational regularization. In: Advances in Neural Information Processing Systems, pp 1648–1656
Rudi A, Camoriano R, Rosasco L (2016) Generalization properties of learning with random features. arXiv preprint
arXiv:160204474
Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma
S, Huang Z, Karpathy A, Khosla A, Bernstein M, Berg
AC, Fei-Fei L (2015) Imagenet large scale visual recognition challenge. International Journal of Computer Vision
115(3):211–252, DOI 10.1007/s11263-015-0816-y, URL
http://dx.doi.org/10.1007/s11263-015-0816-y
Schwarz M, Schulz H, Behnke S (2015) Rgb-d object recognition and pose estimation based on pre-trained convolutional neural network features. In: 2015 IEEE International Conference on Robotics and Automation (ICRA),
pp 1329–1335, DOI 10.1109/ICRA.2015.7139363
Simonyan K, Zisserman A (2015) Very deep convolutional
networks for large-scale image recognition. In: International Conference on Learning Representations
Sinapov J, Schenck C, Staley K, Sukhoy V, Stoytchev A
(2014a) Grounding semantic categories in behavioral
interactions: Experiments with 100 objects. Robotics
and Autonomous Systems 62(5):632–645, DOI 10.1016/
j.robot.2012.10.007, URL http://linkinghub.elsevier.
com/retrieve/pii/S092188901200190X
Sinapov J, Schenck C, Stoytchev A (2014b) Learning relational object categories using behavioral exploration and
multimodal perception. In: IEEE International Conference on Robotics and Automation, IEEE, pp 5691–5698,
URL http://ieeexplore.ieee.org/xpls/abs_all.jsp?
arnumber=6907696
Sindhwani V, Lozano AC, Minh HQ (2012) Scalable matrixvalued kernel learning and high-dimensional nonlinear
causal inference. CoRR abs/1210.4792
Singh A, Sha J, Narayan KS, Achim T, Abbeel P (2014) Bigbird: A large-scale 3d database of object instances. In:
2014 IEEE International Conference on Robotics and Au-
21
tomation (ICRA), pp 509–516, DOI 10.1109/ICRA.2014.
6906903
Song S, Zhang L, Xiao J (2015) Robot In a Room: Toward Perfect Object Recognition in Closed Environments.
arXiv:150702703 [cs] URL http://arxiv.org/abs/1507.
02703, arXiv: 1507.02703
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: A simple way to prevent neural
networks from overfitting. Journal of Machine Learning
Research 15:1929–1958, URL http://jmlr.org/papers/
v15/srivastava14a.html
Stamos D, Martelli S, Nabi M, McDonald A, Murino V, Pontil M (2015) Learning with dataset bias in latent subcategory models. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, vol 07-12-June, pp 3650–3658, DOI 10.1109/
CVPR.2015.7298988, URL http://ieeexplore.ieee.
org/lpdocs/epic03/wrapper.htm?arnumber=7298988
Sünderhauf N, Shirazi S, Dayoub F, Upcroft B, Milford M
(2015) On the performance of convnet features for place
recognition. In: Intelligent Robots and Systems (IROS),
2015 IEEE/RSJ International Conference on, pp 4297–
4304, DOI 10.1109/IROS.2015.7353986
Sünderhauf N, Dayoub F, McMahon S, Talbot B, Schulz R,
Corke P, Wyeth G, Upcroft B, Milford M (2016) Place
categorization and semantic mapping on a mobile robot.
In: 2016 IEEE International Conference on Robotics and
Automation (ICRA), pp 5729–5736, DOI 10.1109/ICRA.
2016.7487796
Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov
D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going
deeper with convolutions. In: The IEEE Conference on
Computer Vision and Pattern Recognition (CVPR)
Tommasi T, Patricia N, Caputo B, Tuytelaars T (2015) A
deeper look at dataset bias. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Springer International Publishing, vol 9358, pp 504–516,
DOI 10.1007/978-3-319-24947-6 42
Torralba A, Efros AA (2011) Unbiased look at dataset bias.
In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp
1521–1528, DOI 10.1109/CVPR.2011.5995347
Wang X, Gupta A (2015) Unsupervised Learning of Visual
Representations using Videos. arXiv:150500687 [cs] URL
http://arxiv.org/abs/1505.00687, arXiv: 1505.00687
Xiang Y, Mottaghi R, Savarese S (2014) Beyond pascal: A
benchmark for 3d object detection in the wild. In: IEEE
Winter Conference on Applications of Computer Vision,
pp 75–82, DOI 10.1109/WACV.2014.6836101
Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Advances
in Neural Information Processing Systems, pp 3320–3328
Zeiler MD, Fergus R (2014) Visualizing and Understanding
Convolutional
Networks,
Springer
International
Publishing,
Cham,
pp
818–833.
URL
http:
DOI
10.1007/978-3-319-10590-1 53,
//dx.doi.org/10.1007/978-3-319-10590-1_53
22
Giulia Pasquale et al.
Are we Done with Object Recognition? The iCub robot’s Perspective. Supplementary Material
Giulia Pasquale, Carlo Ciliberto, Francesca Odone, Lorenzo Rosasco and Lorenzo Natale
A iCubWorld Transformations
Fig. 13 reports one image for each object instance in the
iCWT dataset. We report also the reference number of the
associated synset in ImageNet (Russakovsky et al 2015). Note
that not all categories in iCWT are part of the ILSVRC, but
they belong (or at least are similar) to synsets in the larger
ImageNet dataset (Deng et al 2009).
Table 4 Preprocessing operations executed on images before
feeding the networks.
Mean
Subtraction
Scaling
Crop
Extraction
CaffeNet
ResNet-50
image
mean image size
(256 × 256)
2 × 2 grid + center
mirrored
GoogLeNet
pixel
256 × 256
2 × 2 grid + center
mirrored
VGG-16
pixel
shorter side to
256, 384, 512
Model
B Off-the-shelf CNNs
In Sec. 4.1 we observed that direct application of off-the-shelf
CNNs to iCubWorld leads to poor performance. In this section we provide some additional details on the experiment
that we reported in Fig. 5.
B.1 Image Preprocessing
When applying deep CNNs to our setting, we first evaluated
the impact of considering coarser or finer regions around the
object in the images. Indeed, each image in iCWT is annotated with the coordinates of the object’s centroid and with
a bounding box provided by segmentation of the depth map
(see Sec. 2.1). We took advantage of this rough localization
in order to avoid considering full images for classification and
we compared different strategies to extract a crop from the
images. Specifically, we tried either to extract a square crop
of fixed radius, just by using the information on the centroid,
or to use the bounding box provided by the routine segmenting the depth map (i.e., the smallest rectangle enclosing the
object’s blob). In both cases we tried two sizes: using a radius
of 256 or 384 for the square crop, and leaving a margin of 30
or 60 pixels around the depth’s bounding box.
Then, since deep CNNs require a fixed sized input (227 ×
227 for CaffeNet and 224 × 224 for the other considered models), different preprocessing strategies can be applied in order
to feed an image to a network. We reproduced the operations that are specified at the reference page of each particular Caffe model. For convenience we report them in Tab. 4.
These, in general, consist in the subtraction of the mean image (or the mean pixel value) of the dataset on which the
model has been trained and in the extraction of a grid of crops
(eventually at multiple scales as for VGG-16) of the required
size. Usually, the final prediction is computed by aggregating
the predictions of more crops to gain robustness. However,
since in our case the image is in fact already a crop around
the object, we compared the advantage of this grid approach
against just considering the central crop (and a single scale
in the case of VGG-16).
Fig. 14 reports the results of Sec. 4.1, Fig. 5, but obtained
by testing off-the-shelf CNNs on iCWT with the different described strategies. It can be noticed that performing a finer
5 × 5 grid
at each scale
mirrored
localization of the object in the image (Blue and Green) provides better performance for all architectures. Also, considering more than the central crop provides a little advantage (for
VGG-16 this is even detrimental). This is reasonable because
we already localized the object and we are in fact considering
a portion of the image.
We finally chose to apply CNNs by extracting a square
region of 256 × 256 from iCWT images, and then considering
only the central crop (Light Green in Fig. 14). Hence, we
did not need to scale the image (for VGG-16 we considered
a single scale). This is the same performance reported, for
instance, in Fig. 5 (Dark Blue) and the strategy used in all
experiments. We chose to extract fixed-size regions, instead of
relying on the bounding box of the depth map, since we aimed
at evaluating, in the following of our analysis, also invariance
properties to geometric transformations (as, e.g, scaling). We
precise that when applying the networks to ImageNet instead,
we used the multi-crop strategy suggested for each of the
architectures (see Tab. 4).
B.2 1000-class Categorization Results
In Fig. 5 we reported the accuracy of the off-the-shelf CNNs
applied on iCWT and ImageNet. However, since the task was
reduced to a 11-class categorization setting, we considered
the prediction of the networks limited to the 11 corresponding labels rather than the full vector of 1000 scores normally
produced by a CNN trained on the ILSVRC. For completeness, in Fig. 15 we report the resulting accuracy of the same
CNNs but taking as prediction the class achieving maximum
score over all available 1000, even if not present in the considered test sets (the one of iCWT and the reduced ImageNet).
As can be noticed, performance drops even below chance on
iCWT (since now the “real” chance is 1/1000 rather 1/11).
B.3 Viewpoint Biases
In this section we follow-up the preliminary analysis reported
in Sec. 4.1 discussing the potential biases in ImageNet, pre-
Are we Done with Object Recognition? The iCub robot’s Perspective.
soda bottle
n03983396
cellphone
n02992529
mouse
n03793489
coffee mug
n03063599
pencil case
n03908618
perfume
n03916031
remote
n04074963
ring binder
n02840245
soap dispenser
n04254120
sunglasses
n04356056
wallet
n04548362
oven glove
n02885462
squeezer
n04293119
sprayer
n02754103
body lotion
n02862916
book
n02870526
flower
n11669921
glass
n03438257
hairbrush
n03475581
hair clip
n03476684
Fig. 13 Example images for the 200 objects in iCubWorld Transformations.
23
24
Giulia Pasquale et al.
100
90
80
accuracy (%)
70
60
bb disp 30 - multi crop
bb disp 30
bb disp 60 - multi crop
bb disp 60
256 x 256 - multi crop
256 x 256
384 x 384 - multi crop
384 x 384
50
40
30
20
10
0
CaffeNet
GoogLeNet
VGG-16
ResNet-50
Fig. 14 Average classification accuracy of off-the-shelf networks tested on iCWT segmenting the object according to
different strategies.
100
90
iCWT off the shelf
ImageNet
80
accuracy (%)
70
the 10 object instances of that category as rows of a matrix (the temporal dimension, or frame index, is reported in
the horizontal axis). In each row, the frame-by-frame predictions over the sequence are represented as vertical bars:
W hite if the prediction is correct, Red if it is wrong (and
Black if the sequence is terminated). It can be noted that,
since during the acquisition the operator was moving the object back and forth in front of the robot, starting close and
slowly moving backward (eventually re-approaching the robot
in some sequences), the CNN manages to recognize the object
only when this appears at a relatively large scale (white bars
mostly concentrated in the first half of rows). This qualitative
observation confirms recent studies (Herranz et al 2016) that
specifically highlight the problem of the scale bias in CNNs,
preventing models trained on object-centric datasets as ImageNet to generalize to scene-centric settings, where objects
mostly appear in a small part of the image (like in the second
part of our sequences).
In Fig. 17 we report the same for sequences containing 2D
Rotation. In this case, the operator was rotating the object
(always maintaining the same face visible to the robot) at a
constant speed. Indeed, it can be noticed that on many sequences there are periodic time intervals when the CNN does
(or does not) recognize the object, corresponding to configurations in which that category appears more or less frequently
in the ImageNet dataset. For example, we observed that soap
dispensers and mugs in ImageNet are mostly placed on tables, and consequently are never recognized when they are,
e.g. upside-down.
60
50
C Model (Pre) Selection
40
30
In this section we provide details regarding the parameter
selection of the learning methods adopted in this work and
described in Sec. 3.2.
20
10
0
CaffeNet
GoogLeNet
VGG-16
ResNet-50
Fig. 15 Average classification accuracy of off-the-shelf networks (trained on ILSVRC) tested on iCWT (Dark Blue) or
on ImageNet itself (Gray). The test sets for the two datasets
are restricted to the 11 shared categories (see Sec. 2).
C.1 Feature Extraction and RLSC
Here we specify the design choices that we made to implement
each of the steps described in Sec. 3.2.1.
When feeding images to the networks in order to extract
their representation, we applied the preprocessing pipeline
that was explained and motivated in Sec. B.1. For each archiventing off-the-shelf models to generalize well when tested on
tecture, the layers considered as output to extract such repreiCubWorld without applying knowledge transfer techniques.
sentations, were specified in Tab. 2. For CaffeNet and VGGTo this end, we report a series of excerpts showing the frame16 we indicated either fc6 or fc7 layers, since these networks
by-frame predictions of some of the CNNs considered when
have more than one FC layer that can provide 1-dimensional
tested on iCWT sequences. This qualitative analysis allows
output representations of the full image, the best choice deto better understand what frames of iCubWorld are actually
pending on the application. We then resorted to (Rudi et al
“harder” to recognize for the CNNs and compare them with
2015) for the Nystrom subsampling approach that we used
prototypical examples in ImageNet.
to implement the Gaussian RLSC. This algorithm in fact inWe report here the predictions obtained by using GoogLeNet, volves determining some hyperparameters, the most critical
being the number m of training examples to subsample to
but we made similar observations for the other architectures.
approximate the kernel matrix.
As in Fig. 5, the prediction was computed as the maximum
score among those of 11 the classes present in test set, rather
In order to evaluate the best output layer for CaffeNet
than the full vector of 1000. We restricted the analysis to a
and VGG-16, and also to assign a reasonable value to m,
subset of the test set considered in Fig. 5: specifically, to the
we considered one small and one large categorization tasks
5 best recognized categories and two specific visual transforon iCWT, representative of the smallest and larger task that
mations: Scale and 2D Rotation.
we expected to run in our analysis, and compared the RLCS
accuracy on them when varying these factors.
In Fig. 16 we report frame-by-frame predictions on sequences containing the Scale transformation separately for
We fixed a 15-class categorization problem, training on 7
object instances per category and validating on 2. For each
each category. In each plot, we represent the sequences of
Are we Done with Object Recognition? The iCub robot’s Perspective.
cellphone
mouse
1
2
3
4
5
6
7
8
9
10
mug
1
2
3
4
5
6
7
8
9
10
50
25
remote
1
2
3
4
5
6
7
8
9
10
100 150
soap dispenser
1
2
3
4
5
6
7
8
9
10
50 100 150
1
2
3
4
5
6
7
8
9
10
50 100 150 200
50 100 150 200
50 100 150
Fig. 16 Frame-by-frame predictions of GoogLeNet on image sequences containing the Scale transformation, reported for 5
categories in different plots. The sequences of the 10 object instances belonging to each category are represented as matrix
rows (the temporal dimension, or frame index, is reported in the horizontal axis)). In each row, the frame-by-frame predictions
over the sequence are represented as vertical bars: W hite if the prediction is correct, Red if it is wrong (and Black if the
sequence is terminated).
cellphone
mouse
1
2
3
4
5
6
7
8
9
10
mug
1
2
3
4
5
6
7
8
9
10
50 100 150
remote
1
2
3
4
5
6
7
8
9
10
soap dispenser
1
2
3
4
5
6
7
8
9
10
50 100 150 200
1
2
3
4
5
6
7
8
9
10
50 100 150 200
50 100 150 200
50 100 150
Fig. 17 Same as Fig. 16, but on image sequences containing 2D Rotation.
CaffeNet
100
GoogLeNet
100
VGG-16
100
ResNet-50
100
CaffeNet
100
GoogLeNet
100
VGG-16
100
90
90
90
90
90
90
90
90
80
80
80
80
80
80
80
80
70
70
70
70
70
70
70
70
60
60
60
60
60
60
60
60
50
50
50
50
50
50
50
40
40
40
40
40
30
20
325
fc6 other
fc6 same
fc7 other
fc7 same
5852
m
30
20
15811 325
pool5 other
pool5 same
5852
m
30
20
15811 325
fc6 other
fc6 same
fc7 other
fc7 same
5852
m
accuracy (%)
accuracy (%)
100
40
30
20
15811 325
40
pool5 other
pool5 same
5852
15811
m
Fig. 18 Classification accuracy reported by training RLSC
over image representations extracted by the four considered
architectures. A “large” categorization experiment is performed (with ∼√ N = 95000 training examples) and m is
varied between N and 15000 (horizontal axis). Performance
on the same training day (Light colors) and on another one
(Dark colors) is reported.
instance, we considered the sequences of all 5 visual transformations and one camera. We considered only one day, among
30
20
50357
fc6 other
fc6 same
fc7 other
fc7 same
1319
m
30
20
2534 50357
pool5 other
pool5 same
1319
m
30
20
2534 50357
ResNet-50
50
fc6 other
fc6 same
fc7 other
fc7 same
1319
m
40
30
20
2534 50357
pool5 other
pool5 same
1319
2534
m
Fig. 19 Similar to Fig. 18 but on a “small” categorization
experiment
(∼ N = 2500 training examples), varying m be√
tween N and N .
the two available in iCWT, for training, and tested on the
instance left out from the training set, in both days. For the
large task, we considered all frames per sequence, leading to
∼ 6300 training examples per class, whereas for the small task
we subsampled ∼ 4 frames per sequence, leading to ∼ 170 examples per class (similarly to what we did in Sec. 4.2.1.
26
Fig. 19 and 18 reports the average accuracy respectively
for the small and large experiment. We performed the two
experiments using the representations from the four considered architectures (reported separately), using either fc6 layer
(Gray) or fc7 (Pink) for CaffeNet and VGG-16. In each case,
we increased logarithmically
the value of m (horizontal axis)
√
starting from N , N being the size of the training set. For
the small experiment we stopped at N , whereas for the large
experiment we stopped at values where we observed very little performance improvements with respect to much longer
training times. The performance on the same day on which
we trained is reported in Light (Gray/Pink), whereas the performance on the other day is reported in Dark colors.
We first observed that fc6 features consistently performed
better than fc7, hence we decided to use this layer when extracting representations from off-the-shelf CaffeNet or VGG16 on images of iCWT. Then, we also observed that relatively
small values of m could provide good accuracies and therefore
we chose to fixed m = min(15000, N ) in all experiments.
It is worth noting that we performed a similar empirical analysis to the one reported here in order to assess the
best output layer to use to extract visual representations from
the models of Sec. 5.2.1 and D.3 that were previously finetuned on subsets of iCWT. In that case, we observed that fc7
features were providing the best performance and therefore
we used this layer in our experiments in those sections. This
can be explained considering that “more specialized” features
can be extracted from models that have been adapted to our
setting, while “more general” features of off-the-shelf models
provide better generalization performance on iCWT.
C.2 Fine-tuning
In this section we provide details on how we performed the
fine-tuning procedure and on the choice of the two strategies,
adaptive and conservative, reported in Tab. 3.
C.2.1 General Protocol
The image preprocessing pipeline was similar to the one reported in Sec. B.1: once a square 256 × 256 region around
the object’s centroid was extracted, we either subtracted the
mean image (CaffeNet) or pixel (GoogLeNet) of the training
set.
When training, the rest of processing was performed within
Caffe, specifically extracting a random 227 × 227 crop (randomly mirrored horizontally) before passing it to the network. At test phase, the prediction over one image was taken
by extracting the central crop instead of a random one (see
Sec. B.1).
The training set was shuffled before starting the finetuning process since we observed that similarity of images
within a batch negatively affected convergence of the backpropagation algorithm. When fine-tuning a network, we evaluated the model’s performance on a validation set every epoch
and we finally chose the epoch achieving highest validation
accuracy.
We left the batch size to the values specified in Caffe
(and reported in Tab. 3). The number of iterations – or, equivalently, of epochs – was fixed empirically, observing that in
general the performance was saturating after 6 epochs for all
models but for conservative fine-tuning of CaffeNet, that involves the learning of all parameters of the 3 FC layers and
Giulia Pasquale et al.
therefore takes more time to converge. In this case, we fixed
the number of epochs to ∼ 36.
C.2.2 Hyperparameters Choice
In this section we report on the empirical analysis that we
performed in order to understand the effect and the relative
importance of the hyperparameters involved in fine-tuning
deep architectures as CaffeNet or GoogLeNet in our scenario.
While model selection is per se an open problem when
dealing with deep networks, in our setting this issue is even
more complicated by the fact that we do not have a fixed
reference task on which to optimize the training (as e.g.,
can be the ILSVRC), but we instead plan to span over wide
range of tasks, comprising small or large training sets. Indeed,
the study presented in this work aims at comparing models
trained on different categories, objects, transformations, and
so forth.
We considered therefore the same two experiments that
we used to perform parameter selection for the RLSC approach (the “small” and “large” categorization tasks described
in Sec. C.1) and we fine-tuned CaffeNet and GoogLeNet on
them by varying the values of multiple hyperparameters. In
the following, we report this analysis separately for the two
architectures.
CaffeNet. We considered the parameters appearing in Tab. 3
and varied the value of each of them in the following way:
Base LR: the starting learning rate of the layers that are initialized with the parameters of the off-the-shelf model.
We tried 10−3 , 5 ∗ 10−4 , 10−4 , 5 ∗ 10−5 , 10−5 , 10−6 , 0.
Learned FC Layers: which fully-connected (FC) layers are from
scratch and their specific starting LR. We tried to learn
(i) only f c8 with starting LR set to 10−2 , or (ii) including also f c7 and (iii) finally also f c6. As an empirical
rule, every time we included one more layer to learn from
scratch, we decreased the starting LR of these layers of a
factor of 10 (hence 10−3 in (ii) and 10−4 in (iii)).
Dropout %: percentage of dropout in FC layers. We tried
50% (default Caffe value) or 65%.
Solver: the algorithm used for the stochastic gradient descent. We used the SGD solver (Bottou 2012) in Caffe.
LR Decay Policy: the decay rate of the learning rates. We
tried either polynomial decay with exponent 0.5 or −3,
or step decay decreasing the LR of a factor of 10 every 2
epochs.
We tried all possible combinations of values. For the parameters that are missing here, we kept their value as specified
in Caffe reference models (see also the previous section).
We observed that the dropout percentage had a small
influence and left it to the default value. We also observed
that the polynomial decay with smaller slope was consistently
better (of ∼ 5 − 10% accuracy). The most critical parameters were instead the base LR and the numbers of FC layers
learned from scratch. In Fig. 20 we report as an example the
accuracy obtained respectively when learning only f c8 (Left)
or f c6, f c7 and f c8 (Right). In each case, we decreased the
base LR of all other layers from 10−3 to 0 (horizontal axis).
Performance is reported, as in Fig. 19 and 18, for both the
same day of training (Light Gray) and a different one (Dark
Gray). While we tried all values of base learning rate on the
“small” experiment (Continuous Line), for the “large” experiment we chose one small, medium and large value (Dots).
For interpreting the results, it can be useful to recall that
the strategy that learns from scratch the three FC layers
Are we Done with Object Recognition? The iCub robot’s Perspective.
fc6-7-8 with starting LR = 10 -4
Adam
100
80
80
80
80
60
60
60
60
40
20
40
small - same
small - other
large - same
large - other
0
1e-3 5e-4 1e-4 5e-5 1e-5 1e-6
base LR
accuracy (%)
100
100
accuracy (%)
fc8 with starting LR = 10 -2
27
20
0
40
20
0
1e-3 5e-4 1e-4 5e-5 1e-5 1e-6
0
base LR
Fig. 20 Classification accuracy provided by fine-tuning CaffeNet according to different strategies: either learning from
scratch only f c8 (Left) or f c6, f c7 and f c8 (Right). Performance is reported for both the same day of training (Light
Gray) and a different one (Dark Gray). We tried multiple values of base LR on a “small” training set (Continuous Line),
and only one small, medium and large value (Dots) on a
“large” one.
100
40
small - same
small - other
large - same
large - other
0
1e-3 5e-4 1e-4 5e-5 1e-5 1e-6
base LR
SGD
20
0
0
1e-3 5e-4 1e-4 5e-5 1e-5 1e-6
0
base LR
Fig. 21 Classification accuracy provided by fine-tuning
GoogLeNet according to different strategies: either using the
Adam solver (Left) or SGD (Right). The rest of the figure is
similar to Fig. 20
LR Decay Policy: when using SGD, we used polynomial decay with exponent 0.5 or −3; when using Adam, we maintained the learning rate constant.
As for CaffeNet, we tried all combinations and left the
not mentioned parameters to default values in Caffe.
We first observed that, differently from CaffeNet, overall for this architecture the impact of learning or not the
FC layers from scratch was very small, with the three tested
strategies behaving very similarly. We chose the last one (iii),
that was slightly better than the others. We also observed a
little benefit from using higher dropout percentages.
One little more critical aspect was instead the choice of
the solver. To this end, in Fig. 21 we report the accuracy
obtained respectively when using the Adam solver (Left) or
SGD (Right). In the latter case we applied the polynomial
decay with smaller slope, since we observed again that it was
consistently better. Performance is reported, as in Fig. 20, for
both the same day of training (Light Gray) and a different
one (Dark Gray). We varied again the base LR from 10−3 to 0
(horizontal axis), trying all values on the “small” experiment
(Continuous Line) and one small, medium and large value for
the “large” experiment (Dots).
It can be observed that, while the SGD solver is more
robust to different choices of base LR, Adam provides slightly
better accuracies for mid-range values of base LR, both for
the small and the large experiment. We therefore opted for
GoogLeNet. We performed for GoogLeNet a similar analthis latter solver.
ysis to the one reported for CaffeNet.
Then, similar observations as for the CaffeNet architecWe recall that the considered GoogLeNet architecture is
ture led us to conclude that learning slowly (with a smaller
composed of “main” branch, ending with one FC layer (called
base LR) can be preferable when we add more frames to the
loss3/classifier), and two identical “auxiliary” branches, ending with two FC layers (called loss1(2)/fc and loss1(2)/classifier). training set, since the model is less prone to overfit the training condition (i.e. with base LR equal to 0 we gain perforWe refer to (Szegedy et al 2015) for a detailed description of
mance on both days when passing from the Continuos Line
the model. By considering this structure, we then explored
to the corresponding Dot). Larger base LR can be preferable
the following parameters:
instead when the training set is smaller. As reported in Tab. 3
Base LR: varied as for CaffeNet.
therefore, also for GoogLeNet we identified an adaptive stratLearned FC Layers: we always learned loss3/classifier from
egy with base LR equal to 0 and a conservative strategy with
−2
scratch with starting LR equal to 10 ; regarding the
base LR equal to 10−5 .
auxiliary branches, we tried (i) to cut them out, (ii) to
learn also loss1(2)/classifier from scratch with starting
LR equal to 10−2 , or, finally, (iii) to learn from scratch
D More Experiments on Categorization
also loss1(2)/fc, setting the starting LR of these layers
and of loss1(2)/classifier to 10−3 .
In this section we complement the experiments discussed in
Dropout %: we tried either default Caffe values (40% for
the paper with further analysis. These results are reported to
loss3/classifier and 70% for loss1(2)/fc) or a higher pershow that the behavior observed for the specific conditions
centage: 60% for loss3/classifier and 80% for loss1(2)/fc.
Solver: we tried either SGD or Adam (Kingma and Ba 2015)
considered in the paper (e.g. number of object classes considsolvers in Caffe.
ered for the tasks) holds also in other settings.
(Right) has much more free parameters than the one learning only the last FC layer (Left). Indeed, we notice that this
latter strategy is more robust to the small-scale scenario, for
any base LR (Continuos Line in the range 40-60% to the Left
and 20-40% to the Right).
We also observe that, when we add frames to the training
set, both strategies benefit from learning slowly (i.e., when
we pass from the Continuos Line to the corresponding Dot
we gain more with smaller base LRs). Indeed, in the largescale experiment learning f c6-7-8 with small base LR achieves
the best performance. On the contrary, learning only f c8
with large base LR almost does not benefit from seeing more
frames and even overfits the day of training.
Therefore, since in our analysis we aimed at spanning the
size of the training set in a wide range, we chose two representative strategies providing best performance respectively
in the small and large-scale experiment: learning f c6-7-8 with
small (actually 0) base LR, that we call the conservative strategy, to account for our larger-scale settings, and learning only
f c8 with large base LR, that we call the adaptive strategy, to
account for smaller-scale settings.
28
Giulia Pasquale et al.
FINE-TUNING
RLSC
100
100
90
90
90
90
80
80
80
80
70
70
70
70
60
60
60
60
50
50
40
40
CaffeNet adapt
CaffeNet cons
GoogLeNet adapt
GoogLeNet cons
30
20
10
50
30
150
300
50
150
300
Fig. 22 Recognition accuracy vs # frames (number of
object views available during training). Same experiment as
Fig. 6 but executed by training only on 3 example instances
per category.
90
90
80
80
70
70
60
60
50
50
40
20
40
CaffeNet adapt
CaffeNet cons
GoogleNet adapt
GoogleNet cons
30
1
3
CaffeNet
GoogleNet
VGG-16
ResNet-50
30
5
7
20
1
3
#obj/cat
3
CaffeNet
GoogleNet
VGG-16
ResNet-50
30
5
7
20
1
3
5
7
#obj/cat
Fig. 24 Recognition accuracy vs # instances (number
of object instances available during training). Same experiment as Fig. 7 executed for a 5-class categorization problem.
D.3 Improving Invariance of CNNs on Categorization
RLSC
100
1
40
#obj/cat
#frames/seq
FINE-TUNING
50
CaffeNet adapt
CaffeNet cons
GoogleNet adapt
GoogleNet cons
30
20
20
10
100
50
40
CaffeNet
GoogLeNet
VGG-16
ResNet-50
#frames/seq
accuracy (%)
RLSC
100
accuracy (%)
accuracy (%)
FINE TUNING
100
5
7
#obj/cat
Fig. 23 Recognition accuracy vs # instances (number
of object instances available during training). Same experiment as Fig. 7 executed for a 10-class categorization problem.
D.1 Increasing the Training Set Size
Fig. 22 reports the results of the same experiment shown
in Fig. 6, but performed including only 3 object instances
per category in the training sets. For the sake of completeness, we complement the information provided in Sec. 4.2.1
by precising that we considered a 15-class categorization task
comprising the following categories: cellphone, mouse, coffee
mug, pencil case, perf ume, remote, ring binder, soap dispenser, sunglasses, f lower, wallet, glass, hairbrush, hair
clip, book.
These results further confirm that, in this setting, adding
frames without increasing semantic variability cannot be used
as a viable strategy to improve categorization accuracy, that
remains definitely lower than the performance achieved using
7 example instances (Fig. 6).
D.2 Increasing the Semantic Variability
Fig. 23 and 24 report the results of an experiment analogous
to the one shown in Fig. 7, but for respectively 10 and 5 object
categories rather than 15. As can be noticed, the observations
reported in Sec. 4.2.2 apply also here, namely the accuracy
increases remarkably as more example instances per category
are made available (without saturating), supporting the claim
that semantic variability is indeed critical for categorization
even in settings that involve few categories.
As mentioned at the end of Sec. 5.2.1, here we verify whether
the approach adopted to improve the invariance of CNNs in
identification settings may also be adopted to improve performance for categorization.
We considered the 15-class categorization task of Sec. 4.3,
Fig. 9, performed by sampling ∼ 20 frames per sequence and
applying RLSC on top of representations extracted by off-theshelf CNNs. In this experiment we compared the performance
on this task achieved by applying RLSC on top of representations extracted by CNNs which had been previously finetuned. To this end, as in Sec. 5.2.1, we evaluated the impact
of different fine-tuning strategies .
Specifically, we considered exactly the same fine-tuned
models as in Sec 5.2.1 for the first three strategies (namely,
iCWT id, iCWT cat, iCWT + ImNet) and, for the last
one (ImNet), we fine-tuned over the 15 ImageNet synsets
corresponding to the 15 categories that will be later involved
in the categorization task. We report results in Fig. 25 using
the same notation as in Fig. 12: as anticipated, none of these
strategies is beneficial when considering a categorization task.
Indeed, we do not achieve any improvement in performance
with respect to the off-the-shelf baseline.
E Generalization Across Days
In this section we test the robustness of the considered visual
recognition systems with respect to variations such as changes
of illumination, background, etc., which are neither semantic
nor geometric. In the current release of iCWT, for each object
instance we have acquired image sequences in two different
days, in order to naturally have images with these kind of
variations. For the sake of brevity, in the main paper we did
not report on experiments related to this aspect, which is
however relevant.
When training for visual recognition on a given day and
testing on a second one, the possibly small contextual variation in the scene can cause the system to experience a degradation of its recognition accuracy. In the experiments reported below, we report this loss as the difference between
the average classification accuracy observed when testing a
model on the same day it was trained on and on the other
available day in iCWT.
In particular, we consider the models trained for the categorization experiment in Sec. 4.2.1 and Sec. 4.2.2, and for
Are we Done with Object Recognition? The iCub robot’s Perspective.
accuracy (%)
100
80
off-the-shelf
iCWT cat
iCWT id
iCWT + ImNet
ImNet
100
test: 2D ROT
100
test: 3D ROT
100
test: SCALE
test: BKG
100
80
80
80
80
60
60
60
60
60
40
40
40
40
40
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
100
accuracy (%)
test: MIX
29
80
test: MIX
off-the-shelf
iCWT cat
iCWT id
iCWT + ImNet
ImNet
100
test: 2D ROT
100
test: 3D ROT
100
test: SCALE
test: BKG
100
80
80
80
80
60
60
60
60
60
40
40
40
40
40
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
20
MIX 2DR 3DR SC BKG MIX
Fig. 25 Same experimental setting as in Fig. 9, but using different image representations, provided by CaffeNet (Top, Orange)
or GoogLeNet (Bottom, Blue), network models fine-tuned according to different strategies (see Sec. D.3).
RLSC
FINE-TUNING
RLSC
0
0
0
-5
-5
-5
-5
-10
-10
-10
-10
-15
-15
-15
-15
-20
-25
-30
10
accuracy (%)
accuracy (%)
FINE TUNING
0
-20
CaffeNet adapt
CaffeNet cons
GoogLeNet adapt
GoogLeNet cons
50
-25
150
#frames/seq
300
-30
10
-20
CaffeNet
GoogLeNet
VGG-16
ResNet-50
50
-20
CaffeNet adapt
CaffeNet cons
GoogleNet adapt
GoogleNet cons
-25
150
300
#frames/seq
-30
1
3
5
#obj/cat
CaffeNet
GoogleNet
VGG-16
ResNet-50
-25
7
-30
1
3
5
7
#obj/cat
Fig. 26 Categorization accuracy vs # frames - Generalization across days. Drop in performance (difference
between test accuracy) observed when testing the models
trained for the categorization task reported in Sec. 4.2.1 on
the same day of training and on a different one.
Fig. 27 Categorization accuracy vs # instances Generalization across days. Drop in performance (difference between test accuracy) observed when testing the models
trained for the categorization task reported in Sec. 4.2.2 on
the same day of training and on a different one.
identification in Sec. 5.1. In this section, we test these models
on a day different from the one used for training (that is, we
took the images of the object instances selected for testing in
the original experiment, but from the second available day).
Categorization Fig. 26 and Fig. 27 report the loss in performance observed in the categorization setting, respectively
for the case where we tested on the relevance of the training
set size (see Fig. 6) and of semantic variability (see Fig. 7).
Surprisingly, in both settings all networks exhibit a substantial drop in performance, of the order of more than 5% accuracy and in some cases even around 20%. Critically, the
adaptive fine-tuning strategy, which appeared more effective
when tested on the same day, is also the strategy that leads
to the biggest drop. This implies that the CNN is overfitting
the variability the training day and is therefore less capable of
generalizing to other days. Interestingly however, when using
less aggressive strategies such as the conservative fine-tuning
or the feature extraction based classifier, modern networks
such as GoogleNet and ResNet-50 seem in general quite robust.
Identification The dramatic loss in performance observed
for the adaptive fine-tuning in categorization could be in principle worrisome if we recall that, in the identification setting,
such strategy was adopted in Sec. 5.2.1 to improve the invariance properties of CNNs on a preliminary dataset. Interestingly however, in Fig. 28 we notice that, in the identification setting, the adaptive fine-tuning strategy seems to be not
30
Giulia Pasquale et al.
accuracy (%)
FINE TUNING
RLSC
0
0
-5
-5
-10
-10
-15
-15
-20
-25
-30
10
-20
CaffeNet adapt
CaffeNet cons
GoogLeNet adapt
GoogLeNet cons
50
-25
150
300
-30
10
CaffeNet
GoogLeNet
VGG-16
ResNet-50
50
150
300
#frames/seq
Fig. 28 Identification accuracy vs # frames - Generalization across days. Drop in performance (difference
between test accuracy) observed when testing the models
trained for the identification task reported in Sec. 5.1 on the
same day of training and on a different one.
overfitting the training day and, albeit experiencing a drop
in performance when generalizing to another day, such loss
is small and on par with the other strategies considered in
this work. Indeed, it can be noticed that all methods exhibit
a performance drop around ∼ 5% in accuracy.
| 1cs.CV
|
Age of Information in a Network of Preemptive
Servers
Roy D. Yates
arXiv:1803.07993v1 [cs.IT] 21 Mar 2018
WINLAB, Department of Electrical and Computer Engineering
Rutgers University
[email protected]
Abstract—A source submits status updates to a network for
delivery to a destination monitor. Updates follow a route through
a series of network nodes. Each node is a last-come-first-served
queue supporting preemption in service. We characterize the
average age of information at the input and output of each node
in the route induced by the updates passing through. For Poisson
arrivals to a line network of preemptive memoryless servers, we
show that average age accumulates through successive network
nodes.
I. I NTRODUCTION
The need for timely knowledge of the system state in
remote monitoring applications has led to the development and
analysis of status update age metrics. When randomly arriving
updates are queued in a service facility, early work [1], [2]
showed that it is generally in the self-interest of a source to
limit its offered load. In particular, the updating must balance
between too infrequent updates and overly frequent updates
that induce queueing delays.
This observation has prompted the study of age in lossy systems that discard updates to avoid building queues. These include the last-come-first served (LCFS) queue with preemption
either in waiting or service [1], [3], [4] and packet management
mechanisms that restrict the the number of queued packets [5]
or discard waiting packets as they become stale [6]. However,
these contributions consider only single hop communication
systems.
Recently, there have been effort to examine age in multihop network settings [7]–[9]. In particular, this work is
closely related to the Last-Generated-First-Served (LGFS)
multihop networks studied in [7], [8]. When update transmission times over network links are exponentially distributed,
sample path arguments were used to show that a preemptive
Last-Generated, First-Served (LGFS) policy results in smaller
age processes at all nodes of the network than any other causal
policy. However, these structural results do not facilitate the
explicit calculation of age.
In this work, we consider preemptive LCFS servers, a
special case of the LGFS discipline, in the multihop line network shown in Figure 1. For Poisson arrivals and memoryless
preemptive servers, we use a stochastic hybrid systems (SHS)
model of the age processes in the network to derive a simple
expression for the average age at each node.
This work was supported by NSF award CNS-1422988 and will be
presented at the 2018 IEEE Infocom Age of Information workshop.
This work was motivated by a simple question regarding
the line network with n = 2 nodes and service rates µ1 and
µ2 . The network traffic depends qualitatively on these service
rates µ1 and µ2 . For example if µ1 λ ≤ µ2 , packet dropping
will occur primarily at node 1 but traffic will pass quickly, and
with relatively little dropping, through node 2, On the other
hand, with µ1 λ ≥ µ2 there will be substantial dropping at
node 2, but little dropping at node 1. From the perspective
of average age at the monitor, is it better for dropping to
occur earlier (µ1 < µ2 ) or later (µ1 > µ2 ) in the network? A
reasonable hypothesis is that µ1 < µ2 wastes the resources of
the faster downstream server. In fact, we will see in Theorem 2
that average age at the monitor is insensitive to the ordering
of the servers.
In this work, the network model is described in Section II.
This is followed in Section III with a summary of results on
stochastic hybrid systems (SHS) for age analysis from [10] that
will be the basis for our age analysis. In Section IV, we apply
SHS to the 2-node tandem queue. We use a 4-state model that
describes the occupancy of each server in the network. While
this analysis may be instructive, it is shown in Section V
that the preemptive service facilitates an analysis using a
“fake updates” technique from [10] that reduces the discrete
state space to just one state. Some simulation experiments are
provided in Section VI and conclusions appear in Section VII.
II. S YSTEM M ODEL
We model the updating process as a source that submits
update packets as a rate λ Poisson process to a network.
As depicted in Figure 1, updates follow a route through n
nodes in a network to a monitor. At node i, an update has
an exponential (µi ) service time, independent of the arrival
process and service times at other nodes. However, we forgo
queueing in this network; each node is a ·/M/1/1 preemptive
server. Upon arrival at a server, an update immediately goes
into service and any update currently in service is preempted
and discarded.
This is a useful model when the time an update spends in
the head-of-line position in the network interface is dominated
by waiting for transmission. For example, in a congested
wireless network, the service time would be dominated by the
MAC access delay and the transmission time of the packet
is negligible. In this case, it would be feasible and desirable
Source
λ
µ1
µ2
µn
Monitor
Fig. 1. The n-node line network model. Node i is a rate µi ·/M/1/1 preemptive
server.
for the head-of-line update packet, i.e. the nominal update in
service, to be preempted by a more recent arrival.
Starting at time t = 0, the source submits status updates
at successive times U1 , U2 . . . such that update i submitted at
time Ui is delivered at time Ui + Ti . The Ti are dependent
random variables. Moreover, because of preemption, the line
network is lossy and Ti = ∞ for those updates that are
discarded. At time t, the most recent received update is
time-stamped U (t) = max{Ui |Ui + Ti ≤ t} and thus the
status update age, which we refer to as simply the age, is
∆(t) = t − U (t). The system performance is given by the
average status update age ∆ = limt→∞ E[∆(t)].
For the n-node network in Figure 1, we denote the average
age at the monitor by ∆(λ, µ1 , · · · , µn ). In the case of n = 1
node, we have a simple M/M/1/1 preemptive queue. This has
also been called the Last-Come First-Served with preemption
in service (LCFS-S) queue [10]. Using a graphical approach,
it was shown [3] that the time average of ∆(t) approaches
∆(λ, µ1 ) =
1
1
+
.
λ µ1
(1)
In this prior work, an end-to-end network is modeled as a
single service facility. The key analytical steps involve the the
system time T and the interarrival time Y of delivered packets
and the challenge is the computation of the correlation E[T Y ].
However, when the network has n ≥ 2 nodes, the graphical
method fails because the queueing of updates in the network
is non-trivial for several reasons:
• The line network is lossy as updates are discarded when
they are preempted. Even the calculation of the effective
arrival rate of updates at the monitor is challenging.
• The departure process at each node, even node 1, is not
memoryless.
• The arrivals at node 2 and subsequent nodes are not
fresh; instead they are aged by their passage through prior
nodes. The age of a packet arriving at node i may be
correlated with its service times at preceding nodes. That
is, the interarrival time of an update may be correlated
with its age.
• Updates that reach the monitor may be subject to a
survivor bias as each was lucky enough in its service
times to avoid being preempted.
III. S TOCHASTIC H YBRID S YSTEMS FOR AO I
Because of the complexity of the lossy queueing process in
the line network, we take a different non-graphical approach to
average age analysis. Following [10], we model the system as
a stochastic hybrid system (SHS) with hybrid state (q(t), x(t)).
In the SHS model, q(t) ∈ Q is discrete and typically describes
the Markov state of the queueing system while the row vector
x(t) ∈ Rn+1 is continuous and captures the evolution of a
collection of age-related processes.
In general, SHS is a powerful modeling framework with
many variations [11], [12]. In this work, we use a simplified
form of SHS for AoI analysis introduced in [10] in which x(t)
is a piecewise linear process. In the interest of completeness,
we now summarize the basics of this simplified SHS; further
details can be found in [10] and references therein.
In the graphical representation of the Markov chain q(t),
each state q ∈ Q is a node and each transition l ∈ L is
a directed edge (ql , ql0 ) with transition rate λ(l) δql ,q(t) . Note
that the Kronecker delta function δql ,q ensures that transition
l occurs only in state ql . For each state q, we define
L0q = {l ∈ L : ql0 = q},
Lq = {l ∈ L : ql = q}
(2)
as the respective sets of incoming and outgoing transitions.
For each transition l, there is transition reset mapping that can
induce a discontinuous jumps in the continuous state x(t).
For AoI analysis, we employ a linear mapping of the form
x0 = xAl . That is, transition l causes the system to jump
to discrete state ql0 and resets the continuous state from x to
x0 = xAl . Moreover, in each discrete state q(t) = q, the
continuous state evolves according to ẋ(t) = bq .
In using a piecewise linear SHS for AoI, the elements of
bq will be binary. We will see that the ones in bq correspond
to certain relevant components of x(t) that grow at unit rate
in state q while the zeros mark components of x(t) that are
irrelevant in state q to the age process and need not be tracked.
For tracking of the age process, the transition reset maps
(n+1)×(n+1)
are binary: Al ∈ {0, 1}
. The linear mappings Al
will depend on the specific network system and the indexing
scheme for updates in the system.
The transition rates λ(l) correspond to the transition rates
associated with the continuous-time Markov chain for the
discrete state q(t); but there are some differences. Unlike
an ordinary continuous-time Markov chain, the SHS may
include self-transitions in which the discrete state is unchanged
because a reset occurs in the continuous state. Furthermore,
for a given pair of states i, j ∈ Q, there may be multiple
transitions l and l0 in which the discrete state jumps from i to
j but the transition maps Al and Al0 are different.
It will be sufficient for average age analysis to define for
all q̂ ∈ Q = {0, 1, . . . , m},
πq̂ (t) = E δq̂,q(t) ,
(3a)
vq̂j (t) = E xj (t)δq̂,q(t) , j ∈ {0, . . . , n},
(3b)
and the vector functions
vq̂ (t) = [vq̂0 (t), . . . , vq̂n (t)] = E x(t)δq̂,q(t) .
(3c)
We note that πq̂ (t) denotes the discrete Markov state probabilities, i.e.,
πq̂ (t) = E δq̂,q(t) = P[q(t) = q̂].
(4)
Similarly, vq̂ (t) measures correlation between the age process
x(t) and the occupancy of the discrete state q(t).
A fundamental assumption for age analysis is that the
Markov chain q(t) is ergodic; otherwise, time-average age
analysis makes little sense. Under this assumption, the state
probability vector π(t) = [π0 (t) · · · πm (t)] always converges
to the unique stationary vector π̄ = [π̄0 · · · π̄m ] satisfying
X
X
λ(l) π̄ql , q̄ ∈ Q,
(5a)
π̄q̄
λ(l) =
1
(10)
1
X
π̄q̄ = 1.
5
0
(00)
When π(t) = π̄, it is shown in [10] that v(t) =
[v0 (t) · · · vm (t)] obeys the system of first order differential
equations such that for all q̄ ∈ Q,
X
X
λ(l) . (6)
λ(l) vql (t)Al − vq̄ (t)
v̇q̄ (t) = bq̄ π̄q̄ +
2
(01)
4
(5b)
q̄∈Q
6
3
l∈L0q̄
l∈Lq̄
2
Fig. 2. The SHS Markov chain for the line network with n = 2 nodes. The
transition rates and transition/reset maps for links l = 1, . . . , 8 are shown in
Table I.
ql → ql0
λ(l)
xAl
1
0→1
λ
[x0 0 0 ]
Depending on the reset maps Al , the differential equation (6)
may or may not be stable.
However,
when (6) is stable, v̇(t) →
0 and each vq̄ (t) = E x(t)δq̄,q(t) converges to a limit v̄q̄ as
t → ∞. In this case, it follows that
2
1→1
λ
[x0 0 0 ]
3
1→2
µ1
[x0 0 x1 ]
4
2→0
µ2
[x2 0 0 ]
E[x] ≡ lim E[x(t)]
t→∞
X
X
E x(t)δq̄,q(t) =
= lim
v̄q̄ .
5
2→3
λ
[x0 0 x2 ]
6
3→1
µ2
[x2 x1 0 ]
7
3→2
µ1
[x0 0 x1 ]
8
3→3
λ
[x0 0 x2 ]
t→∞
l∈Lq̄
q̄∈Q
(7)
q̄∈Q
Following the convention in [10] that x0 (t) = ∆(t) is the age
at the monitor, the
P average age of the process of interest is then
∆ = E[x0 ] = q̄∈Q v̄q̄0 . The following theorem provides a
simple way to calculate the average age in an ergodic queueing
system.
Theorem 1: [10, Theorem 4] If the discrete-state Markov
chain q(t) is ergodic with stationary distribution π̄ and we can
find a non-negative solution v̄ = [v̄0 · · · v̄m ] such that
X
X
v̄q̄
λ(l) = bq̄ π̄q̄ +
λ(l) v̄ql Al ,
q̄ ∈ Q,
(8a)
l∈Lq̄
l∈L0q̄
then the differential equation (6) is stable and the average age
of the AoI SHS is given by
X
∆=
v̄q̄0 .
(8b)
q̄∈Q
IV. AGE IN THE TANDEM Q UEUE WITH P REEMPTION
We now use Theorem 1 to evaluate the age ∆(λ, µ1 , µ2 )
at the monitor in the line network of Figure 1 with n = 2
intermediate nodes. This example will demonstrate how to use
Theorem 1 in a straightforward way to evaluate average age
in a network.
In the 2-node network, the set of discrete states is Q =
{00, 10, 01, 11} such that for q1 q2 ∈ Q, qi = 1 indicates that
node i is serving an update packet. It will also be convenient to
refer to the states Q = {0, 1, 2, 3} such that q = q1 +2q2 ∈ Q.
The continuous state is x(t) = [x0 (t), x1 (t), x2 (t)] such
that x0 (t) is the age at the monitor, and, when there is an
update in service at node i, xi (t) is the age of that update.
When node i is idle, xi (t) is irrelevant and we set xi (t) = 0.
8
7
l
l∈L0q̄
3
(11)
h 1A0 l0 i
v̄ql Al
000
[v̄00 0
0 ]
000
[v̄10 0
0 ]
001
[v̄10 0 v̄11 ]
000
[v̄22 0
000
[v̄20 0 v̄22 ]
010
[v̄32 v̄31 0 ]
001
[v̄30 0 v̄31 ]
000
001
[v̄30 0 v̄32 ]
h 01 00 00 i
h 01 00 00 i
h 00 00 00 i
h 11 00 00 i
h 00 00 10 i
h 11 00 00 i
h 01 00 00 i
0 ]
TABLE I
TABLE OF TRANSITIONS FOR THE M ARKOV CHAIN IN F IGURE 2.
In particular, in any state q in which node i is idle, we hold
xi (t) = 0 while in that state. Otherwise, if node i is serving
an update in a state q, then xi (t) increases at unit rate in that
state. It follows that in state q we set
[1 0 0] q = 0,
[1 1 0] q = 1,
(9)
bq =
[1 0 1] q = 2,
[1 1 1] q = 3.
It follows from (9) that in each q, the age at the monitor, x0 (t),
grows at unit rate. On the other hand, in states q ∈ {1, 3}, node
1 is serving an update whose age x1 (t) is growing at unit rate.
Similarly, in states q ∈ 2, 3, node 2 is serving an update whose
age x2 (t) is growing at unit rate.
The Markov chain for the occupancy of the network is
shown in Figure 2. The edges are labeled l ∈ {1, 2, . . . , 8}. For
each transition l, Table I lists the state transition pair ql → ql0 ,
the transition rate λ(l) , the transition mapping x0 = xAl , the
matrix Al and, to facilitate using Theorem 1, vql Al .
We now describe the transitions l. We note that the age x0 (t)
at the monitor changes only in those transitions in which an
update completes service at node 2 and is delivered to the
monitor. Corresponding to Table I, the transitions are:
1) In an idle network, a fresh update arrives at node 1.
2)
3)
4)
5)
6)
7)
8)
The age x00 = x0 at the monitor is unchanged, x01 = 0
because the arrival is fresh, and x02 = 0 because x2 is
irrelevant in state 1.
In state 1, a fresh update arrives and preempts the update
in service at node 1. The age x00 = x0 at the monitor
is unchanged, x01 = 0 because the arrival is fresh, and
x02 = 0 because x2 is irrelevant in state 1.
In state 1, the update at node 1 completes service and
moves to node 2. The age x00 = x0 at the monitor is
unchanged, x01 = 0 because x1 becomes irrelevant in
state 2 and x02 = x1 because the update now at node 2
is the update that was previously at node 1.
In state 2, the update at node 2 completes service and is
delivered to the monitor. The system moves to state 0.
The age at the monitor becomes x00 = x2 . In addition,
x01 = x02 = 0 since x1 and x2 are irrelevant in state 0.
The arrival of a fresh update at node 1 induces the 2 → 3
state transition. The age x00 = x0 is unchanged. At node
1, x01 = 0 because the update is fresh. At node 2, the
age x02 = x2 is unchanged.
The update at node 2 completes service and is delivered
to the monitor. The system moves to state 1. The age
at the monitor becomes x00 = x2 . In addition, x01 = x1
is unchanged because the update at node 1 remains in
place and x02 = 0 since x2 are irrelevant in state 1.
The update at node 1 completes service and moves to
node 2, preempting the update that had been in service
at node 2. The age x00 = x0 is unchanged, x01 = 0
because x1 becomes irrelevant in state 2, and x02 = x1
because the update now at node 2 is the update that was
previously at node 1.
A fresh update arrives at node 1, preempting the update
that had been in service at node 1. The age x00 = x0 is
unchanged, x01 = 0 because the new update at node 1 is
fresh, and x02 = x2 is unchanged because the update at
node 2 stays in place.
To use Theorem 1 to find the average age, we first find the
stationary probabilities π̄. It is straightforward to verify that
λ
µ1 µ2
,
π̄2 =
π̄0 ,
(10a)
(µ1 + λ)(µ2 + λ)
µ2
λ µ1 + µ2 + λ
λ2
π̄1 =
π̄0 , π̄3 =
π̄0 . (10b)
µ1
µ1 + µ2
µ2 (µ1 + µ2 )
π̄0 =
Second, we need to find a non-negative v̄ satisfying (8a).
Defining αi = λ + µi for i = 1, 2, and α3 = λ + µ1 + µ2 , it
follows from (8a) and Table I that
v̄0 λ = π̄0 b0 + µ2 [v̄22 0 0],
(11a)
v̄1 α1 = π̄1 b1 + λ[v̄00 0 0]
+ λ[v̄10 0 0] + µ2 [v̄32 v̄31 0],
(11b)
v̄2 α2 = π̄2 b2 + µ1 [v̄10 0 v̄11 ] + µ1 [v̄30 0 v̄31 ],
(11c)
v̄3 α3 = π̄3 b3 + λ[v̄20 0 v̄22 ] + λ[v̄30 0 v̄32 ].
(11d)
Since each v̄q has three components, there are twelve equations in (11). However, because x1 and x2 are irrelevant in
state q = 0, it follows from (11a) that v̄01 = v̄02 = 0.
Similarly, because x2 is irrelevant in state q = 1, and x1 is
irrelevant in state q = 2, it follows from (11b) and (11c) that
v̄12 = v̄21 = 0. Thus we are left with the eight equations
v̄00 λ = π̄0 + µ2 v̄22 ,
v̄10 µ1 = π̄1 + λv̄00 + µ2 v̄32 ,
(12a)
(12b)
v̄11 (λ + µ1 ) = π̄1 + µ2 v̄31 ,
(12c)
v̄20 (λ + µ2 ) = π̄2 + µ1 v̄10 + µ1 v̄30 ,
(12d)
v̄22 (λ + µ2 ) = π̄2 + µ1 v̄11 + µ1 v̄31 ,
(12e)
v̄30 (µ1 + µ2 ) = π̄3 + λv̄20 ,
v̄31 (λ + µ1 + µ2 ) = π̄3 ,
v̄32 (µ1 + µ2 ) = π̄3 + λv̄22 .
(12f)
(12g)
(12h)
With some algebra, it follows from (12) that
∆(λ, µ1 , µ2 ) = v̄00 + v̄10 + v̄20 + v̄30
3
1
1
1 X
=
+
+
π̄q
λ µ1
µ2 q=0
=
1
1
1
+
+
.
λ µ1
µ2
(13)
When we have 2 preemptive servers, (13) verifies that the
average age at the monitor is indeed insensitive to the ordering
of the servers. Moreover, in comparing (1) and (13), one can
see the simple pattern that the ith node contributes 1/µi to
the age at the monitor. To verify this observation for an nnode network, however, the SHS method we employed for
n = 2 nodes tracks the state of each node in the network and
thus requires the solution of (n + 1)2n equations. In the next
section, we show how to extend this simple pattern to n nodes
using an SHS that generates only n + 1 equations.
V. T HE n N ODE L INE N ETWORK : FAKE U PDATES
A unusual feature of the LCFS-S server at each node is that
tracking the idle/busy state of a node is not actually essential
because an arrival goes immediately into service whether or
not an update is in service. When node i is busy, xi (t) encodes
the age of the update in service. If that update completes
service at time t0 , it enters service at node i+1 and x0i+1 = xi ,
whether or not it preempts any update that may have been in
service at node i + 1. To avoid tracking the idle/busy state
at node i, when an update departs node i, we create a fake
update at node i, with the same timestamp (and age xi (t)) as
the update that just departed. If a new update from node i − 1
arrives at node i, it preempts the fake update and the fake
update causes no delay to an arriving real update. If the fake
update does depart node i, it will go into service at node i + 1,
but it will have the same age as the update it will preempt at
node i + 1.
In [10], fake updates are introduced in an SHS derivation
of the average age of an LCFS-S queue in which the SHS has
a single discrete state. In this section, we show how to extend
the fake updates approach to prove the following theorem.
Theorem 2: With Poisson arrivals of rate λ to an n-node
line network of LCFS-S servers with service rates µ1 , . . . , µn ,
the average age at the monitor is
n−1
n
1 X 1
.
∆(λ, µ1 , . . . , µn ) = +
λ i=1 µi
•
•
Transition l = 0 marks the arrival of a fresh update at
node 1. In the continuous state x, we set x01 = 0 but all
other components of x are unchanged.
In a transition l ∈ {1, . . . , n − 1} an update departs node
l and arrives at node l + 1. At node l + 1, x0l+1 = xl . At
node l, x0l = xl because a fake update begins service.
In transition n, an update departs node n and is delivered
to the monitor. The age at the monitor is reset to x00 = xn .
Each continuous-state age component xi (t), whether representing a real or fake update, ages at unit rate and thus
b0 = [1 1 · · · 1]. In the following, our notation will be
simplified by defining µ0 = λ. Applying Theorem 1 to the
transitions given in Table II, we obtain
v̄0
n
X
µi = b0 + µ0 [v̄00 0 v̄02 v̄03 · · · v̄0n ]
i=0
+ µ1 [v̄00 v̄01 v̄01 v̄03 · · · v̄0n ]
+ µ2 [v̄00 v̄01 v̄02 v̄02 · · · v̄0n ]
..
.
+ µn [v̄0n v̄01 v̄02 v̄03 · · · v̄0n ].
(14)
It then follows from (14) that
v̄01
n
X
µi = 1 + v̄01
i=0
n
X
µi ,
(15)
i=1
implying v̄01 = 1/λ. In addition, for k = 2, 3, . . . , n,
v̄0k
n
X
µi = 1 + v̄0k
i=0
k−2
X
µi + µk−1 v̄0,k−1 + v̄0k
i=0
n
X
µi . (16)
i=k
It follows from (16) that v̄0k = 1/µk−1 + v̄0,k−1 , implying
k−1
v̄0k
1 X 1
,
= +
λ i=1 µi
k = 1, . . . , n.
(17)
Finally, for component v̄00 of v0 , (14) implies
v̄00
n
X
i=0
µi = 1 + v̄00
n−1
X
µi + v̄0n µn .
(18)
i=0
This implies v̄00 = 1/µn + v̄0n . The claim then follows from
(17) and Theorem 1.
1
0
..
Proof: Using fake updates, the Markov chain has the
singleton state space Q = {0} with the trivial stationary
distribution π̄0 = 1. As shown in Figure 3, there is a 0 → 0
transition for each link l. The transitions l ∈ {0, 1, . . . , n} are
shown in Table II. In the table, we omit the ql → ql0 entry
since it is 0 → 0 for each l. Note that
•
0
n
. ···
2
3
Fig. 3. The SHS Markov chain for the line network with n nodes. The
transition rates and transition/reset maps for links l = 0, . . . , n are shown in
Table II.
λ(l)
xAl
λ [x0 0 x2 x3
µ1 [x0 x1 x1 x3
µ2 [x0 x1 x2 x2
..
..
.
.
n µn [xn x1 x2 x3
l
0
1
2
v̄ql Al
· · · xn ] [v̄00 0 v̄02 v̄03 · · · v̄0n ]
· · · xn ] [v̄00 v̄01 v̄01 v̄03 · · · v̄0n ]
· · · xn ] [v̄00 v̄01 v̄02 v̄02 · · · v̄0n ]
..
.
· · · xn ] [v̄0n v̄01 v̄02 v̄03 · · · v̄0n ]
TABLE II
TABLE OF TRANSITIONS FOR THE M ARKOV CHAIN IN F IGURE 3.
VI. N UMERICAL E XPERIMENTS
Because Theorem 2 provides such a simple characterization
of the average age in the preemptive line network, here we
examine age sample paths in order to get a better sense of how
age fluctuates across a sequence of preemptive servers. Our
focus is a line network with n = 3 nodes. In these experiments,
let ∆i (t) denote the instantaneous age at the output of node i
at time t.
We start with Figure 4 which depicts representative sample
paths of ∆i (t) for i = 1, 2, 3. These sample paths are the result
of 50 updates of a rate 1 Poisson process arriving at node
1 of a three-node network with service rates [µ1 µ2 µ3 ] =
[1 0.5 0.25]. These sample paths demonstrate that while the
average age grows predictably, preemption thins the update
arrival process at successive nodes. Because of this thinning,
higher average age at successive nodes is a consequence of
age growing in between less-frequent updates. We also see
some evidence of survivor bias; occasionally some updates
pass quickly through the network enabling the age at the
monitor to be reset to a relatively low value.
In Figure 5, we examine the reverse ordering of the servers;
[µ1 µ2 µ3 ] = [0.25 0.5 1] so that downstream servers become
progressively faster. In sample paths for this system, most
updates are dropped at the first node and the age processes at
nodes 2 and 3 mimic the age at node 1, but with some small
additional lag. In this sample path, there is no evidence of
survivor bias. However, it is apparent that in both Figures 4
and 5 there is a general trend that thinning of the updates
induces larger age fluctuations at nodes further down the line.
To see the convergence of the average age, we now examine
the running average age
Z t
˜ i (t) = 1
∆i (τ ) dτ
(19)
∆
t 0
15
20
∆ 1(t)
∆ 2(t)
15
∆ 3(t)
10
Age
Age
25
10
5
5
0
0
0
20
40
60
t
0
50
100
150
200
250
t
Fig. 4. Fifty arrivals to the three node line network with arrival rate λ = 1
and service rates µ1 = 1, µ2 = 0.5 and µ3 = 0.25.
˜ i (t), i = 1, 2, 3, with
Fig. 6. Sample paths of the running sample average ∆
arrival rate λ = 1 and service rates µ1 = 1, µ2 = 0.5 and µ3 = 0.25. The
bundles of sample paths converging to ages 2, 4, and 8 support Theorem 2.
15
∆ 1(t)
∆ 2(t)
10
Moreover, when each server in the network is a memoryless
preemptive server, the method of fake updates can greatly
simplify the age computation. We caution however that fake
updates appear to be useful only when servers support preemption in service. For example, when preemptions occur in
waiting, the discrete state must track whether a server is busy;
i.e. it must distinguish between real updates and fake updates.
In such cases, the system state will grow exponentially with
the number of network nodes.
Age
∆ 3(t)
5
0
0
10
20
30
40
50
t
Fig. 5. Fifty arrivals to the three node line network with arrival rate λ = 1
and service rates µ1 = 0.25, µ2 = 0.5 and µ3 = 1.
˜ i (t)
at each node i. In Figure 6, we plot 10 sample paths of ∆
for each node i. In each sample path, 200 updates arrive at
node 1 as a rate λ = 1 Poisson process. The nodes have service
rates µ1 = 1, µ2 = 0.5 and µ3 = 0.25. For each sample path,
˜ i (t) through the delivery time of the final received
we plot ∆
update at the monitor. From Theorem 2, we expect to see
i
2, i = 1,
X
1
1
˜
lim ∆i (t) = +
= 4 i = 2,
(20)
t→∞
λ
µk
k=1
8 i = 3.
In Figure 6, we see that the bundles of running average sample
paths clustered around ages 2, 4 and 8 are consistent with this
conclusion. Moreover, the increasing variation and apparently
slower convergence of the running average age in successive
servers are also consistent the larger fluctuations in age at
successive servers in the sample paths of Figures 4 and 5.
VII. C ONCLUSIONS
In this work, we use the SHS approach to analyze age in an
n-node line network of exponential servers. From the two node
example in Section IV, it should be apparent that SHS can be
employed to analyze a variety of other queues and simple
networks described by finite continuous-time Markov chains.
R EFERENCES
[1] S. Kaul, R. Yates, and M. Gruteser. Real-time status: How often should
one update? In Proc. IEEE INFOCOM Mini Conference, 2012.
[2] C. Kam, S. Kompella, and A. Ephremides. Effect of message transmission diversity on status age. In Proc. IEEE Int’l. Symp. Info. Theory,
pages 2411–2415, June 2014.
[3] S. Kaul, R. Yates, and M. Gruteser. Status updates through queues. In
Conf. on Information Sciences and Systems (CISS), March 2012.
[4] R. Yates and S. Kaul. Real-time status updating: Multiple sources. In
Proc. IEEE Int’l. Symp. Info. Theory, July 2012.
[5] M. Costa, M. Codreanu, and A. Ephremides. Age of information with
packet management. In Proc. IEEE Int’l. Symp. Info. Theory, pages
1583–1587, June 2014.
[6] C. Kam, S. Kompella, G. D. Nguyen, J.E. Wieselthier, and
A. Ephremides. Age of information with a packet deadline. In
Proc. IEEE Int’l. Symp. Info. Theory, pages 2564–2568, 2016.
[7] A. M. Bedewy, Y. Sun, and N. B. Shroff. Age-optimal information
updates in multihop networks. In Proc. IEEE Int’l. Symp. Info. Theory,
pages 576–580, June 2017.
[8] A. M. Bedewy, Y. Sun, and N. B. Shroff. The age of information in
multihop networks. CoRR, abs/1712.10061, 2017.
[9] R. Talak, S. Karaman, and E. Modiano. Minimizing age-of-information
in multi-hop wireless networks. In 55th Annual Allerton Conference
on Communication, Control, and Computing (Allerton), pages 486–493,
Oct 2017.
[10] R. D. Yates and S. K. Kaul. The age of information: Real-time status
updating by multiple sources. CoRR, abs/1608.08622, 2016. Submitted
to the IEEE Transactions on Information Theory.
[11] J.P. Hespanha. Modelling and analysis of stochastic hybrid systems. IEE
Proceedings-Control Theory and Applications, 153(5):520–535, 2006.
[12] A. R. Teel, A. Subbaraman, and A. Sferlazza. Stability analysis for
stochastic hybrid systems: A survey. Automatica, 50(10):2435–2456,
2014.
| 7cs.IT
|
Bulletin of the IEEE Technical Committee on Learning Technology, Volume 18, Number 2/3, 2016
6
Decision Trees for Helpdesk Advisor Graphs
S. Gezerlis and D. Kalles
Abstract—We use decision trees to build a helpdesk agent
reference network to facilitate the on-the-job advising of junior
or less experienced staff on how to better address
telecommunication customer fault reports. Such reports generate
field measurements and remote measurements which, when
coupled with location data and client attributes, and fused with
organization-level statistics, can produce models of how support
should be provided. Beyond decision support, these models can
help identify staff who can act as advisors, based on the quality,
consistency and predictability of dealing with complex
troubleshooting reports. Advisor staff models are then used to
guide less experienced staff in their decision making; thus, we
advocate the deployment of a simple mechanism which exploits
the availability of staff with a sound track record at the helpdesk
to act as dormant tutors.
Index Terms— customer relationship management; decision
trees; knowledge flow graph
C
I. INTRODUCTION
ustomer satisfaction is a key factor in making clients loyal
to a service provider [1]. In telecommunications, this is
closely linked to the time it takes to fix a problem and the way
a fault request is handled. Long-term customers are considered
more loyal to a brand and usually cost less to serve [2][3].
Big telecommunication organizations have adopted
Standard Operating Procedures (SOPs) and Key Performance
Indicators (KPIs) to help guide their policies in servicing
customer fault complaints.
SOPs are guidelines to be followed by engineers, to help
them decide how to solve a particular problem. SOPs are
usually combinations of rules and decision trees [4][5] and
constitute an integral part of staff training.
KPIs are numeric indices which attempt to capture aspects
of service quality (as perceived by the customer or by the
organization) and are usually expressed in terms of average
request handling speed, percentage of problems solved
remotely, or repeated complaint rates. Though a KPI may be
straightforward to define and to measure, relating it to soft
attributes of service provision is an elusive task. For example,
being able to conclude a job on time is an obvious target for a
maintenance engineer, and so is the ability to draw as few
organizational resources as possible for any particular task.
Though relating both to cost can also be straightforward,
Manuscript received June 25, 2016 (revised September 11, 2016).
Spyros Gezerlis was with Hellenic Telecommunications Agency, Greece.
He is now with Deutsche Telekom AG, Germany (e-mail:
[email protected], [email protected]).
Dimitris Kalles is with the Hellenic Open University, Greece (phone: +30
6932 231151; e-mail: [email protected]).
linking them to measures of customer satisfaction can be a
difficult exercise. For this reason, composite quality indices
are notoriously difficult to define and are subject to
painstaking secrecy and to simplifications [6].
SOPs and KPIs are usually deployed at two levels of
support: Remote (phone) Support, which handles all incoming
complaints and calls, and On-Site Service with field
technicians, who work on the landline network. The decision
to deploy On-site Support while already providing Remote
Support is sometimes a function of the Remote Support
technician's experience, workload, mental situation and agility
and either approach has to be judged based on the average cost
each of them incurs on the company, all of which are also
functions of time.
The element of cost is captured by the Operational Expense
(OPEX) formulation, where one assumes that a complaint
remotely resolved costs less, is resolved faster and still keeps
customer experience at a satisfactory level. With OPEXOS
standing for OPEX for On Site Support at 1, OPEXRS for
Remote resolution Service is OPEXOS/n , with typical values
of n > 10 (details are business confidential).
The complexity of making support-related decisions on
time, with pressure and with acceptable consistency with
organizational policies on customer support and cost
containment, cannot be overstated. As training is a key to
improvement, this paper puts forward an unconventional
approach, based on the on-the-fly identification of key
personnel who can temporary act as advisors to their peers in a
discreet, non-intrusive fashion.
The contribution of this article is two-fold. First, we use
decision trees to identify inconsistencies in the cost incurred
when dealing with customer complaints; we interpret such
inconsistencies as a measure of the ability of the company to
deliver an as-uniform-as-possible customer experience in
complaint troubleshooting. Then, we use these inconsistencies
to rank helpdesk agents who troubleshoot customer
complaints; this generates a knowledge hierarchy that is
dynamically updated based on identifying personnel who can
advise or who need to be advised.
The work serves as a bridge between the formality of logic
that is inherent in expressing SOPs and the inherent vagueness
as regards what is the "best" way to resolve a particular
customer complaint. It also advances the state of the practice
in the customer relationship management (CRM) genre [7],
where what little has been done until recently [8][9][10] as
regards customer complaints, mainly focuses on knowledge
about the value of the client (instead of complaint resolution).
Bulletin of the IEEE Technical Committee on Learning Technology, Volume 18, Number 2/3, 2016
II. DECISION TREES AND ADVISOR FLOW GRAPHS
For our case study, we selected a small group of Remote
Support agents (technicians), who operated under the
supervision of one of the co-authors, and recorded their
measurements as attributes for Internet and TV complaints
instances. Each instance corresponds to an Internet or IPTV
(Internet Protocol TV) over-xDSL complaint, where we record
synchronization between the Integrated Access Device and the
Central Office routers, in addition to other copper-related
metrics. For these agents, we also recorded whether they
handled the complaint at the helpdesk level or referred it to On
Site Support. One aims at maximizing the number of issues
resolved remotely, without having to resort to On Site
Support. Though this makes obvious sense from a financial
point of view, it is not trivial; sub-standard problem resolution
generates recurring complaints, which may or may not be
dealt by the same agent next time, thus raising costs (which is
seldom the case for the more expensive On Site Support).
The training set we use to build a decision tree, using the
C4.5 algorithm [4], looks like the one shown in Table I.
TABLE I
A SNAPSHOT OF A TRAINING SET
Agent
Product
Area
…
…
…
AGENT04 INTERNET Athens
AGENT02 INTERNET Patras
AGENT03 INTERNET Athens
…
…
…
Profile Sync
…
2
30
24
…
Max
…
…
2048 9138
26421 27786
2045 3408
…
…
Dist
State
…
2.7
1.8
3.1
…
…
OS
RS
OS
…
State is the class variable (showing the type of support, On-Site/Remote).
Product refers to the service a client has bought and for which service the
complaint is being lodged.
Area refers to the city where the fault occured.
Profile refers to the nominal speed of the connection for that client (not
the actual capacity of the line, but the service capacity; for example, a lowcost client might buy a 2 Mb/s service even though the line might
accommodate much larger speeds).
Sync refers to the actual synchronization speed of a client's line.
Max refers to the theoretical maximum attainable synchronization of a
client's line based on signal strength, attenuation, and a variety of physical
characteristics.
Dist refers to the copper cable length from the central circuit
infrastructure (measured in km).
The training set was made up of about 1,500 helpdesk
reports, recorded over a period of about 3 weeks, by
automatically logging data collected at distributed corporate
information systems, for 5 helpdesk agents. The integrated
data set has been generated by combining those data together.
A. Cost-oblivious decision trees
For the base-level experiment we treat individual agents as
attributes. We have used RWeka and R for analyzing the data
and building the models. Running a 10-fold cross-validation
delivered an accuracy of 69.67% of predicting whether the
complaint would be resolved at the on-site or at the remote
level. Fig. 1 shows a snapshot of the decision tree; the (dark)
multi-valued AGENT attribute appears at all nodes near the
tree root and, clearly, should be avoided in any (agent-
7
agnostic) SOP. Dropping that attribute along with the AREA
attribute (agents service requests from a central location which
may better resolved just by knowing singularity aspects of the
actual physical network) resulted in an accuracy of 60.65%.
Fig. 1. A decision tree using all data labels - agent as a decision node.
We then use the data sets of individual agents to develop
decision trees which capture how each agent treats a customer
complaint as well as a measure of treatment uniformity. The
measurement is based on partitioned data sets which are crosstested [11]. We partition the overall complaints data set into
groups, according to how complaints were assigned to agents
and examine whether the problem resolution practices of one
agent apply to customer complaints handled by another agent.
On one hand, this approach allows us to see how each agent's
decision model is (or is not) compatible with other agents'
models. On the other hand, however, it also allows us to
consider model differences compared not to a theoretical
maximum of 1 but to a practical maximum as calculated by
the re-classification error of each agent's model.
TABLE II
CORRECTLY CLASSIFIED INSTANCES - CROSS-TEST RESULTS
1
1
2
3
4
5
2
0.60
0.49
0.49
0.54
0.50
3
0.38
0.72
0.66
0.67
0.47
4
0.48
0.56
0.60
0.52
0.52
5
0.54
0.50
0.50
0.75
0.53
0.50
0.42
0.42
0.61
0.71
Cross-test results among all available agents are shown in
Table II. Therein, each <i;i> entry (on the main diagonal)
refers to the re-classification testing accuracy; note that these
numbers are not even close to 1 (suggesting an inherently hard
problem) and that the relative standard deviation (RSD) is
0.1049 (indicating small differences in how each agent reclassifies the training data generated by him/herself and
concurring with Fig. 1, where the agent attribute seems to
dominate the differences in how a problem is dealt with). Each
<i;j> entry describes an experiment where data for the i-th
agent is used to build a decision tree which is subsequently
tested on data for the j-th agent.
Bulletin of the IEEE Technical Committee on Learning Technology, Volume 18, Number 2/3, 2016
B. Cost-sensitive decision trees
A cost-matrix that captures the differences between
misclassifying customer complaints as requiring On Site
Support vs Remote Resolution Service is:
CM
0
⎡
=⎢
OPESX
RS
⎣
OPESX OS ⎤
⎥
0
⎦
1
2
3
4
5
0.1
0.5
0.5
0.1
0.2
3
0.1
0.3
0.3
0.1
0.1
4
0.1
0.4
0.4
0.2
0.1
1
2
3
4
5
5
0.1
0.5
0.5
0.1
0.1
0.2
0.6
0.6
0.1
0.1
The RSD along the main diagonal now stands at 0.7071 and
raises the question why agents fare so differently when asked
to classify the very data they were trained on, while also
highlighting substantial cost differences between agents, when
some of them are used to classify data used by other agents.
It might seem that an agent may be unfairly penalized for
handling a majority of serious complaints requesting on-site
maintenance. We note that complaints are assigned to agents
randomly (for example, we do not pick experienced agents to
deal with frustrated customers); as a result, one expects that,
on average, hard and easy problems are uniformly allocated.
Moreover, any performance review will no doubt also focus
on how specific complaints were dealt with; our technique at
this point mainly serves to highlight inconsistencies in dealing
with customer problems and not the actual cost of the
maintenance approach (as a result, the question of why two
particular agents performed a different classification on a
similar set of complaints is of relatively less importance).
So, incorporating the cost aspect into the decision tree
classifier allowed us to build agent-aligned models and show
how these scale up to new data sets. To stress how traditional
techniques provide rather just crude clues, note that traditional
KPI-based agent monitoring usually consists of at least 2
indices per agent. Table IV reports on the conventional cost
index for each agent (using actual values for two real KPI
indices; their names as well as the formula to calculate the
composite cost index are withheld due to commercial secrecy
but, as most KPI indices, they do bear some relation with the
KPI1
0.30
0.20
0.14
0.25
0.25
KPI2
AGENTCOST
0.44
0.42
0.39
0.46
0.44
0.72
0.69
0.69
0.68
0.69
Table V finally reviews our experiments (ordered by
increasing ability to tell agents apart in terms of performance).
TABLE V
COMPARISON OF TECHNIQUE RESOLUTION
Table
4
2
3
AVERAGE MISCLASSIFICATION COST
2
TABLE IV
TRADITIONAL KPIS AND COST EVALUATION
Agenti
TABLE III
1
effectiveness of complaint resolution, also taking into account
recurring complaints). We now observe an RSD of a mere
0.0219; this clearly suggests that traditional indices grossly
hide differences.
(1)
This is not a conventional misclassification cost matrix
[12]; we actually note the cost incurred to carry out some
maintenance activity, while we choose to ignore the cost of
that activity when the model correctly predicts the class label
(of the maintenance activity). So, when an On Site instance is
correctly classified by our model, we assign it a cost of 0,
though it incurs a cost of OPEXOS to resolve; instead, we
reserve the cost of OPEXOS only for those instances which our
model classifies as On Site though the class label in the data
set reads Remote. Cross-testing agents with the above cost
perspective is shown in Table III.
8
RSD
Cost using Traditional KPIs
Correctly Classified Instances only
Average Misclassification Cost
0.022
0.105
0.707
C. Advisor Flow Graph: just-in-time collaborative training
Since some agents' models seem to be better suited when
classifying hereto un-seen instances, it might be reasonable to
ask those agents to serve as advisors for their colleagues.
Though organizational level training involves the review of
past cases as well as helpdesk tactics (how to use one's
communication skills, for example), the helpdesk data analysis
models can serve as on-the-spot training; when an agent
addresses a troubleshooting report, it makes sense to offer
him/her an alternative approach to the same problem. It is
crucial to present that advice as a hint and not as a
recommendation to be followed; since the actual classification
problem is very difficult on its own, any advice that sounds
too firm might be easily resisted on grounds of just a
counterexample (and, as we have seen, these do occur).
To capture a picture of which agent can help a colleague,
we draw an advisor flow graph, where at source nodes we
place those agents with "better" models, whereas agents who
seem to act with increased misclassification costs are placed at
destination nodes. Table III is used to build the advisor flow
graph shown in Fig. 2, using Equation 2 for the corresponding
adjacency and weight matrix. The semantics of the advisor
flow graph are straightforward, with larger edge weights
reflecting larger quality differences in the corresponding
cross-tested models, according to Equation 2. For clarity
purposes, we have drawn the graph in three levels to denote
that the top level nodes are source-only nodes whereas the
bottom level nodes are destination-only nodes. For our
example, Agent 3 should consult Agents 1, 4 or 5, before
deciding, whereas Agent 2 might also consult Agent 3, should
the others be unavailable (a pop-up window describing an
alternative action and the justification could suffice).
Bulletin of the IEEE Technical Committee on Learning Technology, Volume 18, Number 2/3, 2016
⎧
⎪C i , j > C j ,i → w(i, j ) = C i , j − C j ,i
⎨
⎪
⎩C i , j < C j ,i → w( j , i ) = C i , j − C j ,i
(2)
9
probably be tackled on a trial-and-error basis.
Simply put, the contribution of this article is the use of
decision trees as a classification mechanism and as a
knowledge transfer mechanism for helpdesk technicians. But,
while it may be easy to build the advisor graph, deploying it
and monitoring how it evolves and how it actually improves
quality of service is a key part of our agenda to close the loop
between monitoring and acting, via peer-training.
ACKNOWLEDGMENT
The work was carried out while the first author was with the
Hellenic Telecommunications Organization (OTE S.A.),
Greece. We acknowledge the granting of permission to use
individual technicians' data. All data is confidential and the
property of OTE S.A.
Fig. 2. An advisor flow graph showing the flow of information.
III. CONCLUSIONS AND FUTURE WORK
We identify helpdesk agents capable of on-the-job advising
their colleagues, using cost-sensitive decision tree models of
how agents deal with customer complaints. These decision
trees pinpoint agent differences and help build a graph to
capture possible advice flows between agents. These advice
flows are, essentially, by-products of standard data mining
activities and can be used as non-intrusive on-the-job
recommendation, suitable not only for decision making but
also for reflection.
An advisor graph is a dynamic knowledge hierarchy [13]
and captures the implicit reputation enjoyed by members of a
community of practice, even though such knowledge may be
implicit (and volatile). This is relevant to leader selection via
clustering as performed in swarm-based optimization
problems [14], where leaders help balance quality and
diversity; in our case, this refers to organizational goals of
effectiveness and efficiency. An advisor graph can gracefully
scale up with the number of agents as its calculation can be
carried out off-line; subsequently, selecting who-adviseswhom is performed by selecting any of the available source
nodes for a particular destination node. It can also scale up
with the number of attributes recorded for each complaint; it is
not unnatural to enhance each record with some agent-specific
attributes so that agent similarities may be detected and
exploited across a variety of other criteria (note, however, that
recording data such as agent age, sex, education background,
etc. can ran contrary to law and/or organizational regulations,
which is why, for the context of our case study, we have
limited data collection to the business-specific domain only).
Knowledge volatility issues arise as the advisor graph
changes over time, due to the variability of the troubleshooting
activities or to the helpdesk agents. We expect that, for an
application, one might decide to analyze medium-sized agent
groups and a larger time window. Establishing the right
combination of group size and time window will likely be a
difficult problem and, for all practical purposed, should
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
Gustafsson, A., Johnson, M. D. and Roos, I. 2005. The Effects of
Customer Satisfaction, Relationship Commitment Dimensions, and
Triggers on Customer Retention. Journal of Marketing 69, 210-218.
Ganesh, J., Arnold, M.J. and Reynolds, K.E. 2000. Understanding the
Customer Base of Service Providers: An Examination of the Differences
Between Switchers and Stayers. Journal of Marketing 64 (3), 65-87.
Hwang, H., Jung, T. and Suh, E.: An LTV model and customer
segmentation based on customer value: a case study on the wireless
telecommunication industry. Expert Systems with Applications 26 (2),
181-188.
Quinlan, J.R. 1993. C4.5: Programs for Machine Learning. Morgan
Kaufmann Publishers.
Muggleton, S. and De Raedt, L. 1994. Inductive Logic Programming:
Theory and methods. The Journal of Logic Programming 1920(Supplement 1), 629-679.
Reichheld, F.F. 2003. The One Number You Need to Grow. Harvard
Business Review (December).
Ngai, E.W.T., Xiu, L., and Chau, D.C.K. 2009. Application of data
mining techniques in customer relationship management: A literature
review and classification. Expert Systems with Applications 36 (2, Part
2), 2592-2602.
Khodakarami, F. and Chan, Y.E. 2014. Exploring the role of customer
relationship management (CRM) systems in customer knowledge
creation. Information & Management 51(1), 27-42.
Tseng, S.-M. 2016. Knowledge management capability, customer
relationship management, and service quality. Journal of Enterprise
Information Management 29(2), 202-221.
Soltani, Z. and Navimipour, N.J. 2016. Customer relationship
management mechanisms: A systematic review of the state of the art
literature and recommendations for future research. Computers in
Human Behavior 61, 667-688.
Hadzilacos, T., Kalles, D., Pierrakeas, C. and Xenos, M. 2006. On Small
Data Sets revealing Big Differences. Advances in Artificial Intelligence,
Antoniou, G., Potamias, G., Spyropoulos, C. and Plexousakis, D. (Eds.),
LNCS 3955, 512-515.
Turney, P.T. 1995. Cost-Sensitive Classification: Empirical Evaluation
of a Hybrid Genetic Decision Tree Induction Algorithm. Journal of
Artificial Intelligence Research 2, 369-409.
Tamargo, L.H., Garca, A.J, Falappa, M.A. and Simari, G.R. 2014. On
the revision of informant credibility orders. Artificial Intelligence 212,
36-58.
Al Moubayed, N., Petrovski, A. and McCall, J. 2011. Clustering-Based
Leaders' Selection in Multi-Objective Particle Swarm Optimisation.
Intelligent Data Engineering and Automated Learning, Yin, H., Wang,
W. and Rayward-Smith, V. (Eds.), LNCS 6936,100-107.
| 2cs.AI
|
Elicitation for Preferences Single Peaked on Trees
arXiv:1604.04403v1 [cs.GT] 15 Apr 2016
Palash Dey
Indian Institute of Science, Bangalore
[email protected]
Neeldhara Misra
Indian Institute of Technology, Gandhinagar
[email protected]
April 18, 2016
Abstract
In multiagent systems, we often have a set of agents each of which have a preference ordering
over a set of items and one would like to know these preference orderings for various tasks, for
example, data analysis, preference aggregation, voting etc. However, we often have a large
number of items which makes it impractical to ask the agents for their complete preference
ordering. In such scenarios, we usually elicit these agents’ preferences by asking (a hopefully
small number of) comparison queries — asking an agent to compare two items. Prior works on
preference elicitation focus on unrestricted domain and the domain of single peaked preferences
and show that the preferences in single peaked domain can be elicited by much less number of
queries compared to unrestricted domain. We extend this line of research and study preference
elicitation for single peaked preferences on trees which is a strict superset of the domain of single
peaked preferences. We show that the query complexity crucially depends on the number of
leaves, the path cover number, and the distance from path of the underlying single peaked tree,
whereas the other natural parameters like maximum degree, diameter, pathwidth do not play
any direct role in determining query complexity. We then investigate the query complexity for
finding a weak Condorcet winner for preferences single peaked on a tree and show that this
task has much less query complexity than preference elicitation. Here again we observe that the
number of leaves in the underlying single peaked tree and the path cover number of the tree
influence the query complexity of the problem.
1
Introduction
In multiagent systems, we often have scenarios where agents have to arrive at a consensus when
choosing between multiple options. Typically, the agents have preferences over a set of items, and
the problem of aggregating these preferences in a suitable manner is one of the most well-studied
problems in social choice theory [BCE+ 15]. There are many ways of expressing preferences over a
set of alternatives. One of the most comprehensive ways is to specify a complete ranking over the
set of alternatives. However, one of the downsides of this model is the fact that it can be expensive
to solicit a preference when there are a large number of alternatives, and many agents are involved.
Since asking agents to provide their complete rankings is impractical, a popular notion is one
of elicitation, where we ask agents simple comparison queries, such as if they prefer alternative X
over Y . This naturally gives rise to the problem of preference elicitation, where we hope to recover
the complete ranking (or possibly the most relevant part of the ranking) based on a small number
of queries.
The paradigm of voting is a popular general methodology for aggregating preferences, where
one devises “voting rules” for mapping a collection of preferences (which we refer to as votes) to
either a winning alternative or a consensus ranking. Keeping in line with the terminology used
in voting, we will refer to alternatives as candidates, and a collection of votes will be termed a
preference profile. In the context of a fixed voting rule, we may also want to query the voters up to
the point of determining the winner (or the aggregate ranking, as the case may be). Yet another
refinement in this setting is when we have prior information about how agents are likely to vote,
and we may want to determine which voters to query first, to be able to quickly rule out a large
number of alternatives, as explored by [CS02].
When our goal is to elicit preferences that have no prior structure, one can demonstrate scenarios where it is imperative to ask each agent (almost) as many queries as would be required to
determine an arbitrary ranking. However, in recent times, there has been considerable interest in
voting profiles that are endowed with additional structure. The motivation for this is two-fold.
The first is that in several application scenarios commonly considered, it is rare that votes are adhoc, demonstrating no patterns whatsoever. For example, the notion of single-peaked preferences,
which we will soon discuss at length, forms the basis of several studies in the analytical political sciences [HM97]. In his work on eliciting preferences that demonstrate the “single-peaked”
structure, [Con09] argues that the notion of single-peakedness is also a reasonable restriction in
applications outside of the domain of political elections.
The second motivation for studying restricted preferences is somewhat more technical, but is
just as compelling. To understand why structured preferences have received considerable attention
from social choice theorists, we must first take a brief detour into some of the foundational ideas
that have shaped the landscape of voting rules as we understand them today. As it turns out, the
axiomatic approach of social choice involves defining certain “properties” that formally capture the
quality of a voting rule. For example, we would not want a voting rule to be, informally speaking, a
dictatorship, which would essentially mean that it discards all but one voter’s input. Unfortunately,
a series of cornerstone results establish that it is impossible to devise voting rules which respect
some of the simplest desirable properties. Indeed, the classic works of Arrow [Arr50] and GibbardSatterthwaite [Gib73, Sat75] show that there is no straight forward way to simultaneously deal
with properties like voting paradoxes, strategy-proofness, nondictatorship, unanimity etc. We refer
to [Mou91] for a more elaborate discussion. Making the matter worse, many classical voting rules
turn out to be computationally intractable.
This brings us to the second reason for why structured preferences are an important consideration. The notion of single-peakedness that we mentioned earlier is an excellent illustration (we
refer the reader to Section 2 for the formal definition). Introduced by [Bla48], it not only captures
the essence of structure in political elections, but also turns out to be extremely conducive to many
natural theoretical considerations. To begin with, one can devise voting rules that are “nice” with
respect to several properties, when preferences are single-peaked. Further, they are structurally
elegant from the view of winner determination, since they always admit a weak Condorcet winner
— a candidate which is not defeated by any other candidate in pairwise election — thus working
around the Condorcet paradox which is otherwise a prominent concern in the general scenario. In
a landmark contribution, [BBHH15] show that several computational problems that are intractable
in the general setting become polynomially solvable when we consider single-peaked preferences.
A natural question at this point is if the problem of elicitation becomes any easier — that is,
if we can get away with fewer queries — by taking advantage of the structure provided by single-
peakedness. It turns out that the answer to this is in the affirmative, as shown in a detailed study
by [Con09]. The definition of single-peakedness involves an ordering over the candidates (called the
harmonious ordering by some authors). The work of [Con09] shows that O(mn) queries suffice,
assuming either that the harmonious ordering is given, or one of the votes is known. Dey and
Misra [DM16] show a query complexity bound of O(mn) for the domain of single crossing profiles
and a large number of voters.
We now return to the theme of structural restrictions on preferences. As it turns out, the
single peaked preference domain has subsequently been generalized to single peakedness on trees
(roughly speaking, these are profiles that are single peaked on every path) [Dem82, Tri89]. This is
a class that continues to exhibit many desirable properties of single peaked domains. For example,
there always exists a weak Condorcet winner and further, many voting rules that are intractable in
unrestricted domain are polynomial time computable if the underlying single peaked tree is “nice”
[YCE13, PE16]. We note the class of profiles that are single peaked on trees are substantially more
general than the class of single peaked preferences. Note that the latter is a special case since a
path is, in particular, a tree. Our work here addresses the issue of elicitation on profiles that are
single-peaked on trees, and can be seen as a significant generalization of the results in [Con09]. We
now detail the specifics of our contributions.
Parameter
Upper Bound
Lower Bound
Path width (w)
Maximum degree (∆)
Path cover number (k)
Number of leaves (`)
Distance from path (d)
Diameter (ω)
O(mn log m) Observation 1
O(mn log m) Observation 1
O(mn log k) Theorem 2
O(mn log `) Corollary 1
O(mn + nd log d) Theorem 3
O(mn log m) Observation 1
Ω(mn log m) even for w = 1, log m Corollary 3
Ω(mn log m) even for ∆ = 3, m − 1 Corollary 4
Ω(mn log k) Corollary 2
Ω(mn log `) Theorem 4
Ω(mn + nd log d) Theorem 6
Ω(mn log m) even for ω = 2, m/2 Corollary 5
Table 1: Summary of query complexity bounds for Preference Elicitation.
1.1
Motivation
1.2
Our Contributions
We study the query complexity for preference elicitation when the preference profile is single peaked
on a tree. We provide tight connections between various parameters of the underlying tree and the
query complexity for preference elicitation. Our broad goal is to provide a suitable generalization of
preference elicitation for single peaked profiles to profiles that are single peaked on trees. Therefore,
we consider various ways of quantifying the “closeness” of a tree to a path, and reflect on how these
measures might factor into the query complexity of an algorithm that is actively exploiting the
underlying tree structure.
We summarize our results for preference elicitation in Table 1, where the readers will note that
most of the parameters (except diameter) chosen are small constants (typically zero, one or two)
when the tree under consideration is a path. Observe that in some cases — such as the number
of leaves, or the path cover number — the dependence on the parameter is transparent (and we
recover the results of [Con09] as a special case), while in other cases, it is clear that the perspective
provides no additional mileage (the non-trivial results here are the matching lower bounds).
In terms of technique, our strategy is to “scoop out the paths from the tree” and use known
algorithms to efficiently elicit the preference on the parts of the trees that are paths. We then
efficiently merge this information across the board, and that aspect of the algorithm varies depending on the parameter considered. The lower bounds typically come from trees that provide large
“degrees of freedom” in reordering candidates, typically these are trees that don’t have too many
long paths (such as stars). The arguments are often subtle but intuitive.
We then study the query complexity for finding a weak Condorcet winner of a preference profile
which is single peaked on a tree. Here, we are able to show that a weak Condorcet winner can
be found with far fewer queries than the corresponding elicitation problem. In particular, we
establish that a weak Condorcet winner can be found using O(mn) many queries for profiles that
are single peaked on trees [Theorem 7], and we also show that this bound is the best that we can
hope for [Theorem 10]. We also consider the problem for the special case of single peaked profiles.
While [Con09] showed that Ω(mn) queries are necessary to determine the aggregate ranking, we
show that only O(n log m) queries suffice if we are just interested in (one of the) weak Condorcet
winners. Moreover, we show this bound is tight under the condition that the algorithm does not
interleave queries to different voters [Theorem 11] (our algorithm indeed satisfies this condition).
Finally, expressing the query complexity for determining a weak Condorcet winner in terms of
a measure of closeness to a path, we show an algorithm with query complexity O(nk log m) where
k is the path cover number of T [Theorem 12] or the number of leaves in T [Corollary 6]. We now
elaborate further on our specific contributions for preference elicitation.
– We design novel algorithms for preference elicitation for profiles which are single peaked on
a tree with ` leaves with query complexity O(mn log `) [Corollary 1]. Moreover, we prove
that there exists a tree T with ` leaves such that any preference elicitation algorithm for
profiles which are single peaked on tree T has query complexity Ω(mn log `) [Theorem 4]. We
show similar results for the parameter path cover number of the underlying tree [Theorem 2
and Corollary 2]. We provide a preference elicitation algorithm with query complexity O(mn+
nd log d) for single peaked profiles on trees which can be made into a path by deleting at most
d nodes [Theorem 3]. We show that our query complexity upper bound is tight up to constant
factors [Theorem 6]. These results show that the query complexity tightly depends on the
number of leaves, the path cover number, and the distance from path of the underlying tree.
– We then show that there exists a tree T with pathwidth one or log m [Corollary 3] or maximum degree is 3 or m − 1 [Corollary 4] or diameter is 2 or m/2 [Corollary 5] such that any
preference elicitation algorithm for single peaked profiles on the tree T has query complexity
Ω(mn log m). These results show that the query complexity of preference elicitation does not
directly depend on the parameters above.
We next study query complexity for finding a weak Condorcet winner for profiles which are
single peaked on trees and we have the following results.
– We show that a weak Condorcet winner can be found using O(mn) many queries for profiles
that are single peaked on trees [Theorem 7] which is better than the query complexity for
preference elicitation. Moreover, we prove that this bound is tight in the sense that any
algorithm for finding a weak Condorcet winner for profiles that are single peaked on stars has
query complexity Ω(mn) [Theorem 10].
– On the other hand, we can find a weak Condorcet winner using only O(n log m) many queries
for single peaked profiles [Theorem 8]. Moreover, we show this bound is tight under the
condition that the algorithm does not interleave queries to different voters [Theorem 11] (our
algorithm indeed satisfies this condition). For any arbitrary underlying single peaked tree
T , we provide an algorithm for finding a weak Condorcet winner with query complexity
O(nk log m) where k is the path cover number of T [Theorem 12] or the number of leaves in
T [Corollary 6].
To summarize, we remark that our results non-trivially generalize earlier works on query complexity for preference elicitation in [Con09]. We believe revisiting the preference elicitation problem
in the context of profiles that are single peaked on trees is timely, and that this work also provides
fresh algorithmic and structural insights on the domain of preferences that are single peaked on
trees.
1.3
Related Work
We have already mentioned the work of [Con09] addressing the question of eliciting preferences
in single-peaked profiles, which is the closest predecessor to our work. Before this, Conitzer and
Sandholm addressed the computational hardness for querying minimally for winner determination
[CS02]. They also prove that one would need to make Ω(mn log m) queries even to decide the winner
for many commonly used voting rules [CS05] which matches with the trivial O(mn log m) upper
bound for preference elicitation in unrestricted domain based on sorting. Ding and Lin study
preference elicitation under partial information setting and show interesting properties of what
they call a deciding set of queries [DL13]. Lu and Boutilier provide empirical study of preference
elicitation under probabilistic preference model [LB11b] and devise several novel heuristics which
often work well in practice [LB11a].
The rest of the paper is organized as follows: We introduce the basic terminologies and formally
define the problems in Section 2, present results for eliciting preference profile and finding a weak
Condorcet winner in Section 3 and Section 4 respectively, and conclude with future works in
Section 5.
2
Preliminaries
For a positive integer n, we denote the set {1, . . . , n} by [n]. Suppose we have a set V = {vi ∶ i ∈ [n]}
of n voters each of which has a preference ≻i , i ∈ [n], alternatively called vote, which is a complete
order over a set C = {cj ∶ j ∈ [m]} of m candidates. We denote the set of preferences over C by L(C).
The tuple (≻i )i∈[n] of the preferences of all the voters is called a profile. If not mentioned otherwise,
we use m and n to denote the number of candidates and the number of voters respectively. Let
≻ ∈ L(C) be any complete order over C. For a subset X ⊆ C of candidates, we denote the restriction
of an order ≻ to the subset of candidates X by ≻ (X ). We denote the restriction of a profile
P = (≻i )i∈[n] to X by P(X ) = (≻i (X ))i∈[n] . We say that a candidate x ∈ C is placed at the ith
position of a preference ≻ ∈ L(C) if x is preferred over all but exactly (i − 1) candidates in ≻. Given
an n voters profile P = (≻i )i∈[n] , a candidate x is called a Condorcet winner of P if for every other
candidate y, a strict majority of the voters prefer x over y; that is ∣{i ∈ [n] ∶ x ≻i y}∣ > n/2 for every
y ∈ C ∖ {x}. A candidate x is called a weak Condorcet winner of an n voters profile P = (≻i )i∈[n] if
there does not exist any other candidate y whom a strict majority of the voters prefer over x; that
is ∣{i ∈ [n] ∶ y ≻i x}∣ ≤ n/2 for every y ∈ C ∖ {x}. For an order ≻ ∈ L(C), we denote the “reverse order”
Ð
Ð
Ð
of ≻ by ←
≻ ; that is ←
≻ = {x←
≻ y ∶ x, y ∈ C and y ≻ x}. A preference ≻ ∈ L(C) over a set of candidates
C is called single peaked with respect to an order ≻′ ∈ L(C) if, for every candidates x, y ∈ C, we have
x ≻ y whenever we have either c ≻′ x ≻′ y or y ≻′ x ≻′ c, where c ∈ C is the candidate at the first
position of ≻. A profile P = (≻i )i∈[n] is called single peaked with respect to an order ≻′ ∈ L(C) if ≻i
is single peaked with respect to ≻′ for every i ∈ [n]. Notice that if a profile P is single peaked
Ð
with respect to an order ≻′ ∈ L(C), then P is also single peaked with respect to the order ←
≻ ′ . Given
a path Q = (x1 , x2 , . . . , x` ) from a vertex x1 to another vertex x` in a tree T , we define the order
induced by the path Q to be x1 ≻ x2 ≻ ⋯ ≻ x` . Given a tree T = (C, E) with the set of nodes as
the set of candidates C, a profile P is called single peaked on the tree T if P is single peaked on
the order induced by every path of the tree T ; that is for every two candidates x, y ∈ C, the profile
P(X ) is single peaked with respect to the order ≻ of the candidates X induced by the unique path
from x to y in T . We call the tree T the underlying single peaked tree. It is known (c.f. [Dem82])
that there always exists a weakly Condorcet winner for a profile P which is single peaked on a tree
T.
Trees.
The following definitions pertaining to the structural aspects of trees will be useful.
– The pathwidth of T is the minimum width of a path decomposition of T [Hei93].
– A set of disjoint paths Q = {Q1 = (X1 , E1 ), . . . , Qk = (Xk , Ek )} is said to cover a tree T = (X , E)
if X = ∪i∈[k] Xi , Ei ⊆ E, Xi ∩ Xj = ∅, Ei ∩ Ej = ∅ for every i, j ∈ [k] with i ≠ j. The path cover
number of T is the cardinality of the smallest set Q of disjoint paths that cover T .
– The distance of a tree T from a path is the smallest number of nodes whose removal makes
the tree a path.
– The diameter of a tree T is the number of edges in the longest path in T .
We also list some definitions of subclasses of trees (which are special types of trees, see also Figure 1).
– A tree is a star if there is a center vertex and every other vertex is a neighbor of this vertex.
– A tree is a subdivision of a star if it can be constructed by replacing each edge of a star by a
path.
– A subdivision of a star is called balanced if there exists an integer ` such that the distance of
every leaf node from the center is `.
– A tree is a caterpillar if there is a central path and every other vertex is at a distance of one
it.
– A tree is a complete binary tree rooted at r if every nonleaf node has exactly two children
and there exists an integer h, called the height of the tree, such that every leaf node is at a
distance of either h or h − 1 from the root node r.
Figure 1: Depicting classes of trees: (a) a path, (b) a star, (c) a (balanced) subdivision of a star,
(d) a caterpillar.
Problem Definitions and Known Results. Suppose we have a profile P with n voters and
m candidates. For any pair of distinct candidates x and y, and a voter ` ∈ [n], we introduce the
boolean-valued function Query(x ≻` y). The output of this function is true if the voter ` prefers
the candidate x over the candidate y and false otherwise. We now formally state the two problems
that we consider in this paper.
Definition 1 Preference Elicitation
Given a tree T = (C, E) and an oracle access to the function Query(⋅) for a profile P which is
single peaked on T , find P.
Definition 2 Weak Condorcet Winner
Given a tree T = (C, E) and an oracle access to the function Query(⋅) for a profile P which is
single peaked on T , find a weak Condorcet winner of P.
Suppose we have a set of candidates C = {c1 , . . . , cm }. We say that an algorithm A makes q
queries if there are exactly q distinct tuples (`, ci , cj ) ∈ [n] × C × C with i < j such that A calls
Query(ci ≻` cj ) or Query(cj ≻` ci ). We call the number of queries made by an algorithm A its
query complexity.
We state some known results that we will appeal to later. The first observation employs a
sorting algorithm like merge sort to elicit every vote with O(m log m) queries, while the second
follows from the linear-time merge subroutine of merge sort ([Cor09]).
Observation 1 There is a Preference Elicitation algorithm with query complexity
O(mn log m).
Observation 2 Suppose C1 , C2 ⊆ C form a partition of C and ≻ is a ranking of the candidates in
C. Then there is a polynomial time algorithm that finds ≻ given ≻ (C1 ) and ≻ (C2 ) with query
complexity O(∣C∣).
Theorem 1 [Con09] There is a Preference Elicitation algorithm with query complexity
O(mn) for single peaked profiles.
We now state the Weak Condorcet Winner problem, which asks for eliciting only up to the
point of determining a weak Condercet winner (recall that at least one such winner is guaranteed
to exist on profiles that are single-peaked on trees).
Definition 3 Weak Condorcet Winner
Given a tree T = (C, E) and an oracle access to the function Query(⋅) for a profile P which is
single peaked on T , find a weak Condorcet winner of P.
3
Results for Preference Elicitation
In this section, we present our results for Preference Elicitation for profiles that are single
peaked on trees. Recall that we would like to generalize Theorem 1 in a way to profiles that are
single peaked on trees. Since the usual single peaked profiles can be viewed as profiles single peaked
with respect to a path, we propose the following measures of how much a tree resembles a path.
– Leaves. Recall any tree has at least two leaves, and paths are the trees that have exactly two
leaves. We consider the class of trees that have ` leaves, and show an algorithm with a query
complexity of O(mn log `).
– Path Cover. Consider the notion of a path cover number of a tree, which is the smallest number
of disjoint paths that the tree can be partitioned into. Clearly, the path cover number of a
path is one; and for trees that can be covered with k paths, we show an algorithm with query
complexity O(mn log k).
– Distance from Paths. Let d be the size of the smallest set of vertices whose removal makes
the tree a path. Again, if the tree is a path, then the said set is simply the empty set. For
trees that are at a distance d from being a path (in the sense of vertex deletion), we provide
an algorithm with query complexity O(mn log d).
– Pathwidth and Maximum Degree. Finally, we note that paths are also trees that have pathwidth one, and maximum degree two. These perspectives turn out to be less useful: in
particular, there are trees where these parameters are constant, for which we show that elicitation is as hard as it would be on an arbitrary profile, and therefore the easy algorithm
from Observation 1 is actually the best that we can hope for.
For the first three perspectives that we employ, that seemingly capture an appropriate aspect
of paths and carry it forward to trees, the query complexities that we obtain are tight — we have
matching lower bounds in all cases. Also, while considering structural parameters, it is natural to
wonder if there is a class of trees that are incomparable with paths but effective for elicitation. Our
attempt in this direction is to consider trees of bounded diameter. However, again, we find that
this is not useful, as we have examples to show that there exist trees of diameter two that are as
hard to elicit as general profiles.
We remark at this point that all these parameters are polynomially computable for trees, making the algorithmic results viable. Also, for the parameters of pathwidth, maximum degree and
diameter, we show lower bounds on trees where these parameters are large (such as trees with pathwidth O(log m), maximum degree m − 1, and diameter m/2), which — roughly speaking — also
rules out the possibility of getting a good inverse dependence. As a concrete example, motivated by
the O(mn) algorithm for paths, which have diameter m, one might wonder if there is an algorithm
with query complexity O( mnloglogω m ). This possibility, in particular, is ruled out. We are now ready
to discuss the results in Table 1.
We next show a structural result about trees namely any tree with ` leaves can be partitioned
into ` paths. The idea is to fix some nonleaf node as root and iteratively find a path from low
depth nodes (depth of a node is its distance from root) to some leaf node which is disjoint from all
the paths chosen so far. We formalize this idea below.
Lemma 1 Let T = (X , E) be a tree with ` leaves. Then there is a polynomial time algorithm which
partitions T into ` disjoint paths Qi = (Xi , Ei ), i ∈ [`]; that is we have Xi ∩ Xj = ∅, Ei ∩ Ej = ∅ for
every i, j ∈ [`] with i ≠ j, X = ∪i∈[`] Xi , E = ∪i∈[`] Ei , and Qi is a path in T .
Proof: We first make the tree T rooted at any arbitrary nonleaf node r. We now partition the
tree T into paths iteratively as follows. Initially every node of the tree T is unmarked and the
set of paths Q we have is empty. Let Q1 = (X1 , E1 ) be the path in T from the root node to any
leaf node. We put Q1 into Q and mark all the nodes in Q1 . More generally, in the ith iteration
we pick an unmarked node u that is closest to the root r, breaking ties arbitrarily, and add any
path Qi in T from u to any leaf node in the subtree Tu rooted at u, and mark all the nodes in
Qi = (Xi , Ei ). Since u is unmarked, we claim that every node in Tu is unmarked. Indeed, otherwise
suppose there is a node w in Tu which is already marked. Then there exists two paths from r to w
one including u and another avoiding u since u is currently unmarked and w is already marked.
This contradicts the fact that T is a tree. Hence every node in Tu is unmarked. We continue until
all the leaf nodes are marked and return Q. Since T has ` leaves and in every iteration at least
one leaf node is marked (since every Qi contains a leaf node), the algorithm runs for at most `
iterations. Notice that, since the algorithm always picks a path consisting of unmarked vertices
only, the set of paths in Q are pairwise disjoint. We claim that Q forms a partition of T . Indeed,
otherwise there must be a node x in T that remains unmarked at the end. From the claim above,
we have all the nodes in the subtree Tx rooted at x unmarked which includes at least one leaf node
of T . This contradicts the fact that the algorithm terminates when all the leaf nodes are marked. ◻
Using Lemma 1, and the fact that any path can account for at most two leaves, we have that
the path cover number of a tree is same as the number of leaves up to a factor of two.
Lemma 2 Suppose the path cover number of a tree T with ` leaves is k. Then we have `/2 ≤ k ≤ `.
Proof: The inequality `/2 ≤ k follows from the fact that any path in T can involve at most two
leaves in T and there exists k paths covering all the leaf nodes. The inequality k ≤ ` follows from
the fact from Lemma 1 that any tree T with ` leaves can be partitioned into ` paths.
◻
3.1
Algorithmic Results
We now present our main algorithmic results. We begin with generalizing the result of Theorem 1
to any single peaked profiles on trees whose path cover number is at most k. The idea is to partition
the tree into k disjoint paths, use the algorithm from Theorem 1 on each paths to obtain an order
of the candidates on each path of the partition, and finally merge these suborders intelligently. We
now formalize this idea as follows.
Theorem 2 There is a Preference Elicitation algorithm with query complexity O(mn log k)
for profiles that are single peaked on trees with path cover number at most k.
Proof: Since the path cover number is at most k, We can partition the tree T = (C, E) into t disjoint
paths Pi = (Ci , Ei ), i ∈ [t], where t is at most k. We now show that we can elicit any preference
≻ which is single peaked on the tree T by making O(m log t) queries which in turn proves the
statement. We first find the preference ordering restricted to Ci using Theorem 1 by making
O(∣Ci ∣) queries for every i ∈ [t]. This step needs ∑i∈[t] O(∣Ci ∣) = O(m) queries since Ci , i ∈ [t] forms
a partition of C. We next merge the t orders ≻ (Ci ), i ∈ [t], to obtain the complete preference ≻ by
using a standard divide and conquer approach for t-way merging which makes O(m log t) queries
[HUA83]. Thus the query complexity of the algorithms is O(m + m log t) = O(m log k).
◻
Towards our results on leaves, we show that the path cover of a tree with ` leaves is at least
⌊`/2⌋ and at most `. The lower bound is easy since every path can account for at most two leaves.
The upper bound comes from a careful partitioning of the nodes following maximal paths from
leaves up to a root and using a careful marking scheme. We defer the details of this argument to
a full version. Using the fact that a tree with ` leaves can be partitioned into at most ` paths, we
can use the algorithm from Theorem 2 to obtain the following bound in terms of leaves.
Initially we have t orders to merge. We arbitrarily pair the t orders into ⌈t/2⌉ pairs with at most
one of them being singleton (when t is odd). By renaming, suppose the pairings are as follows:
(≻ (C2i−1 ), ≻ (C2i )), i ∈ [⌊t/2⌋]. Let us define Ci′ = C2i−1 ∪ C2i for every i ∈ [⌊t/2⌋] and C⌈′t/2⌉ = Ct if t is an
odd integer. We merge ≻ (C2i−1 ) and ≻ (C2i ) to get ≻ (Ci′ ) for every i ∈ [⌊t/2⌋] using Observation 2.
The number queries the algorithm makes in this iteration is ∑i∈[⌊t/2⌋] O(∣C2i−1 ∣ + ∣C2i ∣) = O(m) since
(Ci )i∈[t] forms a partition of C. At the end of the first iteration, we have ⌈t/2⌉ orders ≻ (Ci′ ), i ∈ [⌈t/2⌉]
to merge to get ≻. The algorithm repeats the step above O(log t) times to obtain ≻ and the query
complexity of each iteration is O(m).
Corollary 1 There is a Preference Elicitation algorithm with query complexity O(mn log `)
for profiles that are single peaked on trees with at most ` leaves.
Finally, if we are given a subset of vertices whose removal makes the given tree a path, then
we have an elicitation algorithm that makes O(mn + nd log d). As before, we can determine the
ordering among the candidates on the path with O(m − d) queries, and we determine the ordering
among the rest in O(d log d) queries using Observation 1, and finally merge using Observation 2.
This leads us to the following.
Theorem 3 There is a Preference Elicitation algorithm with query complexity O(mn +
nd log d) for profiles that are single peaked on trees with distance d from path.
Proof: Let X be the smallest set of nodes of a tree T = (C, E) such that T ∖ X , the subgraph of
T after removal of the nodes in X , is a path. We have ∣X ∣ ≤ d. For any preference ≻, we make
O(d log d) queries to find ≻ (X ) using Observation 1, make O(∣C ∖ X ∣) = O(m − d) queries to
find ≻ (C ∖ X ) using Theorem 1, and finally make O(m) queries to find ≻ by merging ≻ (X ) and
≻ (C ∖ X ) using Observation 2. This gives an overall query complexity of O(mn + nd log d).
◻
3.2
Lower Bounds
We now turn to the lower bounds. Our first result is based on a counting argument, showing that
the query complexity in terms of the number of leaves, given by Corollary 1, is tight up to constant
factors. Indeed, let us consider a subdivision of a star with ` leaves and let t denote the distance
from the center, so that we have a total of t` + 1 vertices. One can show that if the candidates are
written out in level order, the candidates that are distance i from the star can be ordered arbitrarily
within this ordering. This tells us that the number of possible preferences ≻ that are single peaked
on the tree T is at least (`!)t . We obtain the lower bound by using a decision tree argument,
wherein we are able to show that it is always possible for an oracle answering the comparison
queries to answer in such a way that the total space of possibilities decreases by at most a factor
of half. Since the tree must entertain at least (`!)t leaves to account for all possibilities, we obtain
the claimed lower bound.
Theorem 4 Let T = (C, E) be a balanced subdivision of a star with ` leaves. Then any Preference Elicitation algorithm for single peaked profiles on T has query complexity Ω(mn log `).
Proof: Suppose the number of candidates m be (t` + 1) for some integer t. Let c be the center
of T . We denote the shortest path distance between any two nodes x, y ∈ C in T by d(x, y). We
consider the partition (C0 , . . . , Ct ) of the set of candidates C where Ci = {x ∈ C ∶ d(x, c) = i}. We
claim that the preference ≻= π0 ≻ π1 ≻ ⋯ ≻ πt of the set of candidates C is single peaked on the
tree T where πi is any arbitrary order of the candidates in Ci for every 0 ≤ i ≤ t. Indeed; consider
any path Q = (X , E ′ ) in the tree T . Let y be the candidate closest to c among the candidates in
X ; that is y = argminx∈X d(x, c). Then clearly ≻ (X ) is single peaked with respect to the path Q
having peak at y. We have ∣Ci ∣ = ` for every i ∈ [t] and thus the number of possible preferences ≻
that are single peaked on the tree T is at least (`!)t .
Let A be any Preference Elicitation algorithm for single peaked profiles on the tree T .
We now describe our oracle to answer the queries that the algorithm A makes. For every voter
v, the oracle maintains the set Rv of possible preferences of the voter v which is consistent with
the answers to all the queries that the algorithm A have already made for the voter v. At the
beginning, we have ∣Rv ∣ ≥ (`!)t for every voter v as argued above. Whenever the oracle receives a
query on v for any two candidates x and y, it computes the numbers n1 and n2 of orders in Rv
which prefers x over y and y over x respectively; the oracle can compute the integers n1 and n2
since the oracle has infinite computational power. The oracle answers that the voter v prefers the
candidate x over y if and only if n1 ≥ n2 and updates the set Rv accordingly. Hence, whenever the
oracle is queried for a voter v, the size of the set Rv decreases by a factor of at most two. On the
other hand, we must have, from the correctness of the algorithm, Rv to be a singleton set when
the algorithm terminates for every voter v – otherwise there exists a voter v (whose corresponding
Rv is not singleton) for which there exist two possible preferences which are single peaked on the
tree T and are consistent with all the answers the oracle has given and thus the algorithm A
fails to output the preference of the voter v correctly. Hence every voter must be queried at least
Ω(log((`!)t )) = Ω(t` log `) = Ω(m log `) times.
◻
Since the path cover number of a subdivided star on ` leaves is at least `/2, we also have the
following.
Corollary 2 There exists a tree T with path cover number k such that any Preference Elicitation algorithm for single peaked profiles on T has query complexity Ω(mn log k).
Mimicking the level order argument above on a generic tree with ` leaves, and using the connection between path cover and leaves, we obtain lower bounds that are functions of (n, `) and (n, k),
as given below. This will be useful for our subsequent results.
Theorem 5 Let T = (C, E) be any arbitrary tree with ` leaves and path cover number k. Then
any Preference Elicitation algorithm for single peaked profiles on T has query complexity
Ω(n` log `) and Ω(nk log k).
Proof: Let X be the set of leaves in T . We choose any arbitrary nonleaf node r as the root of T .
We denote the shortest path distance between two candidates x, y ∈ C in the tree T by d(x, y). Let
t be the maximum distance of a node from r in T ; that is t = maxy∈C∖X d(r, x). We partition the
candidates in C ∖ X as (C0 , C1 , . . . , Ct ) where Ci = {y ∈ C ∖ X ∶ d(r, y) = i} for 0 ≤ i ≤ t. We claim
that the preference ≻= π0 ≻ π1 ≻ ⋯ ≻ πt ≻ π of the set of candidates C is single peaked on the tree
T where πi is any arbitrary order of the candidates in Ci for every 0 ≤ i ≤ t and π is an arbitrary
order of the candidates in C ∖ X . Indeed, otherwise consider any path Q = (Y, E ′ ) in the tree T .
Let y be the candidate closest to r among the candidates in Y; that is y = argminx∈Y d(x, r). Then
clearly ≻ (Y) is single peaked with respect to the path Q having peak at y. We have the number
of possible preferences ≻ that are single peaked on the tree T is at least ∣X ∣! = `!. Again using
the oracle same as in the proof of Theorem 4, we deduce that any Preference Elicitation
algorithm A for profiles that are single peaked on the tree T needs to make Ω(n` log `) queries.
The bound with respect to the path cover number now follows from Lemma 2.
◻
The following results can be obtained simply by applying Theorem 5 on particular graphs. For
instance, we use the fact that stars have (m − 1) leaves and have pathwidth one to obtain the first
part of Corollary 3, while appealing to complete binary trees that have O(m) leaves and pathwidth
O(log m) for the second part. These examples also work in the context of maximum degree, while
for diameter we use stars and caterpillars with a central path of length m/2.
We next consider the parameter pathwidth of the underlying single peaked tree. We immediately
get the following result for Preference Elicitation on trees with pathwidths one or log m from
Theorem 5 and the fact that the pathwidths of a star and a complete binary tree are one and log m
respectively.
Corollary 3 There exist two trees T and T ′ with pathwidths one and log m respectively such that
any Preference Elicitation algorithm for single peaked profiles on T and T ′ respectively has
query complexity Ω(mn log m).
Corollary 4 There exist two trees T and T ′ with maximum degree ∆ = 3 and m−1 respectively such
that any Preference Elicitation algorithm for single peaked profiles on T and T ′ respectively
has query complexity Ω(mn log m).
Proof: Using Theorem 5, we know that any Preference Elicitation algorithm for profiles
which are single peaked on a complete binary tree has query complexity Ω(mn log m) since a
complete binary tree has Ω(m) leaves. The result now follows from the fact that the maximum
degree ∆ of a node is three for any binary tree. The case of ∆ = m − 1 follows immediately from
Theorem 5 applied on stars.
◻
Corollary 5 There exists two trees T and T ′ with diameters ω = 2 and ω = m/2 respectively such
that any Preference Elicitation algorithm for profiles which are single peaked on T and T ′
respectively has query complexity Ω(mn log m).
Proof: The ω = 2 and ω = m/2 cases follow from Theorem 5 applied on star and caterpillar graphs
with a central path of length m/2 respectively.
◻
Our final result, which again follows from Theorem 5 applied of caterpillar graphs with a central
path of length m − d, shows that the bound in Theorem 3 is tight.
Theorem 6 For any integers m and d with 1 ≤ d ≤ m/4, there exists a tree T with distance d from
path such that any Preference Elicitation algorithm for profiles which are single peaked on T
has query complexity Ω(mn + nd log d).
Proof: Consider the caterpillar graph where the length of the central path Q is m − d; there exists
such a caterpillar graph since d ≤ m/4. Consider the order ≻= π ≻ σ of the set of candidates C
where π is an order of the candidates in Q which is single peaked on Q and σ is any order of the
candidates in C ∖ Q. Clearly, ≻ is single peaked on the tree T . Any elicitation algorithm A needs to
make Ω(m − d) queries involving only the candidates in Q to elicit π due to [Con09] and Ω(d log d)
queries to elicit σ due to sorting lower bound for every voter. This proves the statement.
◻
4
Weak Condorcet Winner
We now show that we can find a weak Condorcet winner of profiles that are single peaked on trees
using fewer queries than the number of queries needed to find the profile itself. First, note that if
a Condorcet winner is guaranteed to exist, then it can be found using O(mn) queries — we pit an
arbitrary pair of candidates x, y and use O(n) queries to determine if x defeats y. We push the
winning candidate forward and repeat the procedure, clearly requiring at most m rounds. Now,
if a profile is single peaked with respect to a tree, and there are an odd number of voters, then
we have a Condorcet winner and the procedure that we just described would work. Otherwise, we
simply find a Condorcet winner among the first (n − 1) voters. It can be shown that such a winner
is one of the weak Condorcet winners for the overall profile, and we therefore have the following
upper bound.
We begin with the following general observation.
Observation 3 Let P be a profile where a Condorcet winner is guaranteed to exist. Then we can
find the Condorcet winner of P by making O(mn) queries.
Proof: For any two candidates x, y ∈ C we find whether x defeats y or not by simply asking all
the voters to compare x and y; this takes O(n) queries. The algorithms maintains a set S of
candidates which are potential Condorcet winners. We initialize S to C. In each iteration we pick
any two candidates x, y ∈ S from S, remove x from S if x does not defeat y and vice versa using
O(n) query complexity until S is singleton. After at most m − 1 iterations, the set S will be
singleton and contain only Condorcet winner since we find a candidate which is not a Condorcet
winner in every iteration and thus the size of the set S decreases by at least one in every iteration.
This gives a query complexity bound of O(mn).
◻
Using Observation 3 we now develop a Weak Condorcet Winner algorithm with query
complexity O(mn) for profiles that are single peaked on trees.
Theorem 7 There is a Weak Condorcet Winner algorithm with query complexity O(mn) for
single peaked profiles on trees.
For the special case of single peaked profiles, we can do even better. Here we take advantage of
the fact that a “median candidate” [MCWG+ 95] is guaranteed to be a weak Condorcet winner. We
make O(log m) queries per vote to find the candidates placed at the first position of all the votes
using the algorithm in [Con09] and find a median candidate to show the following.
if a profile is single peaked (on a path), then there is a Weak Condorcet Winner algorithm
with query complexity O(n log m) as shown below. Let us define the frequency f (x) of a candidate
x ∈ C to be the number of votes where x is placed at the first position. Then we know that a median
candidate according to the single peaked ordering of the candidates along with their frequencies as
defined above is a weak Condorcet winner for single peaked profiles [MCWG+ 95].
Theorem 8 There is a Weak Condorcet Winner algorithm with query complexity O(n log m)
for single peaked profiles (on a path).
Proof: Let P be a profile that is single peaked with respect to an ordering ≻∈ L(C) of candidates.
Then we find, for every voter v, the candidate the voter v places at the first position using
O(log m) queries using the algorithm in [Con09] and return a median candidate.
◻
Proof: Let P = (≻i )i∈[n] be a profile which is single peaked on a tree T . If n is an odd integer, then
we know that there exists a Condorcet winner in P since no two candidates can tie and there always
exists at least one weak Condorcet winner in every single peaked profile on trees. Hence, if n is an
odd integer, then we use Observation 3 to find a weak Condorcet winner which is the Condorcet
winner too. Hence let us now assume that n is an even integer. Notice that P−1 = (≻2 , . . . , ≻n ) is
also single peaked on T and has an odd number of voters and thus has a Condorcet winner. We
use Observation 3 to find the Condorcet winner c of P−1 and output c as a weak Condorcet winner
of P. We claim that c is a weak Condorcet winner of P. Indeed otherwise there exists a candidate
x other than c who defeats c in P. Since n is an even integer, x must defeat c by a margin of at
least two (since all pairwise margins are even integers) in P. But then x also defeats c by a margin
of at least one in P−1 . This contradicts the fact that c is the Condorcet winner of P−1 .
◻
The next result uses Theorem 8 on paths in a path cover eliminating the case of even number of
voters by the idea of setting aside one voter that was used in Theorem 7.
Theorem 9 Let T be a tree with path cover number at most k. Then there is an algorithm for
Weak Condorcet Winner for profiles which are single peaked on T with query complexity
O(nk log m).
Recalling that the number of leaves bounds the path cover number, we have the following
consequence.
Corollary 6 Let T be a tree with ` leaves. Then there is an algorithm for Weak Condorcet
Winner for profiles which are single peaked on T with query complexity O(n` log m).
We now state the lower bounds pertaining to Weak Condorcet Winner. First, we show
that any algorithm for single peaked profiles on stars has query complexity Ω(mn), showing that
the bound of Theorem 7 is tight.
Theorem 10 Any Weak Condorcet Winner algorithm for single peaked profiles on stars must
have query complexity Ω(mn).
Proof: Let T be a star with center vertex c. We now design an oracle that will “force” any Weak
Condorcet Winner algorithm A for single peaked profiles on T to make Ω(mn) queries. For
every voter v, the oracle maintains a set of “marked” candidates which can not be placed at the
first position of the preference of v. Suppose the oracle receives a query to compare two candidates
x and y for a voter `. If the order between x and y for the voter ` follows from the answers the
oracle has already provided to all the queries for the voter `, then the oracle answers accordingly.
Otherwise it answers x ≻` y if y is unmarked and marks y; otherwise the oracle answers y ≻` x and
marks x. Notice that the oracle marks at most one unmarked candidate every time it is queried.
We now claim that there must be at least n/10 votes which have been queried at least m/4 times.
If not, then there exists n − n/10 = 9n/10 votes each of which has at least m − m/4 = 3m/4 candidates
unmarked. In such a scenario, there exists a constant N0 such that for every m, n > N0 , we have
at least two candidates x and y who are unmarked in at least (⌊n/2⌋ + 1) votes each. Now if the
algorithm outputs x, then we put y at the first position in at least (⌊n/2⌋ + 1) votes and at the
second position in the rest of the votes and this makes y the (unique) Condorcet winner. If the
algorithm does not output x, then we put x at the first position in at least (⌊n/2⌋ + 1) votes and
at the second position in the rest of the votes and this makes x the (unique) Condorcet winner.
Hence the algorithm fails to output correctly in both the cases contradicting the correctness
of the algorithm. Also the resulting profile is single peaked on T with center at y in the first
case and at x in the second case. Therefore the algorithm A must have query complexity Ω(mn). ◻
Our concluding result uses an intricate adversary argument, and shows that the query complexity for Weak Condorcet Winner for single peaked profiles in Theorem 8 is essentially optimal,
provided that the queries to different voters are not interleaved, as is the case with our algorithm.
Theorem 11 Any Weak Condorcet Winner algorithm for single peaked profiles which does
not interleave the queries to different voters has query complexity Ω(n log m).
Proof: Let a profile P be single peaked with respect to the ordering of the candidates
≻= c1 ≻ c2 ≻ ⋯ ≻ cm . The oracle maintains two indices ` and r for every voter such that any
candidate from {c` , c`+1 , . . . , cr } can be placed at the first position of the preference of the voter
v and still be consistent with all the answers provided by the oracle for v till now and single
peaked with respect to ≻ . The algorithm initializes ` to one and r to m for every voter. The
oracle answers any query in such a way that maximizes the new value of r − `. More specifically,
suppose the oracle receives a query to compare candidates ci and cj with i < j for a voter v.
If the ordering between ci and cj follows, by applying transitivity, from the answers to the
queries that have already been made so far for this voter, then the oracle answers accordingly.
Otherwise the oracle answers as follows. If i < `, then the oracle answers that cj is preferred over
ci ; else if j > r, then the oracle answers that ci is preferred over cj . Otherwise (that is when
` ≤ i < j ≤ r), if j − ` > r − i, then the oracle answers that ci is preferred over cj and changes r to
j; if j − ` ≤ r − i, then the oracle answers that cj is preferred over ci and changes ` to i. Hence
whenever the oracle answers a query for a voter v, the value of r − ` for that voter v decreases by
a factor of at most two. Suppose the election instance has an odd number of voters. Let V be
the set of voters. Now we claim that the first ⌊n/5⌋ voters must be queried (log m − 1) times each.
Suppose not, then consider the first voter v ′ that is queried less than (log m − 1) times. Then
there exist at least two candidates ct and ct+1 each of which can be placed at the first position of
the vote v ′ . The oracle fixes the candidates at the first positions of all the votes that have not
been queried till v ′ is queried (and there are at least ⌈4n/5⌉ such votes) in such a way that ⌊n/2⌋
voters in V ∖ {v ′ } places some candidate in the left of ct at the first positions and ⌊n/2⌋ voters in
V ∖ {v ′ } places some candidate in the right of ct+1 . If the algorithm outputs ct as the Condorcet
winner, then the oracle makes ct+1 the (unique) Condorcet winner by placing ct+1 at the top
position of v ′ , because ct+1 is the unique median in this case. If the algorithm does not output
ct as the Condorcet winner, then the oracle makes ct the (unique) Condorcet winner by placing
ct at the top position of v ′ , because ct is the unique median in this case. Hence the algorithm
fails to output correctly in both the cases thereby contradicting the correctness of the algorithm. ◻
From Theorem 7 and 8 we have the following result for any arbitrary tree.
Theorem 12 Let T be a tree with path cover number at most k. Then there is an algorithm
for Weak Condorcet Winner for profiles which are single peaked on T with query complexity
O(nk log m).
Proof: Let P be the input profile and Qi = (Xi , Ei ) i ∈ [t] be t(≤ k) disjoint paths that cover
the tree T . Here again, if the number of voters is even, then we remove any arbitrary voter and
the algorithm outputs the Condorcet winner of the rest of the votes. The correctness of this
step follows from the proof of Theorem 7. Hence we assume, without loss of generality, that
we have an odd number of voters. The algorithm proceeds in two stages. In the first stage, we
find the Condorcet winner wi of the profile P(Xi ) for every i ∈ [t] using Theorem 8. The query
complexity of this stage is O(n ∑i∈[t] log ∣Xi ∣) = O(nt log(m/t)). In the second stage, we find the
Condorcet winner w of the profile P({wi ∶ i ∈ [t]}) using Theorem 7 and output w. The query
complexity of the second stage is O(nt log t). Hence the overall query complexity of the algorithm
is O(nt log(m/t)) + O(nt log t) = O(nk log m).
◻
5
Conclusions and Future Work
We show algorithms for preference elicitation for profiles which are single peaked on trees. Moreover,
we prove that the query complexity of our algorithms are optimal up to constant factors. We also
show that we need to query fewer number of times than preference elicitation if we only want to
find any weak Condorcet winner.
In this work we do not assume any partial information about the preferences. However, in
many scenarios, we may have some knowledge about the profile. An interesting future direction
of research is to study how having some partial information helps us reduce query complexity of
preference elicitation.
Acknowledgement
Palash Dey wishes to gratefully acknowledge support from Google India for providing him with a
special fellowship for carrying out his doctoral work.
References
[Arr50]
Kenneth J Arrow. A difficulty in the concept of social welfare. The Journal of Political
Economy, pages 328–346, 1950.
[BBHH15]
Felix Brandt, Markus Brill, Edith Hemaspaandra, and Lane A Hemaspaandra. Bypassing combinatorial protections: Polynomial-time algorithms for single-peaked electorates. Journal of Artificial Intelligence Research (JAIR), pages 439–496, 2015.
[BCE+ 15]
Felix Brandt, Vincent Conitzer, Ulle Endriss, Jérôme Lang, and Ariel Procaccia.
Handbook of computational social choice, 2015.
[Bla48]
Duncan Black. On the rationale of group decision-making. The Journal of Political
Economy, pages 23–34, 1948.
[Con09]
Vincent Conitzer. Eliciting single-peaked preferences using comparison queries. Journal of Artificial Intelligence Research (JAIR), 35:161–191, 2009.
[Cor09]
Thomas H Cormen. Introduction to algorithms. MIT press, 2009.
[CS02]
Vincent Conitzer and Tuomas Sandholm. Vote elicitation: Complexity and strategyproofness. In Eighteenth National Conference on Artificial Intelligence (AAAI), pages
392–397, 2002.
[CS05]
Vincent Conitzer and Tuomas Sandholm. Communication complexity of common
voting rules. In Proceedings of the 6th ACM conference on Electronic Commerce
(EC), pages 78–87. ACM, 2005.
[Dem82]
Gabrielle Demange. Single-peaked orders on a tree. Mathematical Social Sciences,
3(4):389–396, 1982.
[DL13]
Ning Ding and Fangzhen Lin. Voting with partial information: what questions to
ask? In Proceedings of the 12th International Conference on Autonomous Agents
and Multi-agent Systems (AAMAS), pages 1237–1238. International Foundation for
Autonomous Agents and Multiagent Systems, 2013.
[DM16]
Palash Dey and Neeldhara Misra. Preference elicitation for single crossing domain.
In IJCAI 2016, Proceedings of the 25nd International Joint Conference on Artificial
Intelligence (IJCAI), 2016.
[Gib73]
Allan Gibbard. Manipulation of voting schemes: a general result. Econometrica:
Journal of the Econometric Society, pages 587–601, 1973.
[Hei93]
Katherine Heinrich. Path decomposition. Le matematiche, 47(2):241–258, 1993.
[HM97]
Mel vin J Hinich and Michael C Munger. Analytical politics. Cambridge University
Press, 1997.
[HUA83]
John E Hopcroft, Jeffrey David Ullman, and Alfred Vaino Aho. Data structures and
algorithms, volume 175. Addison-Wesley Boston, MA, USA:, 1983.
[LB11a]
Tyler Lu and Craig Boutilier. Robust approximation and incremental elicitation
in voting protocols. In IJCAI 2011, Proceedings of the 22nd International Joint
Conference on Artificial Intelligence (IJCAI), pages 287–293, 2011.
[LB11b]
Tyler Lu and Craig Boutilier. Vote elicitation with probabilistic preference models:
Empirical estimation and cost tradeoffs. In Algorithmic Decision Theory, pages 135–
149. Springer, 2011.
[MCWG+ 95] Andreu Mas-Colell, Michael Dennis Whinston, Jerry R Green, et al. Microeconomic
theory, volume 1. Oxford university press New York, 1995.
[Mou91]
Hervi Moulin. Axioms of cooperative decision making. Number 15. Cambridge University Press, 1991.
[PE16]
Dominik Peters and Edith Elkind. Preferences single-peaked on nice trees. 2016.
[Sat75]
Mark Allen Satterthwaite. Strategy-proofness and arrow’s conditions: Existence and
correspondence theorems for voting procedures and social welfare functions. Journal
of Economic Theory, 10(2):187–217, 1975.
[Tri89]
Michael A Trick. Recognizing single-peaked preferences on a tree. Mathematical
Social Sciences, 17(3):329–334, 1989.
[YCE13]
Lan Yu, Hau Chan, and Edith Elkind. Multiwinner elections under preferences that
are single-peaked on a tree. In Proceedings of the Twenty-Third International Joint
Conference on Artificial Intelligence (IJCAI), pages 425–431. AAAI Press, 2013.
| 8cs.DS
|
Scheduling Two Agents on a Single Machine:
A Parameterized Analysis of NP-hard Problems⋆
Danny Hermelin1 , Judith-Madeleine Kubitza2 , Dvir Shabtay1 ,
arXiv:1709.04161v1 [cs.DS] 13 Sep 2017
Nimrod Talmon3 , and Gerhard Woeginger4
1
Ben Gurion University of the Negev, Israel
[email protected], [email protected]
2
TU Berlin, Germany
[email protected]
3
Weizmann Institute of Science, Israel
[email protected]
4
Eindhoven University of Technology, The Netherlands
[email protected]
Abstract. Scheduling theory is an old and well-established area in combinatorial optimization, whereas
the much younger area of parameterized complexity has only recently gained the attention of the community. Our aim is to bring these two areas closer together by studying the parameterized complexity
of a class of single-machine two-agent scheduling problems. Our analysis focuses on the case where the
number of jobs belonging to the second agent is considerably smaller than the number of jobs belonging
to the first agent, and thus can be considered as a fixed parameter k. We study a variety of combinations
of scheduling criteria for the two agents, and for each such combination we pinpoint its parameterized
complexity with respect to the parameter k. The scheduling criteria that we analyze include the total
weighted completion time, the total weighted number of tardy jobs, and the total weighted number of
just-in-time jobs. Our analysis draws a borderline between tractable and intractable variants of these
problems.
⋆
Preliminary version of this work appeared in the proceedings of the International symposium on Parameterized
and Exact Computation (IPEC) 2015.
1
Introduction
Scheduling is a well-studied area in operations research that provides fertile grounds for several combinatorial
problems. In a typical scheduling problem, we are given a set of jobs that are to be scheduled on a set of
machines which is arranged according to a specific machine setting. The objective is to determine a schedule
which minimizes a predefined scheduling criterion such as the makespan, total weighted completion time,
and total weighted tardiness of the schedule. There are various machine settings including the single machine
setting, parallel machines, flow-shop and job-shop, and each scheduling problem may in addition have various
attributes and constraints. We refer the reader to e.g. [6,19,28] for an extensive introduction to the area of
scheduling, and for a detailed survey of classical results.
Many scheduling problems are NP-hard. Typically, such hard problems include a multitude of parameters,
and many NP-hardness proofs exploit the fact that these parameters can be arbitrary large in theory.
However, in many practical settings, one or more of these parameters will actually be quite small. For
example, the number of different items that can be processed in the shop might be limited, resulting in
a scheduling instance where only a limited number of different processing times appear. A limited set of
planned delivery dates resulting in a scheduling instance with a limited number of different due dates is
another example. It is therefore natural to ask whether NP-hard scheduling problems become tractable
when some of their parameters can be assumed to be comparatively small in practice. Luckily, a framework
for answering such questions has been recently developed by the computer science community - the theory
of parameterized complexity.
Parameterized complexity facilitates the analysis of computational problems in terms of various instance
parameters that may be independent of the total input length. In this way, problem instances are analyzed
not only according to the total input length n, but also according to an additional numerical parameter
k that may encode other aspects of the input. A problem is considered tractable if there is an algorithm
that optimally solves any instance in f (k) · nO(1) time, where f () is allowed to be any arbitrary computable
function which is independent of n, and the exponent in nO(1) is required to be independent of k. For
example, a running-time of 2O(k) · n3 is considered tractable in the parameterized setting, while nO(k) is not.
2
In this way we can model scenarios where certain problem parameters are typically much smaller than the
total input length, yet may not be small enough to be considered constant.
Parameterized complexity has enjoyed tremendous success since its first developments in the early 90s,
as can be exemplified by the various textbooks on the subjects [7,10,8,25]. However, there are currently very
few papers that attack scheduling problems from the parameterized perspective [5,9,21,31,32]. This is rather
disappointing since scheduling problems seem to be particulary adequate for parameterized analyses. For one,
scheduling problems which are NP-hard lack polynomial-time algorithms for finding optimal solutions, and
in several applications, approximate solutions can result in big revenue losses. This gives strong motivation
for computing exact solutions even if computing such solutions requires a lot of resources. Secondly, as
argued above, scheduling problems typically have an abundance of natural problem parameters that can be
comparatively small in practice. Thus, algorithms whose running times grow exponentially in such parameters
alone should be quite useful for practical purposes.
Our aim in this paper is to help close the gap between research in parameterized complexity and the
area of scheduling. We initiate a parameterized analysis on problems occurring in the setting of multi-agent
scheduling [2], a contemporary area which is nowadays at the cutting edge of scheduling research. We focus
on the most basic case where there are only two agents, and all jobs are to be processed on a single machine.
Furthermore, our parameterized analysis focuses on the scenario where the second agent has a significantly
smaller number of jobs than the other. The number of jobs belonging to this agent is thus taken as a
parameter, and is denoted by k throughout the paper. We preform an extensive parameterized analysis
for several two-agent single-machine scheduling problems with respect to this parameter, providing a clear
picture of the applicability of parameterized algorithmics to these problems.
1.1
Our contribution
In this work we investigate a variety of combinations for the objective functions of each agent. For each such
combination, we consider the problem where each agent has a bound on his objective function, and the goal
is to determine whether there exists a single-machine schedule that meets both bounds simultaneously. The
objective functions we consider are (see Section 2 for formal definitions):
3
1. Total weighted completion time, where jobs have weights, and the goal is to minimize the sum of weighted
completion time over the entire job set of the agent.
2. Total weighted number of tardy jobs, where jobs have weights and due-dates, and the objective is to
minimize the total weighted number of jobs that terminate after their due-date.
3. Total weighted number of just-in-time ( JIT) jobs, where jobs have weights and due-dates, and the goal
is to maximize the total weighted number of jobs that terminate precisely on their due date.
We consider several combinations of these scheduling criteria for which the corresponding problem is NPcomplete, and for each such combination we determine whether or not the corresponding scheduling problem
becomes fixed-parameter tractable with respect to k. There are also other subtleties that we consider, such
as the unit weight case or the unit processing-time case. The paper is organized according to the first agent’s
scheduling criteria. Thus, Section 3 deals with the case where the scheduling criterion of agent 1 is the total
weighted completion time, Section 4 focuses on problems where the first agent criterion is the total weighted
number of tardy jobs, and Section 5 is concerned with problems where the first agent criterion is the total
weighted number of JIT jobs.
1.2
Related work
The set of two-agent scheduling problems was first introduced by Baker and Smith [4] and Agnetis et al. [3].
For different combinations of the scheduling criteria, Baker and Smith focus on analyzing the problem of
finding a schedule that minimizes the weighted sum of the two criteria, while Agnetis et al. focus on analyzing
the problem of minimizing the first agent criterion while keeping the value of the second agent criterion not
greater than a given bound. Following these two fundamental papers, numerous researchers have studied
different combinations of multi-agent scheduling problems, see e.g. [14,17,20,23,34,33]. Detailed surveys of
these problems appear in Perez-Gonzalez and Framinan [27] and in a recent book by Agnetis et al. [2]. We
give further detail of the results that are more directly related to our work in the appropriate sections of the
remainder of the paper.
4
2
Preliminaries
In this section we introduce the notation and terminology that will be used throughout the paper. In
particular, we provide concrete definitions for the problems we study, as well as a very brief introduction to
the theory of parameterized complexity.
2.1
Scheduling notation and problem definitions
In all problems considered in this paper, the input consists of two sets of jobs that have to be processed non(1)
(1)
preemptively on a single machine. The first set J (1) = {J1 , ..., Jn } belongs to agent 1, while the second
(2)
(2)
set J (2) = {J1 , ..., Jk } belongs to agent 2. We assume that k ≤ n, and for practical purposes one should
(i)
think of k as much smaller than n. Let pj
(i)
be a positive integer denoting the processing time of job Jj .
(i)
(i)
Moreover, when relevant, let dj and wj be two positive integers representing the due date and the weight
(i)
(i)
(i)
(i)
(i)
of job Jj , respectively. A schedule σ of J (1) ∪ J (2) is a set of disjoint time intervals Ij = (Cj − pj , Cj ]
(i)
for j = 1, ..., n if i = 1 and j = 1, ..., k if i = 2, where Ij
(i)
is processed on the single machine. Note that Cj
(i)
represents the completion time of Jj . In case, one or
(i)
(i)
(i)
(i)
(i)
(i)
(i)
≤ 0, then job Jj
(i)
= Cj − dj
both of the agents jobs have due dates, we will use Lj
and we set Lmax = maxj Lj . If Lj
(i)
represents the time interval in σ where job Jj
(i)
to denote the lateness of job Jj ,
is an early job in σ, and otherwise it is tardy.
(i)
Accordingly, the set E (i) = {Jj ∈ J (i) |Lj ≤ 0} is the set of early jobs in σ that belongs to agent i, and the
(i)
set T (i) = {Jj
(i)
∈ J (i) |Lj > 0} is the set of tardy jobs that belong to agent i. We also use Eb(i) to denote
(i)
(i)
the set Eb(i) = {Jj ∈ J (i) |Lj = 0}.
The quality of a schedule is measured by two different criteria, one per each agent. We focus on problems
for which either one of the two agents criteria may be either one of the following three possibilities:
1. The weighted sum of completion times, denoted by
(i)
2. The weighted number of tardy jobs, where job Jj
(i)
indicator variable Uj
P
(i)
(i)
is said to be tardy if Cj
(i)
which indicates whether or not Jj
number of tardy jobs of agent i.
5
(i)
wj Cj .
is tardy, and
P
(i)
(i)
> dj . We use a binary
(i)
wj Uj
denotes the weighted
(i)
(i)
(i)
3. The weighted number of just-in-time (JIT) jobs, where job Jj is said to be just-in-time if Cj = dj . We
(i)
use a binary indicator variable Ej
(i)
which indicates whether or not Jj
is just-in-time, and
denotes the weighted number of just-in-time jobs of agent i.
P
(i)
(i)
wj Ej
Note that while first two criteria are minimization criteria, the latter is a maximization criterion. For
each possible combination of the criteria above, we consider the decision problem where we are given two
positive integer bounds A1 and A2 , one for each agent, and we need to find if there exists a job schedule
in which both bounds are met. In case the scheduling criterion is the sum of weighted completion times or
weighted number of tardy jobs, the bound Ai is regarded as an upper-bound, while for weighted number of
just-in-time jobs it is a lower-bound. We refer to such a job schedule, if it exists, as a feasible job schedule.
Using the standard three field notation in scheduling, we denote this set of problems by 1 C(1) , C(2) , where
C(i) ∈
nX
(i)
(i)
wj Cj ≤ Ai ,
X
(i)
(i)
wj Uj
≤ Ai ,
X
o
(i) (i)
wj Ej ≥ Ai ,
for i = 1, 2. We will sometimes consider special cases of these problems, and when doing so we use the middle
(1)
field to denote restrictions on our input. For example, the 1 pj
= 1,
P
(1)
(1)
wj Cj
≤ A1 ,
P
(2)
Cj
≤ A2
problem is the problem where the scheduling criterion for the first agent is the weighted sum of completion
times, for the second agent is the (unweighed) sum of completion time and agent 1 has jobs with unit
processing times.
2.2
Basic concepts in parameterized complexity theory
The main objective in parameterized complexity theory is to analyze the tractability of NP-hard problems
with respect to input parameters that are not necessarily related to the total input size. Thus, problem
instances are not only measured in terms of their input size n, but also in terms of an additional parameter k.
In this context, a problem is said to be tractable, or fixed-parameter tractable (FPT), if there is an algorithm
that solves each instance of size n and parameter k in f (k) · nO(1) time. Here, the function f () can be any
arbitrary computable (e.g. exponential) function so long as it depends only on k, and the exponent in nO(1) is
independent of k. The reader is referred to the excellent texts on the subject for more information [7,10,8,25].
2O(k)
In parameterized complexity, a running-time of 2O(k) · n3 is considered tractable, and even 22
· n100 is
considered tractable. Note that while the above definition might allow some quite large running-times, when
6
k is sufficiently smaller than n, any such run-time drastically outperforms more common algorithms with
2
running-times of nO(k) or nO(k ) , for example. Moreover, a running time of, say, 2O(k) · n3 , with moderate
constants in the exponent can be quite fast in practice. In any case, parameterized complexity provides the
most convenient form of analyzing the complexity an NP-hard problem with respect to the size of a given
parameter. In our context, the parameter of each instance will always be the number of jobs of agent 2.
Thus, we consider the setting where agent 1 has significantly more jobs to schedule, but nevertheless we still
wish to meet both agents criteria.
Note that if a problem is NP-hard already for constant values of its parameter, then a fixed-parameter
tractable algorithm for the problem will imply that P=NP. Thus, in our context, if we show that one of
the problems we consider is already NP-hard when agent 2 has a constant number of jobs, this excludes the
possibility that the problem has a fixed-parameter tractable algorithm under the assumption of P6=NP. For
showing such hardness results, we will use the classical NP-complete Partition problem [11], often used in
the context of scheduling problems:
Definition 1 (The Partition problem). Given a set X = {x1 , . . . , xm } of positive integers (encoded in
binary) with
P
3
xj ∈S1
xj =
Pm
j=1
P
xj = 2z, determine whether X can be partitioned into two sets S1 and S2 such that
xj ∈S2
xj = z.
Weighted Sum of Completion Times
In this section we study the 1
P
(1)
(1)
wj Cj
≤ A1 , C(2) problem where C(2) can be any of the three scheduling
criteria discussed in Section 2. We first show that all the three corresponding problems are unlikely to admit
a fixed-parameter algorithm, since they are all NP-complete even for k = 1 (i.e, agent 2 has a single job)
as we show in Theorem 1. This motivates us to study four special cases: We show that in case the jobs of
agent 1 all have unit weight, the problem becomes FPT when the criteria for agent 2 is either weighted sum
of completion times or weighted number of tardy jobs. However, when the criteria of agent 2 is the number
of just-in-time jobs, the problem remains intractable in this case as well. We also provide an FPT algorithm
for the case where both criteria are the weighted sum of completion times, and agent 1 has jobs with unit
processing times.
7
3.1
Intractability of the general problem with respect to k
P
The fact that the single agent 1
wj Cj problem is solvable in O(n log n) time (see Smith [30]) gives
us some hope that at least one of the 1
P
(1)
(1)
wj Cj
≤ A1 , C(2)
problems is tractable when k is small.
Unfortunately, in the following theorem we show that this is not the case for all three criteria, even if the
second agent has a single job of a unit weight. We will show this via a reduction from the NP-complete
Partition problem (see Definition 1).
Theorem 1. The 1
P
(2)
Cj
≤ A2 ,
P
(2)
Uj
P
(1)
(1)
wj Cj
≤ A2 , or
P
≤ A1 , C(2)
(2)
Ej
problem is NP-complete for k = 1, when C(2) is either
≥ A2 .
Proof. We provide a reduction from the NP-complete Partition problem defined above. Given an instance
(X, z) to the Partition problem, with X = {x1 , . . . , xm }, we construct the following two-agent scheduling
instance: Agent 1 will have n = m jobs and agent 2 will have a single job (i.e., k = 1). For j = 1, ..., n, we
(1)
set pj
(1)
= wj
(2)
= xj . Moreover, we set p1 = 1, and in case C(2) ∈ {
(2)
P
(2)
Uj
≤ A2 ,
P
(2)
Ej
≥ A2 }, we also set
d1 = z + 1. The bound on the total weighted completion time of agent 1 is set to A1 = z +
Pn
i=1
Pi
j=1
xi xj .
The bound of agent 2 depends on his scheduling criterion: If it is the sum of completion times, we set
A2 = z + 1, if it is the weighted number of tardy jobs we set A2 = 0, and if it is the weighted number of JIT
jobs we set A2 = 1.
Now suppose that X can be partitioned into two sets S1 and S2 with
P
xi ∈S1
xi =
P
xi ∈S2
xi = z.
We construct a schedule σ where we first schedule all agent’s 1 jobs corresponding to elements of S1 in an
(2)
arbitrary order, followed by job J1 , followed by all of the jobs of agents 1 corresponding to the elements
(2)
of S2 in an arbitrary order. Observe that job J1
completes in σ after
P
xi ∈S1
xi + 1 = z + 1 time units,
and so the bound of agent 2 is met in all three criteria C(2) . To see that the first agent bound is met as
(2)
well, observe that if we exclude J1
precisely
Pn
i=1
Pi
j=1
from σ then the total weighted completion time of agent 1 jobs is
(2)
xi xj . Adding job J1
increases the completion time of each of the first agent jobs that
(2)
correspond to elements of S2 by a unit. Thus, J1
contributes precisely
P
xi ∈S2
xi = z to the total weighted
completion time of agent 1 jobs, and so the first agent bound on the total weighted completion time is met
as well.
8
(1)
For the other direction, suppose there is a feasible schedule σ for any possible option of C(2) . Let J1
(2)
note the set of agent 1 jobs that are scheduled before job J1
(1)
in σ, and let J2
denote agent 1 remaining jobs.
Since agent 2 bound is satisfied in σ, in each of the three possible criteria it must be that
Moreover, note that the total weighted completion time of agent 1 jobs is
Since agent 1 bound is also met by σ, it must be that
of agent 1 jobs is 2z, we get that
(1)
and S2 = {xj : Jj
3.2
(1)
P
(1)
(1)
Jj
pj
(1)
∈J1
=
P
P
(1)
(1)
Jj
∈J2
(1)
(1)
(1)
pj
(1)
Jj ∈J2
pj
Pn
i=1
Pi
j=1
P
(1)
(1)
Jj
xi xj +
(1)
∈J1
P
pj
P
(1)
Cj
≤ A1 ,
P
(2)
≤ z.
(1)
(1)
Jj
(1)
∈J2
pj .
≤ z. Since the sum of all processing times
(1)
= z. Thus, setting S1 = {xj : Jj
(1)
∈ J1 }
∈ J2 } yields a solution to our Partition instance.
An FPT algorithm for the 1
de-
(2)
wj C j
⊓
⊔
problem
≤ A2
In stark contrast to the result in Theorem 1, we next show that, although being NP-complete (see Agnetis
et al. [3]), the 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Cj
≤ A2
problem is much easier to handle. We present an FPT
algorithm for this problem for parameter k, using the powerful result of Lenstra concerning mixed integer
linear programs [18]. To begin with, we will need the following lemma which can be easily derived by using
a simple pair-wise interchange argument (see also Agnetis et al. [3] that prove the same argument for the
less general case where both agents jobs have unit weights):
Lemma 1. If there is a feasible solution for the 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Cj
≤ A2
problem, then there
(1)
exists a feasible solution where the jobs of agent 1 are scheduled in a non-decreasing order of pj , i.e.,
according to the shortest processing time (SPT) rule.
Consider now the 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Cj
≤ A2 problem. Due to Lemma 1, we assume, without loss
(1)
(1)
(1)
of generality that the jobs of agent 1 are numbered according to the SPT rule such that p1 ≤ p2 ≤ ... ≤ pn .
By allowing an additional multiplicative factor of k! to the running time of our algorithm, we can focus on
a reduced subproblem where the ordering of the second agent jobs is predefined. Given a subproblem, we
renumber the second agent jobs according to this ordering. Then, to determine whether a feasible schedule
is actually possible for the given subproblem, we only need to figure out if it is possible to interleave the
two ordered sets of jobs together in a way that satisfies both agents bounds. Towards this aim, we formalize
any given subproblem as a mixed integer linear program (MILP) where the number of integer variables is
k. We then complete the proof by using the celebrated result of Lenstra [18] which states that determining
9
whether a given MILP has a feasible solution is fixed-parameter tractable with respect to the number of
integer variables.
(2)
To formulate a given subproblem as an MILP, we define an integer variable xj for each job Jj
represent-
(2)
ing the number of jobs belonging to agent 1 that are scheduled before Jj . Therefore, for each 1 ≤ j ≤ k,
we add the constraint that
0 ≤ xj ≤ n.
(1)
Moreover, for 1 ≤ j ≤ k − 1, we add the constraint that
xj ≤ xj+1 .
(2)
Lemma 2. The bound on the total completion time of the first agent jobs can be formulated by the following
constraint:
n
X
j=1
k
X
(2)
(1)
(n − j + 1) · pj + (n − xj ) · pj ≤ A1 .
(3)
j=1
Proof. Observe that the first term in the left-hand side of constraint (3) is precisely the total completion
time of the first agent jobs when no job of the second agent is scheduled at all. We now add the second
agent jobs according to the intended meaning of the variables x1 , . . . , xk . If there are xj jobs of agent 1
(2)
scheduled prior to Jj
(2)
in the presumed schedule, then Jj
(2)
causes an increase of pj
to the completion time
of n − xj jobs belonging to the first agent. Thus, adding all of agent 2 jobs causes an additional increase of
Pk
j=1 (n
(2)
− xj ) · pj
⊓
⊔
to the total completion time of the first agent jobs.
(2)
The encoding of the second agent bound is a bit more involved. Specifically, for each Jj , we introduce
a real-valued variable yj which we would like to be equal to the contribution of the first agent jobs to the
(2)
completion time of Jj . Note that by our intended meaning for variable xj , this is precisely
Pxj
i=1
(1)
pi .
However, we cannot encode this directly as a linear constraint. We therefore introduce n additional real(2)
valued variables corresponding to Jj , denoted as yij for i ∈ {1, . . . , n}, which are ensured to be non-negative
by adding the constraint that
yij ≥ 0
10
(4)
for i ∈ {1, . . . , n} and j ∈ {1, . . . , k}. The yij variables are used to provide upper-bounds to the “steps” in
the contribution of the first agent jobs as depicted in Fig. 1. Accordingly, we add the constraints
(1)
yij ≥ (xj − i + 1) · (pi
(1)
− pi−1 )
(5)
(1)
for each i ∈ {1, . . . , n} and j ∈ {1, . . . , k} (naturally, we set here p0 = 0). Furthermore, we add the constraint
that
yj ≥
n
X
(6)
yij
i=1
for any j ∈ {1, . . . , k} so that yj will equal its intended meaning.
p
(1)
yij ≥ (xj − i + 1) · (pi
(1)
− pi−1 )
(2)
(1) (1)
Jj
J1 J2
(2)
Fig. 1. The contribution of xj jobs that of agent 1 which are scheduled prior to Jj
of this job by
Px j
i=1
increases the completion time
(1)
pi . The variable yij is intended to capture the i’th “step” of this contribution.
Lemma 3. The bound on the total weighted completion time of the second agent jobs can be formulated by
the following constraint:
k
X
i=1
(2)
wi
·
i
X
j=1
k
X
(2)
(2)
wj · yj ≤ A2 .
pj +
(7)
j=1
Proof. Observe that the first term in the left-hand side of constraint (7) is the total weighted completion
(2)
(2)
time of the second agent ordered jobs J1 , . . . , Jk , assuming no jobs of agent 1 are scheduled. We argue
that the second term upper-bounds the contribution of agent 1 jobs. For this, it suffices to show that the
(2)
contribution of agent 1 jobs to the completion time of Jj , for each j ∈ {1, . . . , k}, is at most yj . We know
that this contribution is
Pxj
i=1
(1)
pi . Since we are concerned only with feasible solutions where the constraints
11
on variables yi , yi1 . . . , yin are met, we have
yj ≥
n
X
yij ≥
i=1
n
X
(1)
max{0, (xj − i + 1) · (pi
(1)
− pi−1 )} =
xj
X
(1)
(xj − i + 1) · (pi
(1)
− pi−1 )
i=1
i=1
(1)
(1)
(1)
(1)
= xj p1 + (xj − 1)(p2 − p1 ) + · · · + (p(1)
xj − pxj −1 ) =
xj
X
(1)
pi .
i=1
⊓
⊔
To summarize, due to Lemma 1, we can solve the 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Cj
≤ A2
problem by
solving O(k!) MILP formulations, each of which has only k integer variables. Correctness of each of these
formulations follows from Lemmas 2 and 3, and the analysis above. Using Lenstra’s result [18], we therefore
obtain the following theorem:
Theorem 2. 1
3.3
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Cj
(1)
An FPT algorithm for 1 pj
≤ A2
= 1,
P
is fixed-parameter tractable with respect to k.
(1)
(1)
wj C j
≤ A1 ,
P
(2)
(2)
wj C j
≤ A2
The problem of determining whether there exists a schedule where both agents meet their respective bounds
on their total weighted completion times was shown to be NP-complete even if the jobs of both agents all
have unit processing times [26]. Here we complement this result, as well as the result given in Theorem 1,
by showing that the problem is FPT with respect to k when the jobs of the first agent have unit processing
times. The following lemma is crucial for the construction of the FPT algorithm, and can be proven by a
simple pairwise interchange argument.
(1)
Lemma 4. If there is a feasible schedule for the 1 pj
= 1,
P
(1)
(1)
wj Cj
≤ A1 ,
P
(2)
(2)
wj Cj
≤ A2
problem,
then there is a feasible schedule for the problem where the first agent jobs are scheduled in a non-increasing
weight order.
(1)
Assume, without loss of generality, that w1
(1)
≥ · · · ≥ wn . Accordingly, based on Lemma 4, we can
(1)
restrict our search for a feasible schedule to those schedules in which job Jj
(1)
is scheduled before Jj+1 for
all j ∈ {1, . . . , n − 1}. As in the proof of Theorem 2, by allowing an additional multiplicative factor of k! to
the running time of our algorithm, we can focus on a reduced subproblem where the ordering of the second
12
agent jobs is also predefined. Given such an ordering, we renumber the second agent jobs according to the
ordering.
In what follows we prove that each subproblem is FPT with respect to k. The proof uses the same ideas
as the proof of Theorem 2 and thus is briefly presented. Here as well we define variables x1 , . . . , xk , but this
(2)
time xj represents the number of the first agent jobs that are scheduled after Jj . Accordingly, we have to
include the constraint in (1) and for 1 ≤ j ≤ k − 1 the following constraint as well:
xj ≥ xj+1 .
(8)
The bound on the weighted sum of completion times of the second agent jobs can be expressed by
k
i
k
X
X
X
(2)
(2)
(2)
wj (n − xj ) ≤ A2 ,
pj +
wi
(9)
j=1
j=1
i=1
where the first term in the left-hand side is the weighted sum of completion times of the second agent jobs if
they are scheduled one after the other at the beginning of the schedule, and the second term in the left-hand
side corresponds to the contribution of the first agent jobs to the weighted sum of completion times of the
second agent jobs.
To bound the total weighted completion time of the first agent jobs, we need again to introduce a set
of real-valued variables yj , yj1 , . . . , yjn for each j ∈ {1 . . . , k}. Here, variable yj is meant to encode the
(2)
contribution of Jj
(2)
pj
Pn
to the total weighted completion time of the first agent jobs. Note that this is precisely
(1)
i=n−xj +1
wi . We use the variables yij to encode lower-bounds on the steps of the sum
Pn
i=n−xj +1
(1)
wi ,
as done in the proof of Theorem 2. Accordingly, for j ∈ {1, . . . , k}, we include the set of constraints in (6).
Moreover, for i ∈ {1, . . . , n} and j ∈ {1, . . . , k}, we include the set of constraints in (4) and also the following
set of constraints
(1)
yij ≥ (xj − n + i)(wi
(1)
− wi+1 ),
(10)
(1)
where wn+1 = 0 by definition. Finally, we encode the bound on the total weighted completion time of the
first agent jobs by
n
X
j=1
k
X
(1)
(2)
jwj +
pj yj ≤ A1 ,
(11)
j=1
where the first term in the left-hand side is the weighted sum of completion time of the first agent jobs if
they are scheduled one after the other at the beginning of the schedule, and the second term in the left-hand
13
side corresponds to the contribution of the second agent jobs to the weighted sum of completion times of the
first agent jobs.
(1)
= 1,
Theorem 3. The 1 pj
with respect to k.
3.4
P
The 1
(1)
Cj
≤ A1 ,
P
P
(1)
(1)
≤ A1 ,
(2)
(2)
≤ A2
wj Cj
wj Uj
P
P
(1)
Cj
≤ A2
problem is fixed-parameter tractable
problem
P
Ng et al. [24] and Leung et al. [20] proved that the 1
We next prove that the more general 1
(2)
(2)
wj Cj
≤ A1 ,
(1)
Cj
P
(2)
≤ A1 ,
(2)
wj Uj
P
(2)
Uj
≤ A2
≤ A2
problem is NP-complete.
problem is FPT with respect to k.
Our proof depends on the following easy-to-prove lemma (recall the definitions of E (i) and T (i) in Section 2):
Lemma 5. If there is a feasible solution for an instance of the 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Uj
≤ A2
problem,
then for the same instance there exists a feasible solution in which (i) the jobs of agent 1 are scheduled in a
(1)
non-decreasing order of pj
(2)
decreasing order of dj
(i.e., according to the SPT rule); (ii) the jobs in E (2) are scheduled in a non-
(i.e., according to the EDD rule); and (iii) the jobs in T (2) are scheduled last in an
arbitrary order.
Consider now the 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
≤ A2
wj Uj
problem and define a set of 2k subproblems
corresponding to the O(2k ) possible ways to partition set J (2) into E (2) and T (2) such that the condition
P
(2)
(2)
Jj ∈T (2)
wj
≤ A2 holds. Due to Lemma 5, each subproblem reduces to an instance of the 1
(2)
P
(1)
Cj
≤
A1 , Lmax ≤ 0 problem which includes the n jobs of agent 1 and only the O(k) early jobs of agent 2. In the
reduced subproblem, we need to find if it is possible to schedule the jobs in J (1) ∪ E (2) such that all jobs in
E (2) are indeed early (i.e., completed not later than its due date), and
1
P
(1)
Cj
(2)
P
(1)
Cj
≤ A1 . Thus, the fact that the
≤ A1 , Lmax ≤ 0 problem is solvable in O(n + k) = O(n) time (see Yuan et al. [34]) leads to the
following theorem:
Theorem 4. The 1
P
(1)
Cj
≤ A1 ,
P
(2)
(2)
wj Uj
≤ A2
14
problem is solvable in O(2k n) time.
3.5
P
Intractability of the 1
(1)
Cj
Consider an instance of the 1 C(1) ,
P
≤ A1 ,
(2)
Ej
P
(2)
Ej
≥ A2
≥ A2
problem
problem, with k = 1 and A2 = 1. If there is a feasible
solution for such an instance, then the single job of agent 2 is scheduled in a JIT mode, i.e., during time
(2)
(2)
(2)
interval (d1 − p1 , d1 ]. Thus, such an instance is equivalent to an instance of a 1 C(1)
problem with a
single non-availability interval (more commonly denoted by 1 C(1) , n − a ). This problem is known to be
NP-complete when C(1) =
following corollary:
Corollary 1. The 1
4
P
P
(1)
Cj
(1)
Cj
≤ A1 (see Adiri et al. [1] and Lee and Liman [16]). Thus, we have the
≤ A1 ,
P
(2)
Ej
≥ A2
problem is NP-complete even for k = 1.
Weighted Number of Tardy Jobs
In this section we study variants of our problem of the form 1
P
(1)
(1)
wj Uj
≤ A1 , C(2) . That is, variants
where the scheduling criteria of agent 1 is the weighted number of tardy jobs. Note that already the single
agent 1
P
wj Uj ≤ A problem is NP-complete, even when all due dates are equal (a resulting dating back
to Karp’s seminal NP-completeness paper [13]). Therefore, any variant of our problem when the jobs of the
first agent have weights is hard.
Corollary 2. The 1 dj = d,
P
(1)
(1)
wj Uj
≤ A1 , C(2)
problem is NP-complete for k ≥ 0.
Due to Theorem 2, we restrict our analysis below to the unweighed 1
P
(1)
Uj
≤ A1 , C(2)
problem. We
provide a fixed-parameter algorithm for the case where the criteria of agent 2 is also the (weighted) number
of tardy jobs. This algorithm is then extended to the case where the jobs of agent 1 may have arbitrary
weights, but both agents jobs have unit processing times. On the contrary, when the criteria for agent 2 is the
weighted number of JIT jobs, we show that the problem is intractable already for highly restrictive special
cases. We do not know whether the problem is fixed-parameter tractable when the criteria for agent 2 is the
total weighted completion time; in the case, we can only show an nO(k) -time algorithm.
15
An nO(k) -time algorithm for the 1
4.1
P
The question whether the 1
(1)
Uj
≤ A1 ,
P
P
(1)
Uj
≤ A1 ,
(2)
(2)
wj Cj
≤ A2
P
(2)
(2)
wj C j
problem
≤ A2
problem is fixed-parameter tractable or not
remains an open question. Nevertheless, we show below that the problem can be solved in much slower but
still non-trivial nO(k) time. This leads to the conclusion that the problem belongs to the parameterized class
XP (see e.g. [8] for a formal definition), and is solvable in polynomial time when k is upper bounded by a
constant. We begin with the following easy lemma.
Lemma 6. If there is a feasible solution for an instance of the 1
P
then for the same instance there exists a feasible solution in which (i)
(1)
Uj
P
≤ A1 ,
(1)
Uj
P
(2)
(2)
wj Cj
≤ A2 problem,
= A1 ; (ii) the jobs in E (1) ∪J (2)
are scheduled first followed by the jobs in T (1) that are scheduled last in an arbitrary order; and (iii) the jobs
(1)
in E (1) are scheduled according to the EDD rule (i.e., in non-decreasing order of dj ).
Following Lemma 6, we renumber the jobs in J (1) according to the EDD rule. Furthermore, we divide
the original problem into k! instances, each of which represent a different processing order of the jobs
in J (2) . Consider a given instance, and assume that the jobs in J (2) are numbered according to their
processing order. For each such instance, we consider all possible partitions of J (1) into k + 1 subsets,
(1)
J (1) = J0
(1)
(1)
∪ · · · ∪ Jk , and all possible sets of k + 1 integers {e0 , . . . , ek } with ei ≤ |Ji | for each
i ∈ {0, . . . , k + 1} and
Pk
i=0 ei
= n − A1 .
(1)
(1)
Note that there are O(n2k+2 ) such pairs ({J0 , . . . , Jk }, {e0 , . . . , ek }). Given such a pair, we are looking
for a restricted schedule that satisfies the following three conditions: (i) there are at most ei early jobs
(1)
among the jobs in Ji
(1)
Ji
2
for each i = 0, ..., k; (ii) job Ji+1
is scheduled right after the ei early jobs within
for i = 0, ..., k − 1; and (iii)
P
(2)
(2)
≤ A2 . Note that the instance corresponding to the particular
wj Cj
processing order of J (2) has a feasible schedule iff such a restricted schedule corresponding to some pair
(1)
(1)
({J0 , . . . , Jk }, {e0 , . . . , ek }) exists. Below we show how to compute a restricted schedule, if it exists, in
O(n log n) time. This will yield the following theorem:
Theorem 5. The 1
P
(1)
Uj
≤ A1 ,
(1)
P
(2)
(2)
wj Cj
problem is solvable in O(k!n2k+1 log n) time.
≤ A2
(1)
Consider some pair ({J0 , . . . , Jk }, {e0 , . . . , ek }) as above. Note that if our goal was only to find a
(1)
schedule for there are at most ei early jobs in Ji
for each i, then this translates to solving k disjoint
16
P
instances of the single agent 1
(1)
(1)
problem over each set of jobs Ji , where ni = |Ji |.
U j ≤ ni − e i
Each such instance can be solved in O(ni lg ni ) time by a slight modification of the classical algorithm of
Moore [22], which gives us a total of O(n log n) time for all k + 1 instances. Furthermore, Moore’s algorithm
computes the schedule with minimum makespan (i.e., final completion time) amongst all schedules with at
most ei tardy jobs. Thus, composing the k + 1 schedules into a single schedule for both agents by scheduling
(1)
(2)
Ji+1 after the final job scheduled in Ji , gives us a schedule which minimizes
P
(2)
(2)
wj Cj
over all schedules
which satisfy properties (i) and (ii) above. Thus, in O(n lg n) time we can determine whether there exists a
(1)
(1)
restricted schedule corresponding to ({J0 , . . . , Jk }, {e0 , . . . , ek }), and so Theorem 5 holds.
We mention that this algorithm can slightly be improved if the jobs of agent 2 have unit weights. In this
(2)
case, we know that it is optimal to order these jobs in a non-decreasing order of pj , i.e., according to the
shortest processing time (SPT) rule. Thus, we do not have to try out all possible orderings of J (2) , reducing
the time complexity of the algorithm above by a factor of O(k!).
Corollary 3. The 1
4.2
P
(1)
Uj
≤ A1 ,
P
An FPT algorithm for 1
P
We next show that the 1
(1)
Uj
P
(2)
Cj
(1)
Uj
≤ A1 ,
P
problem is solvable in O(n2k+1 log n) time.
≤ A2
≤ A1 ,
(2)
P
(2)
wj Uj
(2)
(2)
wj Uj
≤ A2
≤ A2
problem is FPT with respect to k. Our proof
depends on the following easy-to-prove lemma:
P
Lemma 7. If there is a feasible solution for an instance of the 1
(1)
Uj
≤ A1 ,
P
(2)
(2)
wj Uj
≤ A2
problem,
then for the same instance there exists a feasible solution in which the jobs in E (1) ∪ E (2) are scheduled first
(i)
according to the EDD rule (i.e., in non-decreasing order of dj ), followed by the jobs in T (1) ∪ T (2) that are
scheduled last in an arbitrary order.
Consider now an instance of the 1
P
(1)
Uj
≤ A1 ,
P
(2)
(2)
wj Uj
≤ A2
problem, and define a set of 2k
instances corresponding to the O(2k ) possible ways to partition set J (2) into E (2) and T (2) such that the
feasibility condition
an instance of the 1
P
(2)
(2)
Jj
P
∈T (2)
(1)
Uj
wj
≤ A2 holds in each instance. Due to Lemma 7, each of these instances is
(2)
≤ A1 , Lmax ≤ 0 problem in which we need to find a feasible schedule for agent
1 subject to scheduling the set of O(k) jobs in E (2) such that they are all early. Agnetis et al. showed that the
17
1
P
(1)
Uj
(2)
≤ A1 , Lmax ≤ 0 problem is solvable in O(n log n + k log k) = O(n log n) time [3]. Thus, we obtain
the following:
P
Theorem 6. The 1
(1)
Uj
P
≤ A1 ,
(1)
4.3
An FPT algorithm for 1 pj
P
The 1
(1)
(1)
wj Uj
≤ A1 ,
P
(2)
(2)
(2)
≤ A2
(2)
= 1,
(2)
wj Uj
= pj
≤ A2
wj Uj
problem is solvable in O(2k n log n) time.
P
(1)
(1)
wj Uj
≤ A1 ,
P
(2)
(2)
wj Uj
≤ A2
problem is NP-complete even for the case of unit processing
time [26]. Next we complement this result, as well as Theorem 2, by showing that this problem is FPT
with respect to k. First observe that Lemma 7 holds here as well. Thus, we again create 2k instances
(1)
from our 1 pj
(2)
= pj
= 1,
P
(1)
(1)
wj Uj
≤ A1 ,
P
(2)
(2)
wj Uj
≤ A2
instance, where in each instance the set
E (2) ⊆ J (2) may vary. In any given instance of these 2k instances we may assume that
P
(2)
(2)
Jj
∈T (2)
wj
(1)
Furthermore, again due to Lemma 7, each of these instances is in fact an instance of the 1 pj
1,
P
(1)
(1)
wj Uj
(2)
≤ A1 , Lmax ≤ 0
≤ A2 .
(2)
= pj
=
problem in which we need to find a feasible schedule for agent 1 subject
to scheduling the set of O(k) jobs in E (2) such that they are all early. This latter problem is solvable in
O(max{n log n, k}) = O(n log n) time [26]. Thus, we get:
(1)
Theorem 7. The 1 pj
(2)
= pj
= 1,
O(2k n log n) time.
4.4
Intractability of the 1
P
(1)
Uj
P
(1)
(1)
≤ A1 ,
wj Uj
≤ A1 ,
P
(2)
Ej
P
≥ A2
(2)
(2)
wj Uj
≤ A2
problem is solvable in
problem
(1)
= d,
(1)
= d,
Following the observation made in Section 3.5, we can conclude that an instance of the 1 dj
A1 ,
P
(2)
Ej
≥ A2
problem with k = 1 and A2 = 1 is equivalent to an instance of the 1 dj
P
P
(1)
≤
(1)
≤
Uj
Uj
A1 , n − a problem, which is known to be NP-complete (see Lee [15]). Thus, we have the following corollary:
(1)
Corollary 4. The 1 dj
5
= d,
P
(1)
Uj
≤ A1 ,
P
(2)
Ej
≥ A2
problem is NP-complete for k ≥ 1.
Weighted Number of Just-in-Time Jobs
We next consider problems of the form 1
P
(1)
(1)
wj Ej
≥ A1 , C(2) , i.e., problems where the criteria of agent
(i)
1 is the total weighted number of JIT jobs. Recall that a job Jj
18
is scheduled in JIT mode if it is scheduled
(i)
(i)
(i)
precisely at the time interval (dj − pj , dj ]. We will show that when either C(2) =
C(2) =
P
(2)
P
(2)
wj Cj
(2)
(2)
wj Ej
P
(2)
(2)
wj Uj
≤ A2 , or
≥ A2 , the problem is fixed-parameter tractable in k. We also show that when C(2) =
≤ A2 the problem is fixed-parameter tractable if the first agent jobs are unweighed, while the
more general case (where the first agent jobs are weighted) is left open.
5.1
The 1
P
The 1
general 1
(1)
Ej
P
P
(1)
Ej
P
≥ A1 ,
(1)
Ej
P
≥ A1 ,
(2)
Cj
≥ A1 ,
easy-to-prove lemma:
P
(2)
(2)
wj C j
problem
≤ A2
≤ A2 problem is known to be NP-complete [29]. We next prove that the more
(2)
(2)
wj Cj
≤ A2
problem is FPT with respect to k. As usual, we begin with an
P
Lemma 8. In any feasible schedule for the 1
(1)
Ej
≥ A1 ,
P
(2)
(2)
wj Cj
≤ A2
problem the jobs in E (1) are
scheduled in non-decreasing due date (EDD) order. Moreover, if there is a feasible solution for the problem,
P (1)
then there is a feasible solution in which |Eb(1) | =
Ej = A1 , and the jobs in set Tb (1) = J (1) \ Eb(1) are
scheduled last in an arbitrary order.
Following Lemma 8, we assume without loss of generality that the jobs in J (1) are indexed according to
(1)
the EDD rule, i.e., d1
(1)
≤ d2
(1)
≤ ... ≤ dn . We will show that for any fixed ordering of the jobs of agents
2, we can determine in polynomial time whether there exists a feasible schedule where the relative order of
agent 2 jobs is exactly this ordering. Since there are k! orderings of the jobs of agent 2, this will imply that
P
the 1
(1)
Ej
≥ A1 ,
P
(2)
(2)
wj Cj
≤ A2
(2)
problem is FPT with respect to k.
(2)
Consider any fixed ordering J1 , . . . , Jk
(1)
(1)
of the jobs of agent 2. For convenience purposes, let J0
(1)
(1)
Jn+1 be two dummy jobs of agent 1 with p0 = w0
(1)
any given feasible schedule σ with Ja
(1)
and Jb
(1)
(1)
(1)
and
(1)
= d0 = pn+1 = wn+1 = 0 and dn+1 = ∞. Consider
being two jobs of agent 1 that are scheduled in JIT mode,
(1)
(1)
(1)
(1)
with no other jobs of agent 1 scheduled in between them. Obviously, db − da − pb ≥ 0, as otherwise Ja
(1)
and Jb
cannot be both scheduled in JIT mode. For ℓ ∈ {0, . . . , k − 1}, let k(a, b, ℓ) denote the number of
(2)
(2)
jobs in a maximal consecutive subsequence of jobs in {Jℓ+1 , . . . , Jk } with total processing time not greater
(1)
(1)
(1)
than db − da − pb . Then the following lemma holds:
(1)
Lemma 9. Suppose there is a feasible schedule in which Ja
(1)
and Jb
are scheduled in JIT mode with
no other jobs of agent 1 scheduled between them, and there are exactly ℓ jobs belonging to agent 2 that are
19
(2)
(1)
(2)
scheduled prior to Ja . Then there exists a feasible schedule where the sequence of jobs Jℓ+1 , . . . , Jℓ+k(a,b,ℓ) is
(1)
scheduled right after the completion time of job Ja , and no other jobs are scheduled prior to the completion
(1)
of job Jb .
(1)
(1)
For a pair of jobs Ja , Jb
(2)
∈ J (1) and ℓ ∈ {0, . . . , k−1}, let w(a, b, ℓ) denote the minimum contribution of
(2)
the job sequence Jℓ+1 , . . . , Jℓ+k(a,b,ℓ) to the total weighted completion time of agent 2 in any feasible schedule
σ. If no such schedule exists, define w(a, b, ℓ) = ∞. According to Lemma 9 we can compute w(a, b, ℓ) by
using the following formula:
ℓ+k(a,b,ℓ)
w(a, b, ℓ) =
X
ℓ+k(a,b,ℓ)
(2) (2)
wj Cj
X
=
j=ℓ+1
(2)
wj
d(1)
a
j=ℓ+1
+
j
X
i=ℓ+1
(2)
pi
!
(12)
.
Now, for b, e ∈ {0, . . . , n + 1}, and ℓ ∈ {0, . . . , k − 1}, let W (b, e, ℓ) denote the minimum total
weighted completion time of the first ℓ jobs of agent 2, among all partial schedules on the job set
(1)
(1)
(2)
(2)
{J1 , . . . , Jb , J1 , . . . , Jℓ }, such that e = |Eb(1) | =
P
(1)
Ej
(1)
and Jb
∈ Eb(1) is the last job to be scheduled.
(Again, set W (b, e, ℓ) = ∞ if no such schedule exists.) Note that by definition, the completion time of such
(1)
a feasible partial schedule is exactly at time db . The value W (b, e, ℓ) can be computed using the following
recursion that considers all possible ways of appending partial schedules that have fewer jobs of agent 2 and
one less JIT job of agent 1:
(1)
(1)
′
′
W (a, e − 1, ℓ′ ) + w(a, b, ℓ′ ) : d(1)
b − da − pb ≥ 0, ℓ = ℓ + k(a, b, ℓ ).
W (b, e, ℓ) = min
0≤a≤b−1
0≤ℓ′ ≤ℓ
∞
: otherwise.
(13)
Our algorithm computes all possible W (b, e, ℓ) values for b ∈ {0, ..., n + 1}, e ∈ {0, ..., A1 }, and ℓ ∈
{0, ..., k}, using the recursion given in Equation 13. For this, it computes in a preprocessing step all values
w(a, b, ℓ) and k(a, b, ℓ), for 0 ≤ a < b ≤ n + 1 and 0 ≤ ℓ ≤ k. The base cases of the recursion are given by
W (0, 0, 0) = 0, and W (0, e, ℓ) = ∞ for e 6= 0 or ℓ 6= 0. We report that there exists a feasible schedule for our
1
P
(1)
Ej
≥ A1 ,
P
(2)
Cj
≤ A2
(2)
(2)
instance, restricted to the relative fixed ordering J1 , . . . , Jk
for the jobs
of agent 2, iff W (n + 1, A1 , k) ≤ A2 .
Correctness of our algorithm is immediate from the above discussion. Let us now analyze its time complexity. There are k! ways to order the jobs of agent 2. For each such order, we compute all values W (b, e, ℓ),
w(a, b, ℓ) and k(a, b, ℓ). All values k(a, b, ℓ) can be computed straightforwardly in O(n2 k 2 ) time. Using these
20
values, and Equation 12, all values w(a, b, ℓ) can also be computed in O(n2 k 2 ) time. Finally, using dynamic
programming along with Equation 13, computing all values W (b, e, ℓ) requires O(n3 k 2 ) time. Thus, for each
fixed ordering of J (2) , we spend a total of O(n3 k 2 ) time. All together, this gives us an O(k!k 2 n3 ) time
algorithm.
P
Theorem 8. The 1
5.2
P
The 1
(1)
(1)
Ej
(1)
wj Ej
≥ A1 ,
≥ A1 ,
P
P
(2)
(2)
≤ A2
(2)
(2)
≤ A2
wj Cj
wj Uj
problem is solvable in O(k!k 2 n3 ) time.
problem
P
We next show how to modify the ideas used in Section 5.1 so that they apply to the 1
P
A1 ,
(2)
(2)
wj Uj
≤ A2
problem. We begin with the following analog of Lemma 8:
Lemma 10. In any feasible schedule for an instance of the 1
P
(1)
(1)
wj Ej
≥ A1 ,
P
(2)
(2)
wj Uj
(1)
(1)
wj Ej
≥
≤ A2 problem,
the jobs in Eb(1) ∪ E (2) are scheduled in an earliest due date (EDD) order. Moreover, if there is a feasible
solution for the instance, then there is a feasible solution in which the jobs in set Tb (1) ∪ T (2) are scheduled
last in an arbitrary order.
Following Lemma 10, we assume that the jobs in J (1) are numbered according to the EDD rule such that
(1)
d1
(1)
≤ d2
(1)
≤ ... ≤ dn . We create O(2k ) instances of the problem, according to all possible candidate sets
for E (2) such that
(2)
A1 , Lmax ≤ 0
P
(2)
(2)
Jj ∈E
/ (2)
wj
≤ A2 holds. Each instance is in fact an instance of the 1
P
(1)
(1)
wj Ej
≥
problem which includes the n jobs of agent 1 and only the O(k) early jobs of agent 2. In
the reduced instance, we need to determine whether there exists a schedule where each job in E (2) is indeed
P
early (i.e., completed not later than its due date) and
this problem in polynomial time.
(2)
We begin by renumbering the jobs in E (2) such that d1
(1)
Section 5.1, we add two dummy jobs J0
(1)
(1)
(1)
≥ A1 . Below, we show how we can solve
wj Ej
(2)
≤ d2
(1)
and Jn+1 with d0
(2)
≤ ... ≤ dk′ , where k ′ = |E (2) |. As in
(1)
= p0
(1)
= w0
(1)
(1)
= pn+1 = wn+1 = 0 and
(1)
dn+1 = ∞. Furthermore, we again let k(a, b, ℓ) denote, for 0 ≤ a < b ≤ n and 0 ≤ ℓ < k ′ , the length
(2)
(2)
of the maximal consecutive subsequence of jobs in {Jℓ+1 , . . . , Jk′ } with total processing time not greater
(1)
(1)
(1)
(1)
than db − da − pb . Then Lemma 9 holds here as well, and we can assume that if Ja
(2)
(1)
and Jb
(2)
are both
scheduled in JIT mode, with no other agent 1 jobs between them, then Jℓ+1 , . . . , Jℓ+k(a,b,ℓ) is scheduled right
(1)
after the completion of Ja
(1)
(and no other jobs are scheduled prior to the completion of Jb ).
21
(1)
Since no jobs of agent 2 are allowed to be late, a partial schedule that includes jobs Ja
(1)
consecutive JIT jobs with ℓ′ early jobs of agent 2 scheduled before Ja
(1)
ℓ′ + k(a, b, ℓ′ ) early jobs of agent 2 scheduled before Jb
(1)
(1)
(1)
and Jb
as two
is a feasible partial schedule with
only if the following two conditions holds:
(1)
Condition 1 : db − da − pb ≥ 0; and
(1)
Condition 2 : da +
Pj
(2)
i=ℓ′ +1
pi
(2)
− dj
≤ 0 for all j = ℓ′ + 1, ..., l′ + | k(a, b, ℓ′ ) |.
Now, let W (b, ℓ) represent the maximum total weighted number of JIT jobs among all partial schedules
(1)
(1)
(2)
(2)
(2)
(2)
(1)
on job set {J1 , . . . , Jb , J1 , . . . , Jℓ } where all jobs {J1 , . . . , Jℓ } are early and Jb
∈ Eb(1) is the last
scheduled job. Note that as opposed to Section 5.1, here this value represents the criteria of agent 1. Each
value W (b, ℓ) can be computed with the following recursion that considers all possible ways of appending
partial schedules that have fewer early jobs of agent 2 and one less JIT job of agent 1:
W (b, ℓ) =
W (a, ℓ′ ) + w(1)
: conditions 1 and 2 hold and ℓ = ℓ′ + |k(a, b, ℓ′ )|.
b
max
(14)
0≤a≤b−1
0≤ℓ′ ≤ℓ−1
−∞
: otherwise.
The base cases for this recursion are given by W (0, 0) = 0, and W (0, ℓ) = −∞ for ℓ 6= 0.
Our algorithm reports that there exists a feasible solution to the instance of 1
A1 ,
P
(2)
(2)
wj Uj
≤ A2 problem iff for some set E (2) with
P
(2)
(2)
Jj ∈E
/ (2)
wj
P
(1)
(1)
wj Ej
≥
≤ A2 we have W (n+1, |E (2)|) ≥ A1 .
The running time of this algorithm can be bounded by O(2k k 2 n2 ), using a similar analysis to the one given
in Section 5.1. Thus, we obtain:
Theorem 9. The 1
5.3
The 1
P
P
(1)
(1)
(1)
wj Ej
(1)
wj Ej
≥ A1 ,
P
It is known that the 1
≥ A1 ,
(1)
P
(1)
wj Ej
P
(2)
(2)
wj Uj
(2)
(2)
wj Ej
≥ A1 ,
P
problem
≥ A2
(2)
problem is solvable in O(2k k 2 n2 ) time.
≤ A2
(2)
wj Ej
≥ A2
problem is NP-complete, and that it is
polynomial-time solvable if the weights of either one of the two agents are all equal [29]. Below we show that
(i) the problem is NP-complete even for the case of unit processing time; and that (ii) the general problem
(with arbitrary processing time) is FPT with respect to k.
(1)
Theorem 10. The 1 pj
(2)
= pj
= 1,
P
(1)
(1)
wj Ej
≥ A1 ,
22
P
(2)
(2)
wj Ej
≥ A2
problem is NP-complete.
Proof. Given an instance (X, z) to the NP-hard Partition problem (see Definition 1), we construct the
(2)
(1)
= pj
following instance for the 1 pj
= 1,
P
(2)
(1)
= wj
k = m, and for j = 1, ..., n we set wj
(1)
(1)
wj Ej
≥ A1 ,
(1)
= xj and dj
(1)
Moreover, we set A1 = A2 = z. Note that since jobs Jj
P
(2)
= dj
(2)
and Jj
(2)
(2)
wj Ej
≥ A2
problem. We set n =
(1)
= j (recall that here pj
(2)
= pj
= 1).
have the same due date of j for j = 1, ..., n,
only one of them can be completed in a JIT mode. Thus, the total gain for both agents is restricted to be
Pn
not more than
j=1
xj = 2z.
Suppose that X can be partitioned into two sets S1 and S2 with
(i)
each job in {Jj
(i)
P
xj ∈S1
xj =
P
xj ∈S2
xj = z. Schedule
| xj ∈ Si } during time interval (j − 1, j], and schedule the remaining jobs in an arbitrary
order. Then each job in {Jj
The fact that
P
xj ∈Si
(i)
| xj ∈ Si } is scheduled in JIT mode, and Eb(i) = {Jj | xj ∈ Si } for i = 1, 2.
xj = z, for i = 1, 2, implies that in σ we have
Thus, there is a feasible schedule for our constructed instance.
For the other direction, suppose there exists a schedule σ with
P
P
(i)
(i)
Jj ∈Eb(i)
(i)
(i)
wj Ej
wj
= z for each agent i.
≥ Ai = z for i = 1, 2. Then
since the total gain in the objective function of both agents is restricted to be not more than 2z, we have
that
P
(i)
(i)
wj Ej
(i)
= z for i = 1, 2. This means that by setting Si = {xj : Ej
solution for (X, z) with
P
xj ∈Si
Next, we show that the 1
= 1}, for i = 1, 2, we obtain a
⊓
⊔
xj = z for i = 1, 2.
P
(1)
(1)
wj Ej
≥ A1 ,
P
(2)
(2)
wj Ej
≥ A2
problem is FPT with respect to k. To
(i)
this end, it is convenient to view all jobs in J (1) ∪ J (2) as time intervals. For a job Jj ∈ J (1) ∪ J (2) , let the
(i)
time interval of Jj
(i)
(i)
(i)
(i)
(i)
be Ij = (dj − pj , dj ]. Then if Jj
is required to be scheduled in JIT mode, it has to
(i)
be scheduled within its time interval Ij . Thus, any pair of jobs Jj1 , Jj2 ∈ J (1) ∪ J (2) can be simultaneously
scheduled in JIT mode iff Ij1 ∩ Ij2 = ∅. This means that our goal now translates to finding a set of pairwise
disjoint time intervals, for which the total weight of set of intervals related to the jobs of each agent met its
bound.
We try out all possible candidates for Eb(2) ; that is, all subsets of agent 2 jobs J2 ⊆ J (2) that have
pairwise disjoint time intervals and
P
(2)
(2)
Jj ∈J2
wj
≥ A2 . For each such subset J2 , we compute the subset of
agent 1 jobs J1 ⊆ J (1) with time intervals that do not intersect any time interval of a job in J2 . That is,
(1)
J1 = {Jj
(1)
∈ J (1) : Ij
(2)
∩ Ii
(2)
= ∅ for all Ji
(1)
subset I1∗ of intervals in the set I1 = {Ij
∈ J2 }. We then compute a maximum weight pairwise disjoint
(1)
: Jj
∈ J1 }, and report that we have found a feasible schedule if
23
(1)
the total weight of the jobs in J1∗ = {Jj
(1)
: Ij
∈ I1∗ } is at least A1 . If no such subset of jobs J1∗ is found
for any possible candidate for Eb(2) , we report that our instance has no feasible schedule.
Correctness of our algorithm follows from the fact that we compute the optimal set Eb(1) for each possible
candidate for Eb(2) . There are O(2k ) candidates J2 for Eb(2) . For each candidate J2 , computing the set J1 can
be done in O(n log n + k log n) = O(n log n) time. Moreover, the set J1∗ can be computed in O(n log n) time
(e.g. using [12]). Thus, in total, our algorithm runs in O(2k n log n) time.
Theorem 11. The 1
6
P
(1)
(1)
wj Ej
≥ A1 ,
P
(2)
(2)
wj Ej
problem is solvable in O(2k n log n) time.
≥ A2
Conclusions and Open Problems
In this paper we initiated a parameterized analysis for two-agent single-scheduling problems, where the
parameter studied is the number k of jobs belonging to the second agent. We considered three possible
scheduling criteria – total weighted completion time, total weighted number of tardy jobs, and total weighted
number of JIT jobs – and all possible combinations of these criteria for each agent. Our analysis shows that
parameter k indeed provides various positive results in different settings, and is summarized in Table 1 below.
There are several directions to directly extend our work. First, one can find different parameters such
as the number of different processing times in the input, or the number of different due dates. Many such
parameterizations make perfect sense for practical applications. Second, one consider other scheduling criteria
not considered in this paper such as the maximal lateness. Below we list the three most important questions
that were left open directly from our work:
1. Determine the parameterized complexity of the 1
P
Uj
P
wj Ej
(1)
≤ A1 ,
its variants (unit weights, unit processing times, etc ...).
2. Determine the parameterized complexity of the 1
(1)
(1)
P
(2)
(2)
wj Cj
≥ A1 ,
P
(2)
≤ A2
(2)
wj Cj
problem, or any of
≤ A2
problem.
3. Can the running times of the algorithms presented in Sections 3.2 and 3.3 be improved? More specifically,
are there purely combinatorial algorithms for these problems, avoiding ILPs altogether?
24
P
≤ A2
P
= 1 (Th. 1),
Hard for wj
(1)
= 1 (Th. 2),
FPT for wj
(1)
= 1 (Th. 3).
(2)
(2)
wj C j
(2)
Hard for wj
P
(1)
(1)
wj C j
≤ A1
FPT for wj
FPT for pj
(2)
(1)
Hard in general (Cor. 2),
P
(1)
(1)
wj Uj
≤ A1
(1)
Open for wj
= 1.
(2)
(2)
wj Uj
P
≤ A2
(1)
(2)
≥ A2
= 1 (Th. 1),
Hard even when
= 1 (Th. 3).
wj = 1 (Cor. 1).
(i)
Hard in general (Cor. 2),
FPT for wj
(2)
wj Ej
= 1 (Th. 6),
Hard even when
(i)
(1)
wj = 1 and dj
= d (Cor. 4).
(i)
FPT for pj = 1 (Th. 7).
Open in general,
P
(1)
(1)
wj Ej
(1)
≥ A1 FPT when wj
= 1 (Th. 8).
FPT
(Th. 9)
FPT
(Th. 11)
Table 1. A table depicting most of the results presented in the paper. Rows correspond to the different scheduling
criteria for agent 1, while columns are associated with the different criteria for agent 2.
7
Acknowledgments
The research leading to these results has received funding from the People Programme (Marie Curie Actions)
of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement
number 631163.11, and by the Israel Science Foundation (grant No. 1055/14). Nimrod Talmon was supported
by a postdoctoral fellowship from I-CORE ALGO.
References
1. I. Adiri, J. Bruno, E. Frostig, and A.H.G. Rinnooy Kan. Single machine flow-time scheduling with a single
breakdown. Acta Informatica, 26(7):679–696, 1989.
2. A. Agnetis, J.C. Billaut, S. Gawiejnowicz, D. Pacciarelli, and A. Soukhal. Multiagent Scheduling: Models and
Algorithms. Imprint: Springer, 2014.
3. A. Agnetis, P.B. Mirchandani, D. Pacciarelli, and A. Pacifici. Scheduling problems with two competing agents.
Operations Research, 52(2):229–242, 2004.
25
4. K.R. Baker and J.C. Smith. A multiple-criterion model for machine scheduling. Journal of Scheduling, 6(1):7–16,
2003.
5. H.L. Bodlaender and M.R. Fellows. W[2]-hardness of precedence constrained k-processor scheduling. Operations
Research Letters, 18(2):93–97, 1995.
6. P. Brucker. Scheduling algorithms. Springer Science, 2006.
7. M. Cygan, F.V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, and M. Pilipczuk. Parameterized
Algorithms. Springer, 2015.
8. R.G. Downey and M.R. Fellows. Parameterized Complexity. Springer, 1999.
9. M.R. Fellows and C. McCartin. On the parametric complexity of schedules to minimize tardy tasks. Theoretical
Computer Science, 298(2):317–324, 2003.
10. J. Flum and M. Grohe. Parameterized Complexity Theory. An EATCS Series: Texts in Theoretical Computer
Science. Springer, 1998.
11. M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. 1979.
12. U. I. Gupta, D. T. Lee, and Joseph Y.-T. Leung. Efficient algorithms for interval graphs and circular-arc graphs.
Networks, 12(4):459–467, 1982.
13. R.M. Karp. Reducibility among combinatorial problems. In Raymond E. Miller and James W. Thatcher, editors,
Complexity of Computer Computations, pages 85–103. 1972.
14. M.Y. Kovalyov, A. Oulamara, and A. Soukhal. Two-agent scheduling on an unbounded serial batching machine.
In Combinatorial Optimization, pages 427–438. Springer, 2012.
15. C.Y. Lee. Machine scheduling with an availability constraint. Journal of Global Optimization, 9(3-4):395–416,
1996.
16. C.Y. Lee and S.D. Liman. Single machine flow-time scheduling with scheduled maintenance. Acta Informatica,
29(4):375–382, 1992.
17. K. Lee, B.C. Choi, J.Y.T. Leung, and M.L. Pinedo. Approximation algorithms for multi-agent scheduling to
minimize total weighted completion time. Information Processing Letters, 109(16):913–917, 2009.
18. H.L. Lenstra. Integer programming with a fixed number of variables. Mathematics of Operations Research,
8(4):538–548, 1983.
19. J.Y.T. Leung. Handbook of Scheduling: Algorithms, Models and Performance Analysis. Springer, 2015.
20. J.Y.T. Leung, M. Pinedo, and G. Wan. Competitive two-agent scheduling and its applications. Operations
Research, 58(2):458–469, 2010.
26
21. M. Mnich and A. Wiese. Scheduling meets fixed-parameter tractability. Mathematical Programming, 154(1):533–
562, 2015.
22. J.M. Moore. An n job, one machine sequencing algorithm for minimizing the number of late jobs. Management
Science, 15.
23. B. Mor and G. Mosheiov. Single machine batch scheduling with two competing agents to minimize total flowtime.
European Journal of Operational Research, 215(3):524–531, 2011.
24. C.T. Ng, T.C.E. Cheng, and J.J. Yuan. A note on the complexity of the problem of two-agents scheduling on a
single machine. Journal of Combinatorial Optimization, 12(4):387–394, 2006.
25. R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford Lecture Series in Mathematics and Its Applications. Oxford Univerity Press, 2006.
26. D. Oron, D. Shabtay, and G. Steiner. Single machine scheduling with two competing agents and equal job
processing times. European Journal of Operational Research, 244(1):86–99, 2015.
27. P. Perez-Gonzalez and J.M. Framinan. A common framework and taxonomy for multicriteria scheduling problems
with interfering and competing jobs: Multi-agent scheduling problems. European Journal of Operational Research,
235(1):1–16, 2014.
28. M.L. Pinedo. Scheduling: theory, algorithms, and systems. Springer Science & Business Media, 2012.
29. D. Shabtay, O. Dover, and M. Kaspi. Single-machine two-agent scheduling involving a just-in-time criterion.
International Journal of Production Research, 53(9):2590–2604, 2015.
30. W.E Smith. Various optimizers for single-stage production. Naval Research Logistics, 3:59–66, 1956.
31. R. van Bevern, M. Mnich, R. Niedermeier, and M. Weller. Interval scheduling and colorful independent sets.
Journal of Scheduling, 18(5):449–469, 2015.
32. R. van Bevern, R. Niedermeier, and O. Suchý. A parameterized complexity view on non-preemptively scheduling
interval-constrained jobs: few machines, small looseness, and small slack. CoRR, abs/1508.01657, 2015.
33. Y. Yin, S.R. Cheng, T.C.E. Cheng, D.J. Wang, and C.C. Wu. Just-in-time scheduling with two competing agents
on unrelated parallel machines. Omega, 63:41–47, 2016.
34. J.J. Yuan, W.P. Shang, and Q. Feng. A note on the scheduling with two families of jobs. Journal of Scheduling,
8(6):537–542, 2005.
27
| 8cs.DS
|
Constant Approximation for Capacitated k-Median with
(1 + )-Capacity Violation
arXiv:1603.02324v2 [cs.DS] 11 May 2016
Gökalp Demirci∗
Shi Li†
Abstract
We study the Capacitated k-Median problem for which existing constant-factor approximation algorithms are all pseudo-approximations that violate either the capacities or the upper
bound k on the number of open facilities. Using the natural LP relaxation for the problem, one
can only hope to get the violation factor down to 2. Li [SODA’16] introduced a novel LP to go
beyond the limit of 2 and gave a constant-factor approximation algorithm that opens (1 + )k
facilities.
We use the configuration LP of Li [SODA’16] to give a constant-factor approximation for
the Capacitated k-Median problem in a seemingly harder configuration: we violate only the
capacities by 1 + . This result settles the problem as far as pseudo-approximation algorithms
are concerned.
1
Introduction
In the capacitated k-median problem (CKM), we are given a set F of facilities together with their
capacities ui ∈ Z>0 for i ∈ F , a set C of clients, a metric d on F ∪ C, and a number k. We are
asked to open some of these facilities F 0 ⊆ F and give an assignment σ : C → F 0 connecting each
client to one of the open facilities so that the number of open facilities is not bigger than k, i.e.
|F 0 | ≤ k (cardinality constraint), and each facility i ∈ F 0 is connected to at most ui clients, i.e.
σ −1 (i) ≤ ui (capacity constraint). The goal is to minimize the sum of the connection costs, i.e.
P
j∈C d(σ(j), j).
Without the capacity constraint, i.e. ui = ∞ for all i ∈ F , this is the famous k-median problem
(KM). The first constant-factor approximation algorithm for KM is given by Charikar et al. [9],
guaranteeing a solution within 6 23 times the cost of the optimal solution. Then the approximation
ratio has been improved by a series of papers [13, 8, 3, 12, 17, 5]. The current best ratio for KM is
2.675 + due to Byrka et al. [5], which was obtained by improving a part of the algorithm given
by Li and Svensson [17].
On the other hand, we don’t have a true constant approximation for CKM. All known constantfactor results are pseudo-approximations which violate either the cardinality or the capacity constraint. Aardal et al. [1] gave an algorithm which finds a (7 + )-approximate solution to CKM
by opening at most 2k facilities, i.e. violating the cardinality constraint by a factor of 2. Guha
[11] gave an algorithm with approximation ratio 16 for the more relaxed uniform CKM, where all
∗
Department of Computer Science, University of Chicago, [email protected].
Department of Computer Science and Engineering, University at Buffalo, [email protected]. Supported in part
by NSF grant CCF-1566356.
†
1
capacities are the same, by connecting at most 4u clients to each facility, thus violating the capacity
constraint by 4. Li [14] gave a constant-factor algorithm for uniform CKM with capacity violation
of only 2 + by improving the algorithm in [9]. For non-uniform capacities, Chuzhoy and Rabani
[10] gave a 40-approximation for CKM by violating the capacities by a factor of 50 using a mixture
of primal-dual schema and lagrangian relaxations. Their algorithm is for a slightly relaxed version
of the problem called soft CKM where one is allowed to open multiple collocated copies of a facility
in F . The CKM definition we gave above is sometimes referred to as hard CKM as opposed to
this version. Recently, Byrka et al. [4] gave a constant-factor algorithm for hard CKM by keeping
capacity violation factor under 3 + .
All these algorithms for CKM use the basic LP relaxation for the problem which is known
to have an unbounded integrality gap even when we are allowed to violate either the capacity
or the cardinality constraint by 2 − . In this sense, results of [1] and [14] can be considered as
reaching the limits of the basic LP relaxation in terms of restricting the violation factor. In order
to go beyond these limits, Li [15] introduced a novel LP called the rectangle LP and presented a
constant-factor approximation algorithm for soft uniform CKM by opening (1 + )k facilities. This
was later generalized by the same author to non-uniform CKM [16], where he introduced an even
stronger LP relaxation called the configuration LP. Very recently, independently of the work in
this paper, Byrka et al. [6] used this configuration LP to give a similar algorithm for uniform CKM
violating the capacities by 1 + .
1.1
Our Result
In this paper, we use the configuration LP of [16] to give an O(1/5 )-approximation algorithm for
non-uniform hard CKM which respects the cardinality constraint and connects at most (1 + )ui
clients to any open facility i ∈ F . The running time of our algorithm is nO(1/) . Thus, with
this result, we now have settled the CKM problem from the view of pseudo-approximation algorithms: either (1 + )-cardinality violation or (1 + )-capacity violation is sufficient for a constant
approximation for CKM.
The known results for the CKM problem have suggested that designing algorithms with capacity
violation (satisfying the cardinality constraint) is harder than designing algorithms with cardinality
violation. Note, for example, that the best known cardinality violation factor for non-uniform CKM
among algorithms using only the basic LP relaxation (a factor of 2 in [1]) matches the smallest
possible cardinality violation factor dictated by the gap instance. In contrast, the best capacityviolation factor is 3 + due to [4], but the gap instance for the basic LP with the largest known
gap eliminates only the algorithms with capacity violation smaller than 2.
Furthermore, we can argue that, for algorithms based on the basic LP and the configuration
LP, a β-capacity violation can be converted to a β-cardinality violation, suggesting that allowing
capacity violation is more restrictive than allowing cardinality violation. Suppose we have an αapproximation algorithm for CKM that violates the capacity constraint by a factor of β, based on
the basic LP relaxation. Given a solution (x, y) to the basic LP for a given CKM instance I, we
construct a new instance I 0 by scaling k by a factor of β and scaling all capacities by a factor of
1/β (in a valid solution, we allow connections to be fractional, thus fractional capacities do not
cause issues). Then it is easy to see that (x, βy) is a valid LP solution to I 0 (with soft capacities).
A solution to I 0 that only violates the capacity constraint by a factor of β is a solution to I that
only violates the cardinality constraint by a factor of β. Thus, by considering the new instance, we
conclude that for algorithms based on the basic LP relaxation, violating the cardinality constraint
2
gives more power. The same argument can be made for algorithms based on the configuration
LP: one can show that a valid solution to the configuration LP for I yields a valid solution to
the configuration LP for I 0 . However, this reduction in the other direction does not work: due to
constraint (3), scaling y variables by a factor of 1/β does not yield a valid LP solution.
Our Techniques. Our algorithm uses the configuration LP introduced in [16] and the framework
of [16] that creates a two-level clustering of facilities. [16] considered the (1+)-cardinality violation
setting, which is more flexible in the sense that one has the much freedom to distribute the k extra
facilities. In our (1 + )-capacity violation setting, each facility i can provide an extra ui capacity;
however, these extra capacities are restricted by the locations of the facilities. In particular, we need
one more level of clustering to form so-called “groups” so that each group contains Ω(1/) fractional
open facility. Only with groups of Ω(1/) facilities, we can benefit from the extra capacities given
by the (1+)-capacity scaling. Our algorithm then constructs distributions of local solutions. Using
a dependent rounding procedure we can select a local solution from each distribution such that the
solution formed by the concatenation of local solutions has a small cost. This initial solution may
contain more than k facilities. We then remove some already-open facilities, and bound the cost
incurred due to the removal of open facilities. When we remove a facility, we are guaranteed that
there is a close group containing Ω(1/) open facilities and the extra capacities provided by these
facilities can compensate for the capacity of the removed facility.
Organization. The remaining part of the paper is organized as follows. In Sections 2 and 3, we
describe the configuration LP introduced in [16] and our three-level clustering procedure respectively. In Section 4, we show how to construct the distributions of local solutions. Then finally in
Section 5, we show how to obtain our final solution by combining the distributions we constructed.
2
The Basic LP and the Configuration LP
In this section, we give the configuration LP of [16] for CKM. We start with the following basic LP
relaxation:
P
min
s.t.
(Basic LP)
i∈F,j∈C d(i, j)xi,j
P
P
i∈F
i∈F
yi ≤ k;
xi,j = 1,
xi,j ≤ yi ,
P
(1)
∀j ∈ C;
∀i ∈ F, j ∈ C;
j∈C
(2)
xi,j ≤ ui yi ,
0 ≤ xi,j , yi ≤ 1,
(3)
∀i ∈ F ;
∀i ∈ F, j ∈ C.
(4)
(5)
In the LP, yi indicates whether a facility i ∈ F is open, and xi,j indicates whether client j ∈ C
is connected to facility i ∈ F . Constraint (1) is the cardinality constraint assuring that the number
of open facilities is no more than k. Constraint (2) says that every client must be fully connected
to facilities. Constraint (3) requires a facility to be open in order to connect clients. Constraint (4)
is the capacity constraint.
It is well known that the basic LP has unbounded integrality gap, even if we are allowed to
violate the cardinality constraint or the capacity constraint by a factor of 2 − . In the gap instance
for the capacity-violation setting, each facility has capacity u, k is 2u − 1, and the metric consists
of u isolated groups each of which has 2 facilities and 2u − 1 clients that are all collocated. In other
words, the distances within a group are all 0 but the distances between groups are nonzero. Any
integral solution for this instance has to have a group with at most one open facility. Therefore,
even with (2 − 2/u)-capacity-violation, we have to connect 1 client in this group to open facilities
3
in other groups. On the other hand, a fractional solution to the basic LP relaxation opens 2 − 1/u
facilities in each group and serves the demand of each group using only the facilities in that group.
Note that the gap instance disappears if we allow a capacity violation of 2.1
In order to overcome the gap in the cardinality-violation setting, Li [16] introduced a novel LP
for CKM called the configuration LP, which we formally state below. Let us fix a set B ⊆ F of
facilities. Let ` = Θ(1/) and `1 = Θ(`) be sufficiently large integers. Let S = {S ⊆ B : |S| ≤ `1 }
and Se = S ∪ {⊥}, where ⊥ stands for “any subset of B with size more than `1 ”; for convenience,
we also treat ⊥ as a set such that i ∈ ⊥ holds for every i ∈ B. For S ∈ S, let zSB indicate the event
B indicate the event that the number of open
that the set of open facilities in B is exactly S and z⊥
facilities in B is more than `1 .
B indicates the event that z B = 1 and i is open. (If i ∈ B but
For every S ∈ Se and i ∈ S, zS,i
S
B = z B ; we
i∈
/ S, then the event will not happen.) Notice that when i ∈ S 6= ⊥, we always have zS,i
S
e i ∈ S and client j ∈ C, z B indicates
keep both variables for notational purposes. For every S ∈ S,
S,i,j
B = 1 and j is connected to i. In an integral solution, all the above variables are
the event that zS,i
{0, 1} variables. The following constraints are valid. To help understand the constraints, it is good
B as z B · y and z B
B
to think of zS,i
i
S
S,i,j as zS · xi,j .
X
zSB = 1;
(6)
S∈Se
X
e
S∈S:i∈S
X
0
B
zS,i
= yi , ∀i ∈ B;
(7)
i∈S
X
B
zS,i,j
= xi,j ,∀i ∈ B, j ∈ C;
e
S∈S:i∈S
B
≤ zS,i,j
≤
B
zS,i
= zSB ,
X
(8)
j∈C
B
zS,i,j
≤ zSB ,
≤
zSB ,
e i ∈ S, j ∈ C;
∀S ∈ S,
(9)
(10)
e j ∈ C;
∀S ∈ S,
(11)
B
B
e i ∈ S;
zS,i,j
≤ ui zS,i
,∀S ∈ S,
X
B
zS,i
∀S ∈ S, i ∈ S;
i∈B
B
B
z⊥,i
≥ `1 z⊥
.
(12)
(13)
e Constraint (7) says that if i is open
Constraint (6) says that zSB = 1 for exactly one S ∈ S.
B
then there is exactly one S ∈ Se with zS,i = 1. Constraint (8) says that if j is connected to i then
there is exactly one S ∈ Se such that z B = 1. Constraint (9) is by the definition of variables.
S,i,j
Constraint (10) holds as we mentioned earlier. Constraint (11) says that if zSB = 1 then j can be
connected to at most 1 facility in S. Constraint (12) is the capacity constraint. Constraint (13)
B = 1, there are at least ` open facilities in B.
says that if z⊥
1
The configuration LP is obtained from the basic LP by adding the z variables and Constraints (6)
to (13) for every B ⊆ F . Since there are exponentially many subsets B ⊆ F , we don’t know how to
solve this LP efficiently. However, note that there are only polynomially many (nO(`1 ) ) z B variables
for a fixed B ⊆ F . Given a fractional solution (x, y) to the basic LP relaxation, we can construct the
values of z B variables and check their feasibility for Constraints (6) to (13) in polynomial time as
in [16]. Our rounding algorithm either constructs an integral solution with the desired properties,
or outputs a set B ⊆ F such that Constraints (6) to (13) are infeasible. In the latter case, we can
find a constraint in the configuration LP that (x, y) does not satisfy. Then we can run the ellipsoid
1
A similar instance can be given to show that the gap is still unbounded when the cardinality constraint is violated,
instead of the capacity constraint, by less than 2: let k = u + 1 and each group have 2 facilities and u + 1 clients.
4
method and the rounding algorithm in an iterative way (see, e.g., [7, 2]).
Notations From now
P on, we fix a solution ({xi,j : i ∈ F, j ∈ C} , {yi : i ∈ F }) to the basic LP.
We
cost of j, for every j ∈ C. Let Di :=
P define dav (j) := i∈F xi,j d(i, j) to be the connectionP
x
(d(i,
j)
+
d
(j))
for
every
i
∈
F
,
and
D
:=
for every S ⊆ F . We denote
av
S
j∈C i,j
i∈S DiP
P
the
value
of
the
solution
(x,
y)
by
LP
:=
x
d(i,
j)
=
i∈F,j∈C i,j
j∈C dav (j). Note that DF =
P
P
P
P
j∈C dav (j) Pi∈F xi,j = 2LP. For any set
i∈F,j∈C xi,j (d(i, j) + dav (j)) =
i∈F,j∈C xi,j d(i, j) +
F 0 ⊆ F of facilities and C 0 ⊆ C of clients, we shall let xF 0 ,C 0 := i∈F
P0 ,j∈C 0 xi,j ; we simply use
0
xi,C 0 for x{i},C 0 and xF 0 ,j for xF 0 ,{j} . For any F ⊆ F , let yF 0 :=
i∈F 0 yi . Let d(A, B) :=
mini∈A,j∈B d(i, j) denote the minimum distance between A and B, for any A, B ⊆ F ∪ C; we
simply use d(i, B) for d({i} , B).
Moving of Demands After the set of open facilities is decided, the optimum connection assignment from clients to facilities can be computed by solving the minimum cost b-matching problem.
Due to the integrality of the matching polytope, we may allow the connections to be fractional.
That is, if there is a good fractional assignment, then there is a good integral assignment. So we
can use the following framework to design and analyze the rounding algorithm. Initially there is
one unit of demand at each client j ∈ C. During the course of our algorithm, we move demands
fractionally within F ∪ C; moving α units of demand from i to j incurs a cost of αd(i, j). At the
end, all the demands are moved to F and each facility i ∈ F has at most (1 + O( 1` ))ui units of
demand. We open a facility if it has positive amount of demand. Our goal is to bound the total
moving cost by O(`5 )LP and the number of open facilities by k.
3
Representatives, Black Components, and Groups
Our algorithm starts with bundling facilities together with a three-phase process each of which
creates bigger and bigger clusters. At the end, we have a nicely formed network of sufficiently big
clusters of facilities. See Figure 1 for illustration of the three-phase clustering.
3.1
Representatives, Bundles and Initial Moving of Demands
In the first phase, we use a standard approach to facility location problems ([18, 19, 9, 16]) to
partition the facilities into bundles {Uv }v∈R , where each bundle Uv is associated with a center
v ∈ C that is called a representative and R ⊆ C is the set of representatives. Each bundle Uv has
a total opening at least 1/2.
Let R = ∅ initially. Repeat the following process until C becomes empty: we select the client
v ∈ C with the smallest dav (v) and add it to R; then we remove all clients j such that d(j, v) ≤
4dav (j) from C (thus, v itself is removed). We use v and its variants to index representatives, and
j and its variants to index general clients. The family {Uv : v ∈ R} is the Voronoi diagram of F
with R being the centers: let Uv = ∅ for every v ∈ R initially; for each location
S i ∈ F , we add i to
Uv for v ∈ R that is closest to i. For any subset V ⊆ R, we use U (V ) := v∈V Uv to denote the
union of Voronoi regions with centers V .
Lemma 3.1. The following statements hold:
(3.1a) for all v, v 0 ∈ R, v 6= v 0 , we have d(v, v 0 ) > 4 max {dav (v), dav (v 0 )}
(3.1b) for all j ∈ C, there exists v ∈ R, such that dav (v) ≤ dav (j) and d(v, j) ≤ 4dav (j);
(3.1c) yUv ≥ 1/2 for every v ∈ R;
5
representatives
facilities
(a). bundles {Uv }v∈R
black components
(b). black components J
and forest Υ∗J
groups
(c). groups G and forest ΥG
Figure 1: The three-phase clustering procedure. In the first phase (Figure (a)), we partition F into
bundles, centered at the set R of representatives. In the second phase (Figure (b)), we partition R
into a family J of black components and construct a degree-2 rooted forest over J . In the third
phase (Figure(c)), we partition J into a family G of groups; ΥG is formed from Υ∗J by contracting
each group into a single node.
(3.1d) for any v ∈ R, i ∈ Uv , and j ∈ C, we have d(i, v) ≤ d(i, j) + 4dav (j).
Proof. First consider Property (3.1a). Assume dav (v) ≤ dav (v 0 ). When we add v to R, we remove
all clients j satisfying d(v, j) ≤ 4dav (j) from C. If v 0 ∈ R, then it must have been d(v, v 0 ) > 4dav (v 0 ).
For Property (3.1b), just consider the iteration in which j is removed from C. The representative v
added to R in this iteration satisfy the property. Then consider Property
(3.1c). By Property
(3.1a),
P
P
we have B := {i ∈ F : d(i, v) ≤ 2dav (v)} ⊆ Uv . Since dav (v) = i∈F xi,v d(i, v) and i∈F xi,v = 1,
we have dav (v) ≥ (1 − xB,v )2dav (v), implying yUv ≥ yB ≥ xB,v ≥ 1/2, due to Constraint (3).
Then we consider Property (3.1d). By Property (3.1b), there is a client v 0 ∈ R such that
dav (v 0 ) ≤ dav (j) and d(v 0 , j) ≤ 4dav (j). Since d(i, v) ≤ d(i, v 0 ) as v 0 ∈ R and i was added to Uv , we
have d(i, v) ≤ d(i, v 0 ) ≤ d(i, j) + d(j, v 0 ) ≤ d(i, j) + 4dav (j).
The next lemma shows that moving demands from facilities to their corresponding representative
doesn’t cost much.
P
Lemma 3.2. For every v ∈ R, we have i∈Uv xi,C d(i, v) ≤ O(1)DUv .
Proof. By Property (3.1d), we have d(i, v) ≤ d(i, j) + 4dav (j) for every i ∈ Uv and j ∈ C. Thus,
X
X
X
xi,C d(i, v) ≤
xi,j d(i, j) + 4dav (j) ≤
4Di = 4DUv .
i∈Uv
i∈Uv ,j∈C
i∈Uv
Since {Uv : v ∈ R} forms a partition of F , we get the following corollary.
6
Corollary 3.3.
P
v∈R,i∈Uv
xi,C d(i, v) ≤ O(1)LP.
Initial Moving of Demands With this corollary, we now move all the demands from C to R.
First for every j ∈ C and i ∈ F , we move xi,j units of demand from j to i. The moving cost of this
step is exactly LP. After the step, all demands are at F and every i ∈ F has xi,C units of demand.
Then, for every v ∈ R and i ∈ Uv , we move the xi,C units of demand at i to v. The moving cost for
this step is O(1)LP. Thus, after the initial moving, all demands are at the set R of representatives:
a representative v has xUv ,C units of demand.
3.2
Black Components
In the second phase, we employ the minimum-spanning-tree construction of [16] to partition the
set R of representatives into a family J of so-called black components. There is a degree-2 rooted
forest Υ∗J over J with many good properties. For example, each non-root black component is not
far away from its parent, and each root black component of Υ∗J contains a total opening of Ω(`).
(For simplicity, we say the total opening at a representative v ∈ R is yUv , which is the total opening
at the bundle Uv .) The forest in [16] can have a large degree, while our algorithm requires the forest
to have degree 2. This property is guaranteed by using the left-child-right-sibling representation.
We now describe the framework of [16]. We run the classic Kruskal’s algorithm to find the
minimum spanning tree MST of the metric (R, d), and then color the edges in MST in black, grey
or white. In Kruskal’s algorithm, we maintain the set EMST of edges added to MST so far and
a partition
P of R. Initially, we have EMST = ∅ and P = {{v} : v ∈ R}. The length of an edge
R
e ∈ 2 is the distance between the two endpoints of e. We sort all edges in R2 in the ascending
order of their lengths, breaking ties arbitrarily. For each pair (v, v 0 ) in this order, if v and v 0 are not
in the same partition in P, we add the edge (v, v 0 ) to EMST and merge the two partitions containing
v and v 0 respectively.
We then color edges in EMST . For every v ∈ R, we say the weight of v is yUv ; so every representative v ∈ R has weight at least 1/2 by Property (3.1c). For a subset J ⊆ R of representatives, we
say J is big if the weight of J is at least `, i.e, yU (J) ≥ `; we say J is small otherwise. For any edge
e = (v, v 0 ) ∈ EMST , we consider the iteration in Kruskal’s algorithm in which the edge e is added to
MST. After the iteration we merged the partition Jv containing v and the partition Jv0 containing
v 0 into a new partition Jv ∪ Jv0 . If both Jv and Jv0 are small, then we call e a black edge. If Jv is
small and Jv0 is big, we call e a grey edge, directed from v to v 0 ; similarly, if Jv0 is small and Jv is
big, e is a grey edge directed from v 0 to v. If both Jv and Jv0 are big, we say e is a white edge. So,
we treat black and white edges as undirected edges and grey edges as directed edges.
We define a black component of MST to be a maximal set of vertices connected by black edges.
Let J be the set of all black components. Thus J indeed forms a partition of R. We contract
all the black edges in MST and remove all the white edges. The resulting graph is a forest ΥJ
of trees over black components in J . Each edge is a directed grey edge. Later in Lemma 3.4, we
show that the grey edges are directed towards the roots of the trees. For every component J ∈ J ,
we define L(J) := d(J, R \ J) to be the shortest distance between any representative in J and any
representative not in J.
A component J in the forest ΥJ may have many child-components. To make the forest binary,
we use the left-child-right-sibling binary-tree representation of trees. To be more specific, for every
component J 0 , we sort all its child-components J according to non-decreasing order of L(J). We add
a directed edge from the first child to J 0 and a directed edge between every two adjacent children
7
in the ordering, from the child appearing later in the ordering to the child appearing earlier. Let
Υ∗J be the new forest. Υ∗J naturally defines a new child-parent relationship between components.
Lemma 3.4. J and Υ∗J satisfy the following properties:
(3.4a) for every J ∈ J , there is a spanning tree over the representatives in J such that for every
edge (v, v 0 ) in the spanning tree we have d(v, v 0 ) ≤ L(J);
(3.4b) every root component J ∈ J of Υ∗J has yU (J) ≥ ` and every non-root component J ∈ J
has yU (J) < `;
(3.4c) every root component J ∈ J of Υ∗J has either yU (J) < 2` or |J| = 1;
(3.4d) for any non-root component J and its parent J 0 , we have L(J) ≥ L(J 0 );
(3.4e) for any non-root component J and its parent J 0 , we have d(J, J 0 ) ≤ O(`)L(J);
(3.4f) every component J has at most two children.
The rest of the section is dedicated to the proof of Lemma 3.4. We first prove some of the above
properties for the original forest ΥJ . We show that all black edges between the representatives
in J are considered before all the edges in J × (R \ J) in Kruskal’s algorithm. Assume otherwise.
Consider the first edge e in J × (R \ J) we considered. Before this iteration, J is not connected yet.
Then we add e to the minimum spanning tree; since J is a black component, e is gray or white. In
either case, the new partition J 0 formed by adding e will have weight more than `. This implies all
edges in J 0 × (R \ J 0 ) added later to the MST are not black. Moreover, J \ J 0 , J 0 \ J and J ∩ J 0 are
all non-empty. This contradicts the fact that J is a black component. Therefore, all black edges in
J has length at most L(J), implying Property (3.4a) .
Focus on a tree T in the initial forest ΥJ and any small black component J in T . All black
edges between the representatives in J are added to MST before any edge in J × (R \ J). The first
edge in J × (R \ J) added to MST is a grey edge directed from J to some other black component: it
is not white because J is small; it is not black since J is a black component. Thus, it is a grey edge
in T . Therefore, the growth of the tree T in Kruskal’s algorithm is as follows. The first grey edge
in T is added between two black components, one of them is big and the other is small. We define
the root of T to be the big component. At each time, we add a new small black component J to the
current T via a grey edge directed from J to T . (During this process, white edges incident to T may
be added.) So, the tree T is a rooted tree with grey edges, where all edges are directed towards the
root. So, Property (3.4b) holds. Moreover, the length of the grey edge between J and its parent J 0
is d(J, J 0 ) = L(J), which is stronger than Property (3.4e). Since d(J, J 0 ) ≥ d(J 0 , R \ J 0 ) = L(J 0 ),
we have Property (3.4d).
The root J of T is a big black component. Suppose it contains two or more representatives;
so it’s not a singleton. Consider the last black edge (v, v 0 ) added between Jv and Jv0 to make
J = Jv ∪ Jv0 . Since (v, v 0 ) is a black edge, both Jv and Jv0 are small, i.e. yU (Jv ) , yU (Jv0 ) < `.
Therefore, we have yU (J) = yU (Jv ) + yU (Jv0 ) < 2`, proving Property (3.4c).
Now, we move on to prove all the properties of the lemma for the final forest Υ∗J . We used the
left-child-right-sibling binary-tree representation of ΥJ to obtain Υ∗J . Thus , Property (3.4f) holds
for Υ∗J . Property (3.4a) is independent of the forest and thus still holds for Υ∗J . A component is
a root in ΥJ if and only if it is a root in Υ∗J . Thus, properties (3.4b) and (3.4c) are maintained
for Υ∗J . Since we sorted the children of a component according to L values before constructing the
left-child-right-sibling binary tree, Property (3.4d) holds for Υ∗J .
8
For every component J and its parent J 0 in the forest Υ∗J , we have L(J) = d(J, R \ J) =
d(J, J 00 ), where J 00 is the parent of J in the initial forest ΥJ . J 0 is either J 00 , or a child of J 00
in ΥJ . In the former case, we have d(J, J 0 ) = d(J, J 00 ) = L(J). In the latter case, we have that
d(J 0 , J 00 ) = L(J 0 ) ≤ L(J) = d(J, J 00 ). Due to Property (3.4a), we have a path connecting some
representative in J to some representative in J 0 , with internal vertices being representatives in J 00 ,
and all edges having length at most L(J). Moreover, there are at most 4` representatives in J 00 due
to Properties (3.4b), (3.4c), and (3.1c). Thus, we have d(J, J 0 ) ≤ O(`)d(J, J 00 ) = O(`)L(J). Thus,
Property (3.4e) holds for Υ∗J . This finishes the proof of Lemma 3.4.
3.3
Groups
In the third phase, we apply a simple greedy algorithm to the forest Υ∗J to partition the set J
of black components into a family G of groups, where each group G ∈ G contains many black
components that are connected in Υ∗J . By contracting each group G ∈ G, the forest Υ∗J over the
set J of black components becomes a forest ΥG over the set G of groups. Each group has a total
opening of Ω(`), unless it is a leaf-group in ΥG .
We partition the set J into groups using a technique similar to [4, 6]. For each rooted tree
T = (JT , ET ) in Υ∗J , we construct aPgroup G of black components as follows. Initially, let G contain
the root component of T . While J∈G yU (J) < ` and G 6= JT , repeat the following procedure.
Choose the component J ∈ JT \ G that is adjacent to G in T , with the smallest L-value, and add
J to G.
Thus, by the construction G is connected in T . After we have constructed the group G, we add
G to G. We remove all black components in G from T . Then, each T is broken into many rooted
trees; we apply the above procedure recursively for each rooted tree.
So, we have constructed a partition G for the set J of components. If for every G ∈ G, we
contract all components in G into a single node, then the rooted forest Υ∗J over J becomes a rooted
forest ΥG over the set G of groups. ΥG naturally defines a parent-child relationship over G. The
following lemma uses Properties (3.4a) to (3.4f) of J and the way we construct G.
Lemma 3.5. The following statements hold for the set G of groups and the rooted forest ΥG over
G:
(3.5a) any root group G ∈ G contains a single root component J ∈ J ;
P
(3.5b) if G ∈ G is not a root group, then J∈G yU (J) < 2`;
P
(3.5c) if G ∈ G is a non-leaf group, then J∈G yU (J) ≥ `;
(3.5d) let G ∈ G, G0 ∈ G be the
S parent of G, J ∈ G and v ∈ J, then the distance between v and
any representative in J 0 ∈G0 J 0 is at most O(`2 )L(J);
(3.5e) any group G has at most O(`) children.
Proof. For a root component J, we have yU (J) ≥ ` by Property (3.4b). Thus, any root group G
contains a single root component J, which is exactly Property (3.5a).
When constructing
the group G from the tree T = (JT , ET ), the terminating condition is
P
G = JT or J∈G yP
U (J) ≥ `. Thus, if G is not a leaf-group, then the condition G = JT does not
hold; thus we have J∈G yU (J) ≥ `, implying Property (3.5c).
By Property (3.4b), any non-root component J has yU (J) < `. Thus, if G is not a root group, the
terminating condition constructing G implies that G P
had total weight less than ` right before the
last black component was added to it. Then we have J∈G yU (J) < 2`, implying Property (3.5b).
9
Now, consider Property (3.5d). From Property (3.4d), it is easy to see that the group G
constructed from the tree T = (JT , ET ) has the following property: the L value of any component
in G is at most the L-value of any component in JT \ G. Let G be a non-root group and G0 be
its parent; let J ∈ G and J 0 ∈ G0 be black components. Thus, there is a path in Υ∗J from J to
J 0 , where components have L-values at most L(J). The edges in the path have length at most
O(`)L(J) by Property (3.4e). Moreover, Property (3.4a) implies that the representatives in each
component in the path are connected by edgesSof length at most L(J). Thus, we can find a path
from v to v 0 that go through representatives in J 00 ∈G∪G0 J 00 , and every edge in the path has length
at most O(`)L(J) = O(`)d(J, R\J). By Property (3.1c), (3.4b) and (3.4c), the total representatives
in the components contained in G (as well as in G0 ) is at most 4`. Thus, the distance between v
and v 0 is at most O(`2 )L(J), which is exactly Property (3.5d).
Finally, since the forest Υ∗J is binary and every group G ∈ G contains at most O(`) components,
we have that every group G contains at most O(`) children, implying Property (3.5e).
4
Constructing Local Solutions
In this section, we shall construct a local solution, or a distribution of local solutions, for a given
set V ⊆ R which is the union of some black components. A local solution for V contains a pair
U (V )
(S ⊆ U (V ), β ∈ R≥0 ), where S is the facilities we open in U (V ) and βi for each i ∈ U (V ) is
the amount of supply at i: the demand that can be satisfied by i. Thus βi = 0 if i ∈ U (V ) \ S.
We shall use the supplies at
PU (V ) to satisfy the xU (V ),C demands at V after the initial moving of
demands; thus, we require i∈U (V ) βi = xU (V ),C . There are two other main properties we need the
distribution to satisfy: (a) the expected size of S from the distribution is not too big, and (b) the
cost of matching the demands at V and the supplies at U (V ) is small.
We distinguish between concentrated black components and non-concentrated black components. Roughly speaking, a component J ∈ J is concentrated if in the fractional solution (x, y),
for most clients j ∈ C, j is either almost fully served by facilities in U (J), or almost fully served
by facilities in F \ U (J). We shall construct a distribution of local solutions for each concentrated
component J. We require Constraints (6) to (13) to be satisfied for B = U (J) (if not, we return
the set U (J) to the separation oracle) and let z B be the vector satisfying the constraints. Roughly
speaking, the z B -vector defines a distribution of
P local solutions for V . A local solution (S, β) is
good if S is not too big and the total demand i∈S βi satisfied by S is not too small. Then, our
algorithm randomly selects (S, β) from the distribution defined by z B , under the condition that
(S, β) is good. The fact that J is concentrated guarantees that the total mass of good local solutions
in the distribution is large; therefore the factors we lose due to the conditioning are small.
For non-concentrated components, we construct a single local solution (S, β), instead of a distribution of local solutions. Moreover, the construction is for the union V of some non-concentrated
components, instead of an individual component. The components that comprise V are close to
each other; by the fact that they are non-concentrated, we can move demands arbitrarily within
V , without incurring too much cost. Thus we can essentially treat the distances between representatives in V as 0. Then we are only concerned with two parameters for each facility i ∈ U (V ):
the distance from i to V and the capacity ui . Using a simple argument, the optimum fractional
local solution (that minimizes the cost of matching the demands and supplies) is almost integral:
it contains at most 2 fractionally open facilities. By fully opening the two fractional facilities, we
find an integral local solution with small number of open facilities.
10
The remaining part of this section is organized as follows. We first formally define concentrated
black components, and explain the importance of the definition. We then define the earth-moverdistance, which will be used to measure the cost of satisfying demands using supplies. The construction of local solutions for concentrated components and non-concentrated components will be
stated in Theorem 4.4 and Lemma 4.9 respectively.
4.1
Concentrated Black Components and Earth Mover Distance
The definition of concentrated black component is the same as that of [16], except that we choose
the parameter `2 differently.
P
Definition 4.1. Define πJ = j∈C xU (J),j (1 − xU (J),j ), for every black component J ∈ J . A black
component J ∈ J is said to be concentrated if πJ ≤ xU (J),C /`2 , and non-concentrated otherwise,
where `2 = Θ(`3 ) is large enough.
We use J C to denote the set of concentrated components and J N to denote the set of nonconcentrated components. The next lemma from [16] shows the importance of πJ . For the completeness of the paper, we include its proof here.
Lemma 4.2. For any J ∈ J , we have L(J)πJ ≤ O(1)DU (J) .
Proof. Let B = U (J). For every i ∈ B, j ∈ C, we have d(i, J) ≤ d(i, j) + 4dav (j) by Property (3.1d)
and the fact that i ∈ Uv for some v ∈ J. Thus,
X
X
L(J)π(J) = L(J)
xB,j (1 − xB,j ) = L(J)
xi,j xi0 ,j
j∈C,i∈B,i0 ∈F \B
j∈C
≤
X
i∈B,j∈C,i0 ∈F \B
=2
X
i∈B,j∈C
xi,j
xi,j xi0 ,j · 2d(i0 , J) ≤ 2
X
i∈B,j∈C
xi,j
X
xi0 ,j d(i0 , j) + d(j, i) + d(i, J)
i0 ∈F
X
dav (j) + d(j, i) + d(i, J) ≤ 2
xi,j 2d(i, j) + 5dav (j)
i∈B,j∈C
X
=2
(5Di ) = 10DB .
i∈B
The first inequality is by L(J) ≤ 2d(i0 , J) for any i0 ∈ F \ B = UR\J : d(i0 , R \ J) ≤ d(i0 , J) implies
L(J) = d(R \J, J) ≤ d(R \J, i0 )+d(i0 , J) ≤ 2d(i0 , J). The second inequality is by triangle inequality
and the third one is by d(i, J) ≤ d(i, j) + 4dav (j). All the equalities are by simple manipulations of
notations.
Recall that L(J) = d(J, R \ J) and xU (J),C is the total demand in J after the initial moving.
Thus, according to Lemma 4.2, if J is not concentrated, we can use DU (J) to charge the cost for
moving all the xU (J),C units of demand out of J, provided that the moving distance is not too
big compared to L(J). This gives us freedom for handling non-concentrated components. If J is
concentrated, the amount of demand that is moved out of J must be comparable to πJ ; this will
be guaranteed by the configuration LP.
In order to measure the moving cost of satisfying demands using supplies, we define the earth
mover distance:
11
Definition 4.3 (Earth Mover Distance). Given aP
set V ⊆ R P
with B = U (V ), a demand vector
V
B
α ∈ R≥0 and a supply vector β ∈ R≥0 such that
v∈V αv ≤
i∈B βi , the earth mover distance
P
from α to β is defined as EMDV (α, β) := inf f v∈V,i∈B f (v, i)d(v, i), where f is over all functions
from V × B to R≥0 such that
P
•
i∈B f (v, i) = αv for every v ∈ V ;
P
•
v∈V f (v, i) ≤ βi for every i ∈ B.
For some technical reason, we allow some fraction of a supply to be unmatched. From now on,
we shall use αv = xUv ,C to denote the amount of demand at v after the initial moving. For any set
V ⊆ R of representatives, we use α|V to denote the vector α restricted to the coordinates in V .
4.2
Distributions of Local Solutions for Concentrated Components
In this section, we construct distributions for components in J C , by proving:
Theorem 4.4. Let J ∈ J C and let B = U (J). Assume Constraints (6) to (13) are satisfied for
B. Then, we can find a distribution (φS,β )S⊆B,β∈RB of pairs (S, β), such that
≥0
(4.4a) sφ := E(S,β)∼φ |S| ∈ [yB , yB (1 + 2`πJ /xB,C )], and sφ = yB if yB > 2`,
and for every (S, β) in the support of φ, we have
(4.4b) |S| ∈ {bsφ c , dsφ e};
(4.4c) βi ≤ (1 + O(1/`))ui if i ∈ S and βi = 0 if i ∈ B \ S;
P
P
(4.4d)
i∈S βi = xB,C =
v∈J αv .
Moreover, the distribution φ satisfies
(4.4e) the support of φ has size at most nO(`) ;
(4.4f) E(S,β)∼φ EMDJ (α|J , β) ≤ O(`4 )DB .
To prove the theorem, we first construct a distribution ψ that satisfies most of the properties;
then we modify it to obtain the final distribution φ. Notice that a typical black component J has
yB ≤ 2`; however, when J is a root component containing a single representative, yB might be very
large. For now, let us just assume yB ≤ 2`. We deal with the case where |J| = 1 and yB > 2` at
the end of this section.
Since Constraints (6) to (13) are satisfied for B, we can use the z B variables satisfying these
constraints to construct a distribution ζ over pairs (χ ∈ [0, 1]B×C , µ ∈ [0, 1]B ), where µ indicates
the set of open facilities in B and χ indicates how the clients in J are connected to facilities in B.
Let S = {S ⊆ B : |S| ≤ `1 }Pand Se = S ∪ {⊥} as in Section 2. For simplicity, for any µ ∈ [0, 1]B ,
B×C , i ∈ B and j ∈ C, we shall use χ
we shallPuse µB to denote i∈B µP
i . For any χ ∈ [0, 1]
i,C to
P
P
denote j∈C χi,j , χB,j to denote i∈B χi,j , and χB,C to denote i∈B χi,C = j∈C χB,j .
The distribution ζ is defined as follows. Initially, let ζχ,µ = 0 for all χ ∈ [0, 1]B×C and µ ∈
[0, 1]B . For each S ∈ Se such that zSB > 0, increase ζχ,µ by zSB for the χ, µ satisfying χi,j =
B /z B , µ = z B /z B for every i ∈ B, j ∈ C. So, for every pair (χ, µ) in the support of ζ, we have
zS,i,j
i
S
S,i S
χ
≤
µ
,
χ
≤
ui µi for every i ∈ B, j ∈ C. Moreover, either µ is integral, or µB ≥ `1 . Since
i,j
i
i,C
P
B = 1, ζ is a distribution over pairs (χ, µ). It is not hard to see that E
z
(χ,µ)∼ζ χi,j = xi,j for
S∈Se S
every i ∈ B, j ∈ C and E(χ,µ)∼ζ µi = yi for every i ∈ B. The support of ζ has nO(`) size.
12
Definition 4.5. We say a pair (χ, µ) is good if
(4.5a) µB ≤ yB /(1 − 1/`);
(4.5b) χB,C ≥ (1 − 1/`)xB,C .
We are only interested in good pairs in the support of ζ. We show that the total probability of good pairs in the distribution ζ is large. Let Ξa denote the set of pairs (χ, µ) satisfying
Property (4.5a) and Ξb denote the set of pairs P
(χ, µ) satisfying Property (4.5b). Notice that
E(χ,µ)∼ζ µB = yB . By Markov inequality, we have (χ,µ)∈Ξa ζχ,µ ≥ 1/`. The proof of the following
lemma uses elementary mathematical tools.
P
Lemma 4.6.
(χ,µ)∈Ξ
/ b ζχ,µ ≤ `πJ /xB,C .
Proof. The idea is to use the property that J is concentrated. To get some intuition, consider the
case where πJ = 0. For every j ∈ C, either xB,j = 0 or xB,j = 1. Thus, all pairs (χ, µ) in the
support of ζ have χB,j = xB,j for every jP
∈ C; thus χB,C = xB,C .
Assume towards contradiction that
(χ,µ)∈Ξ
/ b ζχ,µ > `πJ /xB,C . We sort all pairs (χ, µ) in
the support of ζ according to descending order of χB,C . For any t ∈ [0, 1), and j ∈ C, define
gt,j ∈ [0, 1] as follows. Take the first pair (χ, µ) in the ordering such that the total ζ value of the
pairs (χ0 , µ0P
) before (χ, µ) in the ordering plus ζχ,µ is greater than t. Then, define gt,j = χB,j and
define gt = j∈C gt,j = χB,C .
Fix a client j ∈ C, we have
Z 1
Z 1
Z xB,j
(1 − 2t)dt =
1t<xB,j (1 − 2t)dt ≥
gt,j (1 − 2t)dt,
xB,j (1 − xB,j ) =
0
0
0
where 1t<xB,j is the indicator variable for the event that t < xB,j . The inequality comes from the
R1
R1
fact that 0 1t<xB,j dt = xB,j = 0 gt,j dt, gt,j ∈ [0, 1] for every t ∈ [0, 1), and 1 − 2t is a decreasing
function of t.
R1
πJ ≥ 0 gt (1−2t)dt. By our assumption that
P Summing up the inequality over all j ∈ C, we have
∗
(χ,µ)∈Ξ
/ b ζχ,µ > `πJ /xB,C , there exists a number t < 1 − `πJ /xB,C such that gt ≤ (1 − 1/`)xB,C
R1
for every t ∈ [t∗ , 1). As gt is a non-increasing function of g and 0 gt dt = xB,C , it is not hard
R1
to see that 0 gt (1 − 2t)dt is minimized when gt = (1 − 1/`)xB,C for every t ∈ [t∗ , 1) and gt =
xB,C −(1−1/`)xB,C (1−t∗ )
t∗
1/`+t∗ −t∗ /`
xB,C
t∗
=
Z
πJ ≥
0
t∗
for every t ∈ [0, t∗ ). We have
1/` + t∗ − t∗ /`
(1 − 2t)dt +
t∗
Z
1
t∗
!
(1 − 1/`)(1 − 2t)dt xB,C
1/` + t∗ − t∗ /` ∗
∗ 2
∗
∗ 2
xB,C
t − (t ) − (1 − 1/`) t − (t )
=
t∗
`πJ /xB,C
1
1 − t∗
= ∗ t∗ − (t∗ )2 xB,C =
xB,C >
xB,C = πJ ,
`t
`
`
P
leading to a contradiction. Thus, we have that (χ,µ)∈Ξ
/ b ζχ,µ ≤ `πJ /xB,C . This finishes the proof
of Lemma 4.6.
P
P
Overall, we have Q := (χ,µ) good ζχ,µ = (χ,µ)∈Ξa ∩Ξb ζχ,µ ≥ 1/` − `πJ /xB,C ≥ 1/` − 1/(2`) =
1/(2`), where the second inequality used the fact that πJ ≤ xB,C /(2`2 ) for J ∈ J C .
13
Now focus on each good pair (χ, µ) in the support of ζ. Since J ∈ J C and (χ, µ) ∈ Ξa ,
we have µB ≤ yB /(1 − 1/`) ≤ 2`/(1 − 1/`) < `1 (since we assumed yB ≤ 2`), if `1 is large
enough. So, µ ∈ {0, 1}B . Then, let S = {i ∈ B : µi = 1} be the set indicated by µ, and
βi = χi,C /(1 − 1/`) for every i ∈ B. For this (S, β), Property (4.4c) is satisfied, and we have
P
i∈B βi = χB,C /(1 − 1/`) ≥ xB,C . We then set ψS,β = ζχ,µ /Q. Thus, ψ indeed forms a distribution
over pairs (S, β). Moreover, the support of ζ has size nO(`) , so does the support of ψ. Thus
Property (4.4e) holds.
µB = yB . By Lemma 4.6,
Let sψP:= E(S,β)∼ψ |S| = E(χ,µ)∼ζ µB (χ, µ) good . Notice that E(χ,µ)∼ζ
). Since
we have (χ,µ)∈Ξ
/ b ζχ,µ ≤ `πJ /xB,C . Thus, E(χ,µ)∼ζ µB (χ, µ) ∈ Ξb ≤ yB /(1 − `πj /x
B,C
the condition
(χ,
µ)
∈
Ξ
requires
µ
to
be
upper
bounded
by
some
threshold,
E
µ
a
B
B (χ, µ) ∈
(χ,µ)∼ζ
Ξb ∩ Ξa can only be smaller. Thus, we have that sψ ≤ yB /(1 − `πJ /xB,C ) ≤ yB (1 + 2`πJ /xB,C ).
The proof of Property
(4.4f) for ψ is long and tedious.For simplicity, we use Ê[·] to denote
E(χ,µ)∼ζ · (χ, µ) good , and a = 1/(1 − 1/`) to denote the scaling factor we used to define β.
Indeed, we shall lose a factor O(`2 ) later and thus we shall prove Property (4.4f) for ψ with the
O(`2 ) term on the right:
Lemma 4.7. Ê[EMDJ (α|J , β)] ≤ O(`2 )DB , where β depends on χ as follows: βi = aχi,C for every
i ∈ B.
Proof. Focus on a good pair (χ, µ) and the β it defined: βi =P
aχi,C for every i ∈ B. We call
P α the
demand vector and β the supply vector. Since (χ, µ) is good, i∈B βi = aχB,C ≥ xB,C = v∈J αv .
Thus we can satisfy all the demands and EMD(α, β) is not ∞.
We satisfy the demands in two steps. In the first step, we give colorsPto the supplies and
demands;
each color is correspondent to a client j ∈ C. Notice that αv = j∈C xUv ,j and βi =
P
a j∈C χi,j . For every v ∈ J, j ∈ C, xUv ,j units of demand at v has color j; for every i ∈ B, j ∈ C,
aχi,j units of supply at i have color j. In this step, we match the supply and demand using the
following greedy rule: while for some j ∈ C, i, i0 ∈ B, there is unmatched demand of color j at v
and there is unmatched supply of color j at i, we match them as much as possible. The cost for
this step is at most the total cost of moving all supplies and demands of color j to j, i.e,
X
X
xi,j (d(v, i) + d(i, j)) + a
χi,j d(i, j)
v∈J,i∈Uv ,j∈C
≤
X
i∈B,j∈C
xi,C d(v, i) +
v∈J,i∈Uv
≤ O(1)DB +
X
(xi,j + aχi,j )d(i, j)
i∈B,j∈C
X
(xi,j + aχi,j )d(i, j),
by Lemma 3.2.
i∈B,j∈C
P
P
After this step, we have
j∈C max{xB,j − aχB,j , 0} ≤
j∈C max{xB,j − χB,j , 0} units of
unmatched demand.
In the second step, we match remaining demand and the supply. For every v ∈ J, i ∈ Uv , we
move the remaining supply at i to v. After this step, all the supplies and the demands are at J;
then we match them arbitrarily. The total cost is at most
X
X
aχi,C d(i, v) +
max{xB,j − χB,j , 0} × diam(J),
(14)
v∈J,i∈Uv
j∈C
where diam(J) is the diameter of J.
14
Notice that Ê[χi,j ] ≤ 2`xi,j since Pr(χ,µ)∼ζ [(χ, µ) good]
P ≥ 1/(2`) and E(χ,µ)∼ζ χi,j = xi,j . The
expected cost of the first step is at most O(1)DB + O(`) j∈C,i∈B
P xi,j d(i, j) = O(`)DB . Similarly,
the expected value of the first term of (14) is at most O(`) v∈J,i∈Uv xi,C d(i, v) ≤ O(`)DB by
Lemma 3.2.
Consider the second term of (14). Notice that Ê[max{xB,j − χB,j , 0}] ≤ xB,j . Also,
Ê[max{xB,j − χB,j , 0}] = Ê[max{(1 − χB,j ) − (1 − xB,j ), 0}]
≤ Ê[1 − χB,j ] ≤ 2`(1 − xB,j ).
So, Ê max{xB,j −χB,j , 0} ≤ min{xB,j , 2`(1−xB,j )} ≤ 3`xB,j (1−xB,j ): if xB,j ≥ 1−1/(2`) ≥ 2/3,
then we have 2`(1 − xB,j ) ≤ 2`(1 − xB,j ) · (3xB,j /2) = 3`xB,j (1 − xB,j ); if xB,j < 1 − 1/(2`), then
1 − xB,j > 1/(2`), implying xB,j ≤ 2`xB,j (1 − xB,j ).
P
Summing up the inequality over all clients j ∈ C, we have Ê
j∈C max{xB,C − χB,C , 0} ≤
O(`)πJ . So, the expected value of the second term of (14) is at most O(`)πJ ·diam(J) ≤ O(`2 )πJ L(J) ≤
O(`2 )DB , by Lemma 4.2. This finishes the proof of Lemma 4.7.
At this point, we may have sψ < yB . We can apply the following operation repeatedly. Take a
pair (S, β) with ψS,β > 0 and S ( B. We then shift some ψ-mass from the pair (S, β) to (B, β) so
as to increase sψ . Thus, we can assume Property (4.4a)
P holds for ψ.
Property (4.4d) may be unsatisfied: we only have i∈B βi ≥ xB,C for every (S, β)
P in the support
of ψ. To satisfy the property, we focus on each (S, β) in the support of ψ such that i∈B βi > xB,C .
0
By considering the
that achieves EMD(α|J , β), we can find a β 0 ∈ RB
≥0 such that βi ≤ βi
P matching
P
for every i ∈ B, i∈B βi0 = v∈J αv = xB,C , and EMD(α|J, β 0 ) = EMD(α|J, β). We then shift all
the ψ-mass at (S, β) to (S, β 0 ).
To sum up what we have so far, we have a distribution ψ over (S, β) pairs, that satisfies
Properties (4.4a), (4.4c), (4.4d), (4.4e) and Property (4.4f) with O(`4 ) replaced with O(`2 ). The
only Property that is missing is Property (4.4b); to satisfy the property, we shall apply the following
lemma to massage the distribution ψ.
Lemma 4.8. Given a distribution ψ over pairs (S ⊆ B, β ∈ [0, 1]B ) satisfying sψ := E(S,β)∼ψ |S| ≤
`1 , we can construct another distribution ψ 0 such that
0
≤ O(`2 )ψS,β for every pair (S, β);
(4.8a) ψS,β
(4.8b) every pair (S, β) in the support of ψ 0 has |S| ≤ dsψ e;
(4.8c) E(S,β)∼ψ0 max{|S|, bsψ c} ≤ sψ .
Property (4.8a) requires that the probability that a pair (S, β) happens in ψ 0 can not be too
large compared to the probability it happens in ψ. Property (4.8b) requires |S| ≤ dsψ e for every
(S, β) in the support of ψ 0 . Property (4.8c) corresponds to requiring |S| ≥ bsψ c: even if we count
the size of S as bsψ c if |S| ≤ bsψ c, the expected size is still going to be at most sψ .
Proof of Lemma 4.8. If sψ − bsψ c ≤
1 − 1/`, then
we shall throw0 away the pairs with |S| > bsψ c.
More formally, let Q = Pr(S,β)∼ψ |S| ≤ bsψ c and we define ψS,β
= ψS,β /Q if |S| ≤ bsψ c and
0
ψS,β = 0 if |S| ≥ bsψ c + 1. So, Property (4.8b) is satisfied. By Markov inequality, we have that
Q ≥ 1 − sψ /(bsψ c + 1) = (bsψ c − sψ + 1)/(bsψ c + 1) ≥ (1/`)/(bsψ c + 1) ≥ 1/(``1 + `) since
0
sψ ≤ `1 = O(`). Thus, ψS,β
≤ O(`2 )ψS,β for every pair (S, β), implying Property (4.8a). Every
pair (S, β) in the support of ψ 0 has |S| ≤ bsψ c and thus Property (4.8c) holds.
15
Now, consider the case where sψ − bsψ c > 1 − 1/`. In this case, sψ is a fractional number. Let
be the distribution obtained
from ψ by conditioning on pairs (S, β) with |S| ≤ dsψ e. By Markov
inequality, we have Pr(S,β)∼ψ |S| ≤ dsψ e ≥ 1 − sψ /(dsψ e + 1) ≥ 1 − sψ /(sψ + 1) ≥ 1/(`1 + 1) as
00 ≤ O(`)ψ
sψ ≤ `1 = O(`). So, ψS,β
S,β for every pair (S, β). Moreover, we have E(S,β)∼ψ 00 |S| ≤ sψ
since we conditioned on the event that |S| is upper-bounded by some-threshold; all pairs (S, β) in
the support of ψ 00 have |S| ≤ dsψ e.
Then we modify ψ 00 to obtain the final distribution ψ 0 . Notice that for a pair (S, β) with
|S| ≤ bsψ c, we have sψ − |S| ≤ sψ ≤ 2`1 (sψ − bsψ c). Thus,
ψ 00
X
(S,β):|S|≤bsψ c
00
ψS,β
(sψ − bsψ c) ≥
1
2`1
≥
1
2`1
X
(S,β):|S|≤bsψ c
X
(S,β):|S|=dsψ e
00
ψS,β
(sψ − |S|)
00
ψS,β
(dsψ e − sψ ),
where the second inequality is due to E(S,β)∼ψ00 |S| ≤ sψ .
00 . For every pair (S, β) such that |S| = ds e,
0
= ψS,β
For every pair (S, β) with |S| ≤ bsψ c, let ψS,β
ψ
P
0
00 /(2` ). Due to the above inequality, we have
0 (s − bs c) ≥
we define ψS,β
= ψS,β
ψ
1
ψ
ψ
(S,β):|S|≤bsψ c S,β
P
P
0
0 (|S| − s ), implying
max{|S|
−
s
,
bs
c − sψ } ≤ 0. Finally, we scale
ψ
ψ
ψ
ψ
ψ
(S,β) S,β
(S,β):|S|=dsψ e S,β
P
0
0
the ψ vector so that we have (S,β) ψS,β = 1; Properties (4.8b) and (4.8c) hold. The scaling factor
0
≤ O(`2 )ψS,β for every pair (S, β) and Property (4.8a)
is at most 2`1 = O(`). Overall, we have ψS,β
holds. This finishes the proof of Lemma 4.8.
With Lemma 4.8 we can finish the proof of Theorem 4.4 for the case yB ≤ 2`. We apply the
lemma to ψ to obtain the distribution ψ 0 . By Property (4.8a), Properties (4.4c), (4.4d) and (4.4e)
remain satisfied for ψ 0 ; Property (4.4f) also holds for ψ 0 , as we lost a factor of O(`2 ) on the expected
cost.
To obtain our final distribution φ, initially we let φS,β = 0 for every pair (S, β). For every
(S, β) in the support of ψ 0 , we apply the following procedure. If |S| ≥ bsψ c, then we increase φS,β
0 ; otherwise, take an arbitrary set S 0 ⊆ B such that S ⊆ S 0 and |S 0 | = bs c and increase
by ψS,β
ψ
φS 0 ,β by ψS,β . Due to Property (4.8b), every pair (S, β) in the support of φ has |S| ∈ {bsψ c , dsψ e}.
Property (4.8c) implies that sφ := E(S,β)∼φ |S| ≤ sψ ∈ [yB , (1 + 2`π)yB ]. If sφ < sψ , we increase
sφ using the following operation. Take an arbitrary pair (S, β) in the support of φ such that
|S| = bsψ c, let S 0 ⊇ S be a set such that S 0 ⊆ B and |S 0 | = dsψ e, we decrease φS,β and increase
φS 0 ,β . Eventually, we can guarantee sφ = sψ ; thus Properties (4.4a) and (4.4b) are satisfied. This
finishes the proof of Theorem 4.4 when yB ≤ 2`.
Now we handle the case where yB > 2`. By Properties (3.4b) and (3.4c), J is a root black
component that contains a single representative v and yUv =B > 2`. First we find a nearly integral
solution with at most 2` + 2 open facilities. Then we close two facilities serving the minimum
amount of demand and spread their demand among the remaining facilities. Since there is at least
2` open facilities remaining, we increase the amount of demand at any open facility by no more
than a factor of O(1/`).
x
Let u0i = yi,C
≤ ui . We may scale u0i by a factor of 1+O(1/`) during the course of the algorithm.
i
16
Consider the following LP with variables {λi }i∈B :
X
min
u0i λi d(i, v)
s.t.
(15)
i∈Uv
X
u0i λi = xB,C ;
i∈B
X
λi = yB ;
i∈B
λi ∈ [0, 1],
∀i ∈ B.
P
By setting λi = yi , we obtain a solution to LP(15) of value i∈Uv xi,C d(i, v) ≤ O(1)DUv , by
Lemma 3.2. So, the value of LP(15) is at most O(1)DUv . Fix on such an optimum vertex-point
solution λ of LP(15). Since there are only two non-box-constraints, λ has at most two fractional
λi . Moreover, as yUv ≥ 2`, there are at least 2` facilities in the support of λ.
We shall reduce the size of the support of λ by 2, by repeating the following
twice.
P procedure
∗
0
0
0
∗
∗
Consider the i in the support with the smallest λi ui∗ value. Let a := λi ui∗ / i∈Uv λi ui ≤ O( 1` ),
we then scale u0i P
by a factor of 1/(1 − a) ≤ 1 + O(1/`) for every i ∈ Uv \ i∗ and change λi∗ to 0.
So, we still have i∈Uv u0i λi = xUv ,C . The value of the objective function is scaled by a factor of at
most 1 + O(1/`).
Let S = {i ∈ Uv : λi > 0} and let βi = λi u0i for every
P i ∈ Uv . So, |S| ≤ yUv Properties (4.4c)
and (4.4d) are satisfied. Moreover, EMDJ (α|J , β) ≤ i∈Uv βi d(i, v) ≤ O(1)DUv since the value of
LP(15) is O(1)DUv and we have scaled each βi by at most a factor of 1 + O(1/`).
If we let φ contains the single pair (S, β) with probability 1, then all properties from (4.4c) to
(4.4f) are satisfied. To satisfy Properties (4.4a) and (4.4b), we can manually add facilities to S with
some probability, as we did before for the case yB ≤ 2`. This finishes the proof of Theorem 4.4.
4.3
Local Solutions for Unions of Non-Concentrated Components
In this section, we construct a local solution for the union V of some close non-concentrated black
components.
S
Lemma 4.9. Let J 0 ⊆ J N be a set of non-concentrated black components, V = J∈J 0 J and
B = U (V ). Assume there exists v ∗ ∈ R such that d(v, v ∗ ) ≤ O(`2 )L(J) for every J ∈ J 0 and
v ∈ J. Then, we can find a pair (S ⊆ B, β ⊆ RB
≥0 ) such that
(4.9a) |S| ∈ dyB e , dyB e + 1 ;
(4.9b) βi ≤ ui if i ∈ S and βi = 0 if i ∈ B \ S;
P
P
(4.9c)
i∈S βi = xB,C =
v∈V αv ;
(4.9d) EMDV (α|V , β) ≤ O(`2 `2 )DB .
Proof. We shall use an algorithm similar to the one we used for handling the case where yB > 2` in
x
Section 4.2. Again, for simplicity, we let u0i = yi,C
≤ ui to be the “effective capacity” of i. Consider
i
the following LP with variables {λi }i∈B :
X
min
u0i λi d(i, v) + `2 L(J) s.t.
(16)
J∈J 0 ,v∈J,i∈Uv
X
i∈B
u0i λi = xB,C ;
X
λi = yB ;
i∈B
17
λi ∈ [0, 1],
∀i ∈ B.
By setting λi = yi , we obtain a valid solution to the LP with the objective value
X
xi,C d(i, v) + `2 L(J)
J∈J 0 ,v∈J,i∈Uv
≤
X
xi,C d(i, v) + `2
X
J∈J 0
v∈V,i∈Uv
2
≤ O(1)DB + ` `2
X
xU (J),C L(J) ≤
X
v∈V
O(1)DUv + `2
X
`2 πJ L(J)
J∈J 0
2
O(1)DU (J) = O(` `2 )DB ,
(17)
J∈J 0
by Lemma 3.2 and Lemma 4.2. So, the value of LP(16) is at most O(`2 `2 )DB .
Fix such an optimum vertex-point solution λ of LP (16). Since there are only two non-boxconstraints, every vertex-point λ of the polytope has at most two fractional λi .
Let S = {i ∈ B : λi > 0} and let βi = λi u0i for every i ∈ B. So, Properties (4.9a), (4.9b) and
(4.9c) are satisfied.
Now we prove Property (4.9d). To compute EMDV (α|V , β), we move all demands in α|V and
all supplies in β to v ∗ . The cost is
X
X
αv d(v, v ∗ ) +
βi d(i, v ∗ )
v∈V
≤
X
i∈B
xUv ,C O(`2 )L(J) +
J∈J 0 ,v∈J
X
J∈J 0 ,v∈J,i∈Uv
βi d(i, v) + O(`2 )L(J) ≤ O(`2 `2 )DB ,
where the O(`2 `2 )DB for the first term was proved in (17) and the bound O(`2 `2 )DB for the
second term is due to the fact that γ is an optimum solution to LP(16). This finishes the proof of
Lemma 4.9.
5
Rounding Algorithm
In this section we describe our rounding algorithm. We start by giving the intuition behind the
algorithm. For each concentrated component J ∈ J , we construct a distribution of
S local solutions
using Theorem 4.4. We shall construct a partition V N of the representatives in J∈J N J so that
each V ∈ V N is the union of some nearby components in J N . For each set V ∈ V N , we apply
Lemma 4.9 to construct a local solution. If we independently and randomly choose a local solution
from every distribution we constructed, then we can move all the demands to the open facilities at
a small cost, by Property (4.4f) and Property (4.9d).
However, we may open more than k facilities, even in expectation. Noticing that the fractional
solution opens yB facilities in a set B, the extra number of facilities come from two places. In
Property (4.4a) of Theorem 4.4, we may open in expectation yB · 2`πJ /xB,C more facilities in
B than yB . Then in Property (4.9a) of Lemma 4.9, we may open dyB e or dyB e + 1 facilities in
B. To reduce the number of open facilities to k, we shall shut down (or remove) some alreadyopen facilities and move the demands satisfied by these facilities to the survived open facilities:
a concentrated component J ∈ J C is responsible for removing yB · 2`πJ /xB,C < 1 facilities in
expectation; a set V ∈ V N is responsible for removing up to 2 facilities. Lemma 4.2 allows us to
bound the cost of moving demands caused by the removal, provided that the moving distance is
not too big. To respect the capacity constraint up to a factor of 1 + , we are only allowed to scale
18
concentrated components
non-concentrated components
groups
sets in V N
(a)
(b)
Figure 2: Figure (a) gives the forest Υ∗J over J and the set G of groups (denoted by empty
polygons). Figure (b) gives V N : each set V ∈ V N is the union of components in a solid polygon.
the supplies of the survived open facilities by a factor of 1 + O(1/`). Both requirements will be
satisfied by the forest structure over groups and the fact that each non-leaf group contains Ω(`)
fractional opening (Property (3.5c)). Due to the forest structure and Property (3.5c), we always
have enough open facilities locally that can support the removing of facilities.
In order to guarantee that we always open k facilities, we need to use a dependent rounding
procedure for opening and removing facilities. As in many of previous algorithms, we incorporate
the randomized rounding procedure into random selections of vertex points of polytopes respecting
marginal probabilities. In many cases, a randomized selection procedure can be derandomized since
there is an explicit linear objective we shall optimize.
We now formally describe our rounding algorithm. For every group G ∈ G, we use ΛG to
denote the set of child-groups of G. We construct a partition JC of J C as follows. For each root
group G ∈ G, we add G ∩ J C to JC if it is not empty. For each non-leaf group G ∈ G, we add
S
0
C
C
N
N in the same way,
G0 ∈ΛG (G ∩ J ) to J , if it is not empty. We construct the partition J for J
N
0
N
except that
components in J N . We also define
S we consider
S a set V as follows: for every J ∈ J ,
N
N
we add J∈J 0 J to V ; thus, V forms a partition for J∈J N J. See Figure 2 for the definition of
V N.
In Section 5.1, we describe the procedure for opening a set S ∗ of facilities, whose cardinality
may be larger than k. Then in Section 5.2, we define the procedure remove, which removes one
open facility. We wrap up the algorithm in Section 5.3.
5.1
Constructing Initial Set S ∗ of Open Facilities
In this section, we open a set S ∗ of facilities, whose cardinality may be larger than k, and construct
a supply vector β ∗ ∈ RF≥0 such that βi∗ = 0 if i ∈
/ S ∗ . (S ∗ , β ∗ ) will be the concatenation of all local
solutions we constructed.
It is easy to construct local solutions forSnon-concentrated components. For each set J 0 ∈ JN
of components and its correspondent V = J∈J 0 J ∈ V N , we apply Lemma 4.9 to obtain a local
U (V )
solution S ⊆ U (V ), β ∈ R≥0 . Then, we add S to S ∗ and let βi∗ = βi for every i ∈ U (V ). Notice
that J 0 either contains a single root black component J, or contains all the non-concentrated black
components in the child-groups of some group G. In the former case, the diameter of J isSat most
O(`)L(J) by Property (3.4a); in the latter case, we let v ∗ be an arbitrary representative in J 0 ∈G J 0
19
and then any representative v ∈ J, J ∈ J 0 has d(v, v ∗ ) ≤ O(`2 )L(J) by Property (3.5d). Thus, all
the properties in Lemma 4.9 are satisfied.
For concentrated components, we only obtain distributions of local solutions by applying Theorem 4.4. For every J ∈ J C , we check if Constraints (6) to (13) are satisfied for B = U (J). If
not, we return a separation plane for the fractional
solution; otherwise we apply Theorem 4.4 to
each component J to obtain a distribution φJS,β S⊆U (J),β∈RU (J) . To produce local solutions for
≥0
concentrated components, we shall use a dependent rounding procedure that respects the marginal
probabilities. As mentioned earlier, we shall define a polytope and the procedure randomly selects
a vertex point of the polytope.
We let sJ := sφJ := E(S,β)∼φJ |S| be the expectation of |S| according to distribution φJ . For
notational convenience, we shall use a ≈ b to denote a ∈ bbc , dbe . Consider the following polytope
J }
2
P defined by variables {ψS,β
J∈J C ,S,β and {qJ }J∈J C .
J
ψS,β
, pJ ∈ [0, 1] ∀J ∈ J C , S, β;
(18)
X
(19)
S,β
J
= 1,
ψS,β
∀J ∈ J C ;
S,β
X X
J∈J C
J∈J 0
X
S,β
X X
J∈J 0
X
S,β
J
|S| − qJ ≈
ψS,β
qJ ≤ 1,
∀J 0 ∈ JC ;
J
|S| − qJ ≈ yU (J) , ∀J ∈ J C ;
ψS,β
X
yU (J) ,
J∈J 0
∀J 0 ∈ JC ;
X
J
yU (J) .
|S| − qJ ≈
ψS,β
(20)
(21)
(22)
(23)
J∈J C
In the above LP, ψ J is the indicator vector for local solutions for J and qJ indicates whether J
is responsible for removing one facility; if qJ = 1, we shall call remove(J) later. Up to changing of
variables, any vertex point of P is defined by two laminar families of tight constraints and thus P
is integral:
Lemma 5.1. P is integral.
Proof. To avoid negative coefficients, we shall let qJ0 = 1 − qJ and focus on ψ and q 0 variables.
Consider the set of tight constraints that define a vertex point. The tight constraints from (18),
(19) and (20) define a matroid base polytope for a laminar matroid.
For each JP∈ J , every pair (S, β) in the support of φJ has |S| ≈ sJ . Thus, Constraint (21) is
J (|S| − bs c) + q 0 ≈ y
equivalent to S,β ψS,β
J
U (J) + 1 − bsJ c. This is true since Constraint (19) holds
J
J
and ψ is a distribution. We do the same transformation for Constraints (22) and (23). It is easy
to see that the tight constraints from (21), (22) and (23) also define the matroid-base-polytope for
a laminar matroid.
Thus, by the classic matroid theory, the set of tight constraints define an integral solution; thus
P is integral.
∗J = φJ
∗
C
We set ψS,β
S,β and qJ = sJ − yU (J) for every J ∈ J and (S, β). Then,
Lemma 5.2. (ψ ∗ , q ∗ ) is a point in polytope P.
2
For every J ∈ J C , we only consider the pairs (S, β) in the support of φJ ; thus the total number of variables is
.
O(`)
n
20
Proof. Notice that sJ is the expected size of S according to the distribution φJ , while yU (J) is the
budget for the number of open facilities open in U (J). So qJ∗ is the expected number of facilities that
∗
∗
go beyond the budget. P
It is easy to seeP
that Constraints (18) and (19)
P hold for ψ and q . For every
0
C
∗
J ∈ J , we have that J∈J 0 qJ ≤ 2` J∈J 0 yU (J) πJ /xU (J),C ≤ 2` J∈J 0 yU (J) /`2 ≤ 2` × O(`2 )/`2
due to Properties (3.5e) and (4.4a). This at most P
1 if `2 = Θ(`3 ) is large enough. (If J 0 contains
∗
a root component J which has yU (J) > 2` then
J∈J 0 qJ = 0.) Thus, Constraint (20) holds.
P
∗J
∗
∗
∗ ∗
S,β ψS,β |S| − qJ = sJ − qJ = yU (J) . So, Constraints (21), (22) and (23) hold. So, (ψ , p ) is a
point in P.
J ] = ψ ∗J = φJ
We randomly select a vertex point (ψ, q) of P such that E[ψS,β
S,β
S,β for every
C
∗
C
J ∈ J , (S, β), and E[qJ ] = qJ = sJ − yU (J) for every J ∈ J . Since ψ is integral, for every J ∈ J ,
U (J)
J = 1; we add S to S ∗ and let
there is a unique local solution S ⊆ U (J), β ∈ R≥0
such that ψS,β
∗
βi = βi for every i ∈ U (J).
This finishes the definition of the initial S ∗ and β ∗ . Let α∗ = α (recall that αv = xUv ,C is the
demand at v after the initial moving, for every v ∈ R) be the initial demand vector. Later we shall
remove facilities from S ∗ and update α∗ and β ∗ . S ∗ , α∗ , β ∗ satisfy the following properties, which
will be maintained as the rounding algorithm proceeds.
P
P
∗
C
N
∗
(5.3a)
v∈V βv for every V ∈ J ∪ V ;
v∈V αv =
P
∗
(5.3b)
v∈R αv = |C|.
P
Property
(5.3a) is due to Properties (4.4d) and (4.9c). Property (5.3b) holds since v∈R αv∗ =
P
v∈R xUv ,C = xF,C = |C|.
5.2
The remove procedure
In this section, we define the procedure remove that removes facilities from S ∗ and updates α∗ and
β ∗ . The procedure takes a set V ∈ J C ∪ V N as input. If V is a root black component, then we let
G = {V } be the root group containing V ; if V is a non-root concentrated component, let G be the
parent group of the group containing V ; otherwise V is the union of non-concentrated
components
S
in all child-groups of some group, and we let G be this group. Let V 0 = J 0 ∈G J 0 . Before calling
remove(V ), we require the following properties to hold:
(5.4a) |S ∗ ∩ U (V )| ≥ 1;
(5.4b) S ∗ ∩ U (V 0 ) ≥ ` − 6.
While maintaining Properties (5.3a) and (5.3b), the procedure remove(V ) will
(5.5a) remove from S ∗ exactly one open facility, which is in U (V ∪ V 0 ),
(5.5b) not change α∗ |R\(V ∪V 0 ) and β ∗ |F \U (V ∪V 0 ) ,
(5.5c) increase αv∗ by at most a factor of 1 + O(1/`) for every v ∈ V ∪ V 0 and increase βi∗ by at
most a factor of 1 + O(1/`) for every i ∈ U (V ∪ V 0 ).
Moreover,
(5.5d) the moving cost for converting the old α∗ to the new α∗ is at most O(`2 )βi∗∗ L(J) for some
black component J ⊆ V and facility i∗ ∈ U (J);
(5.5e) for every V 00 ∈ J C ∪ V N , EMDV 00 α∗ |V 00 , β ∗ |U (V 00 ) will be increased by at most a factor of
1 + O(1/`).
21
Before formally describe the procedure remove(V ), we first highlight some key ideas. Assume
V is not a root component. We choose an arbitrary
facility i ∈ S ∗ ∩ U (V ). Notice that there are
P
∗
0
∗
∗
Ω(`) facilities in S ∩ U (V ). If the βi ≤ v0 ∈V 0 αv0 /`, then we can shut down i and send the
demands that should be sent to i to V 0 . We only need to increase the supplies in U (V 0 ) by a factor
of 1 + O(1/`). Otherwise, we shall shut down the facility i0 ∈ S ∗ ∩ U (V 0 ) with the smallest βi∗0 value.
Since there are at least Ω(`) facilities in U (V 0 ), we can satisfy the βi∗0 units of unsatisfied demands
using other facilities in S ∗ ∩ U (V 0 ). For this i0 , we have βi∗0 ≤ O(1)βi∗ . Thus, the total amount
of demands that will be moved is comparable to βi∗ . In either case, the cost of redistributing the
demands is not too big. When V is a root component, we shall shut down the facility i0 ∈ S ∗ ∩U (V )
with the smallest βi∗0 value.
We now formally describe the procedure remove(V ). We first consider the case that V is not a
root component. So, V is either a non-root component in J C , or the union of all non-concentrated
components in all child-groups of the group G. In this case, V ∩ V 0 = ∅. Let i ∈ U (V ) ∩ S ∗ be an
arbitrary facility; due to Property (5.4a), we can find such an i. Let J ⊆ V be the component that
contains i.
P
If a := βi∗ / v0 ∈V 0 αv∗0 ≤ 1` , then we shall shutdown i. Consider the matching f : V × U (V ) →
R≥0 between α∗ |V and β ∗ |U (V ) that achieves EMDV α∗ |V , β ∗ |U (V ) . (Due to Property (5.3a), the
total supply equals the total demand.) For every v ∈ V , we shall move fP
(v, i) units of demand
from v to V 0 . The total amount of demand moved from V to V 0 is exactly v∈V fv,i = βi∗ . Every
v 0 ∈ V 0 will receive aαv∗0 units of demand. We update α∗ to be the new demand vector: decrease αv∗
by f (v, i) for every v ∈ V and scale αv∗0 by a factor of (1 + a) for every v 0 ∈ V 0 . By Property (3.5d),
the cost of moving the demands is at most βi∗ O(`2 )L(J); thus, Property (5.5d) holds.
We remove i from S ∗ , change βi∗ to 0, and for every i0 ∈ U (V 0 ), scale βi∗0 by a factor of (1 + a).
For this new α∗ and β ∗ vector, EMDV (α∗ , β ∗ ) will not increase. α∗ |V 00 and β ∗ |U (V 00 ) are scaled by
a factor of 1 + a ≤ 1 + 1/` for every V 00 ∈ J C ∪ V N such that V 00 ⊆ V 0 . Thus Properties (5.5c)
and (5.5e) are satisfied. Properties (5.5a) and (5.5b) are trivially true. Moreover, we maintained
Properties (5.3a) and (5.3b).
Now consider the case a > 1/`. In this case, we shall remove the facility i0 ∈ S ∗ ∩ U (V 0 ) with
we have |S ∗ ∩ U (V 0 )| ≥ ` − 6 before we run remove(V )
the smallest βi∗0 value from S ∗ . Notice that
P
due to Property (5.4b). Let a0 := βi0 / i00 ∈U (V 0 ) βi∗00 ; so, we have a0 ≤ 1/(` − 6). To remove the
facility i0 , we consider the function f that achieves EMDV 0 (α∗ |V 0 , β ∗ |U (V
P0 ) ). We shall redistribute
0
0
0
0
the demands in V so that the new demand at v ∈ V will be (1 + a ) i00 ∈U (V 0 )\{i0 } f (v 0 , i00 ). We
remove i0 from S ∗ , change βi∗0 to 0 and scale up βi∗00 for all other i00 ∈ U (V 0 ) \ {i0 } by (1 + a0 ). Then,
the total cost for redistributing the demands in this procedure will be at most βi∗0 O(`)L(J), due to
Property (3.4d). This is at most O(`)βi∗ L(J) since a > 1/` and a0 ≤ 1/(` − 6). So, Properties (5.5a)
to (5.5e) are satisfied and Properties (5.3a) and (5.3b) are maintained.
The case where V is a root component can be handled in a similar way. In this case, we have
G = {V } and V 0 = V . By Property (5.4b), there are at least ` − 6 facilities in S ∗ ∩ U (V ). Then
we can remove the facility i ∈ U (V ) ∩ S ∗ with the smallest βi∗ . Using the same argument as above,
we can guarantee Properties (5.5a) to (5.5e) and maintain Properties (5.3a) and (5.3b).
5.3
Obtaining the Final Solution
To obtain our final set S ∗ of facilities, we call the remove procedures in some order. We consider
each group G using the top-to-bottom order. That is, before we consider a group G, we have
22
already considered its parent group. If G is a root group, then it contains a single root component
J. If J ∈ J N , repeat the the following procedure twice: if there is some facility in S ∗ ∩ U (J) then
we call remove(J). If J ∈ J C and
S qJ = 1 then we call remove(J). Now if G is a non-leaf group,
then do the following. Let V = G0 ∈ΛG ,J∈G0 ∩J N J. Repeat the following procedure twice: if there
is some facility in S ∗ ∩ U (V ) then we call remove(V ). For every G0 ∈ ΛG and J ∈ G0 ∩ J C such
that qJ = 1 we call remove(J).
Lemma 5.6. After the above procedure, we have |S ∗ | ≤ yF ≤ k.
Proof. We first show that whenever we call remove(V ), Properties (5.4a) and (5.4b) hold. For any
concentrated component J with qJ = 1, we have called remove(J). Notice that if qJ = 1, then
initially we have |S ∗ ∩ U (J)| ≥ 1 due to Constraint (21). Due to the top-down order of considering
components, and Property (5.5a), we have never removed a facility in S ∗ ∩ U (J) before calling
remove(J). Thus, Property (5.4a) holds. For V ∈ V N , we check if |S ∗ ∩ U (V )| ≥ 1 before we call
remove(V ) and thus Property (5.4a) holds.
S
Property (5.4b). For any non-leaf group G, initially, we have S ∗ ∩ J∈G U (J) ≥
PNow consider
J∈G yU (J) ≥ ` where the first inequality is due to Property (4.9a) and Constraint (22) and the
second is due to Property (3.5c). We may remove a facility from the set when we call remove(V ) for
V satisfying one of the following conditions: (a) V is a concentrated component in G or in a child
group of G, (b) V is the union of the non-concentrated components in the child-groups of G or (c)
V contains the non-concentrated components in G. For case (a), we removed at most 2 facilities
due to Constraint (20). For each
S (b) and (c), we
P remove at most 2 facilities. Thus, we shall remove
at most 6 facilities from S ∗ ∩ J∈G U (J) ≥ J∈G yU (J) . Thus, Property (5.4b) holds.
Thus, every call of remove is successful. For a concentrated component
J with
qJ = 1, we called
N
∗
remove(J) once. For each V ∈ V , initially we have |S ∩ U (V )| ∈ yU (V ) , yU (V ) + 1 . Before
calling remove(V ), we have never removed a facility from S ∗ ∩ U (V ). Thus, the number of times
we call remove(V ) is at least the initial value of |S ∗ ∩ U (V )| minus yU (V ) . Overall, the number of
P
P
P
J −q
+ V ∈V N yU (V ) <
ψ
facilities in S ∗ after the removing procedure is at most J∈J C
J
S,β S,β
P
P
J∈J C yU (J) +1+ V ∈V N yU (V ) = yF +1 ≤ k+1, where the first inequality is due to Constraint (23).
Since |S ∗ | is an integer, we have that |S ∗ | ≤ k.
By Properties (5.5b) and (5.5c), and Constraint (20), our final βi∗ is at most 1 + O(1/`) times
the initial βi∗ for every i ∈ V . Finally we have βi∗ ≤ (1 + O(1/`))ui for every i ∈ F . Thus, the
capacity constraint is violated by a factor of 1 + if we set ` to be large enough.
It remains to bound the expected cost of the solution S ∗ ; this is done by bounding the cost for
transferring the original α∗ to the final α∗ , as well as the cost for matching our final α∗ and β ∗ .
We first focus on the transferring cost. By Property (5.5e), when we call remove(V ), the
transferring cost is at most O(`2 )βi∗∗ L(J) for some black component J ⊆ V and i∗ . Notice that
βi∗∗ is scaled by at most a factor of (1 + O(1/`)), we always have βi∗∗ ≤ (1 + O(1/`))αU (J),C . So,
the cost is at most O(`2 )xU (J),C L(J). If V is the union of some non-concentrated components,
then this quantity is at most O(`2 )`2 πJ L(J) ≤ O(`2 `2 )DU (J) ≤ O(`2 `2 )DU (V ) . We call remove(V )
at most twice, thus the contribution of V to the transferring cost is at most O(`2 `2 )DU (V ) . If V
is a concentrated component J, then the quantity might be large. However, the probability we
call remove(J) is E[qJ ] = qJ∗ = sJ − yU (J) ≤ 2`yU (J) πJ /xU (J),C if yU (J) ≤ 2` and it is 0 otherwise
(by Property (4.4a)). So, the expected contribution of this V to the transferring cost is at most
23
O(`2 )xU (J),C L(J) × 2`yU (J) πJ /xU (J),C ≤ O(`4 )πJ L(J) ≤ O(`4 )DU (J) by Lemma 4.2. Thus, overall,
the expected transferring cost is at most O(`5 )DF = O(`5 )LP.
Then we consider
the matching cost. Since we maintained Property (5.3a), the matching cost
P
is bounded by V ∈J C ∪V N EMDV (α∗ |V , β ∗ |U (V ) ). Due to Property (5.5e), this quantity has only
increased by a factor of 1 + O(1/`) during the course
of removing facilities.
For the initial α∗ and
P
P
∗
4
β , the expectation of this quantity is at most J∈J C O(` )DU (J) + V ∈V N O(`2 `2 )DU (V ) due to
Properties (4.4f) and (4.9d). This is at most O(`5 )DF = O(`5 )LP.
We have found a set S ∗ of at most k facilities and a vector β ∗ ∈ RF≥0 such that βi∗ = 0 for every
i∈
/ S ∗ and βi∗ ≤ (1 + O(1/`))ui . If we set ` = Θ(1/) to be large enough, then βi∗ ≤ (1 + )ui . The
cost for matching the α-demand vector and the β ∗ vector is at most O(`5 )LP = O(1/5 )LP. Thus,
we obtained a O(1/5 )-approximation for CKM with (1 + )-capacity violation.
References
[1] Karen Aardal, Pieter L. van den Berg, Dion Gijswijt, and Shanfei Li. Approximation algorithms for hard capacitated k-facility location problems. European Journal of Operational
Research, 242(2):358 – 368, 2015.
[2] Hyung-Chan An, Mohit Singh, and Ola Svensson. LP-based algorithms for capacitated facility
location. In Proceedings of the 55th Annual IEEE Symposium on Foundations of Computer
Science, FOCS 2014.
[3] V. Arya, N. Garg, R. Khandekar, A. Meyerson, K. Munagala, and V. Pandit. Local search
heuristic for k-median and facility location problems. In Proceedings of the thirty-third annual
ACM symposium on Theory of computing, STOC ’01, pages 21–29, New York, NY, USA, 2001.
ACM.
[4] Jarosaw Byrka, Krzysztof Fleszar, Bartosz Rybicki, and Joachim Spoerhase. Bi-factor approximation algorithms for hard capacitated k-median problems. In Proceedings of the 26th Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA 2015).
[5] Jarosaw Byrka, Thomas Pensyl, Bartosz Rybicki, Aravind Srinivasan, and Khoa Trinh. An
improved approximation for k-median, and positive correlation in budgeted optimization. In
Proceedings of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2015).
[6] Jarosaw Byrka, Bartosz Rybicki, and Sumedha Uniyal. An approximation algorithm for uniform capacitated k-median problem with 1 + capacity violation, 2015. arXiv:1511.07494.
[7] Robert D. Carr, Lisa K. Fleischer, Vitus J. Leung, and Cynthia A. Phillips. Strengthening
integrality gaps for capacitated network design and covering problems. In Proceedings of the
Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’00, pages 106–115,
Philadelphia, PA, USA, 2000. Society for Industrial and Applied Mathematics.
[8] M. Charikar and S. Guha. Improved combinatorial algorithms for the facility location and
k-median problems. In In Proceedings of the 40th Annual IEEE Symposium on Foundations
of Computer Science, pages 378–388, 1999.
24
[9] M. Charikar, S. Guha, . Tardos, and D. B. Shmoys. A constant-factor approximation algorithm
for the k-median problem (extended abstract). In Proceedings of the thirty-first annual ACM
symposium on Theory of computing, STOC ’99, pages 1–10, New York, NY, USA, 1999. ACM.
[10] Julia Chuzhoy and Yuval Rabani. Approximating k-median with non-uniform capacities. In
SODA 05, pages 952–958, 2005.
[11] Sudipto Guha. Approximation Algorithms for Facility Location Problems. PhD thesis, Stanford, CA, USA, 2000.
[12] K. Jain, M. Mahdian, and A. Saberi. A new greedy approach for facility location problems. In
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, STOC ’02,
pages 731–740, New York, NY, USA, 2002. ACM.
[13] K Jain and V. V. Vazirani. Approximation algorithms for metric facility location and k-median
problems using the primal-dual schema and Lagrangian relaxation. J. ACM, 48(2):274–296,
2001.
[14] Shanfei Li. An improved approximation algorithm for the hard uniform capacitated k-median
problem. In APPROX ’14/RANDOM ’14: Proceedings of the 17th International Workshop on
Combinatorial Optimization Problems and the 18th International Workshop on Randomization
and Computation, APPROX ’14/RANDOM ’14, 2014.
[15] Shi Li. On uniform capacitated k-median beyond the natural LP relaxation. In Proceedings
of the 26th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2015).
[16] Shi Li. Approximating capacitated k -median with (1 + )k open facilities. In Proceedings of the
27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2016), pages 786–796,
2016.
[17] Shi Li and Ola Svensson. Approximating k-median via pseudo-approximation. In Proceedings
of the Forty-fifth Annual ACM Symposium on Theory of Computing, STOC ’13, pages 901–910,
New York, NY, USA, 2013. ACM.
[18] J. Lin and J. S. Vitter. -approximations with minimum packing constraint violation (extended abstract). In Proceedings of the 24th Annual ACM Symposium on Theory of Computing
(STOC), Victoria, British Columbia, Canada, pages 771–782, 1992.
[19] D. B. Shmoys, . Tardos, and K. Aardal. Approximation algorithms for facility location problems (extended abstract). In STOC ’97: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, pages 265–274, New York, NY, USA, 1997. ACM.
25
| 8cs.DS
|
arXiv:1604.01724v3 [math.OA] 17 May 2016
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY FOR
GROUPOIDS AND SEMIGROUPS
CLAIRE ANANTHARAMAN-DELAROCHE
Abstract. A locally compact groupoid is said to have the weak containment property if its
full C ∗ -algebra coincide with its reduced one. Although it is now known that this property is
strictly weaker than amenability, we show that the two properties are the same under a mild
exactness assumption. Then we apply our result to get informations about the corresponding
weak containment property for some semigroups.
Introduction
The notion of amenability for locally compact groups takes many forms and is well understood
(see [39] for instance). Amenability was introduced in the measured setting for discrete group
actions and countable equivalence relations by Zimmer [53, 51, 52] at the end of the seventies.
Soon after, Renault extended this notion to general measured groupoids and to locally compact
groupoids [42]. This was followed by further studies, for example in [2, 3] for group actions. A
detailed general study is provided in the monograph [1]. In particular it has long been known
[42, 44, 1] that every amenable groupoid has the weak containment property, in the sense that its
full and reduced C ∗ -algebras coincide. Yet, at that time the converse was left open: is a locally
compact groupoid amenable when it has the weak containment property? For locally compact
groups, this is well known to be true, due to a theorem of Hulanicki [17]. More generally, this is
true for any transitive locally compact groupoid [7] (that is, a groupoid acting transitively on its
set of units). It was proved recently [29] that the weak containment property for an action of an
exact discrete group on a compact space implies the amenability of the action, leading to believe
in a positive answer to the question in full generality. However, in 2015 Willett exhibited [50] a
nice simple example of an étale groupoid having the weak containment property without being
amenable.
In this paper we show that, nevertheless, the answer to the above question is quite often positive.
It suffices that the groupoid satisfies a weak form of exactness that we call inner exactness (see
Definition 2.6). This covers many examples. Every minimal locally compact groupoid (i.e., such
that the only invariant closed subsets of the unit space are the empty set and the whole set of units)
is inner exact. In particular all locally compact groups are inner exact. For every continuous action
2010 Mathematics Subject Classification. Primary 43A07 ; Secondary 46L55, 54H20, 22A22, 20M30,20M18.
Key words and phrases. Groupoids, semigroups, weak containment, amenability.
1
2
CLAIRE ANANTHARAMAN-DELAROCHE
of an exact locally compact group on a locally compact space, the corresponding transformation
groupoid is inner exact. However it has long been known that there exist groupoids that are
not inner exact. The first example (for a non Hausdorff locally compact groupoid) was given by
Skandalis in [44]. Later, in order to provide counterexamples to the Baum-Connes conjecture for
groupoids, Higson, Lafforgue and Skandalis [15] have exhibited other (Hausdorff) locally compact
groupoids, in fact bundles of groups, that are not inner exact. The above mentioned example of
Willet is of the same kind.
The relations between weak containment and amenability are partially clarified in this paper
as follows (see Theorem 2.10).
Theorem A. Let G be an inner exact locally compact groupoid. Then G has the weak containment
property if and only if it is measurewise amenable.
Corollary. Let G be a locally compact groupoid. The two following conditions are equivalent:
(i) G is measurewise amenable;
(ii) for every G-C ∗ -algebra A, the full crossed product A ⋊ G coincide with the reduced crossed
product A ⋊r G.
Measurewise amenability is a notion which is slightly weaker than (topological) amenability
but is the same in many usual cases, for instance for étale groupoids. The difference is explained
in the main part of the text (see Definition 2.3 and Remark 2.4). So, for an étale inner exact
groupoid, the weak containment property is equivalent to amenability. This answers a question
raised by Willett in [50, §3].
The previous theorem has the following generalization that covers interesting examples.
Theorem B. Let G be a locally compact groupoid which is equivalent to an inner exact groupoid.
Then G has the weak containment property if and only if it is measurewise amenable.
After having established these results in Section 2, we turn in Section 3 to the case of discrete
semigroups. We limit ourself to semigroups not too far from the case of discrete groups, namely
inverse semigroups (defined in Section 3.1) and sub-semigroups of groups. We give partial answers
to a recurrent question concerning semigroups: what is the right definition of amenability for a
semigroup? To the semigroups that we consider are attached a full C ∗ -algebra and a reduced
C ∗ -algebra, generalizing the classical case of groups. There are three obvious candidates for the
notion of amenability, and it is natural to wonder what are the relations between them:
(1) left amenability, that is, there exists a left invariant mean on the semigroup;
(2) weak containment property, that is, the full and reduced C ∗ -algebras of the semigroup are
the same;
(3) nuclearity of the reduced C ∗ -algebra of the semigroup.
This problem has been addressed in many papers (see [38], [10], [34], [22], [9], [30], [26], [27], [12],
to cite a few of them). Of course, these three properties are equivalent for a discrete group.
Let us consider first the case of an inverse semigroup (see Section 3.1), that we denote by S.
A very useful feature of such a semigroup is that its full and reduced C ∗ -algebras are described
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
3
via the groupoid GS canonically associated to it [40]. As a consequence, we see that (3) ⇒ (2) in
this case: if the reduced C ∗ -algebra Cr∗ (S) is nuclear, then S has the weak containment property,
since GS is amenable.
It is the only general fact that can be stated. The example given by Willett, once reinterpreted
in the setting of inverse semigroups, allows us to show that (2) 6⇒ (3) in general, for inverse
semigroups (see Example 3.11). This answers a question raised in [12, Remark 3.7]. This example
is a Clifford inverse semigroup, that is an inverse semigroup which is a disjoint union S = ⊔e∈E Se
of groups where the set E of idempotents is contained in the center of S. This gives an example of
Clifford semigroup which has the weak containment property, although not all groups Se , e ∈ E,
are amenable. This answers a question raised in [38].
We observe that the notion of left amenability is not interesting, except when S has not a zero
element, i.e., an element 0 such that 0s = 0 = s0 for every s ∈ S. Indeed, any inverse semigroup
with a zero is left amenable, since the Dirac measure at zero is a left invariant mean. Even if S
has no zero, the left amenability of S does not imply the weak containment property, and a fortiori
the nuclearity of Cr∗ (S) (see Example 3.11).
However, using Theorem A we present a class of inverse semigroups for which Conditions (2)
and (3) are equivalent:
Theorem C. Let S be a strongly E ∗ -unitary inverse semigroup with an idempotent pure morphism
into an exact group G (see Definition 3.3). Then S has the weak containment property if and only
if the reduced C ∗ -algebra Cr∗ (S) is nuclear (Theorem 3.12 (2)).
Next, we consider the case of a pair (P, G) where P is a sub-semigroup of a group G containing
the unit e. As pointed out in [26, 27, 36], a handy tool in order to study the C ∗ -algebras of P is its
left inverse hull S(P ). It is an inverse semigroup with nice properties (Propositions 3.1 and 3.6).
Following Xin Li [26, 27], we define the full C ∗ -algebra of P to be the full C ∗ -algebra of GS(P ) .
This extends the definition given by Nica in [34] for quasi-lattice ordered groups (Definition 3.15).
On the other hand, Cr∗ (P ) is a quotient of the reduced C ∗ -algebra of GS(P ) .
We first observe that the left amenability of P always implies the nuclearity of Cr∗ (P ) (see
Proposition 3.17). It is not true in general that the weak containment property implies the left
amenability of P as shown by Nica in [34]. He considered the free group G = Fn on n generators
a1 , . . . , an and P = Pn is the semigroup generated by a1 , . . . , an . Using the uniqueness property
of the Cuntz algebra On , Nica proved that Pn has the weak containment property although it is
Cuntz-Toeplitz C ∗ -algebra, that is, the C ∗ -algebra
not left amenable. Note that Cr∗ (Pn ) is the P
generated by n isometries s1 , . . . sn such that 1≤i≤n si s∗i 1. The weak containment property is
equivalent to the uniqueness of the Cuntz-Toeplitz C ∗ -algebra. Moreover, Cr∗ (Pn ) is an extension
of On by the algebra of compact operators and therefore is nuclear.
Whether the weak containment property for P implies the nuclearity of Cr∗ (P ) is an old problem
that was raised by several authors, for instance by Laca and Raeburn [22, Remark 6.9], and more
recently by Xin Li [27, §9]. Using Theorem A, we give the following partial answer (Theorem
3.18).
4
CLAIRE ANANTHARAMAN-DELAROCHE
Theorem D. Let P be a subsemigroup of an exact group G, with e ∈ P . Then the weak containment property implies that Cr∗ (P ) is nuclear.
This result follows from the fact that S(P ) satisfies the assumptions of Theorem C.
In [26], Xin Li introduced the independence property for P , which can be rephrased by saying
that the quotient map from Cr∗ (GS(P ) ) onto Cr∗ (P ) is injective. In this case (which occurs for
instance for quasi-lattice ordered groups), the nuclearity of Cr∗ (P ) implies the weak containment
property for GS(P ) and thus for P .
In order to facilitate the reading of the paper, in the first section we recall the main facts about
groupoids and their C ∗ -algebras that will be used in the sequel, and we fix the notation. We
emphasize that the locally compact spaces will always be Hausdorff (unless explicitly mentioned)
and second countable. Locally compact groupoids will always come equipped with a Haar system
and Hilbert spaces will be separable.
1. Preliminaries
1.1. Groupoids. We assume that the reader is familiar with the basic definitions about groupoids.
For details we refer to [42], [40]. Let us recall some notation and terminology. A groupoid consists
of a set G, a subset G (0) called the set of units, two maps r, s : G → G (0) called respectively the
range and source maps, a composition law (γ1 , γ2 ) ∈ G (2) 7→ γ1 γ2 ∈ G, where
G (2) = {(γ1 , γ2 ) ∈ G × G : s(γ1 ) = r(γ2 )},
and an inverse map γ 7→ γ −1 . These operations satisfy obvious rules, such as the facts that
the composition law (i.e., product) is associative, that the elements of G (0) act as units (i.e.,
r(γ)γ = γ = γs(γ)), that γγ −1 = r(γ), γ −1 γ = s(γ), and so on (see [42, Definition 1.1]). For
x ∈ G (0) we set G x = r −1 (x) and Gx = s−1 (x). Usually, X will denote the set of units of G.
A locally compact groupoid is a groupoid G equipped with a locally compact topology such that
the structure maps are continuous, where G (2) has the topology induced by G × G and G (0) has the
topology induced by G. We assume that the range (and therefore the source) map is open, which
is a necessary condition for the existence of a Haar system. We denote by Cc (G) the algebra of
continuous complex valued functions with compact support on G.
Definition 1.1. Let G be a locally compact groupoid. A Haar system on G is a family λ = (λx )x∈X
of measures on G, indexed by the set X = G (0) of units, satisfying the following conditions:
• Support: λx has exactly G x as support, for every x ∈ X;
R
• Continuity: for every f ∈ Cc (G), the function x 7→ λ(f )(x) = G x f dλx is continuous;
• Invariance: for γ ∈ G and f ∈ Cc (G), we have
Z
Z
s(γ)
f (γ1 ) dλr(γ) (γ1 ).
f (γγ1 ) dλ (γ1 ) =
G s(γ)
G r(γ)
Examples 1.2. (a) Transformation groupoid. Let G be a locally compact group acting continuously to the right on a locally compact space X. The topological product space X × G has
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
5
a natural groupoid structure with X as space of units. The range and source maps are given
respectively by r(x, g) = x and s(x, g) = xg. The product is given by (x, g)(xg, h) = (x, gh) and
the inverse by (x, g)−1 = (xg, g−1 ). We denote by X ⋊ G this groupoid. A Haar system λ is given
by λx = δx × λ̃ where λ̃ is a left Haar measure on G. Similarly, one defines G ⋉ X for a left action
of G.
(b) Groupoid group bundle. It is a locally compact groupoid such that the range and source
maps are equal. By [44, Lemma 1.3], one can choose, for x ∈ G (0) , a left Haar measure λx on the
group G x = Gx in such a way that (λx )x∈X forms a Haar system on G. An explicit example will
be given in Section 1.3.
(c) Etale groupoids. A locally compact groupoid is called étale when its range (and therefore
its source) map is a local homeomorphism from G onto G (0) . Then G x and Gx are discrete and
G (0) is open in G. Moreover the family of counting measures λx on G x forms a Haar system (see
[42, Proposition 2.8]). Groupoids associated with actions, or more generally with partial actions
(that we define now), of discrete groups are étale.
(d) Partial transformation groupoid. A partial action of a discrete group G on a locally compact
space X is a family (βg )g∈G of partial homeomorphisms of X between open subsets, such that
βe = Id X and βg βh ≤ βgh for g, h ∈ G, meaning that βgh extends βg βh . Then
G ⋉ X = (g, x) : g ∈ G, x ∈ Xg−1 ⊂ G × X
with the topology induced from the product topology, where Xg−1 is the domain of βg , is an étale
groupoid. The range and source maps of G ⋊ X are given respectively by r(g, x) = βg (x) and
s(g, x) = x. The product is defined by (g, x)(h, y) = (gh, y) when x = βh (y), and the inverse is
given by (g, x)−1 = (g−1 , βg (x)).
As already said, in the sequel, the locally compact groupoids are implicitly supposed to be Hausdorff, second countable, and equipped with a Haar system λ. In the three above examples, λ will
be the mentioned Haar system.
1.2. Representations of a locally compact groupoid. Let (G, λ) be a locally compact groupoid
with a Haar system λ. We set X = G (0) . The space Cc (G) is an involutive algebra with respect to
the following operations for f, g ∈ Cc (G):
Z
(f ∗ g)(γ) = f (γ1 )g(γ1−1 γ)dλr(γ) (γ1 )
(1)
f ∗ (γ) = f (γ −1 ).
(2)
We define a norm on Cc (G) by
Z
Z
x
−1
x
kf kI = max sup |f (γ)| dλ (γ), sup
f (γ ) dλ (γ) .
x∈X
x∈X
Definition 1.3. A representation of Cc (G) is a ∗-homomorphism π from Cc (G) into the C ∗ -algebra
B(H) of bounded operators of a Hilbert space H such that kπ(f )k ≤ kf kI for every f ∈ Cc (G).
6
CLAIRE ANANTHARAMAN-DELAROCHE
Example 1.4. Let x ∈ X = G(0) . We denote by λx the image of λx be the inverse map γ 7→ γ −1 .
Let πx : Cc (G) → B L2 (Gx , λx ) be defined by
Z
f (γγ1−1 )ξ(γ1 ) dλx (γ1 )
(πx (f )ξ)(γ) =
Gx
for f ∈ Cc (G) and ξ ∈
L2 (G
x , λx ).
Then πx is a representation of Cc (G).
More generally, let µ be a (Radon) measure on X. We denote by ν = µ ◦ λ the measure on G
defined by the formula
Z
Z
Z
f (γ) dλx (γ) dµ(x).
f dν =
G
X
Gx
ν −1
Let
be the image of ν under the inverse map. For f ∈ Cc (G) and ξ ∈ L2 (G, ν −1 ) we define
the operator Indµ (f ) by the formula
Z
f (γγ1−1 )ξ(γ1 ) dλs(γ) (γ1 ).
Indµ (f )ξ (γ) =
Gs(γ)
Then Indµ is a representation of Cc (G), called the induced representation associated with µ. We
have Indδx = πx .
The full C ∗ -algebra C ∗ (G) of G is the completion of Cc (G) with respect to the norm
kf k = sup kπ(f )k
where π runs over all representations of Cc (G). The reduced C ∗ -algebra Cr∗ (G) is the completion
of Cc (G) with respect to the norm
kf k = sup kπx (f )k.
x∈X
Obviously, the identity map of Cc (G) extends to a surjective homomorphism from C ∗ (G) onto
Cr∗ (G).
Remark 1.5. Assume that G is a locally compact group. Let us observe that the involution
on Cc (G) that we introduced is not the usual one in group theory. If ∆ denotes the modular
function of G, usually the involution is defined by f ⋆ (γ) = f (γ −1 )∆(γ −1 ). The map f 7→ f˜ where
f˜(γ) = f (γ)∆(γ)−1/2 is an isomorphism of involutive algebra between the ∗-algebra Cc (G) with
the involution ∗ introduced in (2) and the usual one with the involution ⋆ . The full and reduced
C ∗ -algebras defined above are then canonically identified respectively with the classical full and
reduced C ∗ -algebras of the group G.
Similarly, the full and reduced C ∗ -algebras of a transformation groupoid X ⋊ G are identified
with the full crossed product C0 (X) ⋊ G and the reduced crossed product C0 (X) ⋊r G respectively,
where C0 (X) is the C ∗ -algebra of complex valued functions on X vanishing to 0 at infinity.
A familiar result in group theory relates in a bijective and natural way the non-degenerate
representations of the full group C ∗ -algebra and the unitary representations of the group. A
similar result holds for groupoids. Its statement requires some preparation.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
7
Let (G, λ) be a locally compact groupoid and let µ be a (Radon) measure on X = G (0) . We set
ν = µ ◦ λ. We say that µ is quasi-invariant if ν is equivalent to ν −1 . In this case, we denote by
∆ the Radon-Nikodým derivative dν/ dν −1 . A groupoid (G, λ) equipped with a quasi-invariant
measure µ is called a measured groupoid.
Definition 1.6. A unitary representation of G is a triple (µ, H, U ) where
(i) µ is a quasi-invariant measure on X;
(ii) H = ({Hx : x ∈ X}, E) is a measurable field of Hilbert spaces over X (where E is a
fundamental sequence of measurable vector fields);
(iii) U is a measurable action of G on H by isometries, that is, for every γ ∈ G we have an
isometric isomorphism U (γ) : Hs(γ) → Hr(γ) such that
(a) for x ∈ X, U (x) is the identity map of Hx ;
(b) for (γ, γ1 ) ∈ G (2) , U (γγ1 ) = U (γ)U (γ1 );
(c) for ξ, η ∈ E, the function γ 7→ hξ ◦ r(γ), U (γ)η ◦ s(γ)ir(γ) is measurable.
We denote by H = L2 (X, H, µ) the Hilbert space of square integrable sections of H, and for
f ∈ Cc (G) we define the operator πU (f ) on H by the formula
Z Z
f (γ)∆(γ)−1/2 hξ ◦ r(γ), U (γ)η ◦ s(γ)ir(γ) dλx (γ) dµ(x).
hξ, πU (f )ηi =
X
Gx
Then f 7→ πU (f ) is a representation of Cc (G), called the integrated form of (µ, H, U ) (or simply U ).
A crucial result, due to J. Renault, asserts that every representation of Cc (G) can be disintegrated.
Here, the fact that the groupoid is assumed to be second countable is needed.
Theorem 1.7. ([43, Proposition 4.2]) Let π be a non-degenerate representation of Cc (G) on a
Hilbert space H. There is a unitary representation (µ, H, U ) of G such that π is unitary equivalent
to the integrated form πU of (µ, H, U ). We say that π disintegrates over µ.
Example 1.8. The left regular
representation of G over a quasi-invariant measure µ is (µ, H =
L2 (λ), L) where L2 (λ) = L2 (G x , λx ) : x ∈ X , E = Cc (G) , and
L(γ) : L2 (G s(γ) , λs(γ) ) → L2 (G r(γ) , λr(γ) )
is given, for ξ ∈ L2 (G s(γ) ), γ1 ∈ G r(γ) , by
L(γ)ξ (γ1 ) = ξ(γ −1 γ1 ).
Note that L2 (X, H, µ) = L2 (G, µ ◦ λ) and that, for f ∈ Cc (G), ξ ∈ L2 (G, µ ◦ λ) we have
Z
f (γ)∆(γ)−1/2 L(γ)ξ ◦ s(γ) dλx (γ).
πL (f )ξ x =
Gx
It is well known (and easy to see) that the map W : L2 (G, ν) → L2 (G, ν −1 ) defined by the
formula W ξ = ∆1/2 ξ is an isometric isomorphism which implements a unitary equivalence between
πL and Indµ .
8
CLAIRE ANANTHARAMAN-DELAROCHE
We denote by Cr∗ (G, µ) the norm closure of πL (Cc (G)) in B(L2 (G, µ ◦ λ)).
For f ∈ Cc (G) we define the seminorm sup kπ(f )k where π ranges over all representations of
Cc (G) that disintegrate over µ. We denote by C ∗ (G, µ) the C ∗ -algebra obtained by separation
and completion of Cc (G) with respect to this seminorma. Note that we have canonical surjective
homomorphisms from C ∗ (G) onto C ∗ (G, µ) and from C ∗ (G, µ) onto Cr∗ (G, µ).
These C ∗ -algebras will play a crucial role in the rest of the paper and are related to reductions
of the groupoid G. We give some details in the next section.
1.3. About reductions of a groupoid. Let G be a groupoid and Y a subset of X = G (0) . We
set G(Y ) = r −1 (Y ) ∩ s−1 (Y ). Then G(Y ) is a subgroupoid of G called the reduction of G by Y .
When Y is reduced to a single element x, then G(x) = r −1 (x) ∩ s−1 (x) is a group called the
isotropy group of G at x.
Let now G be a locally compact groupoid with Haar system and let Y be a locally compact
subset of X which is G-invariant, meaning that for γ ∈ G, we have r(γ) ∈ Y if and only if
s(γ) ∈ Y . Then G(Y ) is a locally compact groupoid whose Haar system is obtained by restriction
of the Haar system of G.
Let µ be a quasi-invariant measure on X and let F be its support. It is a closed G-invariant
subset of X. Then Indµ is a faithful representation of Cr∗ (G(F )) (see [19, Corollary 2.4] for
instance). It follows that Cr∗ (G, µ) is canonically identified with Cr∗ (G(F )).
Besides, the representations of Cc (G(F )) contains all the representations of Cc (G) that disintegrate over µ. It follows there is a canonical surjective map q ′ from C ∗ (G(F )) onto C ∗ (G, µ).
Let us consider the general situation where a closed G-invariant subset F of X is given and set
U = X \ F . It is well known that the inclusion ιU : Cc (G(U )) → Cc (G) extends to injective homomorphisms from C ∗ (G(U )) into C ∗ (G) and from Cr∗ (G(U )) into Cr∗ (G). Similarly, the restriction
map pF : Cc (G) → Cc (G(F )) extends to surjective homomorphisms from C ∗ (G) onto C ∗ (G(F ))
and from Cr∗ (G) onto Cr∗ (G(F )). Moreover the sequence
0 → C ∗ (G(U )) → C ∗ (G) → C ∗ (G(F )) → 0
is exact. For these facts, we refer to [42, page 102], [16, Section 2.4], or to [41, Proposition 2.4.2]
for a detailed proof.
On the other hand, the corresponding sequence with respect to the reduced C ∗ -algebras is not
always exact, as shown for a non-Hausdorff groupoid by Skandalis in the Appendix of [44].
Example 1.9. Another interesting class of examples was provided in [15] by Higson, Lafforgue
and Skandalis. There, the authors consider a residually finite group Γ and an decreasing sequence
b = N ∪ {∞}
Γ ⊃ N0 ⊃ Γ1 · · · ⊃ Nk ⊃ · · · of finite index normal subgroups with ∩k Nk = {e}. Let N
b
be the Alexandroff compactification of N. We set N∞ = {e} and, for k ∈ N, we denote by
b × Γ with respect to the
qk : Γ → Γ/Nk the quotient homomorphism. Let G be the quotient of N
aFor simplicity, we do not include λ in the notation, since the Haar system is always implicitely given.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
9
equivalence relation
(k, t) ∼ (l, u) if k = l and qk (t) = qk (u).
Equipped with the quotient topology, G has a natural structure of (Hausdorff) étale locally comb the range and source maps are given by
pact groupoid group bundle: its space of units is N,
r([k, t]) = s([k, t]) = qk (t), where [k, t] = (k, qk (t)) is the equivalence class of (k, t). The fibre G(k)
of the bundle is the quotient group Γ/Nk if k ∈ N and Γ if k = ∞. We call this groupoid an
HLS-groupoid. A basic result of [15] is that the sequence
0 −→ Cr∗ (G(N)) −→ Cr∗ (G) −→ Cr∗ (G(∞)) −→ 0
is not exact whenever Γ has Kazdhan’s property (T) (it is not even exact in K-theory!).
1.4. Crossed products. For the definition of actions of groupoids on C ∗ -algebras we refer to
[20]. Let us recall a few facts.
Definition 1.10. Let X be a locally compact space. A C0 (X)-algebra is a C ∗ -algebra A equipped
with a homomorphism ρ from C0 (X) into the centre of the multiplier algebra of A, which is
non-degenerate in the sense that there exists an approximate unit (uλ ) of C0 (X) such that
limλ ρ(uλ )a = a for every a ∈ A.
Given f ∈ C0 (X) and a ∈ A, for simplicity we will write f a instead of ρ(f )a.
Let U be an open subset of X and F = X \U . We view C0 (U ) as an ideal of C0 (X) and we denote
by C0 (U )A the closed linear span of {f a : f ∈ C0 (U ), a ∈ A}. It is a closed ideal of A and in fact,
we have C0 (U )A = {f a : f ∈ C0 (U ), a ∈ A} (see [5, Corollaire 1.9]). We set AF = A/C0 (U )A and
whenever F = {x} we write Cx (X) instead of C0 (X \ {x}) and Ax instead of A{x} . We denote by
ex : A → Ax the quotient map and for a
Q∈ A we set a(x) = ex (a). Recall that kak = supx∈X ka(x)k
(so that a 7→ (a(x))x∈X from A into x∈X Ax is injective) and that x 7→ ka(x)k is upper semicontinuous (see [47, 5]). Then, (A, {ex : A → Ax }x∈X , X) is an upper semi-continuous field of
C ∗ -algebras.
Let A and B be two C0 (X)-algebras. A morphism α : A → B of C0 (X)-algebras is a morphism
of C ∗ -algebras which is C0 (X)-linear, that is, α(f a) = f α(a) for f ∈ C0 (X) and a ∈ A. For x ∈ X,
in this case α factors through a morphism αx : Ax → Bx such that αx (a(x)) = α(a)(x).
Let Y, X be locally compact spaces and f : Y → X a continuous map. To any C0 (X)-algebra
A is associated a C0 (Y )-algebra f ∗ A = C0 (Y ) ⊗ A F where F = {(y, f (y)) : y ∈ Y } ⊂ Y × X.
For y ∈ Y , we have f ∗ A)y = Af (y) (see [25, 20]).
Definition 1.11. ([25, 20]) Let (G, λ) be a locally compact groupoid with a Haar system and
X = G (0) . An action of G on a C ∗ -algebra A is given by a structure of C0 (X)-algebra on A and
an isomorphism α : s∗ A → r ∗ A of C0 (G)-algebras such that for every (γ1 , γ2 ) ∈ G (2) we have
αγ1 γ2 = αγ1 αγ2 , where αγ : As(γ) → Ar(γ) is the isomorphism deduced from α by factorization.
When A is equipped with such an action, we say that A is a G-C ∗ -algebra.
10
CLAIRE ANANTHARAMAN-DELAROCHE
Let A be a G-C ∗ -algebra. We set Cc (r ∗ (A)) = Cc (G)r ∗ (A). It is the space of the continuous
sections with compact support of the upper semi-continuous field of C ∗ -algebras defined by the
C0 (G)-algebra r ∗ A. Then, Cc (G)r ∗ (A) is a ∗-algebra with respect to the following operations:
Z
f (γ1 )αγ1 g(γ1−1 γ) dλr(γ) (γ1 )
(f ∗ g)(γ) =
G r(γ)
and
f ∗ (γ) = αγ f (γ −1 )∗
(see [32, Proposition 4.4]). We define a norm on Cc (r ∗ (A)) by
Z
Z
x
−1
x
kf kI = max sup
kf (γ)k dλ (γ), sup
f (γ ) dλ (γ) .
x∈X
Gx
x∈X
Gx
The full crossed product A ⋊α G is the enveloping C ∗ -algebra of the Banach ∗-algebra obtained
by completion of Cc (r ∗ (A)) with respect to k·kI .
Let us now define the reduced crossed product. For x ∈ X let us consider the Hilbert Ax module L2 (Gx , λx )⊗Ax , defined as the completion of the space Cc (Gx ; Ax ) of continuous compactly
supported functions from Gx into Ax , with respect to the Ax -valued inner product
Z
ξ(γ)∗ η(γ) dλx (γ).
hξ, ηi =
Gx
For f ∈ Cc (r ∗ (A)), ξ ∈ Cc (Gx ; Ax ) and γ ∈ Gx , we set
Z
α−1
f (γγ1−1 ) ξ(γ1 ) dλx (γ1 ).
πx (f )ξ (γ) =
γ
Gx
Then πx (f ) extends to a bounded operator with adjoint acting on the Hilbert Ax -module L2 (Gx , λx )⊗
Ax . In this way we get a representation of the ∗-algebra Cc (r ∗ (A)). The reduced crossed product
A ⋊α,r G is the completion of Cc (r ∗ (A)) with respect to the norm kf k = supx∈X kπx (f )k (see
[20])b.
Remarks 1.12. (a) We note that if Y is a locally compact G-invariant subset of X = G (0) , then
C0 (Y ) has a natural structure of G-C ∗ -algebra. Moreover, Cc (r ∗ (C0 (Y ))) = Cc (G(Y )) and C0 (Y )⋊G
and C0 (Y ) ⋊r G are canonically isomorphic to C ∗ (G(Y )) and Cr∗ (G(Y )) respectively.
(b) Let B be a C ∗ -algebra and set A = B ⊗ C0 (X). Since C0 (X) is a G-C ∗ -algebra, we see that
A = B ⊗ C0 (X) is a G-C ∗ -algebra, the action being trivial on B. Moreover, A ⋊ G and A ⋊r G are
canonically isomorphic to B ⊗max C ∗ (G) and B ⊗ Cr∗ (G) respectively.
bπ is what is denoted Λ in [20] except that the authors consider C (s∗ (A)) instead of C (r ∗ (A)). This explains
x
x
c
c
why our formula is not exactly the same.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
11
2. Amenability and weak containment
The reference for this section is [1]. The notion of amenable locally compact groupoid has many
equivalent definitions. We will recall two of them. Before, let us recall a notation: given a locally
s(γ) , then γµ is the measure on G r(γ) defined by
compact
groupoid
R
R G, γ ∈ G and µ a measure on G
G r(γ) f dγµ = G s(γ) f (γγ1 ) dµ(γ1 ).
Definition 2.1. ([1, Definitions 2.2.2, 2.2.8]) We say that G is amenable if there exists a net (mi ),
where mi = (mxi )x∈G (0) is a family of probability measures mxi on G x , such that
R
(i) each mi is continuous in the sense that for all f ∈ Cc (G), the function x 7→ f dmxi is
continuous;
s(γ)
r(γ)
(ii) limi γmi − mi
= 0 uniformly on the compact subsets of G.
1
We say that (mi )i is an approximate invariant continuous mean on G. Note that if G is amenable
and if Y is a locally compact G-invariant subset of X, then the groupoid G(Y ) is amenable.
Proposition 2.2. ([1, Proposition 2.2.13]) Let (G, λ) be a locally compact groupoid with Haar
system. Then G is amenable if and only if there exists a net (gi ) of non-negative functions in
Cc (G) such that
R
(a) gi dλx ≤ 1 for every x ∈ G (0) ;
R
(b) limi gi dλx = 1 uniformly on the compact subsets of G (0) ;
R
(c) limi gi (γ −1 γ1 ) − gi (γ1 ) dλr(γ) (γ1 ) = 0 uniformly on the compact subsets of G.
We will also need the notion of measurewise amenability.
Definition 2.3. ([1, Proposition 3.2.14]) Let (G, λ) be a locally compact groupoid.
(i) Let µ be a quasi-invariant measure on X. We say that the measured groupoid (G, λ, µ) is
amenable if there exists a net (gi ) of (µ ◦ λ)-measurable non-negative functions on G such
that R
(a) gi dλx = 1 for a.e. x ∈ G (0) ;
R
(b) limi gi (γ −1 γ1 ) − gi (γ1 ) dλr(γ) (γ1 ) = 0 in the weak*-topology of L∞ (G, µ ◦ λ).
(ii) We say that (G, λ) is measurewise amenable if (G, λ, µ) is an amenable measured groupoid
for every quasi-invariant measure µ.
Remark 2.4. An amenable groupoid is measurewise amenable. The converse is true for groupoids
that have countable orbits (see [1, Theorem 3.3.7]). This is in particular the case for étale
groupoids and for locally compact groups.
Theorem 2.5. Let (G, λ) be a locally compact groupoid. Consider the following conditions:
(a) (G, λ) is measurewise amenable;
(b) for every quasi-invariant measure µ, the canonical surjection from C ∗ (G, µ) onto Cr∗ (G, µ)
is injective;
12
CLAIRE ANANTHARAMAN-DELAROCHE
(c) Cr∗ (G) is nuclear;
(d) for every G-C ∗ -algebra A, the canonical surjection from A ⋊ G onto A ⋊r G is injective;
(e) the canonical surjection from C ∗ (G) onto Cr∗ (G) is injective.
Then, we have (a) ⇔ (b) ⇒ (c) and (a) ⇒ (d) ⇒ (e). Moreover, if the isotropy groups G(x) are
discrete for every x ∈ X, then (c) ⇒ (a).
The equivalence between (a) and (b) is proved in [1, Theorem 6.1.4]. That (a) ⇒ (c) is contained
in [1, Corollary 6.2.14] as well as the fact that (c) ⇒ (a) when the isotropy is discrete. For the
proof of (a) ⇒ (d) see [44, Theorem 3.6] or [1, Proposition 6.1.10].
Definition 2.6. We say that an action of a locally compact groupoid (G, λ) on a C ∗ -algebra A
is inner exact if for every G-invariant closed ideal I of A the sequence
0 −→ I ⋊r G −→ A ⋊r G −→ (A/I) ⋊r G −→ 0
is exact.
We say that G is inner exact if the canonical action of G on C0 (G (0) ) is inner exact, i.e., if for
every invariant closed subset F of G (0) , the sequence
0 −→ Cr∗ (G(U )) −→ Cr∗ (G) −→ Cr∗ (G(F )) −→ 0
is exact.
The term “inner” in the above definitions aims to highlight that we only consider short sequences with respect to the specific given action of the groupoidc. A possible definition of exactness for a groupoid is the following one. Other candidates are considered in [4].
Definition 2.7. We say that a groupoid (G, λ) is exact in the sense of Kirchberg-Wassermann
(or KW-exact in short) if every action of (G, λ) on any C ∗ -algebra A is inner exact.
This notion was studied by Kirchberg and Wassermann for locally compact groups. They
proved in particular that this property is equivalent to the exactness of Cr∗ (G) for a discrete
group G.
Examples 2.8. (a) Every minimal groupoid is inner exact. In particular, every locally compact
group is inner exact.
(b) Every KW-exact groupoid is inner exact.
(c) Let G be a locally compact KW-exact group acting to the right on a locally compact space
X. Then the transformation groupoid G = X ⋊ G is KW-exact. Indeed let α be an action of G
on a C0 (X)-algebra A. Then G acts on A by (βg a)(x) = α(x,g) (a(xg)) and it is straightforward
to check that A ⋊β,r G is canonically isomorphic to A ⋊α,r G. Moreover, this identification is
functorial.
cThis notion is used in another context in [8].
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
13
In fact the groupoid is exact in a very strong sense. Indeed, G acts amenably on a compact
space Y d and therefore it acts amenably on Y × X by (y, x)g = (yg, xg) (see [1, Proposition
2.2.9]). Then G = X ⋊ G acts amenably on Y × X by (y, x)(x, g) = (yg, xg) and the momentum
map (y, x) 7→ x ∈ G (0) is proper. These facts imply that G is KW-exact. The proof is the same as
the proof showing that a group acting amenably on a compact space is KW-exact (see for instance
[3, Theorem 7.2]). More details on the notion of exactness for groupoids are given in [4].
(d) Let (βg )g∈G be a partial action of a discrete group G on a locally compact space X. The
associated groupoid G = G ⋊ X is KW-exact whenever G is exact. For the purpose of this paper,
we only give the easier proof of its inner exactness. Let F be a closed G-invariant subset of X
and set U = X \ F . The partial action of G on X induces a partial action (βgF )g∈G on F : the
domain of βgF is F ∩ Xg−1 where Xg−1 is the domain of βg and βgF acts by restriction. Similarly,
one defines a partial action (βgU )g∈G on U . The partial transformation groupoids G ⋉ F and
G ⋉ U are respectvely isomorphic to G(F ) and G(U ). Now we observe that G acts partially on the
C ∗ -algebras C0 (X), C0 (F ) and C0 (U ). Moreover by [28, Proposition 2.2], the groupoid C ∗ -algebra
Cr∗ (G ⋉ X) is canonically isomorphic to the reduced crossed product C0 (X) ⋊r G associated with
the partial action of G on C0 (X). We make the same observation with the two other partial
actions. Finally, we conclude by using the fact, proved in [13, Theorem 22.9], that the following
sequence
0 −→ C0 (U ) ⋊r G −→ C0 (X) ⋊r G −→ C0 (F ) ⋊r G −→ 0
is exact.
(e) The case of a groupoid group bundle is considered in the next proposition.
Proposition 2.9. Let G be a groupoid group bundle over a locally compact space X. Let us he
following conditions:
(i) G is inner exact;
(ii) for every x ∈ X the sequence
0 −→ Cr∗ (G(X \ {x})) −→ Cr∗ (G) −→ Cr∗ (G(x)) −→ 0
is exact;
(iii) Cr∗ (G) is a continuous field of C ∗ -algebras over X with fibres Cr∗ (G(x)).
Then we have (i) ⇒ (ii) ⇔ (iii).
Proof. (i) ⇒ (ii) is obvious.
Let us prove the equivalence between (ii) and (iii). For x ∈ X let πx be the canonical surjective
map from Cr∗ (G) onto Cr∗ (G(x)). Then (Cr∗ (G), {πx : Cr∗ (G) → Cr∗ (G(x))}x∈X , X) is a field of
C ∗ -algebras on X, which is lower semi-continuous in the sense that x 7→ kπx (a)k is lower semicontinuous for every a ∈ Cr∗ (G) (see for instance [23, Theorem 5.5]). On the other hand, Cr∗ (G)
is a C0 (X)-algebra. Indeed, for f ∈ C0 (X), g ∈ Cc (G) and γ ∈ G, we set (f g)(γ) = f ◦ r(γ)g(γ).
The map g 7→ f g extends continuously in order to define a structure of C0 (X)-algebra on Cr∗ (G).
dIn the non discrete case this fact is proved in a recent preprint of Brodzki, Cave and Li [6].
14
CLAIRE ANANTHARAMAN-DELAROCHE
We have Cc (G(X \ {x})) = Cx (X)Cc (G) and by continuity we get Cr∗ (G(X \ {x})) = Cx (X)Cr∗ (G).
Note that for f ∈ C0 (X), a ∈ Cr∗ (G) and x ∈ X, we have πx (f a) = f (x)πx (a). It follows from
[21, Lemma 2.3] that the function x 7→ kπx (a)k is upper semi-continuous at x0 for all a ∈ Cr∗ (G)
if and only if the kernel of πx0 is Cr∗ (G(X \ {x0 })).
Theorem 2.10. Let (G, λ) be a locally compact groupoid. The two following conditions are equivalent:
(1) C ∗ (G) = Cr∗ (G) and G is inner exact;
(2) the groupoid G is measurewise amenable.
Proof. Theorem 2.5 gives us (2) ⇒ (1). For the converse we have to show that, for every quasiinvariant measure µ, the canonical surjective map qµ : C ∗ (G, µ) → Cr∗ (G, µ) is injective, still using
Theorem 2.5. Let F be the support of µ and set U = X \F . The following diagram is commutative
0
/ C ∗ (G(U ))
/ C ∗ (G)
/ C ∗ (G(F ))
qF
q
0
/ C ∗ (G(U ))
r
/ C ∗ (G)
r
/0
/ C ∗ (G(F ))
r
/0
where the two lines are exact and q is injective. Then an elementary diagram chasing shows
that qF is injective. Recall that Cr∗ (G(F )) is canonically identified to Cr∗ (G, µ) (see Section 1.3).
Observe that qF factorizes through C ∗ (G, µ) as qF = qµ ◦ q ′ where q ′ : C ∗ (G(F )) → C ∗ (G, µ) is
surjective. It follows that qµ is injective.
The following theorem is a converse to [1, Proposition 6.1.10]. It is already known when G has
discrete isotropy since Condition (b) implies that C ∗ (G) = Cr∗ (G) and Cr∗ (G) nuclear.
Corollary 2.11. Let (G, λ) be a locally compact groupoid. The following conditions are equivalent:
(a) G is measurewise amenable;
(b) A ⋊ G = A ⋊r G for every G-C ∗ -algebra A.
Proof. We recalled in Theorem 2.5 that (a) ⇒ (b). Conversely, (b) immediately implies that G
has the weak containment property and is KW-exact and so (a) holds.
The following corollary is immediate since amenability and measurewise amenability coincide
for an étale groupoid.
Corollary 2.12. Let (G, λ) be an étale groupoid which is inner exact (for instance KW-exact or
minimal). Then G has the weak containment property if and only if it is amenable.
For the notion of (topological) equivalence between locally compact groupoids we refer to [1,
Definition 2.2.15].
Corollary 2.13. Let (G, λ) be a locally compact groupoid which is equivalent to an inner exact
groupoid. Then G has the weak containment property if and only if it is measurewise amenable.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
15
Proof. Assume that G has the weak containment property and is equivalent to an inner exact
groupoid G ′ . Then by [49, Theorem 17], the groupoid G ′ has the weak containment property and
therefore is measurewise amenable. To conclude, we use the fact that measurewise amenability is
preserved under equivalence [1, Theorem 3.2.16].
In [50], Willett considered an HLS-groupoid constructed from a well-chosen sequence of normal
subgroups with finite index in the free group F2 with two generators. This étale groupoid has the
weak containment property although it is not amenable.
3. Applications to semigroup C ∗ -algebras
3.1. Semigroups. We will consider two kinds of semigroups: inverse semigroups and sub-semigroups of a group.
An inverse semigroup S is a semigroup such that for every s ∈ S there exists a unique element
s∗ such that ss∗ s = s and s∗ ss∗ = s∗ . Our references for this notion are [40, 24]. Note that
groups are inverse semigroups with exactly one idempotent. The set ES of idempotents of S
plays a crucial role. It is an abelian sub-semigroup of S. On S one defines the equivalence
relation s ∼ t if there exists an idempotent e such that se = te. The quotient S/σ is a group,
σ
called the maximal group homomorphism image of S, since every homomorphism from S into a
group G factors through S/σ. This group S/σ is trivial when S has a zero element 0, which is a
frequent situation.
By an abuse of notation, σ will also denote the quotient map from S onto S/σ. If S has a zero,
we denote by S × the set S \ {0}. When S does not have a zero, we set S × = S.
Given a set X, we denote by IS(X) the inverse semigroup of partial bijections of X. Its zero
element 0 is the application with empty domain. The Wagner-Preston theorem [40, Proposition
2.1.3] identifies any inverse semigroup S with a sub-semigroup of IS(S).
Let G be a group and P a sub-semigroup of G containing the unit e. The left inverse hull S(P )
of P is the inverse sub-semigroup of IS(P ) generated by the injection ℓp : x 7→ px. It has a unit,
namely ℓe . Observe that ℓ∗p is the map px 7→ x defined on pP . Every element of S(P ) is of the
form s = ℓ∗p1 ℓq1 · · · ℓ∗pn ℓqn with pi , qi ∈ P and n ≥ 1. Let us recall some important properties of
S(P ).
Proposition 3.1. Let (P, G) as above. Then
(1) 0 6∈ S(P ) if and only if P P −1 is a subgroup de G;
−1
(2) The application ψ : S(P )× → G sending s = ℓ∗p1 ℓq1 · · · ℓ∗pn ℓqn to p−1
1 q1 · · · pn qn is well
×
.
defined. It satisfies ψ(st) = ψ(s)ψ(t) if st 6= 0 and we have ψ −1 (e) = ES(P
)
Proof. P P −1 is a sub-group de G if and only if pP ∩ qP 6= ∅ for every p, q ∈ P (i.e., P is left
reversible). Then, assertion (1) is Lemma 3.4.1 of [36].
(2) is proved in [36, Proposition 3.2.11].
16
CLAIRE ANANTHARAMAN-DELAROCHE
Recall that on an inverse semigroup S, a partial order is defined as follows: s ≤ t if there exists
an idempotent e such that s = te (see [24, page 21] for instance).
Definition 3.2. An inverse semigroup S is said to be E-unitary if ES is the kernel of σ : S → S/σ
(equivalently, every element greater than an idempotent is an idempotent). When S has a zero,
this means that S = ES .
Definition 3.3. Let S be an inverse semigroup. A morphism (or grading) is an application ψ
from S × into a group G such that ψ(st) = ψ(s)ψ(t) if st 6= 0. If in addition ψ −1 (e) = ES× , we
say that ψ is an idempotent pure morphism. When such an application ψ from S × into a group
G exists, the inverse semigroup S is called strongly E ∗ -unitary.
Note that when S is without zero, S is strongly E ∗ -unitary if and only if it is E-unitary.
Remark 3.4. Let (P, G) with G = P P −1 . Then the map τ : S(P )/σ → G such that τ ◦ σ = ψ
is an isomorphism. Indeed ψ is surjective, so τ is also surjective. Assume that τ (σ(x)) = e, with
x ∈ S(P ). Since ψ is idempotent pure, we see that x is an idempotent and therefore σ(x) is the
unit of S(P )/σ.
In [35], Nica has introduced the Toeplitz inverse semigroup S(G, P ) which is the inverse subsemigroup of IS(P ) generated by the maps αg : g−1 P ∩ P → P ∩ gP , g ∈ G, where αg (x) = gx if
x ∈ g −1 P ∩ P . For p ∈ P we have αp = ℓp . Therefore we have S(P ) ⊂ S(G, P ).
Definition 3.5. We say that (P, G) satisfies the Toeplitz condition if S(P ) = S(G, P ).
We will give in Section 3.4 another characterization of the Toeplitz condition, along with
examples.
Proposition 3.6. Assume that (P, G) satisfies the Toeplitz condition. Let ψ : S(P )× → G as
defined in Proposition 3.1. Then, αg 6= 0 if and only if g is in the image of ψ. In this case we
have ψ(αg ) = g, and αg is the greatest element of ψ −1 (g).
For the proof, see [37, Proposition 4.1] or [35, Lemma 3.2].
3.2. Groupoid associated with an inverse semigroup. Let S be an inverse semigroup. We
recall the construction of the associated groupoid GS that is described in detail in [40]. We denote
by X the space of non-zero maps χ from ES into {0, 1} such that χ(ef ) = χ(e)χ(f ) and χ(0) = 0
whenever S has a zero. Equipped with the topology induced from the product space {0, 1}E , the
space X, called the spectrum of S, is locally compact and totally disconnected. Note that when
S is a monoid (i.e., has a unit element 1) then χ is non-zero if and only if χ(1) = 1, and therefore
X is compact.
The semigroup S acts on X as follows. The domain (open and compact) of t ∈ S is Dt∗ t =
{χ ∈ X : χ(t∗ t) = 1} and we set θt (χ)(e) = χ(t∗ et). We define on Ξ = {(t, χ) ∈ S × X : χ ∈ Dt∗ t }
the equivalence relation (t, χ) ∼ (t1 , χ1 ) if χ = χ1 and there exists e ∈ ES with χ(e) = 1 and
te = t1 e. Then GS is the quotient of Ξ with respect to this equivalence relation, equipped with
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
17
the quotient topology. The range of the class [t, χ] of (t, χ) is θt (χ) and its source is χ. The
composition law is given by [u, χ][v, χ′ ] = [uv, χ′ ] if θv (χ′ ) = χ (see [40] or [11] for details). In
general, GS is not Hausdorff. But for the inverse semigroups we are interested in, like S(P ), we
will see that the quotient topology is Hausdorff.
Proposition 3.7. Let S be a strongly E ∗ -unitary inverse semigroup, and let ψ : S × → G be an
idempotent pure morphism. Then there is a partial action of G on the spectrum X of S such
that the groupoid GS is topologically isomorphic to the groupoid G ⋉ X associated with the partial
action. In particular, GS is Hausdorff and étale. Moreover, X is compact when S has a unit.
Proof. This result is described in [31]. The partial action of G on the spectrum X of S is defined
by setting Xg−1 = ∪t∈ψ−1 (g) Dt∗ t (which can be empty). For χ ∈ Xg−1 we set βg (χ) = θt (χ) where
t ∈ ψ −1 (g) is such that χ ∈ Dt∗ t . This does not depend on the choice of t as shown in [31, Lemma
3.1]. Moreover, by [31, Theorem 3.2], the groupoid GS is canonically isomorphic to G ⋉ X.e
Proposition 3.8. Let S be a strongly E ∗ -unitary inverse semigroup. We assume that there is an
idempotent pure morphism ψ : S × → G such that if g 6= e is in the image of ψ, then ψ −1 (g) has
a greatest element αg . Then the groupoid GS is equivalent f to a transformation groupoid G ⋉ Y
for an action of G on an Hausdorff locally compact space Y .
Proof. Let t ∈ S × such that ψ(t) = g. Since t ≤ αg we have Dt∗ t ⊂ Dα∗g αg and therefore
Xg−1 = Dα∗g αg is a closed subset of X. Moreover, for χ ∈ Xg−1 we have βg (χ) = θαg (χ). It
follows that the cocycle c : G ⋉ X → G sending (g, x) to g is injective and closed. Injectivity
means that the map γ ∈ G ⋉ X 7→ (c(γ), s(γ)) is injective. The cocycle is said to be closed if
γ 7→ (r(γ), c(γ), s(γ)) from G ⋉ X into X × G × X is closed. Since the cocycle c is injective
and closed, there exists a locally compact space Y endowed with a continuous action of G such
that the transformation groupoid G ⋉ Y is equivalent to G ⋉ X = GS . When S has a unit, X is
compact and the equivalence is given by a groupoid isomorphism j from G ⋉ X onto a reduction
of G ⋉ Y ) (see [19, Theorem 1.8] and [45, Theorem 6.2]).
Corollary 3.9. Let P a sub-semigroup of a group G containing the unit.
(i) The groupoid GS(P ) is defined by a partial action of G on a compact space.
(ii) If (P, G) satisfies the Toeplitz condition, then GS(P ) is equivalent to a transformation
groupoid defined by an action of G on a locally compact space.
Proof. (i) By Proposition 3.1 there is an idempotent pure morphism ψ : S(P )× → G and we use
Proposition 3.7.
(ii) follows from Propositions 3.6 and 3.8.
eIn [31], the proofs are carried out assuming that S is E-unitary (i.e., without zero) but they immediately extend
to our setting.
fFor this notion of equivalence of groupoids we refer to [1, Definition 2.2.15].
18
CLAIRE ANANTHARAMAN-DELAROCHE
3.3. Weak containment for inverse semigroups. Let S be an inverse semigroup. Let us
recall the definition of the full and reduced C ∗ -algebras of S (for more details, see [40, §2.1]).
Given f, g ∈ ℓ1 (S), we set
X
(f ⋆ g)(t) =
f (u)g(v), f ∗ (t) = f (t∗ ).
uv=t
Then ℓ1 (S) is Banach ∗-algebra, and the full C ∗ -algebra C ∗ (S) of S is defined as the enveloping C ∗ algebra of ℓ1 (S). It is the universal C ∗ -algebra for the representations of S by partial isometries.
The left regular representation π2 : S → B(ℓ2 (S)) is defined by
π2 (t)δu = δtu if (t∗ t)u = u,
π2 (t)δu = 0 otherwise.
The extension of π2 to ℓ1 (S) is faithful. The reduced C ∗ -algebra Cr∗ (S) of S is the sub-C ∗ -algebra
of B(ℓ2 (S)) generated by π2 (S). We still denote by π2 : C ∗ (S) → Cr∗ (S) the extension of the left
regular representation to C ∗ (S).
When S has a zero, we have π2 (0)δ0 = δ0 and π2 (0)δt = 0 if t 6= 0. It follows that Cδ0 is an
ideal in C ∗ (S) that it is preferable to get rid of. So we set C0∗ (S) = C ∗ (S)/Cδ0 and similarly
∗
∗ (S) = C ∗ (S)/π (Cδ ). We denote by π
Cr,0
2
0
2,0 the canonical surjective homomorphism from C0 (S)
r
∗ (S) (see [36]).
onto Cr,0
∗ (S) are canonically isomorphic to
As shown in [40] and [19], the C ∗ -algebras C0∗ (S) and Cr,0
g
∗
∗
∗
S ) and Cr (GS ) respectively. This is the reason for having introduced C0 (S) and Cr,0 (S).
∗ (S) is nuclear if and only C ∗ (S) is so, and that π is injective if and only if it is the
Note that Cr,0
2
r
case for π2,0 .
C ∗ (G
Definition 3.10. We say that S has the weak containment property if π2 (or equivalently π2,0 )
is an isomorphism.
Observe that S has the weak containment property if and only if the groupoid GS has this
property.
Recall that a semigroup S is left amenable if there exists a left invariant mean on ℓ∞ (S). An
inverse semigroup with zero is of course left amenable since the Dirac measure at zero is a left
invariant mean.
If Cr∗ (S) is nuclear, the groupoid GS is amenable and therefore S has the weak containment
property. What about the converse?
The following example shows that left amenability, even in the absence of zero, does not imply
the weak containment property. It also shows that the weak containment property is strictly
weaker than the nuclearity of Cr∗ (S).
g More precisely in [40, 19], the authors consider the C ∗ -algebras C ∗ (S) and C ∗ (S), but their definition of G
S
r
(0)
is also slightly different because for the space X = GS they do not require that the maps χ from ES into {0, 1}
satisfy χ(0) = 0. Their proof also works in our setting.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
19
Example 3.11. Let Γ be a residually finite group
and (Nk )k≥0 oa decreasing sequence as in
n
b t ∈ Γ . Formally, S = G, the HLS
Example 1.9, whose notation we keep. Let S = qk (t) : k ∈ N,
groupoid defined in Example 1.9 but we view S as an inverse semigroup in the following way.
The product is given by qm (t).qn (u) = qm∧n (tu) where m ∧ n isnthe smallest ofothe two elements
b that we identify
m, n. We set qm (t)∗ = qm (t−1 ). The set ES of idempotents is qm (e) : m ∈ N
b The product of two idempotents is given by m.n = m ∧ n. The spectrum X is the set
with
N.
n
o
b where χm (n) = 1 if and only if m ≤ n. It is homeomorphic to the compact space
χm : m ∈ N
b The groupoid GS associated with S is the space of equivalence classes of pairs qm (t), χk
N.
with k ≤ m, where qm (t), χk ∼ qn (u), χ′k if and only if k = k′ and qk (t) = qk (u). The map
sending the class of qm (t), χk to qk (t) is an isomorphism of topological groupoids from GS onto
the HLS-groupoid G.
The maximal group homomorphism image of S is the finite group Γ/N0 and σ : S → S/σ =
Γ/N0 is qm (t) 7→ q0 (t). It is not idempotent pure. Note that S has a zero if and only if N0 = Γ,
the zero being then q0 (e).
Let us observe that S = ⊔k∈Nb Γ/Nk is a Clifford semigroup.
Since S/σ is amenable, this semigroup S is left amenable by a result of Duncan and Namioka
(see [40, Proposition A.0.5]). If Γ = F2 and the sequence (Nk )k is the one defined by Willett in [50],
then S has the weak containment property but Cr∗ (S) is not nuclear. Moreover, S is a Clifford
semigroup for which not every subgroup is amenable, although it has the weak containment
property.
On the other hand, if we realize F2 as a finite index subgroup of SL(2, Z), and choose Nk to be
the intersection with F2 of the kernel of the reduction map SL(2, Z) → SL(2, Z/2k Z), then the
corresponding HLS-groupoid has not the weak containment property, as observed in [50, Remarks
2.9]. Hence, the left amenability of S does not imply its weak containment property in general.
The next theorem gives in particular a sufficient condition for the equivalence between the weak
containment property and the nuclearity of the reduced C ∗ -algebra.
Theorem 3.12. Let S be a strongly E ∗ -unitary inverse semigroup, and let ψ : S × → G be an
idempotent pure morphism.
(1) Assume that G is amenable. Then we have C ∗ (S) = Cr∗ (S) and Cr∗ (S) is nuclear.
(2) Assume that G is exact. Then, the weak containment property of S is equivalent to the
nuclearity of Cr∗ (S).
Proof. By Proposition 3.7, the groupoid GS is associated to a partial action of G on the spectrum
of S. If G is amenable, then GS is amenable (see [46]) and therefore the statement of (1) holds.
If G is exact, the groupoid GS is inner exact (example 2.8 (d)). Then, by Corollary 2.12, GS
has the weak containment property if and only if it is amenable, and therefore if and only if
∗ (S) = C ∗ (G ) is nuclear, since G is étale.
Cr,0
S
S
r
20
CLAIRE ANANTHARAMAN-DELAROCHE
Example 3.13. Let E = (E 0 , E 1 , r, s) be a directed graph and SE the associated graph inverse
semigroup (see [30, Section 4]). Let F be the free group generated by the set E 1 of edges. Then
there is an idempotent pure morphism ψ : SE× → F satisfying the assumption of Proposition 3.7
(2). It has the weak containment property (see [30, Theorem 4.3]) although F is not amenable if
the cardinal of E 1 is ≥ 2.
3.4. Weak containment for semigroups embedded in groups. In this section we consider
a discrete group G and a sub-semigroup P which contains the unit e. We denote by λ the left
regular representation of G, and for p ∈ P we denote by Vp : ℓ2 (P ) → ℓ2 (P ) the isometry given
by Vp δq = δpq . The reduced C ∗ -algebra Cr∗ (P ) of P is the C ∗ -algebra generated by the isometries
Vp , p ∈ P .
The right definition of the full C ∗ -algebra of P is more speculative. The universal C ∗ -algebra
generated by elements vp , p ∈ P , such that vp∗ vp = 1 and vp vq = vpq for every p, q ∈ P , is too big.
For instance Murphy proved that, for the commutative semigroup N2 , this universal C ∗ -algebra
is not nuclear [33]. A reasonable definition for the full C ∗ -algebra of P was introduced by Xin
Li in [26, Definition 2.2] and a variant in [26, Definition 3.2]. It is this variant (denoted Cs∗ (P )
in [26]) that we adopt as the definition of the full C ∗ -algebra of P in the sequel, and we denote
it C ∗ (P ). By [36, Proposition 3.3.1], C ∗ (P ) can be defined as C0∗ (S(P )). Let us recall (see [36,
Lemma 3.2.2]) that the inverse semigroup S(P ) is canonically isomorphic to the inverse semigroup
of partial isometries
V (P ) = Vp∗1 Vq1 · · · Vp∗n Vqn : n ∈ N, pi , qi ∈ P .
∗ (S(P )) → C ∗ (P ) such that
Let us also recall that there is a surjective homomorphism h : Cr,0
r
h(π2 (ℓp )) = Vp for p ∈ P (see [36, Lemma 3.2.12]). Therefore we have the following situation
π2,0
h
∗
C ∗ (P ) = C0∗ (S(P )) ≡ C ∗ (GS(P ) ) −։ Cr,0
(S(P )) ≡ Cr∗ (GS(P ) ) −։ Cr∗ (P ).
Definition 3.14. We say that P has the weak containment property if C ∗ (P ) = Cr∗ (P ).
Note that the weak containment property of P implies the weak containment property of S(P ).
Definition 3.15. Let (P, G) as above and assume in addition that P ∩ P −1 = {e}. Then we
define on G a partial order by setting x ≤ y if x−1 y ∈ P . We say that (P, G) is a quasi-lattice
ordered group if for every g ∈ G, we have either P ∩ gP = ∅ or P ∩ gP = rP for some r ∈ P
(equivalently, every pair of elements in G having a common upper bound has a least common
upper bound (see [9, Lemma 7] for more on this)).
The Toeplitz condition for (P, G) is equivalent to the following property: for every g ∈ G such
that EP λg EP 6= 0, there exist p1 , . . . , pn , q1 , . . . , qn ∈ P such that EP λg EP = Vp∗1 Vq1 . . . Vp∗n Vqn
(see for instance the proof of [37, Proposition 4.1]).
Quasi-lattice ordered semigroups and semigroups (P, G) such that G = P −1 P satisfy the
Toeplitz condition (see [27, §8]). Xin Li has also introduced an important condition for P , he
called independence ([26, Definition 2.26]). We will not describe it here. We only note that when
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
21
P is contained in a group, this condition is equivalent to the injectivity of h (see [36, Theorem
3.2.14]) and that it is satisfied for quasi-lattice ordered groups (see [26, Lemma 28]).
Proposition 3.16. Let P be a sub-semigroup of a group G with e ∈ P . Assume that P satisfies
the independence condition. Then the nuclearity of Cr∗ (P ) implies the weak containment property
for P , i.e., C ∗ (P ) = Cr∗ (P ).
Proof. Assume that Cr∗ (P ) is nuclear. Since Cr∗ (P ) = Cr∗ (GS(P ) ), we see that the groupoid GS(P )
is amenable. It follows that S(P ) (and thus P ) has the weak containment property.
Proposition 3.17. Let P be a sub-semigroup of a group G with e ∈ P .
(1) If G is amenable, then Cr∗ (P ) is nuclear.
(2) If P is left amenable, then P P −1 is an amenable subgroup of G and Cr∗ (P ) is nuclear.
Proof. Assume that G is amenable. By Proposition 3.1 and Proposition 3.7 the groupoid GS(P ) is
amenable since it is isomorphic to the groupoid defined be a partial action of G. It follows that
Cr∗ (GS(P ) ) is nuclear as well as its quotient Cr∗ (P ).
Suppose now that P is left amenable. Then it is left reversible (i.e., pP ∩qP 6= ∅ for all p, q ∈ P )
and therefore G′ = P P −1 is an amenable subgroup of G (see [39, Propositions 1.23, 1.27]). To
see that Cr∗ (GS(P ) ) is nuclear, we apply the first part of the proof.
Theorem 3.18. Let P be a sub-semigroup of an exact group G, containing the unit e. The two
following conditions are equivalent:
(1) C ∗ (P ) = Cr∗ (P );
(2) C ∗ -algebra Cr∗ (P ) is nuclear and P satisfies the independence condition.
Proof. The weak containment property for P implies the weak containment property for GS(P )
and also the independence. So the assertion (1) ⇒ (2) follows from Corollaries 3.9 (i) and 2.12.
The converse is Proposition 3.16.
4. Some questions
(1) The only example of an étale groupoid which satisfies the weak containment property
although it is not amenable was provided by Willett. It is a bundle of groups. At the opposite,
are there principal groupoids (i.e., such that the units are the only elements with the same source
and range) which satisfy the weak containment property without being amenable ? It would also
be interesting to know whether there are examples which are transformation groupoids G ⋉ X
where G is a discrete group acting on a locally compact space X. To this respect, is it true that
G is exact when the groupoid G ⋉ X has the weak containment property with X compact? This
question which seems quite difficult was already raised in [50].
For the boundary compact set X = ∂G = βG \ G, equipped with the natural action of G the
answer is positive. Indeed, the weak containment property for G ⋉ ∂G implies that the sequence
0 −→ Cr∗ (G ⋉ G) −→ Cr∗ (G ⋉ βG) −→ Cr∗ (G ⋉ ∂G) −→ 0
22
CLAIRE ANANTHARAMAN-DELAROCHE
is exact. Roe and Willett proved in [48] that this exactness property implies that G has Yu’s
property A and thus is exact.
(2) Find an example of a pair (P, G) such that Cr∗ (P ) is nuclear but P has not the weak
containment property.
(3) Find a characterization of the weak containment property for a locally compact groupoid.
Added remark. After having read this paper, Kang Li has found a nice proof of the above RoeWillett result. I thank him for allowing me to reproduce his proof here.
Let G be a discrete group and let ∂F G be its Furstenberg boundary [14]. We fix an element
x0 ∈ ∂F G and we denote by ι the canonical G-equivariant inclusion from C(∂F G) into C(βG) =
ℓ∞ (G) such that ι(f )(s) = f (sx0 ) for s ∈ G. Let us recall that C(∂F G) is G-injective (see [18]). It
follows that the identity map IdC(∂F G) extends to a G-equivariant unital contraction from C(βG)
onto C(∂F G). Therefore, there exists a G-equivariant conditional expectation E from C(βG) onto
C(∂F G).
Let us denote by Id G ⋉ ι (resp. Id G ⋉r ι) the canonical homomorphism from C ∗ (G ⋉ ∂F G)
into C ∗ (G ⋉ βG) (resp. from Cr∗ (G ⋉ ∂F G) into Cr∗ (G ⋉ βG)). The map Id G ⋉r ι is known to be
injective. Here, Id G ⋉ι is also injective. Indeed, the G-equivariant conditional expectation E yields
a completely positive map Id G ⋉ E from C ∗ (G ⋉ βG) onto C ∗ (G ⋉ ∂F G) and (Id G ⋉ E) ◦ (Id G ⋉ ι)
is the identity map of C ∗ (G ⋉ ∂F G). Therefore Id G ⋉ ι is injective.
Assume now that the groupoid G ⋉ ∂G has the weak containment property. In the following
commutative diagram
0
/ C ∗ (G ⋉ G)
/ C ∗ (G ⋉ βG)
/ C ∗ (G ⋉ ∂G)
/0
≃
0
/ C ∗ (G ⋉ G)
r
/ C ∗ (G ⋉ βG)
r
/ C ∗ (G ⋉ ∂G)
r
/0
the first line is an exact sequence and the canonical map from Cr∗ (G ⋉ G) into Cr∗ (G ⋉ βG) is
injective. This implies that the groupoid G ⋉ βG has the weak containment property.
From the commutativity of the diagram
C ∗ (G ⋉ ∂F G)
Id G ⋉ι
/ C ∗ (G ⋉ βG)
Id G ⋉r ι
≃
Cr∗ (G ⋉ ∂F G)
/ C ∗ (G ⋉ βG)
r
we deduce that G ⋉ ∂F G has also the weak containment property. Since the action of G on the
Furstenberg boundary is minimal, it follows from Corollary 2.12 that the groupoid G ⋉ ∂F G is
amenable, and therefore G is exact.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
23
References
[1] Claire Anantharaman-Delaroche and Jean Renault. Amenable groupoids, volume 36 of Monographies de
L’Enseignement Mathématique. L’Enseignement Mathématique, Geneva, 2000. With a foreword by Georges
Skandalis and Appendix B by E. Germain.
[2] Claire Anantharaman-Delaroche. Systèmes dynamiques non commutatifs et moyennabilité. Math. Ann.,
279(2):297–315, 1987.
[3] Claire Anantharaman-Delaroche. Amenability and exactness for dynamical systems and their C ∗ -algebras.
Trans. Amer. Math. Soc., 354(10):4153–4178 (electronic), 2002.
[4] Claire Anantharaman-Delaroche. Exact groupoids, In preparation.
[5] Étienne Blanchard. Déformations de C ∗ -algèbres de Hopf. Bull. Soc. Math. France, 124(1):141–215, 1996.
[6] Jacek Brodzki, Chris Cave, and Kang Li. Exactness of locally compact groups. arXiv:math.GR/1603.0182v1,
2016.
[7] Madalina Buneci. C ∗ -algebras associated to the transitive groupoids. An. Univ. Craiova Ser. Mat. Inform.,
28:79–92, 2001.
[8] Alcides Buss, Ruy Exel, and Ralf Meyer. Reduced C ∗ -algebras of Fell bundles over inverse semgroups.
arXiv:math.OA/1512.05570v1, 2015.
[9] John Crisp and Marcelo Laca. On the Toeplitz algebras of right-angled and finite-type Artin groups. J. Aust.
Math. Soc., 72(2):223–245, 2002.
[10] J. Duncan and A. L. T. Paterson. C ∗ -algebras of inverse semigroups. Proc. Edinburgh Math. Soc. (2), 28(1):41–
58, 1985.
[11] Ruy Exel. Inverse semigroups and combinatorial C ∗ -algebras. Bull. Braz. Math. Soc. (N.S.), 39(2):191–313,
2008.
[12] Ruy Exel and Starling Charles. Amenable actions of inverse semigroups. arXiv:math.OA/1411.256v1, 2014.
[13] Ruy Exel. Partial Dynamical Systems, Fell Bundles and Applications. arXiv:math.OA/1511.04565v1, 2015.
[14] Harry Furstenberg. Boundary theory and stochastic processes on homogeneous spaces. Harmonic analysis on
homogeneous spaces. Proc. Sympos. Pure Math., Vol. XXVI, 193–229. Amer. Math. Soc., Providence, R.I.,
1973.
[15] N. Higson, V. Lafforgue, and G. Skandalis. Counterexamples to the Baum-Connes conjecture. Geom. Funct.
Anal., 12(2):330–354, 2002.
[16] Michel Hilsum and Georges Skandalis. Morphismes K-orientés d’espaces de feuilles et fonctorialité en théorie
de Kasparov (d’après une conjecture d’A. Connes). Ann. Sci. École Norm. Sup. (4), 20(3):325–390, 1987.
[17] A. Hulanicki. Means and Følner condition on locally compact groups. Studia Math., 27:87–104, 1966.
[18] Mehrdad Kalantar and Matthew Kennedy. Boundaries of reduced C ∗ -algebras of discrete groups.
arXiv:mathOA/1405.4359v3, 2014.
[19] Mahmood Khoshkam and Georges Skandalis. Regular representation of groupoid C ∗ -algebras and applications
to inverse semigroups. J. Reine Angew. Math., 546:47–72, 2002.
[20] Mahmood Khoshkam and Georges Skandalis. Crossed products of C ∗ -algebras by groupoids and inverse semigroups. J. Oper. Theory, 51(2):255–279, 2004.
[21] Eberhard Kirchberg and Simon Wassermann. Operations on continuous bundles of C ∗ -algebras. Math. Ann.,
303(4):677–697, 1995.
[22] Marcelo Laca and Iain Raeburn. Semigroup crossed products and the Toeplitz algebras of nonabelian groups.
J. Funct. Anal., 139(2):415–440, 1996.
[23] N. P. Landsman and B. Ramazan. Quantization of Poisson algebras associated to Lie algebroids. In Groupoids
in analysis, geometry, and physics (Boulder, CO, 1999), volume 282 of Contemp. Math., pages 159–192. Amer.
Math. Soc., Providence, RI, 2001.
[24] Mark V. Lawson. Inverse semigroups. World Scientific Publishing Co., Inc., River Edge, NJ, 1998. The theory
of partial symmetries.
[25] Pierre-Yves Le Gall. Théorie de Kasparov équivariante et groupoı̈des. I. K-Theory, 16(4):361–390, 1999.
24
CLAIRE ANANTHARAMAN-DELAROCHE
[26] Xin Li. Semigroup C∗ -algebras and amenability of semigroups. J. Funct. Anal., 262(10):4302–4340, 2012.
[27] Xin Li. Nuclearity of semigroup C ∗ -algebras and the connection to amenability. Adv. Math., 244:626–662, 2013.
[28] Xin Li. Partial transformation groupoids attached to graphs and semigroups. arXiv:math.OA/1603.09165v1,
2016.
[29] Masayoshi Matsumura. A characterization of amenability of group actions on C ∗ -algebras. J. Operator Theory,
72(1):41–47, 2014.
[30] David Milan. C ∗ -algebras of inverse semigroups: amenability and weak containment. J. Operator Theory,
63(2):317–332, 2010.
[31] David Milan and Benjamin Steinberg. On inverse semigroup c∗ -algebras and crossed products. Groups, Geometry and Dynamics, 8(2):485–512, 2014.
[32] Paul S. Muhly and Dana P. Williams. Renault’s equivalence theorem for groupoid crossed products., volume 3
of NYJM Monographs. Albany, NY: State University of New York, University at Albany, 2008.
[33] Gerard J. Murphy. C ∗ -algebras generated by commuting isometries. Rocky Mountain J. Math., 26(1):237–267,
1996.
[34] Alexandru Nica. C ∗ -algebras generated by isometries and Wiener-Hopf operators. J. Operator Theory,
27(1):17–52, 1992.
[35] Alexandru Nica. On a groupoid construction for actions of certain inverse semigroups. Internat. J. Math.,
5(3):349–372, 1994.
[36] Magnus Dahler Norling. Inverse semigroup C ∗ -algebras associated with left cancellative semigroups. Proc.
Edinb. Math. Soc. (2), 57(2):533–564, 2014.
[37] Magnus Dahler Norling. The K-theory of some reduced inverse semigroup C ∗ -algebras. Math. Scand., 117:186–
202, 2015.
[38] Alan L. T. Paterson. Weak containment and Clifford semigroups. Proc. Roy. Soc. Edinburgh Sect. A, 81(12):23–30, 1978.
[39] Alan L. T. Paterson. Amenability, volume 29 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 1988.
[40] Alan L. T. Paterson. Groupoids, inverse semigroups, and their operator algebras, volume 170 of Progress in
Mathematics. Birkhäuser Boston Inc., Boston, MA, 1999.
[41] Birant Ramazan. Quantification par déformation des variétés de Lie-Poisson. PhD thesis, University of Orléans,
1998.
[42] Jean Renault. A groupoid approach to C ∗ -algebras, volume 793 of Lecture Notes in Mathematics. Springer,
Berlin, 1980.
[43] Jean Renault. Représentation des produits croisés d’algèbres de groupoı̈des. J. Operator Theory, 18(1):67–97,
1987.
[44] Jean Renault. The ideal structure of groupoid crossed product C ∗ -algebras. J. Operator Theory, 25(1):3–36,
1991. With an appendix by Georges Skandalis.
[45] Jean Renault and S. Sundar. Groupoids associated to Ore semigroup actions. J. Operator Theory, 73(2):491–
514, 2015.
[46] Jean Renault and Dana Williams. Amenability of groupoids arising from partial semigroup actions and topological higher rank graphs. arXiv:math.OA/1501.03027v2, 2015.
[47] Marc A. Rieffel. Continuous fields of C ∗ -algebras coming from group cocycles and actions. Math. Ann.,
283(4):631–643, 1989.
[48] John Roe and Rufus Willett. Ghostbusting and property A. J. Funct. Anal., 266(3):1674–1684, 2014.
[49] Aidan Sims and Dana P. Williams. Renault’s equivalence theorem for reduced groupoid C ∗ -algebras. J. Operator Theory, 68(1):223–239, 2012.
[50] Rufus Willett. A non-amenable groupoid whose maximal and reduced C ∗ -algebras are the same.
arXiv:math.OA/1504.05615v2, 2015.
[51] Robert J. Zimmer. Hyperfinite factors and amenable ergodic actions. Invent. Math., 41(1):23–31, 1977.
SOME REMARKS ABOUT THE WEAK CONTAINMENT PROPERTY
25
[52] Robert J. Zimmer. On the von Neumann algebra of an ergodic group action. Proc. Amer. Math. Soc., 66(2):289–
293, 1977.
[53] Robert J. Zimmer. Amenable ergodic group actions and an application to Poisson boundaries of random walks.
J. Functional Analysis, 27(3):350–372, 1978.
Université d’Orléans et CNRS (UMR 7349 et FR2964),
B. P. 6759, F-45067 Orléans Cedex 2
E-mail address: [email protected]
| 4math.GR
|
arXiv:1602.03427v2 [math.ST] 31 May 2016
Aggregation of supports along the Lasso
path
Pierre C. Bellec
ENSAE-CREST
1
Abstract: In linear regression with fixed design, we propose two procedures that aggregate a data-driven collection of supports. The collection
is a subset of the 2p possible supports and both its cardinality and its elements can depend on the data. The procedures satisfy oracle inequalities
with no assumption on the design matrix. Then we use these procedures
to aggregate the supports that appear on the regularization path of the
Lasso in order to construct an estimator that mimics the best Lasso
estimator. If the restricted eigenvalue condition on the design matrix is
satisfied, then this estimator achieves optimal prediction bounds. Finally,
we discuss the computational cost of these procedures.
1. Introduction
Let n, p be two positive integers. We consider the mean estimation problem
Yi = µi + ξi ,
i = 1, ..., n,
where µ = (µ1 , ..., µn )T ∈ Rn is unknown, ξ = (ξ1 , ..., ξn )T is a subgaussian
vector, that is,
E[exp(v T ξ)] ≤ exp
σ 2 |v|22
2
for all v ∈ Rn ,
(1.1)
where σ > 0 is the noise level and | · |2 is the Euclidean norm in Rn . We
only observe y = (Y1 , ..., Yn )T and wish to estimate µ. A design matrix X of
size n × p is given and p may be larger than n. We do not require that the
model is well-specified, i.e., that there exists β ∗ ∈ Rp such that µ = Xβ ∗ .
Our goal is to find an estimator µ̂ such that the prediction loss kµ̂ − µk2 is
small, where k · k2 is the empirical loss defined by
kuk2 =
1
n
1 2
1X
u2 ,
|u|2 =
n
n i=1 i
u = (u1 , ..., un )T ∈ Rn .
Accepted for presentation at Conference on Learning Theory (COLT) 2016.
1
Bellec/Aggregation of supports along the Lasso path
2
In a high-dimensional setting where p > n, the Lasso is known to achieve
good prediction performance. For any tuning parameter λ > 0, define the
l
Lasso estimate β̂ λ as any solution of the convex minimization problem
l
β̂ λ ∈ argmin
β∈R p
1
|y − Xβ|22 + λ |β|1 ,
2n
(1.2)
where |β|1 = nj=1 |βj | is the ℓ1 -norm. If XT X/n = Ip×p where Ip×p is
the identity matrix
p of size p, then an optimal choice of the tuning parameter is λuniv ∼ σ log(p)/n, up to a numerical constant. If the Restricted
Eigenvalue condition holds
p(cf. Definition 1 below), then the universal tuning parameter λuniv ∼ σ log(p)/n leads to good prediction performance
[Bickel et al., 2009]. However, if the columns of X are correlated and the
Restricted Eigenvalue condition is not satisfied, the question of the optimal
choice of the tuning parameter λ is still unanswered, even if the noise level
σ 2 is known. Empirical and theoretical studies [van de Geer and Lederer,
2013, Hebiri and Lederer, 2013, Dalalyan et al., 2014] have shown that if
the columns of X are correlated, the Lasso estimate with a tuning parameter substantially smaller than the universal parameter leads to a prediction
performance which is substantially better than that of the Lasso estimate
with the universal parameter. To summarize, these papers raise the following
question:
P
Problem 1 (Data-driven selection of the tuning parameter). Find a datal
driven quantity λ̂ such that the prediction loss kµ − Xβ̂λ̂ k2 is small with high
probability.
In this paper, we focus on a different problem, namely:
Problem 2 (Lasso Aggregation). Construct an estimator µ̂ that mimics
the prediction performance of the best Lasso estimator, that is, construct an
estimator µ̂ such that with high probability,
kµ̂ − µk2 ≤ C min
λ>0
l
l
kXβ̂ λ − µk2 + ∆(β̂ λ ) ,
l
(1.3)
where C ≥ 1 is a constant and ∆(β̂ λ ) is a small quantity.
1 and 2 have the same goal, that is, to achieve a small prediction loss with
high probability. In 1, the goal is to select a Lasso estimate that has small
prediction loss. In 2, we look for an estimator µ̂ such that the prediction
performance of µ̂ is almost as good as the prediction performance of any
l
Lasso estimate. The estimator µ̂ may be of a different form than β̂ λ̂ for
some data-driven parameter λ̂.
Bellec/Aggregation of supports along the Lasso path
3
Our motivation to consider 2 instead of 1 is the following. Let µ1 , ..., µM
be deterministic vectors Rn . If the goal is to mimic the best approximation
of µ among µ1 , ..., µM , it is well known in the literature on aggregation
problems that an estimator of the form µ̂ = f k̂ for some data-driven integer
k̂ is suboptimal (cf. Theorem 2.1 in Rigollet and Tsybakov [2012], Section 2
of Juditsky et al. [2008] and Proposition 6.1 in Gerchinovitz [2011]). Thus,
an optimal procedure cannot be valued in the discrete set {µ1 , ..., µM }. Optimal procedures for this problem are valued in the convex hull of the set
{µ1 , ..., µM }. Examples are the Exponential Weights procedures proposed in
Leung and Barron [2006], Dalalyan and Salmon [2012] or the Q-aggregation
procedure of Dai et al. [2014].
Although a lot of progress has been made for various aggregation problems, to our knowledge no previous work deals with the problem of aggrel
gation of nonlinear estimators such as the collection (Xβ̂ λ )λ>0 based on the
sample. In the setting of the present paper, the observation y and the Lasso
estimates are not independent: no data-split is performed and the same data
is used to construct the Lasso estimators and to aggregate them.
We will show that aggregation of nonlinear estimators of the form Xβ̂ is
possible, for any nonlinear estimators β̂ and without any assumption on X.
For instance, an estimator µ̂ that achieves (1.3) with
σ 2 |β|0
ep
∆(β) ≃
log
n
|β|0 ∨ 1
is given in Section 3. Here, |β|0 denotes the number of nonzero coefficients
of β and a ∨ b = max(a, b).
Given a design matrix X, we call support any subset T of {1, ..., p}. The
cardinality of T is denoted by |T | and for β ∈ Rp , supp(β) is the set of
indices k = 1, ..., p such that βk 6= 0. Given a support T , we denote by ΠT
the square matrix of size n which is the orthogonal projection on the linear
span of the columns of X whose indices belong to T . Denote by P({1, ..., p})
the set of all subsets of {1, ..., p}. We will consider the following problem.
Problem 3 (Aggregation of a data-driven collection of supports). Let F̂ be a
data-driven collection of supports, that is, an estimator valued in P({1, ..., p}).
Construct an estimator µ̂ such that with high probability,
kµ̂ − µk2 ≤ min
T ∈F̂
kΠT µ − µk2 + ∆(T ) ,
where ∆(·) is a function that takes small values.
(1.4)
Bellec/Aggregation of supports along the Lasso path
4
The set F̂ is a family of supports. Let us emphasize that both its cardinality and its elements can depend on the data y. Note that for any support
T , ΠT µ = Xβ ∗T where β ∗T minimizes |Xβ − µ|22 subject to βk = 0 for all
k 6∈ T . In Section 3, we construct an estimator µ̂ that satisfies (1.4) with
∆(T ) ≃ σ 2 |T | log(p/|T |)/n for all nonempty supports T . In the literature on
aggregation problems, one is given a collection of estimators {µ̂1 , ..., µ̂M }
where M ≥ 1 is a deterministic integer and the goal is to mimic the best
estimator in this collection, cf. Tsybakov [2014] and the references therein.
A novelty of the present paper is to consider aggregation of a collection of
estimators, where the cardinality of the collection depends on the data.
The main contributions of the present paper are the following.
• In Section 2, we propose an estimator µ̂qF̂ ,σ̂2 that satisfies the oracle
inequality (1.4) with ∆(T ) ≃ σ̂ 2 |T | log(p/|T |)/n for all nonempty supports T , where σ̂ 2 is an estimator of the noise level. This estimator
solves 3. We explain in Corollary 1 how Section 2 can be used to construct a procedure that aggregates nonlinear estimators of the form
Xβ̂.
• Section 3 is devoted to 2. Using the result from Section 2, we construct
an estimator µ̂ that satisfies (1.3) with ∆(β) ≃ σ 2 |β|0 log(p/|β|0 ). The
computational complexity of the procedure is the sum of the complexity of the regularization path of the Lasso and the complexity of a
convex quadratic program.
The proofs can be found in the appendix.
2. Aggregation of a data-driven family of supports
Throughout this section, let F̂ be a data-driven collection of supports and
let σ̂ 2 ≥ 0 be a real valued estimator. Let M̂ be the cardinality of F̂ , and
let (T̂j )j=1,...,M̂ be supports such that
F̂ = {T̂1 , ..., TˆM̂ }.
(2.1)
For all supports T ⊂ {1, ..., p}, define the weights [Rigollet and Tsybakov,
2012]
!
!−1
p
e − e−p
|T |
πT := Hp
e
,
Hp :=
.
|T |
e−1
Note that by construction, the constant Hp is greater than 1 and T ∈P({1,...,p}) πT =
1 where P({1, ..., p}) is the set of all subsets of {1, ..., p}. Given a support T ,
P
Bellec/Aggregation of supports along the Lasso path
5
the Least Squares estimator on the linear span of the covariates indexed by
T is ΠT y.
We will consider two estimators of µ based on F̂ and σ̂ 2 . The first estimator is defined as follows. Define the criterion
Critσ̂2 (T ) = |y − ΠT y|22 + 18σ̂ 2 log
1
.
πT
We have
1
1
≤ + 2|T | log(ep/|T |)
(2.2)
πT
2
for any support T . The lower bound is a direct consequence of Hp > 1 and
the upper bound is proved in [Rigollet and Tsybakov, 2012, (5.4)]. As (2.2)
holds, the above criterion is of the same nature as Cp , AIC, BIC and their
variants, cf. Birgé and Massart [2001]. Define the estimator
|T | ≤ log
ΠT̂
F̂ ,σ̂ 2
(y)
T̂F̂ ,σ̂2 ∈ argmin Critσ̂2 (T ).
where
(2.3)
T ∈F̂
The estimator (2.3) is the orthogonal projection of y onto the linear span of
the columns of X whose indices are in T̂F̂ ,σ̂2 . If F̂ is not data-dependent, the
procedure ΠT̂ 2 (y) is close to the one studied in Birgé and Massart [2001].
F̂ ,σ̂
We now define a second estimator valued in the convex hull of (ΠT y)T ∈F̂ .
Let M̂ be the cardinality of F̂ , and let (T̂j )j=1,...,M̂ be supports such that
(2.1) holds. For any j = 1, ..., M̂ , let µ̂j = ΠT̂j y. Define a simplex in RM̂ as
follows:
n
ΛM̂ = θ ∈ RM̂ ,
M̂
X
j=1
For any θ ∈ RM̂ , define µ̂θ =
o
θj = 1, ∀j = 1 . . . M̂ , θj ≥ 0 .
PM̂
HF̂ ,σ̂2 (θ) := |µ̂θ − y|22 +
j=1 θj µ̂j .
For all θ ∈ ΛM̂ , let
M̂
X
1
1
.
θj log
penQ (θ) + 26σ̂ 2
2
π
T̂j
j=1
(2.4)
where
penQ (θ) :=
M̂
X
j=1
θj |µ̂j − µ̂θ |22 .
(2.5)
The penalty (2.5) is inspired by recent works on the Q-aggregation procedure [Dai et al., 2012], and it was used to derive sharp oracle inequalities for aggregation of linear estimators [Dai et al., 2014, Bellec, 2014a]
Bellec/Aggregation of supports along the Lasso path
6
and density estimators [Bellec, 2014b]. The penalty pushes µ̂θ towards the
P
1
is another penalty that
points {µ̂1 , ..., µ̂M̂ }. Finally, the term M̂
j=1 θj log π
T̂j
pushes the coordinate θj to 0 if the size of the support T̂j is large.
Define the estimator µ̂qF̂ ,σ̂2 as any minimizer of the function HF̂ ,σ̂2 defined
in (2.4):
(2.6)
θ̂ ∈ argmin HF̂ ,σ̂2 (θ).
µ̂qF̂ ,σ̂2 := µ̂θ̂ ,
θ∈ΛM̂
Theorem 1. Let n, p be positive integers and let σ > 0. Let µ ∈ Rn and X
be any matrix of size n × p. Let F̂ be any data-driven collection of subsets of
{1, ..., p}. Assume that the noise ξ satisfies (1.1). Let σ̂ 2 be any real valued
estimator and let δ := P(σ̂ 2 < σ 2 ). Then for all x > 0, the estimator µ̂qF̂ ,σ̂2
defined in (2.6) satisfies with probability greater than 1 − δ − 2 exp(−x),
kµ̂qF̂ ,σ̂2 −µk2
σ̂ 2
ep
≤ min kΠT µ − µk +
24 + 96|T | log
n
|T | ∨ 1
T ∈F̂
Furthermore, the estimator ΠT̂
F̂ ,σ̂
!
22σ 2 x
.
n
(2.7)
(y)
satisfies
with
probability
greater
than
2
2
+
1 − δ − 2 exp(−x),
ep
σ̂ 2
26 + 104|T | log
kΠT̂ 2 (y)−µk ≤ min 3kΠT µ − µk +
F̂ ,σ̂
n
|T | ∨ 1
T ∈F̂
2
2
!
+
(2.8)
In previously studied aggregation problems, one is given a collection of
estimators {µ̂1 , ..., µ̂M } where M ≥ 1 is a deterministic integer and the goal
is to construct an estimator µ̂ such that with high probability,
kµ̂ − µk2 ≤
min kµ̂j − µk2 + ∆n (M ),
j=1,...,M
where ∆n (M ) is a small error term that increases with M , cf. Tsybakov
[2014] and the references therein. Theorem 1 is of a different nature for
several reasons. First, the set F̂ is random, its cardinality can depend on
the observed data y. Second, the error term that appears inside the minimum
of (2.7) does not depend on the cardinality of F̂ .
The estimator µ̂qF̂ ,σ̂2 of Theorem 1 with σ̂ 2 = σ 2 and F̂ being the set of all
subsets of {1, ..., p} was previously studied as the Exponential Screening estimator [Rigollet and Tsybakov, 2011] or as the Sparsity Pattern Aggregate
[Rigollet and Tsybakov, 2012]. In this special case, F̂ is deterministic and
contains all the 2p possible supports. Because of this exponential number
28σ 2 x
.
n
Bellec/Aggregation of supports along the Lasso path
7
of supports, computing the sparsity pattern aggregate in practice is hard.
An MCMC algorithm is developed in Rigollet and Tsybakov [2011] to compute an approximate solution of the sparsity pattern aggregate, but to our
knowledge there is no theoretical guarantee that this MCMC algorithm will
converge to a good approximation in polynomial time. The Sparsity Pattern
Aggregate satisfies (2.7) with σ̂ 2 = σ 2 and F̂ = P({1, ..., p}). This sharp
oracle inequality yields the minimax rate over all ℓq balls for all 0 < q ≤ 1,
under no assumption on the design matrix X [Dai et al., 2014, Tsybakov,
2014].
To construct the estimator µ̂qF̂ ,σ̂2 , one has to solve the optimization problem (2.6). This is a convex quadratic program of size |F̂ | with a simplex constraint. The complexity of computing µ̂qF̂ ,σ̂2 is polynomial in the cardinality
of F̂ . Thus, if F̂ is small then it is possible to construct µ̂qF̂ ,σ̂2 efficiently.
As the cardinality of F̂ decreases, the prediction performance of the estimator µ̂qF̂ ,σ̂2 becomes worse, but computing µ̂qF̂ ,σ̂2 becomes easier.
Problem 4. Construct a data-driven set of supports F̂ such that with high
probability, there exists a support T ∈ F̂ for which, simultaneously, the bias
kΠT µ − µk2 and the size |T | are small.
If we can construct such a set F̂ , by (2.7) the prediction loss of the estimator µ̂qF̂ ,σ̂2 will be small. Note that Theorem 1 needs no assumption on
the data-driven set F̂ and the design matrix X.
In the following Corollary, we perform aggregation of a family of nonlinear
estimators of the form (Xβ̂ k )j∈J for some set J. All estimators in the family
share the same design matrix X and this matrix is deterministic.
Corollary 1. Let n, p be positive integers and let σ > 0. Let µ ∈ Rn
and X be any matrix of size n × p. Let F̂ be any data-driven collection of
subsets of {1, ..., p}. Assume that the noise ξ satisfies (1.1). Let (β̂ j )j∈Jˆ be
a family of estimators valued in Rp . Both the cardinality of the family and
its elements can depend on the data. Let σ̂ 2 be any real valued estimator
and let δ := P(σ̂ 2 < σ 2 ). Define F̂ = {supp(β̂ j ), j ∈ Jˆ} and let µ̂qF̂ ,σ̂2 be
the estimator (2.6). Then for all x > 0, the estimator µ̂qF̂ ,σ̂2 satisfies with
probability greater than 1 − δ − 2 exp(−x),
kµ̂qF̂ ,σ̂2 −µk2
σ̂ 2
≤ min kXβ̂ j − µk +
n
j∈Jˆ
2
24 + 96|β̂ j |0 log
ep
|β̂ j |0 ∨ 1
!!!
+
22σ 2 x
.
n
Using (2.8), a similar result can be readily obtained for the estimator
Bellec/Aggregation of supports along the Lasso path
ΠT̂
F̂ ,σ̂ 2
8
(y) with the leading constant 3.
3. Aggregation of supports along the Lasso path
Let us recall some properties of the Lasso path [Efron et al., 2004]. For a
given observation y, there exists a positive integer K and a finite sequence
λ0 > λ1 > ... > λK = 0
l
such that β̂ λ = 0 for all λ > λ0 , and such that
∀λ ∈ (λk+1 , λk ),
l
l
supp(β̂ λ ) = supp(β̂ λk ).
Thus, there is a finite number of supports on the Lasso path. In this section,
l
we study the estimator of Theorem 1 in the special case F̂ = {supp(β̂ λk ), k =
0, ..., K}, that is, we aggregate all the supports that appear on the Lasso
path.
Theorem 2. Let n, p be positive integers and let σ > 0. Let µ ∈ Rn and X
be any matrix of size n × p. Assume that the noise ξ satisfies (1.1). Let σ̂ 2 be
any real valued estimator and let δ := P(σ̂ 2 < σ 2 ). Let λ0 > ... > λK be the
l
knots of the Lasso path. Let F̂ = {supp(β̂ λj ), j = 0, ..., K} be the family of all
supports that appear on the Lasso path and let µ̂qF̂ ,σ̂2 be the estimator (2.6).
Then for all x > 0, the estimator µ̂qF̂ ,σ̂2 satisfies with probability greater than
1 − δ − 2 exp(−x),
kµ̂qF̂ ,σ̂2 −µk2 ≤ min
λ>0
l
kXβ̂ λ
σ̂ 2
− µk2 +
n
24 +
l
96|β̂ λ |0 log
ep
l
|β̂ λ |0
∨1
!!!
22σ 2 x
,
n
(3.1)
+
l
where for all λ > 0, β̂ λ is the Lasso estimator (1.2).
Using (2.8), a similar result can be readily obtained for the estimator
ΠT̂ 2 (y) with the leading constant 3.
F̂ ,σ̂
The computational complexity of the procedure of Theorem 2 is polynomial in the number of knots of the Lasso path. This will be further discussed
in Section 4. In the rest of this section, we assume that σ̂ 2 = σ 2 and δ = 0.
We will come back to the estimation of the noise level in Section 5 below.
Interestingly, Theorem 2 does not need any assumption on the design
matrix X. The estimators µ̂qF̂ ,σ̂2 and ΠT̂ 2 (y) have a good performance as
F̂ ,σ̂
l
soon as for some possibly unknown λ > 0, both the support of β̂ λ and the
l
loss kXβ̂ λ − µk2 are small.
Bellec/Aggregation of supports along the Lasso path
9
3.1. Prediction guarantees under the restricted eigenvalue
condition
The goal of this section is to study the prediction performance of the procedure defined in Theorem 2 under the Restricted Eigenvalue condition on
the design matrix X.
Definition 1. For any s ∈ {1, ..., p} and c0 > 0, condition RE(s, c0 ) is
satisfied if
κ(s, c0 ) :=
min
min
T ⊂{1,...,p}:|T |≤s δ∈R p :|δ T c |1 ≤c0 |δ T |1
|Xδ|2
√
> 0.
n|δ T |2
The following result is a reformulation of Bickel et al. [2009, Theorem
6.2].
Theorem 3 (Bickel et al. [2009]). Let X be such that the diagonal elements
of XT X/n are all equal to 1. Assume that µ = Xβ∗ and let s := |β ∗ |0 .
Assume that ξ ∼ N (0, σ 2 In×n ) and that condition RE(s, 3) is satisfied. Let
−x0 on which
x0 > 0. There is an event Ω(x0 ) of probability greater than 1−e
p
the Lasso estimator (1.2) with tuning parameter λx0 = σ 8(x0 + log p)/n
satisfies simultaneously
64φmax
s,
κ2 (s, 3)
128σ 2 s(x0 + log p)
− β ∗ )k2 ≤
,
κ2 (s, 3)n
l
|β̂ λx |0 ≤
0
l
kX(β̂ λx0
(3.2)
(3.3)
where φmax is the largest eigenvalue of the matrix XT X/n.
Thus, if the restricted eigenvalue condition
p is satisfied, the Lasso estimator with the universal parameter λx0 = σ 8(x0 + log p)/n enjoys simultaneously an ℓ0 norm of the same order as the true sparsity (cf. (3.2)), and a
prediction loss of order s log(p)/n (cf. (3.3)).
Theorem 4 below is a direct consequence of Theorem 2 and the bounds
(3.2)-(3.3).
Theorem 4. Let n, p be positive integers and let σ > 0. Let µ ∈ Rn and
X be any matrix of size n × p. Let F̂ be any data-driven subset of {1, ..., p}.
Assume that µ = Xβ∗ and let s := |β ∗ |0 . Assume that ξ ∼ N (0, σ 2 In×n )
and that condition RE(s, 3) is satisfied.
l
Let λ0 > ... > λK be the knots of the Lasso path. Let F̂ = {supp(β̂ λj ), j =
0, ..., K} be the family of all supports that appear on the Lasso path and let
Bellec/Aggregation of supports along the Lasso path
10
µ̂qF̂ ,σ2 be the estimator (2.6) with σ̂ 2 = σ 2 . Then for all x > 0, the estimator
µ̂qF̂ ,σ2 satisfies with probability greater than 1 − 3 exp(−x),
kµ̂qF̂ ,σ2 − Xβ ∗ k2 ≤
128σ 2 sx
22σ 2 x
(128 + 48φmax )σ 2 s log p 24σ 2
+
+
+
.
κ2 (s, 3)n
n
κ2 (s, 3)n
n
(3.4)
Furthermore,
Ekµ̂qF̂ ,σ2 − Xβ ∗ k2 ≤
(128 + 48φmax )σ 2 s log p
384σ 2 s
90σ 2
+
+
.
κ2 (s, 3)n
κ2 (s, 3)n
n
(3.5)
Using (2.8), a similar result can be readily obtained for the estimator
ΠT̂ 2 (y) with different constants.
F̂ ,σ̂
Proof of Theorem 4. By Theorem 2 with δ = 0, there is an event Ωagg (x) of
probability greater than 1 − 2e−x such that on Ωagg (x) we have
kµ̂qF̂ ,σ2 −Xβ∗ k2
≤
σ
l
kX(β̂ λx −β∗ )k2 +
2
n
24 +
l
96|β̂ λx |0 log
ep
l
|β̂ λ |0 ∨ 1
!!
+
22σ 2 x
.
n
Let Ω(x) be the event defined in Theorem 3. Using the simple inequality
l
log(p/(|β̂ λ |0 ∨ 1)) ≤ log p, and the bounds (3.2)-(3.3), we obtain that (3.4)
holds on the event Ωagg (x) ∩ Ω(x). By the union bound, the event Ωagg (x) ∩
Ω(x) has probability greater than 1 − 3e−x . Finally, (3.5) is obtained from
(3.4) by integration.
The procedure studied in Theorem 4 aggregates the supports along the
Lasso path using the procedure (2.6). A similar result holds for the estimator
ΠT̂ 2 (y) with a leading constant equal to 3. Theorem 4 has the following
F̂ ,σ̂
implications.
First, if x > 0 is fixed, the prediction performance (3.4) of the estimator
µ̂qF̂ ,σ2 is similar to that of the Lasso with the universal tuning parameter λx ,
up to a multiplicative factor that only involves numerical constants and the
quantity φmax . As soon as φmax (the operator norm of XT X/n) is bounded
from above by a constant, the estimator studied in Theorem 4 enjoys the
best known prediction guarantees.
Second, Theorem 4 implies that the estimator µ̂qF̂ ,σ2 satisfies the prediction bound (3.4) simultaneously for all confidence levels. That is, (3.4) holds
for all x > 0 with probability greater than 1 − 3e−x , in contrast with the
Lasso estimator with the universal parameter λx0 which depends on a fixed
confidence level 1 − e−x0 . The Lasso estimator with the universal parameter
Bellec/Aggregation of supports along the Lasso path
11
λx0 satisfies the prediction bound (3.3) only for the confidence level 1 − e−x0 ,
but to our knowledge it is not known whether the Lasso estimator with the
universal parameter λx0 satisfies a similar bound for different confidence levels than 1−e−x0 . In this regard, the estimator studied in Theorem 4 provides
a strict improvement compared to the Lasso with the universal parameter.
Third, the estimator µ̂qF̂ ,σ2 of Theorem 4 satisfies the bound (3.5), that is,
a prediction bound in expectation. Again, to our knowledge, it is not known
whether the Lasso estimator with the universal parameter satisfies a similar
bound in expectation.
Assuming that the bound (3.3) is tight and putting computational issues
aside, the prediction performance of the procedure µ̂qF̂ ,σ2 of Theorem 4 is
substantially better than the performance of the Lasso with the universal
parameter, as soon as φmax is bounded from above by a constant.
An upper bound similar to (3.2) is given in [Belloni et al., 2014, Theorem
3 and Remark 3]. Namely, Belloni et al. [2014] prove that the square-root
Lasso estimator with the universal tuning parameter β̂ satisfies |β̂|0 ≤ Cs
with high probability, where s is the sparsity of the true parameter and C is
a constant that depends on the sparse eigenvalues of the matrix XT X/n, cf.
[Belloni et al., 2014, Condition P]. This upper bound can be used instead
of (3.2) to prove results similar to (3.4) where φmax is replaced by a smaller
constant that depends on the sparse eigenvalues of XT X/n.
4. Computational complexity of the Lasso path and µ̂qF̂ ,σ̂2
Computing the estimator µ̂qF̂ ,σ̂2 of Theorem 2 is done in two steps:
1. Compute the full Lasso path and let F̂ = {supp(λ0 ), ..., supp(λK )} be
all the supports that appear on the Lasso path, where λ0 , ..., λK are
the knots of the Lasso path.
2. Compute µ̂qF̂ ,σ̂2 as a solution of the quadratic program (2.6), where F̂
is defined by Step 1.
(We assume that the complexity of computing σ̂ 2 is negligible compared to
the complexity of Step 1 and Step 2 above). The time complexity of Step 2
is the complexity of a convex quadratic program of size |F̂ | ≤ K, where K is
the number of knots on the Lasso path. Thus, the global cost of computing
the estimator µ̂qF̂ ,σ̂2 of Theorem 2 is polynomial in K.
There exist efficient algorithms to compute the entire Lasso path [Efron et al.,
2004]. However, Mairal and Yu [2012] proved that for some values of X and y,
the regularization path of the Lasso contains more than 3p /2 knots. Hence,
Bellec/Aggregation of supports along the Lasso path
12
for some design matrix X and some observation y, an exact computation
of the full Lasso path is not realizable in polynomial time. In order to fix
this computational issue, Mairal and Yu [2012] propose an algorithm that
computes an approximate regularization path for the Lasso. For some fixed
√
ǫ > 0, this algorithm is guaranteed to terminate with less than O(1/ ǫ)
knots and the points on the approximate path have a duality gap smaller
than ǫ. This approximation algorithm can be used instead of computing the
exact Lasso path. That is, one may compute the estimator µ̂qF̂ ,σ̂2 where F̂
is the collection of supports that appear on the approximate path computed
by the algorithm of Mairal and Yu [2012].
Another solution to avoid computational issues is as follows. Let M be
a positive integer. Instead of computing the Lasso path, one may consider
a grid of tuning parameters λ1 , ..., λM > 0 and aggregate the supports of
l
l
corresponding Lasso estimates β̂ λ1 , ...β̂ λM . The advantage of this approach
l
is twofold. First, for all j = 1, ..., M the Lasso estimate β̂ λj can be computed
by standard convex optimization solvers. Second, the time complexity of the
procedure is guaranteed to be polynomial in M and p. For any x > 0, by
Corollary 1, this procedure satisfies, with probability greater than 1 − 3e−x
kµ̂qF̂ ,σ̂2 −µk2
≤
min
j=1,...,M
kXβ̂ l
λj
22σ 2 x
σ̂ 2
ep
l
+
− µk2 +
.
24 + 96|β̂ λj |0 log l
n
n
|β̂ λ |0 ∨ 1
j
This oracle inequality is not a strong as (3.1). However, if at least one of
l
the Lasso estimates {β̂ λj , j = 1, ..., M } enjoys a small prediction loss and a
small ℓ0 norm, then the prediction loss of µ̂qF̂ ,σ̂2 is also small.
5. A fully data-driven procedure using the Square-Root Lasso
This section proposes a fully data-driven procedure, based on the SquareRoot Lasso. The choice of grid comes from the empirical and theoretical
observations that for a correlated design matrix, there exists a tuning parameter smaller than the universal parameter which enjoys better prediction
performance than the universal parameter [van de Geer and Lederer, 2013,
Hebiri and Lederer, 2013, Dalalyan et al., 2014].
p
1. Let λmax = 2 log(p/0.01)/n be the universal parameter of the SquareRoot Lasso [Belloni et al., 2014] with confidence level 0.01.
2. Let λmin be a conservatively small value of the tuning parameter.
3. Let M be an integer.
Bellec/Aggregation of supports along the Lasso path
13
4. Consider the geometric grid {λ1 , ..., λM } such that
λj = λmin
λmax
λmin
((j−1)/M −1)
,
j = 1, ..., M.
sq
sq
5. Compute the Square-Root Lasso estimators β̂ λ1 , ...β̂ λM with parameters λ1 , ..., λM (it is possible to perform this computation simultaneously for all λ1 , ..., λM , cf. Pham et al. [2014] and the references
therein).
sq
6. Let F̂ = {supp(β̂ λj ), j = 1, ..., M } be the supports of the computed
Square-Root Lasso estimators.
7. Let σ̂ 2 be the variance estimated by the Square-Root Lasso with the
universal parameter λmax .
8. For this choice of σ̂ 2 and F̂ , return the estimator µ̂qF̂ ,σ̂2 or the estimator
ΠT̂ 2 (y) .
F̂ ,σ̂
This estimator µ̂qF̂ ,σ̂2 returned by this procedure enjoys the theoretical guarantee
kµ̂qF̂ ,σ̂2 −µk2 ≤
sq
min kXβ̂ λj − µk2 +
j=1,...,M
σ̂ 2
n
24 + 96|β̂ sq |0 log
λj
ep
sq
|β̂ λj |0
∨1
+
with probability greater than 1 − 3e−x . A similar guarantee with leading
constant 3 can be obtained for the estimator ΠT̂ 2 (y) using (2.8).
F̂ ,σ̂
6. Concluding remarks
We have presented two procedures (2.3) and (2.6) that aggregates a datadriven collection of supports F̂ . These procedures satisfy the oracle inequalities given in Theorem 1 above, which is the main result of the paper. Sections 3 and 4 study the situation where F̂ is the collection of supports that
appear along the Lasso path. These procedures may be used for other datadriven collections F̂ as well.
These procedures allow one to perform a trade-off between prediction
performance and computational cost. If F̂ contains all the 2p supports, these
procedures achieve optimal prediction guarantees with no assumption on the
design matrix X, but can not be realized in polynomial time. On the other
hand, if the cardinality of F̂ is small (say, polynomial in n and p), then it
is possible to compute the estimators (2.3) and (2.6) in polynomial time. In
view of (1.3), one should look for a data-driven set F̂ with the following
properties.
22σ 2 x
n
Bellec/Aggregation of supports along the Lasso path
14
1. The set F̂ is small so that the estimators (2.6) and (2.3) can be computed rapidly,
2. The set F̂ contains a support T such that |T | and kπT µ − µk2 are
simultaneously small, so that the procedures (2.6) and (2.3) enjoy good
prediction performance.
A natural choice for F̂ is the collection of supports that appear along the
Lasso path. This choice of F̂ was studied in Sections 3 and 4. Another natural
choice is to aggregate the supports of several hard-thresholded Lasso estimators, since the hard-thresholded Lasso is sign-consistent under weak conditions on the design [Meinshausen and Yu, 2009, Definition 5 and Corollary
2]. Further research will investigate other means to construct a data-driven
collection F̂ such that the above two properties are satisfied.
Acknoledgements
We would like to thank Alexandre Tsybakov for helpful comments during
the writing of this manuscript.
Appendix A: Proof of Theorem 1
For any matrix A ∈ Rn×n , define the operator norm of A and the Frobenius
norm of A by
|||A|||2 := sup |Au|2 ,
|u|22 =1
kAkF =
q
Tr(AT A),
respectively.
Proof of (2.7). For all S, T ⊂ {1, ..., p}, define the event
2
ΩS,T = Z(S, T ) ≤ 4σ |S| + 22σ
2
1
log
+x
πS πS
,
where
1
(A.1)
Z(S, T ) = 2ξ T (ΠS y − ΠT µ) − |ΠS y − ΠT y|22 .
2
Define the event V := {σ̂ 2 ≥ σ 2 }. On the event A := V ∩ (∩S,T ⊂{1,...,p}ΩS,T ),
we have simultaneously for all supports S, T
Z(S, T ) − 26σ̂ 2 log
1
1
1
− 22σ 2 log
≤ 22σ 2 x + 4σ 2 |S| − 4σ 2 log
≤ 22σ 2 x
πS
πT
πS
Bellec/Aggregation of supports along the Lasso path
where we have used that log
A we have
|µ̂qF̂ ,σ̂2
−
µ|22
1
πS
≥ |S|, cf. (2.2). By Lemma 1, on the event
≤ min |ΠT µ −
T ∈F̂
15
µ|22
1
+ (26σ̂ + 22σ ) log
πT
2
2
+ 22σ 2 x.
To obtain (2.7), we use (2.2) and the fact that on the event V, 26σ̂ 2 + 22σ 2 ≤
48σ̂ 2 .
It remains to bound from below the probability of the event A. Denote
by B c the complement of any event B. We proceed with the union bound as
follows,
X
P(ΩcS,T ).
P(Ac ) ≤ P(V c ) +
S,T ⊂{1,...,p}
By definition, δ = P(V c ) and for any S, T ⊂ {1, ..., p}, Lemma 2 with t =
P
x + log πS1πT yields that P(ΩcS,T ) ≤ πS πT 2 exp(−x). As S,T ⊂{1,...,p} πS πT =
P
( S⊂{1,...,p} πS )2 = 1, we have established that
P(Ac ) ≤ δ + 2 exp(−x).
The proof of (2.8) is close to the argument used in Birgé and Massart
[2001], cf. [Giraud, 2015, Section 2.3] for a recent reference on model selection.
The novelty of the present paper is to consider a data-driven collection of
estimators.
Proof of (2.8). Let Λ̂ = 18σ̂ 2 and let T̂ = T̂F̂ ,σ̂2 for notational simplicity. By
definition of ΠT̂ 2 (y) = ΠT̂ y, for all T ∈ F̂ we have Critσ̂2 (T̂ ) ≤ Critσ̂2 (T )
F̂ ,σ̂
which can be rewritten as
|ΠT̂
F̂ ,σ̂ 2
(y) − µ|22 + Λ̂ log
1
1
≤ |ΠT y − µ|22 + Λ̂ log
+ 2ξ T (ΠT̂ y − ΠT y),
πT̂
πT
1
≤ |ΠT µ − µ|22 + Λ̂ log
+ 2ξ T ΠT̂ ξ + 2ξ T (ΠT̂ µ − ΠT µ) − |ΠT ξ|22 .
πT
(A.2)
Define the event V := {σ̂ 2 ≥ σ 2 }. For all S, T ⊂ {1, ..., p}, define
W (S) = 2ξ T ΠS ξ − 10σ 2 log
1
,
πS
W ′ (S, T ) = 2ξ T (ΠS µ − ΠT µ) − 8σ 2 log
1
1
− |ΠS µ − ΠT µ|22 .
πS πT
4
Bellec/Aggregation of supports along the Lasso path
16
With this notation, using the simple inequality −|ΠT ξ|22 ≤ 0, (A.2) implies
that on the event V,
|ΠT̂
F̂ ,σ̂ 2
(y) − µ|22 ≤ |ΠT µ − µ|22 + Λ̂ log
1
1
1
+ 8σ 2 log
+ W (T̂ ) + W ′ (T̂ , T ) + |ΠT̂ µ − ΠT µ|22 ,
πT
πT
4
Using that |ΠT̂ µ−ΠT µ|22 ≤ 2|ΠT̂ µ−µ|22 +2|µ−ΠT µ|22 and that |ΠT̂ µ−µ|22 ≤
|ΠT̂ y − µ|22 , we obtain
1
3
1
1
|ΠT̂ 2 (y) − µ|22 ≤ |ΠT µ − µ|22 + Λ̂ log
+ 8σ 2 log
+ W (T̂ ) + W ′ (T̂ , T ).
F̂ ,σ̂
2
2
πT
πT
For all S, T ⊂ {1, ..., p}, define the events
ΩS := {W (S) ≤ 6σ 2 x},
ΩS,T := {W ′ (S, T ) ≤ 8σ 2 x}.
On the event V ∩ (∩S⊂{1,...,p}ΩS )∩ (∩S,T ⊂{1,...,p}ΩS,T ), (2.8) holds. It remains
to bound from below the probability of this event.
For any fixed S ⊂ {1, ..., p}, using (2.2) and (B.4) with t = x + log π1S we
have P(ΩcS ) ≤ πS e−x .
Let S, T ⊂ {1, ..., p} be fixed. By using (B.3) with v = 2(ΠS µ − ΠT µ))
and t = x + log πS1πT , we have that on an event of probability greater than
1 − πS πT e−x ,
q
T
2ξ (ΠS µ−ΠT µ) ≤ 2σ 2(x + log(1/πS πT ))|ΠS µ−ΠT µ|2 ≤ 8σ
2
1
1
x + log
+ |ΠS µ−ΠT µ|22 .
πS πT
4
Thus, P(ΩcS,T ) ≤ πS πT e−x .
As in the proof of (2.7), the union bound completes the proof.
Appendix B: Technical Lemmas
Lemma 1. For any estimator σ̂ 2 , let θ̂ be a minimizer of (2.4). Then,
almost surely,
|µ̂θ̂ −
µ|22
≤
min
k=1,...,M̂
where
W := max
S,T ∈F̂
|ΠT̂k µ −
µ|22
1
+ (26σ̂ + 22σ ) log
πT̂k
2
2
!
1
1
Z(S, T ) − 26σ̂ log
− 22σ 2 log
πS
πT
and Z(·, ·) is defined in (A.1).
2
+ W, (B.1)
Bellec/Aggregation of supports along the Lasso path
17
Proof of Lemma 1. Let Λ̂ = 26σ̂ 2 . The function HF̂ ,σ̂2 is convex and differentiable, it can be rewritten as
M̂
X
1
1
1
∀θ ∈ Λ , HF̂ ,σ̂2 (θ) = |µ̂θ |22 +|y|22 +
θj −2yT µ̂j + |µ̂j |22 + Λ̂ log
2
2
πT̂j
j=1
M̂
!
.
By simple algebra, for any θ ′ ∈ RM̂ ,
T
′
∇HF̂ ,σ̂2 (θ̂) θ =
µ̂Tθ̂ µ̂θ′
+
T
M̂
X
′
θj
j=1
∇HF̂ ,σ̂2 (θ̂) (−θ̂) = −|µ̂θ̂ −
µ|22
+
1
1
−2y µ̂j + |µ̂j |22 + Λ̂ log
2
πT̂j
T
|µ|22
+
M̂
X
j=1
θ̂j
!
, (B.2)
1
1
2ξ µ̂j − |µ̂j |22 − Λ̂ log
2
πT̂j
T
By summing the last display and equality (B.2) applied to θ ′ = ek , we get
∇HF̂ ,σ̂2 (θ̂)T (ek − θ̂) = −|µ̂θ̂ − µ|22 + |µ̂k − µ|22 + Λ̂ log
M̂
X
1
πT̂k
"
#
1
1
.
θ̂j 2ξ T (µ̂j − µ̂k ) − |µ̂j − µ̂k |22 − Λ̂ log
+
2
πT̂j
j=1
Since µ̂k = ΠT̂k y is a Least Squares estimator over the linear span of the
covariates in T̂k , we have |µ̂k − y|22 ≤ |ΠT̂k µ − y|22 which can be rewritten as
|µ̂k − µ|22 ≤ |ΠT̂k µ − µ|22 + 2ξ T (µ̂k − ΠT̂k µ).
We thus have
∇HF̂ ,σ̂2 (θ̂)T (ek − θ̂) ≤ −|µ̂θ̂ − µ|22 + |ΠT̂k µ − µ|22 + (Λ̂ + 22σ 2 ) log
M̂
X
"
1
πT̂k
#
1
1
1
θ̂j 2ξ (µ̂j − ΠT̂k µ) − |µ̂j − µ̂k |22 − Λ̂ log
− 22σ 2 log
+
.
2
πT̂j
πT̂k
j=1
T
For all k = 1, ..., M̂ , [Boyd and Vandenberghe, 2009, Section 4.2.3] yields
∇HF̂ ,σ̂2 (θ̂)T (ek − θ̂) ≥ 0. Furthermore, a linear function over the simplex is
maximized at a vertex, so almost surely we obtain (B.1).
!
,
Bellec/Aggregation of supports along the Lasso path
18
Lemma 2. Let t > 0. For any supports S, T ⊂ {1, ..., p}, the quantity
Z(S, T ) defined in (A.1) satisfies with probability greater than 1 − 2 exp(−t),
Z(S, T ) ≤ 4σ 2 |S| + 22σ 2 t.
Proof of Lemma 2. Let D = ΠS − ΠT . Then almost surely,
1
1
Z(S, T ) = 2ξ T ΠS ξ + ξ T (2Dµ − D2 µ) − |Dµ|22 − |Dξ|22 .
2
2
It is clear that −|Dξ|22 ≤ 0. As ξ satisfies (1.1), a Chernoff bound yields that
for all v ∈ Rn ,
√
P ξ T v > σ|v|2 2t ≤ exp(−t).
(B.3)
It is clear that |||D|||2 ≤ 2. We apply this concentration inequality to v =
2Dµ − D2 µ to get that with probability greater than 1 − exp(−t),
√
√
ξ T (2Dµ − D 2 µ) ≤ σ|2Dµ − D2 µ|2 2t ≤ σ|||2In − D|||2 |Dµ|2 2t,
√
1
≤ σ4|Dµ|2 2t ≤ 16σ 2 t + |Dµ|22 .
2
Finally, let r ≤ |S| be the rank of ΠS . The matrix ΠS is an orthogonal projector. Hence kΠS k2F = r and |||ΠS |||2 ≤ 1, so that applying the concentration
inequality from Hsu et al. [2012] yields that with probability greater than
1 − exp(−t),
√
(B.4)
2ξ T ΠS ξ ≤ 2σ 2 (r + 2 rt + 2t) ≤ 4σ 2 r + 6σ 2 t ≤ 4σ 2 |S| + 6σ 2 t.
A union bound completes the proof.
References
Pierre C. Bellec.
Optimal bounds for aggregation of affine
estimators.
arXiv:1410.0346, Submitted, 2014a.
URL
http://arxiv.org/abs/1410.0346.
Pierre C. Bellec.
Optimal exponential bounds for aggregation
of density estimators.
Accepted in Bernoulli, 2014b.
URL
http://arxiv.org/abs/1405.3907.
Alexandre Belloni, Victor Chernozhukov, and Lie Wang.
Pivotal estimation via square-root Lasso in nonparametric regression.
Ann. Statist., 42(2):757–788, 2014.
ISSN 0090-5364.
.
URL
http://dx.doi.org/10.1214/14-AOS1204.
Bellec/Aggregation of supports along the Lasso path
19
Peter J. Bickel, Ya’acov Ritov, and Alexandre B. Tsybakov. Simultaneous
analysis of lasso and Dantzig selector. Ann. Statist., 37(4):1705–1732,
2009. ISSN 0090-5364. . URL http://dx.doi.org/10.1214/08-AOS620.
Lucien Birgé and Pascal Massart. Gaussian model selection. J. Eur.
Math. Soc. (JEMS), 3(3):203–268, 2001. ISSN 1435-9855. . URL
http://dx.doi.org/10.1007/s100970100031.
Stephen Boyd and Lieven Vandenberghe. Convex optimization. Cambridge
university press, 2009.
Dong Dai, Philippe Rigollet, and Tong Zhang. Deviation optimal learning
using greedy Q-aggregation. Ann. Statist., 40(3):1878–1905, 2012. ISSN
0090-5364. . URL http://dx.doi.org/10.1214/12-AOS1025.
Dong Dai, Philippe Rigollet, Lucy Xia, and Tong Zhang. Aggregation
of affine estimators. Electron. J. Statist., 8(1):302–327, 2014. . URL
http://dx.doi.org/10.1214/14-ejs886.
Arnak S. Dalalyan and Joseph Salmon. Sharp oracle inequalities for aggregation of affine estimators. Ann. Statist., 40(4):2327–2355, 2012. ISSN
0090-5364. . URL http://dx.doi.org/10.1214/12-AOS1038.
Arnak S Dalalyan, Mohamed Hebiri, and Johannes Lederer. On the prediction performance of the lasso. arXiv preprint arXiv:1402.1700, 2014.
Bradley Efron, Trevor Hastie, Iain Johnstone, and Robert Tibshirani. Least
angle regression. Ann. Statist., 32(2):407–499, 2004. ISSN 0090-5364. .
URL http://dx.doi.org/10.1214/009053604000000067. With discussion, and a rejoinder by the authors.
Sébastien Gerchinovitz. Prediction of individual sequences and prediction in
the statistical framework: some links around sparse regression and aggregation techniques. PhD thesis, Université Paris Sud-Paris XI, 2011. URL
https://tel.archives-ouvertes.fr/tel-00653550.
Christophe Giraud. Introduction to high-dimensional statistics, volume 139
of Monographs on Statistics and Applied Probability. CRC Press, Boca
Raton, FL, 2015. ISBN 978-1-4822-3794-8.
Mohamed Hebiri and Johannes Lederer. How correlations influence lasso
prediction. IEEE Trans. Inform. Theory, 59(3):1846–1854, March 2013. .
URL http://dx.doi.org/10.1109/tit.2012.2227680.
Daniel Hsu, Sham M. Kakade, and Tong Zhang. A tail inequality
for quadratic forms of subgaussian random vectors. Electron. Commun. Probab., 17:no. 52, 6, 2012.
ISSN 1083-589X.
.
URL
http://dx.doi.org/10.1214/ECP.v17-2079.
A. Juditsky, P. Rigollet, and A. B. Tsybakov. Learning by mirror averaging. Ann. Statist., 36(5):2183–2206, 2008. ISSN 0090-5364. . URL
http://dx.doi.org/10.1214/07-AOS546.
Bellec/Aggregation of supports along the Lasso path
20
Gilbert Leung and Andrew R. Barron.
Information theory
and mixing least-squares regressions.
IEEE Trans. Inform.
Theory, 52(8):3396–3410, 2006.
ISSN 0018-9448.
.
URL
http://dx.doi.org/10.1109/TIT.2006.878172.
Julien Mairal and Bin Yu. Complexity analysis of the lasso regularization
path. arXiv preprint arXiv:1205.0079, 2012.
Nicolai Meinshausen and Bin Yu. Lasso-type recovery of sparse representations for high-dimensional data. Ann. Statist., 37(1):246–270, 2009. ISSN
0090-5364. . URL http://dx.doi.org/10.1214/07-AOS582.
Vu Pham, Laurent El Ghaoui, and Arturo Fernandez. Robust sketching
for multiple square-root lasso problems. arXiv preprint arXiv:1411.0024,
2014.
Philippe Rigollet and Alexandre Tsybakov. Exponential screening and optimal rates of sparse estimation. Ann. Statist., 39(2):731–771, 2011. ISSN
0090-5364. . URL http://dx.doi.org/10.1214/10-AOS854.
Philippe Rigollet and Alexandre B. Tsybakov. Sparse estimation by exponential weighting. Statist. Sci., 27(4):558–575, 2012. ISSN 0883-4237. .
URL http://dx.doi.org/10.1214/12-STS393.
A.B. Tsybakov. Aggregation and minimax optimality in high-dimensional estimation. In Proceedings of the International Congress of Mathematicians,
Seoul, 2014. To appear.
Sara van de Geer and Johannes Lederer. The Lasso, correlated design,
and improved oracle inequalities. In From probability to statistics and
back: high-dimensional models and processes, volume 9 of Inst. Math. Stat.
(IMS) Collect., pages 303–316. Inst. Math. Statist., Beachwood, OH, 2013.
. URL http://dx.doi.org/10.1214/12-IMSCOLL922.
| 10math.ST
|
Submitted to the Annals of Statistics
arXiv: arXiv:1703.06222
A UNIFIED TREATMENT OF MULTIPLE TESTING
WITH PRIOR KNOWLEDGE USING THE P-FILTER
arXiv:1703.06222v3 [stat.ME] 12 Sep 2017
By Aaditya Ramdas∗ , Rina F. Barber† ,
Martin J. Wainwright∗ , and Michael I. Jordan∗
University of California, Berkeley∗ and University of Chicago†
A significant literature studies ways of employing prior knowledge to improve power and precision of multiple testing procedures.
Some common forms of prior knowledge may include (a) a priori beliefs about which hypotheses are null, modeled by non-uniform prior
weights; (b) differing importances of hypotheses, modeled by differing penalties for false discoveries; (c) multiple arbitrary partitions
of the hypotheses into known (possibly overlapping) groups, indicating (dis)similarity of hypotheses; and (d) knowledge of independence,
positive or arbitrary dependence between hypotheses or groups, allowing for more aggressive or conservative procedures. We present a
unified algorithmic framework called p-filter for global null testing
and false discovery rate (FDR) control that allows the scientist to
incorporate all four types of prior knowledge (a)–(d) simultaneously,
recovering a wide variety of common algorithms as special cases.
1. Introduction. Multiple hypothesis testing is both a classical and
highly active research area: it dates back (at least) to an initially unpublished 1953 manuscript by Tukey entitled “the problem of multiple comparisons” [40]. Given a large set of null hypotheses, multiple testing commonly
deals with deciding which subset to reject, while guaranteeing some notion
of control on the number of false rejections. It is of practical importance to
incorporate different forms of prior knowledge into existing multiple testing procedures; such prior knowledge can yield improvements in power and
precision, and can also provide more interpretable results. The focus of this
paper is on methods that control the False Discovery Rate (FDR) or test
the global null (GN) hypothesis while incorporating any number of the following considerations: (a) using prior weights, (b) using penalty weights,
(c) partitioning the hypotheses into groups, (d) incorporating knowledge of
the dependence structure within the data, including options such as estimating and adapting to the unknown number of nulls under independence,
or reshaping rejection thresholds to preserve error control guarantees in the
MSC 2010 subject classifications: Primary 62J15, 60G10; secondary 62F03
Keywords and phrases: multiple testing, false discovery rate, prior knowledge, Simes,
Benjamini-Hochberg-Yekutieli, adaptivity, group FDR
1
2
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
presence of arbitrary dependence. It is a challenge to incorporate all of these
forms of structure while maintaining internal consistency (coherence and
consonance) among the pattern of rejections and acceptances, and most existing work has managed to simultaneously employ only one or two of the
four considerations (a), (b), (c), (d). We present a general unified framework
for integrating all four, while performing a GN test or controlling FDR. This
framework allows scientists to mix and match techniques, and use multiple
different forms of prior knowledge simultaneously. Our framework simplifies the analysis of existing procedures, and generalize the conditions under
which they are known to work. We now outline our contributions.
Outline. Rather than presenting the most general version of our framework
at the outset, we introduce the framework gradually, beginning with simple
weighting schemes and then introducing more tools and notation as needed
to encompass more complex schemes. Since all types of prior information
considered in this paper have already been motivated in applied settings,
our focus is on the conceptual and mathematical aspects.
• Assumptions. In Section 2, we formalize the range of settings studied,
in terms of the assumptions on the underlying p-values that provide the
data for our multiple testing procedures—marginally, the p-values are
assumed to be super-uniform, and jointly, we consider the three settings
of (a) independence, (b) positive dependence, or (c) arbitrary dependence.
• Generalized BHY procedures. We discuss the use of reshaping functions, as introduced by Blanchard and Roquain [9], to guard against arbitrary dependence. We use these to describe a set of procedures that
generalize the classical Benjamini-Hochberg (BH) procedure [3] and the
Benjamini-Yekutieli (BY) procedure [7]; we thus refer to them as “generalized BHY procedures.” We develop a general super-uniformity lemma
that is at the core of FDR control proofs. As a first application, we show
that it yields a short proof of FDR control for generalized BHY procedures
under all three settings of dependence.
• Prior- and/or penalty-weighted BHY. In Section 4, we discuss
two natural ways to incorporate weights—prior-weighted p-values and
penalty-weighted FDR—and we describe a procedure that uses both prior
and penalty weights simultaneously. Using the super-uniformity lemma,
we show that this procedure controls (weighted) FDR under all three
settings of dependence. This immediately implies old and new results for
algorithms studied by Genovese et al. [16], Benjamini and Hochberg [4],
and Blanchard and Roquain [9].
• Adaptive, prior and/or penalty-weighted BH. In Section 5, we
present so-called “adaptive” procedures for independent p-values, which
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
3
improve power by incorporating an estimate of the proportion of nulls, as
first proposed by Storey et al. [37, 38]. We then propose a novel adaptive
procedure, that can employ both prior and penalty weights, as well as
null proportion estimates. Using a new inverse-binomial lemma, we succinctly prove that our adaptive, doubly-weighted BH procedure controls
(weighted) FDR under independence.
• Grouped, adaptive, doubly-weighted procedures. In Section 6, we
tackle the problem of controlling the group-level FDR for a single userdefined partition of the hypotheses, when the group-level p-values may
or may not be formed from the elementwise p-values. We particularly
discuss one way to achieve this based on the Simes p-value, first showing
that the prior-weighted Simes test studied by Hochberg and Liberman
[19] is valid even under positive dependence, and can be reshaped to work
under arbitrary dependence. Then, using a novel group super-uniformity
lemma, we demonstrate how to use our novel weighted Simes tests in
conjunction with doubly-weighted adaptive BH procedures to control the
(weighted) group FDR.
• A unifying multilayer, grouped, adaptive, doubly-weighted procedure. In Section 7, we generalize the previous section to allow the use
of multiple arbitrary user-defined partitions of hypotheses that are possibly non-hierarchically arranged relative to each other. In the process,
we develop an algorithmic framework called p-filter, extending earlier
work of Barber and Ramdas [1]. p-filter allows the use of any or all of
the following features and extensions: different prior and penalty weights
for every group in every partition; null-proportion adaptivity (for all partitions whose groups are known to be independent); incomplete partitions that contain a “leftover set”; overlapping groups within a partition;
and reshaping functions to guard against arbitrary dependence. This algorithmic framework guarantees internal consistency, meaning that the
rejected hypotheses and groups are always in mutual agreement. We combine the super-uniformity lemma with novel proof techniques to prove that
p-filter guarantees (weighted) group FDR control for all partitions simulataneously, under all three forms of dependence.
Sometimes, we reprove existing results in the literature, usually for the
purposes of illustrating a novel proof technique; in such cases, we label our
results as propositions. In other cases, when results are new and not found
elsewhere in the literature, we label them as theorems. Table 1 summarizes
our contributions relative to some related work. Given space limitations,
we only list a few related references, and defer more detailed discussions of
related work to the point in the paper when those settings are discussed.
4
Form of incorporated structure
prior work
this paper
Benjamini and Hochberg [3]
Benjamini and Yekutieli [7]
Proposition 1
prior weights (FDR)
Genovese et al. [16]
Proposition 2
penalty weights (FDR)
Benjamini and Hochberg [4]
Finos and Salmaso [13]
Proposition 2
prior and/or penalty weights (FDR)
Blanchard and Roquain [9]
null proportion adaptivity (FDR)
prior and/or penalty weighted null proportion adaptivity (FDR)
Storey et al. [38]
—
Proposition 2
Proposition 3
Theorem 5.1
none (Global Null)
Simes [33]
Benjamini and Yekutieli [7]
Proposition 4
prior weights (Global Null)
Hochberg and Liberman [19]
Proposition 4
single partition into groups (FDR)
Barber and Ramdas [1]
Proposition 5
multiple arbitrary partitions (FDR)
multiple possibly incomplete arbitrary partitions
. of possibly overlapping groups + prior and/or penalty
. weights + group null proportion adaptivity (FDR)
Barber and Ramdas [1]
—
Theorem 7.1
Theorem 7.1
Table 1
This table summarizes our contributions relative to other known results regarding step-up procedures for multiple testing The traffic
lights
,
and
represent results that were proved under independence (easy), positive dependence (intermediate), and arbitrary
dependence (hardest). In the top box,
indicates that under uniformity, the FDR bound was proved with inequality instead of strict
equality. In the bottom box,
indicates that null-proportion adaptivity was not provided, and also the group-level p-values were
constrained to be Simes p-values.
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
none (False Discovery Rate)
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
5
2. Background. We begin by presenting background on multiple testing and FDR control, overviewing common assumptions in the literature,
and providing a discussion of the Benjamini-Hochberg procedure. Before
doing so, it is helpful to introduce some basic definitions and notation. For
a pair of vectors x, y ∈ [0, 1]n , we use the notation x y to mean that x ≤ y
in the orthant ordering, i.e., xi ≤ yi for all i ∈ {1, . . . , n}.
Definition 1 (Nondecreasing sets and functions). A set D ⊆ [0, 1]n is
said to be nondecreasing if x ∈ D implies y ∈ D for all y x. We say that a
function f : [0, 1]n 7→ [0, ∞) is nonincreasing, if x y implies f (x) ≥ f (y).
Finally, in order to handle the ratio “ 00 ” that often arises in FDR control
results, we adopt the “dotfraction” notation
a
if a 6= 0, b 6= 0,
b,
0,
if a = b = 0,
a
(2.1)
··· : =
b
0,
if a = 0, b 6= 0,
undefined
if a 6= 0, b = 0.
Dotfractions behave like fractions whenever the denominator is nonzero. We
formally derive properties of dotfractions in detail in Appendix G.
2.1. False Discovery Rate (FDR). In the standard multiple testing setup,
we are given a set of n different p-values, denoted by the random vector
P ∈ [0, 1]n . Each p-value corresponds to a different null hypothesis, and we
let H0 ⊆ [n] denote the subset of true null hypotheses. Our goal is to reject
some subset of the null hypotheses—or in other words, to select some subset
of {1, . . . , n} as our discoveries—while at the same retaining control over
the number of false discoveries. Consider any algorithm that, based on the
observed vector P of p-values, chooses a subset of hypotheses to reject; this
b ). In their seminal work, Benjamini
random subset is denoted by Sb = S(P
and Hochberg [3] proposed to measure performance of such algorithms by a
quantity called the False Discovery Rate (FDR), and gave a simple procedure to provably control it.1
The FDR is defined in terms of the False Discovery Proportion, given by
b
|H0 ∩S|
b is number of false discoveries—that null
FDP : = ············,
where |H0 ∩ S|
b
|S|
b is the
hypotheses that are true, and are incorrectly rejected—whereas |S|
1
As a historical footnote, the same procedure was proposed by Eklund [11], albeit as a
heuristic without any formal guarantees [12, 32].
6
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
total number of discoveries, meaning null hypotheses that are rejected. The
FDR is the expectation of this random ratio:
n
o
P
"
#
b
b
|H0 ∩ S|
i∈H0 1 i ∈ S
o .
FDR : = E ················· = E ··································
(2.2)
P n
b
|S|
b
1
i
∈
S
i
Our goal is to construct procedures that control FDR at some target level
α ∈ (0, 1), that is to guarantee that FDR ≤ α.
2.2. P-value dependence assumptions. We assume that the marginal distribution of each null p-value is super-uniform, meaning that it is stochastically dominated by the uniform distribution. More precisely, for any index
i ∈ H0 , we assume that
(2.3)
Pr{Pi ≤ t} ≤ t
for all t ∈ [0, 1].
Of course, uniformly distributed p-values trivially satisfy this condition. We
use the phrase under uniformity to describe the situation in which the null
p-values are marginally exactly uniform. If this phrase is not employed, it is
understood that the null p-values are marginally super-uniform.
Regarding assumptions on the joint distribution of p-values, three possible
kinds of dependence will be considered in this paper: independence, positive
dependence or arbitrary dependence. In the independent setting, all p-values
are assumed to be mutually independent. The second possibility is that of
“positive dependence” as formalized by Positive Regression Dependence on
a Subset condition, or PRDS for short:
Definition 2 (PRDS). We say that the vector P satisfies PRDS if
for any null index i ∈ H0 and nondecreasing set D ⊆ [0, 1]n , the function
t 7→ Pr{P ∈ D | Pi ≤ t} is nondecreasing over t ∈ (0, 1].
The original positive regression dependence assumption as introduced
by Lehmann [24] as well as the PRDS assumption first made by Benjamini
and Yekutieli [7] both had Pi = t instead of Pi ≤ t in the definition, but one
can prove that both conditions are essentially equivalent.
The PRDS condition holds trivially if the p-values are independent, but
also allows for some amount of “positive” dependence. Let us consider a
simple example to provide some intuition. Let Z = (Z1 , . . . , Zn ) be a multivariate Gaussian vector with covariance matrix Σ; the null components
correspond to Gaussian variables with zero mean. Letting Φ be the CDF
of a standard Gaussian, the vector P = (Φ(Z1 ), . . . , Φ(Zn )) is PRDS on
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
7
Pi for every index i if and only if all entries of the covariance matrix Σ
are non-negative. See Benjamini and Yekutieli [7] for additional examples of
this type. It should be noted the PRDS assumption is closely related to the
assumption of multivariate total positivity of order 2 (MTP2), as studied
by Karlin and Rinott [22]. Since MTP2 implies PRDS, all the results in this
paper that hold under PRDS also immediately also hold under MTP2.
3. Generalized Benjamini-Hochberg-Yekutieli procedures. We
begin by discussing the classical Benjamini-Hochberg procedure. Given a
vector P ∈ [0, 1]n , we let P(1) ≤ P(2) ≤ · · · ≤ P(n) denote the associated vector of order statistics. Given these order statistics, the Benjamini-Hochberg
procedure (BH) [3] with target FDR level α rejects the smallest b
k p-values,
where
α·k
b
b
k = kα (P ) : = max k : P(k) ≤
(3.1)
,
n
with that convention that b
k = 0 if the set
is, after choosing
n is empty. That
o
α·b
k
b
b
this value k, the set of rejections is S = i : Pi ≤ n , which by definition
of b
k, must contain exactly b
k many hypotheses. Benjamini and Hochberg [3]
prove that this procedure controls the FDR at the desired level, that is,
b under the assumption that the p-values
FDR ≤ α for this rejection set S,
are mutually independent. This result was shown to hold also in the positive
dependence setting by Benjamini and Yekutieli [7].
When no assumptions are made about the joint distribution of p-values,
however, it is conceivable that FDR-controlling procedures must be guarded
while proclaiming a discovery. Benjamini and Yekutieli [7] originally proposed running the BH procedure at the modified threshold Pnα 1 in order
i=1 i
to maintain FDR control under arbitrary dependence. We now introduce a
family of generalizations of this modification, which we will refer to as “generalized BY procedures” or simply “BY procedures” throughout the paper.
In order to do so, we first need the notion of a reshaping function β, as
introduced by Blanchard and Roquain [9].
Definition 3 (Reshaping). For any fixed probability measure ν on
[0, ∞), we define the reshaping function β = βν as
Z
βν (k) =
k
x dν(x).
0
8
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
Fixing a reshaping function β, then, the generalized Benjamini-Yekutieli
(BY) procedure with target FDR level α makes
α · β(k)
b
b
(3.2)
k = kα (P ) : = max k : P(k) ≤
n
b
rejections, again with that convention
n that k = b0 oif the set is empty. The
k)
rejection set is now given by Sb = i : Pi ≤ α·β(
, which again contains
n
exactly b
k many hypotheses. Noting that β(k) = βν (k) ≤ k for any probability measure ν, thus requiring that the k lowest p-values fall below a lower
(more strict) threshold, we can immediately see that for any choice of β,
this generalized BY procedure is more conservative than the BH procedure
(if run at the same target FDR level α).
As an example, we can see that Benjamini and Yekutieli [7]’s original
proposal, i.e. running the BH procedure at the modified threshold Pnα 1 ,
i=1 i
is equivalent to running the BY procedure with the reshaping function
(3.3)
k
βBY (k) = Pn
1.
i=1 i
We now summarize some known properties of the BH and BY procedures.
Proposition 1. The BH procedure (3.1) and generalized BY procedures (3.2) have the following properties:
0
(a) Under independence and uniformity, the BH method has FDR = α |Hn | .
0
(b) Under positive dependence, the BH method has FDR ≤ α |Hn | .
(c) Under arbitrary dependence, the generalized BY procedure with any
0
reshaping function β yields FDR ≤ α |Hn | .
Statement (a) was proven with inequality by Benjamini and Hochberg
[3]. Benjamini and Yekutieli [7] proved statement (a) with equality, as well
as proving statement (b), and statement (c) for the specific reshaping function (3.3). For an arbitrary reshaping function β, statement (c) was proven
by Blanchard and Roquain [9].
3.1. The role of reshaping. Naturally, there is no universally optimal
choice of ν, and different choices of base probability measure ν (and hence
β) lead to different behaviors of the associated procedures. A typical choice
of the measure ν is a discrete distribution with support on {1, . . . , n}; such a
choice is sensible since the number of rejections is always an integer. Indeed,
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
9
as noted by Blanchard and Roquain [9], any continuous measure ν can be
replaced by the discrete measure
(
ν((r − 1, r])
if r < n
0
ν (r) =
ν((n − 1, ∞)) if r = n
to yield a reshaping function βν 0 that is strictly larger than βν on the relevant
integer range, leading to a more powerful procedure.
In contrast with the discrete distributions considered in past work, this
paper also considers the case of continuous measures ν. Continuous measures are of interest in the context of the penalty-weighted procedures to
be considered in the sequel, where the function β corresponds to the total
weight assigned to subsets of the hypotheses. As opposed to the count, this
total weight can be fractional, so that one can no longer reduce to the case
of discrete measures ν, as we did above.
Many different examples of reshaping functions, and their connections to
other formulations of multiple testing methods, can be found in the literature, see e.g. Blanchard and Roquain [9], Sarkar [30, 31].
3.2. Alternative derivation of BH and BY procedures. There is an alternate way to motivate the BH and BY procedures, which will be useful for
designing algorithms later in this paper. Let FDP(t) denote the FDP of a
procedure that rejects all p-values less than or equal to t, and note that
P
b
|H0 ∩ S|
i∈H0 1 {Pi ≤ t}
P
(3.4) FDP(t) = ················· = ··································
b
|S|
i 1 {Pi ≤ t}
|H0 | · t
n·t
[
P
P
≈ ···························
≤ ···························
=: FDP(t),
i 1 {Pi ≤ t}
i 1 {Pi ≤ t}
P
where the approximation
{Pi ≤ t} ≈ |H0 | · t follows from the obi∈H0 1
P
0
servation that E
i∈H0 1 {Pi ≤ t} ≤ |H | · t—that is, we expect roughly
0
|H | · t many of the null p-values to be ≤ t. In order to guard against unex[
pected dependence structures, we would reshape thePdenominator of FDP(t)
so as to undercount rejections, replacing it by β ( i 1 {Pi ≤ t}). We then
choose the largest threshold t such that this estimated FDP is at most α.
Concretely, we define b
t=b
tα (P ) as
(3.5)
[
b
t : = max {t : FDP(t)
≤ α},
t∈[0,1]
10
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
and we reject all hypotheses corresponding to p-values smaller than b
t. It is
α·β(b
k)
α·b
k
b
b
not hard to verify that t ≥ n (for BH) or t ≥ n (for BY), and that the
threshold rule (3.5) corresponds to rejecting the same set of hypotheses as
the original rule (3.1) or (3.2) (for the BH or BY procedures, respectively).
3.3. A super-uniformity lemma for FDR control. For a set x of n elements, we let x−i := {x1 , . . . , xi−1 , xi+1 , . . . , xn } denote the set of n − 1
elements that leaves out the i-th element. For a vector x ∈ Rn , we use
x
e−i := (x1 , . . . , xi−1 , 0, xi+1 , . . . , xn ) ∈ Rn to denote a vector with the
i-th coordinate set to zero. Of course, x
e−i and x−i contain the same information and can be reconstructed from each other.
Definition 4 (LOOP). A function f : [0, 1]n → [0, ∞) is said to satisfy
the leave-one-out property (LOOP) if for any null index i ∈ H0 and any
x ∈ [0, 1]n , we have
if xi ≤ f (x), then f (e
x−i ) = f (x),
−i
(3.6)
f (e
x ) > 0 and
−i
if xi > f (x), then xi > f (e
x ).
We will refer to LOOP in situations where x is the vector of p-values
P , and f (P ) represents a threshold. When f satisfies LOOP, even though
threshold f (Pe−i ) may differ significantly from f (P ), the p-value Pi will
either lie below both thresholds, or above both thresholds—in other words,
from the perspective of Pi , the threshold might as well have been f (Pe−i )
instead of f (P ).
To develop some intuition for the lemma that follows, we note that our
super-uniformity assumption (2.3) on null p-values can be reformulated as:
1 {Pi ≤ t}
0
(3.7)
For any i ∈ H , E ···················· ≤ 1 for any fixed t ∈ [0, 1].
t
Of course, if Pi is uniform then the above inequality holds with equality.
The following lemma guarantees that property (3.7) continues to hold for
certain random thresholds f (P ). Recall that the term “nonincreasing” is
interpreted coordinatewise, with respect to the orthant ordering (Def. 1).
Lemma 1 (Super-uniformity lemma).
Let i ∈ H0 be a null hypothesis.
(a) For any nonincreasing function f : [0, 1]n → [0, ∞), if Pi is independent of P −i , then we have
1 {Pi ≤ f (P )}
−i
≤ 1.
E ···························· P
f (P )
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
11
Furthermore, if we additionally assume that f has range [0, 1] and
satisfies LOOP (3.6), and that Pi is uniformly distributed, then the
inequality is replaced with equality:
1 {Pi ≤ f (P )}
−i
E ···························· P
= 1.
f (P )
(b) For any nonincreasing function f : [0, 1]n → [0, ∞), if P is PRDS with
respect to Pi , then
1 {Pi ≤ f (P )}
E ···························· ≤ 1.
f (P )
(c) For any constant c ≥ 0, any function f : [0, 1]n → [0, ∞), and any
reshaping function β, under arbitrary dependence of the p-values,
1 {Pi ≤ c · β(f (P ))}
E ········································ ≤ 1.
c · f (P )
(d) For any constant c ≥ 0, any functions f1 , . . . , fm : [0, 1]n → [0, ∞),
and any reshaping functions β1 , . . . , βm , under arbitrary dependence
of the p-values,
Qm
1 {Pi ≤ c · `=1 β` (f` (P ))}
Qm
E ·····················································
≤ 1.
c·
`=1
f` (P )
The proofs of statement (a) with equality, and of statement (d), are given
in Appendix A. Statement (a) with inequality is recovered as a special case
of statement (b), which was proved by Blanchard and Roquain [9], who also
proved (c). The more general statement (d), with more than one reshaping
function present in the bound, will be required in the proof of a novel group
super-uniformity Lemma 3.
This super-uniformity lemma is central to succinct proofs of the results of
this paper. It can also be extended to allow for multiple reshaping functions
to be used simultaneously—see Corollary ?? below. To give a first hint of
the power of this lemma, we begin by providing a short proof that the BH
procedure controls FDR.
Proof of Proposition 1. We prove statement (b) first. By the definition of FDR, we have
o
o
n
n
P
α·b
k
α·b
k
0
1
P
≤
X α
(i)
i
n
i∈H0 1 Pi ≤ n
≤ α |H | ,
· E ··························
FDR = E ········································· =
α·b
k
n
n
b
k
i∈H0
n
12
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
)
where step (i) follows by applying Lemma 1(b) with f (P ) = α·k(P
n . Turning
to statement (c), we repeat the same argument, but now incorporating the
reshaping function β:
o
n
o
P
n
α·β(b
k)
α·β(b
k)
0
1
P
≤
1
P
≤
X
(ii)
i
0
i
α
n
i∈H
n
≤ α |H | ,
FDR = E ············································· =
·E ·······························
α·b
k
n
n
b
k
0
b
i∈H
n
where step (ii) follows from Lemma 1(c) with c = α/n, f1 (P ) = b
k(P ) and
β1 = β.
In order to prove statement (a) with equality by applying Lemma 1(a),
it is straightforward to see that f (P ) satisfies the LOOP condition (3.6)
(for completeness, this statement is proved in a more general setting in
Proposition 2).
We note that leave-one-out style arguments, where FDR control over the
entire set of rejected hypotheses Sb is proved by considering each Pi individually, are not new (see, for example, Sarkar [30]); however, most past works
have either considered specific functions f , or have proved an inequality in
their version of statement (a). Our proof is a generalization of arguments
made in the special case of the BH procedure by Heesen and Janssen [18].
4. Using both prior and penalty weights. We now consider a setting where there are weights associated with each hypothesis. Prior work has
focused on two natural interpretations for such weights—as priors on the nullity of hypotheses, or as penalties for wrongly rejecting nulls. Accordingly,
we introduce a sequence of positive penalty weights {ui }ni=1 and
P positive
priorP
weights {wi }ni=1 , along with the normalization conditions ni=1 ui = n
and ni=1 wi = n. These two weight sequences can be interpreted as follows:
(U). The penalty weights ui encode unequal importances of hypotheses:
hypotheses with ui > 1 indicate that they are of more interest to
the scientist than hypotheses with ui < 1, and hence we count these
differently when measuring number of (false or total) discoveries.
(W). The prior weights wi encode prior evidence against the null: a large
wi > 1 implies that a prior belief that the i-th hypothesis is more likely
non-null, and a small wi < 1 indicates the opposite.
Such weights might be learned from data collected in an older study on
different subjects. We treat the weights as constants, but it is straightforward
to extend our results to a Bayesian setting in which both H0 and the weights
are random, but the null p-values are distributed (super)uniformly even after
conditioning on these weights.
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
13
In order to model the setting (U), we define a modified criterion, following
Benjamini and Hochberg [4], called the weighted FDR :
n
o
P
b
i∈H0 ui 1 i ∈ S
n
o .
FDRu : = E ······································
(4.1)
P
b
u
1
i
∈
S
i i
In order to model setting (W), on the other hand, one does not need to alter
the definition of the FDR, since these weights simply allow us to re-prioritize
which hypotheses to reject, but does not alter our measure of error. We now
present a doubly-weighted version of the BH and BY procedures, that can
incorporate both sets of weights simultaneously.
4.1. Doubly-weighted BH and BY procedures. Following Blanchard and
Roquain [9], we define the prior+penalty weighted BH procedure (BHuw ) as
follows. We set Qi : = Pi /wi , and then reject all hypotheses having Qi ≤ b
t,
where the threshold b
t=b
tα,u,w (P ) is given by
n
o
t·n
[
[
P
(4.2a) b
t := max t : FDP(t)
≤ α , where FDP(t)
:= ······························.
t∈[0,1]
i ui 1(Qi ≤ t)
It is useful to rewrite this procedure as follows. Let u(i) represent the
weights corresponding to the order statistics Q(i) of the weighted p-values
P
Q1 , . . . , Qn , and define the sum of the first k weights to be U(k) : = ki=1 u(i) .
Then define
α · U(k)
b
b
k = kα,u,w (P ) : = max k : Q(k) ≤
(4.2b)
n
b
and reject those
n hypotheses
ocorresponding to the k smallest weighted pα·U(k)
b
values, Sb = i : Qi ≤
. Then, the BHuw procedure can be equivan
lently described by rejecting the first b
k p-values, corresponding to a total
penalty weight of U(bk) . If we wish to use a reshaping function β to guard
against arbitrary dependence among the p-values, then we can instead use a
doubly weighted BY procedure, denoted as BYuw , where we instead define
n
o
t·n
[
[
P
(4.3a) b
t := max t : FDP(t)
≤ α where FDP(t)
:= ······································,
β
t∈[0,1]
i ui 1(Qi ≤ t)
which corresponds to
(4.3b)
α · β(U(k) )
b
.
k=b
kα,u,w (P ) : = max k : Q(k) ≤
n
14
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
(Implicitly, the choice of reshaping function β is considered to be fixed, and
is suppressed in our notation for the procedure.)
With this setup, we have the following guarantees on the weighted FDR (4.1):
Proposition 2. The doubly-weighted BH and BY procedures, given in (4.2b)
and (4.3b), have the following properties:
(a) Under independence and uniformity,
if maxi wi ≤ 1/α, the BHuw proα P
cedure yields FDRu = n
ui wi .
i∈H0
P
(b) Under positive dependence, the BHuw procedure yields FDRu ≤ αn
ui wi .
i∈H0
(c) Under arbitrary dependence, the
BYuw procedure with any reshaping
α P
function β yields FDRu ≤ n
ui wi .
i∈H0
Before we present the proof, let us discuss some special cases.
• When both sets of weights are used, Blanchard and Roquain [9] proved
Proposition 2(b,c) and also Proposition 2(a) with inequality. Our proof
of Proposition 2(b,c) mimics theirs, and is presented in our notation for
completeness.
• When only penalty weights are used, and p-values are independent, one
may set wi = 1 for all i in the BHuw procedure (4.2b) to recover the
penalty-weighted BH procedure proposed by Benjamini and Hochberg [4]
who proved Proposition 2(a), albeit with an inequality.
• When only prior weights are used, Genovese et al. [16] proposed a priorweighted BH procedure that controls the unweighted FDR under independence. Their result can be recovered by setting ui = 1 for all i in the
BHuw procedure (4.2b), and invoking Proposition 2(a).
• When all the weights equal one, the BHuw and BYuw reduce to the
unweighted BH and BY procedures, and Proposition 2 then reduces to
Proposition 1.
Proof of Proposition 2. We first prove statements (b) and (c). For
conciseness, to unite the proofs of the two statements, define a function γ
to be the identity if we are in the setting of (b), or γ = β (the reshaping
function) if we are in the setting of (c). Note that we can write the weighted
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
FDR from equation (4.1) as
15
α·γ(U(k)
b )
u
1
Q
≤
i
n
i∈H0 i
FDRu = E ························································
U(bk)
α·γ(U(k)
b )
X
n
1 Qi ≤
=
ui · E ····································· .
U(bk)
i∈H0
P
Recalling that Qi = Pi /wi by definition, we multiply and divide by αwi /n
so as to obtain
P
α·γ(U(k)
b )
ui wi
1
P
≤
w
i
i
X αui wi
n
(i)
i∈H0
(4.4) FDRu =
· E ········································· ≤ α
.
α·U b
n
n
wi n(k)
i∈H0
Here inequality (i) follows by the observation that the function P 7→ U(bk(P ))
is nonincreasing in P , and then for each null hypothesis i ∈ H0 , we can
apply Lemma 1(b) with f (P ) = wi αU(bk(P )) /n, or Lemma 1(c) with f1 (P ) =
U(bk(P )) , β1 = β, and c = wi α/n.
Next we turn to the proof of statement (a), for which we begin by noting
that if maxi wi ≤ 1/α, then the range of f is [0, 1]. Next, we show that
α·U
f (P ) := wi n(k) satisfies the LOOP condition (3.6) with respect to index i;
if this holds, then under independence and uniformity, inequality (i) holds
with equality by Lemma 1(a). To prove LOOP, first, it is easy to observe that
f (Pe−i ) > 0 since b
k(Pe−i ) > 0 and ui , wi are strictly positive. Next, it is also
straightforward that if hypothesis i was already rejected by the procedure,
then setting Pi to zero does not change b
k. In order to apply Lemma 1, the
b
last condition we need to verify is that assuming Qi > α ·
U(k(
b P
e −i ))
n
U(k(P
b ))
n
holds (that
is, if Qi is not rejected), then Qi > α ·
also holds. Indeed, if Qi has
rank a within the order statistics of Q, then we are guaranteed that
U(a)
U(b)
and Q(b) > α
for all b > a,
n
n
since Qi is not rejected. Then, on setting Pi to 0, the number of rejections b
k(Pe−i ) must be bounded by a, since the other p-values are unchanged
U
and Q(b) > α n(b) for all b > a continues to hold by condition (4.5). Then
U(bk(Pe−i )) ≤ U(n) , and so we may then infer from condition (4.5) that Qi >
(4.5)
α
U(k(
b P
e −i ))
n
Qi = Q(a) > α
will also hold since the right-hand side is at most α
U(a)
n .
16
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
5. Null proportion adaptivity with prior and/or penalty weights.
Recall that the original unweighted BH procedure provided FDR control at
level α|H0 |/n, which can be significantly smaller than the target α when
|H0 | n, leading to a possible loss in power compared to a procedure that
fully utilized its FDR budget of α. When the p-values are known to be independent, Storey and collaborators [37, 38] proposed a simple method to
estimate the number of nulls. Incorporating such an estimate into the BH
procedure leads to a procedure that has possibly higher power than BH.
We refer to this method as Storey’s adaptive BH procedure (St-BH). For
the rest of this section, we assume that the p-values are independent, and
we demonstrate how to combine the benefits of adaptivity with prior and
penalty weighting by analyzing a novel doubly-weighted St-BH procedure.
5.1. Storey’s adaptive BH method. Fix a user-defined constant λ ∈ [α, 1),
and define:
P
1 + j 1 {Pj > λ}
π
b0 = π
b0 (P ) : =
(5.1)
.
n(1 − λ)
The quantity π
b0 is a conservative estimate of the proportion of nulls, since
0
for any λ, we have E [b
π0 ] ≥ |Hn | . In analogy with the BH procedure (3.4),
the St-BH procedure chooses
π
b nt
[
[
P 0
(5.2) b
tα (P ) : = max {t : FDP(t)
≤ α}, where FDP(t)
: = ···························,
t∈[0,1]
i 1 {Pi ≤ t}
and then rejects all p-values smaller than b
tα (P ). This procedure comes with
the following guarantee.
Proposition 3. Under independence, the St-BH procedure (5.2) guarantees that FDR ≤ α.
Storey and coauthors [37, 38] establish the above result using martingale
arguments, and Blanchard and Roquain [10] gave an alternate proof using
Lemma 1. We do not prove this proposition here, since it follows as a special
case of Theorem 5.1 below. To proceed with a discussion of this result, we
need the following notation. Define the leave-one-out estimate of the nullproportion as
P
1 + j6=i 1 {Pj > λ}
−i
−i
π
b0 = π
b0 (Pe ) : =
,
n(1 − λ)
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
17
which is obtained if the i-th p-value is set to zero, and then π
b is then estimated as in (5.1).
For future reference, we note that using simple properties of the binomials,
it is easy to show that the estimate π
b0−i satisfies the bound
1
1
n
(5.3)
E −i = E −i ≤
.
0|
|H
π
b0
π
b0
It turns out that the bound (5.3) is the only property of the estimator π
b0
that we require to prove FDR control. (In fact, the bound (5.3) is satisfied
by several other estimators of π0 as well—for examples, see Sarkar [30].
Blanchard and Roquain [10] propose and empirically compare several such
estimates of π0 , to find that Storey’s method had the best power amongst
all considered alternatives.)
5.2. A doubly-weighted adaptive BH procedure. In this section, we demonstrate how to simultaneously incorporate both prior weights w and penalty
weights u into Storey’s adaptive estimator. We introduce the shorthand
|u · w|∞ : = maxj uj wj , and define the St-BHuw procedure as follows:
1. Define the estimated null proportion as
P
|u · w|∞ + j uj wj 1 {Pj > λ}
π
b0 : =
n(1 − λ)
2. Estimate the false discovery proportion by
π
b0 · n · t
[
P
FDP(t)
: = ························································
u
1
{P
i ≤ min{wi · t, λ}}
i i
3. Choose the threshold for rejection as
(5.4)
[
b
t=b
tα,u,w (P ) : = max{t ∈ [0, λ] : FDP(t)
≤ α};
4. Reject all hypotheses such that Pi ≤ min{wi b
t, λ}.
In words, we apply the prior+penalty weighted BHuw procedure, while
also incorporating a weighted null proportion estimator.
The St-BHuw procedure has the following guarantee:
Theorem 5.1. Under independence, the St-BHuw procedure (5.4) controls FDRu at level α.
18
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
Notice that if we set the weights to unity, we recover exactly the St-BH
procedure, and Theorem 5.1 reduces to Proposition 3. Also, if we set π
b0 =
λ = 1, we recover exactly the BHuw procedure. To prepare for the proof of
this theorem, we define the analogous leave-one-out estimate of the weighted
null proportion as
P
|u · w|∞ + j6=i uj wj 1 {Pj > λ}
−i
π
b0 : =
.
n(1 − λ)
As before, π
b0−i is a function of only P −i , and this observation is crucial in
the proof of Theorem 5.1. The other important property required by the
proof is the following inequality:
n
1
(5.5)
.
E −i ≤ P
π
b0
j∈H0 uj wj
To establish this, we need a more sophisticated result about weighted binomials, which we now present. (The bound (5.3) can be recovered as a special
case of this lemma, by setting all weights to one.)
Lemma 2 (Inverse binomial lemma).
Given a vector a ∈ [0, 1]m , constant
i.i.d.
b ∈ [0, 1], P
and Bernoulli variables Zi ∼ Bernoulli(b), the weighted sum
Z := 1 + m
i=1 ai Zi satisfies
1
1
1
Pm
P
(5.6)
≤E
≤
1 + b i=1 ai
Z
b(1 + m
i=1 ai )
P
Since E [Z] = 1 + b m
i=1 ai , the lower bound on E [1/Z] follows by Jensen’s
inequality. We include this bound to provide context for the upper bound
on E [1/Z]. The detailed proof can be found in Appendix B.
In order to see that required property (5.5) follows from Lemma 2, define
X
uj wj
Z := 1 +
aj 1 {Pj > λ} with aj =
, b = (1 − λ), m = |H0 | − 1.
|u
·
w|
∞
0
j∈H ,j6=i
Since Z ≤
n(1−λ) −i
b0 ,
|u·w|∞ π
applying Lemma 2 guarantees that
|u · w|∞
1
|u · w|∞
P
E
≤E
≤
.
−i
Z
(1
−
λ)(|u
·
w|
n(1 − λ)b
π0
∞+
j∈H0 ,j6=i uj wj )
Some simple algebra then leads to property (5.5). We are now ready to
prove Theorem 5.1.
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
19
Proof of Theorem 5.1. By the definition of FDRu , we have
"P
#
b
u
1
P
≤
min{w
·
t
,
λ}
0
i
i
i
i∈H
FDRu = E ································································
P
b
i ui 1 Pi ≤ min{wi · t, λ}
"
#
(i) X
αui 1 Pi ≤ min{wi · b
t, λ}
E ·····················································
≤
π
b0 · b
t·n
0
i∈H
"
#
1 Pi ≤ min{wi · b
t, λ}
(ii) X αui wi
E ·············································· ,
=
n
π
b0 · wi · b
t
0
i∈H
π
b ·n·b
t
0
P
where step (i) uses the fact that ·········································
≤ α, by construction
b
i ui 1{Pi ≤min{wi ·t,λ}}
of the procedure; and step (ii) follows by multiplying and dividing by wi in
b0 whenever the numerator is one, we have
term i. Moreover, since π
b0−i = π
#
"
X αui wi
1 Pi ≤ min{wi · b
t, λ}
· E ··············································
FDRu ≤
n
t
π
b0−i · wi · b
0
i∈H
" "
#
#
1 Pi ≤ min{wi · b
t, λ}
1
(iii) X αui wi
=
· E E ·············································· P −i
n
wi · b
t
π
b0−i
i∈H0
#
" "
#
(iv) X αu w
1 P i ≤ wi · b
t
1
i i
−i
· E E ····························· P
.
≤
−i
n
wi · b
t
π
b
0
0
i∈H
where step (iii) follows since conditioning on P −i fully determines π
b0−i , and
step (iv) follows from the elementary bound min{wi · b
t, λ} ≤ wi · b
t. Noting
−i
−i
b
that for each P , the function P
i 7→ t(Pi , P ) is nonincreasing in Pi ,
1{Pi ≤wi ·b
t}
P −i ≤ 1, and hence that
applying Lemma 1 ensures that E ···················
b
wi ·t
X αui wi
1
FDRu ≤
· E −i
n
π
b0
0
i∈H
(v)
≤ α,
where inequality (v) follows from property (5.5), concluding the proof.
20
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
6. Combining one layer of groups, with prior and/or penalty
weights and null proportion adaptivity. We now demonstrate how
to incorporate prior structural knowledge, where the hypotheses are separated into a partition of (non-overlapping) known groups, into the procedures introduced so far. In the next section, we will generalize some of these
ideas to handle multiple arbitrary possibly-incomplete partitions consisting
of possibly-overlapping groups.
When provided with group-level p-values (meaning a p-value corresponding to a test of whether the group is entirely null), one may just trivially run
a BHY procedure on these p-values to control the group FDR. This section
will tackle the setting where the group-level p-values are formed by combining individual-level p-values using the Simes procedure, and we would like to
control the group-level FDR, possibly in the presence of prior and/or penalty
weights. Our main technical tool will be a group-level super-uniformity
lemma (Lemma 3), in analogy with the elementwise super-uniformity lemma
(Lemma 1).
6.1. Formal Setup. Suppose that we have partitioned our hypotheses
into G groups of size n1 , n2 , . . . , nG , with n = n1 + · · · + nG and that we have
access to weights at the group level: prior weights u1 , . . . , uG , and penalty
weights w1 , . . . , wG . (The Simes p-values for each group may themselves
be formed using a weighted procedure, but these weights will be discussed
separately later on.)
To summarize, our data takes the form
(6.1)
P1 , . . . , P n 1
|
{z
}
Group A1 , weights u1 , w1
, . . . , Pn1 +···+nG−1 +1 , . . . , Pn ,
|
{z
}
Group AG , weights uG , wG
and we wish to select a subset of these groups, Sbgrp ⊆ [G], so that the
proportion of null groups (groups consisting entirely of null hypotheses) is
not too high. We define the set of null groups as
0
Hgrp
= g ∈ [G] : Ag ⊆ H0 ,
that is, any group Ag that contains only null hypotheses. The weighted group
FDR is then given by
n
o
P
b
u
1
g
∈
S
0
g
grp
g∈Hgrp
n
o .
FDRgrp
u : = E ················································
P
bgrp
u
1
g
∈
S
g
g
In order to test each group Ag for rejection, we need to compute a p-value
Pggrp for this group—in order to be a true p-value, we need to ensure that
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
21
0 , that is whenever g
Pggrp is (super)uniformly distributed whenever g ∈ Hgrp
is a null group.
Many statistics have been proposed that combine elementwise p-values
P [17].
When the p-values
Pare independent, some options include Fisher’s −2 i ln Pi
and Rosenthal’s i Φ−1 (Pi ), where Φ is the Gaussian CDF (originally proposed by Stouffer et al. [39]). When there are very few non-nulls, the Bonferroni correction is known to be more powerful, and it also works
P under
arbitrary dependence, as does Rüschendorf’s [29, 41] proposal of 2 i Pi /n,
and Rüger’s [28, 25] proposal of P(k) · n/k for a fixed k.
In our setting, the group-level p-value can be arbitrary, either built by
combining the individual p-values of the hypotheses within the group, or
constructed from new independent data. No matter how the group-level pvalues are constructed, one may simply apply a BHY procedure, appropriately weighted or reshaped or adapted, to the group-level p-values to control
the group-level FDR. One example of special interest, closely related to the
BHY procedure, is the setting where the group p-values are formed from
elementwise p-values using the Simes procedure, which we next discuss.
6.2. Generalized Simes tests for the global null. Simes [33] proposed an
improvement to the Bonferroni procedure for global null testing at level α.
We first calculate the Simes p-value using a reshaping function βe if required:2
P(k) · n
,
e
1≤k≤n β(k)
Simes(P ) = min
and we reject HGN if Simes(P ) ≤ α. The connection to the BHY procedure is
quite transparent: note that Simes(P ) ≤ α if and only if the BHY procedure
makes at least one rejection at level α. It is well known that the Simes pvalue, Simes(P ), really is a bonafide p-value, a result that we will recover as
a special case of Proposition 4.
6.3. The prior-weighted Simesw test for the global null. The Simes test [33]
was extended by Hochberg and Liberman [19] to incorporate prior weights
(1)
under independence. As before, we define weighted p-values Qi : = Pi /wi
for each hypothesis, and then calculate the generalized Simesw p-value for
the group as
(6.2)
Q(k) · n
.
1≤k≤n
k
Simesw (P ) : = min
2
Here and henceforth, the tilde in βe will be used to signified a reshaping function for
calculating a Simes p-value within a single group, and we will continue the use of notation
β, without the tilde, when comparing these p-values across multiple groups.
22
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
The global null hypothesis for the group Ag , i.e. the hypothesis that Ag ⊆ H0
consists entirely of nulls, is then rejected at the level α if Simesw (P ) ≤ α.
In a more general setting where the individual p-values Pi within the
group Ag may be arbitrarily dependent, we can instead consider the reshaped
weighted Simes p-value, given by
(6.3)
Q(k) · n
e
1≤k≤n β(k)
rSimesw (P ) : = min
for a reshaping function βe (recall Definition 3).
The following result states that the (weighted and/or reshaped) Simes
p-value really is a bonafide p-value.
Proposition 4. Under the global null hypothesis, the weighted Simes
p-value has the following properties:
(a) Under independence and uniformity, if maxi wi ≤ 1/α, Simesw (P ) is
exactly uniformly distributed.
(b) Under positive dependence, Simesw (P ) is super-uniformly distributed.
(c) Under arbitrary dependence, the reshaped Simes p-value rSimesw (P )
is super-uniformly distributed.
While statement (a) was first proven by Hochberg and Liberman [19], and
statement (c) under unit weights by Hommel [20], all the above statements
are straightforward consequences of the properties of the weighted BH and
BY procedures. For completeness, we prove this proposition below.
Proof of Proposition 4. First we consider the Simes p-value without
reshaping, in the setting of positive dependence. Examining the definition
of the BHuw procedure with the same prior weights wi and with uniform
penalty weights ui = 1, we see that the weighted Simes p-value, Simesw , is
the minimum threshold α for which P passes the BHw procedure:
Simesw (P ) = min {α ∈ [0, 1] : BHw makes at least one rejection at level α} .
In other words, we have the equivalence
(6.4)
Simesw (P ) ≤ t ⇔ b
kt,u,w (P ) ≥ 1
for any t ∈ [0, 1], recalling from (4.2b) that b
kt,u,w is the number of rejections
of the BHu,w procedure at the target FDR level t. Now, note that under the
global null, if we run BHuw at some level t, any discovery made by BHuw is
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
23
a false discovery. Hence the FDP is equal to one whenever there
n is at least
o
one discovery (and zero otherwise), and we have FDR = Pr b
kt,u,w > 0 .
Our previous result, Proposition 2(b), proves that FDR ≤ t for the BHuw
procedure. Hence under the global null, we have
n
o
Pr{Simesw (P ) ≤ t} = Pr b
kt,u,w > 0 ≤ t
Under independence and uniformity, Proposition 2(a) also implies that this
statement holds with equality.
Next, we turn to the setting of arbitrary dependence, where we now use
the reshaped weighted Simes p-value, rSimesw (P ). In this setting, we can
similarly see that
rSimesw (P ) = min {α ∈ [0, 1] : BYw makes at least one rejection at level α} ,
where now we compare against the generalized BY procedure that uses the
same reshaping function βe as we use in our reshaped Simes test. Applying
Proposition 2(c), we again show that Pr{rSimesw (P ) ≤ t} is equal to the
FDR of the corresponding BY procedure, and therefore, Proposition 2(c)
implies that this quantity is ≤ t.
We now demonstrate how to employ the weighted Simes p-value to control
group FDR, first under independence between groups for clarity, and later
under more general assumptions. For this purpose, the following group-level
super-uniformity lemma will prove useful.
6.4. A group-level super-uniformity lemma. In analogy to the superuniformity Lemma 1, we present the following lemma, which contains analogous bounds under the settings of independent or positively dependent base
p-values (in which case the group p-value is constructed with a Simes pvalue), and in the setting of arbitrarily dependent base p-values (in which
case the group p-value can be constructed by any method—Simes, Fisher,
or others—as long as it is a valid p-value.)
0 be a null
Lemma 3 (Group-level super-uniformity lemma). Let g ∈ Hgrp
0
group, that is, Ag ⊆ H . Let PAg denote the p-values in this group, PAg =
(Pj )j∈Ag , and let P−Ag denote the remaining p-values, P−Ag = (Pj )j6∈Ag .
(a) If f : [0, 1]n → [0, ∞) is a nonincreasing function, and the base pvalues P1 , . . . , Pn are independent, then
1 Simesw (PAg ) ≤ f (P )
E ················································· P−Ag ≤ 1.
f (P )
24
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
(b) If f : [0, 1]n → [0, ∞) is a nonincreasing function, and the base pvalues P1 , . . . , Pn are positively dependent, then
1 Simesw (PAg ) ≤ f (P )
E ················································· ≤ 1.
f (P )
(c) If the base p-values P1 , . . . , Pn are arbitrarily dependent, then for any
constant c > 0, any reshaping function β, and any function f : [0, 1]n →
[0, ∞), we have
1 T (PAg ) ≤ cβ(f (P ))
E ··············································· ≤ 1,
cf (P )
where T : [0, 1]|Ag | → [0, 1] is any valid group p-value, i.e. any function with the property that T (PAg ) is superuniform whenever g is a
null group. (For example, we may take T (PAg ) = rSimesw (PAg ), the
e
reshaped weighted Simes p-value formed using reshaping function β.)
(d) Let g1 , . . . , gk be a set of k possibly overlapping null groups, meaning
Ag1 , . . . , Agk ⊆ H0 , and S1 , . . . , Sk represent the corresponding Simes’
p-values. If f : [0, 1]n → [0, ∞) is a nonincreasing function, and the
base p-values P1 , . . . , Pn are positively dependent, then
1 {Simes(S1 , . . . , Sk ) ≤ f (P )}
E ·························································· ≤ 1.
f (P )
The proof of this lemma relies on Lemma 1, and can be found in Appendix C.
We remark thatSstatement (d) is different from statement (b) applied to the
null group g = ki=1 gi ; indeed, in statement (d), the arguments to the Simes’
procedure are themselves Simes’ p-values, and not the original base p-values.
If desired, statement (d) can be further bootstrapped to apply to the root
of an entire tree of null groups, where each internal node stores the Simes’
p-value calculated on its children.
6.5. Group FDR control for a single partition. With the tools developed
so far in place, it is now simple to construct a procedure that controls FDR
at the group level, given a single partition of our n hypotheses into groups
A1 , . . . , AG : we first form some summary p-value Pggrp for each group g =
1, . . . , G, and then run either a BH procedure or a BY procedure on the
resulting list P1grp , . . . , PGgrp , according to the dependence assumptions.
First we construct the group p-values. For each group, we may choose
to use a weighted Simes p-value to collapse the group into a single summary p-value, reducing the overall problem to a standard multiple testing
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
25
problem on G p-values. To avoid conflicting notation with the group-level
(0)
(0)
weights w1 , . . . , wG , let w1 , . . . , wn denote the weights on the n individual
hypotheses for computing these group-level Simes p-values.
(0)
Referring to the notation of setup (6.1), define Qi : = Pi /wi and compute
the Simesw p-values for each group, Simesw (PA1 ), . . . , Simesw (PAG ), where
(6.5)
Pggrp
= Simesw (PAg ) =
min
Qg,(k) ·
1≤k≤|Ag |
P
j∈Ag
k
(0)
wj
,
where Qg,(k) is the k-th smallest p-value in group Ag . If we choose to use a
e then the weighted rSimes p-value is computed as
reshaping function β,
P
(0)
Qg,(k) · j∈Ag wj
grp
(6.6)
Pg = rSimesw (PAg ) = min
1≤k≤|Ag |
βeg (k)
for each group, where the subscript g in the reshaping function, i.e. βeg (k),
indicates that for each group we are free to choose different βe functions
(though there may be little reason to exercise this freedom).
P
(0)
Note that, in both definitions, the numerator uses j∈Ag wj instead of
(0)
|Ag | because, depending on how we normalize our weights wi , we may
have that the sum of all weights over all groups is n, but the sum of the
weights within the group Ag need not be |Ag |; hence the adjustment with
the appropriate normalization. As argued earlier, Simesw (PAg ) is a bonafide
p-value, i.e. is superuniform, under the “group intersection hypothesis” that
Ag is composed only of nulls, whenever p-values in Ag are independent
or positively dependent; under arbitrary dependence, the reshaped p-value
rSimesw (PAg ) is now the one that is guaranteed to be superuniform.
Finally, if we do not wish to use a Simes p-value, we are free to set
Pggrp = T (PAg )
for any function T : [0, 1]|Ag | → [0, 1] with the property that it is a valid
p-value under the group null, that is,
0
g ∈ Hgrp
⇒ T (PAg ) is superuniform.
This includes the reshaped Simes p-value as a special case, i.e. T (PAg ) =
rSimesw (PAg ), and also encompasses the Fisher and Rosenthal group p-value
constructions. (In principle, the group-level p-values could also be computed
from the raw data, which does not alter any of the results proved here, as
0 ).)
long as Pggrp is still superuniform for any null group g ∈ Hgrp
26
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
Next, we state the results for FDR control in this group testing setting. As
expected, under independence we are free to use adaptivity, while under arbitrary dependence, we are obligated to use reshaping. Under independence,
the null proportion estimate (for fixed λgrp ∈ (0, 1)) is naturally defined as
(6.7)
π
bgrp :=
|u · w|∞ +
PG
g=1
ug wg 1 Pggrp > λgrp
G(1 − λgrp )
.
Proposition 5 (Group-level FDR control). Recalling setup (6.1):
(a) Under independence of the group p-values, the St-BHuw procedure applied to {Pggrp } achieves FDRgrp
u ≤ α.
(b) Under positive dependence of the base p-values in P , the BHuw procedure applied to Simes’ p-values {Simes(PAg )} achieves FDRgrp
u ≤ α.
(c) Under arbitrary dependence of group p-values, the BYuw procedure applied to {Pggrp } achieves FDRgrp
u ≤ α.
We do not provide an explicit proof of this proposition, since the proofs
for FDRgrp
u control directly mimic the corresponding proofs of FDRu control
for the same procedures applied to the base p-values in P , with the single
alteration that the appropriate statements of Lemma 3 are invoked in place
of their corresponding statements in Lemma 1. Further, the proof of the
above proposition follows as a special case of the proof of Theorem 7.1 for
the multilayer procedure p-filter to be introduced in the next section.
As observed in Barber and Ramdas [1] for the unweighted case, we can
view the group FDR procedure described in this subsection as an interpolation between the weighted Simes test, and the weighted St-BH procedure.
This is seen by considering two extremes: taking one single group of size n
recovers the Simes test of the global null (across all n hypotheses), while
taking instead n groups of size one recovers the BH or BY procedures for
testing individual hypotheses. Of course, while the above algorithm controls
group-level FDR, it has no guarantee for the elementwise FDR when the
hypotheses are considered individually rather than in groups. Our general
multilayer method, introduced in the next section, gives this type of simultaneous guarantee under various forms of dependence.
7. FDR control and internal consistency for multiple partitions.
We now turn to the general case in which we allow multiple partitions of the
set of hypotheses, as in Barber and Ramdas [1], while continuing to support
prior weights, penalty weights, group-level adaptivity, reshaping under arbitrary dependence, as well as other generalizations of overlapping groups and
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
27
incomplete partitions. The presented framework will specialize, in the case
of a single partition, to all the procedures discussed in previous sections.
Our formal setup is as follows. We have M partitions of interest, with the
mth partition having Gm many groups:
(m)
(m)
A1 , . . . , AGm ⊆ [n] for m = 1, . . . , M .
The partitions and the groups within each partition can be specified in any
order. The order in which the partitions are described makes no difference
to the final output; similarly, the ordering within each partition’s groups is
also arbitrary.
As in Section 6, define the null set for the mth partition as containing
those groups that are entirely filled with null hypotheses:
o
n
0
0
.
Hm
= g ∈ [Gm ] : A(m)
⊆
H
g
As before, there is a natural notion of group-level FDR—namely, a falsely
discovered group is a group that is entirely composed of true nulls, for which
our algorithm has incorrectly proclaimed at least one discovery within that
group (i.e. effectively has rejected the global null hypothesis within that
group). Each group in each partition is associated with a summary p-value
Pgm , which we assume to be derived from the base p-values (Pi : i ∈ Am
g ),
but may more generally be calculated from the raw data or from another
source without altering our results.
For interpretability, it is arguably of interest to maintain “internal consistency” among rejected hypotheses and groups. For a single partition into
non-overlapping groups, we say that a set of rejections at the individual level
and group level(s) are internally consistent if:
(7.1)
We only reject groups containing at least one rejected hypothesis,
and we only reject a hypothesis if its group is also rejected.
We will require the rejections to be internally consistent simultaneously for
all partitions, and later extend this notion in two ways to partitions with
leftover sets and overlapping groups (weak and strong internal consistency).
The above notion of internal consistency is an extension, to the multilayer
setting, of the requirement of both coherence and consonance as defined in
the classical paper by Gabriel [14], and explored in depth in the FWER
literature by Sonnemann and Finner [34, 35, 36], and Romano et al. [27].
Even in the case of just one layer of groups on top of the individual
hypotheses, handling consistency while controlling both group-level and
individual-level FDR is not trivial. For example, a sequential procedure, of
28
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
first rejecting groups at a target FDR level α1 , and then rejecting individual
hypotheses within rejected groups at level α2 , may neither succeed in controlling the FDR at the individual level (due to not accounting for selection
bias), nor succeed in being internally consistent (because some groups may
get selected in the first round, but none of the individuals within that group
may get selected in the second round). Further, such a method is not easily
generalized to non-hierarchical partitions. Similarly, a parallel procedure of
choosing which groups to reject independently of which individuals to reject
may also fail to be internally consistent. A naive solution to this issue is
intersection—i.e., rejecting those hypotheses whose groups are rejected at
every layer—but this may also fail to control FDR at both levels (see Barber
and Ramdas [1] for examples of this phenomenon).
Our algorithm can guarantee FDR control at the hypothesis and group
levels, that holds simultaneously for multiple arbitrary non-hierarchical partitions of the hypotheses, while also incorporating weights and adaptivity,
all while maintaining the internal consistency of rejected hypotheses. We
now introduce the framework formally.
7.1. The p-filter framework. The algorithmic framework presented in
this section generalizes the p-filter framework by Barber and Ramdas
[1]. Roughly speaking, the algorithm is a multivariate extension of classical
step-up procedures, based on the following sequence of steps:
• Select all hypotheses in each layer whose p-values are smaller than
some initial layer-specific threshold.
• Reject an elementary hypothesis if it is contained in a selected group
in every layer.
• In each layer, reject a group hypothesis if it contains a rejected elementary hypothesis. Then, estimate the group-FDP in each layer.
• Lower the initial thresholds at each layer, and repeat the steps above,
until the group-FDP is below the desired level for all partitions.
We use the same name “p-filter” for this extended algorithm, while noting
six important ways in which this paper adds to the flexibility of the earlier
framework.
1. Weights. The m-th partition is associated with two sets of Gm many
positive weights, one for each group g in that partition:
(m)
Penalties {u(m)
g } and priors {wg }, such that
Gm
X
(m)
u(m)
= Gm .
g wg
g=1
These can be used to take differing group sizes into account.
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
29
2. Reshaping. If the p-values within or across layers are arbitarily dependent, we use βm to reshape thresholds in layer m (possibly different for the M layers). If Simes p-values are used to form group
(0)
level p-values, then we may place weights wi on the base p-values
P1 , . . . , Pn for the purpose of calculating a weighted Simes p-value,
); if additionally the p-values within the group are
Pgm = Simesw (PAm
g
arbitrarily dependent, we would then choose reshaping functions βemg ,
potentially with different functions chosen for each group, for comput).
ing Pgm = rSimesw (PAm
g
3. Adaptivity. For any partition whose group-level p-values are known
to be independent (i.e., independence between groups, not necessarily
within groups), we can incorporate Storey’s null-proportion adaptivity.
Every layer m has a user-defined constant λm ∈ (0, 1), with which we
define a weighted null proportion estimator for partition m:
(7.2)
π
bm :=
|u(m) · w(m) |∞ +
P
g
(m)
(m)
ug wg
1 Pgm > λm
Gm (1 − λm )
.
The use of null-proportion adaptivity in any one layer may improve
the power in all layers, since more groups being discovered in one
layer then allows more individual hypotheses to be discovered, and
hence more groups to be discovered in other layers.
4. Incomplete partitions. We allow the partitions to be incomplete—
we let the m-th partition’s “leftover” set L(m) ⊂ [n] represent all elements from the m-th partition that do not belong to any group in the
m-th partition:
[
L(m) = [n]\ A(m)
and `m = |L(m) |.
g
g
This gives additional flexibility to the user who may not want to assign
some hypotheses to any groups. It is important to note that L(m) is not
just another group—this set is not counted when calculating the grouplevel FDR in layer m, meaning that discoveries within this leftover set
do not alter the FDR at layer m, and hypotheses in this leftover set
have no internal consistency constraints imposed by layer m.
5. Overlapping groups. We allow the groups in any partition to overlap. Any elementary hypothesis need not be part of just a single
g ∈ [Gm ]; we let gm (i) denote the set of groups to which Pi belongs:
gm (i) = {g ∈ [Gm ] : Pi ∈ A(m)
g }.
Two natural extensions of internal consistency are as follows.
30
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
• Weak internal consistency: we reject Hi if and only if in every
partition, the following holds: either there is at least one rejected
group containing i, or i ∈ L(m) , the leftover set, meaning that i
does not belong to any group at this layer.
• Strong internal consistency: we reject Hi if and only if in every partition, the following holds: either every group that contains
i is rejected, or i ∈ L(m) .
We remark these are not the only two notions of internal consistency
that can be handled by our framework: any monotone notion of internal consistency still works, meaning that decreasing the p-values can
only increase the number of rejections at all levels.
6. Arbitrary group p-values. The new p-filter algorithm no longer
necessarily uses Simes p-values at the group layers. In other words,
each group-level p-value at each layer can be arbitrary; it can be formed
by combining the elementwise p-values in any way (or, as mentioned
before, might be constructed from the raw data). Depending on how
these p-values are constructed, we can appropriately use adaptivity
(under independence, if Simes p-values are used), or reshaping (under dependence, or if we choose to use Fisher, Rosenthal, or other
combination methods), as needed.
p-filter will reject some subset Sb ⊆ [n] of hypotheses and a subset
b
Sm ⊆ [Gm ] of groups in each partition m, with the exact choice of these
rejection sets defined in the next subsection. Given Sb and the Sbm ’s, we then
define the weighted FDR for the mth partition as
n
o
P
(m)
b
u
1
g
∈
S
0
m
g∈Hm g
n
o .
FDR(m)
= E ··················································
u
P
(m)
b
g∈[Gm ] ug 1 g ∈ Sm
The rejections made by p-filter will be internally consistent, and satisfy
FDR(m)
≤ αm simultaneously for all m = 1, . . . , M.
u
To describe a situation where allowing for non-hierarchical layers, and
for more than two layers, may be useful, imagine that we can write the pvalues down in a rectangular grid where the p-values within a row have some
interpretable meaning (say, hypotheses corresponding to the same point in
space), and similarly the p-values within a column have a different meaning
(say, hypotheses corresponding to the same point in time). Then in addition
to controlling the overall FDR, we may also want to control the “spatial”
FDR using a row partition where each group is a row, and “temporal”
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
31
FDR using a column partition where each group is a column, or even the
“spatio-temporal” FDR for using a rectangular partition when each group
is a block in space-time. Refer to Figure 1 for visualization, and see Barber
and Ramdas [1] for further discussion, numerical simulations, as well as a
neuroscience application.
Fig 1. Consider 16 hypotheses written as a 4 × 4 grid, with four partitions: ele-
mentary, rows, columns, blocks. On the top row is the underlying truth, with the
leftmost panel showing the hypothesis-level non-nulls, and the other three panels
showing which groups in each partition are hence identified as non-null. On the
bottom row is an example of a set of discoveries, with the leftmost panel showing
the hypothesis-level rejections, and the other three panels showing which groups are
correspondingly rejected (light-grey for correct rejections, black for false rejections).
The false discovery proportions in each partition are 0.2, 0, 0.33, 0.5 respectively.
7.2. Deriving the p-filter algorithm. To run the p-filter algorithm,
we need to search for rejection thresholds for each layer. These thresholds
will be parametrized by weighted discovery counts km ∈ [0, Gm ] for each layer
m = 1, . . . , M . The reader is cautioned that each km will not necessarily be
an integer but instead be a real number corresponding loosely to the total
(m)
rejected penalty weight. If the weights ug are all set to equal 1, then km
indeed corresponds to the number of groups in layer m that are rejected.
Given ~k := (k1 , . . . , kM ), we first perform an initial screening on each layer
separately:
(m)
wg αm km
init ~
m
b
(7.3a)
Sm (k) = g ∈ [Gm ] : Pg ≤ min{ πbm Gm , λm } .
32
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
If we choose to use reshaping, we would instead define
(m)
wg αm βm (km )
init ~
m
b
, λm } .
(7.3b)
Sm (k) = g ∈ [Gm ] : Pg ≤ min{
π
bm Gm
(The null proportion estimate π
bm can be defined as in (7.2) if we choose to
use adaptivity; if not, we simply set π
bm = 1 and λm = 1, so that the same
equations can be used in either setting.)
We remark that while we are not obliged to do so, one option for group(m)
level p-values is to set Pgm = Simesw(1) (Ag ); for convenience, we now recompute these p-values in the notation of the present section. Recall that
(1)
Qi = Pi /wi , and that
(m) P
(1)
Qg,(i) j∈A(m) wj
g
(m)
Simesw(1) (Ag ) : = min
,
(m)
i
1≤i≤|Ag |
(m)
(m)
where Qg,(i) is the i-th smallest p-value in Ag . If we choose to use reshaped
Simes p-values, we would instead compute
(m) P
(1)
Qg,(i) j∈A(m) wj
g
(m)
Simesw(1) (Ag ) : = min
,
(m)
βemg (i)
1≤i≤|Ag |
where βemg is the reshaping function chosen for group g in layer m.
Also recall that if the groups in the m-th layer are independent, we may
use null-proportion adaptivity by setting π
bm as in (7.2), while otherwise we
would set π
bm ≡ 1. We then define the total set of rejections, either as
M
\
[
b ~k) = Sbweak (~k) =
∪ L(m) ,
(7.4a)
S(
A(m)
g
m=1
init (~
g∈Sbm
k)
if we wish to enforce weak internal consistency, or alternately as
M
\
[
b ~k) = Sbstrong (~k) =
[n]\
(7.4b)
S(
Am
g
m=1
init (~
g∈[Gm ]\Sbm
k)
for strong internal consistency. To interpret these expressions, we see that
under weak consistency (7.4a), hypothesis i is rejected if, for every layer m,
either i is in the leftover set L(m) , or i belongs to at least one of the groups
(m)
Ag rejected in this layer—we can rewrite this condition as
init ~
Sbweak (~k) = {Pi : ∀m, either Pi ∈ L(m) , or ∃ g ∈ g(m, i), A(m)
∈ Sbm
(k)}.
g
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
33
For strong consistency (7.4b), hypothesis i is rejected if, for every layer m,
either i is in the leftover set L(m) , or i belongs to only rejected groups—that
is, if i does not belong to any groups Am
g which were not rejected—which
we can rewrite as
init ~
Sbstrong (~k) = {Pi : ∀m, either Pi ∈ L(m) , or ∀ g ∈ g(m, i), A(m)
∈ Sbm
(k)}.
g
Finally, we redefine the set of groups in layer m which are rejected in
order to enforce internal consistency:
n
o
init ~
b ~k) 6= ∅ and g ∈ Sbm
(7.6)
Sbm (~k) = g ∈ [Gm ] : A(m)
∩ S(
(k) ,
g
b ~k) = Sbweak (~k) or S(
b ~k) = Sbstrong (~k), as desired. Examining
where either S(
these definitions, readers may verify that the appropriate (weak or strong)
notion of internal consistency (7.1) is satisfied.
Of course, these definitions depend on the initial choice of the vector ~k.
Since we would like to make a large number of discoveries, we would like to
use a ~k that is as large as possible, while at the same time controlling the
layer-specific false discovery rates,
n
o
(m)
ug 1 g ∈ Sbm (~k)
~
n
o .
FDP(m)
u (k) : = ·························································
P
(m)
~
b
1
g
∈
S
(
k)
u
m
g∈[Gm ] g
P
g∈H0m
Now, define the data-dependent set of feasible vectors ~k = (k1 , . . . , kM ) as
X
b = ~k ∈ [0, G1 ] × · · · × [0, GM ] :
(7.7) K
u(m)
≥
k
for
all
m
,
m
g
g∈Sbm (~k)
b on input parameters such as
where we suppress the implicit dependence of K
(m)
(m)
αm , λm , {wg }, {ug }. In particular, if the penalty weights are all equal to
one, then the consistency condition defining the “feasible” ~k’s is equivalent
to requiring that |Sbm (~k)| ≥ km for all m = 1, . . . , M —i.e., the numbers of
rejections in each layer at the vector ~k are elementwise ≥ ~k. This is analogous
to the BH procedure (3.1) and the generalized BY procedure (3.2), which
each find a value k such that there are at least k many rejections at the
αβ(k)
threshold αk
(for BY). The above condition can be viewed
n (for BH) or
n
as a generalization, to the multi-partition setting, of the “self-consistency”
condition described by Blanchard and Roquain [9].
Also, it is worthy of note that the p-filter algorithm in Barber and Ramdas [1] was derived in terms of thresholds ~t instead of number of rejections ~k,
34
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
[ m (~t) ≤ αm ,
and there the corresponding feasibleity condition was that FDP
[ m (~t) is an empirical-Bayes type estimate of the FDP. Indeed, if
where FDP
we avoid π
bm , βm , wm , um for simplicity, then associating b
tm to αm b
km /Gm
and comparing our derivation to the one in Barber and Ramdas [1], we can
see that the “self-consistency” viewpoint and the “empirical-Bayes” viewpoint are equivalent and lead to the same algorithms. However, when dealing
with arbitrary dependence, the proofs are vastly simpler in terms of ~k than
in terms of ~t, explaining the switch in choice of notation in this paper.
As with the BH and BY procedures, we then choose the largest feasible
thresholds km , given by:
n
o
b
b
(7.8)
km = max km : ∃k1 , . . . , km−1 , km+1 , . . . , kM s.t. ~k ∈ K
This choice defines our algorithm: the p-filter algorithm rejects the hybb
potheses S(
k1 , . . . , b
kM ), as defined in (7.4a) or (7.4b), with rejections at
layer m given by Sbm (b
k1 , . . . , b
kM ) as defined in (7.6). Next, we summarize
the theoretical guarantees of p-filter.
7.3. Theoretical guarantees. The following proposition states that the
b actually has a well-defined “maximum” corner.
set of feasible vectors K
b be defined as in equaProposition 6. Let the set of feasible vectors K
tion (7.7), and let the partition-specific maximum feasible vector b
km be defined as in equation (7.8). Then we have
(7.9)
b.
(b
k1 , . . . , b
kM ) ∈ K
Barber and Ramdas [1] proved this result in the setting of the original
p-filter algorithm; for completeness, we prove it in this more general setting in Appendix D.
The vector (b
k1 , . . . , b
kM ) is not just feasible from the perspective of selfb but it is also feasible from the perspective of
consistency as captured by K,
FDR control. Specifically, the next theorem proves that—assuming for now
bb
that we can find (b
k1 , . . . , b
kM )—selecting the set S(
k1 , . . . , b
kM ) guarantees
(m)
simultaneous control of FDRu for all M partitions.
Theorem 7.1. Any procedure that finds (b
k1 , . . . , b
kM ) from definition (7.8)
satisfies the following properties for all m = 1, . . . , M simultaneously:
(a) If the base p-values are independent, and all group p-values are given
), then employing adaptivity (defining π
bm as
by Pgm = Simesw (PAm
g
(m)
in (7.2)) guarantees that FDRu
≤ αm .
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
35
(b) If the base p-values are +dependent and all group p-values are given
Pgm
(m)
P
(m)
FDRu
0
ug
(m)
wg
(m)
wg
), then
≤ αm g∈HmGm
by
= Simesw (PAm
≤ αm .
g
(c) When all p-values are arbitrarily dependent, and are constructed arbitrarily (under the assumption that Pgm is superuniform for any null
0 , meaning it is a valid p-value), then using reshaping as
group g ∈ Hm
(m)
P
0
ug
(m)
in (7.3b) guarantees that FDRu ≤ αm g∈HmGm
≤ αm .
(d) In the setting of part (c), if additionally the groups at layer m are
, for each g ∈
is independent from P−Am
independent (that is, PAm
g
g
[Gm ]), then using reshaping as in (7.3b) and adaptivity for layer m as
(m)
in (7.2), guarantees that FDRu ≤ αm .
To remark on the difference between parts (c) and (d), what these two
results guarantee is that if we use adaptivity for some set Madapt ⊂ [M ] of
layers, and do not use adaptivity (i.e. set π
bm = 1) for the remaining layers,
then FDR control is maintained across all layers as long as, for each m ∈
Madapt , the layer-wise independence statement holds—PAm
is independent
g
m
from P−Ag , for each g ∈ [Gm ]. If this condition fails for some m ∈ Madapt ,
the FDR control in other layers will in fact not be affected.
The proof, given in Appendix E, integrates the various ingredients required to handle weights, null proportions, and groups as detailed in earlier
sections. The proof includes some new ideas of independent interest, specific
to handling overlapping groups with dependent p-values. One application
of statement (d) is when the base p-values are independent, there are no
overlapping groups, and group p-values are formed using a Fisher, Rosenthal, or other combinations of the base p-values. Recently, Katsevich and
Sabatti [23] prove that in case (d), the FDR is controlled even without using
reshaping, albeit at a constant factor larger than the target level.
In practice, if we have accurate side information about group structures
that the rejected hypotheses likely respect, then we may significantly improve our precision, achieving a lower FDR than the theoretical bound,
without affecting our power much. However, inaccurate side information
may significantly lower our power, since each p-value would have additional
misguided constraints to meet. These aspects were explored in simulations
by Barber and Ramdas [1].
Special cases. The setting with a single partition (M = 1) recovers all
other algorithms discussed in this paper. When we have the finest partition
with n groups containing one hypothesis each, p-filter reduces exactly to
the generalized BHY procedures discussed in Section 3, which of course include BH and BY, and their prior- and/or penalty-weighted variants BHYuw
36
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
described in Section 4. When we employ adaptivity, we recover the St-BH
method and its weighted variant in Section 5. When we instantiate p-filter
with the coarsest partitions with a single group containing all n hypotheses, we recover exactly the generalized Simes test, and its weighted variants
from Section 6. When instantiated to a single partition with G groups of hypotheses, we recover exactly the test that controls group-FDR, as discussed
at the end of Section 6. All the theorems and propositions in this paper are
essentially deduced as special cases of Theorem 7.1.
Algorithm 1 The p-filter for multi-layer FDR control
Input: M possibly incomplete partitions of possibly overlapping groups of indices [n];
A vector of base p-values P ∈ [0, 1]n ;
Group p-values Pgm for each group g = 1, . . . , Gm in layers m = 1, . . . , M ;
M target FDR levels {αm };
(m)
(m)
M sets of prior weights and/or penalty weights {wg , ug };
M thresholds for adaptive null proportion estimation {λm };
M reshaping functions {βm }, if desired.
Initialize: Set km = Gm , and π
bm as in definition (7.2).
repeat
for m = 1, . . . , M do
Update the mth vector: defining Sbm (~k) as in equation (7.6) (using weak or strong
consistency, as desired), let
X
0
0
∈ [0, Gm ] :
km ← max km
u(m)
≥ km
g
bm (k1 ,...,km−1 ,k0 ,km+1 ,...,kM )
g∈S
m
end for
until the vectors k1 , . . . , kM are all unchanged for one full cycle.
Output: Adaptive vector b
k = (k1 , . . . , km ).
7.4. An efficient implementation. Although one can employ a bruteforce grid search to find (b
k1 , . . . , b
kM ), the p-filter algorithm presented in
Algorithm 1 is able to find this vector efficiently using a coordinate-descent
style procedure, and is a strict generalization of the algorithm by the same
name in Barber and Ramdas [1]. Code for this procedure is publicly available
at https://www.stat.uchicago.edu/∼rina/pfilter.html. The following proposition provides a correctness guarantee for Algorithm 1:
Proposition 7. The output of Algorithm 1 is the maximum feasible
corner (b
k1 , . . . , b
km ) defined in equations (7.8) and (7.9).
This result was proved by Barber and Ramdas [1] in the setting of the original p-filter algorithm, where the km ’s take only integer values; here, the
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
37
algorithm is slightly more subtle, with real-valued km ’s due to the presence
(m)
of penalty weights ug . The proof of the proposition for this more general
setting is given in Appendix D.
8. Discussion. This paper provides simple proofs for many existing
multiple testing procedure—while also generalizing the conditions under
which some of them work—including the global null test of Simes [33], the
weighted Simes test of Hochberg and Liberman [19], the FDR controlling
procedures of Benjamini and Hochberg [3] and Benjamini and Yekutieli [7],
the weighted FDR controlling procedure of Benjamini and Hochberg [4], the
p-value weighting procedure of Genovese et al. [16], and the null-proportion
adaptivity procedure of Storey [37]. We also described several new procedures, including prior+penalty weighted versions of BH and St-BH, and an
adaptive weighted Simes test, and showed how to unify these concepts in
the grouped setting. Finally, our p-filter algorithm unifies and generalizes
all of the above procedures, building on the original p-filter framework
introduced by Barber and Ramdas [1].
The procedures that we have analyzed and generalized do not fully cover
the huge literature on FDR controlling procedures. For example, all procedures in this paper are step-up procedures, and much work has also been
done on alternative styles of procedures, like step-down, step-up-down and
multi-step methods. For example, Benjamini and Liu [6] propose step-down
procedures that control FDR under independence. Later, procedures by Benjamini and Liu [5] and Romano and Shaikh [26] provably control FDR under
arbitrary dependence, with Gavrilov et al. [15] extending them to adaptive
control under independence. Two-step adaptive procedures have been analyzed in Benjamini et al. [8] under independence, and by Blanchard and
Roquain [10] under dependence. Different methods of incorporating weights
into such procedures have also been studied, e.g. a different notion of the
weighted Simes p-value proposed by Benjamini and Hochberg [4]. Hu et al.
[21] and Benjamini and Bogomolov [2] also propose ways to take a single
partition of groups into account, while Yekutieli [42] discusses hierarchical
testing. The super-uniformity lemmas (Lemma 1 and, in the grouped setting, Lemma 3), can be used to quickly prove FDR control for many of these
procedures, and may be a useful tool for exploring potential extensions of
multiple testing procedures into broader settings.
Acknowledgments. We thank Wenyu Chen for helping implement the
new p-filter algorithm, and Etienne Roquain for clarifying a point about
doubly-weighted procedures. We thank Eugene Katsevich, Aditya Guntuboyina, Sujayam Saha, Larry Wasserman and Fanny Yang for relevant discus-
38
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
sions. The authors are also thankful to audience members at the Statistics departments of Stanford, Wharton, UC Davis, the St. Louis Workshop
on Higher Order Asymptotics and Post-Selection Inference, and the NIPS
Workshop on Adaptive Data Analysis, whose questions partly shaped this
work. This work was supported in part by the Office of Naval Research
under grant number W911NF-16-1-0368, the Air Force Office of Scientific
Resesarch under grant number AFOSR-FA9550-14-1-0016, by NSF award
DMS-1654076, and by an Alfred P. Sloan fellowship.
APPENDIX A: PROOF OF SUPER-UNIFORMITY LEMMA 1
Statement (b) of Lemma 1 follows directly from Blanchard and Roquain
[9], and independently reproved by Barber and Ramdas [1]. Statement (a)
with inequality (but not with equality) follows as a special case of (b), since
independence is a special case of positive dependence, and the distribution
of a null Pi does not change on conditioning on an independent set of pvalues. Statement (c) was proved also by Blanchard and Roquain [9]. We
now prove the statements (a), (d).
Statement (a). We prove the first part of Lemma 1, under the assumptions
that the function P 7→ f (P ) satisfies the leave-one-out property with respect
to index i, and that Pi is uniformly distributed and is independent of the
remaining p-values. Since Pr{Pi = 0} = 0, we ignore this possibility in the
following calculations. Since f satisfies the LOOP condition, we have
n
o
−i
e
1 Pi ≤ f (P )
1 {Pi ≤ f (P )}
····························· =
.
f (P )
f (Pe−i )
This can be seen by separately considering what happens when the numerator on the left-hand side is zero or one.
Since P −i determines f (Pe−i ), it immediately follows that
o
n
−i )
e
1
P
≤
f
(
P
i
1 {Pi ≤ f (P )}
E ····························· P −i = E
P −i
f (P )
f (Pe−i )
n
o
Pr Pi ≤ f (Pe−i ) f (Pe−i )
=
f (Pe−i )
= 1,
where the last step follows since f has range [0, 1],
n and Pi is uniformly diso
tributed and is independent of Pe−i — therefore, Pr Pi ≤ f (Pe−i ) f (Pe−i ) =
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
39
f (Pe−i ). This concludes the proof of the super-uniformity lemma under independence and uniformity.
Statement (d). For each ` = 1, . . . , m, let ν` be a probability measure on
Rk
[0, ∞) chosen such that β` (k) = βν` (k) = x=0 x dν` (x), as in the definition
of a reshaping function (Definition 3). Let X` ∼ ν` be drawn independently
for each ` = 1, . . . , m, and let ν be the
Qmprobability measure on [0, ∞) corresponding to the distribution of Z = `=1 X` . Then
!
Z f` (P )
m
m
Y
Y
c·
β` (f` (P )) = c ·
x` dν` (x` )
`=1
x` =0
`=1
Z
∞
=c·
∞
m
Y
xm =0
`=1
Z
···
x1 =0
"
=c·E
m
Y
!
x` · 1 {x` ≤ f` (P )}
dνm (xm ) . . . dν1 (x1 )
#
(X` · 1 {X` ≤ f` (P )})
`=1
= c · E [Z · 1 {X1 ≤ f1 (P ), . . . , Xm ≤ fm (P )}]
)#
"
(
m
Y
f` (P )
≤c·E Z ·1 Z ≤
`=1
Z
=c·
Qm
`=1 f` (P )
z dν(z) = c · βν
z=0
m
Y
!
f` (P ) .
`=1
Therefore,
Q
Q
f` (P ))}
1 {Pi ≤ c · βν ( m
β` (f` (P ))}
1 {Pi ≤ c · m
`=1
`=1
Q
Q
≤ 1,
≤ E ·······················································
E ······················································
c· m
c· m
`=1 f` (P )
`=1 f` (P )
where the last step holds by Lemma 1(c).
APPENDIX B: PROOF OF INVERSE-BINOMIAL LEMMA 2
The
bound follows immediately from Jensen’s inequality, since E [Z] =
Plower
n
1 + b i=1 ai . We split the argument for the upper bound into three cases.
Case 1: integer weights. First, suppose that all the weights ai are integers,
that is, ai ∈ {0, 1} for all i. In this case, we have Z ∼ 1 + Binomial(k, b),
where k is the number of weights ai that are equal to 1. A simple calculation
40
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
shows that
X
k
1
k z
1
=
b (1 − b)k−z
E
1 + Binomial(k, b)
1+z z
z=0
k
X
1
k + 1 z+1
=
b (1 − b)(k+1)−(z+1)
b(1 + k)
z+1
z=0
1
=
· Pr{Binomial(k + 1, b) ≤ k}
b(1 + k)
1
1
P
≤
=
.
b(1 + k)
b(1 + i ai )
Case 2: one non-integer weight. Suppose that exactly one of the weights ai
is a non-integer. Without loss of generality we can take a1 = · · · = ak = 1,
ak+1 = c, ak+2 = · · · = an = 0, for some k ∈ {0, . . . , n − 1} and some
c ∈ (0, 1). Let A = Z1 + · · · + Zk+1 ∼ Binomial(k + 1, b), and Y = Zk+1 ∼
A
Bernoulli(b). Note that Pr{Y = 1 | A} = 1+k
. Then
1
1
=E
E
Z
1 + A − (1 − c)Y
1
=E E
A
1 + A − (1 − c)Y
1
1
=E
· Pr{Y = 0 | A} +
· Pr{Y = 1 | A}
1+A
c+A
1
1
1
=E
+
−
· Pr{Y = 1 | A}
1+A
c+A 1+A
1
1−c
A
=E
+
·
1 + A (c + A)(1 + A) 1 + k
1
1−c
1+k
≤E
+
·
,
1 + A (c + 1 + k)(1 + A) 1 + k
where the inequality holds since
Simplifying, we get
A
c+A
≤
1+k
1+k+c
because 0 ≤ A ≤ k + 1.
1
1
2+k
1
2+k
1
1
P
E
≤E
·
≤
·
=
=
,
Z
1+A 1+k+c
b(2 + k) 1 + k + c
b(1 + k + c)
b(1 + i ai )
where the inequality uses the fact that E
calculated in Case 1.
h
1
1+Binomial(k+1,b)
i
≤
1
b(2+k)
as
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
41
Case 3: general case. Now suppose
P that there are at least two non-integer
weights, 0 < ai ≤ aj < 1. Let C = `6=i,j a` Z` , then Z = 1+C +ai Zi +aj Zj .
Let α = min{ai , 1 − aj } > 0. Then
C = b2 ·
1
1
1
1
+b(1−b)·
+b(1−b)·
+(1−b)2 ·
1 + C + ai + aj
1 + C + ai
1 + C + aj
C
1
1
1
1
≤ b2 ·
+b(1−b)·
+b(1−b)·
+(1−b)2 · ,
1 + C + ai + aj
1 + C + (ai − α)
1 + C + (aj + α)
C
E
1
Z
where the inequality follows from a simple calculation using the assumption
that α ≤ ai ≤ aj ≤ 1 − α. Now, define a new vector of weights ã where
e = 1 + P ã` Z` ,
ãi = ai − α, ãj = aj + α and ã` = a` if ` ∈
/ {i,hj}.i Defining Z
`
the above calculation proves that E Z1 ≤ E 1e (by marginalizing over C).
Z
P
P
Note that
i ãi , but ãi has (at least) one fewer non-integer
i ai =
weight. Repeating this process inductively, we see that we can reduce to the
case where there is at most one non-integer weight (i.e., Case 1 or Case 2).
This proves the lemma.
APPENDIX C: PROOF OF GROUP SUPER-UNIFORMITY LEMMA 3
The proof of Lemma 3(c) is straightforward, by applying Lemma 1(c).
More precisely, define an augmented vector P 0 = (P1 , . . . , Pn , T (PAg )) ∈
[0, 1]n+1 , and define a function f 0 (P 0 ) = f (P1 , . . . , Pn ) = f (P ). Since T (PAg )
0
is assumed to be superuniform (since g ∈ Hgrp
is a null group), this means
0
that Pn+1 = T (PAg ) is superuniform, i.e. index n + 1 is a null p-value, in the
augmented vector of p-values P 0 . Then applying Lemma 1(c), with P 0 and
f 0 in place of P and f , and with index i = n + 1, yields the desired bound.
Lemma 3(a) is simply a special case of Lemma 3(b) since independence is
a special case of positive dependence, and conditioning on an independent
set of p-values P−Ag doesn’t change the distribution of PAg .
For Lemma 3(b), our proof strategy will be to reduce this statement
into a form where Lemma 1(b) becomes applicable. (Note that we cannot
simply take the approach of our proof of Lemma 3(c), because if we define
an augmented vector of p-values P 0 = P1 , . . . , Pn , Simesw (PAg ) , we do not
know if this vector is positively dependent—specifically, whether P 0 is PRDS
0
on entry Pn+1
= Simesw (PAg ).)
With this aim in mind, let b
kg ∈ {0, . . . , ng } be the number of discoveries
made by the BHw procedure when run on the p-values within group g at
level f (P ). Then, using the connection between the Simes test and the BH
42
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
procedure, we may write
n
o
P
wi b
kg f (P )
n
o b
1
P
≤
i
kg
i∈Ag
ng
1 {Pg ≤ f (P )} = 1 b
kg > 0 = ····· = ··················································,
b
b
kg
kg
since for the BHw procedure at level f (P ), the ith p-value Pi will be rejected
if and only if Pi ≤
wi b
kg f (P )
.
ng
Hence, we may conclude that
n
o
n
o
wi b
kg f (P )
eg (P )
1
P
≤
1
P
≤
f
X
i
i
1 {Pg ≤ f (P )}
1
i∈Ag
ng
····························· = ·················································· =
wi ································,
f (P )
n
b
g
kg f (P )
feg (P )
i∈Ag
P
wb
k f (P )
where we have defined feg (P ) := i ng g . Taking expectations on both sides
and applying Lemma 1(b) immediately proves Lemma 3(b). (Specifically, we
know that P 7→ b
kg is a non-increasing function of P , and P 7→ f (P ) is also
assumed to be non-increasing; therefore, feg is also non-increasing in P .)
Given that Lemma 3(b) is proved, the proof of Lemma 3(d) follows exactly
the same argument as above, except that in the very last equation, Pi is
replaced by Si , and Lemma 3(b) is invoked in place of Lemma 1(b).
APPENDIX D: PROOF OF “MAXIMUM-CORNER” PROPOSITION 6
(m)
(m)
(m)
(m)
For each m, by definition of b
km , there is some k , . . . , k
,k
,...,k
1
m−1
m+1
M
such that
(D.1)
(m)
(m)
(m)
(m)
b.
(k1 , . . . , km−1 , b
km , km+1 , . . . , kM ) ∈ K
(m)
Thus, for each m0 6= m, b
km0 ≥ km0 by definition of b
km0 . Then
(m)
(m)
b
b b
b
b (m) , . . . , k (m) , b
bb
S(k
1
m−1 km , km+1 , . . . , kM ) ⊆ S(k1 , . . . , km−1 , km , km+1 , . . . , kM ) ,
b 1 , . . . , kM ) is a nondecreasing function of (k1 , . . . , kM ), and this
because S(k
immediately implies
(m)
(m)
(m)
(m)
Sbm (k1 , . . . , km−1 , b
km , km+1 , . . . , kM ) ⊆ Sbm (b
k1 , . . . , b
km−1 , b
km , b
km+1 , . . . , b
kM ).
Therefore, for each layer m,
X
u(m)
≥
g
g∈Sbm (b
k1 ,...,b
km )
X
(m)
g∈Sbm (k1
u(m)
≥b
km ,
g
(m)
(m)
(m)
,...,km−1 ,b
km ,km+1 ,...,kM )
where the second inequality holds by observation (D.1), and by definition of
b as the set of feasible vectors. Since this holds for all m, this proves that
K
b
(b
k1 , . . . , b
kM ) is itself a feasible vector, and hence (b
k1 , . . . , b
kM ) ∈ K.
43
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
APPENDIX E: PROOF OF THEOREM 7.1
To be able to handle all four cases of the theorem, we define a function γm to
be the identity if we are not using reshaping (theorem statements (a,b)), or
γm = βm if we are using reshaping (theorem statements (c,d)). We also let
π
bm = 1 and λm = 1 if we are not using adaptivity (as in theorem statements
(b,c)), or let π
bm be defined as in (7.2) for theorem statements (a,d) where
adaptivity is used.
Fix any partition m. Since Pr{Pi = 0} = 0 for any i ∈ H0 by assumption,
we assume that Pi 6= 0 for any i ∈ H0 without further mention; this assump0 ,
tion then implies that if g ∈ Sbm (b
k1 , . . . , b
kM ) for some null group g ∈ Hm
b
we must have km > 0. We can then calculate
n
o
P
(m)
b
bm (b
1
g
∈
S
k
,
.
.
.
,
k
)
0 ug
1
M
g∈H
m
b
b
n
o
FDP(m)
u (k1 , . . . , kM ) = ··········································································
P
(m)
b
b
b
u
1
g
∈
S
(
k
,
.
.
.
,
k
)
m 1
M
g∈[Gm ] g
n
o
P
(m)
1 g ∈ Sbm (b
k1 , . . . , b
kM )
0 ug
g∈Hm
≤ ·········································································,
b
km
o
n
P
(m)
init (b
b
bm
k
,
.
.
.
,
k
)
u
1
g
∈
S
0
g
1
M
g∈Hm
≤ ···········································································,
b
km
n
o
P
(m)
km )
m ≤ min{w (m) αm γm (b
u
1
P
,
λ
}
0
g
g
m
g
g∈Hm
π
bm Gm
= ·······························································································,
b
km
b the
where the first inequality follows by definition (7.7) of the feasible set K,
init
second follows since Sbm (~k) ⊆ Sbm (~k) for any ~k by definition, and the last
init (~
step uses the definition of Sbm
k) in (7.3a) (without reshaping, for theorem
statements (a,b)) or (7.3b) (with reshaping, for theorem statements (c,d)).
(m)
Multiplying the numerator and denominator of each term by
taking expectations on both sides, we deduce that
αm wg
Gm
, and
(E.1)
FDR(m)
≤
u
αm
Gm
(m)
wg αm γm (b
km )
m
, λm }
X
π
bm Gm
1 Pg ≤ min{
(m) (m)
.
ug wg E ······································································
(m)
0
g∈Hm
wg
αm b
km
Gm
With these calculations in place, we now prove the four statements of the
theorem.
44
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
(m)
Theorem statement (a). Define the function fg
that maps the vector P
Note that
is a nonincreasing function of P , since b
km is
to
a nonincreasing function of P by definition of our procedure, while π
bm is a
nondecreasing function of P .
Returning to (E.1), we then see
(m)
wg αm b
km
m
1 Pg ≤ min{ πbm Gm , λm }
αm X (m) (m)
FDR(m)
≤
u
w
E
·······························································
u
g
g
(m)
Gm
km
wg αm b
0
g∈Hm
π
bm πbm Gm
n
o
m ≤ f (m) (P )
1
P
X
g
m
g
αm
(m)
=
u(m)
g wg E 1 Pg ≤ λm · ·······································
(m)
Gm
π
bm fg (P )
0
g∈Hm
o
n
(m)
m
αm X (m) (m) 1 Pg ≤ fg (P )
(E.2)
ug wg E ·······································
,
≤
−g (m)
Gm
π
b
f
(P
)
0
m
g
g∈Hm
(m)
km
wg αm b
π
bm Gm .
(m)
fg
where
(E.3)
−g
π
bm
:=
|u(m) w(m) |∞ +
P
h6=g
n
o
(m) (m)
(m)
uh wh 1 Ph > λm
n(1 − λm )
.
−g
Note that, on the event Pgm ≤ λm , we have π
bm = π
bm
, which allows the
inequality (E.2) above. Returning to (E.2), we now condition on P−Am
for
g
each group g:
o
n
m ≤ f (m) (P )
1
P
X
g
g
αm
(m)
u(m)
FDR(m)
≤
g wg E ·······································
u
−g (m)
Gm
π
bm fg (P )
0
g∈Hm
o
n
m ≤ f (m) (P )
1
P
X
g
g
αm
(m)
u(m)
P−Am
=
g wg E E ·······································
g
(m)
−g
Gm
π
bm fg (P )
0
g∈Hm
o
n
m ≤ f (m) (P )
1
P
X
g
g
1
(i) αm
(m)
=
u(m)
P−Am
g wg E
−g E ·······································
g
(m)
Gm
π
b
m
fg (P )
0
g∈Hm
αm X (m) (m)
1
≤
ug wg E −g ,
Gm
π
bm
g∈H0
m
−g
where equality (i) holds because π
bm
is a function of only the p-values outside
of group g, i.e. of P−Am
,
while
the
last
inequality holds by Lemma 3(a).
g
45
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
Finally, observe that independence between the different groups of partition m implies that the indicator variables 1 {Phm > λm } are independent
Bernoulli’s with probabilities ≤ 1 − λm of success. Thus, as a consequence
of Lemma 2, we can prove (analogous to property (5.5)) that
1
Gm
(E.4)
E −g ≤ P (m) (m) .
π
bm
uh wh
0
h∈Hm
Plugging this back into our bounds on FDR, we finally obtain
αm X (m) (m)
1
(m)
FDRu ≤
ug wg E −g
Gm
π
bm
0
g∈Hm
≤
Gm
αm X (m) (m)
ug wg
P
(m) (m)
Gm
uh wh
0
g∈Hm
0
h∈Hm
≤ αm .
Theorem statement (b). The proof of statement (b) follows the same steps
as for (a), but without the need to condition on P−Am
, since we do not
g
w
(m)
(m)
α b
k
(m)
is a
use adaptivity. Define the function fg (P ) = g Gmm m . Then fg
nonincreasing function of P , since b
km is a nonincreasing function of P .
Returning to (E.1), as in the proof of statement (a), we calculate
o
n
m ≤ f (m) (P )
1
P
X
g
g
α
m
(m)
.
FDR(m)
≤
u(m)
u
g wg E ·······································
(m)
Gm
f
(P
)
0
g
g∈Hm
" n
o#
(m)
1 Pgm ≤fg
(P )
By Lemma 3(b), we know that E ·····························
≤ 1, and therefore
(m)
fg
FDR(m)
≤
u
(P )
αm X (m) (m)
ug wg ,
Gm
0
g∈Hm
as desired.
Theorem statement (c).
We now turn to proving the method under reshap(m)
w
α
(m)
b
ing. Define
= km , and define constant cg = gGm m . Returning
to (E.1), as before, we calculate
n
o
(m)
m ≤ c(m) · β
f
(P
)
1
P
X
g
m g
g
αm
(m)
.
FDR(m)
≤
u(m)
u
g wg E ····························································
(m)
(m)
Gm
cg · fg (P )
0
g∈Hm
(m)
fg (P )
46
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
"
o #
n
(m)
(m)
1 Pgm ≤cg ·βm fg (P )
≤ 1 since Pgm is
By Lemma 3(c), we know that E ·············································
(m) (m)
cg
·fg
(P )
0 . Therefore,
assumed to be superuniform for any null group g ∈ Hm
αm X (m) (m)
FDR(m)
≤
ug wg .
u
Gm
0
g∈Hm
Theorem statement (d). The proof of part (d) combines the calculations of
part (a) (where adaptivity is used) with part (c) (where reshaping is used).
(m)
w
α
(m)
(m)
−g
bm
is defined as in (E.3) from
Define fg = b
km and cg = g−g m , where π
π
bm Gm
(m)
cg
part (a). Note that
is no longer a constant, but nonetheless, proceeding
as in part (a), we can calculate
n
o
(m)
m ≤ c(m) · β
1
P
f
(P
)
X
g
g
m
g
αm
(m)
.
FDR(m)
≤
u(m)
u
g wg E ····························································
(m)
(m)
−g
Gm
π
bm · cg · fg (P )
0
g∈Hm
Next we condition on the p-values outside the group Am
g :
n
o
(m)
m ≤ c(m) · β
f
(P
)
1
P
X
g
g
m
g
αm
(m)
FDR(m)
≤
P−Am
u(m)
u
g wg E E ····························································
g
(m)
(m)
−g
Gm
π
b
·
c
·
f
(P
)
0
m
g
g
g∈Hm
n
o
(m)
(m)
m ≤c
1
P
·
β
f
(P
)
X
g
g
m
g
αm
(m) 1
,
=
u(m)
P−Am
g wg E
−g · E ····························································
g
(m)
(m)
Gm
π
b
m
c
·
f
(P
)
g
g
g∈H0
m
−g
where the last step holds since π
bm
is a function of P−Am
.
g
Finally, we will apply Lemma 3(c) to show that each of these conditional
expected values is ≤ 1. Of course, the subtlety here is that we must condition
(m)
on P−Am
. To do so, note that, after fixing P−Am
, the function fg (P ) can
g
g
be regarded as a function of only the remaining unknowns (i.e. of PAm
), and
g
(m)
is still non-increasing; the value cg is now a constant; and Pgm = Tgm (PAm
)
g
m
is indeed superuniform since, due to the independence of PAm
from
P
−Ag ,
g
its distribution has not changed. Therefore, we can apply Lemma 3(c) (with
in place of P , while P−Am
is treated as constant),
the random vector PAm
g
# g
" n
o
(m)
1 Pgm ≤cg
(m)
·βm fg
(P )
to see that E ·············································
(m) (m)
cg
·fg
FDR(m)
u
(P )
P−Am
≤ 1, and therefore,
g
αm X (m) (m)
1
≤
ug wg E −g .
Gm
π
bm
0
g∈Hm
47
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
−g
Finally, we need to bound π
bm
. As in the proof of part (a), we see that the indicator variables 1 {Phm > λm } are independent, since Phm = Thm (PAm
), and
h
the sets of p-values PAm
are
assumed
to
be
independent
from
each
other.
h
m
Furthermore, since Th (PAm
) is assumed to be a valid p-value, i.e. superunih
0
form for any h ∈ Hm , this means that the variable 1 {Phm > λm } is Bernoulli
with chance ≥ 1 − λm of success. Therefore, the bound (E.4) calculated in
the proof of part (a) holds here as well, and so
FDR(m)
≤
u
αm X (m) (m)
Gm
ug wg
= αm .
P
(m) (m)
Gm
uh wh
0
g∈Hm
0
h∈Hm
This concludes the proof of all four parts of Theorem 7.1.
APPENDIX F: PROOF OF PROPOSITION 7
(s)
(s)
First we introduce some notation: let (k1 , . . . , kM ) be the vector after
(s)
the sth pass through the algorithm. We prove that km ≥ b
km for all m, s,
(0)
b
by induction. At initialization, km = Gm ≥ km for all m. Now suppose that
(s−1)
(s)
km
≥b
km for all m; we now show that km ≥ b
km for all m.
To do this, consider the m-th layer of the s-th pass through the algorithm.
(s)
(s)
(s−1) (s−1)
(s−1)
Before this stage, we have vectors k1 , . . . , km−1 , km , km+1 , . . . , kM ,
(s)
and we now update km . Applying induction also to this inner loop, and
(s)
assuming that km0 ≥ b
km0 for all m0 = 1, . . . , m − 1, we can now prove that
(s)
km ≥ b
km . By definition of the algorithm,
(F.1)
(s)
km
0
= 0 max
km
:
km ∈{0,1,...,Gm }
X
bm (k(s) ,...,k(s) ,k0 ,k(s−1) ,...,k(s−1) )
g∈S
1
m−1 m m+1
M
0
u(m)
≥ km
g
.
(s−1)
(s)
km0 for all m0 = 1, . . . , m − 1, and km0
≥b
km0 for all m0 =
Since km0 ≥ b
m + 1, . . . , M , we have
X
X
u(m)
u(m)
≥
g
g
(s)
(s)
(s−1)
(s−1)
g∈Sbm (k1 ,...,km−1 ,b
km ,km+1 ,...,kM
)
g∈Sbm (b
k1 ,...,b
km−1 ,b
km ,b
km+1 ,...,b
kM )
since Sbm (~k) is a nondecreasing function of ~k by definition. The right-hand
side of this expression is in turn ≥ b
km by definition of (b
k1 , . . . , b
kM ) being a
b
feasible vector. Therefore, km is in the feasible set for Eq. (F.1), and so we
(s)
must have km ≥ b
km . By induction, this is then true for all s, m, as desired.
48
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
(s)
(s)
Now suppose that the algorithm stabilizes at (k1 , . . . , kM ), after s full
passes. After completing the mth layer of the last pass through the algo(s)
(s) (s−1)
(s−1)
rithm, we had vectors k1 , . . . , km , km+1 , . . . , kM ; however, since the al(s−1)
(s)
gorithm stops after the sth pass, this means that km0
= km0 for all m0 .
(s)
Using this observation in the definition of km , we see that
X
(s)
u(m)
≥ km
.
g
(s)
(s)
(s)
(s)
(s)
g∈Sbm (k1 ,...,km−1 ,km ,km+1 ,...,kM )
(s)
(s)
(s)
b and so km
This means that (k1 , . . . , kM ) ∈ K,
≤ b
km for all m by the
definition of b
k1 , . . . , b
km and Proposition 6. But by the induction above, we
(s)
also know that km ≥ b
km for all m at any iteration s; and this completes
the proof.
APPENDIX G: PROPERTIES OF DOTFRACTIONS
In this section we verify that “dotfractions” satisfy many of the same
properties as ordinary fractions, and thus the notation ··ab can be safely used
throughout the proofs of our main results. In all the following, the property
will be shown to hold assuming that all dotfractions appearing in its equation or inequality are well defined. Hence, throughout, we assume that the
various properties are only used if all of the dotfractions in the expression
are defined—that is, we may use these properties only if we never have ··ab
with a 6= 0 and b = 0. As a side note, observe that in the paper, we always
use ··ab when a, b ≥ 0 only.
1. Comparing two fractions:
a
b
c
c
If a ≥ b ≥ 0 and c ≥ 0, then ··· ≥ ··, and ··· ≤ ··.
c
c
a
b
To prove the first bound, if c > 0 then this reduces to ac ≥ cb , while if
c = 0 then we must have a = b = 0 (since, otherwise, ··ac and ··cb would
be undefined) and so ··ac = ··cb = 0. To prove the second bound, if b > 0,
then this reduces to ac ≤ cb , while if b = 0 then we must have c = 0
(since, otherwise, ··cb would be undefined), in which case ··ac = ··cb = 0.
2. Comparing against a scalar:
(G.1)
b
If c ≥ 0 and a ≥ ·· then ac ≥ b.
c
To prove this, if c 6= 0 then we have a ≥ cb , while if c = 0 then we must
have b = 0 (so that ··cb is not undefined), and so ac ≥ b is trivially true
as both sides equal zero.
(G.2)
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
49
3. Adding numerators:
(G.3)
For any a, b, c,
a b
a+b
··· + ·· = ··········.
c c
c
To prove this, if c 6= 0 then this reduces to ac + cb = a+b
c , while if
c = 0 then we must have a = b = 0 (otherwise the dotfractions are
undefined), and so the left- and right-hand sides both equal zero.
4. Multiplying fractions:
(G.4)
For any a, b, c, d,
a c
ac
··· · ··· = ·····.
b d
bd
To prove this, if b, d 6= 0 then this reduces to ab · dc = ac
bd , while if b = 0
or d = 0, then either a = 0 or c = 0 (otherwise ··ab or ··dc would be
undefined), and so the left- and right-hand sides both equal zero.
5. Cancelling nonzero factors :
(G.5)
If c 6= 0 then for any a, b,
ac
a
····· = ···.
bc
b
To see why, we simply apply (G.4) with d = c (noting that, with the
assumption c 6= 0, we have ··cc = 1).
6. Multiplying by a scalar:
(G.6)
For any a, b, c,
a
ac
c · ··· = ·····.
b
b
To see why, if b 6= 0 then this reduces to c · ab = ac
b , while if b = 0 then
we must have a = 0 so that ··ab is not undefined, and so the left- and
right-hand sides are both zero.
While the above properties all carry over from fractions to dotfractions,
there are some settings where familiar manipulations with fractions may no
ac
longer be correct. For example, ··ab =
6 ····
bc when a, b 6= 0 while c = 0. Relatedly,
we cannot add fractions in the usual way, i.e. ··ab + ··dc may not be equal to
ad+bc
ad
··········;
this fails because implicitly we would be assuming that ··ab = ····
bd
bd and
c
bc
··d = ····
in
order
to
make
the
two
denominators
the
same,
which
may
fail if
bd
d = 0 or if b = 0.
REFERENCES
[1] Rina Foygel Barber and Aaditya Ramdas. The p-filter: multilayer false discovery
rate control for grouped hypotheses. Journal of the Royal Statistical Society: Series
B (Statistical Methodology), 2016.
[2] Yoav Benjamini and Marina Bogomolov. Selective inference on multiple families of
hypotheses. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 76(1):297–318, 2014.
50
RAMDAS, BARBER, WAINWRIGHT AND JORDAN
[3] Yoav Benjamini and Yosef Hochberg. Controlling the false discovery rate: a practical
and powerful approach to multiple testing. Journal of the Royal Statistical Society:
Series B (Statistical Methodology), 57(1):289–300, 1995.
[4] Yoav Benjamini and Yosef Hochberg. Multiple hypotheses testing with weights. Scandinavian Journal of Statistics, 24(3):407–418, 1997.
[5] Yoav Benjamini and Wei Liu. A distribution-free multiple test procedure that controls
the false discovery rate. Tel Aviv, Tel Aviv University, 1999.
[6] Yoav Benjamini and Wei Liu. A step-down multiple hypotheses testing procedure that
controls the false discovery rate under independence. Journal of Statistical Planning
and Inference, 82(1):163–170, 1999.
[7] Yoav Benjamini and Daniel Yekutieli. The control of the false discovery rate in
multiple testing under dependency. The Annals of statistics, 29(4):1165–1188, 2001.
[8] Yoav Benjamini, Abba Krieger, and Daniel Yekutieli. Adaptive linear step-up procedures that control the false discovery rate. Biometrika, 93:491–507, 2006.
[9] Gilles Blanchard and Etienne Roquain. Two simple sufficient conditions for FDR
control. Electronic Journal of Statistics, 2:963–992, 2008.
[10] Gilles Blanchard and Étienne Roquain. Adaptive false discovery rate control under
independence and dependence. Journal of Machine Learning Research, 10(Dec):2837–
2871, 2009.
[11] Gunnar Eklund. Massignifikansproblemet. In Unpublished seminar papers, Uppsala
University Institute of Statistics, volume 1963, 1961.
[12] Gunnar Eklund and Paul Seeger. Massignifikansanalys. Statistisk tidskrift, 5:355–365,
1965.
[13] Livio Finos and Luigi Salmaso. FDR-and FWE-controlling methods using data-driven
weights. Journal of Statistical Planning and Inference, 137(12):3859–3870, 2007.
[14] Ruben Gabriel. Simultaneous test procedures–some theory of multiple comparisons.
The Annals of Mathematical Statistics, pages 224–250, 1969.
[15] Yulia Gavrilov, Yoav Benjamini, and Sanat K Sarkar. An adaptive step-down procedure with proven FDR control under independence. The Annals of Statistics, pages
619–629, 2009.
[16] Christopher Genovese, Kathryn Roeder, and Larry Wasserman. False discovery control with p-value weighting. Biometrika, 93(3):509–524, 2006.
[17] Nicholas Heard and Patrick Rubin-Delanchy. Choosing between methods for combining p-values. arXiv preprint arXiv:1707.06897, 2017.
[18] Philipp Heesen and Arnold Janssen. Dynamic adaptive multiple tests with finite
sample FDR control. Journal of Statistical Planning and Inference, 168:38–51, 2016.
[19] Yosef Hochberg and Uri Liberman. An extended Simes’ test. Statistics & Probability
Letters, 21(2):101–105, 1994.
[20] G Hommel. Tests of the overall hypothesis for arbitrary dependence structures.
Biometrische Zeitschrift, 25(5):423–430, 1983.
[21] James Hu, Hongyu Zhao, and Harrison Zhou. False discovery rate control with groups.
Journal of the American Statistical Association, 105(491), 2010.
[22] Samuel Karlin and Yosef Rinott. Classes of orderings of measures and related correlation inequalities. I. multivariate totally positive distributions. Journal of Multivariate
Analysis, 10(4):467–498, 1980.
[23] Eugene Katsevich and Chiara Sabatti. Multilayer knockoff filter: Controlled variable
selection at multiple resolutions. arXiv preprint arXiv:1706.09375, 2017.
[24] Erich Leo Lehmann. Some concepts of dependence. The Annals of Mathematical
Statistics, pages 1137–1153, 1966.
[25] D Morgenstern. Berechnung des maximalen signifikanzniveaus des testes lehneh0 ab,
UNIFIED MULTIPLE TESTING WITH PRIOR KNOWLEDGE
51
wennk untern gegebenen tests zur ablehnung führen. Metrika, 27(1):285–286, 1980.
[26] Joseph Romano and Azeem Shaikh. On stepdown control of the false discovery
proportion. In Optimality, pages 33–50. Institute of Mathematical Statistics, 2006.
[27] Joseph Romano, Azeem Shaikh, and Michael Wolf. Consonance and the closure
method in multiple testing. The International Journal of Biostatistics, 7(1):1–25,
2011.
[28] B Rüger. Das maximale signifikanzniveau des tests:lehneh o ab, wennk untern gegebenen tests zur ablehnung führen. Metrika, 25(1):171–178, 1978.
[29] Ludger Rüschendorf. Random variables with maximum sums. Advances in Applied
Probability, pages 623–632, 1982.
[30] Sanat Sarkar. On methods controlling the false discovery rate. Sankhyā: The Indian
Journal of Statistics, Series A (2008-), pages 135–168, 2008.
[31] Sanat Sarkar. Two-stage stepup procedures controlling FDR. Journal of Statistical
Planning and Inference, 138(4):1072–1084, 2008.
[32] Paul Seeger. A note on a method for the analysis of significances en masse. Technometrics, 10(3):586–593, 1968.
[33] John Simes. An improved bonferroni procedure for multiple tests of significance.
Biometrika, 73(3):751–754, 1986.
[34] Eckart Sonnemann. Allgemeine Lösungen multipler Testprobleme. Universität Bern.
Institut für Mathematische Statistik und Versicherungslehre, 1982.
[35] Eckart Sonnemann. Allgemeine lösungen multipler testprobleme. edv in medizin
und biologie 1982, 13 (4): 120–128. english version of the original article with minor
corrections by finner h: General solutions to multiple testing problems. Biom J, 50
(5):641–656, 2008.
[36] Eckart Sonnemann and Helmut Finner. Vollständigkeitssätze für multiple testprobleme. In Multiple Hypothesenprüfung/Multiple Hypotheses Testing, pages 121–135.
Springer, 1988.
[37] John Storey. A direct approach to false discovery rates. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 64(3):479–498, 2002.
[38] John Storey, Jonathan Taylor, and David Siegmund. Strong control, conservative
point estimation and simultaneous conservative consistency of false discovery rates:
a unified approach. Journal of the Royal Statistical Society: Series B (Statistical
Methodology), 66(1):187–205, 2004.
[39] Samuel A Stouffer, Edward A Suchman, Leland C DeVinney, Shirley A Star, and
Robin M Williams Jr. The american soldier: Adjustment during army life.(studies in
social psychology in world war ii), vol. 1. 1949.
[40] John Wilder Tukey. The Problem of Multiple Comparisons: Introduction and Parts
A, B, and C. Princeton University, 1953.
[41] Vladimir Vovk. Combining p-values via averaging. arXiv preprint arXiv:1212.4966,
2012.
[42] Daniel Yekutieli. Hierarchical false discovery rate–controlling methodology. Journal
of the American Statistical Association, 103(481):309–316, 2008.
Aaditya Ramdas
Departments of Statistics and EECS
University of California, Berkeley
E-mail: [email protected]
Rina Foygel Barber
Department of Statistics
University of Chicago
E-mail: [email protected]
Martin J. Wainwright
Departments of Statistics and EECS
University of California, Berkeley
E-mail: [email protected]
Michael I. Jordan
Departments of Statistics and EECS
University of California, Berkeley
E-mail: [email protected]
| 10math.ST
|
Cooperative Robust Estimation with Local Performance Guarantees
arXiv:1603.05307v1 [cs.SY] 16 Mar 2016
M. Zamani
Abstract— The paper considers the problem of cooperative
estimation for a linear uncertain plant observed by a network of
communicating sensors. We take a novel approach by treating
the filtering problem from the view point of local sensors while
the network interconnections are accounted for via an uncertain
signals modelling of estimation performance of other nodes.
That is, the information communicated between the nodes is
treated as the true plant information subject to perturbations,
and each node is endowed with certain believes about these
perturbations during the filter design. The proposed distributed
filter achieves a suboptimal H∞ consensus performance. Furthermore, local performance of each estimator is also assessed
given additional constraints on the performance of the other
nodes. These conditions are shown to be useful in tuning the
desired estimation performance of the sensor network.
I. I NTRODUCTION
The research on cooperative filtering and estimation of
networked systems has gained much momentum during
the past decade, aiming at developing efficient estimation
algorithms for large assemblies of networked sensors [1]–
[5]. The mentioned references reflect the common trend in
the literature, where the main objective is to accomplish a
globally optimal or suboptimal estimation performance of the
network. Usually, the performance of individual sensors is
not considered in such problems. This observation motivates
the question about a relationship between the estimation
performance of the individual filters within a distributed
estimation network and the performance of the overall network. This paper considers this problem within the specific
framework of distributed H∞ consensus estimation [4], [5].
Our approach also targets the global convergence problem
however not with a brute-force decoupling of the global
solution. Rather we define a local objective function in
terms of uncertain signals capturing the performance of the
other nodes. This leads to decoupling of the distributed filter
while implicitly maintaining a meaningful connection to the
network. This way, the local objective function abstracts the
dependence on other nodes, eliminating the need to consider
their exact models or their raw measurements. Nevertheless,
the convergence of the local filter is dependent on the rest of
the network and we provide conditions that render the H∞
convergence of the network of the filters. Furthermore, by
asserting further conditions on the individual performances
of the other nodes a guaranteed H∞ performance of the
This work was supported by the Australian Research Council under
Discovery Projects funding scheme (project DP120102152). This work was
done while the first author was with the School of Engineering and IT,
UNSW Canberra, Canberra, Australia.
M. Zamani is with the DST Group Australia and V. Ugrinovskii is with
School of Engineering and IT, UNSW Canberra, Canberra, Australia, Email:
{m.zammani,v.ugrinovskii}@gmail.com
V. Ugrinovskii
individual filters is established. These conditions express that
if all the neighbours maintain a certain level of accuracy then
the local filter also guarantees a nominated H∞ performance.
To establish the above relationship, here we analyze the
distributed filter network consisting of estimators solving an
auxiliary optimal filtering problem at every node. In that
sense, our approach bears some resemblance with decentralized control where each controller is constructed to regulate a
local subsystem. The mentioned auxiliary filtering problem
originates in [6], [7]; it was shown in [8] to yield interconnected consensus-type filters that exchange information
between the network nodes although the parameters for each
filter could be computed online in the decentralized fashion.
The new element of this paper compared with [8] is how
the neighboring information is interpreted by each node.
In [8], each node was considered to be agnostic about the
amount of energy in the error between the true state of the
plant and the neighbours’ estimates of that state. In contrast,
here we consider a model where each node perceives a
relationship between the energy in the neighbours’ error and
the accuracy of its own filter. We give a detailed discussion
of this idea later in the paper; for now we only note that
technically our model adds a constraint on the energy in the
error inputs arising in the auxiliary minimum energy problems. Such a constraint has the form of an Integral Quadratic
Constraint previously used in robust decentralized control
problems and filtering problems; e.g., see [9], [10]. However,
unlike those problems, the parameters of the constraints used
here play the role of tunable parameters which are adjusted
according to the desired local and global performance. They
also serve as indicators of sensitivity of the individual filters
to the neighbours’ performance.
The main result of this paper are sufficient conditions on
the network parameters that ensure H∞ performance of the
network consisting of the proposed minimum energy filters.
As mentioned, not only global disturbance attenuation is
guaranteed by these conditions, but also certain local H∞
properties of the node filters are established. We show that
these conditions admit the form of a convex semidefinite
program, which enables constructing a filter network yielding
a suboptimal disturbance attenuation.
Notation: Rn is the Euclidean space of vectors, k · k is
the Euclidean norm, and for any positive semidefinite matrix
X, X = X ′ ≥ 0, kakX , (a′ Xa)1/2 . For 0 < T ≤ ∞,
L2 [0, T ) denotes the Lebesgue space of vector-valued signals
square-integrable on [0, T ). diag[X1 , . . . , XN ] denotes the
block diagonal matrix with X1 , . . . , XN as its diagonal
blocks, and ⊗ is the Kronecker product of matrices. λmin (Z)
is the smallest eigenvalue of a symmetric matrix Z.
II. P ROBLEM F ORMULATION
AND
P RELIMINARIES
A. The plant and the distributed estimator
Consider a linear system
ẋ = Ax + Bw,
n
x(0) = x0 ,
(1)
m
where x ∈ R and w ∈ R are, respectively, the state
and the unknown modeling disturbance input; the latter is
assumed to be L2 integrable on [0, ∞). The matrices A ∈
Rn×n and B ∈ Rn×m are known, however the initial state
x0 is unknown and is considered to be part of the uncertainty
about the system (1).
The main objective of the paper is to determine conditions
under which the plant state x(t) can be estimated by a
network of filters each using its plant measurement
yi = Ci x + Di vi ,
(2)
where i = 1, 2, . . . , N indicates the measurement taken at
node i of the network. Each measurement yi ∈ Rpi is
imperfect, it is subject to a measurement disturbance vi
taking values in Rmi that also belongs to the space L2 [0, ∞)
by assumption. The coefficients of each measured output
are matrices of the matching dimensions, Ci ∈ Rpi ×n ,
Di ∈ Rpi ×mi , with Ei , Di Di′ > 0.
In addition to its direct measurements of the plant, each
node receives information from other nodes of the network,
of the form
cij = Wij x̂j + Fij ǫij ,
(3)
where x̂j is the estimate of state x at the neighbouring
node j. The signal ǫij with values in Rmij represents the
communication errors or uncertainty in the communication
channel, ǫij ∈ L2 [0, ∞). We assume that Gij , Fij Fij′ > 0.
The network graph describing communications between
the filtering nodes is assumed to be directed, its node and
edge sets are denoted V = {1, . . . , N } and E ⊆ V × V,
respectively. The neighborhood of node i, i.e., the set of
nodes which send information to node i, is denoted by Ni =
{j : (i, j) ∈ E} and its cardinality is denoted li . The Laplace
matrix of the network graph is denoted L [11].
Following [1], [2], [4] and many other papers on distributed estimation, we consider a class of consensus-based
interconnected filters each processing the direct measurements yi and neighbours’ information cij by means of a
Luenberger-type observer of the form
X
x̂˙ i = Ax̂i + Li (yi − Ci x̂i ) +
Kij (cij − Wij x̂i ), (4)
j∈Ni
x̂i (0) = ξi .
The estimation problem in this paper is to determine
coefficients Li , Kij (which can be time-varying) that ensure
convergence of the network to trajectories of the plant, and
also guarantee an acceptable attenuation of the detrimental
effects of disturbances on the estimation error. Formally,
these properties are formulated as follows. Given a positive
semidefinite matrix P ∈ RnN ×nN and a collection of
positive semidefinite matrices Xi ∈ Rn×n , and constants γ 2
and γ̄i2 , i ∈ V, we wish to determine a collection of filters
of the form (4) that guarantee the following properties:
P1. In the absence of disturbances w, vi and ǫij , j ∈ Ni ,
i = 1, . . . , N the estimation error of the filter ei (t) =
x̂i (t) − x(t) converges to zero asymptotically.
P2. In the presence of disturbances, the network of filters (4)
attains the type of H∞ disturbance attenuation property
Z ∞
N
X
kx(0) − ξi k2Xi + N kwk22
kek2P dt ≤ γ 2
0
i=1
!
N
X
X
2
2
kvi k2 +
kǫij k2 , (5)
+
i=1
j∈Ni
where e = [(x̂1 − x) , . . . , (x̂N − x)′ ]′ and k.k22 is the
L2 norm.
P3. Provided the neighbours of node i contribute a sufficient
effort (this will be quantitatively defined later) to assist
i, it is also guaranteed that at that node
Z ∞
h
kei k2 ds ≤ γ̄i2 βi + kx0 − ξi k2Xi
0
Z ∞
X
i
kwk2 + kvi k2 +
+
kǫij k2 ds ; (6)
′
0
j∈Ni
βi > 0 is a constant which will be determined later.
These properties formalize the desired attributes of a
distributed filter that we want to achieve. In particular, property P2 specifies the desired global disturbance attenuation
performance across the sensor network using a network of
decoupled filter equations (4). Note that decoupled equations governing the gains in filters (4) will be provided
later. Furthermore, property P3 articulates the desired local disturbance attenuation provided that there is sufficient
contribution from the neighbours. The sufficient contribution
condition is quantitatively defined later in the paper.
We remark that properties P1, P2 jointly generalize the
property of H∞ consensus introduced in [4]; also see [5],
[12]. For example, let P = (L + L⊤ ) ⊗ P0 where P0 =
P0′ ≥ 0, and L⊤ is the Laplacian matrix of the graph
obtained from the network graph by reversing its edges.
This choice of P results in the left hand side of (5) being
equal toR thePweighted
H∞ disagreement cost between the
P
∞
2
kx̂
nodes, 0
i − x̂j kP0 ds [4], [5], [13]. More
i
j∈Ni
generally, letting P = (L + L⊤ ) ⊗ P0 + diag[P1 . . . PN ],
Pi = Pi′ > 0, reduces P1, P2 to the property of strong robust
synchronization introduced in [12]. In addition, property
P3 describes H∞ attenuation properties of individual node
filters. Including such property into analysis constitutes the
main difference between the problem posed above and the
previous work in the area of distributed estimation.
B. Representation of the neighboring information
To make performance analysis of individual filters possible, let us introduce the mismatch between the disturbancefree information contained in the signal cij and the corresponding true version of this information,
ηij = Wij (x̂j − x) = −Wij ej ∈ Rpij ,
j ∈ Ni .
(7)
PSfrag replacements
With these signals the information received by sensor i can
be represented as
cij = Wij x + ηij + Fij ǫij ,
j ∈ Ni .
j∈Ni
+Li Di vi +
Kij (ηij + Fij ǫij ),
(9)
j∈Ni
ηki = Wki ei ,
i ∈ Nk .
In this system, the signals ηij , j ∈ Ni , play the role
of exogenous disturbances and each signal ηki = Wki ei
represents the output used by agent k for whom i is the
neighbour, i.e., i ∈ Nk . This interpretation allowed us to
construct in [8] minimum energy filters of the form (4) with
the property that for any initial condition x0 , arbitrary L2 integrable disturbances w, vi , ǫij , ηij and an arbitrary T > 0
Z Th
Z T
kwk2 + kvi k2
kei k2Ri dt ≤ γ 2 kx0 − ξi k2Xi +
0
0
i
X
2
2
+
(kǫij k + kηij kZ −1 ) dt . (10)
j∈Ni
ei
ηki
+
(8)
Equation (8) can be regarded as an additional measurement
of the plant affected by disturbances ǫij and ηij .
Treating the signals ηij , for the purpose of filter derivation,
as the disturbances additional to w, vi and ǫij has an effect
of decoupling node i from its neighbours. Indeed, consider
the error dynamics of the filter (4) at node i,
X
ėi = A − Li Ci −
Kij Wij ei − Bw
X
Fij ǫij
w
vi
ij
Here, γ 2 and Ri = Ri′ > 0 are a positive constant and
matrices whose existence is determined by certain LMI
′
conditions in [8]. Also, Zij = Zij
> 0 are given matrices;
in [8] they were associated with the confidence of node i
about performance of node j.
Condition (10) provides an H∞ type bound on the energy
in the filter estimation errors at node i expressed in terms
of the energy of the disturbances affecting that node, and
is similar to (6) in property P3. The important difference
between (10) and (6) is that the former condition includes
the energy in the signals ηij that depend on the neighbours’
accuracy. Also, according to (10), the same level of disturbance attenuation γ 2 is stated for all nodes. Our goal is
to revisit the design of the filters (4) to obtain a possibly
sharper H∞ property for at least some of the local filters,
and for other filters, to provide a means for assessing their
local performance and sensitivity to the neighbours’ errors.
Owing to the relation ηij = −Wij ej , from the viewpoint
of node i, the error dynamics of the network can be seen as
an interconnection of two systems, representing, respectively,
i’s own error dynamics and the errors dynamics of the rest
of the system; see Figure 1. Motivated by (10), we propose
the following condition to formally capture the sensitivity of
each node to the accuracy of its neighbours’ filters:
For every i, there exist positive definite symmetric matrices
Z̄ij and constants dij ≥ 0, j ∈ Ni , such that for all t ∈
Fki ǫki
ηij
Fig. 1.
Other
subsystems
+
vj , ǫkj j 6= i
w
A two-block representation of the error dynamics system.
[0, ∞) and w, vi , ǫij ∈ L2 [0, t),
Z t
Z t
2
kηij kZ̄ −1 dt ≤
(kei k2 + kwk2 )dt + dij ,
0
ij
(11)
0
∀j ∈ Ni , i = 1, . . . , N.
As a generalized form of the property (10), condition (11)
reflects how the neighbours’ accuracy influences the local
disturbance attenuation property (6) at every node. Therefore
in what follows, we will use condition (11) to establish (6),
i.e., (11) is the quantitative characteristic of the neighbours’
effort mentioned in P3.
To demonstrate the role of (11) more vividly, take for
example Z̄ij = z̄ij I, with a scalar z̄ij > 0 and suppose (6)
holds provided (11) is satisfied with a very small z̄ij . Since
according to (6), the energy in ei is bounded, (11) suggests
that node i can only tolerate relatively ‘small’ mismatch
inputs ηij to be able guarantee (6). However, a small energy
in ηij can only be accomplished by the corresponding
neighbour j. This suggests that the eigenvalues of Z̄ij may
be indicative of sensitivity of the local filters to fidelity of its
neighbours’ estimates. In Section IV we will show that the
matrices Z̄ij can be computed jointly with the attenuation
levels γ 2 , γ̄i2 . This provides the means for performance
tuning of the local filters.
Similarly, the constants dij in (11) describe the bound
on the estimation error energy that node i is prepared to
tolerate from its neighbour j, in response to (hypothetically)
estimating the perfectly known plant (w = 0) with the
utmost precision (ei = 0). Indeed, in this hypothetical case,
condition (11) reduces to a bound on the energy in the
mismatch disturbance signal ηij of the neighbour j.
C. Distributed estimation problem
We are now in a position to present a formal definition of
the distributed estimation problem described in Section II-A.
Problem 1: Determine a collection of filters of the form
(4) and matrices Z̄ij ∈ Rpij ×pij , j ∈ Ni , i ∈ V, and
constants γ 2 and γ̄i2 such that the following conditions hold:
(i) Given a positive semidefinite matrix P ∈ RnN ×nN ,
the network of filters (4) achieves properties P1 and
P2 with this P and the found γ 2 .
(ii) The following implication holds with the found Z̄ij and
γ̄i2 : If signals ηij (t), j ∈ Ni , satisfy (11), then the filter
(4) guarantees the satisfaction of condition (6), i.e., P3
is satisfied.
We stress that the global performance properties P1 and P2
of the proposed distributed filter will be proved without using
condition (11). The IQC (11) will only be used to guarantee
certain local performance of each node i subject to acceptable performance of its neighbours. The latter development
will be analogous to how IQCs were used in the derivation
of decentralized robust controllers to quantify the uncertainty
arising from system interconnections; e.g, see [9], [14].
However, different from decentralized controllers in those
references, our aim is to maintain coupling between the
filters, to ensure cooperation between them.
III. D ISTRIBUTED
MINIMUM ENERGY FILTERING WITH
LOCAL PERFORMANCE GUARANTEES
In this section, our main results are presented. As was
explained in Section II-B, our goal is to obtain a converging
(in the H∞ sense) distributed filter which provides global
estimation performance described in item (i) of Problem 1,
and also characterize quantitatively the connection between
local H∞ properties of the filters and their sensitivity to
estimation accuracy of their neighbours.
To solve Problem 1, we first introduce an auxiliary robust
minimum energy filtering problem involving a modified version of the standard minimum energy cost [6]. This cost func′
′
. . . ηij
]′ ,
tional, depending on the signals w and ηi , [ηij
1
li
affecting the measurements yi |[0,t] and {cij |[0,t] j ∈ Ni }
available at node i is as follows:
J¯i,t (x, w, ηi )
Z
1 t
1
kwk2 + kyi − Ci xt,x k2E −1
= kxt,x (0) − ξi k2Xi +
i
2
2 0
X
t,x
2
+
kcij − Wij x − ηij kG−1
ij
j∈Ni
−2
t,x
2
−γ kx − x̂i kRi ds;
(12)
Compared to the standard minimum energy cost functional, it includes the additional weighted penalty on the
tracking error at node i; see the last term in (12). It
was shown in [8] that the inclusion of this term enforces
a guaranteed H∞ -type performance of the filter while a
minimum energy estimate is sought; cf. [15]. The weight
matrix of this term, Ri = Ri′ > 0, Ri ∈ Rn×n was
regarded as parameters of the filter, and a process of selecting
those matrices to optimize γ 2 was proposed in [8]. However,
different from [8], the cost (12) does not include a direct
quadratic penalty on ηij . Instead, our derivation of the local
filters will impose the constraint (11) on the mismatch signals
ηij , j ∈ Ni .
With these modifications, the auxiliary robust minimumenergy filtering problem consists of determining a set of the
unknowns x, w, ηi compatible with the measurements yi and
the communications cij and minimizing the energy cost (12)
subject to the constraint (11):
¯
inf
inf Ji,t (x, w, ηi ) .
(13)
inf
x
w∈L2 [0,t] ηi ∈Ξi,t
Here Ξi,t denotes the class of vector signals ηi obtained by
stacking up all ηij , j ∈ Ni , satisfying (11). Originated from
the minimum energy filtering [6] and least square fitting,
this problem will lead to the ‘most likely’ minimum-energy
trajectory x∗i,t (·) compatible with the data at node i, y|[0,t] ,
cij |[0,t] [6]. The subscripts i, t at x∗i,t (·) are to highlight that
the trajectory x∗i,t (·) is consistent with the data collected on
the interval [0, t] at node i. By definition, the end point of this
trajectory is the minimum-energy estimate of the state x(t),
given the measurement data y|[0,t] , cij |[0,t] : x̂i (t) , x∗i,t (t).
To solve the constrained optimization problem (13), we
apply the method of S-procedure [14]. In fact, since the cost
J¯i,t (x, w, ηi ) itself depends on x̂i (·), this requires us to solve
a family of minimum energy filtering problems, in which x̂i
is replaced with an arbitrary signal x̄i . Then we take the
fixed point of the mapping x̄i (t) → x∗i,t (t) generated by this
family of minimum energy filtering problems, as x̂i (t). Due
to lack of space, we omit the details and proceed assuming
that x̂i (t) is such a fixed point.
Let τi ∈ Rn be a vector τi = [τi1 . . . τiN ]′ such that
τij > 0 if j ∈ Ni , and τij = 0 otherwise. Then define
X τij Z t
τi
kηij k2Z̄ −1
(x, w, ηi ) = J¯i,t (x, w, ηi ) +
J¯i,t
ij
2 0
j∈Ni
− kxt,x − x̂i k2 − kwk2 − kyi − Ci xt,x k2
X
−
kcir − Wir xt,x − ηir k2 ds
(14)
r∈Ni
and for fixed t and x̂i (·), x, consider the unconstrained
optimization problem
V̄iτi (x, t) =
inf
w,ηi ∈L2 [0,t]
τi
(x, w, ηi ).
J¯i,t
(15)
For each t, x, the optimization problem (15) is a standard
optimal tracking problem with a fixed terminal condition
x(t) = x, which has a unique solution under the condition
X
τij < 1.
(16)
j∈Ni
We now establish a relationship between this problem and
the constrained inner optimization problem in (13).
Let Ti (t, x) , {τi : (16) holds and V̄iτi (x, t) > −∞}.
Also for convenience, define a vector di ∈ Rn whose jth
component is dij if j ∈ Ni and is 0 otherwise.
Lemma 1: For every x̂i (·), x ∈ Rn , if the corresponding
set Ti (t, x) is nonempty, then the value of the inner optimization problem in (13) is finite,
τ ′ di
.
V̄iτi (x, t) − i
inf J¯i,t (x, w, ηi ) ≥ sup
w∈L2 [0,t],
2
τi ∈Ti (t,x)
ηi ∈Ξi,t
(17)
From Lemma 1, a lower bound on the value of the
problem (13) follows:
inf
x
inf
w∈L2 [0,t],
ηi ∈Ξi,t
≥ inf
x
J¯i,t (x, w, ηi )
τ ′ di
V̄iτi (x, t) − i
.
2
τi ∈Ti (t,x)
sup
(18)
IV. D ESIGN OF
We now consider the following optimization problem
inf V̄iτi (x, t) = inf
inf
x w,ηi ∈L2
x
τi
(x, w, ηi ).
J¯i,t
(19)
A solution to this problem involves the differential Riccati
equation
Q̇τi i = Qτi i A′ + AQτi i − Qτi i Ci′ Ei−1 Ci
X
+
Wij′ Ūij−1 Wij − γ −2 Ri − W̄i Qτi i + Si , (20)
j∈Ni
τi
Qi (0) =
Xi−1 ,
τij−1 Z̄ij ,
τij )In , Ūij , Gij +
Si = 1 −
where W̄i = (
j∈Ni
−1
P
BB ′ .
j∈Ni τij
Lemma 2: Given fixed τi ∈ Ti (t, x) and T > 0. Suppose
the differential Riccati equation (20) has a symmetric nonsingular solution Qτi i = Qτi i (t) on the interval [0, T ]. Then the
following filter computes recursively the minimizer x̂τi i (t) of
the optimization problem (19) on the interval [0, T ],
x̂˙ τi i = Ax̂τi i + Qτi i Ci′ Ei−1 (yi − Ci x̂τi i )
X
τi
−1
′
Wij Ūij (cij − Wij x̂i ) ,
(21)
+
P
j∈Ni
x̂τi i (0)
= ξi .
The value of the optimization problem (19) is finite and for
x̂i = x̂τi i is given by
Z
X
1 t
τi
τi 2
τi 2
ρ̄i,t ,
kcij −Wij x̂i kŪ −1 ds.
kyi −Ci x̂i kE −1 +
ij
i
2 0
j∈Ni
Let
τi : (16) holds and the DRE (20)
T̄i (T ) ,
has a bounded positive definite .
solution on [0, T ].
Lemma 3: For all T > 0, T̄i (T ) ⊆
T
Ti (t, x).
t∈[0,T ], x∈Rn
The following theorem summarizes the above discussion.
2
Theorem 1: Given constants γ 2 and γT
i and matrices Z̄ij ,
j ∈ Ni , suppose the set T̄i (+∞) = T >0 T̄i (T ) is not
empty. Then for any ηij for which condition (11) holds,
the filter (21) computes recursively the process x̂τi i (t) which
satisfies condition (6) with βi = τi′ di .
Compared with the distributed minimum energy filter
in [8], we have now obtained a family of suboptimal minimum energy filters for each node parametrized by τi ∈
T̄i (+∞). To be able to apply Theorem 1, it is necessary
to have a method for computing at least one such vector τi
for every node i. In the next section, we will present an algorithm that accomplishes this task. In addition, this algorithm
obtains the matrices Z̄ij and constants γi2 consistent with the
found γ 2 , thus providing a complete solution to Problem 1.
A ROBUST DISTRIBUTED ESTIMATOR
The algorithm to compute a solution to Problem 1 utilizes
a collection of linear matrix inequalities (LMIs) including
the condition (16) and the following matrix inequalities:
P
′
−2
A Ȳi + Ȳi A + γ̄i
τij I
+
j∈Ni
P
′ −1
− Ci E i Ci +
Wij′ Υij Wij
j∈Ni
B ′ Ȳi
Ȳi = Ȳi′ > 0,
Υij = Υ′ij > 0,
Ȳi B
< 0,
P
τij − 1 I
j∈Ni
Υij < G−1
ij ,
j ∈ Ni ,
τij > 0,
i = 1, . . . , N,
Θ̄ > 0.
(22)
Here, the symmetric matrix Θ̄ is composed as follows. Its
diagonal blocks Θ̄ii are defined as
θ̄ii θ̄ii . . . θ̄ii
0
ii ′
1
li
G−1
0
ij1 . . .
.
.
.
.
..
.
.
.
−1
ii ′
(θl )
0 . . . Gij
(θ1 )
Θ̄ii =
...
i
θ̄0ii =
θ̄kii
=
X
li
,
Wij′ Υij Wij + γ̄i−2 +
j∈Ni
Wij′ k Υijk ,
X
j∈Ni
k = 1, . . . , li .
τij I − γ −2 Pii ,
Also, its off-diagonal blocks Θ̄ij , i, j = 1, . . . , N , j 6= i, are
#
"
−2
Ψ
−
γ
P
0
ij
ij
n×M
j
, i < j,
Θ̄ij =
0Mi ×Mj
0n×Mi
′
Θ̄ji ,
i > j,
where
Ψij =
′
′
−Wij′ Υij Wij − Wji Υji Wji ,
−Wij Υij Wij ,
′
−Wji Υji Wji ,
0
j
j
j
j
∈
∈
6∈
6∈
Ni , i
Ni , i
Ni , i
Ni , i
∈
6∈
∈
6∈
Nj ;
Nj ;
Nj ;
Nj .
The LMIs (22), (16) represent a linear constraint on the
variables Ȳi = Ȳi′ > 0, γ̄i−2 , Υij , τij > 0 (j ∈ Ni ,
i = 1, . . . , N ), and γ −2 . Since γ 2 represents the disturbance
attenuation level in the distributed filter, a suitable set of
filter parameters is of interest which minimizes this variable.
This can be numerically achieved by solving the convex
optimization problem
sup γ −2
∗2
subject to (22), (16).
(23)
Let γ be the value of the supremum in (23).
Theorem 2: Let the pair (A, B) be stabilizable. Given a
positive semidefinite weighting matrix P = P ′ ∈ RnN ×nN ,
suppose γ 2 > γ ∗ 2 , τij , Υij , γ̄i−2 I and Ȳi , j ∈ Ni ,
i = 1, . . . , N , are a feasible collection of matrices and
scalars that satisfy the constraints of the convex optimization
problem (23). Then each Riccati equation (20) with Ri =
(γ/γ̄i )2 has a positive definite bounded solution on [0, ∞).
Furthermore, the corresponding filtering algorithm (21), (20)
verifies claims (i) and (ii) of Problem 1.
TABLE I
S OLUTIONS TO THE PROBLEM (23)
Simulation 1: Z̄ij > 0
Simulation 2: Z̄ij > 0.1I
γ 2 = 0.2500
γ 2 = 0.3116
simulation indicates that robustness of the estimators with
respect to accuracy of their neighbours can be improved by
moderately increasing γ 2 and γ̄i2 .
Node
γ̄i2
minj λmin (Z̄ij )
γ̄i2
minj λmin (Z̄ij )
VI. CONCLUSIONS
1
2
3
4
5
0.2643
0.0185
0.0181
0.1313
0.0176
2.6219 × 10−4
0.0250
0.0158
2.7548 × 10−4
0.0263
0.6288
0.0260
0.0395
0.2904
0.0265
0.1074
0.3416
0.1788
0.1000
0.2682
In this paper we proposed a distributed filtering algorithm
by utilizing an H∞ minimum-energy filtering approach to
the design of constituent filters. The algorithm employs a
decoupled computation of the individual filter coefficients.
This is achieved by considering the estimation error of
neighbouring agents as additional exogenous disturbances
weighted according to the nodes’ confidence in their neighbours’ estimates. The conditions are obtained under which
the proposed filter to provides guaranteed internal stability
and desired disturbance attenuation of the network error
dynamics. In addition each local filter guarantees certain
disturbance attenuation when assisted by the neighbours.
We have also provided a simulation example that confirms
convergence of the proposed filter in the case a system has
undetectable pairs (A, Ci ) at some of the nodes. Tuning of
the filter is discussed to reduce the dependence of the local
filters from neighbours accurate estimates.
As Theorem 2 shows, solving the SDP problem (23)
allows us to determine the suboptimal γ 2 as well as the
local disturbance attenuation levels γ̄i2 that characterize local
performance of the node filters (see (6)) as well as the matrices Z̄ij in condition (11) consistent with that performance.
Then sensitivity of performance of the obtained local filters
to the neighbours’ accuracy can be assessed using, e.g., the
eigenvalues of Z̄ij , as explained in Section II-B. This process
is illustrated in the example presented next.
V. I LLUSTRATIVE E XAMPLE
R EFERENCES
In this section, a simulated network of five sensor nodes
is considered that are to estimate a three-dimensional plant.
The plant’s state matrix and the input matrix are
#
" #
"
A=
−3.2
10
0
1
−1
1
0 −14.87 0
,
B=
0.4
0.4
0.4
.
(24)
The matrix A corresponds to one of the regimes of the
controlled Chua electronic circuit considered in [13].
The network consists of five nodes, its connectivity is described by the set of directed edges E =
{(1, 3), (2, 3), (3, 1), (3, 2), (3, 4), (4, 3), (4, 5), (5, 4)}. The
matrices Ci were taken from [13] to be C1 = C4 =
0.001 × [3.1923 − 4.6597 1] and C2 = C3 = C5 =
[−0.8986 0.1312 − 1.9703]. Note that none of the pairs
(A, Ci ) are observable, with (A, C1 ) and A, C4 ) being not
detectable. Also following [13], all communication matrices
are taken to be Wij = I3×3 if (i, j) ∈ E. Also, we let
Di = 0.025I1×3 and Fij = 0.5I3×3 .
For the above system two distributed filter designs were
compared. Both filters were designed to achieve a suboptimal
H∞ consensus performance, that is, in (5) we selected P =
(L+L⊤ )⊗I, cf. [4], [5]. First, the optimization problem (23)
was solved with the above parameters. Next, an additional
constraint Z̄ij > 0.1I was imposed. The computed levels
of local H∞ attenuation γ̄i2 and the minimum eigenvalues
of the computed matrices Z̄ij with which the Property P3
is guaranteed by Theorem 2 are shown in Table I. One
can see that in the first case, the filters at nodes 1 and
4 have much larger constants γ̄i2 and substantially smaller
values of eigenvalues of matrices Z̄ij . Together these features
indicate that these filters are significantly more sensitive to
accuracy of their neighbours. This is not unexpected given
that the pairs (A, C1 ), (A, C4 ) are not detectable. The second
[1] R. Olfati-Saber. Distributed Kalman filter with embedded consensus
filters. In Proc. 44th IEEE CDC and 2005 ECC, 8179–8184, 2005.
[2] M. V. Subbotin and R. S. Smith. Design of distributed decentralized
estimators for formations with fixed and stochastic communication
topologies. Automatica, 45(11):2491 – 2501, 2009.
[3] T. R. Nelson and R. A. Freeman. Decentralized H∞ filtering in a
multi-agent system. In Proc. American Contr. Conf., pages 5755–
5760, St. Louis, MO, 2009.
[4] V. Ugrinovskii. Distributed robust filtering with H∞ consensus of
estimates. Automatica, 47(1):1 – 13, 2011.
[5] V. Ugrinovskii and C. Langbort. Distributed H∞ consensus-based
estimation of uncertain systems via dissipativity theory. IET Control
Theory & App., 5(12):1458–1469, 2011.
[6] R. E. Mortensen. Maximum-likelihood recursive nonlinear filtering.
J. Opt. Theory Appl., 2(6):386–394, 1968.
[7] O. Hijab. Minimum Energy Estimation. PhD Dissertation, UC
Berkeley, 1980.
[8] M. Zamani and V. Ugrinovskii. Minimum-energy distributed filtering.
In Proc 53rd IEEE CDC, Los Angeles, CA, 2014. arXiv:1409.5292.
[9] L. Li, V. Ugrinovskii, and R. Orsi. Decentralized robust control
of uncertain Markov jump parameter systems via output feedback.
Automatica, 43(11):1932–1944, 2007.
[10] S. O. R. Moheimani, A. V. Savkin, and I. R. Petersen. Robust filtering,
prediction, smoothing and observability of uncertain systems. IEEE
Transactions on Circuits and Systems. Part 1, Fundamental Theory
and Applications, 45(4):446–457, 1998.
[11] J. Clark and D. A. Holton. A first look at graph theory. World
Scientific, Singapore, 1991.
[12] V. Ugrinovskii. Gain-scheduled synchronization of parameter varying
systems via relative H∞ consensus with application to synchronization of uncertain bilinear systems. Automatica, 50(11):2880–2887,
2014. arXiv:1406.5622 [cs.SY].
[13] V. Ugrinovskii. Distributed robust estimation over randomly switching
networks using H∞ consensus. Automatica, 49(1):160–168, 2013.
[14] I. R. Petersen, V. Ugrinovskii, and A. V. Savkin. Robust Control
Design using H ∞ Methods. Springer-Verlag, 2000.
[15] William M. McEneaney. Robust/H∞ filtering for nonlinear systems.
Syst. Contr. Lett., 33(5):315 – 325, 1998.
[16] M. Athans and P. L. Falb. Optimal control: an introduction to the
theory and its applications. McGraw-Hill, 1966.
| 3cs.SY
|
Published as a conference paper at ICLR 2015
FAST C ONVOLUTIONAL N ETS W ITH fbfft :
A GPU P ERFORMANCE E VALUATION
arXiv:1412.7580v3 [cs.LG] 10 Apr 2015
Nicolas Vasilache, Jeff Johnson, Michael Mathieu,
Soumith Chintala, Serkan Piantino & Yann LeCun
Facebook AI Research
770 Broadway, New York, NY 10003, USA
{ntv,jhj,myrhev,soumith,spiantino,yann}@fb.com
A BSTRACT
We examine the performance profile of Convolutional Neural Network (CNN)
training on the current generation of NVIDIA Graphics Processing Units (GPUs).
We introduce two new Fast Fourier Transform convolution implementations: one
based on NVIDIA’s cuFFT library, and another based on a Facebook authored
FFT implementation, fbfft, that provides significant speedups over cuFFT (over
1.5×) for whole CNNs. Both of these convolution implementations are available in open source, and are faster than NVIDIA’s cuDNN implementation for
many common convolutional layers (up to 23.5× for a synthetic kernel configuration). We discuss different performance regimes of convolutions, comparing areas
where straightforward time domain convolutions outperform Fourier frequency
domain convolutions. Details on algorithmic applications of NVIDIA GPU hardware specifics in the implementation of fbfft are also provided.
1
I NTRODUCTION
Deep convolutional neural networks (CNNs) have emerged as one of the most promising techniques
to tackle large scale learning problems, whether in image and face recognition, audio and speech
processing or natural language understanding. A convolutional layer within these networks provides useful properties such as translation equivariance of activations. A limiting factor for use of
convolutional nets on large data sets was, until recently, their computational expense.
Krizhevsky et al. (2012) demonstrated that training of large CNNs with millions of weights and
massive data sets is tractable when graphics processing units (GPUs) are properly put to use. Since
then, renewed interest in CNNs insufflated a fresh breath in various frameworks and implementations, including Torch (Collobert et al. (2011a)), Theano (Bergstra et al. (2010)), cuda-convnet
(Krizhevsky (2014)) and Caffe (Jia et al. (2014)). Many of these frameworks are based around
codes for NVIDIA GPUs using CUDA (Garland et al. (2008)).
We discuss our contributions to convolution performance on these GPUs, namely using Fast Fourier
Transform (FFT) implementations within the Torch framework. We summarize the theory behind
training convolutional layers both in the time and frequency domain in Section 2. We then detail
our implementations. The first is based on NVIDIA’s cuFFT and cuBLAS libraries (Section 3). We
evaluate our relative performance to NVIDIA’s cuDNN library (Chetlur et al. (2014)) on over 8, 000
different configurations (Section 4). We significantly outperform cuDNN and other time domain
convolution implementations for a wide range of problem sizes.
Our second implementation is motivated by limitations in using a black box library such as cuFFT in
our application domain, which we describe. In reaction, we implemented a from-scratch opensource implementation of batched 1-D FFT and batched 2-D FFT, called Facebook FFT (fbfft),
which achieves over 1.5× speedup over cuFFT for the sizes of interest in our application domain.
This implementation achieves GPU efficiency ratios of over 75% in certain cases. We describe an ongoing effort to further improve the performance of our solution based on algorithmic tiling (Section
6) before we conclude. Our implementation is released as part of the fbcuda and fbcunn opensource libraries at http://github.com/facebook.
1
Published as a conference paper at ICLR 2015
2
C ONVOLUTION
Discrete convolution and cross-correlation are used in CNNs. We quickly summarize these and their
implementation, with a formulation mirroring Mathieu et al. (2013). Forward propagation (fprop)
inputs are a set f of input feature planes xi , i ∈ f . These are cross-correlated1 with f ′ × f different
filter kernel weights w(j,i) , j ∈ f ′ , i ∈ f , producing output feature planes yj , j ∈ f ′ . Each input
and output feature can be part of a minibatch S, so we have x(s,i) and y(s,j) , i ∈ f, j ∈ f ′ , s ∈ S:
y(s,j) =
X
x(s,i) ⋆ w(j,i)
i∈f
The feature planes f are reduced (summed) pointwise. For back-propagation (bprop), the gradient
of the loss with respect to outputs are convolved with the kernels:
X ∂L
∂L
=
∗ w(j,i)
∂x(s,i)
∂y(s,j)
′
j∈f
Reduction is over f ′ here. Finally, the kernel weights are updated using the gradient of the loss with
respect to the weights (accGrad):
X ∂L
∂L
=
⋆ x(s,i)
∂w(j,i)
∂y(s,j)
s∈S
Reduction is over S here. For purposes of this paper, we use set symbols interchangeably to refer to
their size: each input plane is a 2-D matrix of size h × w, and each filter kernel is a 2-D matrix of
size kh × kw 2 . The output planes y(s,i) are of size (h − kh + 1) × (w − kw + 1), and implement
valid-only convolution, as per MATLAB terminology. Input zero padding and input mirror padding
around the margins of the input (ph , pw ) can be optionally added.3
A popular convolution implementation is to unroll the data until the computation is in the form of a
large matrix multiplication (Chellapilla et al. (2006)). This is the strategy followed by many implementors, since matrix multiplication is a well-tuned linear algebra primitive available on virtually
any platform. While it is possible to provide instances of direct calculation that are faster than matrix
unrolling (e.g., for large S, Krizhevsky (2014)), it is challenging to provide an implementation that
is faster for more than just a small subset of possible convolution problems.
Introducing strides in this form of convolution (i.e., performing the convolution at every dh , dw -th
offset) is a popular way to reduce the computational cost at the expense of precision. The memory
accesses required are very similar but with fewer reuse opportunities. On the other hand, by the
convolution theorem, a convolution of two discrete signals can be performed with lower asymptotic
complexity by performing the multiplication in the frequency domain. Applied to the forward pass,
it becomes:
y(s,j) =
X
i∈f
x(s,i) ⋆ w(j,i) =
X
i∈f
F −1 F (x(s,i) ) ◦ F (w(j,i) )∗
where ∗ denotes complex conjugation and ◦ is the pointwise product. The discrete Fourier basis
used is the largest of the two components convolved and the output.4 Linearity of the DFT allows
one to perform the sum above in the Fourier domain if desired. Applying the FFT then yields
a O(Sf f ′ n2 + (Sf + f f ′ + Sf ′ )n2 log n) procedure in lieu of the original O(Sf f ′ n2 k 2 ), n =
h = w, k = kh = kw . Similar transformations apply for the other two passes. We call this
a frequency domain convolution, in contrast to time domain convolution via direct computation.
1
Torch practice is that the forward pass is cross-correlation, hence the ⋆.
2-D can be extended to n-D, n ≥ 1.
3
Input size (h + ph ) × (w + pw ), output size (h + ph − kh + 1) × (w + pw − kw + 1).
4
(h × w)-dimensional or even bigger for performance (Section 3.2).
2
2
Published as a conference paper at ICLR 2015
Strided convolutions via FFT can be implemented efficiently to obtain good performance Brosch &
Tam (2015). We do not consider those in this paper.
3
CU FFT
C ONVOLUTION I MPLEMENTATION
In this section we discuss implementation strategies using the NVIDIA cuFFT libraries and their
efficiency.
3.1
FFT C ONVOLUTION D ETAILS
We described the general formulation for the three types of convolutions in section 2. Here, we
borrow the Torch naming convention: input for x(s,i) ; weight for w(j,i) ; output for y(s,j) ; gradOutput
for ∂L/∂y(s,j) ; gradInput for ∂L/∂x(s,i) ; and gradWeight for ∂L/∂w(j,i) . All are stored as singleprecision floating point 4-D tensors in row-major layout, and are stored in memory using the socalled BDHW format. This is explicit in the expression InS×f ×h×w , with input image row data as
the innermost or most varying dimension.
Table 1 describes the in-order operations for FFT computation of the forward pass, using the
F F T 2D and IF F T 2D operators and Cgemm matrix multiplication. Similar implementations follow for the other two passes. The G prefix denotes gradients. The F suffix denotes C-valued frequency domain tensors; the rest are over R. The T suffix denotes transposed tensors.
Table 1: Implementation detail for forward propagation
INPUT
OUTPUT
F F T 2D
InFS×f ×(h+ph )×(⌊ w+pw ⌋+1)
F F T 2D
−−−−−→
InS×f ×h×w
2
W eif ′ ×f ×kh ×kw
−−−−−→
W eiFf ′ ×f ×(h+ph )×(⌊ w+pw ⌋+1)
InFS×f ×(h+ph )×(⌊ w+pw ⌋+1)
−−−−−−→
T rans2D
InF T(h+ph )×(⌊ w+pw ⌋+1)×S×f
W eiFf ′ ×f ×(h+ph )×(⌊ w+pw ⌋+1)
2
(
InF T(h+ph )×(⌊ w+pw ⌋+1)×S×f
2
∗
W eiF T(h+p
)×(⌊ w+pw ⌋+1)×f ′ ×f
−−−−−−→
2
h
T rans2D
Cgemm
−−−→
2
2
W eiF T(h+ph )×(⌊ w+pw ⌋+1)×f ′ ×f
2
OutF T(h+ph )×(⌊ w+pw ⌋+1)×S×f ′
2
2
OutF T(h+ph )×(⌊ w+pw ⌋+1)×S×f ′
2
OutFS×f ′ ×(h+ph )×(⌊ w+pw ⌋+1)
2
T rans2D
−−−−−−→
OutFS×f ′ ×(h+ph )×(⌊ w+pw ⌋+1)
IF F T 2D
OutS×f ′ ×(h−kh +1)×(w−kw +1)
−−−−−−→
2
Exact tensor dimensions are also given above. By taking advantage of the Hermitian symmetry
property of the 2-D DFT for R-valued inputs we only store about half the complex entries; the
w
remaining can be obtained by complex conjugation. This results in array sizes such as ⌊ w+p
2 ⌋ + 1.
We also perform interpolation by zero-padding, which serves multiple purposes. First, it is necessary
to handle boundary conditions.5 Second, it is required to interpolate all operands over the same
Fourier basis.6 Finally, padding has an impact on the FFT algorithm used in practice, as well as on
the floating point operation count of non-FFT operations (Section 3.2).
Following the conversion into frequency domain, we perform transpositions to prepare the tensors
for Cgemm matrix multiplication library calls. The transposition converts the BDHW layout into
HWBD. The transposition is currently out-of-place and implemented using the Cgeam routine; we
are also considering our own, in-place transposition routine. Cgemm library calls are performed
on transposed tensors in the frequency domain. Casting the operation as a Cgemm call allows us
to benefit from the heavily tuned cuBLAS routine. Eventually, we transpose the result back into
the BDHW format and perform a 2-D inverse FFT. At this point, the resulting real tensor, always
5
6
In this case, we typically have ph = ⌊ k2h ⌋ and pw = ⌊ k2w ⌋.
All tensors are zero-padded to (h + ph ) × (w + pw ) before F F T 2D.
3
Published as a conference paper at ICLR 2015
(h + ph) × (w + pw ), is clipped to the appropriate final size: (h − kh + 1) × (w − kw + 1) for fprop,
h × w for bprop, kh × kw for accGrad.
3.2
CU FFT
D ESIGN S PACE
We now discuss implementation aspects we explored. Multiple factors influence the computational
efficiency of FFTs: transform size n, n’s prime factor decomposition, and whether batched or iterated single transforms are applied. In the deep learning domain, it is commonplace to deal with
small sizes, n 6= 2k . If n has undesirable properties, efficiency can drop by an order of magnitude.7
cuFFT implements FFTs with the ubiquitous Cooley-Tukey algorithm (Cooley & Tukey (1965))
which takes advantage of trigonometric equalities to recursively decompose and reuse computations. This is further discussed in the Supplement. Decomposition is built on specialized kernels of
fixed sizes which correspond to the prime factor decomposition of n. cuFFT implements specialized
building blocks for radix sizes 2, 3, 5, 7, and for sizes n where 4|n, it can use more efficient kernels
exploiting the conjugate symmetry property. When n does not admit a prime factor decomposition
using those radices only, the expensive Bluestein algorithm is used (Bluestein (1970)). Because our
results are used in the time domain, we can in fact zero-pad the image and kernel to perform the FFT
at any larger size that may be handled more efficiently. Exploiting more efficient, larger sizes should
be balanced against the extra cost introduced in the subsequent transposition and matrix multiplication steps. Table 4’s last case is one in which the best tradeoff is not easily guessed. cuFFT also has
batched mode optimizations when multiple FFTs of the same size are being performed.
3.3
CU BLAS
D ESIGN S PACE
The cuBLAS library also comes with different implementations for batched and single operation
modes. We had the choice between 3 implementation options:
• for larger batches over small matrices, the cublasCgemmBatched library call;
• for smaller batches over larger matrices, multiple cublasCgemm calls from the host;
• for intermediate batch and matrix sizes, devices of compute capability 3.5 and higher support dynamic parallelism which allows CUDA kernels to launch other kernels. This can be
beneficial for many launches over small matrices.
Note that the discussion above applies to multiplications after transposition. So the matrix size is
either S × f , S × f ′ or f × f ′ and the number of such matrices is h × w. Vendor libraries are usually
optimized for throughput and not latency, so we expect it to be more efficient for larger sizes along
critical dimensions (i.e., image size for the batch case and S × f , S × f ′ or f × f ′ for the multiple
kernel case). Due to build system limitations we were not able to experiment with the dynamic
parallelism strategy; we leave this for future work.
At the system level, we use CUDA streams and buffering of all CUDA resources and intermediate
buffers to remove synchronization points across convolutions. We are mindful of memory consumption; to address this we keep one single buffered copy of each type of tensor involved. This behavior
is tailored for a bulk synchronous execution of layers on a GPU and is not adapted for multiple
asynchronous convolutions on the same GPU. The buffers are automatically expanded as required
and reused as much as possible.
3.4
AUTOTUNING
We combine the above implementation with a simple autotuning strategy. We devise a strategy
selection mechanism that runs once for each problem size and caches the fastest strategy out of a
few dozen for later reuse. The autotuning strategy explores different possible Fourier basis sizes that
can be decomposed in powers for which cuFFT has an efficient implementation. In other words, for
an FFT dimension of size n, we explore the sizes i ∈ [n, 2⌊log2 n⌋] where i = 2a 3b 5c 7d . When the
input size is a power of 2, the search space is reduced to a single point. In addition to Fourier basis
sizes, we weigh in various cuBLAS calls and asynchronous modes.
7
http://docs.nvidia.com/cuda/cufft/index.html#accuracy-and-performance
4
Published as a conference paper at ICLR 2015
4
4.1
CU FFT
C ONVOLUTION P ERFORMANCE
P ERFORMANCE
VERSUS CU DNN:
8,232 CONFIGURATIONS
We compare our cuFFT convolution results against NVIDIA’s cuDNN 1.0 library (Chetlur et al.
(2014)), which contains one of the fastest, general purpose convolution methods for the GPU, using
matrix unrolling. It has decent performance for many problem sizes thanks to heavy autotuning of
cuBLAS codes for different problems. It is a strong baseline for this reason.
Image CNNs to date have for the most part used square input images and filters, though rectangular filters are valid for other problems (notably text CNNs, Collobert et al. (2011b)). Thus, we
restrict ourselves to a 5-D problem domain {S, f, f ′ , n(= h = w), k(= kh = kw )}. Much of this
space is not used in practice. Some areas are perhaps over-emphasized (large S, small k) due to
current engineering concerns. We evaluate cuDNN vs cuFFT-based convolution for Table 2’s 8, 232
configurations.8
Table 2: Configuration elements evaluated
DIMENSION
SIZES EVALUATED
Minibatch size (S)
Input filters (f )
Output filters (f ′ )
Kernel h/w (k = kh = kw )
Output h/w (y = h − kh + 1 = w − kw + 1)
1, 16, 64, 128
1, 4, 16, 64, 96, 128, 256
1, 4, 16, 64, 96, 128, 256
3, 5, 7, 9, 11, 13
1, 2, 4, 8, 16, 32, 64
Figures 1-6 are performance summaries of cuFFT convolution versus cuDNN on a NVIDIA Tesla
K40m, averaged across all three passes. The y-axis problem size corresponds to the minibatch size
multiplied by number of input and output planes (Sf f ′); each one of these is a pass reduction
dimension. Many possible combinations of S, f, f ′ may map to the same problem size. cuDNN performance varies to a greater degree than cuFFT across passes. This is due to the asymmetry of
convolution sizes in each pass, and the fact that a larger convolution kernel (as seen with gradient
accumulation) is essentially free in the Fourier domain. Averaging the three passes together provides a proxy for overall performance. The x-axis corresponds to output height/width. For deeper
layers in image CNNs, output size will decrease while f, f ′ will increase, so depth corresponds to
moving from the upper right to the lower left of the graph. Black areas in the chart are due to failed
cuFFT runs, due to memory pressure or undetermined potential cuFFT 6.5 issues.
FFT convolutions make large kernel sizes inexpensive, which make the performance of all three
passes roughly equal (Table 4). On the other hand, zero-padding kh × kw to h × w penalizes smaller
kernels compared to cuDNN. For 3 × 3 kernels (Figure 1), cuFFT performance is poor compared
to cuDNN. The overhead of multiple kernel launches, streaming memory in and out multiple times,
and zero-padding to the input size often outweigh the algorithmic advantage of FFT. However, for
the largest problem sizes, 3 × 3 convolution via FFT can still be advantageous, with top speed 1.84×
faster than cuDNN. 5 × 5 kernels (Figure 2) show an increasing dominance of the FFT strategy, with
top speed 5.33× faster. The tendency is confirmed for larger kernel sizes: at 13 × 13, maximum
speedup is 23.54× over cuDNN.
8
Parameterized on output rather than input size h, w because the implied h = y + kh − 1, w = y + kw − 1
will be valid for any choice of kh , kw .
5
Published as a conference paper at ICLR 2015
1/16x
16x
1
96
512
4096
12288
32768
49152
65536
98304
131072
147456
196608
262144
393216
524288
589824
786432
1048576
1179648
1572864
2097152
3145728
4194304
8388608
output size
output size
64
32
16
problem size
64
32
16
8
64
32
16
8
4
2
1
64
32
16
8
problem size
Figure 4: 9 × 9 kernel (K40m)
1
96
512
4096
12288
32768
49152
65536
98304
131072
147456
196608
262144
393216
524288
589824
786432
1048576
1179648
1572864
2097152
3145728
4194304
8388608
4
1
96
512
4096
12288
32768
49152
65536
98304
131072
147456
196608
262144
393216
524288
589824
786432
1048576
1179648
1572864
2097152
3145728
4194304
8388608
output size
Figure 3: 7 × 7 kernel (K40m)
2
1
96
512
4096
12288
32768
49152
65536
98304
131072
147456
196608
262144
393216
524288
589824
786432
1048576
1179648
1572864
2097152
3145728
4194304
8388608
problem size
output size
4
2
1
64
32
16
8
4
2
problem size
Figure 2: 5 × 5 kernel (K40m)
1
96
512
4096
12288
32768
49152
65536
98304
131072
147456
196608
262144
393216
524288
589824
786432
1048576
1179648
1572864
2097152
3145728
4194304
8388608
1
8
output size
Figure 1: 3 × 3 kernel (K40m)
1
4
2
1
problem size
64
32
16
8
4
2
1
1
96
512
4096
12288
32768
49152
65536
98304
131072
147456
196608
262144
393216
524288
589824
786432
1048576
1179648
1572864
2097152
3145728
4194304
8388608
problem size
speedup
output size
Figure 5: 11 × 11 kernel (K40m)
Figure 6: 13 × 13 kernel (K40m)
6
Published as a conference paper at ICLR 2015
4.2
CNN P ERFORMANCE
In table 3, we show performance for real CNNs, AlexNet (Krizhevsky et al. (2012)) and OverFeat
fast (Sermanet et al. (2014)), comparing against cuDNN and cuda-convnet2 (ccn2) kernels in Torch.
The first layer uses cuDNN for the cuFFT runs because it is strided, but all other layers use cuFFT.
The timings include all convolutional layers of the network.
Table 3: AlexNet and OverFeat fast performance (K40, ms)
NETWORK
KERNEL
FPROP
BPROP
ACCGRAD
TOTAL
AlexNet
cuFFT
cuDNN
ccn2
94.34
147.32
99.03
96.69
167.79
104.59
93.20
153.96
103.29
284.23
469.07
306.91
OverFeat fast
cuFFT
cuDNN
ccn2
375.65
459.06
433.11
460.48
634.26
398.87
397.85
508.02
450.82
1233.98
1601.35
1282.80
Table 4 shows the performance of the cuDNN and our cuFFT convolution implementation for some
representative layer sizes, assuming all the data is present on the GPU. Our speedups range from
1.4× to 14.5× over cuDNN. Unsurprisingly, larger h, w, smaller S, f, f ′ , kh , kw all contribute to
reduced efficiency with the FFT. More surprisingly, we experience noticeable speedups on small
3 × 3 kernels as long as the input tensor remains of small size. The optimal FFT sizes that autotuning finds are reported in columns 2 and 3; note L5 padding being found by the autotuner.
Column 7 has the trillion equivalent time-domain reductions per second (single-precision floating
point multiply-adds) achieved by our implementation on a NVIDIA Tesla K40m on CUDA 6.5.
This number represents the throughput a time-domain kernel needs to achieve in order to match our
implementation; it is computed as (Sf f ′ kh kw (h − kh + 1)(w − kw + 1))/time. This is a metric
to compare relative efficiency across problem and padding sizes. In the cases L2, L3 and L4, a time
domain convolution would need to exceed the K40m peak of 4.29 Tflop/sec in order to match our
throughput.
5
fbfft I MPLEMENTATION
This section presumes familiarity with GPU architecture. Refer to the Supplement for details.
When designing high-performance libraries, multiple objectives must be balanced against each
other: memory latency/bandwidth tradeoffs, maximizing locality without sacrificing too much parallelism, good instruction mix, register usage and mapping strategy of computation and data to
memories and compute elements. A key principle is to design a set of leaf kernels with well-tuned
in-register performance and reduce the larger problem to a combination of these kernels by data and
loop tiling (Irigoin & Triolet (1988)) and recursive decompositions (Gunnels et al. (2001)). Since
vendors have to sustain high performance for a large class of application domains, there exist parameter configurations for which a carefully tuned approach significantly outperforms vendor-tuned
libraries (Shin et al. (2010)). For common deep learning use, convolutional layers consist of many
batched small 2-D convolutions. These are tiny relative to DSP and HPC standards and put us in
a regime where (a) we fall outside of the highly tuned regime, (b) feature dimensions are often
smaller than GPU warp sizes and can often fit exclusively in registers rather than in shared memory
(SMEM), and (c) we are very sensitive to latencies. We determined that it is possible to obtain better
efficiency than the existing batched cuFFT mode for CNNs.
5.1
L IMITATIONS
OF CU FFT
Because the cuFFT library is a black box, zero-padding9 has to be explicitly embedded in the input
and output arrays. The consequence is that one may need to allocate a duplicate, larger memory
9
This is different from the FFTW compatibility padding mode for in-place transforms.
7
Published as a conference paper at ICLR 2015
Table 4: Representative layer performance (S = 128, K40m)
LAYER
h + ph
L1
fprop
bprop
accGrad
L2
fprop
bprop
accGrad
L3
fprop
bprop
accGrad
L4
fprop
bprop
accGrad
L5
fprop
bprop
accGrad
Params:
128
128
128
Params:
64
64
64
Params:
32
32
32
Params:
16
16
16
Params:
13
13
13
w + pw
cuDNN
cuFFT
SPEEDUP
f = 3, f ′ = 96, h = w = 128, kh = kw = 11
128
125.11 ms 80.98 ms 1.54×
128
153.39 ms 66.49 ms 2.30×
128
155.07 ms 69.63 ms 2.22×
f = 64, f ′ = 64, h = w = 64, kh = kw = 9
64
354.83 ms 46.44 ms 7.64×
64
579.37 ms 46.25 ms 12.5×
64
416.34 ms 47.03 ms 8.85×
f = 128, f ′ = 128, h = w = 32, kh = kw = 9
32
130.89 ms 17.77 ms 7.36×
32
245.57 ms 16.97 ms 14.5×
32
154.96 ms 17.00 ms 9.29×
f = 128, f ′ = 128, h = w = 16, kh = kw = 7
16
15.13 ms
4.88 ms
3.10×
16
20.80 ms
4.71 ms
4.41×
16
18.17 ms
4.70 ms
3.86×
f = 384, f ′ = 384, h = w = 13, kh = kw = 3
14
39.82 ms
21.35 ms 1.86×
14
28.33 ms
20.22 ms 1.40×
14
47.84 ms
21.26 ms 2.25×
TRED/s
0.9
1.1
1.05
7.49
7.52
7.40
9.90
10.37
10.34
5.54
5.76
5.75
1.34
1.42
1.35
region (only once) and copy data from non-padded tensors to padded tensors. This memory consumption and spurious copies affect latency significantly. Instead, we devised an implementation for
batched 1-D FFT and 2-D FFT of sizes 2-256 and reaches up to 78% efficiency at 97.5% occupancy.
We also implemented an IFFT kernel based on our FFT kernel.
In our implementation we use clipping to conditionally load a value if reading within bounds or a
constant (0) otherwise. This is an approach used in automatic code generation tools such as Halide
(Ragan-Kelley et al. (2013)) and relies on aggressive if-conversion properties of the CUDA compiler.
It allows for more efficient control flow rather than using explicit loop prologues and epilogues. This
mechanism does not require any additional memory allocation and is zero-copy; this is particularly
desirable in the latency sensitive mode.
Additionally, since cuFFT and cuBLAS are closed source, it is impossible to take advantage of algorithmic simplifications that may be available. For instance, in the forward pass of our computation as
shown in Table 1, the result of the first cuFFT call is of the form S×f ×(h+ph)×(⌊(w+pw )/2⌋+1).
With fbfft we return it in the form S × f × (⌊(w + pw )/2⌋ + 1) × (h + ph ) where the two innermost data dimensions are transposed. This allows us to remove a full data transposition from each
of the FFT kernels. Another domain-specific optimization we have yet to explore is eliminating bit
reversal portions of the FFT and IFFT. This can be done by performing the FFT with decimation in
frequency (DIF) and the IFFT with decimation in time (DIT), discussed in the Supplement.
5.2
WARP - LEVEL 1-D FFT
AND
2-D FFT
FOR SIZE
n ≤ 32
For batched FFT of power of two sizes we view a single warp as a small distributed system with
lockstep collective communication capabilities and we program it in a bulk-synchronous fashion
(Valiant (1990)). We implement DIF and enforce the following invariants for the log2 n steps:
• each warp thread originally loads one real element of the input vector and locally computes
one complex twiddle factor (i.e. a root of unity);
• at each step, all warp threads exchange data with another thread in the warp in parallel and
produce a new value;
8
Published as a conference paper at ICLR 2015
• then, all warp threads exchange twiddle factors with another thread in the warp in parallel,
and produce a new value.
The two bulk-synchronous exchanges can be written each with one warp-wide instruction. After
the log2 n steps, the FFT is computed and stored in a distributed and bit reversed manner within 1
register across a warp. For sizes n ≤ 32, bit reversal can be implemented with a single warp shuffle.
We either load twiddle factors from device memory or compute them with the sincosf function
only once, and subsequently swap them within registers. This greatly reduces the reliance on either
memory bandwidth or on the special functional unit at the expense of a few additional registers.
The decision between explicitly loading twiddle factors from device memory or computing them is
a tradeoff between arithmetic intensity and memory bandwidth. For sizes 16 and 32 the arithmetic
pipeline is the bottleneck. Loading twiddle factors from memory for these two special sizes results
in a performance increase of 15% and 20% respectively.
The discussion above applies to 1-D FFT and to each independent FFT within a larger 2-D FFT.
A n-D Fourier transform is separable and can be implemented with sets of multiple 1-D FFT with
transpositions between each of these sets. In 2-D FFT R-to-C, the first set comprises n FFTs and the
second set comprises n/2 + 1 FFTs by Hermitian symmetry. Following standard techniques Lyons
(1996) we further pack 2 real FFTs into a single complex FFT . The extra 1 term in the quantity n/2+
1 makes the computation ill-balanced and can bring down performance by lowering occupancy. We
chose to dimension our kernels to have size n×(n/2) and introduce additional control flow to handle
the border case. This results in 30% additional performance. We implement the transposition in
SMEM across warps following Ruetsch & Micikevicius (2009). Data is already resident in registers
so our main concerns are limiting SMEM usage to keep occupancy high, and limiting load/stores by
using vector instructions to avoid saturating the load-store unit (LSU).
5.3
1-D FFT
AND
2-D FFT
FOR SIZE
32 < n ≤ 256
With size 32 as our building block, we extend our strategy to larger sizes. We use the same single
warp approach to compute a full 1-D FFT. The main difference is that the computation is now distributed across multiple registers across threads in a warp (⌈n/32⌉ Fourier coefficients and twiddle
factors in registers per thread). Because we perform a full FFT per warp, a performance cross-over
where cuFFT wins happens after register usage limits occupancy too much. We outperform 1-D
cuFFT for n ≤ 256, with a hard register limit at n = 512 (128 and 256 similarly for 2-D FFT). This
is still well within our application domain. The following modifications handle multiple registers
per thread:
• Hermitian symmetry allows us to perform half the computation. There is a tradeoff between adding control-flow divergence and performing less work. At n ≥ 64, benefits from
reduced computations dominate divergence losses;
• we take advantage of trigonometric symmetries and twiddle factor distribution to compute
only a fraction of the roots of unity needed for each FFT, distributed with register to register
copies;
• twiddle factor re-balancing across a warp and across registers requires a different implementation. We managed to implement it fully within registers;
• bit reversal occurs across registers and across warps. The high-order bits represent the register while the low-order bits represent the warp. Without a sophisticated implementation,
this results in indirect addressing of registers which is costly. We implement a simple bit
reversal in SMEM, which is an occupancy bottleneck at n ≥ 256 for 1-D FFT.
In the 2-D FFT case, the intermediate transpose becomes significantly more expensive. We experimented with various strategies to keep occupancy high, including partial transpositions within a
warp to use minimal amounts of SMEM.
5.4
D ISCUSSION
We report the relative performance of our implementation fbfft compared to cuFFT for various
batch and input sizes of interest. The number of batches to consider depends on the dimension of
9
Published as a conference paper at ICLR 2015
CNN layers as well as any multi-GPU parallelization strategy that may be involved. At typical sizes
of interest, fbfft is between 1.5× and 5× faster. We tried up to 4 million batches and at larger
sizes gains stabilize around 1.4× but efficiency goes down as more and more memory is used.
FBFFT-1D Speedup at various sizes and batches
4.5
3.5
FBFFT Speedup
3.0
3.5
2.5
2.0
1.5
3.0
2.5
2.0
1.5
1.0
1.0
0.5
0.5
0.0
4
32
128
1024
4096
Number of batches
16384
8
16
32
64
128
256
4.0
FBIFFT Speedup
4.0
FBIFFT-1D Speedup at various sizes and batches
4.5
8
16
32
64
128
256
0.0
65536
4
32
128
1024
4096
Number of batches
16384
65536
Figure 7: fbfft-1D FFT and IFFT (K40m, cuFFT 6.5 @ 1x)
FBFFT-2D Speedup at various sizes and batches
4.5
4.0
3.5
3.5
3.0
2.5
2.0
1.5
2.5
2.0
1.5
1.0
1.0
0.5
0.5
0.0
4
32
128
1024
4096
Number of batches
16384
8
16
32
64
128
4.0
FBIFFT Speedup
FBFFT Speedup
3.0
FBIFFT-2D Speedup at various sizes and batches
4.5
8
16
32
64
128
0.0
65536
4
32
128
1024
4096
Number of batches
16384
65536
Figure 8: fbfft-2D FFT and IFFT (K40m, cuFFT 6.5 @ 1x)
Figure 7 shows the performance in the 1-D case. These numbers do not exercise our implicit zerocopy padding, so we expect additional gains when we incorporate our FFT in the convolution. Our
implementation outperforms cuFFT for all cases of interest, more dramatically so for smaller batch
sizes. Small batch sizes also correspond to the latency sensitive regime in Figures 1-6 for which
the cuFFT based implementation performs quite worse than cuDNN. We achieve 78% efficiency at
97.5% occupancy for size 64 at batch size 16, 384, as reported by nvvp.
Figure 8 shows the performance in the 2-D case. Relative performance gains for sizes 64 are more
modest than in the 1-D case, even losing to cuFFT at size 128 and small batch sizes. The magnitude
of the relative gains at various batch sizes drops faster than in the 1-D case. Looking at the performance of the 32 × 32 FFT, we obtain 1.6× speedup over cuFFT at 1, 024 batches. The same ratio is
not obtained until 16, 384 batches in 1-D FFT.10 When coupled with the tiling strategy in Section 6,
we emphasize that the sizes of interest are actually 8-64, and depend on kh , kw but not input h, w.
Batch sizes can vary on the whole spectrum.
We interfaced fbfft into our convolution module and ran experiments with 3 × 3 kernels for the
3 different convolution passes over inputs of sizes x = h = w, x ∈ {13, 16, 27, 32, 57, 64}. For
problem size, we used p = S = f = f ′ , p ∈ {16, 32, 64, 128}. By swapping our FFT implementation we observed an overall mean speedup of 1.51× with standard deviation 0.21 and geometric
mean 1.49×. The minimum speedup was 1.21×, despite sometimes performing more computations
10
This is not unexpected because these two computations perform the same number of flops when accounting
for Hermitian symmetry, plus the fact that the efficiency of cuFFT increases while fbfft remains high but
almost constant.
10
Published as a conference paper at ICLR 2015
with fbfft which can only interpolate to a power of 2. These experiments exercise the zero-copy
padding and lower memory footprints of fbfft compared to cuFFT but do not yet reflect additional
optimizations such as tiling and bit twiddling elision.
6
C URRENT L IMITATIONS
AND
F UTURE WORK
In our current implementation, fbfft heavily relies on shuffle instructions. In spite of a good
efficiency, we only utilize 60% of the available memory bandwidth. This is due to the load and store
instructions in our kernel competing with the shuffle instructions for the Load-Store Unit (LSU). As
a consequence, our first bottleneck is the number of instructions issued on the LSU. For instance, on
Kepler (capability 3.5), the throughput for 32-bit floating point multiply-add operations is 192 per
cycle but the throughput for shuffles is only 32. In the future we will investigate and release faster
implementations as they become available.
Temporary memory overhead requirements are a common issue when performing convolutions in
the Fourier domain. In this first implementation, we introduced the following memory buffers to
support our implementation:
• for each of input, output and weight tensors we store 1 buffer for the frequency array and
1 buffer for its complex transpose. These buffers store the Fourier representation and are
generally limited by the weight tensor which is independent of the mini-batch size. Because
of the global memory pressure we introduce, we reuse buffers at each layer and pass on the
opportunity to (1) reuse 2 FFT results in each hidden layer, reducing the cost of forward
FFTs by 33%; and (2) asynchronously precompute FFTs of the weight tensors and their
gradients to better fill the gpu utilization pipeline,
• when using cuFFT we additionally pad the input, weight and output tensors explicitly to
the best performing common fft size
• when using cuFFT additional temporary memory is reserved by each cufftPlan
• with fbfft padding is implicit but and no temporary memory buffer is needed until we
reach size 64. On the other hand, fbfft only supports square convolutions whose size is
a power of 2. As a consequence, too much padding could occur and adversely affect both
performance and memory consumption. The tiling strategy we describe next is a good way
to circumvent the problem.
Additionally, we recently developed an in-place transposed batched CGEMM which permits the
removal of the complex transposed buffer. For this problem, a tool like MaxAS Lavin (2015) could
be valuable.
fbfft provides the most gains over cuFFT at sizes 8-64. A tiling strategy for the input can be used
to exploit this advantage. When the kernel is significantly smaller than the input, we can decompose
a large convolution into several smaller ones. For simplicity, we consider 1D convolution on a
single input plane, as it can trivially be extended. Let x be an input of size n, c a kernel of size w and
y = x ⋆ c. We write x[i,j] for the vector formed by contiguous elements of x: {xi , xi+1 , ..., xj−1 }.
Let d ≤ n. From the definition of the convolution, we have:
y[i,i+d] = x[i,i+d+w] ⋆ c
So the convolution of the input of size n can be computed with ⌊n/d⌋ convolutions with inputs of
size d + w. The cost of the convolution goes down from O(n log(n)) to O(⌊n/d⌋(d + w) log(d +
w)) = O((n + w/d) log(d + w)). From this formula, we see that the optimal d is of the order of
w, to get the complexity O(n log(w)). This strategy allows us to speed up forward and backward
propagation. Tiling can also be used to reduce memory cost for temporary storage by not running all
the tiles in parallel (just the tiles which do run in parallel need their scratch space), at the potential
expense of parallelism or efficiency.
For the gradient accumulation, we cannot reuse this strategy, since it involves a larger convolution
between an input x of size n and a kernel z = ∂L
∂y of size n − w + 1. However, we have a similar
formula:
11
Published as a conference paper at ICLR 2015
∂L
∂c
=
j
i=0
And so
∂L
∂c
n−1
X
⌊n/d⌋−1 d−1
xj+i · zi =
X X
k=0
i=0
xj+i+kd · zi+kd +
n−1
X
xj+i · zi
i=d⌊n/d⌋
⌊n/d⌋−1
=
X
x[dk,(d+1)k+w−1] ⋆ z[dk,(d+1)k] + x[d⌊n/d⌋,n] ⋆ z[d⌊n/d⌋,n−w+1]
k=0
We have a few other optimizations that are planned as well. Since much of the data we have is already available in registers or in shared memory, we are implementing our own in-place, in-register
transpose via recursive decomposition. The pointwise multiplications in the Fourier domain, especially with tiling, are rather small, so our own matrix multiplication routines integrated with the
rest of the convolution kernel code might win over cuBLAS, and prevent the need for multiple
CUDA kernel launches and their associated overhead. Finally, as mentioned earlier, bit reversal
portions can be eliminated with the FFT using DIF and the IFFT using DIT.
7
C ONCLUSION
To summarize, we achieve significant gains in CNNs using FFTs, with a cuFFT convolution implementation achieving 1.4 × −14.5× speedups over cuDNN for common sizes. In reaction to
cuFFT and cuBLAS limitations in the context of our specific application domain, we developed
our own FFT implementation, fbfft, which is more suited to deep learning problem sizes (large
batches, small feature planes). fbfft itself is ≥ 1.4× faster than cuFFT transforms for these problems of interest. For convolution, it is faster than the cuFFT as well, with a mean of 1.51× for sizes
that we wish to exploit.
Given our new efficient primitive for size 8-64 convolution, we are continuing work on bit twiddling,
transposition and pointwise multiplication optimizations, and continuing work on tiling to make the
computational advantage at that size apply to larger convolution problems. These will all allow for
reduced training time and use of ever larger and deeper CNNs.
ACKNOWLEDGMENTS
We would like to thank Julien Demouth from NVIDIA who suggested further improvements are still
possible by virtue of the current implementation being LSU throughput-bound rather than memorybound.
R EFERENCES
Bergstra, James, Breuleux, Olivier, Bastien, Frédéric, Lamblin, Pascal, Pascanu, Razvan, Desjardins, Guillaume, Turian, Joseph, Warde-Farley, David, and Bengio, Yoshua. Theano: a CPU
and GPU math expression compiler. In Proceedings of the Python for Scientific Computing Conference (SciPy), June 2010. Oral Presentation.
Bluestein, Leo I. A linear filtering approach to the computation of discrete Fourier transform. Audio
and Electroacoustics, IEEE Transactions on, 18(4):451–455, December 1970. ISSN 0018-9278.
Brosch, Tom and Tam, Roger C. Efficient training of convolutional deep belief networks in the
frequency domain for application to high-resolution 2d and 3d images. Neural Computation, 27
(1):211–227, 2015. doi: 10.1162/NECO a 00682. URL http://dx.doi.org/10.1162/
NECO_a_00682.
Burrus, C. Sidney. Fast fourier transforms, 2008. URL http://cnx.org/contents/
[email protected]:16/Fast_Fourier_
Transforms_(6x9_V.
Chellapilla, Kumar, Puri, Sidd, and Simard, Patrice. High Performance Convolutional Neural Networks for Document Processing. In Lorette, Guy (ed.), Tenth International Workshop on Frontiers
12
Published as a conference paper at ICLR 2015
in Handwriting Recognition, La Baule (France), October 2006. Université de Rennes 1, Suvisoft.
URL https://hal.inria.fr/inria-00112631. http://www.suvisoft.com.
Chetlur, Sharan, Woolley, Cliff, Vandermersch, Philippe, Cohen, Jonathan, Tran, John, Catanzaro,
Bryan, and Shelhamer, Evan. cudnn: Efficient primitives for deep learning. CoRR, abs/1410.0759,
2014. URL http://arxiv.org/abs/1410.0759.
Collobert, R., Kavukcuoglu, K., and Farabet, C. Torch7: A matlab-like environment for machine
learning. In BigLearn, NIPS Workshop, 2011a.
Collobert, Ronan, Weston, Jason, Bottou, Léon, Karlen, Michael, Kavukcuoglu, Koray, and Kuksa,
Pavel. Natural language processing (almost) from scratch. J. Mach. Learn. Res., 12:2493–2537,
November 2011b. ISSN 1532-4435. URL http://dl.acm.org/citation.cfm?id=
1953048.2078186.
Cooley, James W. and Tukey, John W. An algorithm for the machine calculation of complex fourier
series. Mathematics of computation, 19(90):297–301, 1965.
Garland, Michael, Le Grand, Scott, Nickolls, John, Anderson, Joshua, Hardwick, Jim, Morton,
Scott, Phillips, Everett, Zhang, Yao, and Volkov, Vasily. Parallel computing experiences with
cuda. IEEE Micro, 28(4):13–27, July 2008. ISSN 0272-1732. doi: 10.1109/MM.2008.57. URL
http://dx.doi.org/10.1109/MM.2008.57.
Giles, Mike. Course on cuda programming on nvidia gpus, lecture 3, 2014.
//people.maths.ox.ac.uk/gilesm/cuda/lecs/lec3.pdf.
URL http:
Gunnels, John A., Henry, Greg M., and van de Geijn, Robert A. A family of high-performance
matrix multiplication algorithms. In Proceedings of the International Conference on Computational Sciences-Part I, ICCS ’01, pp. 51–60, London, UK, UK, 2001. Springer-Verlag. ISBN
3-540-42232-3. URL http://dl.acm.org/citation.cfm?id=645455.653765.
Irigoin, F. and Triolet, R. Supernode partitioning. In Proceedings of the 15th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, POPL ’88, pp. 319–329, New
York, NY, USA, 1988. ACM. ISBN 0-89791-252-7. doi: 10.1145/73560.73588. URL http:
//doi.acm.org/10.1145/73560.73588.
Jia, Yangqing, Shelhamer, Evan, Donahue, Jeff, Karayev, Sergey, Long, Jonathan, Girshick, Ross,
Guadarrama, Sergio, and Darrell, Trevor. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014.
Krizhevsky, Alex.
convnet2/.
cuda-convnet2, 2014.
URL https://code.google.com/p/cuda-
Krizhevsky, Alex, Sutskever, Ilya, and Hinton, Geoffrey E. Imagenet classification with deep
convolutional neural networks. In Pereira, F., Burges, C.J.C., Bottou, L., and Weinberger,
K.Q. (eds.), Advances in Neural Information Processing Systems 25, pp. 1097–1105. Curran Associates, Inc., 2012. URL http://papers.nips.cc/paper/4824-imagenetclassification-with-deep-convolutional-neural-networks.pdf.
Lavin, Andrew. maxdnn: An efficient convolution kernel for deep learning with maxwell gpus.
CoRR, abs/1501.06633, 2015. URL http://arxiv.org/abs/1501.06633.
Lyons, Richard G. Understanding Digital Signal Processing. Addison-Wesley Longman Publishing
Co., Inc., Boston, MA, USA, 1st edition, 1996. ISBN 0201634678.
Mathieu, Michaël, Henaff, Mikael, and LeCun, Yann. Fast training of convolutional networks
through ffts. CoRR, abs/1312.5851, 2013. URL http://arxiv.org/abs/1312.5851.
Ragan-Kelley, Jonathan, Barnes, Connelly, Adams, Andrew, Paris, Sylvain, Durand, Frédo, and
Amarasinghe, Saman P. Halide: a language and compiler for optimizing parallelism, locality,
and recomputation in image processing pipelines. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’13, Seattle, WA, USA, June 16-19, 2013, pp.
519–530, 2013. doi: 10.1145/2462156.2462176. URL http://doi.acm.org/10.1145/
2462156.2462176.
13
Published as a conference paper at ICLR 2015
Ruetsch, Greg and Micikevicius, Paulius. Optimizing matrix transpose in cuda. Technical report,
NVIDIA Corp., January 2009.
Sermanet, Pierre, Eigen, David, Zhang, Xiang, Mathieu, Michael, Fergus, Rob, and LeCun, Yann.
Overfeat: Integrated recognition, localization and detection using convolutional networks. In
International Conference on Learning Representations (ICLR 2014). CBLS, April 2014. URL
http://openreview.net/document/d332e77d-459a-4af8-b3ed-55ba.
Shin, Jaewook, Hall, Mary W., Chame, Jacqueline, Chen, Chun, Fischer, Paul F., and Hovland,
Paul D. Speeding up nek5000 with autotuning and specialization. In Proceedings of the 24th
ACM International Conference on Supercomputing, ICS ’10, pp. 253–262, New York, NY, USA,
2010. ACM. ISBN 978-1-4503-0018-6.
Valiant, Leslie G. A bridging model for parallel computation. Commun. ACM, 33(8):103–111,
August 1990. ISSN 0001-0782. doi: 10.1145/79173.79181. URL http://doi.acm.org/
10.1145/79173.79181.
Volkov, V. Better performance at lower occupancy. In GPU Technology Conference, 2010. URL
http://www.cs.berkeley.edu/˜volkov/volkov10-GTC.pdf.
14
Published as a conference paper at ICLR 2015
8
8.1
S UPPLEMENT
CU FFT
C ONVOLUTION P ERFORMANCE B REAKDOWN
We show a breakdown of cuFFT convolution performance for the steps indicated in Table 1. The
timings do not add up to 100% of the reported performance in the previous table because we do not
report additional copies needed for zero-padding here. We also enforce force extra synchronizations
to isolate the contribution of each operation. Abstracting from these details, the FFT and IFFT take
up a significant amount of compute resources, which we address in Section 5.
Table 5: cuFFT convolution performance breakdown (K40m, ms)
LAYER
L1
fprop
bprop
accGrad
L2
fprop
bprop
accGrad
L3
fprop
bprop
accGrad
L4
fprop
bprop
accGrad
L5
fprop
bprop
accGrad
FFT A
TRANS. A
FFT B
TRANS. B
CGEMM
TRANS. C
IFFT C
0.86
0.86
1.14
0.24
0.24
0.32
1.13
34.55
34.60
0.32
10.26
10.26
15.13
12.62
12.37
12.67
0.39
0.26
36.46
1.19
0.91
2.99
2.99
5.94
0.98
0.98
2.04
5.91
5.92
5.93
2.03
2.03
2.02
8.92
8.85
8.38
1.67
1.67
0.83
6.24
6.23
3.15
3.07
3.08
3.07
0.89
0.89
0.89
3.08
3.07
3.06
0.89
0.90
0.89
4.40
4.05
4.03
0.87
0.86
0.87
3.49
3.48
3.48
0.84
0.83
0.84
0.24
0.24
0.24
0.83
0.83
0.82
0.24
0.24
0.24
1.21
1.13
1.10
0.24
0.23
0.24
0.95
0.94
0.95
7.07
7.07
2.40
1.58
1.59
0.51
2.39
2.40
2.38
0.51
0.51
0.52
6.23
5.59
6.18
0.50
0.51
1.54
2.54
2.54
7.51
In the particular case of L1, the FFTs take more than 50% of the runtime. This is due to the wasteful
interpolation of the kernel tensor from a 11 × 11 up to 128 × 128, which is the minimal size to
compute the FFT of the input array without interpolation loss. In such cases, the tiling strategy we
are developing (see section 6) will result in large additional performance gains.
8.2
FFT : D ECIMATION
IN
T IME VS F REQUENCY
A Fourier transform projects R and C-valued functions onto a harmonic orthogonal basis. The
discrete Fourier transform of a vector {xk }, k ∈ [0, n − 1] is the vector:
{Xk } =
n−1
X
j=0
xj wnkj , k ∈ [0, n − 1]
where wnj = e−2πij/n is the j th n-root of unity. The traditional radix-2 Cooley-Tukey algorithm
recursively decomposes the computation between an odd and even part:
{Xk } =
(n−1)/2
(n−1)/2
X
X
j=0
xj wnk(2j) +
j=0
15
x2j+1 wnk(2j+1) , k ∈ [1, n]
Published as a conference paper at ICLR 2015
Figure 9: DIT output ordered (left); DIF input ordered (right) (Burrus (2008))
This decomposition is called decimation in time (DIT). An alternate decomposition performs decimation in frequency (DIF):
(n−1)/2
n
X
X
xj wnkj , k ∈ [1, n]
xj wnkj +
{Xk } =
j=0
j=(n−1)/2
When n is a power of 2, both decimations recursively decompose into a perfectly balanced tree and
take advantage of the symmetry properties of the roots of unity. The dataflow graph for the radix-2
FFT has a butterfly shape and is a good way of visualizing the computations. There is a symmetry
between DIT and DIF in both the order of operations applied and in whether the input or the output
order is shuffled (Figure 9).
8.3
GPU P ROGRAMMING
There are a variety of references available that describe CUDA and NVIDIA’s various GPU architectures (Garland et al. (2008)) which we won’t discuss in detail, but the implementation of fbfft very
much depends upon specifics of the Kepler GPU architecture.
NVIDIA GPUs execute code at the granularity of a warp which is defined as a set of 32 threads
in all existing architectures; each thread is assigned a lane within the warp. These threads execute
in a SIMT (single instruction, multiple thread) fashion, meaning that a warp is an atomic unit of
execution. It holds a single program counter (PC) and can thus only execute a single instruction
at a time across all of its threads. Collections of warps are brought together in blocks or CTAs,
which together share a region of fast shared memory resident on chip. Blocks themselves can only
exchange data via much slower global memory, resident on the GPU or in the host CPU’s address
space.
Individual threads within a warp are free to take divergent paths, but since a single PC is present,
each branch in the execution will be serialized. Threads that aren’t participating in the branch in
question are disabled. In other words, if all 32 threads were to take divergent code paths, we would
obtain only 1/32× of the computational efficiency.
Divergent code paths are hard to avoid, but the NVIDIA instruction set has means to reduce their
cost (Giles (2014)). One is with predicated instructions, which are used for small branches, in which
all warp threads execute both parts of the branch, with non-participating threads having no side
effects.
Block threads have access to a register file, with up to 255 registers per thread for Kepler. Registers
are allocated statically by the CUDA compiler. An important performance factor when writing
CUDA kernels is that data should be kept in registers as much as possible to avoid communications.
16
Published as a conference paper at ICLR 2015
Registers in CUDA are “addressable”: it is possible to declare a static array within registers and
operate on its elements. The limitation is that all addressing should be performed using statically
determined constants so the compiler can translate these accesses to a register number known at
compile time. Indirect addressing is also supported but results in copies to a local region within
global memory, which essentially constitutes register spilling. Even with the presence of caches,
using local memory usually comes with a performance hit.11 As a consequence, we design our
kernels using aggressive inlining, template parameters and unrolling directives to make all register
accesses statically addressable.
The Kepler architecture introduced specialized shuffle instructions to exchange data between registers within a warp synchronously, which avoids round-trips to shared or global memory. Interestingly, these shuffle instructions allow the dynamic indexing of an array held in registers, as long as
the array is distributed in a cyclic fashion across registers in each thread within a warp.
float arr[3];
...
// This simulates a linear array float realArr[96]:
// arr[0] holds elements 0-31 (lane i holds element i)
// arr[1] holds elements 32-63 (lane i holds element 32 + i)
// arr[2] holds elements 64-95 (lane i holds element 64 + i)
// Example: all warp threads read value held at realArr[34]
float val = __shfl(arr[1], 2); // ‘1‘ must be statically known
// ‘2‘ can be dynamic
Many warps run in parallel and can be switched by the GPU hardware at each cycle. When enough
parallelism is available (measured in occupancy of the GPU as a first approximation), long latency
operations are hidden thanks to fast context switching. Registers and shared memory come in finite
quantities on each GPU compute multiprocessor. These limited resources are partitioned by the
compiler and the hardware amongst computations at the level of a CUDA kernel. Increased usage
of registers or of shared memory can reduce GPU occupancy, which limits the ability to hide long
latency operations. Reduced occupancy does not necessarily result in performance loss (Volkov
(2010)). There are often non-obvious performance tradeoffs in increasing or decreasing threads per
block, shared memory per block or registers per thread that are hard to discover. This problem is
one of the many reasons why designing a one-size-fits-all implementation that aims to be efficient
for any problem is difficult.
11
There are bleeding edge cases where a little local memory consumption helps performance; for instance,
when restricting the number of registers per thread to increase occupancy.
17
| 9cs.NE
|
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A
DISSIPATIVITY APPROACH
arXiv:1608.01590v2 [math.OC] 29 Dec 2016
MAJID ZAMANI1 AND MURAT ARCAK2
Abstract. In this paper we propose a compositional scheme for the construction of abstractions for networks
of control systems using the interconnection matrix and joint dissipativity-type properties of subsystems and
their abstractions. In the proposed framework, the abstraction, itself a control system (possibly with a lower
dimension), can be used as a substitution of the original system in the controller design process. Moreover, we
provide a procedure for constructing abstractions of a class of nonlinear control systems by using the bounds
on the slope of system nonlinearities. We illustrate the proposed results on a network of linear control systems
by constructing its abstraction in a compositional way without requiring any condition on the number or
gains of the subsystems. We use the abstraction as a substitute to synthesize a controller enforcing a certain
linear temporal logic specification. This example particularly elucidates the effectiveness of dissipativity-type
compositional reasoning for large-scale systems.
1. Introduction
Modern applications, e.g. power networks, biological networks, internet congestion control, and manufacturing
systems, are large-scale networked systems and inherently difficult to analyze and control. Rather than tackling
the network as a whole, an approach that severely restricts the capability of existing techniques to deal with
many numbers of subsystems, one can develop compositional schemes that provide network-level certifications
from main structural properties of the subsystems and their interconnections.
In the past few years, there have been several results on the compositional abstractions of control systems.
Early results include compositional abstractions of control systems [TPL04, Fre05, Kv10] which are useful for
verification rather than synthesis. Those results employ exact notions of abstractions based on simulation relations [Fre05, Kv10] and simulation maps [TPL04], for which constructive methodologies exist only for rather
restricted classes of control systems. In contrast to the exact notions, the compositional approximate abstractions were introduced recently which are useful for the controller synthesis. Examples include compositional
construction of finite abstractions of linear and nonlinear control systems [TI08, PPD16] and of infinite abstractions of nonlinear control systems [RZ15, RZ16a] and a class of stochastic hybrid systems [ZRMng]. In those
works, the abstraction (finite or infinite with possibly a lower dimension) can be used as a substitution of the
original system in the controller design process. The proposed results in [TI08, PPD16, RZ15, RZ16a, ZRMng]
use the small-gain type conditions to facilitate the compositional construction of abstractions. The resulting
small-gain type requirements intrinsically condition the spectral radius of the interconnection matrix which,
in general, depends on the size of the graph and can be violated or deteriorated as the number of subsystems
grows [DK04].
In this work we propose a novel compositional framework for the construction of infinite abstractions of
networks of control systems using dissipativity theory. First, we adapt the notion of storage function from
dissipativity theory [AMP16] to quantify the joint dissipativity-type properties of control subsystems and
their abstractions. Given a network of control subsystems and their storage functions, we propose conditions
based on the interconnection matrix and joint dissipativity-type properties of subsystems and their abstractions guaranteeing that the network of abstractions quantitatively approximate the behaviours of the network
of concrete subsystems. The proposed compositionality conditions can enjoy specific interconnection structures and provide scale-free compositional abstractions for large-scale control systems without requiring any
1
2
M. ZAMANI AND M. ARCAK
condition on the number or gains of the subsystems; we illustrate this point with an example in Section 6.
Furthermore, we provide a geometric approach on the construction of abstractions for a class of nonlinear
control systems and of their corresponding storage functions by using the bounds on the slope of system
nonlinearities.
Related Work. Compositional construction of infinite abstractions of networks of control systems is also
proposed in [RZ15, RZ16a]. While in [RZ15, RZ16a] small-gain type conditions are used to facilitate the
compositional construction of abstractions, here we use dissipativity-type conditions. The small-gain type
requirements inherently condition the spectral radius of the interconnection matrix which, in general, depends
on the size of the graph and can be dissatisfied as the number of subsystems grows [DK04]. On the other
hand, this is not necessarily the case with broader dissipativity-type conditions and in fact the compositionality
requirements may not condition the number or gains of the subsystems at all when the interconnection matrix
enjoys some properties (cf. Section 6). Although the results in [RZ15, RZ16a] provide constructive procedures
to determine abstractions of linear control systems, we propose techniques on the construction of abstractions
for a class of nonlinear control systems by using the bounds on the slope of systems nonlinearities. The
results in [RZ15, RZ16a] assume that the internal input and output space dimensions of each component in
a network are equal to the corresponding ones of its abstraction which is not the case in this paper. While
the interconnection matrix in [RZ15, RZ16a] is a permutation one, the one in this paper can be any general
interconnection matrix.
The recent results in [AMP16, MLAP15] establish only stability or stabilizability of networks of control systems
compositionally using dissipativity properties of components. On the other hand, the results here provide
construction of abstractions of networks of control systems compositionally using abstractions of components
and their joint dissipativity-type properties.
2. Control Systems
2.1. Notation. The sets of nonnegative integer and real numbers are denoted by N and R, respectively. Those
symbols are footnoted with subscripts to restrict them in the usual way, e.g. R>0 denotes the positive real
numbers. The symbol Rn×m denotes the vector space of real matrices with n rows and m columns. The
symbols 1n , 0n , In , and 0n×m denote the vector in Rn with all its elements to be one, the zero vector, identity
and zero matrices in Rn , Rn×n , and Rn×m , respectively. For a, b ∈ R with a ≤ b, the closed, open, and
half-open intervals in R are denoted by [a, b], ]a, b[, [a, b[, and ]a, b], respectively. For a, b ∈ N and a ≤ b,
the symbols [a; b], ]a; b[, [a; b[, and ]a; b] denote the corresponding intervals in N. Given N ∈ N≥1 , vectors
xi ∈ Rni , ni ∈ N≥1 and i ∈ [1; N ], we use x = [x1 ; . . . ; xN ] to denote the concatenated vector in Rn with
PN
n = i=1 ni . Given a vector x ∈ Rn , kxk denotes the Euclidean norm of x. Note that given any x ∈ RN ,
x ≥ 0 iff xi ≥ 0 for any i ∈ [1; N ]. Given a symmetric matrix A, λmax (A) and λmin (A) denote maximum and
minimum eigenvalues of A. We denote by diag(M1 , . . . , MN ) the block diagonal matrix with diagonal matrix
entries M1 , . . . , MN .
Given a function f : Rn → Rm and 0m ∈ Rm , we simply use f ≡ 0 to denote that f (x) = 0m for all x ∈ Rn .
Given a function f : R≥0 → Rn , the (essential) supremum of f is denoted by kf k∞ := (ess)sup{kf (t)k, t ≥ 0}.
A continuous function γ : R≥0 → R≥0 , is said to belong to class K if it is strictly increasing and γ(0) = 0; γ is
said to belong to class K∞ if γ ∈ K and γ(r) → ∞ as r → ∞. A continuous function β : R≥0 × R≥0 → R≥0
is said to belong to class KL if, for each fixed t, the map β(r, t) belongs to class K with respect to r and, for
each fixed nonzero r, the map β(r, t) is decreasing with respect to t and β(r, t) → 0 as t → ∞.
2.2. Control systems. The class of control systems studied in this paper is formalized in the following
definition.
Definition 2.1. A control system Σ is a tuple Σ = (Rn , Rm , Rp , U, W, f, Rq1 , Rq2 , h1 , h2 ), where Rn , Rm ,
Rp , Rq1 , and Rq2 are the state, external input, internal input, external output, and internal output spaces,
respectively, and
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
3
• U and W are subsets of the sets of all measurable functions of time, from open intervals in R to Rm and
Rp , respectively;
• f : Rn × Rm × Rp → Rn is a continuous map satisfying the following Lipschitz assumption: for every
compact set D ⊂ Rn , there exists a constant Z ∈ R>0 such that kf (x, u, w) − f (y, u, w)k ≤ Zkx − yk for
all x, y ∈ D, all u ∈ Rm , and all w ∈ Rp ;
• h1 : Rn → Rq1 is the external output map;
• h2 : Rn → Rq2 is the internal output map.
A locally absolutely continuous curve ξ :]a, b[→ Rn is a state trajectory of Σ if there exist input trajectories
υ ∈ U and ω ∈ W satisfying:
˙
ξ(t) = f (ξ(t), υ(t), ω(t)),
Σ : ζ1 (t) = h1 (ξ(t)),
(2.1)
ζ2 (t) = h2 (ξ(t)),
for almost all t ∈ ]a, b[. We call the tuple (ξ, ζ1 , ζ2 , υ, ω) a trajectory of Σ, consisting of a state trajectory ξ,
output trajectories ζ1 and ζ2 , and input trajectories υ and ω, that satisfies (2.1). We also denote by ξxυω (t)
the state reached at time t under the inputs υ ∈ U, ω ∈ W from the initial condition x = ξxυω (0); the state
ξxυω (t) is uniquely determined due to the assumptions on f [Son98]. We also denote by ζ1xυω (t) and ζ2xυω (t)
the corresponding external and internal output value of ξxυω (t), respectively, i.e. ζ1xυω (t) = h1 (ξxυω (t)) and
ζ2xυω (t) = h2 (ξxυω (t)).
We call ζ1 an external output trajectory, ζ2 an internal output trajectory, υ an external input trajectory, and
ω an internal input trajectory mainly because ζ2 and ω are used only for the interconnection purposes and ζ1
and υ remain available after any interconnection; see Definition 4.1 later for more detailed information.
Remark 2.2. If the control system Σ does not have internal inputs and outputs, the definition of control
systems in Definition 2.1 reduces to tuple Σ = (Rn , Rm , U, f, Rq , h) and the map f becomes f : Rn × Rm → Rn .
Correspondingly, equation (2.1) describing the evolution of system trajectories reduces to:
(
˙ = f (ξ(t), υ(t)),
ξ(t)
Σ:
ζ(t) = h(ξ(t)).
3. Storage and Simulation Functions
First, we introduce a notion of so-called storage functions, adapted from the notion of storage functions from
dissipativity theory [Wil72, AMP16]. While the notion of storage functions in [Wil72, AMP16] characterizes
the correlation of inputs and outputs of a single control system, the proposed notion of storage functions here
characterizes the joint correlation of inputs and outputs of two different control systems. In the case that
two control systems are the same and have only internal inputs and outputs, our notion of storage functions
recovers the one of incremental storage functions introduced in [SS07].
Definition 3.1. Let Σ = (Rn , Rm , Rp , U, W, f, Rq1 , Rq2 , h1 , h2 ) and Σ̂ = (Rn̂ , Rm̂ , Rp̂ , Û, Ŵ, fˆ, Rq1 , Rq̂2 , ĥ1 , ĥ2 )
be two control systems with the same external output space dimension. A continuously differentiable function
V : Rn × Rn̂ → R≥0 is called a storage function from Σ̂ to Σ if there exist α, η ∈ K∞ , ρext ∈ K∞ ∪ {0}, some
matrices W, Ŵ , H of appropriate dimensions, and some symmetric matrix X of appropriate dimension with
conformal block partitions X ij , i, j ∈ [1; 2], where X 22 0, such that for any x ∈ Rn and x̂ ∈ Rn̂ one has
α(kh1 (x) − ĥ1 (x̂)k) ≤ V (x, x̂),
(3.1)
4
M. ZAMANI AND M. ARCAK
and ∀û ∈ Rm̂ ∃u ∈ Rm such that ∀ŵ ∈ Rp̂ ∀w ∈ Rp one obtains
X:=
T z 11 }| 12 {
W w − Ŵ ŵ
W w − Ŵ ŵ
X
X
T f (x, u, w)
∇V (x, x̂)
≤ −η(V (x, x̂)) + ρext (kûk) +
.
X 21 X 22 h2 (x) − H ĥ2 (x̂)
fˆ(x̂, û, ŵ)
h2 (x) − H ĥ2 (x̂)
(3.2)
We use notation Σ̂ Σ if there exists a storage function V from Σ̂ to Σ. Control system Σ̂ (possibly with
n̂ < n) is called an abstraction of Σ. There are several key differences between the notion of storage function
here and the corresponding one of simulation function in [RZ16a, Definition 2]. Definition 2 in [RZ16a] requires
internal signals w, ŵ and h2 (x), ĥ2 (x̂) to live in the same spaces, respectively, which is not necessarily the case
here. Moreover, the choice of input u here satisfying (3.2) only depends on x, x̂, and û, whereas in [RZ16a,
Definition 2] it also depends on internal input ŵ. Finally, we should point out that if in [RZ16a, Definition 2]
µ(s) := sT P s, for any s ∈ Rp≥0 and some positive definite matrix P , then the simulation function in [RZ16a,
Definition 2] is also a storage function as in Definition 3.1 with W = Ŵ = Ip , X 11 = P , and the rest of
conformal block partitions of X are zero.
Now, we recall the notion of simulation functions introduced in [GP09] with some modifications.
Definition 3.2. Let Σ = (Rn , Rm , U, f, Rq , h) and Σ̂ = (Rn̂ , Rm̂ , Û, fˆ, Rq , ĥ) be two control systems. A
continuously differentiable function V : Rn × Rn̂ → R≥0 is called a simulation function from Σ̂ to Σ if there
exist α, η ∈ K∞ and ρext ∈ K∞ ∪ {0} such that for any x ∈ Rn and x̂ ∈ Rn̂ one has
and ∀û ∈ R
m̂
∃u ∈ R
m
α(kh(x) − ĥ(x̂)k) ≤ V (x, x̂),
(3.3)
such that
T
∇V (x, x̂)
f (x, u)
≤ −η(V (x, x̂)) + ρext (kûk).
fˆ(x̂, û)
(3.4)
We use notation Σ̂ S Σ if there exists a simulation function V from Σ̂ to Σ.
Let us point out the differences between Definition 3.2 here and [GP09, Definition 1]. Here, for the sake
of brevity, we simply assume that for every x, x̂, û, there exists u so that (3.4) holds. Whereas in [GP09,
Definition 1] the authors use an interface function k : Rn × Rn̂ × Rm̂ → Rm to feed the input u = k(x, x̂, û)
enforcing (3.4). Function α in [GP09, Definition 1] is assumed to be the identity. Furthermore, we frame the
decay condition (3.4) in so-called “dissipative” form, while in [GP09, Definition 1] the decay condition is given
in so-called “implication” form.
Note that the notions of storage functions in Definition 3.1 and simulation functions in Definition 3.2 are not
comparable in general. The former is defined for control systems with internal inputs and outputs while the
latter is defined only for control systems without internal inputs and outputs. One can readily verify that
both notions coincide for control systems without internal inputs and outputs.
The next theorem shows the importance of the existence of a simulation function by quantifying the error
between the output behaviours of Σ and the ones of its abstraction Σ̂.
Theorem 3.3. Let Σ = (Rn , Rm , U, f, Rq , h) and Σ̂ = (Rn̂ , Rm̂ , Û, fˆ, Rq , ĥ). Suppose V is a simulation
function from Σ̂ to Σ. Then, there exist a KL function ϑ such that for any υ̂ ∈ Û, x ∈ Rn , and x̂ ∈ Rn̂ , there
exists υ ∈ U such that the following inequality holds for any t ∈ R≥0 :
kζxυ (t) − ζ̂x̂υ̂ (t)k ≤α−1 (2ϑ (V (x, x̂), t)) + α−1 (2η −1 (2ρext (kυ̂k∞ ))).
(3.5)
The proof of Theorem 3.3 is similar to the one of Theorem 3.5 in [ZRMng] and is omitted due to lack of space.
Let us illustrate the importance of the existence of a simulation function, correspondingly inequality (3.5),
on a simple example. Assume we are given a control system Σ = (Rn , Rm , U, f, Rq , h) and interested in
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
5
computing a control input υ to keep the output ζxυ always inside a safe set D ⊂ Rq . Instead, one can
compute a control input υ̂ for the abstraction Σ̂ keeping the output ζ̂x̂υ̂ always inside D which is potentially
easier due to a lower dimension of Σ̂. The existence of a simulation function from Σ̂ to Σ and, hence,
the inequality (3.5) imply that there exists control input υ such that ζxυ is always inside Dε , where ε =
α−1 (2ϑ (V (x, x̂), 0)) + α−1 (2η −1 (2ρext (kυ̂k∞ ))) and Dε = {y ∈ Rp | inf y0 ∈D ky − y 0 k ≤ ε}. Note that one can
choose initial conditions x ∈ Rn and x̂ ∈ Rn̂ to minimize the first term in ε and, hence, to have a smaller error
in the satisfaction of the desired property.
Remark 3.4. Note that if α−1 and η −1 satisfy the triangle inequality (i.e., α−1 (a + b) ≤ α−1 (a) + α−1 (b)
and η −1 (a + b) ≤ η −1 (a) + η −1 (b) for all a, b ∈ R≥0 ), one can divide all the coefficients 2, appearing in the
right hand side of (3.5), by factor 2 to get a less conservative upper bound.
Remark 3.5. Note that if one is given an interface function k : Rn × Rn̂ × Rm̂ → Rm that maps every x, x̂,
û to an input u = k(x, x̂, û) such that (3.4) is satisfied (similar to [GP09, Definition 1]), then input υ realizing
ˆ υ̂). In Section 5 we show how the map k can be constructed for a class of
(3.5) is readily given by υ = k(ξ, ξ,
nonlinear control systems.
4. Compositionality Result
In this section, we analyze networks of control systems and show how to construct their abstractions together
with the corresponding simulation functions by using storage functions for the subsystems. The definition of
the network of control systems is based on the notion of interconnected systems described in [AMP16].
4.1. Interconnected control systems. Here, we define the interconnected control system as the following.
Definition 4.1. Consider N ∈ N≥1 control subsystems Σi = (Rni , Rmi , Rpi , Ui , Wi , fi , Rq1i , Rq2i , h1i , h2i ),
i ∈ [1; N ], and a static matrix M of an appropriate dimension defining the coupling of these subsystems. The
PN
interconnected control system Σ = (Rn , Rm , U, f, Rq , h), denoted by I(Σ1 , . . . , ΣN ), follows by n = i=1 ni ,
PN
PN
m = i=1 mi , q = i=1 q1i , and functions
f (x, u) := [f1 (x1 , u1 , w1 ); . . . ; fN (xN , uN , wN )],
h(x) := [h11 (x1 ); . . . ; h1N (xN )],
where u = [u1 ; . . . ; uN ], x = [x1 ; . . . ; xN ] and with the internal variables constrained by
[w1 ; . . . ; wN ] = M [h21 (x1 ); . . . ; h2N (xN )].
An interconnection of N control subsystems Σi is illustrated schematically in Figure 1.
⌃1
y
..
.
⌃N
M
[h21 (x1 ); . . . ; h2N (xN )]
[w1 ; . . . ; wN ]
u
Figure 1. An interconnection of N control subsystems Σ1 , . . . , ΣN .
6
M. ZAMANI AND M. ARCAK
4.2. Composing simulation functions from storage functions. We assume that we are given N control
subsystems Σi = (Rni , Rmi , Rpi , Ui , Wi , fi , Rq1i , Rq2i , h1i , h2i ) , together with their corresponding abstractions
Σ̂i = (Rn̂i , Rm̂i , Rp̂i , Ûi , Ŵi , fˆi , Rq1i , Rq̂2i , ĥ1i , ĥ2i ) and with storage functions Vi from Σ̂i to Σi . We use αi , ηi ,
ρiext , Hi , Wi , Ŵi , Xi , Xi11 , Xi12 , Xi21 , and Xi22 to denote the corresponding functions, matrices, and their
corresponding conformal block partitions appearing in Definition 3.1.
The next theorem, one of the main results of the paper, provides a compositional approach on the construction
of abstractions of networks of control systems and that of the corresponding simulation functions.
Theorem 4.2. Consider the interconnected control system Σ = I(Σ1 , . . . , ΣN ) induced by N ∈ N≥1 control
subsystems Σi and the coupling matrix M . Suppose each control subsystem Σi admits an abstraction Σ̂i with
the corresponding storage function Vi . If there exist µi ≥ 0, i ∈ [1; N ], and matrix M̂ of appropriate dimension
such that the matrix (in)equality
T
WM
WM
X(µ1 X1 , . . . , µN XN )
0,
(4.1)
Iq̃
Iq̃
W M H = Ŵ M̂ ,
are satisfied, where q̃ =
PN
i=1 q2i
(4.2)
and
W := diag(W1 , . . . , WN ), Ŵ := diag(Ŵ1 , . . . , ŴN ), H := diag(H1 , . . . , HN ),
µ1 X111
µ1 X112
..
..
.
.
11
12
µ
X
µ
X
N N
N N
X(µ1 X1 , . . . , µN XN ) :=
21
,
µ1 X122
µ1 X1
..
..
.
.
22
21
µN XN
µN XN
(4.3)
(4.4)
then
V (x, x̂) :=
N
X
µi Vi (xi , x̂i )
i=1
is a simulation function from the interconnected control system Σ̂ = I(Σ̂1 , . . . , Σ̂N ), with the coupling matrix
M̂ , to Σ.
Proof. First we show that inequality (3.3) holds for some K∞ function α. For any x = [x1 ; . . . ; xN ] ∈ Rn and
x̂ = [x̂1 ; . . . ; x̂N ] ∈ Rn̂ , one gets:
kh(x) − ĥ(x̂)k = k[h11 (x1 ); . . . ; h1N (xN )] − [ĥ11 (x̂1 ); . . . ; ĥ1N (x̂N )]k
≤
N
X
i=1
kh1i (x̂i ) − ĥ1i (xi )k ≤
where α is a K∞ function defined as
α(s) :=
max
→
s ≥0
s.t.
→
N
X
i=1
PN
i=1
αi−1 (Vi (xi , x̂i )) ≤ α(V (x, x̂)),
αi−1 (si )
→
µT s = s,
where s = [s1 ; . . . ; sN ] ∈ RN and µ = [µ1 ; . . . ; µN ]. By defining the K∞ function α(s) = α−1 (s), ∀s ∈ R≥0 ,
one obtains
α(kh(x) − ĥ(x̂)k) ≤ V (x, x̂),
satisfying inequality (3.3). Now we show that inequality (3.4) holds as well. Consider any x = [x1 ; . . . ; xN ] ∈
Rn , x̂ = [x̂1 ; . . . ; x̂N ] ∈ Rn̂ , and û = [û1 ; . . . ; ûN ] ∈ Rm̂ . For any i ∈ [1; N ], there exists ui ∈ Rmi , consequently,
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
7
a vector u = [u1 ; . . . ; uN ] ∈ Rm , satisfying (3.2) for each pair of subsystems Σi and Σ̂i with the internal inputs
given by [w1 ; . . . ; wN ] = M [h21 (x1 ); . . . ; h2N (xN )] and [ŵ1 ; . . . ; ŵN ] = M̂ [ĥ21 (x̂1 ); . . . ; ĥ2N (x̂N )]. We derive
the following inequality
V̇ (x, x̂) =
N
X
µi V̇i (xi , x̂i )
(4.5)
i=1
≤
N
X
µi
i=1
T 11
Wi wi − Ŵi ŵi
Xi
Xi21
h2i (xi ) − Hi ĥ2i (x̂i )
− ηi (Vi (xi , x̂i )) + ρiext (kûi k) +
Xi12
Xi22
Wi wi − Ŵi ŵi
.
h2i (xi ) − Hi ĥ2i (x̂i )
Using conditions (4.1) and (4.2) and the definition of matrices W , Ŵ , H, and X in (4.3) and (4.4), the
inequality (4.5) can be rewritten as
V̇ (x, x̂) ≤
N
X
i=1
−µi ηi (Vi (xi , x̂i )) +
+
≤
N
X
i=1
N
X
i=1
µi ρiext (kûi k)
T
w1
ŵ1
w1
ŵ1
..
..
..
..
W . − Ŵ .
W . − Ŵ .
wN
ŵN
wN
ŵN
X(µ1 X1 , . . . , µN XN )
h21 (x1 ) − H1 ĥ21 (x̂1 )
h21 (x1 ) − H1 ĥ21 (x̂1 )
..
..
.
.
h2N (xN ) − HN ĥ2N (x̂N )
−µi ηi (Vi (xi , x̂i )) +
N
X
i=1
h2N (xN ) − HN ĥ2N (x̂N )
µi ρiext (kûi k)
T
h21 (x1 ) − H1 ĥ21 (x̂1 )
h21 (x1 ) − H1 ĥ21 (x̂1 )
T
WM
WM
..
..
+
X(µ1 X1 , . . . , µN XN )
.
.
Iq̃
Iq̃
h2N (xN ) − HN ĥ2N (x̂N )
h2N (xN ) − HN ĥ2N (x̂N )
≤
N
X
i=1
−µi ηi (Vi (xi , x̂i )) +
N
X
i=1
µi ρiext (kûi k).
Define the functions
η(s) :=
ρext (s) :=
min
→
PN
s.t.
max
→
µT s = s,
PN
i=1 µi ρiext (si )
s.t.
k s k = s,
s ≥0
s ≥0
i=1
µi ηi (si )
→
→
(4.6a)
(4.6b)
where η ∈ K∞ and ρext ∈ K∞ ∪ {0}. By construction, we readily have
V̇ (x, x̂) ≤ −η (V (x, x̂)) + ρext (kûk),
which satisfies inequality (3.4). Hence, we conclude that V is a simulation function from Σ̂ to Σ.
Figure 2 illustrates schematically the result of Theorem 4.2.
Remark 4.3. Let us assume, ∀i ∈ [1; N ], Wi = Ipi and each control subsystem Σi is single-internal-input
single-internal-output. Under these assumptions, analytical feasibility conditions for matrix inequality (4.1)
can be derived for special interconnection matrices M including negative and positive feedback interconnection,
M. ZAMANI AND M. ARCAK
ûi
ˆi
⌃
ŵi
ĥ2i (xi )
wi
ŷ
..
u
.
ˆN
⌃
M̂
h1i (xi )
⌃i
⌃1
S
[w1 ; . . . ; wN ]
ˆ1
⌃
ui
[ĥ21 (x1 ); . . . ; ĥ2N (xN )]
[ŵ1 ; . . . ; ŵN ]
û
ĥ1i (xi )
h2i (xi )
y
..
.
⌃N
M
[h21 (x1 ); . . . ; h2N (xN )]
8
Figure 2. Compositionality results provided that conditions (4.1) and (4.2) are satisfied.
skew symmetric interconnection, negative feedback cyclic interconnection, and finally extension to cactus graphs
as provided in details in [AMP16, Chapter 2].
5. Abstraction Synthesis for a Class of Nonlinear Control Systems
In this section, we concentrate on a specific class of nonlinear control systems Σ and quadratic storage functions
V . In the first part, we formally define the specific class of nonlinear control systems with which we deal in
this section. In the second part, we assume that an abstraction Σ̂ is given and we provide conditions under
which V is a storage function. In the third part it is shown geometrically how to construct the abstraction Σ̂
together with the storage function V . Finally, we discuss the feasibility of a key condition based on which the
results of this section hold.
5.1. A class of nonlinear control systems. The class of nonlinear control systems, considered in this
section, is given by
ξ˙ = Aξ + Eϕ(F ξ) + Bυ + Dω,
Σ : ζ1 = C1 ξ,
(5.1)
ζ2 = C2 ξ,
where ϕ : R → R satisfies
ϕ(v) − ϕ(w)
≤ b, ∀v, w ∈ R, v 6= w,
v−w
for some a ∈ R and b ∈ R>0 ∪ {∞}, a ≤ b, and
a≤
(5.2)
A ∈ Rn×n , E ∈ Rn×1 , F ∈ R1×n , B ∈ Rn×m , D ∈ Rn×p , C1 ∈ Rq1 ×n , C2 ∈ Rq2 ×n .
We use the tuple
Σ = (A, B, C1 , C2 , D, E, F, ϕ),
to refer to the class of control systems of the form (5.1).
Remark 5.1. If ϕ in (5.1) is linear including the zero function (i.e. ϕ ≡ 0) or E is a zero matrix, one can
remove or push the term Eϕ(F ξ) to Aξ and, hence, the tuple representing the class of control systems reduces
to the linear one Σ = (A, B, C1 , C2 , D). Therefore, every time we use the tuple Σ = (A, B, C1 , C2 , D, E, F, ϕ),
it implicitly implies that ϕ is nonlinear and E is nonzero.
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
9
T c
c (A + BK) M
cZ M
c(BL1 + E)
c + C T X 22 C2 C T X 21 −F T
(A + BK) M
+M
−b
κM
2
2
c
(5.5)
X 12 C2
X 11
0
ZT M
0
0
2
T c
−F
0
(BL1 + E) M
0
0
b
——————————————————————————————————————————————–
Similar to what is shown in [AK01a], without loss of generality, we can assume a = 0 in (5.2) for the class of
nonlinear control systems in (5.1). If a 6= 0, one can define a new function ϕ(r)
e
:= ϕ(r) − ar which satisfies
e
(5.2) with e
a = 0 and b = b − a, and rewrite (5.1) as
e + E ϕ(F
e ξ) + Bυ + Dω,
ξ˙ = Aξ
Σ : ζ1 = C1 ξ,
ζ2 = C2 ξ,
e = A + aEF .
where A
Remark 5.2. For simplicity of derivations, we restrict ourselves to systems with a single nonlinearity as in
(5.1). However, it would be straightforward to obtain analogous results for systems with multiple nonlinearities
as
M
X
ξ˙ = Aξ +
Ei ϕi (Fi ξ) + Bυ + Dω,
Σ:
i=1
ζ = C1 ξ,
1
ζ2 = C 2 ξ
where ϕi : R → R satisfies (5.2) for some ai ∈ R and bi ∈ R>0 ∪ {∞}, Ei ∈ Rn×1 , and Fi ∈ R1×n , for
any i ∈ [1; M ]. Furthermore, the proposed results here can also be extended to systems with multivariable
nonlinearities satisfying a multivariable sector property along the same lines as in [FA03] in the context of
observer design.
Note that the class of nonlinear control systems in (5.1) and Remark 5.2 has been used widely to model many
physical systems including active magnetic bearing [AK01a], flexible joint robot [FA03], fuel cell [AGPV03],
the power generators [Sch04], underwater vehicles [AAFK01], and so on.
5.2. Quadratic storage functions. Here, we consider a quadratic storage function of the form
c(x − P x̂),
V (x, x̂) = (x − P x̂)T M
(5.3)
c 0 are some matrices of appropriate dimensions. In order to show that V in (5.3) is a storage
where P and M
function from an abstraction Σ̂ to a concrete system Σ, we require the following key assumption on Σ.
Assumption 1. Let Σ = (A, B, C1 , C2 , D, E, F, ϕ). Assume that for some constant κ
b ∈ R>0 there exist
c 0, K, L1 , Z, W , X 11 , X 12 , X 21 , and X 22 0 of appropriate dimensions such that the matrix
matrices M
equality
D = ZW,
(5.4)
and inequality (5.5) hold, where 0’s in (5.5) denote zero matrices of appropriate dimensions.
The next rather straightforward result provides a necessary and sufficient geometric condition for the existence
of matrix W appearing in condition (5.4).
Lemma 5.3. Given D and Z, condition (5.4) is satisfied for some matrix W if and only if
im D ⊆ im Z.
(5.6)
10
M. ZAMANI AND M. ARCAK
22
21
−b
κM + X
X
−M F T
Z BL1 + E
12
(5.7)
0
0
X
X 11
0
2
E T + LT1 B T
0
0
−F M
0
b
——————————————————————————————————————————————–
T
M AT + AM + K B T + BK
ZT
Note that the feasibility characterization of LMI (5.5) is more involved and will be discussed in details at the
end of this section.
c, K, L1 , Z, and linear in the variables X 11 ,
Note that matrix inequality (5.5) is bilinear in the variables M
12
21
22
X , X , and X when we fix the constant κ
b. However, by assuming C2 is a square and invertible matrix
−1
c
c−1 , X 22 = M
c−1 C T X 22 C2 M
c−1 , X 21 = M
c−1 C T X 21 ,
and introducing new variables K = K M , M = M
2
2
12
12
−1
c , and multiplying (5.5) from both sides by
X = X C2 M
c−1 0 0
M
0
In 0 ,
0
0 1
where 0’s denote zero matrices of appropriate dimension, one obtains the matrix inequality (5.7) which is an
22
21
12
b is a fixed
LMI (linear matrix inequality) in the variables M , K, L1 , Z, X , X , X , and X 11 when κ
constant.
Remark 5.4. Note that one can combine the compositionality condition (4.1) with a simultaneous search
for quadratic storage functions (5.3) for subsystems of the form (5.1). In particular, assume we are given
N control subsystems Σi = (Ai , Bi , C1i , C2i , Di , Ei , Fi , ϕi ), ∀i ∈ [1; N ]. For any i ∈ [1; N ], one can consider
matrices Xi in the LMI (4.1) as decision variables instead of being fixed and µi = 1 without loss of generality,
and solve the combined feasibility problems (5.5) and (4.1). Although the combined feasibility problem may be
huge for large networks and solving it directly may be intractable, one can use the alternating direction method
of multipliers (ADMM) to solve the feasibility problem in a distributed fashion along the same lines proposed
in [MLAP15].
Now, we provide one of the main results of this section showing under which conditions V in (5.3) is a storage
function.
Theorem 5.5. Let Σ = (A, B, C1 , C2 , D, E, F, ϕ) and Σ̂ = (Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ , ϕ) with q1 = q̂1 . Suppose
Assumption 1 holds and that there exist matrices P , Q, H, L2 , and Ŵ such that
AP = P Â − BQ
C1 P = Ĉ1
X 12 C2 P = X 12 H Ĉ2
22
22
X C2 P = X H Ĉ2
F P = F̂
E = P Ê − B(L1 − L2 )
P D̂ = Z Ŵ ,
(5.8a)
(5.8b)
(5.8c)
(5.8d)
(5.8e)
(5.8f)
(5.8g)
hold. Then, function V defined in (5.3) is a storage function from Σ̂ to Σ.
Before providing the proof, we point out that there always exist matrices {Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ } satisfying
(5.8) if P = In implying that n̂ = n. Naturally, it is better to have the simplest abstraction Σ̂ and, therefore,
one should seek a P with n̂ as small as possible. We elaborate on the construction of P satisfying (5.8) in
details in the next subsection.
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
11
Proof. From (5.8b) and for all x ∈ Rn , x̂ ∈ Rn̂ , we have kC1 x − Ĉ1 x̂k2 = (x − P x̂)T C1T C1 (x − P x̂). It can be
c)
λmin (M
kC1 x − Ĉ1 x̂k2 ≤ V (x, x̂) holds for all x ∈ Rn , x̂ ∈ Rn̂ implying that inequality
λmax (C1T C1 )
c)
λmin (M
α(r) = λmax
r2 for any r ∈ R≥0 . We proceed with showing that the inequality (3.2)
(C1T C1 )
readily verified that
(3.1) holds with
holds. Note that
∂V (x, x̂)
c, ∂V (x, x̂) = −2(x − P x̂)T M
cP.
= 2(x − P x̂)T M
(5.9)
∂x
∂ x̂
Given any x ∈ Rn , x̂ ∈ Rn̂ , and û ∈ Rm̂ , we choose u ∈ Rm via the following linear interface function:
e + L1 ϕ(F x) − L2 ϕ(F P x̂),
u =k(x, x̂, û) := K(x − P x̂) + Qx̂ + Rû
(5.10)
e of appropriate dimension.
for some matrix R
By using the equations (5.8a), (5.8e), and (5.8f) and the definition of the interface function in (5.10), we get
Ax + Eϕ(F x) + Bk(x, x̂, û) + Dw − P (Âx̂ + Êϕ(F̂ x̂) + B̂ û + D̂ŵ) =
e − P B̂)û + (E + BL1 )(ϕ(F x) − ϕ(F P x̂)).
(A + BK)(x − P x̂) + (Dw − P D̂ŵ) + (B R
Using (5.9), (5.4), and (5.8g), we obtain the following expression for V̇ (x, x̂):
c (A + BK)(x − P x̂) + (ZW w − Z Ŵ ŵ)
V̇ (x, x̂) =2(x − P x̂)T M
e − P B̂)û + (E + BL1 )(ϕ(F x) − ϕ(F P x̂)) .
+ (B R
From the slope restriction (5.2), one obtains
ϕ(F x) − ϕ(F P x̂) = δ(F x − F P x̂) = δF (x − P x̂),
(5.11)
where δ is a constant and depending on x and x̂ takes values in the interval [0, b]. Using (5.11), the expression
for V̇ (x, x̂) reduces to:
c ((A + BK) + δ(E + BL1 )F )(x − P x̂) + Z(W w − Ŵ ŵ) + (B R
e − P B̂)û .
V̇ (x, x̂) = 2(x − P x̂)T M
Using Young’s inequality [You12] as
1
2
a + b2 ,
2
2
for any a, b ∈ R and any > 0, and with the help of Cauchy-Schwarz inequality, (5.5), (5.8c), and (5.8d), one
gets the following upper bound for V̇ (x, x̂):
c ((A + BK) + δ(E + BL1 )F )(x − P x̂) + Z(W w − Ŵ ŵ) + (B R
e − P B̂)û
V̇ (x, x̂) = 2(x − P x̂)T M
T
T c
c (A + BK) M
cZ M
c(BL1 + E) x − P x̂
(A + BK) M
+M
x − P x̂
c
= W w − Ŵ ŵ
ZT M
0
0
W w − Ŵ ŵ
c
δF (x − P x̂)
δF (x − P x̂)
(BL1 + E)T M
0
0
ab ≤
c(B R
e − P B̂)û
+ 2(x − P x̂)T M
T
c + C T X 22 C2
x − P x̂
−b
κM
2
≤ W w − Ŵ ŵ
X 12 C2
δF (x − P x̂)
−F
x − P x̂
−F T
c(B R
e − P B̂)û
0 W w − Ŵ ŵ + 2(x − P x̂)T M
2
δF (x − P x̂)
b
T 11
δ
W w − Ŵ ŵ
X
X 12
W w − Ŵ ŵ
=−κ
bV (x, x̂) − 2δ(1 − )(x − P x̂)T F T F (x − P x̂) +
X 21 X 22 C2 x − H Ĉ2 x̂
b
C2 x − H Ĉ2 x̂
C2T X 21
X 11
0
c(B R
e − P B̂)û
+ 2(x − P x̂)T M
p
T 11
c(B R
e − P B̂)k2
k M
W w − Ŵ ŵ
X
≤ − (b
κ − π)V (x, x̂) +
kûk2 +
X 21
π
C2 x − H Ĉ2 x̂
for any positive constant π < κ
b.
X 12
X 22
W w − Ŵ ŵ
,
C2 x − H Ĉ2 x̂
12
M. ZAMANI AND M. ARCAK
Using this computed upper bound, the inequality (3.2)
ρext ∈ K∞ ∪{0},
√ is satisfied with the functions η ∈ K∞ , 11
2
c
e
X
X 12
B̂)k 2
and the matrix X, as η(s) := (b
κ − π)s, ρext (s) := k M (B R−P
s , ∀s ∈ R≥0 , and X =
.
π
X 21 X 22
The next result shows that conditions (5.8a)-(5.8f) are actually necessary for (5.3) being a storage function
e
from Σ̂ to Σ provided that the structure of the interface function is as in (5.10) for some matrices K, Q, R,
L1 , and L2 of appropriate dimension.
Theorem 5.6. Let Σ = (A, B, C1 , C2 , D, E, F, ϕ) and Σ̂ = (Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ , ϕ) with q1 = q̂1 . Suppose that V defined in (5.3) is a storage function from Σ̂ to Σ with the interface k given in (5.10). Then,
equations (5.8a)-(5.8f) hold.
Proof. Since V is a storage function from Σ̂ to Σ, there exists a K∞ function α such that kC1 x − Ĉ1 x̂k ≤
α−1 (V (x, x̂)). From (5.3), it follows that kC1 P x̂ − Ĉ1 x̂k ≤ α−1 (V (P x̂, x̂)) = 0 holds for all x̂ ∈ Rn̂ which
implies (5.8b).
Let us consider the inputs υ̂ ≡ 0, ω ≡ 0, and ω̂ ≡ 0. Since X 22 0, inequality (3.2) reduces to
V̇ (x, x̂) ≤ −η(V (x, x̂)) + (h2 (x) − H ĥ2 (x̂))T X 22 (h2 (x) − H ĥ2 (x̂)) ≤ −η(V (x, x̂)),
(5.12)
for any x ∈ Rn and x̂ ∈ Rn̂ . Using the results in Lemma 4.4 in [LSW96] or Lemma 3.6 in [ZRMng], inequality
(5.12) implies the existence of a KL function ϑ such that
ˆ
ˆ
V (ξ(t), ξ(t))
≤ ϑ(V (ξ(0), ξ(0)),
t),
(5.13)
holds, where υ̂ ≡ 0, ω ≡ 0, ω̂ ≡ 0, and υ is given by the interface function k in (5.10). Then, for all
ˆ
ˆ
ξ(0) = P ξ(0),
t ≥ 0, and using (5.13), we obtain V (ξ(t), ξ(t))
= 0. Since M is positive definite, we have
ˆ
ξ(t) = P ξ(t)
and
˙ = P ξ(t),
ˆ˙
ξ(t)
from which we derive that
AP x̂ + BQx̂ + (E + B(L1 − L2 ))ϕ(F P x̂) = P Âx̂ + P Êϕ(F̂ x̂)
n̂
holds for all x̂ ∈ R and, hence, (5.8a), (5.8e), and (5.8f) follows. It remains to show that (5.8c) and (5.8d)
hold. First assume X 22 6= 0. Since V̇ (P x̂, x̂) = V (P x̂, x̂) = 0 and using the first inequality in (5.12), one gets
(C2 P x̂ − H Ĉ2 x̂)T X 22 (C2 P x̂ − H Ĉ2 x̂) ≥ 0,
for any x̂ ∈ Rn̂ . Since X 22 0 and by assumption X 22 6= 0, one obtains X 22 (C2 P − H Ĉ2 ) = 0 which implies
(5.8d). Now, let us consider the inputs υ̂ ≡ 0, ω 6≡ 0, and ω̂ 6≡ 0. Therefore, inequality (3.2) reduces to
V̇ (x, x̂) ≤ − η(V (x, x̂)) + (W w − Ŵ ŵ)T X 11 (W w − Ŵ ŵ) + 2(W w − Ŵ ŵ)T X 12 (C2 x − H Ĉ2 x̂),
(5.14)
for any x ∈ Rn , x̂ ∈ Rn̂ , w ∈ Rp , and ŵ ∈ Rp̂ . From (5.14) and by choosing x = 0n and x̂ = 0n̂ , one can
readily verify that X 11 0. Then, for all x = P x̂, we obtain
(W w − Ŵ ŵ)T X 11 (W w − Ŵ ŵ) + 2(W w − Ŵ ŵ)T X 12 (C2 P − H Ĉ2 )x̂ ≥ 0,
for any w, ŵ, and x̂, which implies X 12 (C2 P − H Ĉ2 ) = 0 and, hence, (5.8c) holds.
e is a free design parameter in the interface function (5.10). Using the results
Remark 5.7. Note that matrix R
e to minimize function ρext for V and, hence, reduce the upper bound in
in [GP09, Proposition 1], we choose R
e minimizing ρext is given by
(3.5) on the error between the output behaviors of Σ and Σ̂. The choice of R
e = (B T M
cB)−1 B T M
cP B̂.
R
(5.15)
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
13
So far, we extracted various conditions on the original system matrices {A, B, C1 , C2 , D, E, F }, the abstraction
matrices {Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ }, and the ones appearing in (5.3) and (5.10). Those conditions ensure that
V in (5.3) is a storage function from Σ̂ to Σ with the corresponding interface function in (5.10) refining any
control signal designed for Σ̂ to the one for Σ. Apparently, those requirements do not enforce any condition
on matrix B̂. For example, one can select B̂ = In̂ making the abstract system Σ̂ fully actuated. On the other
hand, one can ask not only for the existence of a storage function from Σ̂ to Σ, but additionally require that
all the controllable behaviors (in the absence of internal inputs) of the concrete system Σ are preserved over
the abstraction Σ̂. We refer the interested readers to [GP09, Subsection 4.1] and [PLS00, Section V] for more
details on what we mean by preservation of controllable behaviors.
The next theorem requires a condition on B̂ in order to guarantee the preservation of controllable behaviors
of Σ over Σ̂.
Theorem 5.8. Let Σ = (A, B, C1 , C2 , D, E, F, ϕ) and Σ̂ = (Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ , ϕ) with q1 = q̂1 . Suppose
that there exist matrices P , Q, L1 , and L2 satisfying (5.8a) and (5.8f), and that matrix B̂ is given by
B̂ = [P̂ B P̂ AG],
(5.16)
where P̂ and G are assumed to satisfy
C1 = Ĉ1 P̂
(5.17a)
In = P P̂ + GT
(5.17b)
In̂ = P̂ P
(5.17c)
F = F̂ P̂ ,
(5.17d)
ˆ ζ̂1 , ζ̂2 , υ̂, 0) of Σ̂
for some matrix T . Then, for every trajectory (ξ, ζ1 , ζ2 , υ, 0) of Σ there exists a trajectory (ξ,
where ξˆ = P̂ ξ and ζ1 = ζ̂1 hold.
Proof. Let (ξ, ζ1 , ζ2 , υ, 0) be a trajectory of Σ. We are going to show that (P̂ ξ, ζ1 , ζ̂2 , υ̂, 0) with
υ − QP̂ ξ − (L1 − L2 )ϕ(F ξ)
υ̂ =
,
Tξ
is a trajectory of Σ̂. We use (5.17b) and derive
P̂ ξ˙ =P̂ Aξ + P̂ Eϕ(F ξ) + P̂ Bυ = P̂ AP P̂ ξ + P̂ A(In − P P̂ )ξ + P̂ Eϕ(F ξ) + P̂ Bυ
=P̂ AP P̂ ξ + P̂ AGT ξ + P̂ Eϕ(F ξ) + P̂ Bυ.
Now we use the equations (5.8a), (5.8f), (5.17c), and (5.17d) and the definition of B̂ and υ̂ to derive
P̂ ξ˙ =P̂ (P Â − BQ)P̂ ξ + P̂ AGT ξ + P̂ (P Ê − B(L1 − L2 ))ϕ(F ξ) + P̂ Bυ
=ÂP̂ ξ − P̂ BQP̂ ξ + P̂ AGT ξ + Êϕ(F̂ P̂ ξ) − P̂ B(L1 − L2 )ϕ(F ξ) + P̂ Bυ
=ÂP̂ ξ + Êϕ(F̂ P̂ ξ) + [P̂ B P̂ AG]υ̂ = ÂP̂ ξ + Êϕ(F̂ P̂ ξ) + B̂ υ̂,
showing that (P̂ ξ, ζ̂1 , ζ̂2 , υ̂, 0) is a trajectory of Σ̂. From C1 = Ĉ1 P̂ in (5.17a), it follows that ζ̂1 = ζ1 which
concludes the proof.
Remark 5.9. Note that the previous result establishes that Σ̂ (in the absence of internal inputs) is P̂ -related
to Σ as in [GP09, Definition 3]. We refer the interested readers to [PLS00] for more details about properties
(e.g. controllability) of Φ-related systems for some surjective smooth map Φ.
14
M. ZAMANI AND M. ARCAK
5.3. Construction of abstractions. Here, we provide several straightforward sufficient and necessary geometric conditions on matrices appearing in the definition of Σ̂, of storage function and its corresponding
interface function. The proposed geometric conditions facilitate the constructions of such matrices. First, we
recall [GP09, Lemma 2] providing necessary and sufficient conditions for the existence of matrices  and Q
appearing in condition (5.8a).
Lemma 5.10. Consider matrices A, B, and P . There exist matrices  and Q satisfying (5.8a) if and only if
im AP ⊆ im P + im B.
(5.18)
Now, we give necessary and sufficient conditions for the existence of matrices Ĉ2 , Ê, and L2 appearing in
conditions (5.8c), (5.8d), and (5.8f), respectively.
Lemma 5.11. Given P , C2 , and X 12 (resp. X 22 ), there exists matrix Ĉ2 satisfying (5.8c) (resp. (5.8d)) if
and only if
im X 12 C2 P ⊆ im X 12 H, (resp. im X 22 C2 P ⊆ im X 22 H)
(5.19)
for some matrix H of appropriate dimension.
Lemma 5.12. Given P , B, and L1 , there exist matrices Ê and L2 satisfying (5.8f) if and only if
im E ⊆ im P + im B.
(5.20)
Lemmas 5.10, 5.11, and 5.12 provide necessary and sufficient conditions on P and H resulting in the construction of matrices Â, Ĉ2 , and Ê together with the matrices Q and L2 appearing in the definition of the interface
function in (5.10). Matrices F̂ and Ĉ1 are computed as F̂ = F P and Ĉ1 = C1 P . The next lemma provides a
necessary and sufficient condition on the existence of matrix D̂ appearing in condition (5.8g).
Lemma 5.13. Given Z, there exists matrix D̂ satisfying (5.8g) if and only if
im Z Ŵ ⊆ im P,
(5.21)
for some matrix Ŵ of appropriate dimension.
Although condition (5.21) is readily satisfied by choosing Ŵ = 0, one should preferably aim at finding a
nonzero Ŵ to smooth later the satisfaction of compositionality condition (4.2).
As we already mentioned, the choice of matrix B̂ is free. One can also construct B̂ as in (5.16) ensuring
preservation of all controllable behaviors of Σ over Σ̂ under extra conditions given in (5.17). Lemma 3 in
[GP09], as recalled next, provides necessary and sufficient conditions on P and C1 for the existence of P̂ , G,
and T satisfying (5.17a), (5.17b), and (5.17c).
Lemma 5.14. Consider matrices C1 and P with P being injective and let Ĉ1 = C1 P . There exists matrix P̂
satisfying (5.17a), (5.17b), and (5.17c), for some matrices G and T of appropriate dimensions, if and only if
im P + ker C1 = Rn .
(5.22)
Similar to Lemma 5.14, we give necessary and sufficient conditions on P and F for the existence of P̂ satisfying
(5.17d).
Lemma 5.15. Consider matrices F and P with P being injective and let F̂ = F P . There exists matrix P̂
satisfying (5.17d) if and only if
im P + ker F = Rn .
(5.23)
Note that conditions (5.5), (5.6), and (5.18)-(5.21) (resp. (5.5), (5.6), and (5.18)-(5.23)) complete the characterization of mainly matrices P and Z which together with the matrices {A, B, C1 , C2 , D, E, F } result in the
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
15
construction of matrices {Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ }, where B̂ can be chosen freely with appropriate dimensions
(resp. B̂ is computed as in (5.16)).
We summarize the construction of the abstraction Σ̂, storage function V in (5.3), and its corresponding
interface function in (5.10) in Table 1.
Table 1. Construction of Σ̂ = (Â, B̂, Ĉ1 , Ĉ2 , D̂, Ê, F̂ , ϕ), the corresponding storage function
V in (5.3), and interface function in (5.10) for a given Σ = (A, B, C1 , C2 , D, E, F, ϕ).
c, K, L1 , Z, X 11 , X 12 , and X 22 satisfying (5.5) and (5.6).
1. Compute matrices M
2. Pick an injective P with the lowest rank satisfying (5.18)-(5.21) (resp. (5.18)-(5.23));
3. Compute  and Q from (5.8a);
4. Compute Ê and L2 from (5.8f);
5. Compute F̂ = F P ;
6. Compute Ĉ1 = CP ;
6. Compute Ĉ2 satisfying H Ĉ2 = CP for some H;
7. Compute D̂ satisfying P D̂ = Z Ŵ for some (rather nonzero) Ŵ ;
8. Choose B̂ freely (resp. B̂ = [P̂ B P̂ AG]);
e appearing in (5.10), from (5.15);
9. Compute R,
5.4. Feasibility of LMI (5.5). In this subsection we discuss sufficient and necessary feasibility conditions
T c
for the LMI (5.5) in the restrictive case of X 12 = 0 and X 11 Z πM Z for any positive constant π < κ
b,
where 0 denotes a zero matrix of appropriate dimension. To do so, we convert the feasibility conditions for
the restricted version of LMI (5.5) into the ones for two dual control problems. When b = ∞ in (5.5), the
feasibility of restricted (5.5) is dual to the one of designing a controller rendering a linear system strictly
positive real (SPR) [AK01b]. When b < ∞, the duality is with a linear L2 -gain assignment control problem
[Isi99, Section 13.2].
When b = ∞, the restricted version of LMI (5.5) reduces to
T c
c (A + BK) ≺ 0,
+M
(A + BK) M
c(BL1 + E) + F T = 0.
M
(5.24)
(5.25)
By virtue of the Positive-Real Lemma [Yak62], conditions (5.24) and (5.25) mean that the linear control system
ξ˙ = Aξ + Bυ + Eω,
Σ:
(5.26)
ζ = −F ξ,
is enforced SPR from the disturbance ω to the output ζ by the control law
υ = Kξ + L1 ω.
(5.27)
Therefore, when b = ∞, the feasibility of the restricted version of LMI (5.5) is dual to the feasibility of the
control problem in which the system (5.26) is enforced SPR by the control law (5.27).
When b < ∞, using the Schur complement of −2/b, one can readily verify that the restricted version of LMI
(5.5) is equivalent to
T
b
c+M
c A + BK + b (BL1 + E)F
A + BK + (BL1 + E)F
M
2
2
bc
c + b F T F ≺ 0,
+ M
(BL1 + E)(BL1 + E)T M
2
2
16
M. ZAMANI AND M. ARCAK
which means that the L2 -gain of the dual system (5.26) from input ω
e := ω + (b/2)ζ to output ζ is enforced to
be strictly less than 2/b by the control law υ = Kξ + L1 ω [Isi99, Section 13.2].
We refer the interested readers to [AK01a, Theorem 3] deriving sufficient and necessary feasibility conditions
for the restricted version of LMI (5.5) by looking into the corresponding dual control problems, namely,
enforcing SPR and assigning a linear L2 -gain.
Note that in the context of observer design and observer-based control, the feasibility of those dual control
problems have been investigated for several physical problems in [AK01a, FA03, AGPV03, Sch04].
6. Example
Consider a linear control system Σ = (−L, In , C) satisfying
ξ˙ = −Lξ + υ,
Σ:
ζ = Cξ,
for some matrix C ∈ Rq×n and L ∈ Rn×n . Assume L is the Laplacian matrix [GR01] of an undirected graph,
e.g., for a complete graph:
n−1
−1
···
···
−1
−1
n−1
−1
···
−1
−1
−1
n
−
1
·
·
·
−1
(6.1)
L=
,
..
..
..
..
.
.
.
.
−1
···
···
−1 n − 1
and C has the following block diagonal structure
C = diag(C11 , . . . , C1N ),
q1i ×ni
where C1i ∈ R
. We partition ξ as ξ = [ξ1 ; . . . ; ξN ] and υ as υ = [υ1 ; . . . ; υN ] where ξi and υi are both
taking values in Rni , ∀i ∈ [1; N ]. Now, by introducing Σi = (0ni , Ini , C1i , Ini , Ini ) satisfying
ξ˙i = ωi + υi ,
Σi :
ζ1i = C1i ξi ,
ζ2i = ξi ,
one can readily verify that Σ = I(Σ1 , . . . , ΣN ) where the coupling matrix M is given by M = −L.
Our goal is to aggregate each ξi taking values in Rni into a scalar-valued ξˆi , governed by Σ̂i = (0, 1, C1i 1ni , 1, 1)
which satisfies:
˙
ξˆi = ω̂i + υ̂i ,
Σ̂i : ζ̂1i = C1i 1ni ξˆi ,
ζ̂2i = ξˆi .
ci = In , Ki =
One can readily verify that, for any i ∈ [1; N ], conditions (5.4) and (5.5) are satisfied with M
i
11
22
12
−λIni , for some λ > 0, κ
bi = 2λ, Zi = Ini , L1i = 0, Wi = Ini , X = 0, X = 0, and X = X 21 = Ini , where
0 denotes zero matrices of appropriate dimensions. Moreover, for any i ∈ [1; N ], Pi = 1ni satisfies conditions
(5.8) with Qi = L2i = 0ni , H = 1ni , and Ŵi = 1ni . Hence, function Vi (xi , x̂i ) = (xi − 1ni x̂i )T (xi − 1ni x̂i )
is a storage function from Σ̂i to Σi satisfying condition (3.1) with αi (r) = λmax (C1 T C1i ) r2 and condition (3.2)
1i
with η(r) = −2λr, ρext (r) = 0, ∀r ∈ R≥0 , Wi = Ini , Ŵi = Hi = 1ni , and
0 I ni
Xi =
,
Ini
0
(6.2)
where the input ui ∈ Rni is given via the interface function in (5.10) as ui = −λ(xi − 1ni x̂i ) + 1ni ûi . Note
ei = 1n was computed as in (5.15).
that R
i
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
17
Now, we look at Σ̂ = I(Σ̂1 , . . . , Σ̂N ) with a coupling matrix M̂ satisfying condition (4.2) as follows:
− Ldiag(1n1 , . . . , 1nN ) = diag(1n1 , . . . , 1nN )M̂ .
(6.3)
Note that the existence of M̂ satisfying (6.3) for a graph Laplacian L means that the N subgraphs form an
equitable partition of the full graph [GR01]. Although this restricts the choice of a partition in general, for the
complete graph (6.1) any partition is equitable.
Choosing µ1 = · · · = µN = 1 and using Xi in (6.2), matrix X in (4.4) reduces to
0 In
X=
,
In 0
and condition (4.1) reduces to
T
−L
−L
X
= −L − LT 0
In
In
which always holds without any restrictions on the size of the graph. In order to show the above inequality,
we used L = LT 0 which is always true for Laplacian matrices of undirected graphs.
For the sake of simulation, we fix n = 9 and
1 0
C = 0 0
0 0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0 ,
1
where
C11 = 1
0
0 , C12 = 0
1
0 , C13 = 0
0
1 .
Let us now synthesize a controller for Σ via the abstraction Σ̂ to enforce the specification, defined by the LTL
formula [BK08]
5
^
(¬Oi ) ∧ 3T1 ∧ 3T2 ,
(6.4)
ψ = S ∧
i=1
which requires that any output trajectory ζ of the closed loop system evolves inside the set S, avoids sets
Oi , i ∈ [1; 5], indicated with blue boxes in Figure 6, and visits each Ti , i ∈ [1; 2], indicated with red boxed
in Figure 6, infinitely often. We use SCOTS [RZ16b] to synthesize a controller for Σ̂ to enforce (6.4). In the
synthesis process we restricted the abstract inputs to û1 , û2 , û3 ∈ [−14, 14]. Given that we can set the initial
states of Σ to xi = Pi x̂i , so that Vi (xi , x̂i ) = 0, and since ρext (r) = 0, ∀r ∈ R≥0 , we obtain kζ(t) − ζ̂(t)k = 0
for all t ≥ 0. A closed-loop output trajectory of Σ is illustrated in Figure 6. Note that it would not have
been possible to synthesize a controller using SCOTS for the original 9-dimensional system Σ, without the
3-dimensional intermediate approximation Σ̂.
Remark 6.1. This scale-free result highlights the advantage of dissipativity-type over small-gain type conditions proposed in [RZ15, RZ16a]: the storage function Vi from Σ̂i to Σi in this example also satisfies the
requirements of a simulation function defined in [RZ15, RZ16a]; however, the resulting small-gain type condin−1
< 1 which involves the spectral radius1 of L (ρ(L) = n). Hence,
tion, e.g., for L in (6.1) reduces to n−1+λ
using the results in [RZ15, RZ16a], one can readily verify that as the number of components increases, e.g.
n → ∞, the quality of approximation deteriorates unless the interface gain λ is increasing with n which is not
desirable because it results in high amplitude inputs ui .
1The spectral radius of a square matrix A ∈ Rn×n , denoted by ρ(A), is defined as ρ(A) := max{|λ |, · · · , |λ |} where λ , . . . , λ
n
n
1
1
are eigenvalues of A.
18
M. ZAMANI AND M. ARCAK
Figure 3. The specification with closed loop output trajectory of Σ. The sets S, Oi , i ∈ [1; 5],
and Ti , i ∈ [1; 2] are given by: S = [0, 10]3 , T1 = [1, 2]3 and T2 = [8, 9]3 , O1 = [4, 6]3 ,
O2 = [7, 9] × [1, 3] × [0, 10], O3 = [2, 3] × [7, 8] × [0, 10], O4 = [1, 2] × [1, 2] × [5, 10], and
O5 = [8, 9] × [8, 9] × [0, 5].
7. Conclusion
In this paper, we proposed for the first time a notion of so-called storage function relating a concrete control
system to its abstraction by quantifying their joint input-output correlation. This notion was adapted from
the one of storage function from dissipativity theory. Given a network of control subsystems together with
their corresponding abstractions and storage functions, we provide compositional conditions under which a
network of abstractions approximate the original network and the approximation error can be quantified compositionally using the storage functions of the subsystems. Finally, we provide a procedure for the construction
of abstractions together with their corresponding storage functions for a class of nonlinear control systems by
using the bounds on the slope of system nonlinearities. One of the main advantages of the proposed results
here based on a dissipativity-type condition in comparison with the existing ones based on a small-gain type
condition is that the former can enjoy specific interconnection matrix and provide scale-free compositional
conditions (cf. Section 6).
8. Acknowledgments
The authors would like to thank Mahmoud Khaled for the simulation in Section 6.
References
[AAFK01] O. M. Aamo, M. Arcak, T. I. Fossen, and P. V. Kokotovic. Global output tracking control of a class of Euler-Lagrange
systems with monotonic non-linearities in the velocities. International Journal of Control, 74(7):649–658, 2001.
[AGPV03] M. Arcak, H. Görgün, L. M. Pedersen, and S. Varigonda. An adaptive observer design for fuel cell hydrogen estimation.
In Proceedings of American Control Conference, pages 2037–2042, June 2003.
[AK01a]
M. Arcak and P. P. Kokotovic. Observer-based control of systems with slope-restricted nonlinearities. IEEE Transactions on Automatic Control, 46(7):1146–1150, July 2001.
[AK01b] M. Arcak and P. V. Kokotovic. Feasibility conditions for circle criterion designs. Systems & Control Letters, 42(5):405–
412, 2001.
[AMP16] M. Arcak, C. Meissen, and A. Packard. Networks of dissipative systems. SpringerBriefs in Electrical and Computer
Engineering. Springer International Publishing, 2016.
[BK08]
C. Baier and J. P. Katoen. Principles of model checking. The MIT Press, April 2008.
[DK04]
K. C. Das and P. Kumar. Some new bounds on the spectral radius of graphs. Discrete Mathematics, 281(1-3):149–161,
April 2004.
[FA03]
X. Fan and M. Arcak. Observer design for systems with multivariable monotone nonlinearities. Systems & Control
Letters, 50:319–330, 2003.
COMPOSITIONAL ABSTRACTION FOR NETWORKS OF CONTROL SYSTEMS: A DISSIPATIVITY APPROACH
19
[Fre05]
G. F. Frehse. Compositional verification of hybrid systems using simulation relations. PhD thesis, Radboud Universiteit Nijmegen, 2005.
[GP09]
A. Girard and G. J. Pappas. Hierarchical control system design using approximate simulation. Automatica, 45(2):566–
571, 2009.
[GR01]
C. Godsil and G. Royle. Algebraic Graph Theory. Graduate Texts in Mathematics. Springer New York, 2001.
[Isi99]
A. Isidori. Nonlinear Control Systems II. Communications and Control Engineering. Springer-Verlag London, 1 edition,
1999.
[Kv10]
F. Kerber and A. van der Schaft. Compositional analysis for linear control systems. In Proc. of the 13th ACM Int.
Conf. on Hybrid Systems: Computation and Control, pages 21–30, 2010.
[LSW96] Y. Lin, E. D. Sontag, and Y. Wang. A smooth converse Lyapunov theorem for robust stability. SIAM Journal on
Control and Optimization, 34:124–160, 1996.
[MLAP15] C. Meissen, L. Lessard, M. Arcak, and A. K. Packard. Compositional performance certification of interconnected
systems using ADMM. Automatica, 61:55–63, 2015.
[PLS00]
G. J. Pappas, G. Lafferriere, and S. Sastry. Hierarchically consistent control systems. IEEE Transactions on Automatic
Control, 45(6):1144–1160, June 2000.
[PPD16] G. Pola, P. Pepe, and M. D. Di Benedetto. Symbolic models for networks of control systems. IEEE Transactions on
Automatic Control, 2016.
[RZ15]
M. Rungger and M. Zamani. Compositional construction of approximate abstractions. In Proceedings of the 18th
International Conference on Hybrid Systems: Computation and Control, pages 68–77. ACM New York, NY, USA,
April 2015.
[RZ16a]
M. Rungger and M. Zamani. Compositional construction of approximate abstractions of interconnected control systems. IEEE Transactions on Control of Network Systems, 2016.
[RZ16b]
M. Rungger and M. Zamani. SCOTS: A tool for the synthesis of symbolic controllers. In Proceedings of the 19th
International Conference on Hybrid Systems: Computation and Control, pages 99–104. ACM New York, NY, USA,
April 2016.
[Sch04]
E. Scholtz. Observer-based monitors and distributed wave controllers for electromechanical disturbances in power
systems. PhD thesis, Massachusetts Institute of Technology, September 2004.
[Son98]
E. D. Sontag. Mathematical control theory, volume 6. Springer-Verlag, New York, 2nd edition, 1998.
[SS07]
G. B. Stan and R. Sepulchre. Analysis of interconnected oscillators by dissipativity theory. IEEE Transactions on
Automatic Control, 52(2):256–270, February 2007.
[TI08]
Y. Tazaki and J. Imura. Bisimilar finite abstractions of interconnected systems. in Proceedings of 11th International
Conference on Hybrid Systems: Computation and Control (HSCC), pages 514–527, 2008.
[TPL04]
P. Tabuada, G. J. Pappas, and P. Lima. Compositional abstractions of hybrid control systems. Discrete event dynamic
systems, 14(2):203–238, 2004.
[Wil72]
J. C. Willems. Dissipative dynamical systems part i: General theory. Archive for Rational Mechanics and Analysis,
45(5):321–351, 1972.
[Yak62]
V. A. Yakubovich. The solution of certain matrix inequalities in automatic control theory. Doklady Akademii Nauk
SSSR, 143(6):1304–1307, 1962.
[You12]
W. H. Young. On classes of summable functions and their fourier series. Proceedings of the Royal Society of London
A: Mathematical, Physical and Engineering Sciences, 87(594):225–229, 1912.
[ZRMng] M. Zamani, M. Rungger, and P. Mohajerin Esfahani. Approximations of stochastic hybrid systems: A compositional
approach. IEEE Transactions on Automatic Control, 2016 (forthcoming).
1 Department
of Electrical and Computer Engineering, Technical University of Munich, D-80290 Munich, Germany.
E-mail address: [email protected]
URL: http://www.hcs.ei.tum.de
2 Department
of Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA.
E-mail address: [email protected]
URL: http://www.eecs.berkeley.edu/∼arcak
| 3cs.SY
|
TRUNCATED RANDOM MEASURES
arXiv:1603.00861v2 [math.ST] 1 Feb 2017
TREVOR CAMPBELL? , JONATHAN H. HUGGINS? , JONATHAN HOW,
AND TAMARA BRODERICK
Abstract. Completely random measures (CRMs) and their normalizations
are a rich source of Bayesian nonparametric priors. Examples include the beta,
gamma, and Dirichlet processes. In this paper we detail two major classes
of sequential CRM representations—series representations and superposition
representations—within which we organize both novel and existing sequential
representations that can be used for simulation and posterior inference. These
two classes and their constituent representations subsume existing ones that
have previously been developed in an ad hoc manner for specific processes.
Since a complete infinite-dimensional CRM cannot be used explicitly for computation, sequential representations are often truncated for tractability. We
provide truncation error analyses for each type of sequential representation,
as well as their normalized versions, thereby generalizing and improving upon
existing truncation error bounds in the literature. We analyze the computational complexity of the sequential representations, which in conjunction with
our error bounds allows us to directly compare representations and discuss
their relative efficiency. We include numerous applications of our theoretical
results to commonly-used (normalized) CRMs, demonstrating that our results
enable a straightforward representation and analysis of CRMs that has not
previously been available in a Bayesian nonparametric context.
1. Introduction
2. Background
2.1. CRMs and truncation
2.2. The gamma-Poisson process
3. Sequential representations
3.1. Series representations
3.2. Superposition representations
4. Truncation analysis
4.1. Series representations
4.2. Superposition representations
4.3. Stochastic mapping
4.4. Hyperpriors
5. Normalized truncation analysis
5.1. Series representations
5.2. Superposition representations
5.3. Hyperpriors
6. Simulation and computational complexity
7. Summary of results
8. Discussion
Acknowledgments
Date: February 2, 2017.
? First authorship is shared jointly by T. Campbell and J. H. Huggins.
1
2
5
5
6
6
7
9
12
12
16
18
19
19
21
21
23
24
24
27
28
2
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Appendix A. Additional Examples
A.1. Beta process
A.2. Beta prime process
Appendix B. Technical lemmas
Appendix C. Proofs of sequential representation results
C.1. Correctness of B-Rep, DB-Rep, and PL-Rep
C.2. Proof of the expected number rejections of the R-Rep
C.3. Power-law behavior of the PL-Rep
Appendix D. Proofs of CRM truncation bounds
D.1. Protobound
D.2. Series representation truncation
D.3. Superposition representation truncation
D.4. Stochastic mapping truncation
D.5. Truncation with hyperpriors
Appendix E. Proofs of normalized truncation bounds
E.1. Normalized series representation truncation
E.2. Normalized superposition representation truncation
E.3. Truncation with hyperpriors
References
28
28
32
35
38
38
41
41
44
44
46
50
51
51
51
52
54
55
55
1. Introduction
In many data sets, we can view the data points as exhibiting a collection of
underlying traits. For instance, each document in the New York Times might
touch on a number of topics or themes, an individual’s genetic data might be a
product of the populations to which their ancestors belonged, or a user’s activity
on a social network might be dictated by their varied personal interests. When
the traits are not directly observed, a common approach is to model each trait as
having some frequency or rate in the broader population (Airoldi et al., 2014). The
inferential goal is to learn these rates as well as whether—and to what extent—
each data point exhibits each trait. Since the traits are unknown a priori, their
cardinality is also typically unknown.
As a data set grows larger, we can reasonably expect the number of traits to increase as well. In the cases above, for example, we expect to uncover more topics as
we read more documents, more ancestral populations as we examine more individuals’ genetic data, and more unique interests as we observe more individuals on a
social network. Bayesian nonparametric (BNP) priors provide a flexible, principled
approach to creating models in which the number of exhibited traits is random, can
grow without bound, and may be learned as part of the inferential procedure. By
generating a countable infinity of potential traits—where any individual data point
exhibits only finitely many—these models enable growth in the number of observed
traits with the size of the data set.
In practice, however, it is impossible to store a countable infinity of random
variables in memory or learn the distribution over a countable infinity of variables
in finite time. Conjugate priors and likelihoods have been developed (Orbanz, 2010)
that theoretically circumvent the infinite representation altogether and perform
exact Bayesian posterior inference (Broderick et al., 2017). However, these priors
and likelihoods are often just a single piece within a more complex generative model,
and ultimately an approximate posterior inference scheme such as Markov Chain
TRUNCATED RANDOM MEASURES
3
Monte Carlo (MCMC) or variational Bayes (VB) is required. These approximation
schemes often necessitate a full and explicit representation of the latent variables.
One option is to approximate the infinite-dimensional prior with a related finitedimensional prior: that is, to replace the infinite collection of random traits by
a finite subset of “likely” traits. To do so, first enumerate the countable infinity
of traits in the full model and write (ψk , θk ) for each paired trait ψk (e.g. a topic
in
a document) and its rate or frequency θk . Then the discrete measure Θ :=
P∞
k=1 θk δψk captures the traits/rates in a sequence indexed by k. The (ψk , θk )
pairs are random in the Bayesian model, so Θ is a random measure. In many
cases, the distribution of Θ can be defined by specifying a sequence of simple,
familiar distributions for the finite-dimensional ψk and θk , known as a sequential
representation. Given a sequential representation of Θ, a natural way to choose a
subset of traits is to keep the first K < ∞ traits and discard the rest, resulting in
an approximate measure ΘK . This approach is called truncation.1
Sequential representations have been shown to exist for completely random measures (CRMs) (Kingman, 1967; Ferguson and Klass, 1972), a large class of nonparametric priors that includes such popular models as the beta process (Hjort,
1990; Kim, 1999) and the gamma process (Ferguson and Klass, 1972; Kingman,
1975; Brix, 1999; Titsias, 2008; James, 2013). Numerous sequential representations
of CRMs have been developed in the literature (Ferguson and Klass, 1972; Bondesson, 1982; Rosiński, 1990, 2001; James, 2014; Broderick et al., 2017). CRM priors
are often paired with likelihood processes—such as the Bernoulli process (Thibaux
and Jordan, 2007), negative binomial process (Zhou et al., 2012; Broderick et al.,
2015), and Poisson likelihood process (Titsias, 2008). The likelihood process determines how much each trait is expressed by each data point. Sequential representations also exist for normalized completely random measures (NCRMs) (Perman
et al., 1992; Perman, 1993; James, 2002; Pitman, 2003; Regazzini et al., 2003; Lijoi
and Prünster, 2010),2 which provide random distributions over traits, such as the
Dirichlet process (Ferguson, 1973; Sethuraman, 1994). NCRMs are typically paired
with a likelihood that assigns each data point to a single trait using the NCRM as
a discrete distribution.
Since (N)CRMs have many possible sequential representations, a method is required for determining which to use for the application at hand and, once a representation is selected, for choosing a truncation level. Our main contributions
enable the principled selection of both representation and truncation level using
approximation error:
(1) We provide a comprehensive characterization of the different types of sequential representations for (N)CRMs, filling in many gaps in the literature
of sequential representations along the way. We classify these representations into two major groups: series representations, which are constructed
by transforming a homogeneous Poisson point process; and superposition
representations, which are the superposition of infinitely many Poisson
1It is also possible to truncate a sequential representation to a random level K by removing
atoms with weights less than a specified threshold (Argiento et al., 2016; Muliere and Tardella,
1998), though this approach is not straightforward for use in posterior inference algorithms.
2
NCRMs are sometimes referred to as normalized random measures with independent increments (NRMIs) (Lijoi and Prünster, 2010; Regazzini et al., 2003; James et al., 2009).
4
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
point processes with finite rate measures. We also introduce two novel
sequential representations for (N)CRMs.
(2) We provide theoretical guarantees on the approximation error induced when
truncating these sequential representations. We give the error as a function of the prior process, the likelihood process, and the level of truncation. While truncation error bounds for (N)CRMs have been studied
previously, past work has focused on specific combinations of (N)CRM
priors and likelihoods—in particular, the Dirichlet-multinomial (Sethuraman, 1994; Ishwaran and James, 2001; Ishwaran and Zarepour, 2002; Blei
and Jordan, 2006), beta-Bernoulli (Paisley et al., 2012; Doshi-Velez et al.,
2009), generalized beta-Bernoulli (Roy, 2014), and gamma-Poisson (Roychowdhury and Kulis, 2015) processes. In the current work, we give much
more general results for bounding the truncation error.
Our results fill in large gaps in the analysis of truncation error, which is often
measured in terms of the L1 (a.k.a. total variation) distance between the data distributions induced by the full and truncated priors. We provide the first analysis
of truncation error for some sequential representations of the beta process with
Bernoulli likelihood (Thibaux and Jordan, 2007), for the beta process with negative binomial likelihood (Zhou et al., 2012; Broderick et al., 2015), and for the
normalization of the generalized gamma process (Brix, 1999), the σ-stable process,
and the generalized inverse gamma (Lijoi et al., 2005; Lijoi and Prünster, 2010)
with discrete likelihood. Moreover, even when truncation results already exist in
the literature (Ishwaran and James, 2001; Doshi-Velez et al., 2009; Paisley et al.,
2012; Roychowdhury and Kulis, 2015), we improve on those error bounds by a factor of two. The reduction arises from our use of the point process machinery of
CRMs, circumventing the total variation bound used originally by Ishwaran and
James (2001, 2002) upon which most modern truncation analyses are built. We obtain our truncation error guarantees by bounding the probability that data drawn
from the full model will use a feature that is not available to the truncated model.
Thinking in terms of this probability provides a more intuitive interpretation of our
bounds that can be communicated to practitioners and used to guide them in their
choice of truncation level.
The remainder of this paper is organized as follows. In Section 2, we provide
background material on CRMs and establish notation. In our first main theoretical
section, Section 3, we describe seven different sequential CRM representations, including four series representations and three superposition representations, two of
which are novel. Next, we provide a general theoretical analysis of the truncation
error for series and superposition representations in Section 4. We provide analogous theory for the normalized versions of each representation in Section 5 via
an infinite extension of the “Gumbel-max trick” (Gumbel, 1954; Maddison et al.,
2014). We determine the complexity of simulating each representation in Section 6.
In Section 7, we summarize our results (Table 1) and provide advice on how to
select sequential representations in practice. Proofs for all results developed in this
paper are provided in the appendices.
TRUNCATED RANDOM MEASURES
5
2. Background
2.1. CRMs and truncation. Consider a Poisson point process on R+ := [0, ∞)
with rate measure ν(dθ) such that
Z
ν(R+ ) = ∞
and
min(1, θ)ν(dθ) < ∞.
(2.1)
∞
Such a process generates aPcountable infinity of values (θk )k=1 , θk ∈ R+ , having an
∞
almost surely finite sum k=1 θk < ∞. In a BNP trait model, we interpret each
θk as the rate or frequency of the k-th trait. Typically, each θk is paired with a
parameter ψk associated with the k-th trait (e.g., a topic in a document or a shared
interest on a social network). We assume throughout that ψk ∈ Ψ for some space
i.i.d.
Ψ and ψk ∼ G for some distribution G. Constructing a measure by placing mass
θk at atom location ψk results in a completely random measure (CRM) (Kingman,
1967). As shorthand, we will write CRM(ν) for the completely random measure
generated as just described:
X
Θ :=
θk δψk ∼ CRM(ν).
k
The trait distribution G is left implicit in the notation as it has no effect on our
results. Further, the possible fixed-location and deterministic components of a
CRM (Kingman, 1967) are not considered here for brevity; these components can
be added (assuming they are purely atomic) and the analysis modified without
undue effort. The CRM prior on Θ is typically combined with a likelihood that
generates trait counts for each data point. Let h(· | θ) be a proper probability mass
function on N ∪ {0} for all θ in the support of ν.3 Then a collection of conditionally
N
independent observations X1:N := {Xn }n=1 given Θ are distributed according to
the likelihood process LP(h, Θ), i.e.
X
i.i.d.
Xn :=
xnk δψk ∼ LP(h, Θ),
k
if xnk ∼ h(x | θk ) independently across k and i.i.d. across n. The desideratum that
each Xn expresses a finite number of traits is encoded by the assumption that
Z
(1 − h(0 | θ))ν(dθ) < ∞.
(2.2)
Since the trait counts are typically latent in a full generative model specification,
indep
define the observed data Yn | Xn ∼ f (· | Xn ) for a conditional density f with
∞
respect to a measure µ on some space. For instance, if the sequence (θk )k=1 represents the topic rates in a document corpus, Xn might capture how many words in
document n are generated from each topic and Yn might be the observed collection
of words for that document.
Since the sequence (θk )∞
k=1 is countably infinite, it may be difficult to simulate or
perform posterior inference in this model. One approximation scheme is to define
PK
the truncation ΘK := k=1 θk δψk . Since it is finite, the truncation ΘK can be
used for exact simulation or in posterior inference—but some error arises from not
using the full CRM Θ. To quantify this error, consider its propagation through the
3Likelihoods with support in R may also be considered. As long as Eq. (2.2) holds, all results
except those for the size-biased representation still hold, since they only rely upon the behavior
of h(0 | θ).
6
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
above Bayesian model. Define Z1:N and W1:N for ΘK analogous to the definitions
of X1:N and Y1:N for Θ:
i.i.d.
Zn | ΘK ∼ LP(h, ΘK ),
indep
Wn | Zn ∼ f (· | Zn ),
n = 1, . . . , N.
A standard approach to measuring the distance between Θ and ΘK is to use the
L1 metric between the marginal densities pN,∞ and pN,K (with respect to some
measure µ) of the final observations Y1:N and W1:N (Ishwaran and James, 2001;
Doshi-Velez et al., 2009; Paisley et al., 2012):
Z
1
1
kpN,∞ − pN,K k1 :=
|pN,∞ (y1:N ) − pN,K (y1:N )| µ(dy1:N ).
2
2 y1:N
All of our bounds on 21 kpN,∞ −pN,K k1 are also bounds on the probability that X1:N
contains a feature that is not in the truncation ΘK (cf. Sections 4 and 5). This
interpretation may be easier to digest since it does not depend on the observation
model f and is instead framed in terms of the underlying traits the practitioner is
trying to estimate.
2.2. The gamma-Poisson process. To illustrate the practical application of the
theoretical developments in this work, we provide a number of examples throughout involving the gamma process (Brix, 1999), denoted ΓP(γ, λ, d), with discount
parameter d ∈ [0, 1), scale parameter λ > 0, mass parameter γ > 0, and rate
measure
ν(dθ) = γ
λ1−d −d−1 −λθ
θ
e
dθ.
Γ(1 − d)
Setting d = 0 yields the undiscounted gamma process (Ferguson and Klass, 1972;
Kingman, 1975; Titsias, 2008). The gamma process is often paired with a Poisson
likelihood,
θx −θ
e .
x!
Throughout the present work, we use the rate parametrization of the gamma distribution (to match the gamma process parametrization), for which the density is
given by
h(x | θ) =
Gam(x; a, b) =
ba a−1 −bx
x
e .
Γ(a)
Appendix A provides additional example applications of our theoretical results for
two other CRMs: the beta process BP(γ, α, d) (Teh and Görür, 2009; Broderick
et al., 2012) with Bernoulli or negative binomial likelihood, and the beta prime
process BPP(γ, α, d) (Broderick et al., 2017) with odds-Bernoulli likelihood.
3. Sequential representations
Sequential representations are at the heart of the study of truncated CRMs.
They provide an iterative method that can be terminated at any point to yield a
finite approximation to the infinite process, where the choice of termination point
determines the accuracy of the approximation. Thus, the natural first step in providing a coherent treatment of truncation analysis is to do the same for sequential
representations. In past work, two major classes of sequential representation have
TRUNCATED RANDOM MEASURES
7
P∞
been used: series representations of the form k=1 θk δψk , and superposition repP∞ PCk
resentations of the form k=1 i=1
θki δψki , where each inner sum of Ck atoms
is itself a CRM. This section examines four series representations (Ferguson and
Klass, 1972; Bondesson, 1982; Rosiński, 1990, 2001) and three superposition representations (two of which are novel) (Broderick et al., 2012, 2017; James, 2014).
We show how previously-developed sequential representations for specific CRMs fit
into these seven general representations. Finally, we discuss a stochastic mapping
procedure that is useful in obtaining new representations from the transformation
of others. Proofs for the results in this section may be found in Appendix C.
3.1. Series representations. Series representations arise from the transformation
of a homogeneous Poisson point process (Rosiński, 2001). They tend to be somewhat difficult to analyze due to the dependence between the atoms but also tend
to produce very simple representations with small truncation error (cf. Sections 4
Pk
i.i.d.
and 7). Throughout the paper we let Γk = `=1 E` , E` ∼ Exp(1), be the ordered
jumps of a unit-rate homogeneous Poisson process on R+ , let ν be a measure on
i.i.d.
R+ satisfying the basic conditions in Eq. (2.1), and let ψk ∼ G.
:=
Inverse-Lévy (Ferguson and Klass, 1972). Define ν ← (u)
inf {x : ν ([x, ∞)) ≤ u}, the inverse of the tail measuer ν([x, ∞)). We say Θ
has an inverse-Lévy representation and write Θ ← IL-Rep(ν) if
∞
X
Θ=
θk δψk ,
with
θk = ν ← (Γk ).
k=1
Ferguson and Klass (1972) showed that Θ ← IL-Rep(ν) implies Θ ∼ CRM(ν). The
inverse-Lévy representation is analogous to the inverse CDF method for generating
an arbitrary random variable from a uniform random variable, with the homogenous
Poisson process playing the role of the uniform random variable. It is also the
optimal sequential representation in the sense that the sequence θk that it generates
is non-increasing. While an elegant and general approach, simulating the inverseLévy representation is difficult, as inverting the function ν ([x, ∞)) is analytically
intractable except in a few cases.
Example 3.1 (Gamma
process, ΓP(γ, λ, 0)). We have ν([x, ∞)) = γλE1 (λx),
R∞
where E1 (x) := x u−1 e−u du is the exponential integral function (Abramowitz
and Stegun, 1964). The inverse-Lévy representation for ΓP(γ, λ, 0) is thus
∞
X
Θ=
λ−1 E1−1 (γ −1 λ−1 Γk )δψk .
k=1
Neither E1 nor its inverse can be computed in closed form, so one must resort to
numerical approximations.
Bondesson (Bondesson, 1982). We say Θ has a Bondesson representation and
write Θ ← B-Rep(c, g) if for c > 0 and g a density on R+ ,
∞
X
i.i.d.
Θ=
θk δψk ,
with
θk = Vk e−Γk /c ,
Vk ∼ g.
k=1
Theorem 3.1 shows that Bondesson representations can be constructed for a large,
albeit restricted, class of CRM rate measures. We offer a novel proof of Theorem 3.1
in Appendix C using the induction strategy introduced by Banjevic et al. (2002).
8
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Similar proof ideas are also used to prove truncation error bounds for sequential
representations in Section 4. We use a slight abuse of notation for brevity: if ν(dθ)
is a measure on R+ that is absolutely continuous with respect to Lebesgue measure,
then ν(θ) is the density of ν(dθ) with respect to the Lebesgue measure.
Theorem 3.1 (Bondesson representation (Bondesson, 1982)). Let ν(dθ) = ν(θ)dθ
be a rate measure satisfying Eq. (2.1). If θν(θ) is nonincreasing, limθ→∞ θν(θ) = 0,
d
and cν := limθ→0 θν(θ) < ∞, then gν (v) := −c−1
ν dv [vν(v)] is a density on R+ and
Θ ← B-Rep(cν , gν )
implies
Θ ∼ CRM(ν).
Example 3.2 (Bondesson representation for ΓP(γ, λ, 0)). The following representation for the gamma process with d = 0 was described by Bondesson (1982)
and Banjevic et al. (2002). Since θν(θ) = γλe−λθ is non-increasing and cν =
limθ→0 θν(θ) = γλ, we obtain gν (v) = λe−λv = Exp(v; λ). Thus, it follows from
Theorem 3.1 that if Θ ← B-Rep(γλ, Exp(λ)), then Θ ∼ ΓP(γ, λ, 0). The condition
that θν(θ) is non-increasing fails to hold if d > 0, so we cannot apply Theorem 3.1
to ΓP(γ, λ, d) when d > 0.
Thinning (Rosiński, 1990). Using the nomenclature of Rosiński (2001), we say
Θ has a thinning representation and write Θ ← T-Rep(ν, g) if g is a probability
measure on R+ such that ν is absolutely continuous with respect to g, i.e. ν g,
and
∞
X
dν
i.i.d.
(Vk ) ≥ Γk ,
Vk ∼ g.
θk δψk ,
Θ=
with
θk = Vk 1
dg
k=1
Rosiński (1990) showed that Θ ← T-Rep(ν, g) implies Θ ∼ CRM(ν). Note that
a.s.
Γk → ∞ as k → ∞, so the probability that dν
dg (Vk ) ≥ Γk is decreasing in k. Thus,
this representation generates atoms with θk = 0 (which have no effect and can be
removed) increasingly frequently and becomes inefficient as k → ∞.
Example 3.3 (Thinning representation for ΓP(γ, λ, d)). If we let g = Gam(1−d, λ),
then the thinning representation for ΓP(γ, λ, d) is
Θ=
∞
X
Vk 1(Vk Γk ≤ γ)δψk ,
with
i.i.d.
Vk ∼ Gam(1 − d, λ).
k=1
Rejection (Rosiński, 2001). Using the nomenclature of Rosiński (2001), we
say Θ has a rejection representation and write Θ ← R-Rep(ν, µ) if µ is a measure
dν
≤ 1, and
on R+ satisfying Eq. (2.1) and dµ
∞
X
dν
Θ=
θk δψk , with θk = Vk 1
(Vk ) ≥ Uk , (Vk )k∈N ∼ PoissP(µ),
dµ
k=1
i.i.d.
Uk ∼ Unif[0, 1].
Rosiński (2001) showed that Θ ← R-Rep(ν, µ) implies Θ ∼ CRM(ν). This representation is very similar to the thinning representation, except that the sequence
(Vk )k∈N is generated from a Poisson process on R+ rather than i.i.d. This allows
a.s.
Vk → 0 as k → ∞, causing the frequency of generating ineffective atoms θk = 0
dν
to decay as k → ∞, assuming µ is appropriately chosen such that dµ
(θ) → 1 as
θ → 0. This representation can thus be constructed to be more efficient than the
TRUNCATED RANDOM MEASURES
9
thinning representation. We can calculate the efficiency in terms of the expected
number of rejections (that is, the number of θk that are identically zero):
Proposition 3.2. For R-Rep(ν, µ), the expected number of rejections is
"∞
# Z
X
dν
(x) µ(dx).
E
1(θk = 0) =
1−
dµ
k=1
Remark. If µ and ν can be written as densities with respect
to Lebesgue measure,
R
then the integral in Proposition 3.2 can be rewritten as (µ(x) − ν(x))dx.
Example 3.4 (Rejection representation for ΓP(γ, λ, 0)). Following Rosiński (2001),
consider µ(dθ) = γλθ−1 (1 + λθ)−1 dθ. We call CRM(µ) the Lomax process,
LomP(γ, λ−1 ), after the related Lomax distribution. We can use the inverse-Lévy
method analytically with µ since µ← (u) = λ(e(γλ)1−1 u −1) . Thus, the rejection representation of ΓP(γ, λ, 0) is
∞
X
Vk 1(Uk ≤ (1 + λVk )e−λVk )δψk , with
Θ=
k=1
Vk =
1
λ(e(γλ)−1 Γk
− 1)
,
i.i.d.
Uk ∼ Unif[0, 1].
Unlike in the thinning construction given in Example 3.3, only a finite number
of rates will be set to zero almost surely. In particular, the expected number of
rejections is γλcγ , where cγ is the Euler-Mascheroni constant.
Example 3.5 (Rejection representation for ΓP(γ, λ, d), d > 0). For the case of
λ1−d
θ−1−d dθ. We can again use the inverse-Lévy
d > 0, we instead use µ(dθ) = γ Γ(1−d)
1−d
λ
. The
method analytically with µ since µ← (u) = (γ 0 u−1 )1/d , where γ 0 := γ dΓ(1−d)
rejection representation is then
∞
X
i.i.d.
1/d
Vk 1(Uk ≤ e−λVk )δψk , with Vk = (γ 0 Γ−1
Θ=
, Uk ∼ Unif[0, 1].
k )
k=1
1−d
The expected number of rejections is γ λ d , so the representation is efficient for
large d, but extremely inefficient when d is small.
3.2. Superposition representations. Superposition representations arise as an
infinite sum of CRMs with finite rate measure. These tend to be easier to analyze
than series representations as they decouple atoms between the summed CRMs,
but can produce representations with larger truncation error (cf. Sections 4 and 7).
Throughout, let ν be a measure on R+ satisfying the basic conditions in Eq. (2.1),
i.i.d.
and let ψk ∼ G.
Decoupled Bondesson. We say Θ has a decoupled Bondesson representation
and write Θ ← DB-Rep(c, g, ξ) if for c > 0, ξ > 0, and g a density on R+ ,
Θ=
Ck
∞ X
X
θki δψki ,
with
i.i.d.
θki = Vki e−Tki ,(3.1)
indep
Vki ∼ g.
Ck ∼ Poiss(c/ξ),
k=1 i=1
Tki ∼ Gam(k, ξ),
i.i.d.
This is a novel superposition representation, though special cases are already
known (Paisley et al., 2010; Roychowdhury and Kulis, 2015). Theorem 3.3 shows
that the decoupled Bondesson representation applies to the same class of CRMs as
the Bondesson representation from Section 3.1.
10
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Theorem 3.3 (Decoupled Bondesson representation). Let ν(dθ) = ν(θ)dθ, cν , and
gν be as specified in Theorem 3.1. Then for any fixed ξ > 0,
Θ ← DB-Rep(cν , gν , ξ)
implies
Θ ∼ CRM(ν).
The proof of Theorem 3.3 in Appendix C generalizes the arguments from Paisley
et al. (2010) and Roychowdhury and Kulis (2015). The free parameter ξ controls
the number of atoms generated for each outer sum index k; its principled selection
can be made by trading off computational complexity (cf. Section 6) and truncation
error (cf. Section 4).
Example 3.6 (Decoupled Bondesson representation for ΓP(γ, λ, 0)). Arguments
paralleling those made in Example 3.2 show that the ΓP(γ, λ, 0) representation
from Roychowdhury and Kulis (2015) follows directly from an application of Theorem 3.3: if Θ ← DB-Rep(γλ, Exp(λ), ξ), then Θ ∼ ΓP(γ, λ, 0). As in the Bondesson
representation setting, Theorem 3.3 does not apply to ΓP(γ, λ, d) when d > 0 because the condition that θν(θ) is non-increasing fails to hold.
Size-biased (Broderick et al., 2017; James, 2014). Let π(θ) := h(0 | θ). We
say Θ has a size-biased representation and write Θ ← SB-Rep(ν, h) if
Θ=
Ck
∞ X
X
θki δψki ,
with
indep
Ck ∼ Poiss (ηk ) ,
k=1 i=1
indep
θki ∼
Z
ηk :=
1
π(θ)k−1 (1 − π(θ)) ν(dθ),
ηk
(3.2)
π(θ)k−1 (1 − π(θ)) ν(dθ).
Broderick et al. (2017) and James (2014) showed that Θ ← SB-Rep(ν, h) implies
Θ ∼ CRM(ν). If the rate measure ν and the P
likelihood h are selected to be a
∞
conjugate exponential family then, noting that x=1 h(x | θ) = 1 − π(θ), the rate
θki can be sampled from a mixture of exponential family distributions:
indep
θki | zki ∼
Z
ηkx :=
1
h(zki | θ)π(θ)k−1 ν(dθ),
ηkzki
indep
∞
zki ∼ Categorical ((ηkx /ηk )x=1 ) ,
h(x | θ)π(θ)k−1 ν(dθ).
Example 3.7 (Size-biased representation for ΓP(γ, λ, d)). For the Gamma process,
values for ηkx and ηk can be found using integration by parts and the standard
gamma distribution integral, while θki | zki is sampled from a gamma distribution
by inspection:
γλ1−d
γλ1−d Γ(x − d)
(λ + k)d − (λ + k − 1)d
d>0 ,
d
,
η
=
ηkx =
k
x!Γ(1 − d)(λ + k)x−d
γλ (log(λ + k) − log(λ + k − 1)) d = 0
indep
θki | zki ∼ Gam(x − d, λ + k).
Power-law. We say Θ has a power-law representation and write Θ ←
PL-Rep(γ, α, d, g) if for γ > 0, 0 ≤ d < 1, α > −d, and g a density on R+ ,
TRUNCATED RANDOM MEASURES
Θ=
Ck
∞ X
X
θki δψki , with
i.i.d.
Ck ∼ Poiss(γ),
θki = Vki Ukik
k=1 i=1
11
k−1
Y
(1 − Ukij ), (3.3)
j=1
i.i.d.
Vki ∼ g,
indep
Ukij ∼ Beta(1 − d, α + jd).
This is a novel superposition representation, although it was previously developed
in the special case of the beta process (where g(v) = δ1 ) (Broderick et al., 2012).
The name of this representation arises from the fact that it exhibits Types I and
II power-law behavior (Broderick et al., 2012) under mild conditions, as we show
in Theorem C.1 in the appendix. Theorem 3.5 below shows the conditions under
which Θ ← PL-Rep(γ, α, d, g) implies Θ ∼ CRM(ν). Its proof in Appendix C
relies on the notion of stochastic mapping (Lemma 3.4), a powerful technique for
transforming one CRM into another. Note that in Lemma 3.4, the case where u is
a deterministic function of θ via the mapping u = τ (θ) may be recovered by setting
κ(θ, du) = δτ (θ) .
P∞
Lemma 3.4 (CRM stochastic mapping). Let Θ = k=1 θk δψk ∼ CRM(ν). Then
for any probability kernel κ(θ, du), we have κ(Θ) ∼ CRM(νκ ), where
Z
∞
X
κ(Θ) :=
uk δψk , uk | θk ∼ κ(θk , ·), and νκ (du) := κ(θ, du)ν(dθ).
k=1
Theorem 3.5 (Power-law representation). Let ν(dθ) = ν(θ)dθ be a rate measure
satisfying Eq. (2.1), and let gν be a density on R+ such that
Z
ν(u) = θ−1 gν uθ−1 νBP (dθ) ,
where
νBP (dθ) = γ
Γ(α + 1)
1 [θ ≤ 1] θ−1−d (1 − θ)α+d−1 dθ
Γ(1 − d)Γ(α + d)
is the rate measure for the beta process BP(γ, α, d) from Eq. (A.1). Then
Θ ← PL-Rep(γ, α, d, gν )
implies
Θ ∼ CRM(ν).
Example 3.8 (Power-law representation for ΓP(γ, λ, d)). If we choose gν =
Gam(λ, λ), then using the change of variable w = u(θ−1 − 1),
Z
θ−1 gν uθ−1 νBP (dθ)
Z
−1
λλ
= γλ
uλ−1 θ−λ−d−1 e−λuθ (1 − θ)λ+d−1 dθ du
Γ(1 − d)Γ(λ + d)
Z
λλ
−1−d −λu
= γλ
u
e
wλ+d−1 e−λw dw du
Γ(1 − d)Γ(λ + d)
λ1−d
=γ
u−1−d e−λu du.
Γ(1 − d)
It follows immediately from Theorem 3.5 that if Θ ← PL-Rep(γ, λ, d, Gam(λ, λ)),
then Θ ∼ ΓP(γ, λ, d). To the best knowledge of the authors, this power-law representation for the gamma process is novel.
12
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
4. Truncation analysis
Each of the sequential representations developed in Section 3 shares a common
structural element—an outer infinite sum—which is responsible for generating a
countably infinite number of atoms in the CRM. In this section, we terminate
these outer sums at a finite truncation level K ∈ N, resulting in a truncated CRM
ΘK possessing a finite number of atoms. We develop upper bounds on the error
induced by this truncation procedure. All of the truncated CRM error bounds in
this section rely on Lemma 4.1, which is a tightening (by a factor of two) of the
bound in Ishwaran and James (2001, 2002).4 Proposition 4.2 shows that the bound
in Lemma 4.1 is tight without further assumptions on the data likelihood f .
Lemma 4.1 (CRM protobound). Let Θ ∼ CRM(ν). For any truncation ΘK , if
i.i.d.
Zn | ΘK ∼ LP(h, ΘK ),
i.i.d.
indep
Wn | Zn ∼ f (· | Zn ),
Xn | Θ ∼ LP(h, Θ),
indep
Yn | Xn ∼ f (· | Xn ),
then, with pN,∞ and pN,K denoting the marginal densities of Y1:N and W1:N , respectively,
1
kpN,∞ − pN,K k1 ≤ 1 − P (supp(X1:N ) ⊆ supp(ΘK )) ,
2
Proposition 4.2 (Protobound tightness). If G is non-atomic and Ψ is Borel, then
for any δ > 0, there exists a likelihood f such that Lemma 4.1 is tight up to a factor
of 1 − δ.
The proof of all results in this section (including Lemma 4.1 and Proposition 4.2)
can be found in Appendix D. All of the provided truncation results use the generative model in Lemma 4.1, and are summarized in Table 1 in Section 7. Throughout
this section, for a given likelihood model h(x | θ) we define π(θ) := h(0 | θ) for notational brevity. The asymptotic behavior of truncation error bounds is specified
with tilde notation:
a(K)
a(K) ∼ b(K), K → ∞
⇐⇒
lim
= 1.
K→∞ b(K)
4.1. Series representations. Each of the series representations can be viewed
a functional of a standard Poisson point process and a sequence of i.i.d. random
variables with some distribution g on R+ .5 In particular, we may write each in the
form
∞
X
i.i.d.
Θ=
θk δψk ,
with
θk = τ (Vk , Γk ),
Vk ∼ g,
(4.1)
k=1
where Γk are the jumps of a unit-rate homogeneous Poisson point process on
R+ , and τ : R+ × R+ → R+ is a non-negative measurable function such that
limu→∞ τ (v, u) = 0 for g-almost every v. The truncated CRM then takes the form
ΘK :=
K
X
θk δψk .
k=1
4See Lemma D.1 in Appendix D for its generalization to arbitrary discrete random measures.
5Our theory applies equally well if g is on some measurable space V, but we only use V = R .
+
TRUNCATED RANDOM MEASURES
13
Theorem 4.3 provides a general truncation error bound for series representations of
the form Eq. (4.1), specifies its range, and guarantees that the bound decays to 0
as K → ∞.
Theorem 4.3 (Series representation truncation error). The error in approximating
a series representation of Θ with its truncation ΘK satisfies
0≤
1
kpN,∞ − pN,K k1 ≤ 1 − e−BN,K ≤ 1,
2
where
Z
BN,K :=
∞
h
i
N
1 − E π (τ (V, u + GK ))
du,
(4.2)
0
indep
G0 := 0, GK ∼ Gam(K, 1) for K ≥ 1, and V
N, limK→∞ BN,K = 0.
indep
∼ g. Furthermore, ∀N ∈
Remark. An alternate form of BN,K that is sometimes easier to use in practice
can be found by applying the standard geometric series formula to Eq. (4.2), which
yields
N Z ∞ h
i
X
n−1
BN,K =
E π (τ (V, u + GK ))
(1 − π (τ (V, u + GK ))) du.
n=1
0
A simplified upper bound on BN,K can be derived by noting that π(θ) ≤ 1, so
Z ∞
BN,K ≤ N
(1 − E [π (τ (V, u + GK ))]) du.
(4.3)
0
This bound usually gives the same asymptotics in K as Eq. (4.2).
The main task in using Theorem 4.3 to develop a truncation error bound for a
series representation is evaluating the integrand in the definition of BN,K . Thus,
we next evaluate the integrand and provide expressions of the truncation error
bound for the four series representations outlined in Section 3.1. Throughout the
remainder of this section, GK is defined as in Theorem 4.3, F0 ≡ 1, and FK is the
CDF of GK .
Inverse-Lévy representation. For this representation we have
τ (v, u) = ν ← (u) := inf {y : ν ([y, ∞)) ≤ u} .
To evaluate the bound in Eq. (4.3), we use the transformation of variables x =
ν ← (u + GK ) and the fact that for a, b ≥ 0, ν ← (a) ≥ b ⇐⇒ a ≤ ν ([b, ∞)) to
conclude that
Z ∞
BN,K ≤ N
FK (ν[x, ∞))(1 − π(x)) ν(dx).
(4.4)
0
Recent work on the inverse-Lévy representation has developed Monte Carlo estimates of the error of the truncated random measure moments for those ν ([x, ∞))
with known inverse ν ← (Arbel and Prünster, 2017). In contrast, the result above
provides an explicit bound on the L1 truncation error. Our bound does not require
knowing ν ← , which is often the most challenging aspect of applying the inverse-Lévy
representation.
14
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Example 4.1 (IL-Rep truncation for LomP(γ, λ−1 ) with Poisson likelihood). Recall from Example 3.4 that the Lomax process LomP(γ, λ−1 ) is the CRM with
rate measure ν(dθ) = γλθ−1 (1 + λθ)−1 dθ, so ν[x, ∞) = γλ log{1 + (λx)−1 }. Using
Eq. (4.4), we have
Z ∞
BN,K ≤ N γλ
FK (γλ log{1 + (λx)−1 })(1 − e−x )x−1 (1 + λx)−1 dx.
0
Since FK (t) ≤ tK /K! ≤ (3t/K)K , for any a > 0 the integral is upper bounded by
Z ∞
Z a
1
−1
x−1 (1 + λx)−1 dx
(1 + λx) dx + FK γλ log 1 +
λa
a
0
1
1
≤ a + FK γλ log 1 +
log 1 +
λa
λa
≤ λ−1 (eb − 1)−1 + b(3γλb/K)K
where
b := log{1 + (λa)−1 }.
(4.5)
Replacing (eb − 1)−1 with the approximation
e−b and then setting
the two terms in
n
o−1
K+2
1
Eq. (4.5) equal, we obtain b = kW0
3γλ K+1 (K + 1) K+1
, where W0 is the
product logarithm function, i.e.
W0 (y) = x ⇐⇒ xex = y.
(4.6)
Thus, using the fact that e−t ≤ (et − 1)−1 , we conclude that
BN,K ≤
2N γ[1 + (3γλ)−1 ]
n
o−1
K+2
1
K+1
K+1
exp KW0
(K + 1)
−1
3γλ
∼ 2N γ[1 + (3γλ)−1 ]e−KW0 ({3γλ}
Bondesson representation.
−1
)
K → ∞.
For this representation we have
τ (v, u) = ve−u/c ,
g(dv) = −c−1
d
(vν(v)) dv.
dv
Writing the expectation over V explicitly as an integral with measure g(v)dv, using
the transformation of variables u = −c log x/v (so x = ve−u/c ), and given the
d
(vν(v)) for the Bondesson representation, we have
definition of g(v) = −c−1 dv
Z ∞
h
i
BN,K ≤ N
1 − E π ve−GK /c
ν(dv).
0
Example 4.2 (Truncation of the Bondesson representation for ΓP(γ, λ, 0)). Let
D
G̃K = GK /(γλ). Since π(θ) = e−θ and c = γλ, we have
Z ∞
Z ∞
h
i
−GK /c
−ve−G̃K
−1 −λv
)v e
dv
1 − E π(ve
) ν(dv) = γλ E
(1 − e
0
h 0
i
= γλ E log(1 + e−G̃K /λ)
K
i
h
γλ
−G̃K
≤γE e
=γ
.
1 + γλ
TRUNCATED RANDOM MEASURES
15
The second equality follows by using the power series for the exponential integral (Abramowitz and Stegun, 1964, Chapter 5). Thus,
K
γλ
BN,K ≤ N γ
.
1 + γλ
Thinning representation. For this representation we have
dν
τ (v, u) = v1
(v) ≥ u ,
g any distribution on R+ s.t. ν g.
dg
Since π(0) = 1 by Lemma B.3, we have that 1 − π (v1(A)) = (1 − π (v)) 1(A) for
any event A. Using this fact, we have
Z ∞
Z dν
dg (v)
FK (u) du g(dv).
(4.7)
BN,K ≤ N
(1 − π(v))
0
0
Analytic bounds for the thinning representation of specific processes tend to be
opaque and notationally cumbersome, so we simply compare its truncation error in
Section 7 to the other representations by numerical approximation of Eq. (4.7).
Rejection representation. Assume that we can use the inverse-Lévy representation to simulate PoissP(µ). Then for the rejection representation we have
dν ←
τ (v, u) = µ← (u)1
(µ (u)) ≥ v ,
g(dv) = 1[0 ≤ v ≤ 1]dv,
dµ
dν
where µ satisfies ν µ, dµ
≤ 1, and µ← (u) := inf {x : µ ([x, ∞)) ≤ u}. Using the
same techniques as for the thinning and inverse-Lévy representations, we have that
Z ∞
BN,K ≤ N
FK (µ[x, ∞))(1 − π(x)) ν(dx).
(4.8)
0
Example 4.3 (R-Rep truncation for ΓP(γ, λ, 0) with Poisson likelihood). Using
Eq. (4.8) and the fact that 1 − e−x ≤ x, we have
Z ∞
BN,K ≤ N γλ
FK (γλ log{1 + (λx)−1 })e−λx dx.
(4.9)
0
Arguing as in Example 4.1, we see that the integral in Eq. (4.9) is upper bounded
by
Z ∞
Z a
1
e−λx dx + FK γλ log 1 +
e−λx dx
λa
0
a
1
≤ a + λ−1 FK γλ log 1 +
λa
−1
b
−1
=λ
(e − 1) + (3γλb/K)K ,
(4.10)
where b := log{1 + (λa)−1 }. Replacing (eb − 1)−1 with the approximation e−b
and then setting the two terms in Eq. (4.10) equal to each other, we obtain b =
KW0 ({3γλ}−1 ) (where W0 is defined in Eq. (4.6)) and conclude that
BN,K ≤
2N γ
eKW0 ({3γλ}−1 )
−1
∼ 2N γe−KW0 ({3γλ}
−1
)
K → ∞.
16
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Example 4.4 (R-Rep truncation for ΓP(γ, λ, d) with Poisson likelihood, d > 0).
We have
Z ∞
γλ1−d
BN,K ≤ N
FK (γ 0 x−d )(1 − e−x )x−1−d e−λx dx.
Γ(1 − d) 0
The integral can be upper bounded as
Z
Z a
−d
0 −d
x dx + FK (γ a )
∞
(1 + e−x )x−1−d e−λx dx
a
0
≤ (1 − d)−1 a1−d + Γ(−d)(λd − (1 + λ)d )(3γ 0 K −1 a−d )K .
Setting the two terms equal and solving for a, we obtain
Kd(1−d)
d(1−d)+K
1−d
d(1−d)
γλ1−d
3γλ
BN,K ≤ 2N
[(1 − d)Γ(−d)] d(1−d)+K
Γ(2 − d)
dΓ(1 − d)K
d(1−d)
3γλ1−d
γλ1−d
K −d(1−d)
K → ∞.
∼ 2N
Γ(2 − d) dΓ(1 − d)
4.2. Superposition representations. For superposition representations, the
truncated CRM takes the form
ΘK :=
Ck
K X
X
θki δψki .
k=1 i=1
Let Θ+
K := Θ − ΘK denote the tail measure. By the superposition property of
Poisson point processes (Kingman, 1993), the tail measure is itself a CRM with
+
some rate measure νK
and is independent of ΘK :
Θ+
K =
Ck
∞
X
X
+
θki δψki ∼ CRM νK
,
Θ+
⊥ ΘK ,
K ⊥
Θ = Θ K + Θ+
K.
(4.11)
k=K+1 i=1
The following result provides a general truncation error bound for superposition
representations, specifies its range, and guarantees that the bound decays to 0 as
K → ∞.
Theorem 4.4 (Superposition representation truncation error). The error in approximating a superposition representation of Θ ∼ CRM(ν) with its truncation ΘK
satisfies
1
0 ≤ kpN,∞ − pN,K k1 ≤ 1 − e−BN,K ≤ 1,
2
where
Z
+
BN,K :=
1 − π(θ)N νK
(dθ).
(4.12)
Furthermore, ∀N ∈ N, limK→∞ BN,K = 0.
Remark. As for series representations, an alternate form of BN,K that is sometimes
easier to use can be found by applying the standard geometric series formula to
Eq. (4.12):
N Z
X
+
BN,K =
π(θ)n−1 (1 − π(θ)) νK
(dθ).
n=1
TRUNCATED RANDOM MEASURES
17
A simplified upper bound on BN,K can be derived by noting that π(θ) ≤ 1, so
Z ∞
+
BN,K ≤ N
(1 − π (θ)) νK
(dθ).
0
This bound usually gives the same asymptotics in K as Eq. (4.12).
The main task in using Theorem 4.4 to develop a truncation error bound for a
+
superposition representation is determining its tail measure νK
. In the following,
we provide the tail measure for the three superposition representations outlined in
Section 3.2.
Decoupled Bondesson representation. For each point process in the superposition, an average of c/ξ atoms are generated with independent weights of the
indep
indep
form V e−Tk where V ∼ g and Tk ∼ Gam(k, ξ). Therefore, the tail measure is
∞
c X
+
g̃k,ξ (θ)dθ,
νK
(dθ) =
ξ
k=K+1
−Tk
where g̃k,ξ is the density of V e
. The bound for the decoupled Bondesson representation can therefore be expressed as
∞
c X
BN,K ≤ N
E 1 − π V e−Tk .
ξ
k=K+1
Example 4.5 (Decoupled Bondesson representation truncation for ΓP(γ, λ, 0)).
Using the fact that 1 − e−θ ≤ θ, we have
∞
∞
N γλ X
N γλ X
BN,K =
E[1 − π(Vk1 e−Tk1 )] ≤
E[Vk1 e−Tk1 ]
ξ
ξ
k=K+1
k=K+1
k
K
∞
X
N γλ
1
ξ
ξ
=
= Nγ
,
ξ
λ 1+ξ
1+ξ
k=K+1
which is equivalent (up to a factor of 2) to the bound in Roychowdhury and Kulis
(2015).
Size-biased representation. The constructive derivation of the size-biased representation (Broderick et al., 2017, proof of Theorem 5.1) immediately yields
+
νK
(dθ) = π(θ)K ν(dθ).
Therefore, the size-biased representation truncation error bound can be expressed
using the formula for ηk from Eq. (3.2) as
N Z
N
X
X
BN,K =
π(θ)K+n−1 (1 − π(θ))ν(dθ) =
ηK+n .
(4.13)
n=1
n=1
Example 4.6 (Size-biased representation truncation for ΓP(γ, λ, d)). For d > 0,
the standard gamma integral yields
Z
γλ1−d
ηk = π(θ)k−1 (1 − π(θ))ν(dθ) =
(λ + k)d − (λ + k − 1)d .
d
The sum from Eq. (4.13) is telescoping, so canceling terms,
γλ1−d
BN,K ≤
(λ + K)d − (λ + K + N )d ∼ γN λ1−d K d−1
K → ∞,
d
18
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
where the asymptotic result follows from Lemma B.4. To analyze the d = 0 case,
we use L’Hospital’s rule to take the limit of the integral:
Z
lim π(θ)k−1 (1 − π(θ))ν(dθ) = γλ (log(λ + k) − log(λ + k − 1)) .
d→0
Canceling terms in the telescopic sum yields
BN,K ≤ γλ (log(λ + K) − log(λ + K + N )) ∼ γλN K −1
K → ∞,
where the asymptotic result follows from an application of Lemma B.4.
Power-law representation. For each point process in the superposition, an avQk−1
erage of γ atoms are generated with independent weights of the form V Uk `=1 (1−
indep
indep
U` ), where V ∼ g and U` ∼ Beta(1 − d, α + `d). Therefore, the tail measure is
+
νK
(dθ) = γ
∞
X
g̃k (θ)dθ,
k=K+1
Qk−1
where g̃k is the density of the random variable V Uk `=1 (1 − U` ). The truncation
error bound may be expressed as
"
!#
∞
k−1
X
Y
BN,K ≤ N γ
E 1 − π V Uk
(1 − U` )
.
k=K+1
`=1
Example 4.7 (Power-law representation truncation for ΓP(γ, λ, d)). Let βk be a
random variable with density g̃k (with λ in the place of α). Using 1 − e−θ ≤ θ, we
have
" ∞
#
∞
∞
K
X
X
X
Y
λ + kd
,
E[1 − π(βk )] ≤
E[βk ] = E
βk =
λ + kd − d + 1
k=K+1
k=K+1
k=K+1
k=1
where the final equality follows from Ishwaran and James (2001, Theorem 1). Thus,
K
λ
K
Y
d=0
λ + kd
λ+1
BN,K ≤ γN
∼ γN
K → ∞,
λ+1
−1
Γ
(
)
d
1−d
λ + kd − d + 1
0
<
d
<
1
λ+d K
k=1
Γ( d )
(4.14)
where the 0 < d < 1 case in Eq. (4.14) follows by Lemma B.5 applied to
K
Y
k=1
λ + kd
Γ((λ + 1)/d) Γ(λ/d + K + 1)
=
.
λ + kd − d + 1
Γ((λ + d)/d) Γ(λ/d + K + d−1 )
4.3. Stochastic mapping. We now show how truncation bounds developed elsewhere in this paper can be applied to CRM representations that have been transformed using Lemma 3.4. For Θ ∼ CRM(ν), we denote its transformation by
Θ̃ = κ(Θ). For any object defined with respect to Θ, the corresponding object
for Θ̃ is denoted with a tilde. For example, in place of N and X1:N (for Θ), we
use Ñ and X̃1:Ñ (for Θ̃). We make BN,K a function of π(θ) in the notation of
Proposition 4.5; when one applies stochastic mapping to a CRM, one usually also
wants to change the likelihood h(x | θ), and thus also changes π(θ) = h(0 | θ). The
proof of Proposition 4.5 may be found in Appendix D.
TRUNCATED RANDOM MEASURES
19
Proposition 4.5 (Truncation error under a stochastic mapping). Consider a representation for Θ ∼ CRM(ν) with truncation error bound BN,K (π). Then for
any likelihood h̃(x | u), if Θ̃ is a stochastic mapping of Θ under the probability kernel κ(θ, du), its truncation error bound is B1,K (πκ,Ñ ), where πκ,Ñ (θ) :=
R
h̃(0 | u)Ñ κ(θ, du).
4.4. Hyperpriors. In practice, prior distributions are often placed on the hyperparameters of the CRM rate measure (i.e. γ, α, λ, d, etc.). We conclude our
investigation of CRM truncation error by showing how bounds developed in this
section can be modified to account for the use of hyperpriors. Note that we make
the dependence of BN,K on the hyperparameters Φ explicit in the notation of
Proposition 4.6.
Proposition 4.6 (CRM truncation error with a hyperprior). Given hyperparameters Φ, consider a representation for Θ | Φ ∼ CRM(ν), and let BN,K (Φ) be given
by Eq. (4.2) (for a series representation) or Eq. (4.12) (for a superposition representation). The error of approximating Θ with its truncation ΘK satisfies
0≤
1
kpN,∞ − pN,K k1 ≤ 1 − e−E[BN,K (Φ)] ≤ 1.
2
Example 4.8 (Decoupled Bondesson representation truncation for ΓP(γ, λ, 0)).
A standard choice of hyperprior for the mass γ is a gamma distribution, i.e. γ ∼
Gam(a, b). Combining Proposition 4.6 and Example 4.5, we have that
E [BN,K (Φ)] ≤ N
a
b
ξ
ξ+1
K
.
5. Normalized truncation analysis
In this section, we provide truncation error bounds for normalized CRMs
(NCRMs). Examples include the Dirichlet process (Ferguson, 1973), the normalized gamma process (Brix, 1999; James, 2002; Pitman, 2003; Lijoi and Prünster,
2010), and the normalized σ-stable process (Kingman, 1975; Lijoi and Prünster,
2010). Given a CRM Θ on Ψ, we define the corresponding NCRM Ξ via Ξ(S) :=
Θ(S)/Θ(Ψ) for each measurable subset S ⊆ Ψ. Likewise, given a truncated CRM
ΘK , we define its normalization ΞK via ΞK (S) := ΘK (S)/ΘK (Ψ). Note that any
simulation algorithm for ΘK can be used for ΞK by simply normalizing the result.
This does not depend on the particular representation of the CRM, and thus applies
equally to all the representations in Section 3.
The first step in the analysis of NCRM truncations is to define their approximation error in a manner similar to that of CRM truncations. Since Ξ and ΞK are
both normalized, they are distributions on Ψ; thus, observations X1:N are generated
i.i.d. from Ξ, and Z1:N are generated i.i.d. from ΞK . Y1:N and W1:N have the same
definition as for CRMs. As in the developments of Section 4, the theoretical results
of this section rely on a general upper bound, provided by Lemma 5.1. Proposition 5.2 shows that the bound in Lemma 5.1 is tight without further assumptions
on the data likelihood f .
20
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Lemma 5.1 (NCRM protobound). Let Θ ∼ CRM(ν), and let its truncation be
ΘK . Let their normalizations be Ξ and ΞK respectively. If
i.i.d.
Zn | ΞK ∼ ΞK ,
i.i.d.
indep
Wn | Zn ∼ f (· | Zn ),
Xn | Ξ ∼ Ξ,
indep
Yn | Xn ∼ f (· | Xn ),
then
1
kpN,∞ − pN,K k1 ≤ 1 − P (X1:N ⊆ supp(ΞK )) ,
2
where pN,∞ , pN,K are the marginal densities of Y1:N and W1:N , respectively.
Proposition 5.2 (Protobound tightness). If G is non-atomic and Ψ is Borel, then
for any δ > 0, there exists a likelihood f such that Lemma 5.1 is tight up to a factor
of 1 − δ.
The analysis of CRMs in Section 4 relied heavily on the Poisson process stucture
of the rates in Θ and X1:N ; unfortunately, the rates in Ξ do not possess the same
structure and thus lack many useful independence properties (the rates must sum
to one). Likewise, sampling Xn for each n does not depend on the atoms of Ξ
independently (Xn randomly selects a single atom based on their rates). Rather
than using the basic definitions of the above random quantities to derive an error
bound, we decouple the atoms of Ξ and X1:N using a technique from extreme
value theory. A Gumbel random variable T with location µ ∈ R and scale σ > 0,
denoted T ∼ Gumbel(µ, σ), is defined by the cumulative distribution function and
corresponding density
t−µ
−(
1 −( t−µ
σ )
σ )−e
e
.
σ
An interesting property of the Gumbel distribution is that if one perturbs the logprobabilities of a finite discrete distribution by i.i.d. Gumbel(0, 1) random variables,
the arg max of the resulting set is a sample from the discrete distribution (Gumbel,
1954; Maddison et al., 2014). This technique is invariant to normalization, as the
arg max is invariant to the corresponding constant shift in the log-transformed
space. For present purposes, we develop the infinite extension of this result:
P(T ≤ t) = e−e
−
t−µ
σ
and
∞
Lemma 5.3 (Infinite
P Gumbel-max sampling).pjLet (pi )i=1∞be a collection of positive
numbers such that i pi < ∞ and let p̄j := P pi . If (Ti )i=1 are i.i.d. Gumbel(0, 1)
i
random variables, then arg maxi∈N Ti + log pi exists, is unique a.s., and has distribution
∞
arg max Ti + log pi ∼ Categorical (p̄j )j=1 .
i∈N
The proof of this result, along with the others in this section, may be found
in Appendix E. The utility of Lemma 5.3 is that it allows the construction of Ξ
and X1:N without the problematic coupling of the underlying CRM atoms due to
normalization; rather than dealing directly with Ξ, we log-transform the rates of Θ,
perturb them by i.i.d. Gumbel(0, 1) random variables, and characterize the distribution of the maximum rate in this process. The combination of this distribution with
Lemma 5.3 yields the key proof technique used to develop the truncation bounds
in Theorems 5.4 and 5.5. The results presented in this section are summarized in
Table 1 in Section 7.
TRUNCATED RANDOM MEASURES
21
5.1. Series representations. The following result provides a general truncation
error bound for normalized series representations, specifies its range, and guarantees
that it decays to 0 as K → ∞. We again use the general series representation
notation from Eq. (4.1), where g is a distribution on R+ , and τ : R+ × R+ → R+
is a measurable function such that limu→∞ τ (v, u) = 0 for g-almost every v.
Theorem 5.4 (Normalized series representation truncation error bound). The error of approximating a series representation of Ξ ∼ NCRM(ν) with its truncation
ΞK satisfies
1
N
0 ≤ kpN,∞ − pN,K k1 ≤ 1 − (1 − BK ) ≤ 1,
2
where
Z ∞
Z 1
K−1
d R∞
BK := E
J (ΓK , t)
J (ΓK u, t) du
− e 0 (J(u+ΓK ,t)−1)du dt ,
dt
0
0
(5.1)
h
i
J(u, t) = E e−t·τ (V,u) ,
V ∼ g,
and
ΓK ∼ Gam(K, 1).
Furthermore, limK→∞ BK = 0.
Example 5.1 (Dirichlet process, DP(γ), B-Rep). The Dirichlet process with concentration γ > 0 is a normalized gamma process NΓP(γ, 1, 0). From Example 3.2
we have cν = γ and gν = Exp(1), and from Section 4.1 we have τ (v, u) = ve−u/cν .
Therefore J and its antiderivative are
Z
h
i
−1
−u/γ
J(u, t) = E e−tV e
= 1 + te−u/γ
and
J(u, t)du = γ log eu/γ + t .
Using the antiderivative to evaluate the integrals in the formula for BK , writing
the expectation over ΓK ∼ Gam(K, 1) explicitly, and making a change of variables
we have
K−1
K
Z Z
s+t
γ
γ K+1 ∞ ∞
−(γ+2)
log
(s + t)
ds dt =
,
BK =
Γ(K) 0
1+t
1+γ
1
where the last equality is found by multiplying and dividing the integrand by (1 +
s+t
t)−(γ+2) , and making the change of variables from s to x = log 1+t
. Therefore, the
truncation error can be bounded by
K !N
K
1
γ
γ
kpN,∞ − pN,K k1 ≤ 1 − 1 −
∼N
K → ∞.
2
γ+1
γ+1
The bound in Example 5.2 has exponential decay, and reproduces earlier DP
truncation error bound rates due to Ishwaran and James (2001) and Ishwaran and
Zarepour (2002). However, the techniques used in past work do not generalize
beyond the Dirichlet process, while those developed here apply to any NCRM.
5.2. Superposition representations. The following result provides a general
truncation error bound for normalized superposition representations, specifies its
range, and guarantees that it decays to 0 as K → ∞. We once again rely on the
property that the truncation ΘK and tail Θ+
K are mutually independent CRMs, as
+
expressed in Eq. (4.11), with the tail measure denoted νK
.
22
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Theorem 5.5 (Truncation error bound for normalized superposition representations). The error of approximating a superposition representation of Ξ ∼ NCRM(ν)
with its truncation ΞK satisfies
1
N
0 ≤ kpN,∞ − pN,K k1 ≤ 1 − (1 − BK ) ≤ 1,
2
where
R
Z ∞ Z
−θt
−θt +
:=
θe νK (dθ) e (e −1)ν(dθ) dt.
(5.2)
BK
0
Furthermore, limK→∞ BK = 0.
This bound can be applied by using the tail measures derived earlier in Section 4.2.
Example 5.2 (Dirichlet process, DP(γ), DB-Rep). As in Example 5.1, we view
the Dirichlet process with concentration γ > 0 as a normalized gamma process
NΓP(γ, 1, 0). First, by Lemma B.8, the integral in the exponential is
Z
Z ∞
−tθ
−tθ
−1 −θ
exp
(e
− 1)ν(dθ) = exp γ
(e
− 1)θ e dθ = (t + 1)−γ .
0
Example 3.2 shows cν = γ and gν (v) = e−v , and Eq. (C.1) provides the tail measure
+
νK
for the decoupled Bondesson representation,
Z 1
∞
−1
γ X ξk
+
νK
(dθ) =
(− log x)k−1 xξ−2 e−θx dx dθ.
ξ
Γ(k)
0
k=K+1
Substituting this result, using Fubini’s theorem to swap the order of integration and
summation, evaluating the integral over θ, and making the substitution x = e−s
yields
ZZ
∞
γ X ξk
sk−1 e−(ξ−1)s (t + 1)−γ
BK =
ds dt.
ξ
Γ(k)
(es + t)2
s,t≥0
k=K+1
Noting that ∀s ≥ 0, es ≥ 1, we have for any a ∈ (0, 1] ∩ (0, γ),
Z ∞
Z ∞
∞
γ X ξk
k−1 −(ξ+a)s
BK ≤
s
e
ds
(t + 1)−(γ+1−a) dt
ξ
Γ(k) 0
0
k=K+1
k
K
∞
X
ξ
γ
ξ
γ
=
.
=
(γ − a)ξ
ξ+a
a(γ − a) ξ + a
k=K+1
Therefore, for any a ∈ (0, 1] ∩ (0, γ),
1
kpN,∞ − pN,K k1 ≤ 1 −
2
γ
1−
a(γ − a)
ξ
ξ+a
K !N
∼
Nγ
a(γ − a)
ξ
ξ+a
K
K → ∞.
To find the tightest bound, one can minimize with respect to a given γ, ξ, K.
Example 5.3 (Normalized gamma process, NΓP(γ, λ, d), SB-Rep). By
Lemma B.8, the integral in the exponential is
Z
( exp −γλ1−d d−1 ((t + λ)d − λd ) d > 0
γλ
exp
(e−θt − 1)ν(dθ) =
(5.3)
λ
d = 0,
t+λ
TRUNCATED RANDOM MEASURES
23
and the standard gamma integral yields
Z
Z
λ1−d
−θt +
θe νK (dθ) = γ
θ−d e−(K+t+λ)θ dθ = γλ1−d (K + t + λ)d−1 . (5.4)
Γ(1 − d)
When d > 0, multiplying the previous two displays and integrating over t ≥ 0
yields
Z ∞
1−d d
d−1
1−d γλ/d
(K + t)d−1 e−γλ t /d dt ≤ Cγ,λ,d (K + λ)
,
BK = γλ e
λ
d−1
d−1
where we have used (K + t)
≤ (K + λ)
for t ≥ λ and the change of variables
−1
u = γλ1−d d−1 td to find that Cγ,λ,d = eσ σ 1−d λ1−d Γ d−1 , σ , where σ = γλd−1
R∞
and Γ(a, x) := x θa−1 e−θ dθ is the upper incomplete gamma function. Therefore,
N
1
kpN,∞ − pN,K k1 ≤ 1 − 1 − Cγ,λ,d (K + λ)d−1
∼ N Cγ,λ,d K d−1 K → ∞.
2
Setting λ = 0 in the above expression immediately yields the bound for the normalized d-stable process (Kingman, 1975).
When d = 0, multiplying Eqs. (5.3) and (5.4) and integrating over t ≥ 0 yields
1
1−γλ
Z ∞
−λ1−γλ
γλ (K+λ)
−1
BK
(K
+
λ)
γλ 6= 1
1−γλ
=
(K + t)−1 t−γλ dt ≤
γλ1+γλ
λ
γλ = 1,
K −1 log K+λ
λ
where we obtain the bound for γλ 6= 1 by splitting the integral into the intervals
[λ, K + λ] and [K + λ, ∞) and bounding each section separately, and we obtain the
bound for γλ = 1 via the transformation u = t/(K + t). Therefore, asymptotically
1
Cγ,λ K − min(1,γλ) γλ 6= 1
K → ∞,
kpN,∞ − pN,K k1 . N
λK −1 log K
γλ = 1
2
γλ
γλ2
λ
where Cγ,λ := max 1−γλ
, γλ−1
.
Truncation of the NΓP(γ, λ, d) has been studied previously: Argiento et al.
(2016) threshold the weights of the unnormalized CRM to be beyond a fixed level
> 0 prior to normalization, and develop error bounds for that method of truncation. These results are not directly comparable to those of the present work due
to the different methods of truncation (i.e. sequential representation termination
versus weight thresholding).
5.3. Hyperpriors. As in the CRM case, we can place priors on the hyperparameters of the NCRM rate measure (i.e. γ, α, λ, d, etc.). We conclude our investigation
of NCRM truncation error by showing how bounds developed in this section can
be modified to account for hyperpriors. Note that we make the dependence of BK
on the hyperparameters Φ explicit in the notation of Proposition 5.6.
Proposition 5.6 (NCRM truncation error with a hyperprior). Given hyperparameters Φ, consider a representation for Θ | Φ ∼ CRM(ν), let Ξ | Φ be its normalization,
and let BK (Φ) be given by Eq. (5.1) (for a series representation) or Eq. (5.2) (for
a superposition representation). The error of approximating Ξ with its truncation
ΞK satisfies
1
N
0 ≤ kpN,∞ − pN,K k1 ≤ 1 − (1 − E [BK (Φ)]) ≤ 1.
2
24
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Example 5.4 (Dirichlet process, DP(γ), B-Rep). If we place a Lomax prior on γ,
i.e. γ ∼ LomP(a, 1), then combining Proposition 5.6 and Example 5.1 yields
N
1
Γ(a + 1)Γ(K + 1)
kpN,∞ − pN,K k1 ≤ 1 − 1 −
∼ N Γ(a + 1)(K + 1)−a K → ∞.
2
Γ(a + K + 1)
6. Simulation and computational complexity
The sequential representations in Section 3 are each generated from a different
finite sequence of distributions, resulting in a different expected computational cost
for the same truncation level. Thus, the truncation level itself is not an appropriate
parameter with which to compare the error bounds for different representations and
we require a characterization of the computational cost. We investigate the mean
complexity E[R] of each representation, where R is the number of random variables
sampled, as a function of the truncation level for each of the representations in
Section 3.
We begin with the series representations. For each value of k = 1, . . . , K, each
series representation generates a single trait ψk ∼ G and a rate θk composed of
some transformation of random variables. Thus, all of the series representations in
this work satisfy E[R] = rK for some constant r: by inspection, the inverse-Lévy
representation has r = 2, and all the remaining series representations have r = 3.
The superposition representations, on the other hand, generate a Poisson random
variable to determine the number of atoms at each value of k = 1, . . . , K, and then
generate those atoms. Therefore, the mean simulation complexity takes the form
PK
E[R] = k=1 1 + rk E[Ck ] for some constants rk that might depend on the value
of k. For the decoupled Bondesson representation, rk = 3 since each atom
requires
generating three values (ψki , Vki , and Tki ), and E[Ck ] = c/ξ, so E[R] = 3c
ξ + 1 K.
For the size-biased representation, rk = 3 since each atom requires generating three
PK
values (ψki , zki , and θki ), and E[Ck ] = ηk , so E[R] = K + 3 k=1 ηk . Note that
here E[R] ∼ K, for K → ∞ since ηk is a decreasing sequence. For the power-law
representation, rk = k + 2, since each atom requires
ψki , Vki , and k beta
generating
γ
2
K
.
random variables, and therefore E[R] = 1 + 5γ
K
+
2
2
7. Summary of results
Table 1 summarizes our truncation and simulation cost results as applied to the
beta, (normalized) gamma, and beta prime processes. Results for the Bondesson
representation of BP(γ, 1, 0) as well as the decoupled Bondesson representations
of BP(γ, α, 0) and ΓP(γ, λ, 0) were previously known, and are reproduced by our
results. All other results in the table are novel to the best of the authors’ knowledge. It is interesting to note that the bounds and expected costs within each of the
representation classes often have the same form, aside from some constants. Across
classes, however, they vary significantly, indicating that the chosen sequential representation of a process has more of an influence on the truncation error than the
process itself.
Fig. 1 shows a comparison of how the truncation error bounds vary with the expected computational cost E[R] of simulation for the (normalized) gamma process
and Poisson likelihood with N = 5 observations. Results shown for the thinning,
rejection, and inverse-Lévy representations are computed by Monte-Carlo approximation of the formula for BN,K in Eq. (4.3), while all others use closed-form
TRUNCATED RANDOM MEASURES
25
Table 1. Asymptotic error bounds and simulation cost summary.
Error bounds are presented up to a constant that varies between
models. Be = Bernoulli, OBe = odds Bernoulli, Poi = Poisson.
Rep. Random Measure h
IL
B
T
R
DB
SB
PL
LomP(γ, α−1 )
Poi
BP(γ, α ≥ 1, 0)
ΓP(γ, α, 0)
BPP(γ, α, 0)
Be
Poi
OBe
Asymptotic Error Bound
−1
N e−KW0 ({3γα}
Nγ
γα
γα+1
γ
γ+1
)
—
BP(γ, α, 0)
ΓP(γ, α, 0)
BPP(γ, α, 0)
—
See Eq. (4.7)
Be
−KW0 ({3γα}−1 )
d=0
e
Poi
N
K −d(1−d)
d > 0 (ΓP)
OBe
K −1/d
d > 0 (BP, BPP)
BP(γ, α ≥ 1, 0)
ΓP(γ, α, 0)
BPP(γ, α > 1, 0)
Be
Poi
OBe
—
BP(γ, α, d)
ΓP(γ, α, d)
BPP(γ, α, d)
Be
Poi
OBe
NΓP(γ, α, d)
—
BP(γ, α, d)
ΓP(γ, α, d)
BPP(γ, α > 1, d)
Be
Poi
OBe
ξ
ξ+1
3K
K
—
N
2K
K
DP(γ)
DP(γ)
N
Complexity
3K
3K
K
Nγ
a(γ−a)
ξ
ξ+a
K
, a ∈ (0, 1] ∩ (0, γ)
N K d−1
d = 0, γα = 1
K −1 log K
N
K − min(1,γα) d = 0, γα 6= 1
K d−1
d>0
K
α
d = 0 (BP, ΓP)
α+1
N
−K
2
d
= 0 (BPP)
K 1−1/d
d>0
3c
ξ
+1 K
K
γ
K2
2
expressions from the examples in Sections 4 and 5. Note that the Bondesson and
decoupled Bondesson representations do not exist when d > 0. Further, only those
representations for which we provide closed-form bounds in the examples are shown
for the normalized gamma process; we leave the numerical approximation of the
results from Theorems 5.4 and 5.5 as an open problem. Similar figures for other
processes (in particular, the beta-Bernoulli and beta prime-odds Bernoulli) are provided in Appendix A. Note that all bounds presented are improved by a factor of
two versus comparable past results in the literature, due to the reliance on Lemmas 4.1 and 5.1 rather than the earlier bound found in Ishwaran and James (2001).
In Fig. 1, the top row shows results for the light-tailed process (γ = 1, λ = 1,
d = 0, and ξ = c = γλ). All representations except for thinning and size-biased
capture its exponential truncation error decay. This is due to the fact that the thinning representation generates increasingly many atoms of weight 0 as K → ∞, and
the expected number of atoms at each outer index for the size-biased representation
decays as K → ∞. The inverse-Lévy representation has the lowest truncation error
as expected, as it is the only representation that generates a nonincreasing sequence
of weights (and so must be the most efficient (Arbel and Prünster, 2017)). Based
on this figure and those in Appendix A for other processes, it appears that the Bondesson representation typically provides the best tradeoff between simplicity and
26
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
100
100
ILRep
BRep
TRep
RRep
SBRep
DBRep
PLRep
102
103
104
105
101
100
102
103
Mean Computational Cost
101
L1 Error
L1 Error
d = 0.0
101
104
L1 Error
L1 Error
d = 0.1
103
102
103
104
102
103
104
102
103
104
Mean Computational Cost
102
103
104
101
100
102
103
Mean Computational Cost
104
105
101
100
101
Mean Computational Cost
101
102
L1 Error
L1 Error
101
100
104
d = 0.5
105
101
102
103
104
105
103
104
101
105
102
102
103
104
101
102
103
Mean Computational Cost
ΓP
104
105
101
Mean Computational Cost
NΓP
Figure 1. Truncation error bounds for representations of the
(normalized) gamma-Poisson process, with γ = 1, λ = 2, and ξ =
γλ. The left column is for the unnormalized process, while the right
column is for the normalized process. Each row displays results for
a different value of the discount parameter d ∈ {0, 0.1, 0.5}.
efficiency, and should be used whenever its conditions in Theorem 3.1 are satisfied.
When the technical conditions are not satisfied, the rejection representation is a
good alternative. If ease of theoretical analysis is a concern, the decoupled Bondesson representation provides comparable efficiency with the analytical simplicity of
a superposition representation.
The bottom two rows of Fig. 1 show results for the heavy-tailed process (γ = 1,
λ = 2, and d ∈ {0.1, 0.5}). The representation options are more limited, as the
technical conditions of the Bondesson and decoupled Bondesson representations
are not satisfied. Here the rejection representation is often the best choice due to
its simplicity and competitive performance with the inverse-Lévy representation.
However, one must take care to check its efficiency beforehand using Proposition 3.2
given a particular choice of µ(dθ). For example, the choice of µ(dθ) ∝ θ−1−d dθ in
the present work makes the rejection representation very inefficient when d 1 for
both the gamma-Poisson (Fig. 1) and beta prime-odds Bernoulli (Fig. 3) processes,
but efficient for the beta-Bernoulli process (Fig. 2). If no µ(dθ) yields reasonable
results, the power-law representation is a good choice for d 1 as its truncation
TRUNCATED RANDOM MEASURES
27
bound approaches the exponential decay of the light-tailed process. For larger d > 0
the size-biased representation is a good alternative.
Based on the results in Fig. 1, it appears that there is no single dominant representation for all situations (provided the inverse-Lévy representation is intractable,
as it most often is). However, as a guideline, the rejection and Bondesson representations tend to be good choices for light-tailed processes, while the rejection,
size-biased, and power-law representations are good choices for heavy-tailed processes.
8. Discussion
We have investigated sequential representations, truncation error bounds, and
simulation algorithms for (normalized) completely random measures. In past work,
the development and analysis of these tools has occurred only on an ad hoc basis.
The results in the present paper, in contrast, provide a comprehensive characterization and analysis of the different types of sequential (N)CRM representations
available to the practitioner. However, there are a number of remaining open questions and limitations.
First, this work does not consider the influence of observed data: all analyses
assume an a priori perspective, as truncation is typically performed before data
are incorporated via posterior inference (e.g. in variational inference for the DP
mixture (Blei and Jordan, 2006) and BP latent feature model (Doshi-Velez et al.,
2009)). However, analysis of a posteriori truncation has been studied in past work
as well (Ishwaran and James, 2001; Gelfand and Kottas, 2002; Ishwaran and Zarepour, 2002). In the language of CRMs, observations introduce a fixed-location
component in the posterior process, while the unobserved traits are drawn from
the (possibly normalized) ordinary component of a CRM (Ishwaran and Zarepour,
2002; Broderick et al., 2017). We anticipate that this property makes observations
reasonably simple to include: the truncation tools provided in the present paper can
be used directly on the unobserved ordinary component, while the fixed-location
component may be treated exactly.
In addition, there are important open questions regarding the sequential representations developed in this work. It is unknown whether generalized versions
of the Bondesson and decoupled Bondesson representations can be developed for
larger classes of rate measures. The power-law representation does provide a partial answer in the decoupled Bondesson case. Regarding size-biased representations,
one might expect that the use of conjugate exponential family CRMs (Broderick
et al., 2017) would yield a closed-form expression for the truncation bound. In all
of the cases provided in this paper, this was indeed the case; the integrals were
evaluated exactly and a closed-form expression was found. However, we were unable to identify a general expression applicable to all conjugate exponential family
CRMs. Based on the examples provided, we conjecture that such an expression exists. Finally, fundamental connections between some of the representations were left
largely unexplored in this work. This is an open area of research, although progress
has been made by connecting decoupled Bondesson and size-biased representations
for (hierarchies of) generalized beta processes (Roy, 2014, Sec. 6.4).
A final remark is that one of the primary uses of sequential representations in
past work has been in the development of posterior inference procedures (Paisley
et al., 2010; Blei and Jordan, 2006; Doshi-Velez et al., 2009). The present work
100
101
102
103
104
105
ILRep
BRep
TRep
RRep
SBRep
DBRep
PLRep
101
102
103
Mean Computational Cost
d = 0.0
104
100
101
102
103
104
105
L1 Error
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
L1 Error
L1 Error
28
101
102
103
Mean Computational Cost
104
100
101
102
103
104
105
101
102
103
Mean Computational Cost
d = 0.1
104
d = 0.5
Figure 2. Truncation error bounds for the beta-Bernoulli process.
provides no guidance on which truncated representations are best paired with which
inference methods. We leave this as an open direction for future research, which
will require both theoretical and empirical investigation.
Acknowledgments
The authors thank the anonymous reviewers for their thoughtful comments,
which led to substantial improvements in both improvements in both the presentation and content of the paper. All authors are supported by the Office of Naval
Research under MURI grant N000141110688. J. Huggins is supported by the U.S.
Government under FA9550-11-C-0028 and awarded by the DoD, Air Force Office of
Scientific Research, National Defense Science and Engineering Graduate (NDSEG)
Fellowship, 32 CFR 168a. T. Campbell and T. Broderick are supported by DARPA
award FA8750-17-2-0019.
Appendix A. Additional Examples
In this section, we provide example applications of our theory to the beta process
and to the beta prime process.
A.1. Beta process. The beta process BP(γ, α, d) (Teh and Görür, 2009; Broderick
et al., 2012) with discount parameter d ∈ [0, 1), concentration parameter α > −d,
and mass parameter γ > 0, is a CRM with rate measure
ν(dθ) = γ
Γ(α + 1)
1 [θ ≤ 1] θ−1−d (1 − θ)α+d−1 dθ.
Γ(1 − d)Γ(α + d)
(A.1)
Setting d = 0 yields the standard beta process (Hjort, 1990; Thibaux and Jordan,
2007). The beta process is often paired with a Bernoulli likelihood or negative
binomial likelihood with s ∈ N failures:
Bern:
NegBinom:
h(x | θ) = 1 [x ≤ 1] θx (1 − θ)1−x ,
x+s−1
h(x | θ) =
(1 − θ)s θx .
x
Note that for the Bernoulli likelihood π(θ) = 1 − θ and for the negative binomial
likelihood π(θ) = (1 − θ)s .
TRUNCATED RANDOM MEASURES
29
Bondesson representation. If α > 1 and d = 0, then θν(θ) = γα(1 −
θ)α−1 1[θ ≤ 1] is non-increasing, cν = limθ→0 θν(θ) = γα, and gν (v) = (α −
1)(1 − v)α−2 = Beta(v; 1, α − 1). Thus, it follows from Theorem 3.1 that if
Θ ← B-Rep(γα, Beta(1, α − 1)), then Θ ∼ BP(γ, α, 0). In the case of α = 1,
gν (v) = δ1 , so Vk ≡ 1 and the Bondesson representation is equivalent to the inverseLévy representation. Since exp(−Ek /c) ∼ Beta(1, c), the representation used in Teh
et al. (2007) is equivalent to the Bondesson representation for BP(γ, 1, 0).
To obtain a truncation bound in the Bernoulli likelihood case, we can argue as
in Example 4.2:
Z ∞
h
i
1 − E π(ve−GK /(γα) ) ν(dv)
BN,K ≤ N
0
= N γα E[e−GK /(γα) ]
1
Z
(1 − v)α−1 dv
(A.2)
0
= Nγ
γα
1 + γα
K
.
This result generalizes that in Doshi-Velez et al. (2009), which applies only when
α = 1.
Theorem 3.1 does not apply directly when α < 1, since limθ→0 θν(θ) = ∞.
However, a representation can be obtained by using a trick from Paisley et al.
(2012). For α > 0, let
Θ0 =
C
X
θk0 δψk0 ,
k=1
i.i.d.
i.i.d.
where C ∼ Poiss(γ), θk0 ∼ Beta(1, α), and ψk0 ∼ G. Thus, Θ0 is a CRM with rate
measure γα(1 − θ)α−1 1[θ ≤ 1]dθ. If Θ ∼ BP(γα/(α + 1), α + 1, 0), which can be
generated according to Theorem 3.1, then Θ00 = Θ + Θ0 is a CRM with rate density
on [0, 1] given by
γαθ−1 (1 − θ)α + γα(1 − θ)α−1 = γαθ−1 (1 − θ)α−1 ,
hence Θ00 ∼ BP(γ, α, 0).
Thinning representation. If we let g = Beta(1 − d, α + d), then the thinning
representation for BP(γ, λ, d) is
Θ=
∞
X
Vk 1(Vk Γk ≤ γ)δψk ,
with
i.i.d.
Vk ∼ Beta(1 − d, α + d).
k=1
Rejection representation. To obtain a rejection representation for any d when
Γ(α+1)
α ≥ 1 − d, let µ be the rate measure for BP(γ Γ(2−d)Γ(α+d)
, 1 − d, d). We then have
that
(
(
γ 0 d−1 (x−d − 1) d > 0
(1 + du/γ 0 )−1/d d > 0
←
and
µ
(u)
=
µ[x, ∞) =
0
−γ 0 log x
d=0
e−u/γ
d = 0,
Γ(α+1)
where γ 0 := γ Γ(1−d)Γ(α+d)
. Thus, we can apply the inverse-Lévy method analytically for µ. Since we have constructed µ such that dν/dµ ≤ 1, we can use µ to
30
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
construct the rejection representation
∞
X
Θ=
Vk 1(Uk ≤ (1 − Vk )α+d−1 ) ∼ BP(γ, α, d),
α ≥ 1 − d,
k=1
(
with
Vk =
(1 + dΓk /γ 0 )−1/d
0
e−Γk /γ
d>0
,
d=0
i.i.d.
Uk ∼ Unif[0, 1].
The expected number of rejections is
h
i
(0,0,1,0)
(0,1,0,0)
−d−1 1 + 2d 2 F1
(−α − d, −d, −d; 1) + d 2 F1
(−α − d, −d, −d; 1) ,
where 2 F 1 is the ordinary hypergeometric function and the parenthetical superscripts indicate partial derivatives. This quantity monotonically diverges to ∞ as
d → 1.
To obtain a truncation bound in the Bernoulli likelihood case, we consider the
d > 0 and d = 0 settings separately. If d > 0, we have
Z 1
BN,K
≤
FK (γ 0 d−1 (x−d − 1))x−d (1 − x)α+d−1 dx
N γ0
0
Z a
Z 1
≤
x−d (1 − x)a+d−1 dx + FK (γ 0 d−1 (a−d − 1))
x−d (1 − x)α+d−1 dx
0
Z
≤
a
a
x−d dx + a−d FK (γ 0 d−1 (a−d − 1))
0
Z
1
(1 − x)α+d−1 dx
a
≤ (1 − d)−1 a1−d + a−d 3γ 0 d−1 (a−d − 1)/K
K
≤ (1 − d)−1 a1−d + 3γ 0 d−1 /K a−(K+1)d .
K
Setting the two terms equal and solving for a we obtain a1+d(K−1) =
K
3γ 0 (d−1 − 1)/K
and conclude that
K
0 −1
1/d
0 −1
3γ (d − 1)
3γ (d − 1) 1+d(K−1)
0
0
∼ 2N γ
K → ∞.
BN,K ≤ 2N γ
K
K
If d = 0, we have
BN,K
≤
N γ0
Z
1
FK (−γ 0 log x)(1 − x)α−1 dx
0
Z
≤
a
α−1
(1 − x)
0
1
Z
(1 − x)α−1 dx
dx + FK (−γ log x)
0
a
K
≤ a + (−3γ 0 log a/K) .
Setting the two terms equal and solving for a we conclude that
BN,K ≤ 2N γαe−KW0 ({3γα}
−1
)
,
where W0 is as defined in Eq. (4.6).
Decoupled Bondesson and power-law representations. The decoupled
Bondesson representation for BP(γ, α, 0) from Paisley et al. (2010) was extended
by Broderick et al. (2012) to the BP(γ, α, d) setting. The Broderick et al. (2012)
construction for the BP(γ, α, d) is in fact the “trivial” power-law representation
TRUNCATED RANDOM MEASURES
31
PL-Rep(γ, α, d, δ1 ) (the decoupled Bondesson representation is the special case
when d = 0).
In the Bernoulli likelihood case, the truncation bound for the decoupled Bondesson representation is
K
K
∞
∞
ξ
N γα X
ξ
N γα X 1
= Nγ
.
BN,K ≤
E[V e−Tk ] =
ξ
ξ
α 1+ξ
1+ξ
k=K+1
k=K+1
For the power law representation, by the same arguments as Example 4.7,
BN,K ≤ N γ
K
Y
k=1
α + kd
.
α + kd − d + 1
This result generalizes that in Paisley et al. (2012), which applies only when d = 0.
Size-biased representation. For the size-biased representation of the beta process is well-established and we refer the reader to Broderick et al. (2012, 2017) for
details. We note that the standard beta integral yields
Z
Γ(α + 1) Γ(α + d + k − 1)
,
ηk = ηk1 = π(θ)k−1 (1 − π(θ))ν(dθ) = γ
Γ(α + d)
Γ(α + k)
and for i > 1, ηki = 0. Hence zki = 1 almost surely and θki ∼ Beta(1 − d, α + d +
k − 1), demonstrating that the construction due to Thibaux and Jordan (2007) is
a special case of the size-biased representation for BP(γ, α, d).
To obtain a truncation bound for the Bernoulli likelihood case, first consider the
d > 0 setting. Using Lemma B.6 to simplify the sum in Eq. (4.13), we have
γ Γ(α + 1) Γ(α + d + K) Γ(α + d + K + N )
−
BN,K ≤
d Γ(α + d)
Γ(α + K)
Γ(α + K + N )
Γ(α + 1) d−1
∼ γN
K
K → ∞,
Γ(α + d)
where the asymptotic result follows from Lemmas B.4, B.7 and B.9. When d = 0,
we can again use Lemma B.6 to arrive at
BN,K ≤ γα (ψ(α + K) − ψ(α + N + K)) ∼ γαN K −1
K → ∞,
where ψ(·) is the digamma function, and the asymptotic result follows from
Lemma B.4.
We can also bound the truncation error in the case of the negative binomial
likelihood. For a fixed number of failures s > 0, and assuming α + d + (k − 1)s > 1,
integration by parts yields
Z
π(θ)k−1 (1 − π(θ))ν(dθ)
γ Γ(α + 1) Γ(α + d + ks) Γ(α + d + (k − 1)s)
=
−
,
(A.3)
d Γ(α + d)
Γ(α + ks)
Γ(α + (k − 1)s)
When d > 0, the sum from Eq. (4.13) is telescoping, so canceling terms,
γ Γ(α + 1) Γ(α + d + Ks) Γ(α + d + (K + N )s)
BN,K ≤
−
d Γ(α + d)
Γ(α + Ks)
Γ(α + (K + N )s)
Γ(α + 1) d−1
∼ γN sd
K
K → ∞,
Γ(α + d)
32
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
where the asymptotic result follows from Lemmas B.4, B.7 and B.9. To analyze
the case where d = 0, we can use L’Hospital’s rule to take the limit of Eq. (A.3) as
d → 0, yielding
Z
lim π(θ)k−1 (1 − π(θ))ν(dθ) = γα(ψ(α + ks) − ψ(α + (k − 1)s)).
d→0
Again computing the error bound by canceling terms in the telescoping sum,
BN,K ≤ γα (ψ(α + Ks) − ψ(α + (K + N )s)) ∼ γαN K −1
K → ∞,
where the asymptotic result follows from an application of Lemma B.4.
Stochastic mapping. We can transform the gamma process ΓP(γ, λ, 0) into the
beta process BP(γ, α, 0) by applying the stochastic mapping
θ 7→ θ/(θ + G),
G ∼ Gam(α, α),
κ(θ, du) = Gam(θ/(θ + u); α, α)
θ
du.
u2
Using Lemma 3.4 yields κ(Θ) ∼ BP(γ, α, 0). Applying this result to the Bondesson
representation for ΓP(γ, α, 0) yields
∞
X
θk δψk ∼ BP(γ, α, 0),
with
θk := (1 + Gk Vk−1 eΓk,αγ )−1 ,
i.i.d.
ψk ∼ G,
k=1
i.i.d.
Gk ∼ Gam(α, α),
i.i.d.
Vk ∼ Exp(α).
which, unlike the Bondesson representation, applies for all α > 0.
Hyperpriors. Consider truncating the Bondesson representation of the beta process, but with a hyperprior on the mass parameter γ. A standard choice of hyperprior for γ is a gamma distribution, i.e. γ ∼ Gam(a, b). Combining Proposition 4.6
and the beta-Bernoulli truncation bound in Eq. (A.2), we have that
BN,K
a
≤N
b
ξ
ξ+1
K
.
A.2. Beta prime process. The beta prime process BPP(γ, α, d) (Broderick et al.,
2017) with discount parameter d ∈ [0, 1), concentration parameter α > −d, and
mass parameter γ > 0, is a CRM with rate measure
ν(dθ) = γ
Γ(α + 1)
θ−1−d (1 + θ)−α dθ.
Γ(1 − d)Γ(α + d)
The beta prime process is often paired with an odds Bernoulli likelihood,
h(x | θ) = 1 [x ≤ 1] θx (1 + θ)−1 ,
in which case π(θ) = (1 + θ)−1 . All truncation results are for the odds Bernoulli
likelihood.
ILRep
BRep
TRep
RRep
SBRep
DBRep
PLRep
102
101
103
Mean Computational Cost
104
100
101
102
103
104
105
L1 Error
100
101
102
103
104
105
L1 Error
L1 Error
TRUNCATED RANDOM MEASURES
102
101
103
Mean Computational Cost
d = 0.0
104
100
101
102
103
104
105
33
101
102
103
Mean Computational Cost
d = 0.1
104
d = 0.5
Figure 3. Truncation error bounds for the beta prime-odds
Bernoulli process.
Bondesson representation. If d = 0, then θν(θ) = γα(1 + θ)−α is nonincreasing and cν = limθ→0 θν(θ) = γα, so gν (v) = α(1 + v)−α−1 = Beta0 (v; 1, α).
Thus, it follows from Theorem 3.1 that if Θ ← B-Rep(γα, Beta0 (1, α)), then
Θ ∼ BPP(γ, α, 0). For the truncation bound we have
Z ∞
h
i
BN,K = N
1 − E π(ve−GK /(γα) ) ν(dv)
0
Z ∞
= N γα E e−GK /(γα)
(1 + v)−α (1 + ve−GK /(γα) )−1 dv
Z 0∞
−GK /(γα)
≤ N γα E[e
]
(1 + v)−α (1 + vE[e−GK /(γα) ])−1 dv
0
K Z ∞
γα
(1 + v)−α−1 dv
≤ N γα
1 + γα
0
K
γα
= Nγ
,
1 + γα
where the first upper bound follows from Jensen’s inequality. Thus, the error bound
is the same as for the beta-Bernoulli process.
Thinning representation. If we let g = Beta0 (1 − d, α + d), then the thinning
representation for BPP(γ, α, d) is
Θ=
∞
X
Vk 1(Vk (Γk − γ) ≤ γ)δψk ,
with
i.i.d.
Vk ∼ Beta0 (1 − d, α + d).
k=1
Rejection representation. For d = 0 and α ≥ 1, we take µ to be the rate
measure for LomP(γ, 1), so the rejection representation is
Θ=
∞
X
Vk 1(Uk ≤ (1 + Vk )α−1 ) ∼ BPP(γ, α, 0),
α ≥ 1,
k=1
with
Vk = (eγ
−1
α−1 Γk
− 1)−1 ,
i.i.d.
Uk ∼ Unif[0, 1].
The expected number of rejections is cγ + ψ(α), where cγ is the Euler-Mascheroni
constant and ψ is the digamma function. Since ψ(α) ∼ log(α) for α → ∞, the representation remains efficient even for fairly large values of α. To obtain a truncation
34
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
bound, we use the same approach as in Example 4.3:
Z ∞
BN,K
=
FK (γα log(1 + x−1 ))(1 + x)−α−1 dx
N γα
0
Z a
Z
≤
(1 + x)−α−1 dx + FK (γα log(1 + a−1 ))
0
∞
(1 + x)−α−1 dx
a
≤ a + α−1 (3γα log(1 + a−1 )/K)K (1 + a)−α
≤ e−b + α−1 (3γα/K)K bK+α ,
where b := log(1 + a−1 ). Setting the two terms equal and solving for b, we conclude
that
BN,K ≤ 2N γαe−(K+α)W0 ({K+α}
∼ 2N γαe−(K+α)W0 ({3αγ}
−1
−1
{α/γ}1/(K+α) {3αγ/K}−K/(K+α) )
)
K → ∞,
where W0 is the product log function, as defined in Eq. (4.6).
Similarly to Example 3.5, for the case of d > 0 and α ≥ 0, we instead use µ(dθ) =
Γ(α+1)
Γ(α+1)
θ−1−d dθ. Since µ← (u) = (γ 0 u−1 )1/d , where γ 0 := γ dΓ(1−d)Γ(α+d)
, the
γ Γ(1−d)Γ(α+d)
rejection representation is
Θ=
∞
X
Vk 1(Uk ≤ (1 + Vk )−α )δψk ,
with
1/d
Vk = (γ 0 Γ−1
,
k )
k=1
i.i.d.
Uk ∼ Unif[0, 1].
The expected number of rejections is γα
d , so the representation is efficient for large
d, but extremely inefficient when d is small. We have
Z ∞
Γ(α + 1)
BN,K = N γ
FK (γ 0 x−d )x−d (1 + x)−1−α dx.
Γ(1 − d)Γ(α + d) 0
Following the approach of Example 4.4, the integral can be upper bounded as
Z a
Z ∞
x−d dx + FK (γ 0 a−d )
x−d (1 + x)−1−α dx
0
−1 1−d
≤ (1 − d)
a
+α
a
−1 −d
a
(3γ 0 K −1 a−d )K .
Setting the two terms equal and solving for a, we obtain
K
(d+1)K+1
− dK+1
dK+1
1
dK
γΓ(α + 1)
dK − dK+1
(α(1 − d) )
BN,K ≤ 2N
Γ(1 − d)Γ(α + d)
3
1+1/d
−1/d
γΓ(α + 1)
dK
∼ 2N
K → ∞.
Γ(2 − d)Γ(α + d)
3(1 − d)
Decoupled Bondesson representation. It follows from Theorem 3.3 and
the same arguments as those in the Bondesson case that if Θ ←
DB-Rep(γα, Beta0 (1, α), ξ), then Θ ∼ BPP(γ, α, 0). Using the trivial bound
θ/(1 + θ) ≤ θ and calculations analogous to those in the beta-Bernoulli case, for
α > 1 we obtain the upper bound
(
K )
K
ξ
γα
ξ
γα
∼N
K → ∞.
BN,K ≤ 1 − exp −N
α−1 1+ξ
α−1 1+ξ
TRUNCATED RANDOM MEASURES
35
Power-law representation. We can transform the gamma process ΓP(γ, 1, d)
into the beta prime process BPP(γ, α, d) by applying the stochastic mapping
θ
du.
u2
Using Lemma 3.4 yields κ(Θ) ∼ BPP(γ, α, d). Applying this result to the power-law
representation ΓP(γ, 1, d) from Example 3.8 yields the novel power-law representation
θ 7→ u = θ/G,
G ∼ Gam(α + d, 1),
κ(θ, du) = Gam(θ/u; α + d, 1)
Θ ← PL-Rep(γα, 1, d, Beta0 (1, α + d))
implies
Θ ∼ BPP(γ, α, d).
Using the trivial bound θ/(1 + θ) ≤ θ and calculations analogous to those in
the beta-Bernouli case, for α > 1 we obtain the upper bound and asymptotic
simplification
K
γα Y 1 + kd
α−1
2 + kd − d
k=1
( −K
2
γN α
2
Γ( d
∼
) 1−d−1
K
α−1
Γ( 1+d
d )
BN,K ≤ N
d=0
0<d<1
K → ∞.
Size-biased representation. We have
Z
Γ(α + 1)Γ(d + k + α − 1)
,
ηk1 = ηk = π(θ)k−1 (1 − π(θ))ν(dθ) = γ
Γ(α + d)Γ(k + α)
which is the same as for the beta-Bernoulli process. Thus, the error bound is also
the same as the beta-Bernoulli case.
Appendix B. Technical lemmas
Lemma B.1. If Yk is a uniformly bounded, non-negative sequence of random variP
ables such that limk→∞ E[Yk ] = 0, then Yk → 0.
Proof. Without loss of generality we assume that Yk ∈ [0, 1] a.s. Then for all
, δ > 0, by hypothesis there exists k 0 such that for all k ≥ k 0 , E[Yk ] ≤ δ. It then
follows from Markov’s inequality that for all k ≥ k 0 , P(Yk > ) ≤ δ.
Lemma B.2. If µ is a non-atomic measure on Rd , then for any x ∈ Rd and δ > 0,
there exists x,δ > 0 such that µ({y ∈ Rd | kx − yk2 ≤ x,δ }) ≤ δ.
Proof. Without loss of generality let x = 0. Suppose the implication does not
hold. Then there exists δ > 0 such that for all > 0, µ(B ) > δ, where
B := {y ∈ Rd | kyk2 ≤ }. Let n be a sequence such that n → 0 as n → ∞.
Then by continuity µ({0}) = limn→∞ µ(Bn ) > δ, hence µ is a atomic, which is a
contradiction.
Lemma B.3. If ν(dθ), an absolutely continuous σ-finite measure on R+ , and continuous φ : R+ → [0, 1] satisfy
Z
Z
ν(R+ ) = ∞,
min(1, θ)ν(dθ) < ∞,
and
φ(θ)ν(dθ) < ∞,
then
lim φ(θ) = φ(0) = 0.
θ→0
36
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
R
R1
R∞
Proof. min(1, θ)ν(dθ) < ∞ implies that 0 θν(dθ) < ∞ and 1 ν(dθ) < ∞. But
R1
ν(R+ ) = ∞, so 0 ν(dθ) = ∞. In fact, for all > 0, ν([0, ]) = ∞ since otherwise
R1
R1
ν(dθ) = ∞ =⇒ θν(dθ) = ∞, a contradiction. Since φ is continuous and has
bounded range, limθ→0 φ(θ) = c exists and is finite. Assume c > 0, so ∃ > 0 such
that ∀0 < , |φ(0 ) − c| < c/2, and in particular φ(0 ) > c/2. Thus, for any θ0 < ,
R θ0
R θ0
φ(θ)ν(dθ) ≥ c/2 0 ν(dθ) = ∞, a contradiction. Thus, c = 0.
0
Lemma B.4. Assume φ(x) is a twice continuously differentiable function with the
following properties:
(1) φ00 (x)/φ0 (x) → 0 as x → ∞
(2) for all δ > 0 there exists Bδ > 0 such that for any increasing sequence
(xn )∞
n=1 ,
lim sup
n→∞
φ00 (y)
= Bδ < ∞.
00
y∈[xn ,xn +δ] φ (xn )
sup
Then for any constant c > 0 and any increasing sequence (xn )∞
n=1 ,
φ(xn + c) − φ(xn ) ∼ cφ0 (xn )
for n → ∞.
Proof. A second-order Taylor expansion of φ(xn + c) about xn yields
φ(xn + c) − φ(xn ) = cφ0 (xn ) +
c2 00 ∗
φ (xn ),
2
where x∗n ∈ [xn , xn + c]. Our assumptions on φ ensure that,
φ00 (x∗n )
Bc φ00 (xn )
≤ lim
=0
0
n→∞ φ (xn )
n→∞ φ0 (xn )
lim
and hence
φ(xn + c) − φ(xn )
c φ00 (x∗n )
= lim 1 +
= 1.
0
n→∞
n→∞
cφ (xn )
2 φ0 (xn )
lim
Lemma B.5 (Gautschi (1959)).
(1 + x)d−1 ≤
Γ(x + d)
≤ xd−1
Γ(x + 1)
0 ≤ d ≤ 1, x ≥ 1,
and thus for 0 ≤ d ≤ 1,
Γ(x + d)
∼ xd−1
Γ(x + 1)
Lemma B.6. For α > 0 and x ≥ −1,
(
M
Γ(α+M +x+1)
1
X
Γ(α + m + x)
−
1+x
Γ(α+M )
=
Γ(α
+
m)
ψ(α
+
M
)
−
ψ(α)
m=1
where ψ(·) is the digamma function.
x → ∞.
Γ(α+x+1)
Γ(α)
x > −1
x = −1
TRUNCATED RANDOM MEASURES
37
Proof. When M = 1 and x > −1, analyzing the right hand side yields
Γ(α + M + x + 1) Γ(α + x + 1)
Γ(α + x + 2) Γ(α + x + 1)
−
=
−
Γ(α + M )
Γ(α)
Γ(α + 1)
Γ(α)
Γ(α + x + 1) α + x + 1
=
−1
Γ(α)
α
Γ(α + x + 1)
= (x + 1)
.
Γ(α + 1)
By induction, supposing that the result is true for M − 1 ≥ 1 and x > −1,
M
M
−1
X
X
Γ(α + m + x)
Γ(α + m + x) Γ(α + M + x)
=
+
Γ(α
+
m)
Γ(α + m)
Γ(α + M )
m=1
m=1
Γ(α + M + x) Γ(α + x + 1)
1
Γ(α + M + x)
−
=
+
1 + x Γ(α + M − 1)
Γ(α)
Γ(α + M )
Γ(α + M + x)
α+M +x
Γ(α + x + 1)
=
−
Γ(α + M − 1) (1 + x)(α + M − 1)
(1 + x)Γ(α)
Γ(α + M + x + 1) Γ(α + x + 1)
1
=
−
.
1+x
Γ(α + M )
Γ(α)
This demonstrates the desired result for x > −1. Next, when x = −1, we have that
M
M
X
X
Γ(α + m − 1)
1
=
.
Γ(α
+
m)
α
+
m
−1
m=1
m=1
We proceed by induction once again. For M = 1, using the recurrence relation
ψ(x + 1) = ψ(x) + x−1 (Abramowitz and Stegun, 1964, Chapter 6), the right hand
side evaluates to
ψ(α + 1) − ψ(α) = ψ(α) + α−1 − ψ(α) = α−1 .
Supposing that the result is true for M − 1 ≥ 1 and x = −1,
M
−1
X
1
1
1
=
+
α+m−1
α+m−1 α+M −1
m=1
m=1
M
X
= ψ(α + M − 1) − ψ(α) +
1
α+M −1
= ψ(α + M ) − ψ(α),
demonstrating the result for x = −1.
Lemma B.7. For a > 0, d ∈ R, and xn → ∞,
d Γ(a + xn + d)
∼ dxd−1
n .
dxn Γ(a + xn )
Proof. We have
d Γ(a + x + d)
Γ(a + x + d)
=
(ψ(a + x + d) − ψ(a + x)),
dx Γ(a + x)
Γ(a + x)
38
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
where ψ is the digamma function. Using Lemma B.4 and the asymptotic expansion
of ψ 0 (Abramowitz and Stegun, 1964, Chapter 6), we obtain
ψ(a + xn + d) − ψ(a + xn ) ∼ dψ 0 (a + xn ) ∼
d
∼ dx−1
n .
xn + a
Since
Γ(a + xn + d)
∼ (a + xn )d ∼ xdn ,
Γ(a + xn )
using Lemma B.9(2) with the previous two displays yields the result.
Lemma B.8. For 0 ≤ d < 1,
(
Z ∞
d
d
Γ(−d)
−1−d −λθ
+ t) − λ
(λ
−tθ
e
−1 θ
e
dθ =
λ
log t+λ
0
0<d<1
d=0
.
Proof. By integration by parts and the standard gamma integral,
Z ∞
Z ∞h
i θ−d
e−tθ − 1 θ−1−d e−λθ dθ =
(λ + t)e−(λ+t)θ − λe−λθ
dθ
−d
0
0
= Γ(−d) (λ + t)d − λd .
Taking the limit as d → 0 via L’Hospital’s rule yields
λ
lim Γ(−d) (λ + t)d − λd = log
.
d→0
λ+t
Lemma B.9 (Standard asymptotic equivalence properties).
(1) If an ∼ bn and bn ∼ cn , then an ∼ cn .
(2) If an ∼ bn and cn ∼ dn , then an cn ∼ bn dn .
(3) If an ∼ bn , cn ∼ dn and an cn > 0, then an + cn ∼ bn + dn .
Appendix C. Proofs of sequential representation results
C.1. Correctness of B-Rep, DB-Rep, and PL-Rep.
Proof of Theorem 3.1. First, we show that gν (v) is a density. Since vν(v) is nond
d
decreasing, dv
[vν(v)] exists almost everywhere, dv
[vν(v)] ≤ 0 and hence gν (v) ≥ 0.
Furthermore,
Z ∞
Z ∞
∞
d
−1
gν (v)dv = −cν
[vν(v)]dv = −c−1
= 1,
ν vν(v)
dv
v=0
0
0
where the final equality follows from the assumed behavior of vν(v) at 0 and ∞.
Since for a partition A1 , . . . , An , the random variables Θ(A1 ), . . . , Θ(An ) are independent, it suffices to show that for any measurable set A (with complement Ā),
the random variable Θ(A) has the correct characteristic function. Define the family
of random measures
∞
X
Θt =
Vk e−(Γk +t)/cν δψk ,
t ≥ 0,
k=1
so Θ0 = Θ. Conditioning on Γ11 ,
D
(Θt (A) | Γ1 = u) = V1 e−(u+t)/cν 1[ψ1 ∈ A] + Θt+u (A),
TRUNCATED RANDOM MEASURES
39
and note that the two terms on the left hand side are independent. We can thus
write the characteristic function of Θt (A) as
ϕ(ξ, t, A) := E[eiξΘt (A) ]
= E[E[eiξΘt (A) | Γ1 = u]]
= E[E[eiξV1 e
−(u+t)/cν
1[ψ1 ∈A] iξΘt+u (A)
e
| Γ1 = u]]
iξV1 e−(u+t)/cν
= E[E[(G(A)e
+ G(Ā))ϕ(ξ, t + u, A) | Γ1 = u]]
Z ∞Z ∞
−(u+t)/cν
eiξve
ϕ(ξ, t + u, A)gν (v)e−u du dv
= G(A)
0
0
Z ∞
ϕ(ξ, t + u, A)e−u du,
+ G(Ā)
0
where Ā is the complement of A. Multiplying both sides by e−t and making the
change of variable w = u + t yields
e−t ϕ(ξ, t, A) = G(A)
Z
∞
t
Z
∞
eiξve
−w/cν
ϕ(ξ, w, A)gν (v)e−w dv dw
0
∞
Z
+ G(Ā)
ϕ(ξ, w, A)e−w dw
t
Z ∞
= G(A)
ϕgν (ξe−w/cν )ϕ(ξ, w, A)e−w dw
t
Z ∞
+ G(Ā)
ϕ(ξ, w, A)e−w dw,
t
R∞
where ϕgν (a) := 0 eiav gν (v) dv is the characteristic function of a random variable
with density gν . Differentiating both sides with respect to t and rearranging yields
∂ϕ(ξ, t, A)
= ϕ(ξ, t, A) − G(A)ϕgν (ξe−t/cν )ϕ(ξ, t, A) − (1 − G(A))ϕ(ξ, t, A)
∂t
= ϕ(ξ, t, A)G(A)(1 − ϕgν (ξe−t/cν )),
so we conclude that
Z
ϕ(ξ, t, A) = exp −G(A)
∞
(1 − ϕgν (ξe
−u/cν
)) du .
t
Using integration by parts and the definition of gν , rewrite
Z
∞
d
[vν(v)]eiav dv
dv
0
Z ∞
∞
iav
−1
= −c−1
vν(v)e
+
c
iavν(v)eiav dv
ν
ν
v=0
0
Z ∞
iav
=1+
ν(v)eiav dv,
cν
0
ϕgν (a) = −c−1
ν
40
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
where the final equality follows from the assumed behavior of vν(v) at 0 and ∞.
Combining the previous two displays and setting t = 0 concludes the proof:
Z ∞Z ∞
iξv −u/cν iξve−u/cν
ϕ(ξ, 0, A) = exp −G(A)
e
ν(v) dv du
e
cν
0
0
Z ∞Z ∞
∂ h iξve−u/cν i
= exp −G(A)
−e
ν(v) du dv
∂u
0
0
Z ∞
= exp −G(A)
(eiξv − 1)ν(v) dv .
0
Proof of Theorem 3.3. It was already shown that gν (v) is a density. Let Θ0k =
PCk
P∞
cν 0
0
0
i=1 θki δψki , so Θ =
k=1 Θk . Each Θk is a CRM with rate measure ξ νk (dθ),
0
where νk (dθ) is the law of θki . Using the product distribution formula we have
νk0 (dθ)
1
Z
=
0
ξk
(− log w)k−1 wξ−2 gν (θ/w) dw dθ.
Γ(k)
(C.1)
Rv
Let Gν (v) = 0 gν (x) dx be the cdf derived from gν . From the preceding arguments,
conclude that the rate measure of Θ is
∞
cν X 0
νk (dθ)
ξ
k=1
Z 1X
∞
ξ k−1
(− log w)k−1 wξ−2 gν (θ/w) dw dθ
= cν
Γ(k)
0 k=1
Z 1
= cν
ξw−2 gν (θ/w) dw dθ
ν 0 (dθ) :=
0
Z
= cν
0
1
ξθ−1
∂
[−Gν (θ/w)] dw dθ
∂w
= −cν θ−1 Gν (θ/w)
1
dθ
w=0
= cν θ−1 (1 − Gν (θ)) dθ.
The cdf can be rewritten as
Z θ
d
−1
1 − Gν (θ) = 1 + cν
[xν(x)] dx = 1 + c−1
ν xν(x)
dx
0
θ
x=0
= c−1
ν θν(θ).
Combining the previous two displays, conclude that ν 0 (dθ) = ν(θ) dθ.
Proof of Theorem 3.5. Since the power-law representation in Eq. (3.3) for the case
when Vki = 1 almost surely was previously shown to be BP(γ, α, d) (Broderick
et al., 2012), we simply apply the stochastic mapping result in Lemma 3.4 with
κ(θ, du) = θ−1 gν (uθ−1 )du, where θ−1 gν (uθ−1 ) is the density of U = V θ | θ under
V ∼ gν .
TRUNCATED RANDOM MEASURES
41
C.2. Proof of the expected number rejections of the R-Rep.
Proof of Proposition 3.2. We have
"∞
#
"∞
#
X
X
dν
E
1(θk = 0) = E
1
(Vk ) ≥ Uk
dµ
k=1
k=1
"∞
#
X
dν
=E
1−
(Vk )
dµ
k=1
Z
dν
=
(x) µ(dx),
1−
dµ
where the equalities follow from the definition of θk , integrating out Uk , and applying Campbell’s theorem.
C.3. Power-law behavior of the PL-Rep. We now formalize the sense in which
i.i.d.
power-law representations do in fact produce power-law behavior. Let Zn | Θ ∼
PN
LP(Poiss, Θ) and yk :=
n=1 1[znk ≥ 1]. We analyze the number of non-zero
features after N observations,
KN :=
∞
X
1[yk ≥ 1],
k=1
and the number of features appearing j > 1 times after N observations,
KN,j :=
∞
X
1[yk = j].
k=1
In their power law analysis of the beta process, Broderick et al. (2012) use a
Bernoulli likelihood process. However, the Bernoulli process is only applicable if
θk ∈ [0, 1], whereas in general θk ∈ R+ . Replacing the Bernoulli process with a
Poisson likelihood process is a natural choice since 1[znk ≥ 1] ∼ Bern(1−e−θk ), and
asymptotically 1 − e−θk ∼ θk a.s. for k → ∞ since limk→∞ θk = 0 a.s. Thus, the
Bernoulli and Poisson likelihood processes behave the same asymptotically, which
is what is relevant to our asymptotic analysis. We are therefore able to show that
all CRMs with power-law representations, not just the beta process, have what
Broderick et al. (2012) call Types I and II power law behavior. Our only condition
is that the tails of g are not too heavy.
Theorem C.1. Assume that g is a continuous density such that for some > 0,
g(x) = O(x−1−d− ).
(C.2)
Then for Θ ← PL-Rep(γ, α, d, g) with d > 0, there exists a constant C depending
on γ, α, d, and g such that, almost surely,
KN ∼ Γ(1 − d)CN d ,
KN,j
d Γ(j − d)
CN d ,
∼
j!
N →∞
N →∞
(j > 1).
In order to prove Theorem C.1, we require a number of additional definitions
and lemmas. Our approach follows that in Broderick et al. (2012), which the
reader is encouraged to consult for more details and further discussion of power law
42
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
behavior of CRMs. Throughout this section, Θ ← PL-Rep(γ, α, d, g) with d > 0.
By Lemma 3.4, Θ ∼ CRM(ν), where
Z
ν(dθ) := g(θ/u)u−1 νBP (du) dθ
and νBP (dθ) is the rate measure for BP(γ, α, d). Let Πk be a homogeneous Poisson
point process on R+ with rate θk and define
K(t) :=
Kj (t) :=
∞
X
k=1
∞
X
1[|Πk ∩ [0, t]| > 0]
1[|Πk ∩ [0, t]| = j].
k=1
Furthermore, for N ∈ N, let
ΦN := E[KN ]
and
ΦN,j := E[KN,j ]
and
Φj (t) := E[Kj (t)]
(j > 1)
and for t > 0, let
Φ(t) := E[K(t)]
(j > 1).
If follows from Campbell’s Theorem (Kingman, 1993) that
"
# Z
X
−tθk
Φ(t) = E
(1 − e
) = (1 − e−tθ )ν(dθ)
k
"
ΦN
#
X
=E
(1 − e−N θk ) = Φ(N )
k
#
"X j
Z
tj
N
t (1 − e−θk )j −tθk
e
=
(1 − e−θ )j e−tθ ν(dθ)
Φj (t) =
E
j!
j!
j
k
# Z
"X
N
N
−θk j −(N −j)θk
ΦN,j =
E
(1 − e ) e
=
(1 − e−θ )j e−(N −j)θ ν(dθ).
j
j
k
The first lemma characterizes the power law behavior of Φ(t) and Φj (t). A slowly
varying function ` satisfies `(ax)/`(x) → 1 as x → ∞ for all a > 0.
Lemma C.2 (Broderick et al. (2012), Proposition 6.1). If for some d ∈ (0, 1),
C > 0, and slowly varying function `,
Z x
d
C`(1/x)x1−d ,
x → 0,
(C.3)
ν̄[0, x] :=
θν(dθ) ∼
1−d
0
then
Φ(t) ∼ Γ(1 − d)Ctd ,
Φj (t) ∼
d Γ(j − d) d
Ct ,
j!
t→∞
t→∞
(j > 1).
Transferring the power law behavior from Φ(t) to ΦN is trivial since Φ(N ) = ΦN .
The next lemma justifies transferring the power law behavior from Φj (t) to ΦN,j .
TRUNCATED RANDOM MEASURES
43
Lemma C.3 (Broderick et al. (2012), Lemmas 6.2 and 6.3). If ν satisfies Eq. (2.1),
then
K(t) ↑ ∞ a.s.,
Φ(t) ↑ ∞,
Φ(t)/t ↓ 0.
Furthermore,
|ΦN,j − Φj (N )| <
Cj
max{Φj (N ), Φj+2 (N )} → 0.
N
The final lemma confirms that the asymptotic behaviors of KN and KN,j is
almost surely the same as the expectations of KN and KN,j .
Lemma C.4. Assume ν satisfies Eq. (2.1) and that for some d ∈ (0, 1), C > 0,
Cj > 0, and slowly varying functions `, `0 , Φ(t) ∼ C`(t)td and Φj (t) ∼ Cj `(t)td .
Then for N → ∞, almost surely
X
X
Kn ∼ ΦN
and
KN,i ∼
ΦN,i .
i<j
i<j
Proof of Theorem C.1. Combining the three lemmas, the result follows as soon as
we show that ν(dθ) satisfies Eq. (C.3). C will be a constant that may change from
line to line. We begin by rewriting ν(dθ) using the change of variable w = θ(u−1 −1):
Z 1
ν(dθ) = C
g(θ/u)u−2−d (1 − u)α+d−1 du dθ
0
Z ∞
wα+d−1
−1−d
dw dθ.
= Cθ
g(w + θ)
(w + θ)α−1
0
Since g(x) is integrable and continuous, for x ∈ [0, 1], it is upper-bounded by the
non-integrable function C0 x−1 for some C0 > 0. Combining this upper bound with
Eq. (C.2) yields g(x) ≤ φ(x) := C0 x−1 1[x ≤ 1] + C1 x−1−d− 1[x > 1] for some
C1 > 0, so
g(w + θ)
wα+d−1
≤ φ(w)wd .
(w + θ)α−1
Since φ(w)wd is integrable, by dominated convergence the limit
Z ∞
wα+d−1
L = lim
g(w + θ)
dw
θ→0 0
(w + θ)α−1
exists and is finite. Moreover, since g(x) is a continuous density, there exists M > 0
and 0 < a < b < ∞ such that g(x) ≥ M for all x ∈ [a, b]. Hence, for θ < a,
Z
∞
g(w + θ)
0
wα+d−1
dw ≥ M
(w + θ)α−1
Z
b−θ
a−θ
wα+d−1
dw > 0,
(w + θ)α−1
so L > 0. Thus,
Z
ψ(θ) := θ
0
1
g(θ/u)u−2−d (1 − u)α+d−1 du → Cθ−d ,
θ→0
44
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
and hence for δ > 0 and θ sufficiently small, |ψ(θ) − Cθ−d | < δ. Thus, for x
sufficiently small,
Z x
Z x
Z x
ψ(θ) dθ ≤
Cθ−d dθ +
|ψ(θ) − Cθ−d | dθ
0
0
0
C x1−d
≤
+ δx
1−d
C x1−d
,
x → 0,
∼
1−d
which shows that Eq. (C.3) holds.
Appendix D. Proofs of CRM truncation bounds
D.1. Protobound.
Lemma D.1 (Protobound). Let Θ and Θ0 be two discrete random measures. Let
X1:N be a collection of random measures generated i.i.d. from Θ with supp(Xn ) ⊆
supp(Θ), and let Y1:N be a collection of random variables where Yn is generated from
Xn via Yn | Xn ∼ f (· | Xn ). Define Z1:N and W1:N analogously for Θ0 . Finally,
D
define Q := 1 [supp(X1:N ) ⊆ supp(Θ0 )]. If (X1:N |Θ, Θ0 , Q = 1) = (Z1:N |Θ0 , Θ)
almost surely under the joint distribution of Θ, Θ0 , then
1
kpY − pW k1 ≤ 1 − P(Q = 1),
2
where pY , pW are the marginal densities of Y1:N and W1:N .
Proof of Lemma 4.1. This is the direct application of Lemma D.1 to CRMs, where
Θ ∼ CRM(ν), and Θ0 is a truncation Θ0 = ΘK . The technical condition is satisfied
because the weights in X1:N are sampled independently for each atom in Θ.
Proof of Lemma 5.1. This is the direct application of Lemma D.1 to NCRMs, where
Θ is the normalization of a CRM with distribution CRM(ν), and Θ0 is the normalization of its truncation. The technical condition is satisfied because the conditioning on X1:N ⊆ supp(Θ0 ) is equivalent to normalization of Θ0 .
Proof of Lemma D.1. We begin by expanding the 1-norm and conditioning on both
Θ and Θ0 (denoted by conditioning on Θ̃ := (Θ, Θ0 ) for brevity):
"N
#
"N
#
Z
Y
Y
kpY − pW k1 =
E
f (yn |Zn ) − E
f (yn |Xn ) dy
n=1
Z
=
" "
E E
n=1
N
Y
#
f (yn |Zn )|Θ̃ − E
n=1
"
N
Y
##
f (yn |Xn )|Θ̃
dy.
n=1
Then conditioning on Q,
"N
#
" "N
# #
Y
Y
E
f (yn |Xn )|Θ̃ = E E
f (yn |Xn )|Θ̃, Q |Θ̃
n=1
n=1
"
a.s.
= P(Q = 1|Θ̃)E
N
Y
n=1
#
f (yn |Zn )|Θ̃ + P(Q = 0|Θ̃)E
"
N
Y
n=1
#
f (yn |Xn )|Θ̃, Q = 0 ,
TRUNCATED RANDOM MEASURES
45
where the first term arises from the fact that for any function φ,
h
i
h
i
a.s.
E φ(Z1:N )|Θ̃ = E φ(X1:N )|Θ̃, Q = 1 ,
because X1:N |Θ̃, Q = 1 is equal in distribution to Z1:N |Θ̃ a.s. by assumption. Substituting this back in above,
kpY − pW k1
(D.1)
"
"N
#
"N
#!#
Z
Y
Y
dy
E P(Q = 0|Θ̃) E
f (yn |Zn )|Θ̃ − E
f (yn |Xn )|Θ̃, Q = 0
=
n=1
"
Z
≤
"
E P(Q = 0|Θ̃) E
n=1
#
N
Y
"
f (yn |Zn )|Θ̃ − E
n=1
"
Z
≤
"
E P(Q = 0|Θ̃) E
N
Y
##
f (yn |Xn )|Θ̃, Q = 0
dy
n=1
#
N
Y
"
f (yn |Zn )|Θ̃ + E
n=1
#!#
N
Y
f (yn |Xn )|Θ̃, Q = 0
dy,
n=1
and finally by Fubini’s Theorem,
kpY − pW k1
"
"Z
≤ E P(Q = 0|Θ̃) E
N
Y
#
"Z
f (yn |Zn )dy|Θ̃ + E
n=1
N
Y
#!#
f (yn |Xn )dy|Θ̃, Q = 0
n=1
h
h
i
h
ii
= E P(Q = 0|Θ̃) E 1|Θ̃ + E 1|Θ̃, Q = 0
= 2 P(Q = 0) = 2(1 − P(Q = 1)).
Proof of Propositions 4.2 and 5.2. The same proof applies to both results. Since
G is non-atomic and Ψ is Borel, there exists a measurable mapping T : Ψ → R
such that the random variable T (ψ), ψ ∼ G, is non-atomic. For an atomic measure
PK%
% = k=1
wk δψk on Ψ, define
S(%, T ) :=
K%
X
T (ψk ).
k=1
i.i.d.
Let ψi0 ∼ G, TX := #{k | xk > 0∧zk = 0} < ∞, and TZ := #{k | zk > 0∧xk = 0}.
Conditional on Q = 0, there exists n ∈ [N ] such that TXn ≥ 1 since Xn has at least
one atom that Zn lacks. Using these definitions and facts, observe that
E[S(Xn , T ) − S(Zn , T ) | Q = 0]
TXn
TZ n
X
X
= E
T (ψi0 ) −
T (ψj0 ) | Q = 0
i=1
"
=E
j=1
∞
X
P(TXn = tX , TZn = tZ | Q = 0)
tX =1,tZ =0
"
×E
tX
X
i=1
T
(ψi0 )
−
tZ
X
j=1
##
T
(ψj0 ) | TXn
= tX , TZn = tz , Q = 0
.
46
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
PtZ
PtX
0
0
Since TXn ≥ 1, V (tX , tZ ) :=
j=1 T (ψj ) is a finite sum of one
i=1 T (ψi ) −
or more non-atomic random variables, so V (tX , tZ ) is itself non-atomic. It then
follows that ∆ := S(X, T ) − S(Z, T ) is non-atomic. Thus, by Lemma B.2, for any
δ, there exists δ > 0 such that P(|∆| < δ ) < δ. Define the family of likelihoods
fδ (· | %) = Unif[S(%, T ) − δ /2, S(%, T ) + δ /2]. Let f = fδ . Then, conditioned on
Q = 0, with probability at least 1 − δ, f (y | Xn ) > 0 =⇒ f (y | Zn ) = 0 and
f (y | Zn ) > 0 =⇒ f (y | Xn ) = 0, which implies that both inequalities in Eq. (D.1)
are equalities. Hence, we conclude that kpY − pW k1 ≥ 2(1 − δ)P(Q = 0).
D.2. Series representation truncation. Recall from Section 4.1 that a series
representation generally has the form
Θ=
∞
X
θk δψk
θk = τ (Vk , Γk )
i.i.d.
Vk ∼ g,
k=1
Pk
i.i.d.
where Γk = `=1 E` , E` ∼ Exp(1), are the jumps in a unit-rate homogeneous
Poisson point process, τ : R+ × R+ → R+ is a measurable function, g is a distribution on R+ , and limu→∞ τ (v, u) = 0 for g-almost every v. Note that by Lemma B.3
π̄(0) = 0, where π̄(x) := 1 − π(x). This fact will repeatedly prove useful for the
proofs in this section.
The proof of Theorem 4.3 is based on the following lemma.
Lemma D.2. Under the same hypotheses as Theorem 4.3,
P(supp(X1:N ) ⊆ supp(ΘK ))
Z ∞
Z ∞
N
= E exp −
1−
π(τ (v, u + GK )) g(dv) du .
0
(D.2)
0
Proof. Let
"
p(t, K) := E
∞
Y
#
π (τ (Vk , Γk + t))
N
,
k=K+1
so p(0, K) = P(supp(X1:N ) ⊆ supp(ΘK )). We use the proof strategy from Banjevic
et al. (2002) and induction in K. For K = 0,
!!N
∞
Y
X
N
p(t, 0) = E E π (τ (V1 , u + t))
π τ Vk ,
Ej + u + t
Γ1 = u
k=2
Z
=
∞
Z
1<j≤k
N
π (τ (v, u + t)) p(u + t, 0)e−u g(dv) du
0
since the Vk are i.i.d. Multiplying both sides by e−t and making the change of
variable w = u + t yields
Z ∞Z
N
−t
e p(t, 0) =
π (τ (v, w)) p(w, 0)e−w g(dv) dw.
t
Differentiating both sides with respect to t and rearranging yields
Z
∂p(t, 0)
N
= p(t, 0) 1 − π (τ (v, t)) g(dv) .
∂t
(D.3)
TRUNCATED RANDOM MEASURES
47
Since limu→∞ τ (v, u) = 0 and π(0) = 1 by Lemma B.3, we can solve Eq. (D.3) and
conclude that
Z ∞
Z
N
p(t, 0) = exp −
1 − π (τ (v, u)) g(dv) du
Zt ∞
Z
N
1 − π (τ (v, u + t)) g(dv) du .
= exp −
0
We use the inductive hypothesis that
GK ∼ Gam(K, 1),
p(t, K) = E[p(t + GK , 0)],
G0 = 0,
which trivially holds for K = 0. If the inductive hypothesis holds for some K ≥ 0,
then using the tower property,
!!N
∞
Y
X
p(t, K + 1) = E E
π τ (Vk ,
E1j + u + t
Γ1 = u
k=K+2
1<j≤k
= E[p(t + E1 , K)],
E1 ∼ Exp(1)
= E[p(t + GK + E1 , 0)]
= E[p(t + GK+1 , 0)].
Eq. (D.2) follows by setting t = 0.
Proof of Theorem 4.3. The main result follows by combining Lemmas 4.1 and D.2,
applying Jensen’s inequality, then using monotone convergence. The upper bound
1 − e−BN,K ≤ 1 follows immediately from the fact that the integral
Z ∞
Z ∞
N
1−E
π(τ (v, u + GK )) g(dv)
du
0
0
is non-negative.
Fix N . It follows from Eq. (2.2) that
lim 1 − P(supp(X1:N ) ⊆ supp(ΘK )) → 0.
K→∞
P
It
from Lemma B.1 that 1 − e−ωN,K → 0, where ωN,K :=
R ∞then Rfollows
∞
1 − 0 π(τ (v, u + GK ))N g(dv) du. By the continuous mapping theorem,
0
P
conclude that ωN,K → 0 as K → ∞ and hence BN,K = E[ωN,K ] → 0 as
K → ∞.
Theorem D.3 (Inverse-Lévy representation truncation error). For Θ
IL-Rep(ν), the conclusions of Theorem 4.3 hold with
Z ∞
BN,K = N
FK (ν[x, ∞))(1 − π(x)) ν(dx).
0
Proof. We have from Theorem 4.3 that
Z ∞
BN,K = N E
(1 − π(ν ← (u + GK )) du .
0
We first make the change of variables x = ν ← (u) to obtain
Z ∞
Z ∞
Z ν ← (GK )
π̄(ν ← (u + GK )) du =
π̄(ν ← (u)) du =
π̄(x)ν(dx)
0
GK
0
←
48
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Finally, use the fact that for all a, b ≥ 0, ν ← (a) ≥ b ⇐⇒ a ≤ ν ([b, ∞)) and
monotone convergence:
"Z ←
#
ν (GK )
π̄(x) ν(dx)
BN,K = N E
0
∞
1[x ≤ ν (GK )]π̄(x) ν(dx)
= NE
Z0 ∞
1[GK ≤ ν[x, ∞)]π̄(x) ν(dx)
= NE
Z ∞0
=N
FK (ν[x, ∞))π̄(x) ν(dx).
Z
←
0
Theorem D.4 (Thinning representation truncation error). For Θ ← T-Rep(ν),
the conclusions of Theorem 4.3 hold with
Z ∞
Z dν
dg (v)
dν
BN,K = N
(1 − π(v))
FK
(v) − u du g(v)dv.
dg
0
0
Proof. We have from Theorem 4.3 that
Z ∞ Z ∞
dν
BN,K = N E
(v) ≥ u + GK
du g(v)dv
π̄ v1
dg
0
0
Since π̄(0) = 0, using monotone convergence we have
Z ∞
Z ∞
dν
(v) ≥ u + GK du g(v)dv
BN,K = N
π̄(v)
E 1
dg
0
0
Z ∞
Z ∞
dν
(v) − u du g(v)dv
=N
π̄(v)
FK
dg
0
0
Z ∞
Z dν
(v)
dg
dν
=N
π̄(v)
(v) − u du g(v)dv
FK
dg
0
0
Z ∞
Z dν
dg (v)
=N
π̄(v)
FK (u) du g(v)dv.
0
0
Theorem D.5 (Rejection representation truncation error). For Θ ← R-Rep(ν),
the conclusions of Theorem 4.3 hold with
Z ∞
BN,K = N
FK (µ[x, ∞))(1 − π(x)) ν(dx).
0
Proof. We have from Theorem 4.3 that
Z ∞ Z 1
dν ←
←
(µ (u + GK )) ≥ v dv du
BN,K = N E
π̄ µ (u + GK )1
dµ
0
0
Since π̄(0) = 0, we can eliminate the innermost integral:
Z 1
dν ←
←
π̄ µ (u + GK )1
(µ (u + GK )) ≥ v dv
dµ
0
dν ←
=
(µ (u + GK ))π̄(µ← (u + GK )).
dµ
TRUNCATED RANDOM MEASURES
49
Making the change of variable x = µ← (u + GK ) and reasoning analogously to the
proof of Theorem D.3, we obtain
"Z ←
#
Z ∞
µ (GK )
dν
BN,K = N E
(x)π̄(x)µ(dx) = N
FK (µ[x, ∞))π̄(x)ν(dx).
dµ
0
0
Theorem D.6 (Bondesson representation truncation error). For Θ ← R-Rep(ν),
the hypotheses of Theorem 4.3 are satisfied and its conclusions hold with
Z ∞
1 − E π(ve−GK ) ν(dv).
BN,K = N
0
Proof. While Theorem D.6 can be proved using Theorem 4.3, we take an alternative
approach using more direct Poisson process arguments.
Lemma D.7. For K ≥ 0, GK ∼ Gam(K, c), and G0 = 0,
Z ∞
−GK N
P(supp(X1:N ) ⊆ supp(ΘK )) = E exp −
1 − π(ve
) ν(dv) .
0
Proof of Lemma D.7. For t ≥ 0, the measure tΘ has distribution tΘ ∼ CRM(νt )
i.i.d.
where νt (dθ) := ν(dθ/t). Further, define X̃n | Θ ∼ LP(h, tΘ), and
" ∞
#
N
Y
−Γk /c
p(t, K) := P(supp(X̃1:N ) ⊆ supp(tΘK )) = E
π tVk e
.
k=K+1
We will prove that
Z
p(t, K) = E exp −
∞
−GK N
1 − π(tve
)
ν(dv)
,
0
and then set t = 1 to obtain the desired result. The proof proceeds by induction.
For K = 0, the event supp(X̃1:N ) ⊆ supp(tΘK ) is equal to supp(X̃1:N ) ⊆ ∅ and
thus supp(X̃1:N ) = ∅. This is in turn equivalent to the probability that after
thinning a CRM(νt ) by π(θ) N times,
the remaining process has no atoms, i.e. the
probability that CRM 1 − π(θ)N νt (dθ) has no atoms.
Since a Poisson process
R
with measure µ(dθ) has no atoms with probability e− µ(dθ) ,
Z ∞
p(t, 0) = exp −
1 − π(θ)N νt (dθ)
0 Z ∞
= E exp −
1 − π(tve−G0 )N ν(dv) .
0
The second equality follows by the change of variables v = θ/t and because G0 = 0
with probability 1. The inductive hypothesis is that for K ≥ 0,
p(t, K) = E p te−GK , 0 ,
GK ∼ Gam(K, c).
50
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Using the tower property to condition on Γ1 /c and the fact that the Vk are i.i.d.,
#
" ∞
N
Y
−Γk /c
p(t, K + 1) = E
π tVk e
k=K+2
" "
=E E
∞
Y
π te
−Γ1 /c
Vk e
−Γk /c
N
##
| Γ1 /c
k=K+1
h
i
h
i
= E p te−Γ1 /c , K = E p te−(Γ1 /c+GK ) , 0 = E p te−GK+1 , 0 ,
since Γ1 /c ∼ Exp(c). The desired result follows by setting t = 1.
First combine Lemmas 4.1 and D.7, then apply Jensen’s inequality. The bounds
on BN,K and fact that limK→∞ BN,K = 0 follows by the same arguments as in the
proof of Theorem 4.3.
D.3. Superposition representation truncation.
Proof of Theorem 4.4. We begin with Lemma 4.1, and note that
P (supp(X1:N ) ⊆ supp(ΘK )) = P supp(X1:N ) ∩ supp(Θ+
K) = ∅ .
After generating X1:N from Θ, we can view the point process representing the atoms
+
N
in Θ+
(i.e. the Bernoulli trial
K not contained in any Xn as ΘK thinned by π(θ)
with success probability 1 − π(θ) to generate an atom failed N times), and thus
N
the remaining process is Θ+
K thinned by 1 − π(θ) . Therefore, the above event is
+
equivalent to the event that ΘK thinned by 1 − π(θ)N has no atoms. Using the
fact
R
that a Poisson process with measure µ(dθ) has no atoms with probability e− µ(dθ) ,
we have the formula for BN,K ,
+
N
P (supp(X1:N ) ⊆ supp(ΘK )) = e− (1−π(θ) )νK (dθ) .
+
R
Since BN,K :=
1 − π(θ)N νK
(dθ) is nonnegative, the error bound lies in the
interval [0, 1]. To show that limK→∞ BN,K = 0, first note that
R
Z
Z
∞ Z
X
1 − π(θ)N ν(dθ) ≤ N (1 − π(θ)) ν(dθ) = N
h(x | θ)ν(dθ) < ∞,
(D.4)
x=1
by Eq. (2.2). Further, splitting ν into its individual summed components, we have
that
Z
Z
K Z
X
+
(1 − π(θ))ν(dθ) =
(1 − π(θ))νk (dθ) + (1 − π(θ))νK
(dθ).
(D.5)
k=1
Combining the results from Eqs. (D.4) and (D.5) yields
Z
+
lim
(1 − π(θ))νK
(dθ) = 0.
K→∞
TRUNCATED RANDOM MEASURES
51
D.4. Stochastic mapping truncation.
Proof of Proposition 4.5. Let π̃(u) = h̃(0 | u). For notational brevity, define Q to
be the event where supp(X1:N ) ⊆ supp(ΘK ), and Q̃ to be the corresponding transformed event where supp(X̃1:N ) ⊆ supp(Θ̃K ). Then we have
hQ
i
∞
Ñ
P(Q̃) = E
.
k=K+1 π̃(uk )
If h(x | θ) = Bern(x; 1 − πκ,Ñ (θ)) and N = 1, then
hQ
i
R
∞
Ñ
P(Q̃) = E
π̃(u)
κ(θ
,
du)
= P(Q).
k
k=K+1
D.5. Truncation with hyperpriors.
Proof of Proposition 4.6. By repeating the proof of Lemma 4.1 in Appendix D.1,
except with an additional use of the tower property to condition on the hyperparameters Φ, an additional use of Fubini’s theorem to swap integration and expectation,
and Jensen’s inequality, we have
1
kpY − pW k1 ≤ E [1 − P (supp(X1:N ) ⊆ supp(ΘK ) | Φ)]
2
h
i
≤ E 1 − e−BN,K (Φ)
≤ 1 − e−E[BN,K (Φ)] .
Appendix E. Proofs of normalized truncation bounds
Proof of Lemma 5.3. First, we demonstrate that the arg max is well-defined. Note
that
arg max Ti + log pi = arg max exp (Ti + log pi )
i∈N
i∈N
if it exists, due to the monotonicity of exp. Similarly, existence of either proves the
existence of the other. Since Ti are i.i.d. Gumbel(0, 1),
P (exp (Ti + log pi ) > ) = 1 − exp −e−(log −log pi )
= 1 − exp (−pi /) ≤ 1 − (1 − pi /).
Therefore,
∞
X
P (exp (Ti + log pi ) > ) ≤
i=1
∞
X
1 − (1 − pi /) = −1
i=1
∞
X
pi < ∞.
i=1
This is sufficient to demonstrate that
a.s.
exp (Ti + log pi ) → 0
as i → ∞.
Finally, since any positive sequence converging to 0 can have only a finite number
of elements greater than any > 0, set = exp(T1 + log p1 ), and thus
arg max exp (Ti + log pi ) = arg max exp (Ti + log pi )
i∈N
i:Ti +log pi ≥
52
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
where the right hand side exists because it computes the maximum of a finite,
nonempty set of numbers. Note that the arg max is guaranteed to be a single
element, since Ti + log pi has a purely diffuse distribution on R.
Now that the a.s. existence and uniqueness of the arg max has been demonstrated, we can compute its distribution. First, note that
∞
Y
P (Ti + log pi ≤ x ∀i ∈ N, i 6= j) =
exp −e−(x−log pi ) = exp −e−x (s − pj ) ,
i=1,i6=j
P
where s := i pi . So then
P j = arg max Ti + log pi = P (Ti + log pi ≤ Tj + log pj ∀i ∈ N)
i∈N
Z
−(x−log pj )
−x
) dx
= e−e (s−pj ) e−(x−log pj +e
Z
−x
= pj e−se e−x dx
Z
−(x−log s)
pj
e−e
e−(x−log s) dx
=P
p
i
i
pj
P
=
,
i pi
where the last integral is 1 since its integrand is the Gumbel(s, 1) density.
E.1. Normalized series representation truncation.
Proof of Theorem 5.4. First, we apply Lemma 5.1,
1
kpY − pW k1 ≤ 1 − P (X1:N ⊆ supp(ΞK )) .
2
Next, by Jensen’s inequality,
"
N #
N
ΘK (Ψ)
ΘK (Ψ)
P (X1:N ⊆ supp(ΞK )) = E
≥E
Θ (Ψ)
Θ (Ψ)
= P(X1 ∈ supp(ΞK ))N .
The remaining part of this proof quantifies the probability that sampling X1 from
Ξ generates an atom in the support of ΞK (equal to the support of ΘK , since Ξ is
just the normalization of Θ). To do this, we use the trick based on Lemma 5.3: we
log-transform the rates in Θ, perturb them all by i.i.d. Gumbel random variables,
and quantify the probability that the max occurs within the atoms of ΘK .
First, we split the sequential representation of Θ into the truncation ΘK and its
tail Θ+
K , using the form from Eq. (4.1),
Θ=
∞
X
k=1
τ (Vk , Γk )δψk =
K
X
τ (Vk , Γk )δψk +
k=1
∞
X
τ (Vk , Γk )δψk := ΘK + Θ+
K.
k=K+1
Next, we define the maximum of the log-transformed, Gumbel perturbed rates in
ΘK as
MK := max log τ (Vk , Γk ) + Wk ,
1≤k≤K
TRUNCATED RANDOM MEASURES
53
i.i.d.
where Wk ∼ Gumbel(0, 1). Since Γk are from a unit-rate homogeneous Poisson
process, if we condition on the value of ΓK , this is equivalent to conditioning on
the event that the Poisson process has exactly K − 1 atoms on [0, ΓK ], and the K th
atom is at ΓK . And since MK does not depend on the ordering of (Γk )K
k=1 ,
D
MK | ΓK = max log τ (VK , ΓK ) + WK , max log τ (Vk , Uk ) + Wk ,
1≤k≤K−1
i.i.d.
where Uk ∼ Unif(0, ΓK ). Therefore, MK | ΓK is the maximum of a collection of
independent random variables, so we can compute its CDF by simply taking the
product of the CDFs of each of those random variables. Using standard techniques
for transformation of independent random variables, we have that
Z ∞Z 1
−x
g(v)e−τ (v,ΓK u)e dudv, k < K
P (log τ (Vk , Uk ) + Wk ≤ x | ΓK ) =
Z0 ∞ 0
−x
P (log τ (VK , ΓK ) + WK ≤ x | ΓK ) =
g(v)e−τ (v,ΓK )e dv,
0
so
∞
Z
Z
1
P (MK ≤ x | ΓK ) =
−τ (v,ΓK u)e−x
g(v)e
0
K−1 Z
dudv
∞
g(v)e
0
−τ (v,ΓK )e−x
dv .
0
Defining the function
h
i
J(u, t) := E e−t·τ (V,u) ,
V ∼ g,
we have
Z
K−1
J ΓK u, e−x du
J ΓK , e−x .
1
P (MK ≤ x | ΓK ) =
0
Next, we define an analogous maximum for the tail process rates in Θ+
K,
+
:= sup log τ (Vk , Γk ) + Wk .
MK
k>K
Conditioning on ΓK , we have
D
+
MK
| ΓK = sup log τ (Vk , Γ0k + ΓK ) + Wk ,
k≥1
where Γ0k is a unit-rate homogeneous Poisson process on R+ . Now note that since
Γ0k is a Poisson point process on R+ , so is log τ (Vk , Γ0k + ΓK ) + Wk (using Poisson
process stochastic mapping), with rate measure
Z ∞ Z ∞
−(t−log τ (v,u+ΓK ))
e−(t−log τ (v,u+ΓK ))−e
g(v)dudv dt.
0
0
+
MK
Therefore, P
≤ x | ΓK is equal to the probability that the above Poisson point
process has no atoms with position greater than x. Since aR Poisson process on R+
∞
with measure µ has no atoms above x with probability e− x µ(dt) ,
P
+
MK
≤ x | ΓK = e
−
R∞ R∞R∞
x
0
0
e−(t−log τ (v,u+ΓK ))−e
−(t−log τ (v,u+ΓK ))
g(v)dudv dt
.
54
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Noticing that the integrand in t is a Gumbel density, we can use Fubini’s theorem
to swap integrals and evaluate:
R∞R∞
+
P MK
≤ x | ΓK = e 0 0
=e
R∞
0
e−τ (v,u+ΓK )e
−x
−1 g(v)dudv
(J (u+ΓK ,e−x )−1)du .
+
Taking the derivative yields the density of MK
| ΓK with respect to the Lebesgue
measure. Therefore, using the Gumbel-max trick from Lemma 5.3, we substitute
+
the results for MK | ΓK and MK
| ΓK into the original bound yielding
1
N
kpY − pW k1 ≤ 1 − P (X1 ⊆ supp(ΞK ))
2
N
+
= 1 − 1 − E P MK < MK
| ΓK
,
where (using the substitution t = e−x )
Z ∞
d
+
+
P MK < MK
| ΓK =
P (MK ≤ x | ΓK )
P MK
≤ x | ΓK dx
dx
−∞
Z 1
K−1
Z ∞
d R∞
=
J (ΓK , t)
J (ΓK u, t) du
− e 0 (J(u+ΓK ,t)−1)du dt.
dt
0
0
The fact that the bound is between 0 and 1 is a simple consequence of the fact that
P (X1 ∈ supp(ΞK )) ∈ [0, 1], and the asymptotic result follows from the fact that
P (X1 ∈ supp (ΞK )) → 1 as K → ∞.
E.2. Normalized superposition representation truncation.
Proof of Theorem 5.5. The same initial technique as in the proof of Theorem 5.5
yields
1
N
kpY − pW k1 ≤ 1 − P (X1 ∈ supp (ΞK )) .
2
The remaining part of this proof quantifies the probability that sampling X1 from Ξ
generates an atom in the support of ΞK . Since most of the following developments
+
are similar for ΘK , νK and Θ+
K , νK , we will focus the discussion on ΘK , νK and
reintroduce the tail quantities when necessary. First, we transform the rates of ΘK
i.i.d.
under the stochastic mapping w = log θ + W , where W ∼ Gumbel(0, 1), resulting
in a new Poisson point process with rate measure
Z
−(t−w)−e−(t−w) w
w
e
e νK (e )dw dt.
The probability that all points in this Poisson point process are less than a value
x is equal to the probability that there are no atoms above x. Defining MK to be
the supremum of the points in this process, combined with the basic properties of
Poisson point processes, we have
Z ∞Z
−(t−w)−e−(t−w) w
w
P(MK ≤ x) = exp −
e
e νK (e )dwdt
x
TRUNCATED RANDOM MEASURES
55
Using Fubini’s theorem to swap the integrals, we can evaluate the inner integral
analytically by noting the integrand is a Gumbel(w, 1) density,
Z
−e−(x−w) w
w
P(MK ≤ x) = exp − (1 − e
)e νK (e )dw
Z
−θe−x
e
− 1 νK (dθ) .
= exp
We can take the derivative with respect to x to obtain its density with respect to
the Lebesgue measure. The above derivation holds true for Θ+
K , replacing νK with
+
+
νK
and MK with MK
. Therefore, using the Gumbel-max trick from Lemma 5.3,
+
we substitute the results for MK and MK
into the original bound, yielding
1
N
kpY − pW k1 ≤ 1 − P (X1 ∈ supp (ΘK ))
2
+ N
= 1 − 1 − P MK < MK
,
where (using the substitution t = e−x , and the fact that θe−θt is dominated by θ
to swap integration and differentiation)
Z ∞
d
+
+
≤ x dx
P MK < MK
=
P(MK ≤ x) P MK
dx
−∞
Z
Z ∞ R −θe−x
e
−1 ν(dθ) d
+
−θe−x
=
e
e
− 1 νK (dθ) dx
dx
−∞
Z
Z ∞ R
+
e−θt −1)ν(dθ) d
−θt
(
e
− 1 νK (dθ) dt
=−
e
dt
0
Z
Z ∞ R
e−θt −1)ν(dθ)
−θt +
(
=
e
θe νK (dθ) dt.
0
The fact that the bound lies between 0 and 1 is a simple consequence of the fact
that P (X1 ∈ supp(ΞK )) ∈ [0, 1]. The fact that the error bound asymptotically
approaches 0 is a consequence of the monotone convergence theorem applied to the
+
decreasing sequence of functions θνK
(dθ).
E.3. Truncation with hyperpriors.
Proof of Proposition 5.6. By repeating the proof of Lemma 5.1 in Appendix D.1,
except with an additional use of the tower property to condition on the hyperparameters Φ, an additional use of Fubini’s theorem to swap integration and expectation,
and Jensen’s inequality, we have
1
kpY − pW k1 ≤ E [1 − P (X1:N ⊆ supp(ΘK ) | Φ)]
2
≤ 1 − E (1 − BK (Φ))N
N
≤ 1 − (1 − E [BK (Φ)]) .
References
Abramowitz, M. and Stegun, I. (eds.) (1964). Handbook of Mathematical Functions.
Dover Publications.
56
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
Airoldi, E. M., Blei, D., Erosheva, E. A., and Fienberg, S. E. (2014). Handbook of
Mixed Membership Models and Their Applications. CRC Press.
Arbel, J. and Prünster, I. (2017). “A moment-matching Ferguson & Klass algorithm.” Statistics and Computing, 27(1): 3–17.
Argiento, R., Bianchini, I., and Guglielmi, A. (2016). “A blocked Gibbs sampler for
NGG-mixture models via a priori truncation.” Statistics and Computing, 26(3):
641–661.
Banjevic, D., Ishwaran, H., and Zarepour, M. (2002). “A recursive method for
functionals of Poisson processes.” Bernoulli , 8(3): 295–311.
Blei, D. M. and Jordan, M. I. (2006). “Variational inference for Dirichlet process
mixtures.” Bayesian Analysis, 1(1): 121–144.
Bondesson, L. (1982). “On simulation from infinitely divisible distributions.” Advances in Applied Probability, 14: 855–869.
Brix, A. (1999). “Generalized gamma measures and shot-noise Cox processes.”
Advances in Applied Probability, 31: 929–953.
Broderick, T., Jordan, M. I., and Pitman, J. (2012). “Beta processes, stick-breaking
and power laws.” Bayesian Analysis, 7(2): 439–476.
Broderick, T., Mackey, L., Paisley, J., and Jordan, M. I. (2015). “Combinatorial clustering and the beta negative binomial process.” IEEE Transactions on
Pattern Analysis and Machine Intelligence, 37(2): 290–306.
Broderick, T., Wilson, A. C., and Jordan, M. I. (2017). “Posteriors, conjugacy, and
exponential families for completely random measures.” Bernoulli .
Doshi-Velez, F., Miller, K. T., Van Gael, J., and Teh, Y. W. (2009). “Variational
inference for the Indian buffet process.” In International Conference on Artificial
Intelligence and Statistics.
Ferguson, T. S. (1973). “A Bayesian analysis of some nonparametric problems.”
The Annals of Statistics, 1(2): 209–230.
Ferguson, T. S. and Klass, M. J. (1972). “A representation of independent increment
processes without Gaussian components.” The Annals of Mathematical Statistics,
43(5): 1634–1643.
Gautschi, W. (1959). “Some elementary inequalities relating to the gamma and
incomplete gamma function.” Journal of Mathematics and Physics, 38(1): 77–
81.
Gelfand, A. and Kottas, A. (2002). “A computational approach for nonparametric
Bayesian inference under Dirichlet process mixture models.” Journal of Computational and Graphical Statistics, 11(2): 289–305.
Gumbel, E. J. (1954). Statistical theory of extreme values and some practical applications: A series of lectures. National Bureau of Standards Applied Mathematics
Series 33. Washington, D.C.: U.S. Government Printing Office.
Hjort, N. L. (1990). “Nonparametric Bayes estimators based on beta processes in
models for life history data.” The Annals of Statistics, 18(3): 1259–1294.
Ishwaran, H. and James, L. F. (2001). “Gibbs sampling methods for stick-breaking
priors.” Journal of the American Statistical Association, 96(453): 161–173.
— (2002). “Approximate Dirichlet Process Computing in Finite Normal Mixtures:
Smoothing and Prior Information.” Journal of Computational and Graphical
Statistics, 11(3): 508–532.
Ishwaran, H. and Zarepour, M. (2002). “Exact and approximate sum representations for the Dirichlet process.” Canadian Journal of Statistics, 30(2): 269–283.
TRUNCATED RANDOM MEASURES
57
James, L. F. (2002). “Poisson Process Partition Calculus with applications
to Exchangeable models and Bayesian Nonparametrics.”
arXiv preprint
arXiv:0205093 .
— (2013). “Stick-breaking PG(α,ζ)-Generalized Gamma Processes.” arXiv preprint
arXiv:1308.6570 .
— (2014). “Poisson Latent Feature Calculus for Generalized Indian Buffet Processes.” arXiv preprint arXiv:1411.2936v3 .
James, L. F., Lijoi, A., and Prünster, I. (2009). “Posterior Analysis for Normalized Random Measures with Independent Increments.” Scandinavian Journal of
Statistics, 36(1): 76–97.
Kim, Y. (1999). “Nonparametric Bayesian estimators for counting processes.” The
Annals of Statistics, 27(2): 562–588.
Kingman, J. F. C. (1967). “Completely random measures.” Pacific Journal of
Mathematics, 21(1): 59–78.
— (1975). “Random discrete distributions.” Journal of the Royal Statistical Society
B , 37(1): 1–22.
Kingman, J. F. C. (1993). Poisson Processes. Oxford Studies in Probability. Oxford
University Press.
Lijoi, A., Mena, R., and Prünster, I. (2005). “Bayesian nonparametric analysis for a
generalized Dirichlet process prior.” Statistical Inference for Stochastic Processes,
8: 283–309.
Lijoi, A. and Prünster, I. (2010). “Models beyond the Dirichlet process.” In Hjort,
N. L., Holmes, C., Müller, P., and Walker, S. (eds.), Bayesian Nonparametrics,
80–136. Cambridge University Press.
Maddison, C., Tarlow, D., and Minka, T. P. (2014). “A* Sampling.” In Advances
in Neural Information Processing Systems.
Muliere, P. and Tardella, L. (1998). “Approximating distributions of random functionals of Ferguson–Dirichlet priors.” Canadian Journal of Statistics, 26(2): 283–
297.
Orbanz, P. (2010). “Conjugate projective limits.” arXiv preprint arXiv:1012.0363 .
Paisley, J. W., Blei, D. M., and Jordan, M. I. (2012). “Stick-breaking beta processes
and the Poisson process.” International Conference on Artificial Intelligence and
Statistics.
Paisley, J. W., Zaas, A. K., Woods, C. W., Ginsburg, G. S., and Carin, L. (2010).
“A stick-breaking construction of the beta process.” International Conference on
Machine Learning.
Perman, M. (1993). “Order statistics for jumps of normalised subordinators.” Stochastic Processes and their Applications, 46(2): 267–281.
Perman, M., Pitman, J., and Yor, M. (1992). “Size-biased sampling of Poisson
point processes and excursions.” Probability Theory and Related Fields, 92(1):
21–39.
Pitman, J. (2003). “Poisson-Kingman partitions.” Lecture Notes-Monograph Series.
Regazzini, E., Lijoi, A., and Prünster, I. (2003). “Distributional results for means
of normalized random measures with independent increments.” The Annals of
Statistics, 31(2): 560–585.
Rosiński, J. (1990). “On series representations of infinitely divisible random vectors.” Annals of Probability, 18: 405–430.
58
T. CAMPBELL, J. H. HUGGINS, J. P. HOW, AND T. BRODERICK
— (2001). “Series representations of Lévy processes from the perspective of point
processes.” In Barndorff-Nielson, O., Resnick, S., and Mikosch, T. (eds.), Lévy
processes: theory and applications, chapter VI, 401–415. Bikhäuser Boston.
Roy, D. (2014). “The continuum-of-urns scheme, generalized beta and Indian buffer
processes, and hierarchies thereof.” arXiv preprint arXiv:1501.00208 .
Roychowdhury, A. and Kulis, B. (2015). “Gamma Processes, Stick-Breaking, and
Variational Inference.” In International Conference on Artificial Intelligence and
Statistics.
Sethuraman, J. (1994). “A constructive definition of Dirichlet priors.” Statistica
Sinica, 4: 639–650.
Teh, Y. W. and Görür, D. (2009). “Indian buffet processes with power-law behavior.” In Advances in Neural Information Processing Systems.
Teh, Y. W., Görür, D., and Ghahramani, Z. (2007). “Stick-breaking construction for
the Indian buffet process.” In International Conference on Artificial Intelligence
and Statistics.
Thibaux, R. and Jordan, M. I. (2007). “Hierarchical beta processes and the Indian buffet process.” In International Conference on Artificial Intelligence and
Statistics.
Titsias, M. (2008). “The infinite gamma-Poisson feature model.” In Advances in
Neural Information Processing Systems.
Zhou, M., Hannah, L., Dunson, D., and Carin, L. (2012). “Beta-negative binomial
process and Poisson factor analysis.” In Artificial Intelligence and Statistics.
Computer Science and Artificial Intelligence Laboratory (CSAIL), Massachusetts
Institute of Technology
URL: http://www.trevorcampbell.me/
E-mail address: [email protected]
Computer Science and Artificial Intelligence Laboratory (CSAIL), Massachusetts
Institute of Technology
URL: http://www.jhhuggins.org/
E-mail address: [email protected]
Laboratory for Information and Decision Systems (LIDS), Massachusetts Institute
of Technology
URL: http://www.mit.edu/~jhow/
E-mail address: [email protected]
Computer Science and Artificial Intelligence Laboratory (CSAIL), Massachusetts
Institute of Technology
URL: http://www.tamarabroderick.com
E-mail address: [email protected]
| 10math.ST
|
PURE O-SEQUENCES: KNOWN RESULTS,
APPLICATIONS AND OPEN PROBLEMS
arXiv:1204.5247v2 [math.AC] 18 Feb 2013
JUAN MIGLIORE∗ , UWE NAGEL+ , AND FABRIZIO ZANELLO
Abstract. This note presents a discussion of the algebraic and combinatorial aspects
of the theory of pure O-sequences. Various instances where pure O-sequences appear are
described. Several open problems that deserve further investigation are also presented.
Dedicated to David Eisenbud on the occasion of his 65th birthday
1. Introduction
Pure O-sequences are fascinating objects that arise in several mathematical areas. They
have been the subject of extensive research, yet our knowledge about pure O-sequences
is limited. The goal of this note is to survey some of the known results and to motivate
further investigations by pointing out connections to various interesting problems. Much
of the material for this paper has been drawn from the recent monograph [2] by the
authors with Mats Boij and Rosa Miró-Roig, cited in this article as BMMNZ. We often
quote results giving the name of the author(s) and the year the result was published, so as
to also hint at the history of ideas in the development of the theory of pure O-sequences.
The multi-faceted interest in pure O-sequences is already indicated in their definition.
On the one hand, a pure O-sequence can be defined as the vector whose entries record
the number of monomials of a fixed degree in an order ideal generated by monomials of
the same degree. On the other, a pure O-sequence is the Hilbert function of a finitedimensional graded algebra that is level, i.e., its socle is concentrated in one degree,
and has monomial relations. There is an extensive literature on monomial ideals and an
extensive literature on level algebras. Pure O-sequences form a bridge between the two
theories, and we will outline the work on pure O-sequences from this point of view. But
more than that, these sequences have a broad array of applications, and occur in many
settings, largely combinatorial ones.
In Section 2, we review some of the basic results in the theory of pure O-sequences
and focus on qualitative aspects of their shape. For instance, in some cases pure Osequences are known to be unimodal; that is, they are first weakly increasing, and once
the peak is reached they are weakly decreasing. However, pure O-sequences may fail to be
unimodal, even with arbitrarily many “valleys.” We include a discussion of recent results
on conditions that force unimodality.
Connections to various combinatorial problems are the subject of Section 3. Face
vectors of pure simplicial complexes are examples of pure O-sequences. In particular, the
existence of certain block designs, such as Steiner systems, is related to that of some pure
O-sequences. As a special case, the existence of finite projective planes is equivalent to
the existence of particular pure O-sequences.
∗
The work for this paper was done while the first author was sponsored by the National Security
Agency under Grant Number H98230-12-1-0204, and by the Simons Foundation under grant #208579.
+
The work for this paper was done while the second author was sponsored by the National Security
Agency under Grant Number H98230-12-1-0247, and by the Simons Foundation under grant #208869.
1
2
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
Another challenging problem is Stanley’s conjecture that the h-vector of any matroid
complex is a pure O-sequence. We discuss some recent progress. However, the conjecture
remains open in general.
In Section 4, we describe results on the enumeration of pure O-sequences, with a focus
on asymptotic properties. In particular, it follows that, when the number of variables is
large, “almost all” pure O-sequences are unimodal.
We conclude this note with a collection of open problems, most of which are mentioned
in the earlier sections.
2. Monomial level algebras
A finite, nonempty set X of (monic) monomials in the indeterminates y1 , . . . , yr is
called a monomial order ideal if, whenever M ∈ X and N is a monomial dividing M , then
N ∈ X. The h-vector of X is defined to be the vector h = (h0 = 1, h1 , . . . , he ) counting
the number of monomials of X in each degree. A monomial order ideal, X, is called pure
if all maximal monomials of X (in the partial ordering given by divisibility) have the same
degree. A pure O-sequence is the h-vector of a pure monomial order ideal. For reasons
that will be clear shortly, we call e the socle degree of h. The type of a pure O-sequence
is the number of maximal monomials.
Notice that if we think of y1 , . . . , yr as the indeterminates of a polynomial ring R =
K[y1 , . . . , yr ] over a field, the question of whether a given sequence is or is not a pure
O-sequence does not depend on the choice of K. Thus, for many of our results it does
not matter what we choose for K. However, in some situations choosing a “nice” field K
allows us to use special algebraic tools to say something about pure O-sequences, so in
this case we make whatever additional assumptions we need for K.
We now let R = K[x1 , . . . , xr ], where K is an infinite field. We will consider standard
graded artinian K-algebras A = R/I, where I will usually be a monomial ideal. Without
loss of generality we will assume that I does not contain nonzero linear forms, so we will
define r to be the codimension of A.
Let R = K[y1 , . . . , yr ], and consider the action of R on monomials of R by contraction.
By this we mean the action generated by
a1 a2
y1 y2 · · · yia1 −1 · · · yrar , if ai > 0,
a1 a2
ar
xi ◦ y1 y2 · · · yr =
0,
if ai = 0.
For a monomial ideal I ⊂ R, we define the inverse system to be the R-module I ⊥ =
annR (I) ⊂ R. One can check that I ⊥ consists of the monomials not in I (identifying xi
with yi ), and as such it can be viewed as a monomial order ideal. Recalling that for a
standard graded algebra R/I the Hilbert function is defined to be hR/I (t) = dim[R/I]t ,
we observe that the h-vector (as defined above) of the order ideal I ⊥ coincides with the
Hilbert function of R/I.
Furthermore, I ⊥ is a pure monomial order ideal if and only if R/I is a level algebra;
that is, the socle of R/I (i.e., the annihilator of the homogeneous maximal ideal of R/I)
is concentrated in one degree, called the socle degree of R/I; it is necessarily the degree
of the maximal monomials of I ⊥ . The dimension of the socle as a K-vector space is equal
to the type of the pure O-sequence. See [25, 39] for more details on inverse systems.
Thus the study of pure O-sequences boils down to a study of the possible Hilbert
functions of artinian monomial level algebras. In some cases we can rule out candidates
for pure O-sequences by showing that there is not even a level algebra with that Hilbert
function, but more often we need to use the structure of monomial algebras themselves.
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
3
The most basic tool is Macaulay’s theorem to determine if the sequence is even an
O-sequence; that is, to determine if it is the Hilbert function of some artinian algebra.
We refer to [8, 47] for details of Macaulay’s theorem, but we recall the statement. Let n
and d be positive integers. There exist uniquely determined integers kd > kd−1 > · · · >
kδ ≥ δ ≥ 1 such that
kd
kd−1
kδ
n = n(d) =
+
+ ··· +
.
d
d−1
δ
This is called the d-binomial expansion of n. We set
kd + 1
kd−1 + 1
kδ + 1
1
(n(d) )1 =
+
+ ··· +
d+1
d
δ+1
and (0(d) )11 = 0, for each d. Then Macaulay’s theorem is the following.
Theorem 2.1 (Macaulay 1927). Let A be a standard graded algebra with Hilbert function
hA (t) := ht . Then for all t ≥ 1, ht+1 ≤ ((ht )(t) )11 .
An O-sequence is a (possibly infinite) sequence of integers (1, h1 , h2 , . . . ) that satisfies
the growth condition of Theorem 2.1 for every value of t. Thus the O-sequences are the
sequences that occur as the Hilbert function of some standard graded algebra.
Example 2.2. The sequence (1, 3, 6, 8, 8, 10) is not a pure O-sequence because it is
not even an O-sequence (the growth from degree 4 to degree 5 is too big). Similarly,
(1, 3, 5, 5, 4, 4) is an O-sequence but it is not a pure O-sequence because it is not the
Hilbert function of a level algebra (see [26]). Finally, h = (1, 3, 6, 10, 15, 21, 28, 27, 27, 28)
is the Hilbert function of a level algebra, but it is not a pure O-sequence [4] because
there is no monomial level algebra with this Hilbert function. In fact, h has been the
first nonunimodal level Hilbert function discovered in codimension 3 (see the third author [83]), and Boyle [4] has shown that this is in fact the smallest possible such Hilbert
function.
So the challenge is to determine what additional conditions on an O-sequence are imposed by requiring that it be the Hilbert function of an artinian level monomial algebra.
The first result, due originally to Stanley [67] with subsequent proofs given by J. Watanabe
[78], Ikeda [65], Reid, Roberts and Roitman [63], Herzog and Popescu [33], and Lindsey
[45], concerns monomial complete intersections. (Note though that an equivalent property was proven earlier by de Bruijn, van Ebbenhorst Tengbergen and Kruyswijk [21].)
This result requires us to introduce here the notion of the Weak and Strong Lefschetz
Properties. The consequence of this result for pure O-sequences of type 1 is perhaps not
so critical, as alternative proofs could be given. But its influence in the study of the SLP
and the WLP in general, and on related topics in commutative algebra, can hardly be
overstated. In the result below, and throughout the paper, we will call a sequence unimodal if it is nondecreasing up to some degree and then nonincreasing past that degree.
We will call it strictly unimodal if it is strictly increasing up to some degree, then possibly
constant for some range, then strictly decreasing until it reaches zero, and then zero past
that point. Unimodality is a central concept in combinatorics and combinatorial commutative algebra, but also in other branches of mathematics. See for instance the classical
surveys of Stanley ([68], 1989) and Brenti ([6], 1994).
Theorem 2.3 (see above for sources). Let R = K[x1 , . . . , xr ], where K has characteristic
zero, and let I be an artinian monomial complete intersection, i.e.,
I = hxa11 , . . . , xar r i.
4
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
Let L be a general linear form. Then for any positive integers d and i, the homomorphism
induced by multiplication by Ld ,
×Ld : [R/I]i → [R/I]i+d ,
has maximal rank. (In particular, this is true when d = 1.) As a consequence, a pure
O-sequence of type 1 is strictly unimodal.
When I is an arbitrary artinian homogeneous ideal, the above maximal rank property
for all d and i is called the Strong Lefschetz Property (SLP), and the case d = 1 is called
the Weak Lefschetz Property (WLP). A consequence of the WLP is that in the range
where (×L) is injective, we have a short exact sequence
0 → [R/I]i → [R/I]i+1 → [R/(I, L)]i+1 → 0.
Thus, the first difference ∆hR/I (t) = hR/I (t) − hR/I (t − 1) is the Hilbert function of a
standard graded algebra in this range, that is, it is again an O-sequence. We then say
that hR/I is a differentiable O-sequence in this range. It also follows from this sequence
that if the WLP holds, then once the peak of the Hilbert function is reached, the Hilbert
function will be nonincreasing, and therefore the whole Hilbert function is unimodal.
Remark 2.4. Simple examples show that Theorem 2.3 may fail in positive characteristic.
It turns out that the question in which positive characteristics a monomial complete
intersection has the weak or strong Lefschetz property leads to unexpected connections
to the problem of determining the number of certain plane partitions, lozenge tilings, or
families of lattice paths (see [11, 16, 18, 19, 43]).
One of the early important results on pure O-sequences is due to Hibi [34].
Theorem 2.5 (Hibi 1989). Let h be a pure O-sequence of socle degree e. Then
hi ≤ hj
whenever 0 ≤ i ≤ j ≤ e − i. This has the following two important consequences:
(a) h is flawless, i.e., hi ≤ he−i for all 0 ≤ i ≤ b 2e c.
(b) The “first half ” of h is nondecreasing:
1 = h0 ≤ h1 ≤ h2 ≤ · · · ≤ hb 2e c .
This latter result was later improved by the following algebraic g-theorem of Hausel
[31]:
Theorem 2.6 (Hausel 2005). Let A be a monomial Artinian level algebra of socle degree
e. If the field K has characteristic zero, then for a general linear form L, the induced
multiplication
×L : Aj → Aj+1
is an injection, for all j = 0, 1, . . . , b e−1
c. In particular, over any field, the sequence
2
1, h1 − 1, h2 − h1 , . . . , hb e−1 c+1 − hb e−1 c
2
2
is an O-sequence, i.e., the “first half ” of h is a differentiable O-sequence.
We have the following additional results on differentiability from [2]:
Theorem 2.7 (BMMNZ 2012).
(a) Every finite differentiable O-sequence h is the “first
half” of some pure O-sequence. (This is the converse of Hausel’s theorem.)
(b) In particular, any finite differentiable O-sequence is pure (by truncation).
(c) Any nondecreasing pure O-sequence of socle degree ≤ 3 is differentiable.
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
5
It turns out that (c) is the best possible result in this direction:
Proposition 2.8 (BMMNZ 2012). There exist nondecreasing pure O-sequences of any
socle degree e ≥ 4 that are not differentiable.
Example 2.9. We illustrate the preceding result with an example from [2]. Observe first
that the h-vector h0 = (1, 4, 10, 20, 35) is a pure O-sequence since it is the h-vector of the
truncation of a polynomial ring in four variables, w, x, y, z; the pure order ideal arises
using all 35 monomials of degree 4 in w, x, y, z. The h-vector h00 = (1, 4, 6, 4, 1) is also
a pure O-sequence, since it is the order ideal generated by a monomial abcd in four new
variables. Now we work in a polynomial ring in the eight variables w, x, y, z, a, b, c, d, and
we consider the pure order ideal generated by the above 36 monomials of degree 4. The
resulting h-vector h is
1 4 10 20 35
+
4 6 4 1
1 8 16 24 36
Since the first difference of h = (1, 8, 16, 24, 36) is (1, 7, 8, 8, 12), which is not an O-sequence
(because 12 > (8(3) )11 = 10), we have constructed the desired example.
Putting aside the class of nondecreasing pure O-sequences, we now turn to the question
of unimodality. There are three factors that go into whether a nonunimodal example will
exist: the codimension (i.e., the number of variables), the socle degree, and the type.
An easy application of Macaulay’s theorem gives that any standard graded algebra of
codimension two has unimodal Hilbert function, and in fact it is not hard to show that
if K[x, y]/I is level (monomial or not) then the Hilbert function is strictly unimodal (see
e.g. Iarrobino [38], 1984). Hence the interesting questions arise for codimension r ≥ 3.
We will begin with some results involving the socle degree (some of which will also
bring in the codimension). It follows from Hibi’s result on flawlessness that any pure
O-sequence of socle degree ≤ 3 is unimodal. The next case, socle degree 4, already is not
necessarily unimodal, again thanks to an example from [2]:
Example 2.10. Observe that h0 = (1, 5, 15, 35, 70) is a pure O-sequence, since it is
the h-vector of the truncation of a polynomial ring in five variables, and as before h00 =
(1, 4, 6, 4, 1) is also pure, since it corresponds to the maximal monomial abcd ∈ K[a, b, c, d].
Hence, reasoning as above, we now consider one copy of h0 and eleven copies of h00 as hvectors of pure O-sequences in twelve different rings, and we work in the tensor product
of those rings. It follows that
h = (1, 5, 15, 35, 70) + 11 · (0, 4, 6, 4, 1) = (1, 49, 81, 79, 81)
is a nonunimodal pure O-sequence of socle degree 4.
A natural question, then, is what is the smallest codimension for which nonunimodal
pure O-sequences exist with socle degree 4. This remains open. We do have the following
results from [4], however.
Theorem 2.11 (Boyle 2012).
(a) All pure O-sequences of socle degree ≤ 9 in three
variables are unimodal.
(b) All pure O-sequences of socle degree ≤ 4 in four variables are unimodal.
(c) In four or more variables, there exist nonunimodal pure O-sequences in all socle
degrees ≥ 7.
In [3], Boij and the third author gave a nonunimodal pure O-sequence of codimension 3
and socle degree 12. This is the smallest known example in codimension 3. It follows
6
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
from this and Boyle’s result that in codimension 3, the only open cases are socle degrees
10 and 11. Notice that, in codimension 4, the previous theorem leaves only open the socle
degrees 5 and 6.
Now we turn to questions involving the type. Of course it follows immediately from
Theorem 2.3 that pure O-sequences of type 1 are unimodal. What else can be deduced
about pure O-sequences using the WLP? A collection of results was obtained in [2] which
showed, in some sense, the limits of the WLP in the study of pure O-sequences.
Theorem 2.12 (BMMNZ 2012). Over a field of characteristic zero the following hold:
(a) Any monomial artinian level algebra of type 2 in three variables has the WLP. Thus
a pure O-sequence of type 2 and codimension 3 is differentiable until it reaches its
peak, is possibly constant, and then is nonincreasing until it reaches zero.
(b) Fix two positive integers r and d. Then all monomial artinian level algebras of
codimension r and type d possess the WLP if and only if at least one the following
is true:
(i) r = 1 or 2;
(ii) d = 1;
(iii) r = 3 and d = 2.
The proof of (a) was surprisingly long and intricate. The main point of (b) is that in all
other cases, we were able to show that artinian monomial level algebras exist that do not
have the WLP.
Notice that Theorems 2.3, 2.6 and 2.12(a) require that K have characteristic zero. The
statements about injectivity and surjectivity require this property of the characteristic,
and indeed a great deal of research has been carried out to see what happens when
K has positive characteristic; we refer to [53] for an overview of these results. The
consequences on the shape of the pure O-sequences are indeed characteristic free, as has
been noted above, since the Hilbert function of a monomial ideal does not depend on the
characteristic.
If one is studying all artinian level monomial algebras of fixed type, Theorem 2.12 is
a serious limitation on the usefulness of the WLP. However, in the study of pure Osequences (e.g. to determine combinations of codimension, type and socle degree that
force unimodality) it is still conceivable that the WLP will play a useful role. As a trivial
example, we know that monomial complete intersections in any codimension possess the
WLP, thanks to Theorem 2.3. It is not known (except in codimension ≤ 3, as noted
below) whether all complete intersections have this property, but the knowledge in the
special case of monomial ideals is enough to say that all complete intersection Hilbert
functions are unimodal. Perhaps a similar phenomenon will allow the WLP to continue
to play a role in the study of pure O-sequences. A first approach using this philosophy
was obtained by Cook and the second author [17], where they lifted a monomial ideal to
an ideal of a reduced set of points in one more variable, showed that the general artinian
reduction has the WLP, and concluded that the Hilbert function of the original monomial
algebra is unimodal, regardless of whether it has the WLP or not.
For this reason we mention a useful tool in studying the WLP, that was introduced by
the first and second authors with T. Harima and J. Watanabe in [30] and whose study
was continued by H. Brenner and A. Kaid in [5]. This is the study of the syzygy bundle,
and the use of the Grauert-Mülich theorem (see [58]). It was used in [30] to show that
any complete intersection I in K[x, y, z] over a field of characteristic zero has the WLP.
The idea is to restrict to a general line, say one defined by a general linear form L. The
key is that the restricted ideal (I, L)/(L) (which now has codimension 2, hence has a
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
7
Hilbert-Burch matrix) should have minimal syzygies in two consecutive degrees, at most.
The idea of [30] was that for height 3 complete intersections, this information can be
obtained by considering the module of syzygies of I, sheafifying it to obtain the syzygy
bundle, and applying the Grauert-Mülich theorem to the general line defined by L. Of
course this introduces questions about the semistability of the syzygy bundle, which we
mostly omit here. In a more general setting, the following result from [5] summarizes the
idea nicely, at least for codimension three.
Theorem 2.13 (Brenner-Kaid 2007). Let I = hf1 , . . . , fk i ⊂ K[x, y, z] = R be an artinian
homogeneous ideal whose syzygy bundle S is semistable on P2 . Then
(a) If the restriction of S splits on a general line L as
SL ∼
=
s
M
i=1
OL (a + 1) ⊕
k−1
M
OL (a),
i=s+1
then A = R/I has the WLP.
(b) If the restriction of S splits on a general line L as
SL ∼
= OL (a1 ) ⊕ · · · ⊕ OL (an−1 )
with a1 ≥ a2 ≥ · · · ≥ an−1 and a1 − an−1 ≥ 2, then A = R/I does not have the
WLP.
Other applications of this approach, for higher codimension, can be found for instance
in [51].
Returning to unimodality questions, tools other than the WLP will also be needed. We
have the following theorems of Boyle [4], which relied on decomposition results and an
analysis of complete intersection Hilbert functions but did not use the WLP.
Theorem 2.14 (Boyle 2012).
(a) In codimension 3, all pure O-sequences of type 3
are strictly unimodal.
(b) In codimension 4, all pure O-sequences of type 2 are strictly unimodal.
A natural question is whether all pure O-sequences of type 2 and arbitrary codimension
are unimodal. Also, for any fixed codimension, it is an interesting problem to determine
which types force unimodality. The “record” for the smallest known nonunimodal example
in codimension 3 is type 14, given in [2].
Finally, one can ask “how nonunimodal” a pure O-sequence can be. The answer is “as
nonunimodal as you want.” We have:
Theorem 2.15 (BMMNZ 2012). For any integers M ≥ 2 and r ≥ 3, there exists a pure
O-sequence in r variables which is nonunimodal and has exactly M maxima.
Of course the “price” in Theorem 2.15 is paid in having a large socle degree and type.
In fact, even Cohen-Macaulay f -vectors (i.e., the face vectors of Cohen-Macaulay simplicial complexes, which are a much smaller subset of pure O-sequences) can be nonunimodal with arbitrarily many peaks (see [61]). This result considerably extends Theorem
2.15, even though, unlike for arbitrary pure O-sequences, here the number of variables
becomes necessarily very large as the number of peaks increases.
A good topic to build a bridge between the algebraic and the combinatorial sides of the
theory of pure O-sequences is the Interval Conjecture.
The Interval Property (IP) was introduced in 2009 by the third author [84], where he
conjectured its existence for the set of Hilbert functions of level — and, in a suitably
8
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
symmetric way, Gorenstein — algebras. Namely, the IP says that if two (not necessarily
finite) sequences, h and h0 , of a class S of integer sequences coincide in all entries but one,
say
h = (h0 , . . . , hi−1 , hi , hi+1 , . . . ) and h0 = (h0 , . . . , hi−1 , hi + α, hi+1 , . . . ),
for some index i and some positive integer α, then the sequences
(h0 , . . . , hi−1 , hi + β, hi+1 , . . . )
are also in S, for all β = 1, 2, . . . , α − 1.
Given that level and Gorenstein Hilbert functions are nearly impossible to characterize,
the IP appears to be both a very natural property and one of the strongest structural
results that we might hope to achieve for the set of such sequences.
For example, it is proved in [84] that the IP holds for all Gorenstein Hilbert functions
of socle degree 4. Since Gorenstein Hilbert functions are symmetric, this means that,
for any fixed r, (1, r, a, r, 1) is Gorenstein
if and only if a ranges between some minimum
possible value, say f (r), and r+1
.
This
latter
is the maximum allowed by a polynomial
2
ring in r variables, and is achieved by the so-called compressed Gorenstein algebras (see,
e.g., the 1984 papers of Fröberg-Laksov and Iarrobino [24, 38] or the third author’s works
[81, 82]).
Notice that the existence of the IP for these Hilbert functions is especially helpful in
view of the fact that, for most codimensions r, the value of f (r) is not known. In fact,
such Gorenstein Hilbert functions are “highly” nonunimodal. Asymptotically, we have
f (r)
lim 2/3 = 62/3 ,
r→∞ r
as proved by these three authors in [54] (2008), solving a longstanding conjecture of
Stanley [69] (see also [55], 2009, for some broad generalizations).
The Interval Property is still wide open today for both level and Gorenstein algebras.
In a more combinatorial direction, in BMMNZ 2012 the IP has then also been conjectured for: 1) pure O-sequences (under the name “ICP”); and 2) the f -vectors of pure
simplicial complexes, a topic of discussion of the next section.
As for pure O-sequences, the ICP has been proved in a number of special cases. Most
importantly, it is known when the socle degree is at most 3, in any number of variables.
Theorem 2.16 (BMMNZ 2012). The ICP holds for the set of all pure O-sequences of
socle degree e ≤ 3.
Thanks to this result, H.T. Hà, E. Stokes and the third author [27] have recently
developed a new approach leading to a proof of Stanley’s matroid h-vector conjecture in
Krull-dimension 3, as we will see in the next section.
While the ICP remains open in most instances — e.g., in three variables — it must be
pointed out that, just recently, it has been disproved in the four variable case by Constantinescu and Varbaro (see [15, Remark 1.10]), who found the following counterexample.
Example 2.17 (Constantinescu-Varbaro 2012). Consider the pure order ideals generated by {x3 y 2 z, x3 yt2 , x3 z 2 t} and {x4 y 2 , x3 yzt, x2 z 2 t2 }. Their h-vectors are the pure Osequences (1, 4, 10, 13, 12, 9, 3) and (1, 4, 10, 13, 14, 9, 3). However, an exhaustive computer
search over all sets of three monomials of degree 6 in four variables reveals that the sequence (1, 4, 10, 13, 13, 9, 3) is not pure, contrary to the ICP.
It is worth remarking that h = (1, 4, 10, 13, 13, 9, 3) is, however, a level h-vector, and so
this does not provide a counterexample to the IP for arbitrary level algebras. Indeed, h is
the h-vector of a level algebra in four variables whose inverse system is generated by two
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
9
sums of sixth powers of six general linear forms each, and the sixth power of one general
linear form.
As for pure f -vectors, the IP is still wide open, and little progress has been made so
far.
In general, at this time it is still unclear what the exact scope of the Interval Property
is, and if it can also be of use in other areas of combinatorial algebra or even enumerative
combinatorics. It is well known to hold, e.g., for the set of Hilbert functions of graded
algebras of any Krull-dimension (see Macaulay’s theorem), the f -vectors of arbitrary
simplicial complexes (the Kruskal-Katona theorem), and the f -vectors of Cohen-Macaulay
complexes (BMMNZ 2012). Instead, the IP fails quite dramatically, for example, for
matroid h-vectors, which are conjecturally another subset of pure O-sequences, as we will
see in the next section (we refer to BMMNZ 2012 and [69] for details). Stanley and the
third author [72] recently looked at the IP in the context of r-differential posets, a class of
ranked posets generalizing the Young lattice of integer partitions and the Young-Fibonacci
lattice. Here, even though the IP fails in general, it might be a reasonable property to
conjecture, for instance, for r = 1, which is the most natural class of differential posets.
3. Pure O-sequences and combinatorics
Much of the motivation for the study of pure O-sequences comes from combinatorics,
and in this section we give an overview of this side of the theory. In order to put in context
the definition of a pure O-sequence given in the introduction, we quickly recall the notion
of posets and order ideals. For an introduction to this theory, we refer to Chapter 3 of
Stanley’s new edition of “EC1” ([71], 2012). A poset (short for partially ordered set) is a
set S equipped with a binary relation, “≤,” that is: 1) reflexive (i.e., a ≤ a for all a ∈ S);
2) antisymmetric (a ≤ b ≤ a implies a = b); and 3) transitive (a ≤ b ≤ c implies a ≤ c).
An order ideal in a poset S is a subset I of S that is closed with respect to “≤ .”
That is, if t ∈ I and s ≤ t, then s ∈ I. Thus, our monomial order ideals are the (finite)
order ideals of the poset P of all monomials in the polynomial ring R = K[y1 , . . . , yr ],
where the binary relation of P is divisibility. Notice that P is a ranked poset, where the
rank of a monomial is its degree in R. Therefore, Macaulay’s O-sequences are exactly the
possible rank functions of the order ideals of P , since every Hilbert function satisfying
Macaulay’s theorem can be achieved by a monomial algebra. Similarly, as we have seen,
a pure O-sequence is the rank function of some monomial order ideal whose generators
(i.e., the antichain of maximal monomials) are all of the same degree.
Another fundamental class of order ideals are those contained in the Boolean algebra Br ,
the poset of all subsets of {1, 2, . . . , r}, ordered by inclusion. By identifying the integer
i with a vertex vi , the order ideals of Br are usually called simplicial complexes (on r
vertices).
The elements of a simplicial complex ∆ are dubbed faces, and the maximal faces are
the facets of ∆. The dimension of a face is its cardinality minus 1, and the dimension of
∆ is the largest of the dimensions of its faces.
Notice that if we identify vi with a variable yi ∈ R = K[y1 , . . . , yr ], then simplicial
complexes also coincide with the order ideals of P generated by squarefree monomials. In
particular, if we define as pure those simplicial complexes whose facets have all the same
dimension, then clearly their rank vectors, called pure f -vectors, are the special subset of
pure O-sequences that can be generated by squarefree monomials.
10
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
Example 3.1. The simplicial complex
∆ = {{1, 2, 3}, {2, 3, 4}, {1, 2}, {1, 3}, {2, 3}, {2, 4}, {3, 4}, {1}, {2}, {3}, {4}, ∅}
is the order ideal of B4 generated by {1, 2, 3} and {2, 3, 4}.
Thus, ∆ is a pure complex of dimension 2, whose pure f -vector is f∆ = (1, 4, 5, 2).
Equivalently, f∆ is the pure O-sequence generated by the two squarefree monomials
y1 y2 y3 and y2 y3 y4 .
Similarly to Macaulay’s theorem for arbitrary O-sequences, we know a characterization
of the class of pure f -vectors thanks to the classical Kruskal-Katona theorem (see e.g.
[69]). However, analogously, things become dramatically more complicated (hopeless, we
should say) when it comes to attempting a characterization of pure f -vectors.
In the last section of BMMNZ 2012, we have begun a study of pure f -vectors, but still
very little is known today beyond what is known for arbitrary pure O-sequences.
Besides their obvious intrinsic importance — simplicial complexes are a central object in
algebraic combinatorics, combinatorial algebra and topology, just to name a few subjects
— pure f -vectors also carry fascinating applications. It is on their connections to finite
geometries and design theory that we want to focus in the next portion of this section.
It will follow from our discussion, as probably first observed by Björner ([1], 1994),
that a characterization of pure simplicial complexes and their f -vectors would imply, for
instance, that of all Steiner systems, and as a further special case, a classification of all
finite projective planes, one of the major open problems in geometry.
A Steiner system S(l, m, r) is an r-element set V , together with a collection of m-subsets
of V , called blocks, such that every l-subset of V is contained in exactly one block. Steiner
systems are a special family of the so-called block designs. We refer our reader to the two
texts [14, 44], where she can find a truly vast amount of information on combinatorial
designs. For instance, a Steiner triple system (STS) is a Steiner system S(2, 3, r), while
S(3, 4, r) is dubbed a Steiner quadruple system, where r is the order of the system.
Since we are dealing with maximal sets of the same cardinality (m, in this case), it
is clear that if we identify each element of V with a variable yi , then the existence of
Steiner systems (and similarly for other block designs) will be equivalent to the existence
of certain pure f -vectors.
Example 3.2. Let us consider STS’s of order 7, i.e., S(2, 3, 7). Constructing such a
design is tantamount to determining a family of squarefree degree 3 monomials of R =
K[y1 , y2 , . . . , y7 ], say M1 , M2 , . . . , Mt , such that each squarefree degree 2 monomial of R
divides exactly one of the Mi .
Clearly, since
there are 72 = 21 squarefree degree 2 monomials in R, if the Mi exist,
then t = 21/ 32 = 7. In other words, S(2, 3, 7) exists if and only if
f = (1, 7, 21, 7)
is a pure f -vector.
Notice also that f exists as a pure f -vector if and only if it exists as a pure O-sequence,
since for seven degree 3 monomials to have a total of 21 degree 2 divisors, each needs to
have exactly three linear divisors, i.e., it must be squarefree.
It is easy to see that an STS of order 7, and so the pure f -vector f = (1, 7, 21, 7), do
indeed exist, using the monomial order ideal generated by:
y1 y2 y3 , y3 y4 y5 , y3 y6 y7 , y1 y4 y7 , y2 y4 y6 , y2 y5 y7 , y1 y5 y6 .
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
11
Some simple numerical observations show that a necessary condition for an STS of
order r to exist is that r be congruent to 1 or 3 modulo 6, and it is a classical result of
Kirkman ([40], 1847) that this is also sufficient. In other words,
r
r
f = 1, r,
,
/3
2
2
is a pure f -vector, if and only if it is a pure O-sequence, if and only if r is congruent to 1
or 3 modulo 6.
A different, and more challenging, problem is the classification of all Steiner systems,
up to isomorphism. Even the existence of particular systems sometimes brings into the
story a nontrivial amount of interesting algebra. As an illustration, we mention here the
case of the Steiner systems S(4, 5, 11), S(5, 6, 12), S(3, 6, 22), S(4, 7, 23), and S(5, 8, 24),
which are intimately connected to the first sporadic finite simple groups ever discovered,
called the Mathieu groups (see E.L. Mathieu [48, 49], 1861 and 1873). These five groups —
denoted respectively by M11 , M12 , M22 , M23 , and M24 — in fact arise as the automorphism
groups of the above Steiner systems (i.e., the transformations of the systems that preserve
the blocks).
There exists only one STS of order 7, which is called the Fano plane (see the figure
below) for reasons that will be clear in a minute. In other words, the seven monomials
of the previous example are, up to isomorphism, the only possible set of generators for a
pure order ideal in K[y1 , y2 , . . . , y7 ] with (1, 7, 21, 7) as its pure O-sequence.
y1
y2
y5
y4
y3
y6
y7
Also for r = 9, there exists a unique STS. However, it is reasonable to believe that the
number of nonisomorphic STS increases extremely quickly for r large. For instance, there
are 80 nonisomorphic STS of order 15, and there are 11,084,874,829 of order 19.
Similarly, the possible orders of Steiner quadruple systems are known and nicely characterized, since the obvious necessary conditions again turn out to be also sufficient:
S(3, 4, r) exists if and only if its order r is congruent to 2 or 4 modulo 6, as proved by
Hanani ([28], 1960). In other words, reasoning as above, since there are four possible
3-subsets of any given 4-set, we have that
r
r
r
f = 1, r,
,
,
/4
2
3
3
is a pure f -vector if and only if it is a pure O-sequence, if and only if r is congruent to 2
or 4 modulo 6.
However, as we increase the cardinality m of the blocks, things become more and more
obscure. This is due to the high complexity of computing combinatorial designs over a
large vertex set, as well as to the lack of a general theory.
12
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
Already for Steiner quintuple systems, the trivial necessary conditions (r congruent to
3 or 5, but not to 4, modulo 6) are no longer sufficient. For example, no Steiner quintuple
system S(4, 5, 17) exists (see [59], 2008). The smallest value of r for which the existence
of S(4, 5, r) is currently open is 21. In other words, it is unknown whether
21
21
21
21
1, 21,
,
,
,
/5 = (1, 21, 210, 1330, 5985, 1197)
2
3
4
4
is a pure O-sequence.
Perhaps the best-known family of examples of Steiner systems is that of finite projective
planes, so they deserve a special mention here. Recall that a projective plane is a collection
of points and lines such that any two lines “intersect at” exactly one point, and any two
points “lie on” exactly one line (one also assumes that there exist four points no three of
which are collinear, in order to avoid uninteresting pathological situations).
If the projective plane is finite, it can easily be seen that the number of points is equal to
the number of lines, and that this number must be of the form q 2 +q +1, where the integer
q is the order of the plane. Further, in a projective plane of order q, any line contains
exactly q + 1 points, and by duality, any point is at the intersection of exactly q + 1 lines.
In other words, finite projective planes are the Steiner systems S(2, q + 1, q 2 + q + 1). The
reader may want to consult, e.g., [23] for an introduction to this area.
Thus, the above example of a Steiner system S(2, 3, 7), the Fano plane, is the unique
smallest possible projective plane.
Similarly to how we argued earlier in terms of pure f -vectors, one can show that a
projective plane of order q exists if and only if
q+1
q+1
q+1
2
2
2
2
h = 1, q + q + 1, (q + q + 1)
, (q + q + 1)
, . . . , (q + q + 1)
2
3
q+1
is a pure f -vector, if and only if it is a pure O-sequence.
A major open problem in geometry asks for a classification of all finite projective planes,
or even just of the possible values that q may assume. Conjecturally, q is always the power
of a prime, and it is a standard algebraic exercise, using finite field theory, to construct a
projective plane of any order q = pn .
The best general necessary condition known today on q is still the following theorem
from [7, 13]:
Theorem 3.3 (Bruck-Ryser-Chowla [7, 13]). If q is the order of a projective plane and q
is congruent to 1 or 2 modulo 4, then q is the sum of two squares.
Thus, for instance, as a consequence of the Bruck-Ryser-Chowla Theorem, no projective
plane of order 6 exists. In other words,
(1, 43, 903, 1505, 1505, 903, 301, 43)
is not a pure O-sequence. However, already ruling out the existence of projective planes
of order 10 has required a major computational effort (see Lam [41], 1991). The case
q = 12 is still open.
Notice that, at least for certain values of q, the number of nonisomorphic projective
planes of order q can be very large, and a general classification seems entirely out of reach.
The smallest q for which there exists more than one nonisomorphic projective plane is 9,
where the four possible cases were already known to O. Veblen ([77], 1907).
The second important application of pure O-sequences that we want to discuss brings
our attention to a very special class of simplicial complexes, called matroid complexes.
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
13
Matroids are ubiquitous in mathematics, where they often show up in surprising ways
(see [56, 60, 79, 80]).
The algebraic theory of matroids began in the same 1977 seminal paper of Stanley [66]
that introduced pure O-sequences. A finite matroid can be naturally identified with a
pure simplicial complex over V = {1, 2, . . . , r}, such that its restriction to any subset of
V is also a pure complex.
One associates, to any given simplicial complex ∆ over V = {1, 2, . . . , r}, the following
squarefree monomial ideal in S = K[x1 , . . . , xr ], where K is a field:
*
+
Y
I∆ = xF =
xi | F 6∈ ∆ .
i∈F
I∆ is called the Stanley-Reisner ideal of the complex ∆, and the quotient algebra S/I∆ is
its Stanley-Reisner ring.
It is a standard fact of combinatorial commutative algebra (see e.g. [69]) that the
Stanley-Reisner ring S/I∆ of a matroid complex is Cohen-Macaulay and level, although
of course of positive Krull-dimension (except in degenerate cases). Thus, the h-vector of
S/I∆ is level, since it is the h-vector of an artinian reduction of S/I∆ . However, even
though S/I∆ is presented by monomials, notice that its artinian reductions will in general
be far from monomial, for they require taking quotients by “general enough” linear forms.
The following spectacularly simple conjecture of Stanley ([66], 1977) predicts that, for
any matroid complex ∆, we can nonetheless find some artinian monomial level algebra
having the h-vector of S/I∆ as its h-vector:
Conjecture 3.4. Any matroid h-vector is a pure O-sequence.
The problem of characterizing matroid h-vectors appears to be once again hopeless, and
Conjecture 3.4 has motivated much of the algebraic work done on matroids over the past
35 years (see, as a highly nonexhaustive list, [9, 10, 15, 22, 32, 50, 57, 62, 64, 73, 74, 75]).
The main approach to Conjecture 3.4 has been, given the h-vectors of a certain class
of matroids, to explicitly produce some pure monomial order ideals having those matroid
h-vectors as their pure O-sequences. Recently, H.T. Hà, E. Stokes and the third author
[27] introduced a “more abstract” approach to Conjecture 3.4. Their main idea, inspired
by the latest progress on pure O-sequences made in BMMNZ 2012, and in particular
the proof of the Interval Conjecture (ICP) in socle degree 3, has been to try to reduce
Stanley’s conjecture, as much as possible, to one on the properties of pure O-sequences,
thus avoiding explicit construction of a monomial ideal for each matroid h-vector.
The approach of [27] has already led to a proof of Conjecture 3.4 for all matroid complexes of Krull-dimension at most 2 (the dimension 1 case, that had been the focus of a
large portion of the thesis [73], simply followed in a few lines).
Theorem 3.5 (Hà-Stokes-Zanello [27]). All matroid h-vectors (1, h1 , h2 , h3 ) are pure Osequences.
More generally, the following is a first concrete, if still tentative, general approach to
Conjecture 3.4 (see [27]).
Assuming Conjecture 3.4 holds for all matroid complexes whose deletions with respect
to any vertex are cones (which may not be too difficult to show with the techniques of
paper [27]), Conjecture 3.4 is true in general under the following two natural (but still
too bold?) assumptions:
14
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
(A) Any matroid h-vector is differentiable for as long as it is nondecreasing. (In fact,
incidentally, would a g-element, that Hausel [31] and Swartz [74] proved to exist
in the “first half” of a matroid, carry on all the way?)
(B) Suppose that the shifted sum, h00 = (1, h1 + 1, h2 + h01 , . . . , he + h0e−1 ), of two pure
O-sequences h and h0 is differentiable for as long as it is nondecreasing. Then h00
is also a pure O-sequence.
4. Enumerations of pure O-sequences
As we have seen above, pure O-sequences arise in several areas, yet their properties are
not well understood, and there are other important questions that should be addressed
even if a classification is not available. For example, one would like to estimate the number
of pure O-sequences of given codimension and socle degree. What happens asymptotically? Moreover, we have seen that pure O-sequences can be as far from being unimodal
as we want. Nevertheless, one may ask: What are the odds for a pure O-sequence to be
unimodal?
In order to discuss such questions, let us denote by O(r, e), P (r, e), and D(r, e) the sets
of O-sequences, pure O-sequences, and differentiable O-sequences, respectively, that have
codimension r and socle degree e. Recall that given two functions f, g : R → R, one says
that f is asymptotic to g, and writes f (r) ∼r g(r), if limr f (r)/g(r) = 1. All limits are
taken for r approaching infinity.
Consider now an O-sequence (1, r − 1, h2 , . . . , he ) in O(r − 1, e). Integrating it, that is,
passing to (1, r, r − 1 + h2 , . . . , he−1 + he ), provides a differentiable O-sequence in D(r, e).
Thus, since finite differentiable O-sequences are pure by Theorem 2.7(b), we have the
following inclusions:
O(r − 1, e) ,→ D(r, e) ⊂ P (r, e) ⊂ O(r, e).
Results by Linusson (see [46]) imply that, for r large, the cardinalities of O(r − 1, e)
and O(r, e) are asymptotically equal. It follows that in large codimensions almost all
O-sequences are pure. More precisely, one has:
Theorem 4.1 (BMMNZ 2012). Fix a positive integer e. Then, for r large, almost all
O-sequences of socle degree e are differentiable. Namely,
e+1
#O(r, e) ∼ #P (r, e) ∼ #D(r, e) ∼ c · r( 2 )−1 ,
r
where
r
e−2
Y
ce =
i=0
r
e+1
2
−
i+1
2
e
−1
i
e+1
−1 !
2
.
Since pure O-sequences are Hilbert functions of level algebras, we immediately get the
following consequence.
Corollary 4.2 (BMMNZ 2012). Fix a positive integer e. Let L(r, e) be the set of level
Hilbert functions of codimension r and socle degree e. Then, for r large, almost all level
sequences are pure and unimodal, and
e+1
#L(r, e) ∼ c r( 2 )−1 .
r
e
The outcome changes drastically if we fix as additional parameter the socle type t.
Since each monomial of degree t is divisible by at most t distinct variables, we observe:
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
15
Proposition 4.3 (BMMNZ 2012). Let P (r, e, t) be the set of pure O-sequences of codimension r, socle degree e, and type t. Then #P (r, e, t) = 0 for r > te, this bound being
sharp.
Note that, in contrast to this result, there is no analogous restriction on level Hilbert
functions. For example, Gorenstein algebras have type 1 and admit any positive socle
degree and codimension. In fact, asymptotically, the number of their Hilbert functions is
known.
Recall that an SI-sequence of socle degree e is an O-sequence that is symmetric about 2e
and differentiable up to degree b 2e c. Initially, Stanley and Iarrobino (see [69]) had hoped
that all Hilbert functions of Gorenstein algebras were SI-sequences. Although this is not
true (see [67] for the first counterexample), it is almost true! In fact, any differentiable
O-sequence in D(r, b 2e c) can be extended to a symmetric sequence, so that the result is
an SI-sequence. Moreover, every SI-sequence is the Hilbert function of some Gorenstein
algebra (see [12, 29, 52]). Obviously, the first half of the Hilbert function of a Gorenstein
algebra is an O-sequence. Taken together, it follows that the number of Gorenstein Hilbert
functions that are not SI-sequences is negligible:
Theorem 4.4 (BMMNZ 2012). Fix a positive integer e. Let G(r, e) be the set of Gorenstein Hilbert functions of codimension r and socle degree e, and let SI(r, e) be the set of
SI-sequences of codimension r and socle degree e. Then, for r large, almost all Gorenstein
Hilbert functions are SI-sequences. More precisely,
be/2c+1
#G(r, e) ∼ #SI(r, e) ∼ c
r( 2 )−1 .
r
r
be/2c
Returning to pure O-sequences, it would be very interesting to determine, or at least to
find a good estimate of, the number of pure O-sequences of codimension r, socle degree
e, and type t. This seems a difficult problem. However, in the simplest case, where t = 1,
there is an easy combinatorial answer. In fact, any pure O-sequence of type 1 is the
Hilbert function of a (complete intersection) algebra whose inverse system is a monomial
of the form y1a1 · · · yrar , where a1 + · · · + ar = e and ai ≥ 1 for all i. We may assume that
a1 ≥ a2 ≥ · · · ≥ ar , so that (a1 , . . . , ar ) is a partition of e. Since it is easy to see that
distinct partitions lead to different Hilbert functions, we arrive at the following result.
Proposition 4.5 (BMMNZ 2012). #P (r, e, 1) = pr (e), the number of partitions of the
integer e having exactly r parts.
We now consider a slightly different asymptotic enumeration question. Fix positive
integers e and t. Since the number of monomials dividing t monomials of degree e is
finite, there are only finitely many pure O-sequences of socle degree e and type t. Denote
their set by P (∗, e, t). Determining #P (∗, e, t) exactly seems out of reach. However, one
may hope to at least find its order for t large. The first interesting case, namely e = 3,
has been settled.
Theorem 4.6 (BMMNZ 2012). Let #P (∗, 3, t) denote the number of pure O-sequences
of socle degree 3 and type t. Then
#P (∗, 3, t)
9
lim
=
.
t→∞
t2
2
Its proof gives some further information. Consider a pure O-sequence (1, r, a, t). Then
r ≤ a ≤ 3t,
by Hibi’s theorem and the fact that t monomials of degree 3 are divisible by at most
3t distinct quadratic monomials. It follows that #P (∗, 3, t) ≤ 29 t2 . To see that the two
16
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
functions are in fact asymptotically equal, notice that, for fixed t, the possible values of
r and a fall into one of the following three regions, illustrated in the figure below:
Region I: t ≤ r ≤ a ≤ 3t;
Region II: 0 < r < t ≤ a ≤ 3t;
Region III: 0 < r ≤ a < t.
a
6
3t
II
I
t
III
-
t
3t
r
Using superscripts to denote the sets of pure O-sequences in each region, it is shown in
BMMNZ that
#P (I) (∗, 3, t)
#P (II) (∗, 3, t)
#P (III) (∗, 3, t)
1
=
2,
lim
=
2,
and
lim
= .
2
2
2
t→∞
t→∞
t→∞
t
t
t
2
The arguments use in a crucial way the interval property for pure O-sequences of socle
degree 3. Unfortunately, this property fails in general. Nevertheless it would be very
interesting to extend the above results to socle degree e ≥ 4.
lim
5. Open problems
In this section we collect a few interesting problems that remain open in the area of
pure O-sequences. Most of them have been discussed in the previous sections, but some
are related problems that were not addressed above.
1. What is the largest type t for which all pure O-sequences are unimodal (independently of the codimension or socle degree)? Even proving that t ≥ 2, i.e., that pure
O-sequences of type 2 are unimodal in any codimension, would be very interesting.
2. For a fixed codimension r, what is the largest type t for which all pure O-sequences
are unimodal?
3. For a fixed codimension r, what is the largest socle degree e for which all pure
O-sequences are unimodal?
4. What is the smallest codimension r for which there exists a nonunimodal pure
O-sequence of socle degree 4?
5. Determine asymptotically the number #P (∗, e, t) of pure O-sequences of socle
degree e and type t, for t large. What is the order of magnitude of #P (∗, e, t)?
6. The first example of a nonunimodal pure O-sequence (due to Stanley [66], 1977)
was (1, n = 505, 2065, 3395, 3325, 3493), which is in fact the f -vector of a CohenMacaulay simplicial complex, hence in particular a pure f -vector. What is the
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
17
smallest number of variables n (i.e., the number of vertices of the complex) allowing
the existence of a nonunimodal pure f -vector?
A. Tahat [76] has recently determined the sharp lower bound n = 328 for nonunimodal Cohen-Macaulay f -vectors of socle degree 5 (the socle degree of Stanley’s
original example), and has produced examples in larger socle degree with n as low
as 39.
7. Stanley’s Twenty-Fifth Problem for the year 2000 IMU Volume “Mathematics:
frontiers and perspectives” [70] asks, among a few other things: are all matroid
f -vectors unimodal, or even log-concave? What about matroid h-vectors?
Notice that matroid f -vectors are a much smaller subset of Cohen-Macaulay f vectors. For a major recent breakthrough on this problem, see Huh [35], and Huh
and Katz [37]; as a consequence of their work, log-concavity (hence unimodality)
is now known for all f -vectors (see Lenz [42], 2012) and h-vectors (Huh [36]) of
representable matroids. Notice also that, in general, the log-concavity of matroid
h-vectors would imply the log-concavity of matroid f -vectors, as proved by Dawson
[20] (1984) and Lenz [42].
Acknowledgements
We wish to thank David Cook II and Richard Stanley for helpful comments. The third
author also thanks Jürgen Bierbrauer for an interesting discussion on the connections
between group theory and Steiner systems. We thank the referee for a careful reading of
the paper.
References
[1] A. Björner: Nonpure shellability, f -vectors, subspace arrangements and complexity, in “Formal Power
Series and Algebraic Combinatorics,” Series Formelles et Combinatoire Algébrique (1994), DIMACS
Series in Discrete Mathematics and Theoretical Computer Science, volume 24, 1994, 25–54.
[2] M. Boij, J. Migliore, R. Miró-Roig, U. Nagel and F. Zanello: “On the shape of a pure O-sequence,”
Mem. Amer. Math. Soc. 218 (2012), no. 2024, vii + 78 pp..
[3] M. Boij and F. Zanello: Level algebras with bad properties, Proc. Amer. Math. Soc. 135 (2007), no.
9, 2713–2722.
[4] B. Boyle: “On the unimodality of pure O-sequences,” Ph.D. Thesis, University of Notre Dame (2012).
[5] H. Brenner and A. Kaid: Syzygy bundles on P2 and the Weak Lefschetz property, Illinois J. Math. 51
(2007), no. 4, 1299–1308.
[6] F. Brenti: Log-concave and unimodal sequences in algebra, combinatorics, and geometry: an update,
in “Jerusalem Combinatorics ’93,” Contemporary Mathematics 178 (1994), 71–89.
[7] R.H. Bruck and H.J. Ryser: The nonexistence of certain finite projective planes, Canadian J. Math.
1 (1949), 88–93.
[8] W. Bruns and J. Herzog: “Cohen-Macaulay rings. Rev. ed.”, Cambridge Studies in Advanced Mathematics 39, Cambridge University Press, Cambridge (1998).
[9] M.K. Chari: Matroid inequalities, Discrete Math. 147 (1995), no. 1–3, 283–286.
[10] M.K. Chari: Two decompositions in topological combinatorics with applications to matroid complexes,
Trans. Amer. Math. Soc. 349 (1997), no. 10, 3925–3943.
[11] C. Chen, A. Guo, X. Jin and G. Liu, Trivariate monomial complete intersections and plane partitions,
J. Commut. Algebra 3 (2011), no. 4, 459–490.
[12] Y.H. Cho and A. Iarrobino: Hilbert Functions and Level Algebras, J. Algebra 241 (2001), no. 2,
745–758.
[13] S. Chowla and H.J Ryser: Combinatorial problems, Canadian J. Math. 2 (1950) 93–99.
[14] C.J. Colbourn and J.H. Dinitz, Eds.: “Handbook of Combinatorial Designs,” CRC Press, Boca
Raton, FL (1996).
[15] A. Constantinescu and M. Varbaro: h-vectors of matroid complexes, preprint (2012).
18
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
[16] D. Cook II: The Lefschetz properties of monomial complete intersections in positive characteristic,
J. Algebra 369 (2012) 42–58.
[17] D. Cook II and U. Nagel: Hyperplane sections and the subtlety of the Lefschetz properties, J. Pure
Appl. Algebra 216 (2012), no. 1, 108–114.
[18] D. Cook II and U. Nagel: The Weak Lefschetz Property, monomial ideals, and lozenges, Illinois J.
Math. (to appear); (arXiv:0909.3509).
[19] D. Cook II and U. Nagel: Enumerations deciding the Weak Lefschetz Property, preprint
(arXiv:1105.6062).
[20] J.E. Dawson: A collection of sets related to the Tutte polynomial of a matroid, in “Graph theory,”
Singapore (1983), Lecture Notes in Math., vol. 1073, Springer, Berlin (1984), 193–204.
[21] N. G. de Bruijn, Ca. van Ebbenhorst Tengbergen and D. Kruyswijk: On the set of divisors of a
number, Nieuw Arch. Wiskunde (2) 23 (1951), 191–193.
[22] J.A. De Loera, Y. Kemper and S. Klee: h-vectors of small matroid complexes, Electron. J. Combin.
19 (2012), P14.
[23] P. Dembowski: “Finite geometries,” Reprint of the 1968 original, Classics in Mathematics, SpringerVerlag (1997), xii + 375 pp..
[24] R. Fröberg and D. Laksov: Compressed Algebras, Conference on Complete Intersections in Acireale,
Lecture Notes in Mathematics, vol. 1092, Springer, Berlin (1984), 121–151.
[25] A.V. Geramita: Inverse systems of fat points: Waring’s problem, secant varieties and Veronese varieties and parametric spaces of Gorenstein ideals, Queen’s Papers in Pure and Applied Mathematics,
no. 102, The Curves Seminar at Queen’s (1996), vol. X, 3–114.
[26] A.V. Geramita, T. Harima, J. Migliore and Y. Shin: “The Hilbert function of a level algebra”, Mem.
Amer. Math. Soc. 186 (2007), no. 872, vi + 139 pp.
[27] H.T. Hà, E. Stokes and F. Zanello: Pure O-sequences and matroid h-vectors, Ann. Comb. (to appear);
(arXiv:1006.0325).
[28] M. Hanani: On Quadruple Systems, Canad. J. Math. 12 (1960), 145–157.
[29] T. Harima: Characterization of Hilbert functions of Gorenstein Artin algebras with the weak Stanley
property, Proc. Amer. Math. Soc. 123 (1995), no. 29, 3631–3638.
[30] T. Harima, J. Migliore, U. Nagel and J. Watanabe: The weak and strong Lefschetz properties for
Artinian K-algebras, J. Algebra 262 (2003), no. 1, 99–126.
[31] T. Hausel: Quaternionic geometry of matroids, Cent. Eur. J. Math. 3 (2005), no. 1, 26–38.
[32] T. Hausel and B. Sturmfels: Toric hyperkähler varieties, Doc. Math. 7 (2002), 495–534.
[33] J. Herzog and D. Popescu, The strong Lefschetz property and simple extensions, preprint
(arXiv:math/05065537).
[34] T. Hibi: What can be said about pure O-sequences?, J. Combin. Theory Ser. A 50 (1989), no. 2,
319–322.
[35] J. Huh: Milnor numbers of projective hypersurfaces and the chromatic polynomial of graphs, J. Amer.
Math. Soc. 25 (2012), 907–927.
[36] J. Huh: h-vectors of matroids and logarithmic concavity, preprint (arXiv:1201.2915).
[37] J. Huh and E. Katz: Log-concavity of characteristic polynomials and the Bergman fan of matroids,
Math. Ann. 354 (2012), 1103–1116.
[38] A. Iarrobino: Compressed Algebras: Artin algebras having given socle degrees and maximal length,
Trans. Amer. Math. Soc. 285 (1984), no. 1, 337–378.
[39] A. Iarrobino and V. Kanev: “Power sums, Gorenstein algebras, and determinantal loci”, Springer
Lecture Notes in Mathematics 1721, Springer, Heidelberg (1999).
[40] T.P. Kirkman: On a Problem in Combinatorics, Cambridge Dublin Math. J. 2 (1847), 191–204.
[41] C.W.H. Lam: The Search for a Finite Projective Plane of Order 10, Amer. Math. Monthly 98 (1991),
no. 4, 305–318.
[42] M. Lenz: The f -vector of a realizable matroid complex is strictly log-concave, Combinatorics Probability, and Computing (to appear); (arXiv:1106.2944).
[43] J. Li and F. Zanello: Monomial complete intersections, the Weak Lefschetz Property and plane
partitions, Discrete Math. 310 (2010), no. 24, 3558–3570.
[44] C.C. Lindner and C.A. Rodger: “Design Theory,” CRC Press, Boca Raton, FL (1997).
[45] M. Lindsey: A class of Hilbert series and the strong Lefschetz property, Proc. Amer. Math. Soc. 139
(2011), no. 1, 79–92.
[46] S. Linusson: The number of M -sequences and f -vectors, Combinatorica 19 (1999), no. 2, 255–266.
PURE O-SEQUENCES: KNOWN RESULTS, APPLICATIONS AND OPEN PROBLEMS
19
[47] F.H.S. Macaulay: Some properties of enumeration in the theory of modular systems, Proc. London
Math. Soc. 26 (1927), no. 1, 531–555.
[48] E. Mathieu: Mémoire sur l’étude des fonctions de plusieurs quantités, sur la manière de les former
et sur les substitutions qui les laissent invariables, J. Math. Pures Appl. (Liouville) (2), VI (1861),
241–323.
[49] E. Mathieu: Sur la fonction cinq fois transitive de 24 quantités, Liouville Journ. (2), XVIII (1873),
25–47.
[50] C. Merino: The chip firing game and matroid complexes, Discrete models: combinatorics, computation, and geometry (2001), Discrete Math. Theor. Comput. Sci. Proc., AA, Maison Inform. Math.
Discrete. (MIMD), Paris (2001), 245–255.
[51] J. Migliore, R. Miró-Roig and U. Nagel: Monomial ideals, almost complete intersections, and the
Weak Lefschetz property, Trans. Amer. Math. Soc. 363 (2011), no. 1, 229–257.
[52] J. Migliore and U. Nagel: Reduced arithmetically Gorenstein schemes and simplicial polytopes with
maximal Betti numbers, Adv. Math. 180 (2003), no. 1, 1–63.
[53] J. Migliore and U. Nagel: A tour of the Weak and Strong Lefschetz Properties, preprint
(arXiv:1109.5718).
[54] J. Migliore, U. Nagel and F. Zanello: A lower bound on the second entry of a Gorenstein h-vector
and a conjecture of Stanley, Proc. Amer. Math. Soc. 136 (2008), no. 8, 2755–2762.
[55] J. Migliore, U. Nagel and F. Zanello: Bounds and asymptotic minimal growth for Gorenstein Hilbert
functions, J. Algebra 210 (2009), no. 5, 1510–1521.
[56] D.L. Neel and N.A. Neudauer: Matroids you have known, Math. Mag. 82 (2009), no. 1, 26–41.
[57] S. Oh: Generalized permutohedra, h-vectors of cotransversal matroids and pure O-sequences, preprint
(arXiv:1005.5586).
[58] C. Okonek, M. Schneider and H. Spindler: “Vector bundles on complex projective spaces.” Corrected reprint of the 1988 edition. With an appendix by S. I. Gelfand. Modern Birkhäuser Classics.
Birkhäuser/Springer Basel AG, Basel (2011).
[59] P.R.J. Östergard and O. Pottonen: There exists no Steiner system S(4, 5, 17), J. Combin. Theory
Ser. A 115 (2008), no. 8, 1570–1573.
[60] J.G. Oxley: “Matroid theory,” Oxford University Press, Oxford (2006).
[61] A. Pastine and F. Zanello: Two unfortunate properties of pure f -vectors, in preparation.
[62] N. Proudfoot: On the h-vector of a matroid complex, unpublished note.
[63] L. Reid, L. Roberts and M. Roitman: On complete intersections and their Hilbert functions, Canad.
Math. Bull. 34 (1991), no. 4, 525–535.
[64] J. Schweig: On the h-Vector of a Lattice Path Matroid, Electron. J. Combin. 17 (2010), no. 1, N3.
[65] H. Sekiguchi: The upper bound of the Dilworth number and the Rees number of Noetherian local
rings with a Hilbert function, Adv. Math. 124 (1996), no. 2, 197–206.
[66] R. Stanley: Cohen-Macaulay Complexes, in “Higher Combinatorics” (M. Aigner, Ed.), Reidel, Dordrecht and Boston (1977), 51–62.
[67] R. Stanley: Hilbert functions of graded algebras, Adv. Math. 28 (1978), no. 1, 57–83.
[68] R. Stanley: Log-concave and unimodal sequences in algebra, combinatorics, and geometry, Ann. New
York Acad. Sci. 576 (1989), 500–535.
[69] R. Stanley: “Combinatorics and commutative algebra,” Second Ed., Progress in Mathematics 41,
Birkhäuser Boston, Inc., Boston, MA (1996).
[70] R. Stanley: Positivity problems and conjectures in algebraic combinatorics, in “Mathematics: frontiers and perspectives”, Amer. Math. Soc., Providence, RI (2000), 295–319.
[71] R. Stanley: “Enumerative Combinatorics,” Vol. I, Second Ed., Cambridge University Press, Cambridge (2012).
[72] R. Stanley and F. Zanello: On the rank function of a differential poset, Electron. J. Combin. 19
(2012), no. 2, P13, 17 pp..
[73] E. Stokes: “The h-vectors of matroids and the arithmetic degree of squarefree strongly stable ideals,”
Ph.D. Thesis, University of Kentucky (2007).
[74] E. Swartz: g-elements of matroid complexes, J. Combin. Theory Ser. B 88 (2003), no. 2, 369–375.
[75] E. Swartz: g-elements, finite buildings, and higher Cohen-Macaulay connectivity, J. Combin. Theory
Ser. A 113 (2006), no. 7, 1305–1320.
[76] A. Tahat: “On the nonunimodality of Cohen-Macaulay f -vectors,” M.S. Thesis, Michigan Technological University, in preparation.
20
JUAN MIGLIORE, UWE NAGEL, AND FABRIZIO ZANELLO
[77] O. Veblen and J.H.M. Wedderburn: Non-Desarguesian and non-Pascalian geometries, Trans. Amer.
Math. Soc. 8 (1907), no. 3, 379–388.
[78] J. Watanabe: The Dilworth number of Artinian rings and finite posets with rank function, in: Commutative Algebra and Combinatorics, Advanced Studies in Pure Math. Vol. 11, Kinokuniya Co. North
Holland, Amsterdam (1987), 303–312.
[79] N. White, Ed.: “Theory of Matroids,” Encyclopedia of Mathematics and Its Applications 26, Cambridge Univ. Press, Cambridge (1986).
[80] N. White, Ed.: “Matroids Applications,” Encyclopedia of Mathematics and Its Applications 40,
Cambridge Univ. Press, Cambridge (1992).
[81] F. Zanello: Extending the idea of compressed algebra to arbitrary socle-vectors, J. Algebra 270 (2003),
no. 1, 181–198.
[82] F. Zanello: Extending the idea of compressed algebra to arbitrary socle-vectors, II: cases of nonexistence, J. Algebra 275 (2004), no. 2, 730–748.
[83] F. Zanello: A non-unimodal codimension 3 level h-vector, J. Algebra 305 (2006), no. 2, 949–956.
[84] F. Zanello: Interval Conjectures for level Hilbert functions, J. Algebra 321 (2009), no. 10, 2705–2715.
Department of Mathematics, University of Notre Dame, Notre Dame, IN 46556, USA
E-mail address: [email protected]
Department of Mathematics, University of Kentucky, 715 Patterson Office Tower,
Lexington, KY 40506-0027, USA
E-mail address: [email protected]
Department of Mathematical Sciences, Michigan Technological University, Houghton,
MI 49931, USA
E-mail address: [email protected]
| 0math.AC
|
1
Optimal Power Allocation by Imperfect
Hardware Analysis in Untrusted Relaying
arXiv:1709.01334v1 [cs.CR] 5 Sep 2017
Networks
Ali Kuhestani, Student Member, IEEE, Abbas Mohammadi, Senior Member, IEEE,
Kai-Kit Wong, Fellow, IEEE, Phee Lep Yeoh, Member, IEEE,
Majid Moradikia, and Muhammad R. A. Khandaker, Member, IEEE
Abstract
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal
power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless
network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We
assume that either the source or the destination is equipped with a large-scale multiple antennas
(LSMA) system, while the rest are equipped with a single antenna. To prevent the untrusted relay from
intercepting the source message, the destination sends an intended jamming noise to the relay, which is
referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closedform expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy
rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance
of the system by optimizing the associated hardware design. The results reveal that by beneficially
distributing the tolerable hardware imperfections across the transmission and reception radio-frequency
(RF) front ends of each node, the system’s secrecy rate may be improved. The engineering insight is
that equally sharing the total imperfections at the relay between the transmitter and the receiver provides
the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most
appropriate hardware design significantly increases the secrecy rate.
A. Kuhestani and A. Mohammadi are with the Electrical Engineering Department, Amirkabir University of Technology,
Tehran, Iran.
K.-K Wong and M. R. A. Khandaker are with the Department of Electronic and Electrical Engineering, University College
London, London WC1E 6BT, U.K.
P. L. Yeoh is with the School of Electrical and Information Engineering, The University of Sydney, NSW, Australia.
M. Moradikia is with the Electrical Engineering Department, Shiraz University of Technology, Shiraz, Iran.
2
Index Terms
Physical layer security, Untrusted relay, Hardware imperfections, Optimal power allocation, Hardware design
I. I NTRODUCTION
Security in wireless communication networks is conventionally implemented above the physical layer using key based cryptography [1]. To complement these highly complex schemes,
wireless transmitters can also be validated at the physical layer by exploiting the dynamic
characteristics of the associated communication links [2], [3]. Physical layer security (PLS) is
a promising paradigm for safeguarding fifth-generation (5G) wireless communication networks
without incurring additional security overhead [3].
Massive multiple-input multiple-output (MIMO) systems as a key enabling technology of
5G wireless communication networks provide significant performance gains in terms of spectral
efficiency and energy efficiency [4], [5]. This new technology employs coherent processing across
arrays of hundreds or even thousands of base station (BS) antennas and supports tens or hundreds
of mobile terminals [4]–[6]. As an additional advantage, massive MIMO is inherently more secure
than traditional MIMO systems, as the large-scale antenna array exploited at the transmitter can
precisely aim a narrow and directional information beam towards the intended receiver, such that
the received signal-to-noise ratio (SNR) is several orders of magnitude higher than that at any
incoherent passive eavesdropper [7]. However, these security benefits are severely hampered in
cooperative networks where the intended receivers may also be potential eavesdroppers [8]–[10].
In the context of PLS, cooperative jamming which involves the transmission of additional
jamming signals to degrade the received SNR at the potential eavesdropper can be applied by
source [9], [10], the intended receiver node [8] or a set of nodes, i.e., source and destination
or source and relay to beamform the jamming noise orthogonal to the spatial dimension of the
desired signal [11], [12]. Recently, several works have considered the more interesting scenario
of untrusted relaying [13]–[21] where the cooperative jamming is performed by the intended
receiver, which is referred to as destination-based cooperative jamming (DBCJ).
In real life, an untrusted, i.e., honest-but-curious, relay may collaborate to provide a reliable
communication. Several practical scenarios may include untrusted relay nodes, e.g., in ultra-dense
heterogenous wireless networks where low-cost intermediate nodes may be used to assist the
source-destination transmission. In these networks, it is important to protect the confidentiality
3
of information from the untrustworthy relay, while concurrently relying on it to increase the
reliability of communication. Thanks to the DBCJ strategy [8], positive secrecy rate can still
be attained in untrusted relay networks. In recent years, several works have focused on the
performance analysis [13]–[16], power allocation [17]–[20] and security enhancement [18], [21]
of untrusted relaying networks. To be specific, the authors in [17] proposed an optimal power
allocation (OPA) strategy to maximize the instantaneous secrecy rate of one-way relaying network
while two-way relaying scenario was considered in [18]. By exploiting the direct link, a sourcebased artificial noise injection scheme was proposed in [19] to hinder the untrusted relay from
intercepting the confidential message. A power allocation strategy was also proposed in [19] to
optimally determine the information and jamming signal powers transmitted by the source. In
[20], the OPA problem with imperfect channel state information was investigated. Notably, all
the aforementioned works considered perfect hardware in the communication network.
In practice, hardware equipments experience detrimental impacts of phase noise, I/Q imbalance, amplifier non-linearities, quantization errors, converters, mixers, filters and oscillators [22],
[23]. Each of the imperfections distorts the signals in its own way. While hardware imperfections
are unavoidable, the severity of the imperfections depends on the quality of the hardware used in
the radio-frequency (RF) transceivers. The non-ideal behavior of each component can be modeled
in detail for the purpose of designing compensation algorithms, but even after compensation there
remain residual transceiver imperfections [23]. This problem is more challenging especially in
high rate systems such as LTE-Advanced and 5G networks exploiting inexpensive equipments
[22]. Although most contributions in security based wireless networks have assumed perfect
transceiver hardware [8]–[21], or only investigated the impact of particular imperfections such
as I/Q imbalance [25] or phase noise [26] in the presence of an external eavesdropper, this paper
goes beyond these investigations by considering residual hardware imperfections in physical
layer security design [22]–[24].
In this paper, we take into account the OPA in a two-hop amplify-and-forward (AF) untrusted
relay network where all the nodes suffer from hardware imperfections and either the source or
the destination is equipped with large-scale multiple antennas (LSMA) [27], [28] while the other
nodes are equipped with a single antenna. The DBCJ protocol is operated in the first phase and
then the destination perfectly removes the jamming signal via self interference cancelation in
the second phase. For this system model, the main contributions of the paper are summarized
as follows:
4
•
Inspired by [22]–[24], we first present the generalized system model for transceiver hardware
imperfections in our secure transmission network. Based on this, we calculate the received
instantaneous signal-to-noise-plus-distortion-ratio (SNDR) at the relay and destination.
•
We formulate the OPA between the source and destination that maximizes the instantaneous
secrecy rate of untrusted relaying. Accordingly, novel closed-form solutions are derived for
the exact OPA. In addition, new simple solutions are derived for the OPA in the high SNR
regime.
•
According to our OPA solutions, novel compact expressions are derived for the ergodic
secrecy rate (ESR) and secrecy outage probability (SOP) in the high signal-to-noise-ratio
(SNR) regime that can be applied to arbitrary channel fading distributions. To gain further
insights, new closed-form expressions are presented over Rayleigh fading channels. The
asymptotic results highlight the presence of a secrecy rate ceiling which is basically different
from the prefect hardware case. We highlight that this ceiling phenomenon is independent
of the fading characteristic of the two hops.
•
We provide new insights for hardware design in DBCJ-based secure communications. To
this end, under the cost constraint of transceiver hardware at each node, we formulate the
hardware design problem for the aforementioned network to maximize the secrecy rate. The
results reveal that the secrecy rate can be improved by optimally distributing the level of
hardware imperfections between the transmit and receive RF front ends of each node.
Notation: We use bold lower case letters to denote vectors. IN and 0N ×1 denote the Identity
matrix and the zeros matrix, respectively. k.k, (.)H and (.)T denote the Euclidean norm, conjugate
transpose and transpose operators, respectively; Ex {·} stands for the expectation over the random
variable (r.v.) x; Pr(·) denotes the probability; fX (·) and FX (·) denote the probability density
function (pdf) and cumulative distribution function (cdf) of the r.v. X, respectively; the CN (µ, σ 2 )
denotes a circularly symmetric complex Gaussian RV with mean µ and variance σ 2 ; diag(A)
stands for the main diagonal elements of matrix A; Ei(x) is the exponential integral [34, Eq.
(8.211)]. [·]+ = max{0, x} and max stands for the maximum value.
II. S IGNAL
AND
S YSTEM R EPRESENTATION
A. System Model
As shown in Fig. 1, the system model under consideration is a wireless network with one
source (S), one destination (D) and one untrusted AF relay (R). While R is equipped with one
5
Fig. 1. Secure transmission under the presence of transceiver imperfections. The first and the second figures show the downlink
and the uplink transmissions, respectively. The relay acts as both helper and eavesdropper. The solid lines represent the first
phase of transmission while the dashed line represents the second phase of transmission.
antenna, S or D is equipped with LSMA denoted by Ns or Nd , respectively [29], [30]. This
corresponds to the downlink (DL) and uplink (UL) scenarios in a cellular system where the
base station is equipped with a LSMA and the mobile user and relay are equipped with a single
antenna [29]. In the DL scenario, S has many antennas, whereas D has a single antenna. The
opposite applies to the UL scenario.
All the nodes operate in a half-duplex mode. Accordingly, D cannot receive the transmitted
signal from S while transmitting the jamming signal and hence, the direct link between S and
D is unavailable. We also assume that the channels satisfy the reciprocity theorem [8]. In DL
transmission, the complex Gaussian channel from S to R and R to D are denoted by hsr ∼
CN (0Ns ×1 , µsr INs ) and hrd ∼ CN (0, µrd), respectively, and for UL transmission, they are denoted
by hsr ∼ CN (0, µsr ) and hrd ∼ CN (0Nd ×1 , µrdINd ), respectively. We consider slow fading such
that the channel coefficients vary independently from one frame to another frame and, they do not
change within one frame. The additive white noise ni (i ∈ {R, D}) at each receiver is represented
by a zero-mean complex Gaussian variable with variance N0 . We define the SNRs per link as
6
∆
∆
γsr =ρkhsr k2 and γrd=ρkhrd k2 and hence, the average SNRs per branch is given by γ sr = ρµsr
and γ rd = ρµrd , where ρ =
P
N0
represents the transmit SNR of the network. The maximum ratio
transmission (MRT) beamforming and maximal ratio combining (MRC) processing are applied
at the multi-antenna node to improve the overall system performance [29]. Let ν =
γsr
γrd
represent
the ratio between the source-to-relay and relay-to-destination SNRs. With LSMA, we consider
ν ≫ 1 in the DL scenario while ν ≪ 1 in the UL scenario. These two special cases are taken
into account in this paper. As observed in the numerical results, the analysis are satisfactory
even for moderate values of ν.
The DBCJ technique is applied to degrade the received signal at the untrusted relay such
that it cannot decipher the desired information. The whole transmission is performed based on
a time-division multiple-access (TDMA) based protocol such that the message transmission is
divided into two phases, i.e. the broadcast phase and the relaying phase. We consider a total
transmit power budget for S and D of P with power allocation factor λ ∈ (0, 1) such that the
transmit powers at S and D are λP and (1 − λ)P , respectively [14], [18]. As such, during the
first phase, while S transmits the intended signal with power λP , concurrently D jams with a
Gaussian noise to confuse the untrusted relay with power (1 − λ)P . For simplicity, the transmit
power at R is set to P and accordingly, in the second phase of transmission, R simply broadcasts
the amplified version of the received signal with power of P .
In order to consider the residual transceiver imperfections (after conventional compensation
algorithms have been applied) at node i, i ∈ {S, R, D}, the generalized system model from
[22] is taken into account. The imperfection at transmission and reception segments denoted
by ηit and ηir respectively, are introduced as distortion noises. The experimental results in [23]
and many theoretical investigations in [23], [31] have verified that these distortion noises are
well-modeled as Gaussian distributions due to the central limit theorem. A key property is that
the variance of distortion noise at an antenna is proportional to the signal power at that antenna
[23]. Accordingly, for the DL scenario, we have [23]
λP k t 2
S
2
2
|
)
,
diag(|h
|
...
|h
η tS ∼ CN 0,
sr1
srNs
khsr k2
t
t 2
ηD ∼ CN 0, (1 − λ)P kD ,
r
r2
ηD
∼ CN 0, P kD
|hrd |2 .
(1)
7
Furthermore, we have
ηSt ∼ CN
2
0, λP kst
,
t
(1 − λ)P kD
2
2
|
)
,
diag(|h
|
...
|h
0,
rd
rd
1
Nd
khrd k2
r2
η rD ∼ CN 0, P kD
diag(|hrd1 |2 ... |hrdNd |2 ) ,
η tD ∼ CN
2
(2)
for the UL scenario. The imperfections at R of both cases are also given by
2
ηRt ∼ CN 0, P kRt ,
i
h
2
2
r
r2
ηR ∼ CN 0, P kR λkhsr k + (1 − λ)khrd k ,
(3)
where the design parameters kit , kir > 0 for i ∈ {S, R, D} characterize the level of imperfections
in the transmitter and receiver hardware, respectively. These parameters can be interpreted as the
error vector magnitudes (EVMs). EVM determines the quality of RF transceivers and is defined
as the ratio of the average distortion magnitude to the average signal magnitude. Since the EVM
measures the joint effect of different hardware imperfections and compensation algorithms, it
can be measured directly in practice [22]. 3GPP LTE has EVM requirements in the range of
kit , kir ∈ [0.08, 0.175], where smaller values are needed to achieve higher spectral efficiencies
[24].
Remark 1 (Co-channel Interference): The analysis in this paper supports the scenario of
large enough number of interfering signals, which is typical in wireless environments where
the Gaussian assumption for the interference is valid by applying the central limit theorem [32].
B. Signal Representation
Let us denote xS and xD as the unit power information signal and the jamming signal, respectively. According to the combined impact of hardware imperfections which is well-addressed
by a generalized channel model [22], the received signal at R for DL and UL scenarios can be
expressed, respectively as
=
√
yRUL =
√
yRDL
λP wST xS
+
T
η tS
p
t T
hsr +
(1 − λ)P xD + ηD hrd + ηRr + nR ,
(4)
and
λP xS + ηSt
T
hsr +
p
T
(1 − λ)P wD
xD + η tD
T
hrd + ηRr + nR ,
(5)
8
where wS =
hsr H
khsr k
and wD =
hrd H
khrd k
represent the MRT transmit weight vectors at S and D,
respectively. Observe from (4) and (5) that the propagated distortion noises by S and D, and the
self-distortion noise at R are treated as interference at the untusted relay which is a potential
eavesdropper. As a result, the engineering insight is to beneficially forward these hardware
imperfections to make the system secure instead of injecting more artificial noise by S [9], [10],
[19], D [13]–[17], [20] or a friendly jammer [18].
Then the relay amplifies its received signal in the first phase by an amplification factor of 1
s
r
P
ρ
G=
,
(6)
=
2
E|yR |
AG λ + BG
2
2
2
t
t
where AG = (γsr − γrd)(1 + kRr 2 ) + kSt γu − kD
γv and BG = γrd(1 + kRr 2 ) + kD
γv + 1. Note
P
that in the DL scenario γu = ρ |hsri |4 /khsr k2 and γv = γrd , and in the UL scenario γu = γsr
P
and γv = ρ |hrdi |4 /khrd k2 . Then, the received signal at D for DL and UL scenarios after
self-interference (or jamming signal) cancelation are respectively, given by
√
T
t T
r
DL
,
hrd hdr + ηRt hrd + ηD
yD
=G λP wSH hsr hrd xS + GhrdnR + nD + Gη tS hsr hrd + GηRr hrd + GηD
{z
} |
|
{z
} |
{z
}
Noise
Information signal
Distortion noise
(7)
and
√
T
T
UL
yD
= G λP hsr hrd xS + Ghrd nR + nD + GηSt hsr hrd + GηRr hrd + Gη tD hrd hdr + ηRt hrd + η rD .
|
{z
} |
{z
} |
{z
}
Noise
Information signal
Distortion noise
(8)
According to (4) and (5) and after some algebraic manipulations, the SNDR at R is given by
γR =
where AR = kRr 2 ν + kSt
2 γu
γrd
t
− kD
2 γv
γrd
λν
,
AR λ + BR
(9)
t
− kRr 2 − 1 and BR = 1 + kRr 2 + kD
2 γv
γrd
+
1
.
γrd
Based on (7)
and (8) and after some manipulations, the SNDR at D can be calculated as
γD =
2
λγsr
,
AD λ + BD
(10)
2
2
2
2
2
r2 r2
r2
r2 t
r2 t
where AD = (γsr −γrd )(kD
kR + kRr 2 kRt + kR2 + kD
) + γu(kD
kS + kRt kSt + kSt ) + γv (kD
kD −
1
In our analysis, we assume that the EVMs are perfectly known and will consider estimation errors in our future work.
9
2
2
2
γu t 2
t 2
k − γγrdv kD
γrd S
t 2
+ γ1rd +
+ γγrdv kD
t
t
kRt kD
− kD
) + (ν − 1)(1 + kRr 2 ) +
2
2
2
2
r2
r2 t
t
t
kD
) + γv (kD
kD + kRt kD
+ kD
)
∆
2
r2
and BD = γrd(kRr 2 kD
+ kRr 2 kRt + kR2 +
∆
2
r2
kR2 + kD
+ 2. We define kR2 =kRt + kRr 2
2
2
t
r2
and kD
=kD
+ kD
as the total imperfection level at R and D, respectively.
Remark 2 (Perfect Hardware): The received SNRs at R and D with perfect hardware were
derived in [13], [14], [17]. When setting the level of imperfections at the nodes to zero, the
derived SNDRs in this section reduce to the special case as follows [14]
γRperfect =
λγsr
(1 − λ)γrd + 1
γDperfect =
and
λγsr γrd
.
λγsr + (2 − λ)γrd + 1
(11)
As can be seen, the mathematical structure of the derived SNDRs in (9), (10) are more complicated compared to the perfect hardware case in (11), since the terms
γu
γrd
and
γu
γrd
manifest in
the denominator. As such, it is non-trivial to propose an OPA solution for the general scenario
of imperfect hardware. This generalization is done in Section III and is a main contribution of
this work.
For DL scenario, (9) and (10) are simplified to
γR =
aL λ
λ + bL
and
γD =
cL λ
,
λ + dL
(12)
where
aL =
1
,
ξ1 − 1
bL =
τ1
,
(ξ1 − 1)ν
cL =
2
γrd
τ2 γrd + ξ1
and
2
dL =
τ3 γrd + τ4
,
ν(τ2 γrd + ξ1 )
2
2
(13)
2
2
t
r2 r2
r2
t
r2
t
t
and, τ1 = 1 + kRr 2 + kD
, τ2 = kD
kR + kRr 2 kRt + kR2 + kD
, τ3 = τ2 + kD
kD
+ kRt kD
+ kD
,
2
τ4 = 2 + kR2 + kD
and ξ1 = 1 + kRr 2 . Moreover, for UL scenario, we obtain
γR =
aS λ
1−λ
and
γD =
bS λ
,
λ + cS
(14)
where
aS =
ν
,
ξ1
bS =
γsr
(γsr − γrd )τ2 + (ν − 1)ξ1
and
cS =
τ2 γrd + ξ2
,
(γsr − γrd)τ2 + (ν − 1)ξ1
(15)
r2
and ξ2 = 2 + kR2 + kD
. Based on (12) and (14), we can conclude that although the intercept
probability is reduced by increasing the imperfection at R, the secrecy rate is also degraded.
It is, therefore, of great interest to intelligently distribute the tolerable hardware imperfections
across the transmission and reception radio frequency (RF) front ends of R (and other nodes) to
improve the secrecy rate of the network. This hardware design approach is analyzed in Section
10
VI and is a main contribution of this paper.
III. O PTIMAL P OWER A LLOCATION
This section proceeds to analyze the optimal power allocation problem with the aim of
maximizing the instantaneous secrecy rate. Extending the results in [17], [19], [20] where the
OPA was solved for perfect hardware, we investigate the power allocation factor λ under the
presence of hardware imperfections. To do so, the instantaneous secrecy rate is evaluated by [8]
i+
1 h
ln(1 + γD ) − ln(1 + γR ) .
Rs =
2 ln 2
(16)
By substituting λ = 0 into (9), (10) and then (16), we find Rs = 0. Since our goal is to distribute
the power optimally between S and D, a non-negative secrecy rate is achievable. As such, the
instantaneous secrecy rate can be reformulated as
i
1 h
ln(1 + γD ) − ln(1 + γR ) .
Rs =
2 ln 2
(17)
Given that log(·) is monotonically increasing, the maximization of Rs is equivalent to the
maximization of
∆
φ(λ) =
1 + γD
.
1 + γR
(18)
Therefore, the OPA factor λ⋆ can be obtained by solving the following constrained optimization
problem
λ⋆ = arg max
s.t.
n
o
φ(λ)
0<λ≤1
(19)
Lemma 1: f (x) is a quasi-concave function in R, if and only if [33, Section 3.4.3]
∂f (x)
∂ 2 f (x)
=0 ⇒
≤ 0.
∂x
∂x2
(20)
Based on lemma 1, we have the following corollary.
Corollary 1: f (x) is a quasi-concave function in x ∈ [x1 , x2 ], if
∂f (x)
|
∂x x=x1
and there is only one maximum over [x1 , x2 ] (despite constant functions).
> 0,
∂f (x)
|
∂x x=x2
<0
11
Proposition 1: φ(λ) is a quasiconcave function of λ in the feasible set 0 < λ ≤ 1 and the
optimal point is given by
√
bL dL (cL −aL )+ −aL bL cL dL (bL −dL )(aL dL −bL cL −bL +dL )
aL bL (cL +1)−cL dL (aL +1)
λ⋆E =
q
1 − aS (cS +1)(bS +cS +1)
bS cS
;ν ≫ 1
(21)
;ν ≪ 1
Proof: The first-order derivative of φ(λ) on λ is given by
AL λ2 +BL λ+CL
∂φ(λ) [(aL +1)λ+bL ]2 [λ+dL ]2 ; ν ≫ 1
=
,
∂λ
AS λ2 +BS2λ+CS 2
;ν ≪ 1
(22)
[1+(aL −1)λ] [λ+cL ]
where AL = −aL bL (cL +1)+cL dL (aL +1), BL = −2bL dL (aL −cL ), CL = −aL bL dL 2 +bL 2 cL dL ,
AS = (−bL (aL − 1) cL − aL (bL + 1)), BS = −2 cL (aL + bL ) and CS = −aL cL 2 + bL cL . As can
be seen from (22),
∂φ(λ)
∂λ
= 0 leads to two solutions on λ. It is easy to examine that the feasible
solution for practical values of kit and kir [22] are derived as (21). According to Corollary 1, we
find that φ(λ) is a quasiconcave function in the feasible set.
To make the further analysis tractable, we provide new compact expressions for the OPA in
the high SNR regime. In the case of DL, the expressions in (13) are simplified to
aL =
τ1
1
τ3
1
, bL =
, cL = , d L =
,
ξ1 − 1
(ξ1 − 1)ν
τ2
τ2 ν
(23)
and in the case of UL scenario, the expressions in (15) are changed to
aS =
ν
1
ν
, bS =
, cS =
.
ξ1
(ν − 1)τ2
ν −1
(24)
By substituting (23) and (24) into (21), the OPA solutions in the high SNR regime can be
expressed in the following tractable forms
θL
ν
⋆
λHigh =
1 − θS ν
where θL =
q
τ3
(τ
τ2 1
− τ3 ) +
τ3
(ξ
τ2 1
; DL
; UL
− 1) − τ3 and θS =
q
1+τ2
.
ξ1
(25)
12
IV. E RGODIC S ECRECY R ATE
In this section, we derive the ESR of the proposed secure transmission scheme in each case
of DL and UL scenarios. Since it is not straightforward to obtain a closed-form expression for
the exact ESR of DL and UL scenarios (the exact ESR includes double integral expressions
due to the complicated structures of (21)), we therefore proceed by first deriving new analytical
expressions for the ESR in the high SNR regime that can be applied to arbitrary channel fading
distributions. Based on these, new closed-form expressions are derived for the ESR in Rayleigh
fading channels. Despite prior works in the literature [14], [16]–[21] that investigated the ESR
based on perfect hardware assumption in various untrusted relaying networks, we take into
account hardware imperfections. The new results in this section generalize the recent results in
[14], [17].
The ESR as a useful secrecy metric representing the rate below which any average secure
transmission rate is achievable [2]. As such, the ESR is given by
n o
Rs = E Rs =
o
n
oi
1 h n
E ln(1 + γD ) − E ln(1 + γR ) .
2 ln 2 |
{z
} |
{z
}
T1
(26)
T2
In the following, we proceed to evaluate the parts T1 and T2 and then Rs for each case of DL
and UL scenarios. Towards this goal, we present the following useful lemma.
Lemma 2: For positive constants α1 , α2 and α3 , and non-negative r.v. Γ, the cdf of the new
b = α1 Γ is derived as
r.v. Γ
α2 Γ+α3
FΓb (x) =
FΓ α3 x
α1 −α2 x
1
;0 ≤ x <
;x ≥
α1
α2
(27)
α1
α2
Proof: We start from the definition of the cdf as follows
FΓb (x) = Pr
n
o
n
o
α1 Γ
≤ x = Pr Γ(α1 − α2 x) ≤ α3 x ,
α2 Γ + α3
where the last probability equals to one for α1 − α2 x < 0. Otherwise, it equals to FΓ
(28)
α3 x
α1 −α2 x
.
13
1) Downlink Scenario: By plugging (25) into (12), we obtain
θL
,
θL (ξ1 − 1) + τ1
θL γrd
γD =
.
(τ2 θL + τ3 )γrd + ξ1 θL + τ4
γR =
(29)
(30)
We find that all the terms in (29) and (30) are deterministic constants which leads to the secrecy
rate ceiling in the high SNR regime.
Based on lemma 2 and (30), the part T1 in (26) is given by
n
T1 = E ln 1 +
o
θL γrd
=
(τ2 θL + τ3 )γrd + ξ1 θL + τ4
Z
θL
τ2 θL +τ3
0
1 − Fγrd
(ξ1 θL +τ4 )x
θL −(τ2 θL +τ3 )x
1+x
dx, (31)
where the last equation follows from the integration by parts. The expression in (31) is straightforwardly evaluated for any channel fading distribution, either directly or by a simple numerical
integration.
Furthermore, based on (30) the part T2 is a constant value as
T2 = ln 1 +
θL
.
θL (ξ1 − 1) + τ1
(32)
We conclude from (32) that the amount of information leakage is independent of the transmit
SNR and the position of the relay, and only depends on the EVMs at network nodes. By replacing
(31) and (32) into (26), the compact ESR expression is achieved for any channel distribution.
For the case of Rayleigh fading, due to the fact that γrd is an exponential r.v. and applying
[34, Eq. (4.337.2)], the part T1 can be expressed in a closed-form solution. By substituting this
and (32) into (26), the closed-form ESR expression becomes
Rs
DL
=
where r1 =
i
1
1
1
θL
1 h r γ1
e 2 rd Ei(−
,
) − e r1 γ rd Ei(−
) − ln 1 +
2 ln 2
r2 γ rd
r1 γ rd
θL (ξ1 − 1) + τ1
(1+τ2 )θL +τ3
ξ1 θL +τ4
and r2 =
τ2 θL +τ3
.
ξ1 θL +τ4
(33)
We conclude from (33) that the ESR is exclusively
characterized by the level of imperfections over nodes and γ rd which is a function of the transmit
SNR and the distance-dependent channel gain µrd.
14
2) Uplink Scenario: Substituting (25) into (14) yields
1
λ⋆H ν
≈p
,
⋆
(1 − λH )ξ1
ξ1 (1 + τ2 )
γsr
q
.
γD ≈
2
)γ
+
ξ
−
ξ
τ2 (1 + 1+τ
sr
2
1
ξ1
γR =
(34)
(35)
Observe from (34) and (35) that only the first hop SNR, γsr contributes to the secrecy rate
performance. Following the similar procedure as the DL scenario, the ESR performance of the
UL case for arbitrary fading distribution can be expressed as
Rs
UL
1
=
2 ln 2
Z
τ2 (1+
1
r
1+τ2
)
ξ1
1 − Fγsr (
(ξ2 −ξ1 )x
q
1−τ2 (1+
1+x
0
1+τ2
)x
ξ1
)
dx − ln(1 + p
1
) .
ξ1 (1 + τ2 )
(36)
For the case of Rayleigh fading, the closed-form ESR expression is given by
Rs
where t1 =
UL
=
i
1
1
1
1
1 h t 1γ
,
e 2 sr Ei(−
) − e t1 γsr Ei(−
) − ln 1 + p
2 ln 2
t2 γ sr
t1 γ sr
ξ1 (1 + τ2 )
1+τ2 (1+
q
1+τ2
)
ξ1
ξ2 −ξ1
and t2 =
τ2 (1+
q
1+τ2
)
ξ1
ξ2 −ξ1
(37)
. It is observed from (37) that the ESR is entirely
determined by the average channel gain of the first hop, the transmit SNR and the level of
imperfections of all the network nodes. We also find that increasing the number of antennas at
D has no impact on the ESR when Nd is large.
V. S ECRECY O UTAGE P ROBABILITY
In this section, similar to our ESR results, general expressions are first presented for the SOP
that can be applied to any channel distribution, under the presence of transceiver imperfections
and in the high SNR regime. Based on these, we derive novel closed-form expressions for the
SOP in Rayleigh fading channels.
The SOP denoted by Pso is a criterion that determines the fraction of fading realizations
where a secrecy rate Rt cannot be supported [13]. Accordingly, the overall SOP is defined as
the probability that a system with the instantaneous secrecy rate Rs is not able to support the
n
o
target transmission rate Rt ; Pso = Pr Rs < Rt .
In the following, we focus on each case of DL and UL, respectively.
15
1) Downlink Scenario: Substituting (30) into (17) and then based on the SOP definition we
obtain
θL γrd
ft
≤R
PsoDL = Pr
(τ2 θL + τ3 )γrd + ξ1 θL + τ4
1+ θL
ft
τ2 θL +τ3
(ξ1 θL +τ4 )R
1
Fγ
;
R
<
log
t
2
rd
ft
2
1+γR
θL −(τ2 θL +τ3 )R
=
1+ θL
τ2 θL +τ3
1
1
; Rt ≥ 2 log2
1+γR
(38)
ft = 22Rt (1+γR)−1 and γR is in (29), and the last equation follows from using lemma 2.
where R
It is worth pointing out that the SOP expressions in (38) allows the straightforward evaluation of
the SOP for any channel fading distribution by a simple numerical integration. We can conclude
from (38) that the SOP is always 1 for target transmission rates more than a threshold (which
only depends on the EVMs of the nodes). Interestingly, this event holds for any channel fading
distribution, any network topology and any transmit SNR. Therefore as explained in Section IV,
some secrecy rates can never be achieved due to secrecy rate ceiling. Furthermore, we conclude
that for target transmission rates smaller than the threshold, Pso approaches zero with increasing
SNR (similar to perfect hardware) whereas the SOP always equals one for target transmission
rates larger than the threshold. This result is fundamentally different to the perfect hardware
case where the SOP goes to zero with increasing SNR and for any target transmission rate [13],
[15], [17].
For Rayleigh fading channels, γrd is an exponential r.v. and therefore, our new and simple
closed-form SOP expression in the presence of transceiver hardware imperfection is given by
PsoDL =
1 − exp −
1
ft
(ξ1 θL +τ4 )R
ft )γ
(θL −(τ2 θL +τ3 )R
rd
; Rt < 21 log2
; Rt ≥ 21 log2
1+
1+
θL
τ2 θL +τ3
1+γR
θL
τ2 θL +τ3
1+γR
(39)
We note that the results of this section generalize the results of [17] which were derived for the
case of untrusted relaying with perfect hardware.
2) Uplink Scenario: Similar to the DL case, the SOP can be obtained by substituting γD in
16
(35) into (17) and using the SOP definition. This yields
1
1+ τ2 (1+r 1+τ2 )
f
ξ1
(ξ2 −ξ1 )Rt
q
Fγsr
; Rt < 21 log2
1+τ2 f
1+γR
1−τ2 (1+
)
R
UL
t
ξ1
Pso =
1
1+ τ2 (1+r 1+τ2 )
ξ1
1
; Rt ≥ 21 log2
1+γR
(40)
the closed-form SOP is derived as
1
1+ τ2 (1+r 1+τ2 )
f
ξ1
−(ξ
−ξ
)
R
t
1
2
1
q
1 − exp
; Rt < 2 log2
1+τ2 f
1+γR
(1−τ
(1+
)
R
)γ
t sr
2
ξ1
PsoUL =
1
1+ τ2 (1+r 1+τ2 )
ξ1
1
; Rt ≥ 12 log2
1+γR
(41)
ft = 22Rt (1 + γR ) − 1 and γR is in (34). For the special case of Rayleigh fading channels,
where R
As observed in the numerical results, the closed-form expressions (39) and (41) are sufficiently
tight at medium and high transmit SNRs.
VI. H ARDWARE D ESIGN
In this section, we aim to gain some insights into the design of RF hardware to maximize the
secrecy rate in untrusted relaying networks. Depending on the fixed cost of each network node,
we show how the RF segments at the transmission and reception front ends can be designed.
Specially, given the maximum tolerable hardware imperfection of each node, we derive new
analytical results characterizing how the hardware imperfections should be distributed between
the transmission RF segment and the reception RF segment of each node to maximize the secrecy
rate. Therefore, we should find kit and kir , i ∈ {S, R, D} to maximize the secrecy rate such that
kit + kir = kitot . Mathematically speaking, our goal is to solve the following optimization problem
t
r
(kRt , kRr , kD
, kD
) = arg max φ(λ⋆ )
(42)
s.t. kRt + kRr = kRtot
t
r
tot
kD
+ kD
= kD
Based on (30), (35) and (17), the instantaneous secrecy rate is an increasing function of the
transmit SNR. Since it is our aim to achieve high transmission rates, we consider the asymptotic
SNR regime ρ → ∞ [22] to solve the hardware design problem (42). As observed in numerical
studies, the results of the high SNR analysis can be applied successfully at finite SNRs.
17
In the asymptotic SNR regime and for any random distributions on γsr and γrd, the asymptotic
received SNDRs at R and D are respectively, given by
θL
; DL
θL (ξ1 −1)+τ1
∞
,
γR =
√ 1
; UL
(43)
ξ1 (1+τ2 )
and
γD∞
=
τ
θL
2 θL +τ3
; DL
1
q
; UL
τ2 (1+
.
1+τ2
)
ξ1
By substituting (43) and (44) into (18), the secrecy rate ceiling is given by
((1+τ2 )θL +τ3 )((ξ1 −1)θL +τ1 )
; DL
(ξ1 θL +τ1 )(τ2 θL +τ3 )
∞
√
√ √
φ =
√ξ1 (τ2√+1)(τ2 +√ ξ1√ τ2 +1)
; UL
τ2 ( ξ1 + τ2 +1)( ξ1 τ2 +1+1)
(44)
(45)
Some conclusions and insights can be concluded from (45). First, the secrecy rate ceiling
event appears in the asymptotic SNR regime, which significantly limits the performance of the
system. This event is different from the perfect hardware case, in which the ESR increases with
increasing SNR. Note that this ceiling effect is independent of the fading distribution.
In the following, we focus on the of DL and UL scenarios separately and then conclude about
the hardware design of the overall network.
A. Downlink Scenario:
In the following, we proceed to solve the optimization problem (42) by independently discussing on the hardware design at R and D as follows.
Proposition 2: Suppose kRt + kRr = kRtot , hence the secrecy rate ceiling is maximized if kRt =
kRr =
tot
kR
.
2
Proof: Please see Appendix A.
t
r
tot
Proposition 3: Suppose kD
+ kD
= kD
, thus the secrecy rate ceiling is maximized if
q
2
tot 2
tot 2
tot 4
tot 2
+4kD
+12kR2 −4kD
+9
2kR+2kD +3− 4kR4 +8kR2 kD
t
kD =
.
tot
4kD
(46)
18
Proof: Please see Appendix B.
B. Uplink Scenario:
Similar to DL scenario, two propositions are provided as follows.
Proposition 4: Suppose kRt + kRr = kRtot , thus the secrecy rate ceiling is maximized if kRt =
kRr =
tot
kR
.
2
Proof: Please see Appendix C.
t
r
tot
Proposition 5: Suppose kD
+ kD
= kD
, hence the secrecy rate ceiling is a monotonically
r
decreasing function of kD
.
Proof: In this case, we have
∂φ∞ ∂τ2
∂φ∞
=
,
r
r
∂kD
∂τ2 ∂kD
where
∂τ2
r
∂kD
r
r
+2kD
> 0 and
= 2kRr 2 kD
∂φ∞
∂τ2
in (67) is negative in the feasible set. As such,
(47)
∂φ∞
r
∂kD
< 0.
Based on Propositions 2–5, we provide the following corollary as a conclusion of the analysis
which provides new insights into the system design.
Corollary 2: Consider a cooperative network in which one multiple antennas node communicates with a single antenna node via a single antenna untrusted relay. Let us assume a predefined
cost can be assigned to each node. To maximize the secrecy rate of this network the following
considerations should be taken into account:
•
According to Propositions 2 and 4, the total cost for the relay node should be divided by
half between the transmission and reception RF front ends, i,e., it is better to apply the same
level of imperfections at every transceiver chain, instead of utilizing a mix of high-quality
and low-quality transceiver chains.
•
According to Proposition 5, to design the multiple antennas node, the designers are persuaded to use higher-quality hardware in reception RF front end and lower-quality hardware
19
4
LSMA−S, Exact OPA Simulation
LSMA−D, Exact OPA Simulation
LSMA−S, Approximate OPA using eq. (33)
LSMA−D, Approximate OPA using eq. (37)
LSMA−S, EPA
LSMA−D, EPA
Secrecy rate ceiling using eq. (45)
Ergodic Secrecy Rate (bits/s/Hz)
3.5
3
2.5
Perfect hardware
2
1.5
1
Imperfect hardware
0.5
0
0
5
10
15
20
25
30
35
40
45
Transmit SNR [dB]
Fig. 2. Ergodic secrecy rate versus transmit SNR for exact and the derived closed-form expressions under perfect and imperfect
transceiver hardwares. Number of antennas at source or destination is set to 16. For imperfect case with k = 0.1, the secrecy
rate ceiling is observed.
in the transmission RF front end, i.e, the hardware imperfections at the reception end of
the multiple antennas node should be close to zero.
•
According to Proposition 3, to design the single antenna node, the quality of RF requirements
at the transmission end should obeys from (46). As observed in the numerical examples,
t
we obtain kD
>
tot
kD
2
for typical values of EVMs.
VII. N UMERICAL R ESULTS
AND
D ISCUSSIONS
In this section, numerical results are provided to verify the accuracy of the derived closedform expressions in Section IV and V for LSMA at S (LSMA-S) and LSMA at D (LSMA-D),
respectively, and also the cases of multiple antennas at S (MA-S) and multiple antennas at D
(MA-D). We compare our LSMA-based ESR performance with the exact ESR with Monte-Carlo
simulations where the OPA is numerically evaluated for finite numbers of antennas using the
bisection method. In addition, the equal power allocation (EPA) between S and D (i.e., λ = 0.5)
is plotted as a benchmark. Furthermore, the concepts of secrecy rate ceiling and the practical
hardware insights from Section VI are numerically presented. In our numerical evaluations, the
20
2.4
2.2
Ergodic Secrecy Rate (bits/s/Hz)
Case of k=0.05
2
1.8
1.6
1.4
1.2
Case of k=0.1
1
0.8
MA−S, Exact OPA Simulation
MA−D, Exact OPA Simulation
MA−S, Approximate OPA using eq. (33)
MA−D, Approximate OPA using eq. (37)
0.6
0.4
0
5
10
15
20
25
30
35
40
45
Transmit SNR [dB]
Fig. 3. Ergodic secrecy rate versus transmit SNR for exact and the derived closed-form expressions under different levels of
hardware imperfections; k ∈ {0.05, 0.1}. Number of antennas at source or destination is set to 4.
transmission links between nodes are modeled by the Rayleigh fading channel and the average
channel gains are specified as µsr = µrd = 10. Moreover, for LSMA the number of antennas is
set to 16, and for MA the number of antennas is set to 4.
Fig. 2 depicts the ESR versus transmit SNR ρ in dB for both cases of DL and UL and for
t
r
perfect (k = kRt = kRr = kSt = kD
= kD
= 0) and imperfect (k = 0.1) cases. The number of
antennas at S and D are set to Ns = Nd = 16. It is observed from the figure that the Monte-Carlo
simulation of the exact OPA evaluated using the bisection method is in good agreement with
the derived high SNR closed-form solutions in (33) and (37) for both perfect and imperfect
hardwares. In contrast to perfect hardware, the figure shows that the ESR ceiling phenomenon
occurs for imperfect hardware which reveals the performance limits of hardware-constrained
realistic networks in the high SNR regime. This figure also reveals that hardware imperfections
have low impact at low SNRs, but are significant in the high SNR regime. Furthermore, it is
observed that the proposed OPA increases the secrecy rate floor by approximately 1 bits/s/Hz
and 0.9 bits/s/Hz for DL and UL scenarios, respectively compared to the EPA (λ = 0.5).
In Fig. 3, we examine the accuracy of the derived closed-form solutions for MA-S and MA-D
by considering Ns = Nd = 4. As can be seen, the numerical and the theoretical curves are in
21
0
10
OPA, R =2 bits/s/Hz
t
EPA, R =0.25 bits/s/Hz
−1
Secrecy Outage Probability
10
t
OPA, R =1 bits/s/Hz
t
−2
10
OPA, Rt=0.25 bits/s/Hz
−3
10
−4
10
0
Imperfect, Exact OPA Simulation
Perfect, Exact OPA Simulation
Imperfect, Approximate OPA using eq. (39)
Perfect, Approximate OPA using eq. (39)
Imperfect, EPA
Perfect, EPA
5
10
15
20
25
30
35
40
Transmit SNR [dB]
Fig. 4. Secrecy outage probability versus transmit SNR for DL transmission, with different target transmission rates and under
perfect (k = 0) and imperfect hardware (k = 0.1).
good agreement across all SNR regimes. Moreover, it is observed that by increasing the level
of hardware imperfections from k = 0.05 to k = 0.1, the achievable secrecy rate is degraded
approximately 1 bits/s/Hz in the high SNR regime.
Figs. 4 and 5 show the SOP as a function of the transmit SNR for LSMA based DL and UL
scenarios, respectively, and for different target secrecy rates. The theoretical curves were plotted
by the derived analytical expressions in (39) and (41) which are well-tight with the marker
symbols generated by the Monte-Carlo simulations. As observed from these figures, there is
only a negligible performance loss caused by transceiver hardware imperfections in the low
target secrecy rate of Rt = 0.25 bits/s/Hz, but by increasing the target secrecy rate to Rt = 1
bits/s/Hz or Rt = 2 bits/s/Hz, substantial performance loss is revealed. Interestingly, for Rt = 2
bits/s/Hz, the network with imperfect hardware is always in outage and secure communications is
unattainable-irrespective of the transmit SNR. This is exactly predicted by our analytical results
in section V. The reason is that this target secrecy rate is more than the derived thresholds
in (39) and (41), and as mentioned, the SOP of the system always equals one for Rt more
the thresholds. It can also be seen from the figures that despite the OPA technique that the
SOP curves with imperfect hardware and with perfect hardware have the same slope (and thus,
22
0
10
OPA, R =2 bits/s/Hz
t
−1
10
Secrecy Outage Probability
EPA, R =0.25 bits/s/Hz
t
OPA, R =1 bits/s/Hz
−2
t
10
−3
10
OPA, Rt=0.25 bits/s/Hz
−4
10
−5
10
0
Imperfect, Exact OPA Simulation
Perfect, Exact OPA Simulation
Perfect, Approximate OPA using eq. (41)
Perfect, Approximate OPA using eq. (41)
Imperfect, EPA
Perfect, EPA
5
10
15
20
25
30
35
40
Transmit SNR [dB]
Fig. 5. Secrecy outage probability versus transmit SNR for UL transmission, with different target transmission rates and under
perfect (k = 0) and imperfect hardware (k = 0.1).
hardware imperfections lead to only an SNR offset which is unveiled as a curve shifting to the
right), the SOP performance of the EPA technique approaches a non-zero saturation value in
the high SNR regime for imperfect hardware. This observation reveals the secrecy performance
advantage of the proposed OPA scheme compared with EPA.
Finally, we provide Figs. 6 and 7 to illustrate the insights for designing practical systems that
were presented in Section VI. In the simulation, we assume that the total hardware imperfection
tot
over each node equals to 0.2, i.e., kRtot = kD
= 0.2. Based on Propositions 2 and 4, to maximize
the secrecy rate, we should design the transmission and reception RF front ends at R such that
t
r
kRt = kRr = 0.1. For LSMA at S, based on Proposition 3, we obtain kD
= 0.13 and kD
= 0.07
while for LSMA at D and based on Proposition 5, we should design the hardwares such that
t
r
t
r
kD
= 0.2 and kD
= 0. By defining the hardware imperfection vector as IV = [kRt , kRr , kD
, kD
],
we consider the following four different hardware design schemes:
•
Design 1: R and D are designed randomly, for example IV= [0.15, 0.05, 0.1, 0.1],
•
Design 2: R is designed optimally based on Propositions 2 and 4 while D is designed
randomly; IV= [0.1, 0.1, 0.1, 0.1],
•
Design 3: R is designed randomly while D is designed optimally; For LSMA at S, IV=
23
1.6
Ergodic Secrecy Rate (bits/s/Hz)
1.4
1.2
OPA, Design 1
OPA, Design 2
OPA, Design 3
OPA, Design 4
EPA, Design 4
1
0.8
0.6
0.4
0.2
0
0
5
10
15
20
25
30
35
40
45
Transmit SNR [dB]
Fig. 6. Ergodic secrecy rate versus transmit SNR for LSMA at S. Various imperfection distributions over RF transmission and
tot
tot
reception ends are considered for kR
= kD
= 0.2.
[0.15, 0.05, 0.13, 0.07] and for LSMA at D, IV= [0.15, 0.05, 0.2, 0], and
•
Design 4: R and D are designed optimally; For LSMA at S, IV= [0.1, 0.1, 0.13, 0.07] and
for LSMA at D, IV= [0.1, 0.1, 0.2, 0].
The results depict that the hardware design 4 which is based on Propositions 2-5 provides
higher ESR performance compared to the case of random hardware design (Design 1) and
the cases of optimizing only one node (Designs 2 and 3). Furthermore, they show that the
analysis presented in Section VI (which was based on high SNR analysis), can be utilized
auspiciously at medium SNRs. In addition, as can be seen from these figures and mentioned
before, different hardware designs have the ESR performance close together at low SNR regime,
while the difference between the ESR performance of the designs is large at high SNR regime.
Finally, we can understand from the figure that the proposed OPA together with Design 4
significantly outperforms the scenario of EPA with Design 4.
VIII. C ONCLUSION
Physical radio-frequency (RF) transceivers are inseparable segments in both traditional and
new emerging wireless networks. In the literature, very few works have considered the impact
24
2
Ergodic Secrecy Rate (bits/s/Hz)
1.8
1.6
1.4
OPA, Design 1
OPA, Design 2
OPA, Design 3
OPA, Design 4
EPA, Design 4
1.2
1
0.8
0.6
0.4
0
5
10
15
20
25
30
35
40
45
Transmit SNR [dB]
Fig. 7. Ergodic secrecy rate versus transmit SNR for LSMA at D. Various imperfection distributions over RF transmission and
tot
tot
reception ends are considered for kR
= kD
= 0.2.
of hardware imperfections on security based transmissions and little is understood regarding
this impact on untrusted relaying networks. In this paper, by taking hardware imperfections
into consideration, we proposed an optimal power allocation (OPA) strategy to maximize the
instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination
and an untrusted amplify-and-forward (AF) relay. Based on our OPA solutions, new closed-form
expressions were derived for the ergodic secrecy rate (ESR) and secrecy outage probability (SOP)
with Rayleigh fading channels. The expressions effectively characterize the impact of hardware
imperfections and manifest the existence of a secrecy rate ceiling that cannot be enhanced by
increasing SNR or improving fading conditions. They also illustrate that hardware imperfections
have low impact at low SNRs, but are significant in the high SNR regime. This issue reveals that
hardware imperfections should be taken into account when developing high rate systems such as
LTE-Advanced and 5G networks. To improve the secrecy performance of the network, we finally
presented the hardware design approach. Numerical results depict that optimally distributing the
hardware imperfections between the transmission and reception RF segments can further improve
the secrecy performance.
25
A PPENDIX A
Let take the first-order derivative of φ∞ on kRt using the chain rule in partial derivations as
follows
∂φ∞ ∂θL ∂τ1
∂θL ∂τ2
∂θL ∂τ3
∂θL ∂ξ1
∂φ∞
=
+
+
+
∂kRt
∂θL ∂τ1 ∂kRt
∂τ2 ∂kRt
∂τ3 ∂kRt
∂ξ1 ∂kRt
∂φ∞ ∂τ1
∂φ∞ ∂τ2
∂φ∞ ∂τ3
∂φ∞ ∂ξ1
+
+
+
+
,
∂τ1 ∂kRt
∂τ2 ∂kRt
∂τ3 ∂kRt
∂ξ1 ∂kRt
(48)
where using (45), we obtain
κ1 θL 2 + κ2 θL + κ3
∂φ∞
=
,
∂θL
(θL ξ1 + τ1 )2 (τ2 θL + τ3 )2
τ3
∂θL
= p
,
∂τ1
2 τ2 τ3 (τ1 − τ3 )
p
τ3 (τ1 − τ3 ) τ3 (ξ1 − 1)
∂θL
,
=−
−
√
∂τ2
2τ2 τ2
τ22
ξ1 − 1
τ1 − 2τ3
∂θL
+
= p
− 1,
∂τ3
τ2
2 τ2 τ3 (τ1 − τ3 )
τ3
∂θL
= ,
∂ξ1
τ2
∞
θL (τ2 θL + τ3 + θL )
∂φ
=
,
∂τ1
(θL ξ1 + τ1 )2 (τ2 θL + τ3 )
∂φ∞
θ2 (ξ1 θL + τ1 − θL )
=− L
,
∂τ2
(τ2 θL + τ3 )2 (ξ1 θL + τ1 )
θL (ξ1 θL + τ1 − θL )
∂φ∞
=−
,
∂τ3
(τ2 θL + τ3 )2 (ξ1 θL + τ1 )
∂φ∞
θL2 (τ2 θL + τ3 + θL )
=
,
∂ξ1
(ξ1 θL + τ1 )2 (τ2 θL + τ3 )
(49)
(50)
(51)
(52)
(53)
(54)
(55)
(56)
(57)
26
where κ1 = −τ1 τ2 (τ2 + 1) + τ3 ξ1 (ξ1 − 1), κ2 = −2τ1 τ3 (τ2 − ξ1 + 1) and κ3 = τ1 τ3 (τ1 − τ3 ). By
substituting kRr = kRtot − kRt into (45), we obtain
∂τ1
∂kRt
∂τ2
∂kRt
∂τ3
∂kRt
∂ξ1
∂kRt
= −2kRtot + 2kRt ,
(58)
2
r 2 tot
= −2kD
(kR − kRt ) − 2(kRtot − kRt )kRt + 2(kRtot − kRt )2 kRt + 4kRt − 2kRtot ,
2
(59)
2
r 2 tot
t
= −2kD
(kR − kRt ) − 2(kRtot − kRt )kRt + 2(kRtot − kRt )2 kRt + 4kRt − 2kRtot + 2kRt kD
, (60)
= −2kRtot + 2kRt .
(61)
Substituting (49)–(61) into (48) and after tedious manipulations yields
r2
4(1 − kD
)(kRtot − 2kRt )
∂φ∞
=
2 .
∂kRt
t 2
t tot
tot 2
r2
t 2
4kR − 4kR kR + 2kR + 2kD + kD
(62)
Expression (62) shows that φ∞ is a concave function of kRt in the feasible set and kRt =
the single solution to
∂φ∞
t
∂kR
tot
kR
2
is
= 0.
A PPENDIX B
Following the similar approach in Proposition 2, we should evaluate
∂φ∞
t .
∂kD
r
Let substitute kD
=
tot
t
kD
− kD
into τ1 , τ2 , τ3 and then compute the following derivations
∂τ1
∂τ2
tot
t
tot
t
= 1,
= −2kRr 2 (kD
− kD
) − 2kD
+ 2kD
,
(63)
t
t
∂kD
∂kD
∂τ3
2
tot
t
tot
t
t
t
tot
t 2
t 2 tot
t
= −2kRr 2 (kD
− kD
) − 2kD
+ 2kD
+ 2kD
(kRt + 1) + 2kD
(kD
− kD
) − 2kD
(kD − kD
).
t
∂kD
(64)
The expression
∂φ∞
t
∂kD
t
can be obtained similar to (48) by changing kRt to kD
. Then by substituting
(49)–(57) and (63), (64) into
∞
∂φ
t
∂kD
∂φ∞
t ,
∂kD
and after manipulations, we obtain
t
t 2 tot
t tot 2
t
tot
2 2kR2 kD
− 2kD
kD + 2kD
kD + 3kD
− 2kD
=−
.
2
2
t 2
t tot
tot 2
2kR + 3kD − 4kD kD + 2kD
(65)
t
It is straightforward to see that (65) is a concave function of kD
in the feasible set and the single
solution to
∂φ∞
t
∂kD
= 0 is simply calculated.
27
A PPENDIX C
We can write
∂φ∞ ∂τ2
∂φ∞ ∂ξ1
∂φ∞
=
+
.
∂kRr
∂τ2 ∂kRr
∂ξ1 ∂kRr
(66)
Using (45) yields
∞
∂φ
∂τ2
∂φ∞
∂ξ1
i
h
p
ξ1 (2 (τ2 +2) ξ1−τ2 2 ) ξ1 (1+τ2 )+2ξ1(τ2 (ξ1+1−τ2 )+ξ1+1)
,
=−
2
2
√ √
√ √
2τ2 2
ξ1 1+τ2+ 1 ξ1+ ξ1 1+τ2
h
i
p
(1 + τ2 ) (τ2 + 2ξ1) ξ1 (1 + τ2 ) + 2 (1 + τ2 ) ξ1
=
2
2 .
√ √
√ √
2τ2
ξ1 1 + τ2 + 1 ξ1 + ξ1 1 + τ2
(67)
(68)
Considering kRt = kRtot − kRr , one can obtain
∂τ2
2
r2
= 4kRr 3 − 6kRr 2 kRtot + (2kD
+ 2kRtot + 4)kRr − 2kRtot ,
∂kRr
∂ξ1
= 2kRr .
r
∂kR
By substituting (67)–(70) into (66) and solving
∂φ∞
r
∂kR
= 0 yields kRr =
(69)
(70)
tot
kR
.
2
Acknowledgements
The authors would like to thank Prof. Lajos Hanzo for helpful comments to improve the paper.
R EFERENCES
[1] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical-layer security in multiuser
wireless networks: A survey,” IEEE Commun. Surveys and Tutorials, vol. 16, no. 3, pp. 3062-3080, Feb. 2014.
[2] X. Chen, D. W. K. Ng, W. Gerstacker, and H-H. Chen, “A Survey on Multiple-Antenna Techniques for Physical Layer
Security,” IEEE Commun. Surveys Tuts., doi: 10.1109/COMST.2016.2633387.
[3] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, “Safeguarding 5G wireless communication networks
using physical layer security,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
[4] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up MIMO:
Opportunities and challenges with very large arrays,” IEEE Sig. Proc. Mag., vol. 30, no. 1, pp. 40-46, Jan. 2013.
[5] E. G. Larsson, F. Tufvesson, O. Edfors, and T. L. Marzetta, “Massive MIMO for next generation wireless systems,” IEEE
Commun. Mag., vol. 52, no. 2, pp. 186-195 , Feb. 2014.
[6] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of BS antennas,” IEEE Trans. Wireless Commun.,
vol. 9, no. 11, pp. 3590-3600, Nov. 2010.
[7] D. Kapetanovic, G. Zheng, and F. Rusek, “Physical layer security for massive MIMO: An overview on passive
eavesdropping and active attacks,” IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
28
[8] X. He and A. Yener, “Two-hop secure communication using an untrusted relay: A case for cooperative jamming,” in Proc.
IEEE Globecom, New Orleans, LA, Dec. 2008, pp. 15.
[9] M. R. A. Khandaker and K-K Wong, “Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers,” IEEE
Trans. Inf. Forens. Sec., vol. 10, no. 1, pp. 40-54, Jan. 2015.
[10] M. R. A. Khandaker and K.-K. Wong, “Robust secrecy beamforming in the presence of energy-harvesting eavesdroppers,”
IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 10-13, Feb. 2015.
[11] Y. Liu, A. P. Petropulu, and H. V. Poor, “Joint decode-and-forward and jamming for wireless physical layer security with
destination assiatance,” in Proc. Asilomar Conference on Signals, Systems and Computer (ASILOMAR11), Pacific Grove,
USA, Nov. 2011.
[12] J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE J.
Sel. Areas Commun., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
[13] J. Huang, A. Mukherjee, and A. L. Swindlehurst, “Secure communication via an untrusted non-regenerative relay in fading
channels,” IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
[14] L. Sun, T. Zhang, Y. Li, and H. Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy
relay nodes,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
[15] W. Wang, K. C. Teh, and K. H. Li, “Secure Cooperative AF Relaying Networks with Untrustworthy Relay Nodes,” in
IEEE Globecom, Washington, DC. 2016, pp. 1-6.
[16] A. Mabrouk, K. Tourki, and N. Hamdi, “Secure cooperative untrusted-relay network with outdated CSI,” in IEEE
International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, 2016, pp. 90-95.
[17] A. Kuhestani, A. Mohammadi, and M. Noori, “Optimal Power Allocation to Improve Secrecy Performance of NonRegenerative Cooperative Systems Using an Untrusted Relay,” IET Commun., vol. 10, no. 8, pp. 962-968, May 2016.
[18] A. Kuhestani, A. Mohammadi, and P. L. Yeoh, “Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted
Relaying,” Submitted to IEEE Trans. Veh. Technol., Apr. 2017.
[19] L. Lv, J. Chen, L. Yang, and Y. Kuo, “Improving physical layer security in untrusted relay networks: cooperative jamming
and power allocation,” IET Commun., vol. 11, no. 3, pp. 393-399, Jul. 2017.
[20] T. Mekkawy, R. Yao, F. Xu, and L. Wang, “Optimal power allocation for achievable secrecy rate in an untrusted relay
network with bounded channel estimation error,” in 26th Wireless and Optical Communication Conference (WOCC),
Newark, NJ, USA, 2017, pp. 1-5.
[21] L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, “Security-Aware Relaying Scheme for Cooperative Networks with Untrusted
Relay Nodes,” IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Sep. 2014.
[22] T. Schenk, RF Imperfections in High-Rate Wireless Systems: Impact and Digital Compensation, Springer, 2008.
[23] C. Studer, M. Wenk, and A. Burg, “MIMO transmission with residual transmit-RF impairments,” in Proc. ITG/IEEE
Workshop on Smart Antennas, Feb. 2010.
[24] E. Bjornson, A. Papadogiannis, M. Matthaiou, and M. Debbah, “On the impact of transceiver impairments on AF relaying,”
in Proc. 2013 IEEE Int. Conf. Acoustics, Speech, Signal Process.
[25] A. A. A. Boulogeorgos, D. S. Karas, and G. K. Karagiannidis, “How Much Does I/Q Imbalance Affect Secrecy Capacity?,”
IEEE Commun. Lett., vol. 20, no. 7, pp. 1305-1308, July 2016.
[26] J. Zhu, R. Schober, and V. K. Bhargava, ”Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise,”
IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications, pp. 1-5, Jul. 2016.
[27] J. Zhu, R. Schober and V. K. Bhargava, “Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems,”
IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245-2261, Mar. 2016.
29
[28] J. Chen, X. Chen, W. H. Gerstacker and D. W. K. Ng, “Resource Allocation for a Massive MIMO Relay Aided Secure
Communication,” IEEE Trans. Inf. Forens. Sec., vol. 11, no. 8, pp. 1700-1711, Aug. 2016
[29] J. Chen, H. Chen, H. Zhang and F. Zhao, “Spectral-Energy Efficiency Tradeoff in Relay-Aided Massive MIMO Cellular
Networks With Pilot Contamination.,” IEEE Access, vol. 4, no. , pp. 5234-5242, Sept. 2016.
[30] L. Wang, Y. Cai, Y. Zou, W. Yang and L. Hanzo, “Joint Relay and Jammer Selection Improves the Physical Layer Security
in the Face of CSI Feedback Delays,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6259-6274, Aug. 2016.
[31] B. E. Priyanto, T. B. Sorensen, O. K. Jensen, T. Larsem, T. Kolding, and P. Mogensen, “Assessing and modelling the effect
of RF impairments on UTRA LTE uplink performance,” in Proc. 2007 IEEE Vehic. Techn. Conf. Fall, pp. 12131217.
[32] K. S. Ahn and R. W. Heath, “Performance analysis of maximum ratio combining with imperfect channel estimation in the
presence of cochannel interferences,” IEEE Trans. Wireless Commun., vol. 8, pp. 1080-1085, Mar. 2009.
[33] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
[34] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York: Academic, 2007.
| 7cs.IT
|
Constrained Deep Transfer Feature Learning and its Applications
Yue Wu
Qiang Ji
ECSE Department, Rensselaer Polytechnic Institute
110 8th street, Troy, NY, USA
arXiv:1709.08128v1 [cs.CV] 23 Sep 2017
{wuy9, jiq}@rpi.edu
Abstract
Feature learning with deep models has achieved impressive results for both data representation and classification
for various vision tasks. Deep feature learning, however,
typically requires a large amount of training data, which
may not be feasible for some application domains. Transfer
learning can be one of the approaches to alleviate this problem by transferring data from data-rich source domain to
data-scarce target domain. Existing transfer learning methods typically perform one-shot transfer learning and often
ignore the specific properties that the transferred data must
satisfy. To address these issues, we introduce a constrained
deep transfer feature learning method to perform simultaneous transfer learning and feature learning by performing
transfer learning in a progressively improving feature space
iteratively in order to better narrow the gap between the target domain and the source domain for effective transfer of
the data from source domain to target domain. Furthermore, we propose to exploit the target domain knowledge
and incorporate such prior knowledge as constraint during
transfer learning to ensure that the transferred data satisfies
certain properties of the target domain.
To demonstrate the effectiveness of the proposed constrained deep transfer feature learning method, we apply
it to thermal feature learning for eye detection by transferring from the visible domain. We also applied the proposed
method for cross-view facial expression recognition as a
second application. The experimental results demonstrate
the effectiveness of the proposed method for both applications.
1. Introduction
Feature learning with deep models is an active research
area. Recent research has demonstrated that with feature
learning methods, effective features can be learnt for both
representation and classification of the input data for many
computer vision tasks including face recognition [20], object detection [5], and scene classification [24]. Feature
Second feature space
Step 4: Feature learning with
both transferred and target data
Step 3: Constrained
transfer learning
First feature space
Step 2: Feature learning with
both transferred and target data
Step 1: Constrained
transfer learning
Source
data
Source domain
Transferred
data
Target
data
Raw data space
Intermediate domains Target domain
Figure 1. The framework of the proposed constrained deep transfer
feature learning method. The algorithm iteratively performs transfer learning and feature learning in more and more deeper feature
spaces.
learning with deep model, however, typically requires a
large amount of training data. Hence, feature learning for
domains with scarce data is not feasible.
Transfer learning can be one of the approaches to address
this problem and help feature learning in the data-scarce target domain by transferring data or knowledge from datarich source domain. Transfer learning not only can compensate for the lack of data in the target domain but can
also benefit the tasks in the target domain from the experience gained from the source domain. The transfer learning
techniques usually involve instance transfer, feature transfer, model parameter transfer, or relational knowledge transfer [12]. Those transfer learning techniques have been
used in natural language processing [1], document classification [23], etc. However, typical transfer learning techniques usually perform one-shot transfer in a fixed or shallow feature space, while a fixed feature space may not effectively fill the semantic gap between the target and source
domains. Another issue with transfer learning is that it is
purely data driven, without adequately considering certain
inherent properties of the target data.
To tackle these issues, we propose a constrained deep
transfer feature learning method to perform simultaneous
transfer learning and feature learning by exploiting the
knowledge in both target and source domains. The general
framework is shown in Figure 1. Specifically, we propose
15101
to iteratively perform constrained transfer learning and feature learning in several increasingly deeper feature spaces to
gradually transfer the knowledge from source domain to target domain and learn the features in the target domain. Furthermore, we propose to exploit the target domain knowledge and incorporate such prior knowledge as constraint
during transfer learning to ensure that the transferred data
satisfies certain properties of the target domain principles.
The proposed framework has the following merits. First,
the progressive transfer allows the creation of several intermediate pseudo domains to bridge the gap between the
source and target domains. As the knowledge transfer continues, the intermediate domains gradually approach the target domain. Second, feature learning is performed at each
level as knowledge transfer happens, and it is also performed progressively at a higher level as knowledge transfer
continues. Hence, knowledge transfer and feature learning
intertwine at each step, improving both feature learning and
knowledge transfer. Finally, by imposing constraints on the
transferred data, we can ensure the transferred data not only
possess certain desired characteristics but also to be semantically meaningful.
The remaining part of this paper is organized as follows.
Section 2 reviews the related work. Section 3 discusses the
Restricted Boltzmann Machine and Deep Boltzmann Machine models. Section 4 introduces the proposed method.
Section 5 shows the experimental results. Section 6 concludes the paper.
2. Related Work
Recently, an increasing number of works concentrate
on learning good representations for data with deep models. In [18], Salakhutdinov et al. build a hierarchical deep
model to learn features for object recognition and handwritten character recognition. Similar to the proposed method,
some works perform feature learning based on multimodal
data in different domains. For example, in [11], Ngiam et
al. use deep autoencoder to learn common features from
audio and video data. In [19], a deep multimodal DBM is
constructed to learn shared features for images and texts.
However, in contrast to the existing works that learn shared
representations across domains [11][19], our work focuses
on transferring knowledge from one domain to help feature
learning for another domain. Multimodal feature learning
methods usually require a lot of paired training data, while
we specifically handle the case where there is limited data
in the target domain and rich data in the source domain.
Transfer learning refers to the learning methods that
leverage the knowledge from the source domain to help
learning in the target domain. The transferred knowledge
includes training instances, features, model parameters and
relational knowledge [12]. For example, in [3], Triadaboost
is proposed to transfer the instances within the framework
ࢎ
ࣈ
ࢎ
࢚
ࣈ
ࢎ
(a)
ࣈ
ࢎ
࢚
ࣂ
࢙
(c)
࢚
(b)
Figure 2. (a) RBM for data in one domain. (b) RBM for transfer
learning. (c) DBM model.
of adaboost. In [15], feature spaces are found that minimize
the inter-domain differences.
There is also work that combines transfer learning with
feature learning. In [23], deep features learned with the
DBM model using data in the source domain are selected
for document classification in the target domain. Different
from the work [23] that first learns deep features and then
transfers the learned features among multimodal data, our
work preforms transfer feature learning at multiple levels of
the deep architecture. More importantly, we add target domain knowledge to constrain the transfer learning and feature learning procedure.
3. Background
Before we introduce the proposed method, we first review the Restricted Boltzmann Machine (RBM) and the
Deep Boltzmann Machine (DBM) models. RBM is a undirected probabilistic graphical model (Figure 2 (a)) that captures the joint probability of the binary input data t (e.g. data
in the target domain) with multiple binary hidden nodes h.
p(t; ξ) =
P
h exp(−E(t, h; ξ))
Z(ξ)
,
(1)
− E(t, h; ξ) = tT W h + cT t + bT h,
(2)
X
p(ti = 1|h; ξ) = σ(
Wi,j hj + ci ),
(3)
where
E(.) is the energy function, Z(ξ)
=
P
t,h exp(−E(t, h; ξ)) is the partition function, and
ξ = {W, c, b} are the parameters. The conditional
probabilities are as follows:
j
X
p(hj = 1|t; ξ) = σ(
ti Wi,j + bj ),
(4)
− E(t, h1 , h2 ; ξ 1 , ξ 2 ) = tT W 1 h1 + (h1 )T W 2 h2 ,
(5)
i
where σ(.) denotes the sigmoid function. Given the training
data, the parameters are learned by maximizing the log likelihood with stochastic gradient ascend algorithm approximated by the Contrastive Divergence (CD) algorithm [7].
DBM model [16] shown in Figure 2 (c) (assume two
layer model thereafter) consists of one layer of visible nodes
and multiple layers of binary hidden nodes. It represents the
probability of visible nodes (similar as Equation 1) with the
new energy function (ignoring the bias terms):
5102
Table 1. Notations. t, s and et represent target data, source data, and
the pseudo target data transferred from the source domain. If necessary, we use the superscript to indicate the pairwise (P)/unpaired
(U) data (corresponding data in both domains, and data in one domain).
Data
Notations
P
P
Pairwise target and source data
Data = {tk , sk }N
k=1
Unpaired target data
Unpaired source data
Algorithm 1: Constrained deep transfer feature learning
Data: Pairwise source and target data (DataP ); Unpaired
U
target data (DataU
t ); Unpaired source data (Datas ).
1
2
Result: Learned features: ξ , ξ ,...
/* Pre-training stage
*/
for Layer l=1 to L do
/* Constrained transfer learning
*/
• Learn the joint probability of target and source data
p(tl , sl ; θl ) with constraint C(.; θl ).
• Transfer the unpaired source data sli by sampling the pseudo
l
target data et through p(tl |sli ; θl ).
NU
t
DataU
t = {ti }i=1
NU
v
DataU
s = {sj }j=1
U
Unpaired pseudo target data
Ne
t
DataU
= {etn }n=1
te
where ξ = {ξ 1 , ξ 2 } are the parameters for different layers.
DBM is learned in a layer-wise manner and then jointly fine
tuned [16].
For feature learning using RBM or DBM, the hidden
nodes in the top layer are inferred for each input data using Equation 4 or the mean-field techniques [16], and they
are considered as the new feature representations. For transfer learning, the input data is the concatenated data from the
source s and target domains t, and the RBM (Figure 2 (b))
will learn their joint probability distribution. Transfer learning can then be performed using the joint probability.
4. Constrained deep transfer feature learning
4.1. The general framework
The proposed constrained deep transfer feature learning method is motivated by the following intuitions. First,
it’s straightforward to think of directly applying the DBM
model illustrated in section 3 to learn the deep features for
the target domain. However, DBM learning usually requires
a lot of training data with variations, while there is limited
data in the target domain. But, if we can capture the joint
distribution of target and source data as a bridge between
the source and target domains, we could transfer additional
large amount of source data to the target domain as pseudo
data for further target domain feature learning. Second, because of the significant domain differences, one time transfer may not be effective as stated above. Therefore, we propose to perform the transfer feature learning progressively
at different levels of feature spaces to generate intermediate
pseudo target spaces to gradually approach the final target
space. Third, because of the underlying mechanism that
produces the data, target data must follow certain properties
that we want to preserve in the transferred data. We hence
constrain the transfer learning to ensure the satisfaction of
these properties. Therefore, we propose the constrained
deep transfer feature learning method. Table 1 shows the
notations.
The general framework is shown in Figure 1 and Algorithm 1. First, in the pre-training stage, we perform the
transfer learning and feature learning iteratively. In the
transfer learning step, we capture the joint distribution of
/* Feature learning
*/
• Learn the features ξ l with target and pseudo target data.
• Project the data to the learned feature space for further
constrained transfer feature learning.
end
/* Joint fine-tuning stage
*/
• Jointly fine-tune the features ξ 1 , ξ 2 , ... based on the deeply
transferred pseudo target data and the real target data.
target and source data p(t, s; θ) using RBM (Figure 2 (b))
as a bridge and transfer additional large amount of source
data as pseudo target data et by sampling through the conditional distribution p(t|s; θ). In addition, we impose constraint C(.; θ) in the learning. Third, in the feature learning
step, the transferred pseudo target data are combined with
the original target data (shaded area in Figure 1) for feature
learning using RBM (Figure 2 (a)). Then, the pseudo target
data and real target data are projected to the learned feature
space. In the new feature space of the next level, the transferred pseudo target data are considered as “source data” for
further constrained transfer feature learning in the next iteration. Finally, similar as the DBM model (Figure 2 (c)), the
layer-wisely learned features with parameters ξ 1 , ξ 2 ,... are
fine-tuned jointly based on the deeply transferred pseudo
target data and the real target data. The iterative transfer learning and feature learning should converge, because
deep feature learning has been shown converging [8] and
the transfer learning also converges due to the gradually
reduced gaps between target domain and source domain
through the iterations. In the following subsections, we discuss each step in details.
4.2. Constrained semi-supervised transfer learning
in one layer
In this section, we first discuss how to learn the joint
probability of target and source data p(t, s; θ) in a semisupervised manner with constraints. Then, we discuss how
to generate the pseudo target data by sampling through
p(t|s; θ).
5103
4.2.1
Semi-supervised learning of the joint probability
Knowledge transfer from visible to thermal
In this work, we use RBM model illustrated in section 3 to
learn the joint probability of target and source data p(t, s; θ).
As shown in Figure 2 (b), the model defines the joint probability:
P
p(t, s; θ) =
h exp(−E(t, s, h; θ))
Z(θ)
,
(6)
where the energy function E(.) has similar format as that in
Equation 2.
Recall that RBM is usually learned with the Contrastive
Divergence (CD) algorithm [7]. However, standard CD
learning for the RBM model requires a large amount of
pairwise source and target data, which are limited in our
application. To tackle this problem, we propose the semisupervised learning method. Specifically, we learn the
model parameters by maximizing the log likelihood w.r.t the
pairwise source and target data DataP , the unpaired target
U
data DataU
t , and the unpaired source data Datas .
θ∗ = arg max L(θ; Data)
θ
k=1
U
Nt
1 X
log(p(ti ; θ))
= U
Nt i=1
(10)
U
L(θ; DataU
s )
Ns
1 X
= U
log(p(sj ; θ))
Ns j=1
(11)
Here, α and β are two parameters that balance different
terms. p(t; θ) and p(s; θ) in Equation 10 and Equation 11
are the marginal distributions of data in one domain by summing out the missing data in the other domain.
Following the CD algorithm, we solve the optimization
problem in Equation 7 using gradient ascent algorithm. The
gradient of model parameters for each log likelihood term
is calculated as:
∂L(θ; Data)
∂E
∂E
+h
,
= −h
iP
iP
∂θ
∂θ data
∂θ model
(b) Thermal
(c) Thermal mean eye
Figure 3. Constrained deep transfer feature learning for thermal
eye detection. (a)(b) Pairwise visible and thermal facial images [13]. (c) Thermal mean eye.
generate samples h, t from p(h, t|sj ; θ). Following the CD
algorithm, we estimate the model dependent expectations
with k-step (k=5) Gibbs update through the model, starting
from the samples calculated using the data dependent probabilities.
(7)
U
L(θ; Data) = L(θ; DataP ) + αL(θ; DataU
t ) + βL(θ; Datas )
(8)
NP
1 X
P
L(θ; Data ) = P
log(p(tk , sk ; θ))
(9)
N
L(θ; DataU
t )
(a) Visible
(12)
where h.iPdata and h.iPmodel represent the data dependent
and model dependent expectations.
In the CD algorithm [7], to approximately calculate the
data dependent expectation h.iPdata , we need to sample
the unknown variables from the data dependent probabilities Pdata . Note that, in the semi-supervised learning setting, the data dependent probabilities Pdata differ for each
data type. Specifically, PdataP = p(h|tk , sk ; θ), PdataUt =
p(h, s|ti ; θ) and PdataUs = p(h, t|sj ; θ). For the pairwise
data, we could directly sample h from p(h|tk , sk ; θ) using
Equation 4. However, for the unpaired data, p(h, s|ti ; θ)
and p(h, t|sj ; θ) are intractable. Thus, we use Gibbs sampling to generate h, s from p(h, s|ti ; θ). Similarly, we can
4.2.2
Transfer learning with constraints
In every domain, its data only represent the observations
of the underlying latent objects. It is often through either
a physical or biological process that the latent objects produce the observed data in the target domain. For example,
as shown in Figure 3, in the case of eye detection on thermal
images by transferring the knowledge from visible domain,
the intensities of the eyes measure the temperature near the
eye skin surface and the eye temperature is determined by
the the blood flow to the eye skin surface. Hence, the intensity distribution near the eye on an thermal image is mainly
determined by the underlying latent vascular structure distribution. For example, the tear dust area usually has the
high temperature due to the blood flow in the artery beneath
(Figure 3 (c)). On the other hand, in the pupil area and the
hair-insulated eye lash region, the temperature is expected
to be low because of lack of blood flow. These unique facial
anatomy structures in the eye regions lead to the unique and
distinct target data pattern that is universal across subjects.
As a result, to ensure a physically and semantically meaningful transfer, we propose to impose certain constraints
during the transfer learning in order to preserve such target data properties, such as the certain unique shape and
appearance characteristics.
Based on the intuitions illustrated above, we modify the
parameter learning problem in Equation 7 by adding the
constraint C(.; θ):
θ∗ = arg max L(θ; Data) − λC(.; θ)
θ
(13)
Here, the first term is the log likelihood function defined in
Equation 8. The second term C(.; θ) is a cost function to
ensure that the transferred data satisfies certain properties.
5104
To solve this optimization problem in Equation 13, depending on the type of C(.; θ), we could still use the gradient ascent algorithm and we have derived the gradient of
the first term w.r.t the parameters in section 4.2.1. Then,
we only need to calculate the gradient of the second term
C(.; θ) w.r.t the parameters, i.e., dC(.;θ)
dθ . It’s detailed calculated will be discussed in section 5.2.
4.2.3
Pseudo target data generation by sampling
Given the learned joint probability p(t, s; θ), we could transfer the large amount of additional source data sj ∈ DataU
s
to the target domain to generate the pseudo target data
et. This can be done by sampling through p(t|sj ; θ), sj ∈
DataU
s using Gibbs Sampling method that iteratively calls
Equation 3 and 4.
4.3. Feature learning in one layer
In each iteration, combining the transferred pseudo target data and the real target data, the goal of feature learning is to learn the RBM model (Figure 2 (a)) that captures
the variations of target and pseudo target data and uses the
hidden nodes as new features. More formally, the RBM is
defined in Equation 1 and parameter learning is formulated
as:
ξ ∗ = arg max L(ξ; Datat ) + γL(ξ; DataU
te )
ξ
(14)
The first term and second term represent S
the log likelihood
w.r.t the real target data Datat = DataP
DataU
t
t , and the
U
pseudo target data Dataet . γ is the parameter that balances
the two terms. To learn the features, we apply the standard Contrastive Divergence (CD) algorithm [7]. The only
difference is that the gradient is calculated based on both
terms in Equation 14. Given the learned model, for each
target and pseudo target data, its new representation can be
calculated using Equation 4. Then, for the next iteration in
the learned feature space, constrained transfer learning and
feature learning continue and interact until convergence.
4.4. Joint feature fine-tuning
After multi-layer constrained transfer feature learning in
the pre-training stage, we have the initially learned features ξ 1 , ξ 2 , .... In addition, we have the deeply transferred
L
pseudo target data in the top feature layer denoted as et .
Then, for joint feature fine-tuning, we need to project the
pseudo data back to the original space by repeatedly calling Equation 3 with parameters ξ L ,..., ξ 1 and get the deeply
1
transferred pseudo data in the original space bt . Then, based
1
on the pseudo target data bt and the real target data t1 ,
we apply standard fine-tuning algorithm [16] for the Deep
Boltzmann Machine model, where the mean-field fix point
equation is used to estimate the data-dependent expectation and the Persistent Markov Chain is used to estimate
the model dependent expectation.
5. Experimental Results
5.1. Eye detection on thermal images by transferring from visible domain
To demonstrate the proposed framework for constrained
deep transfer feature learning, we applied it to eye detection
on thermal images. Comparing to facial analysis in the visible domain, thermal facial analysis is more sensitive to eye
localizations [2]. However, there are limited works about
eye detection on thermal images. Furthermore, the existing thermal eye detection techniques typically use the visible image features, which are suboptimal, since thermal and
visible images are formed based on different principles [4].
For example, thermal images contain limited texture and
gradient information due to the heat diffusion phenomenon,
while the visible image features usually focus on encoding
these detailed information.
While feature learning on thermal images can alleviate
this problem, limited thermal training images make it very
difficult to leverage on the existing deep learning models.
To address this challenge, we propose to apply the proposed constrained transfer feature learning method to perform thermal feature learning by transferring the eye data
in the visible domain to the thermal domain to compensate
for the lack of thermal data. The target domain refers to the
thermal patches, including the eye patches and the background patches. The source domain refers to the visible eye
patches. Note that, we only need to transfer the eye patches
as positive data, since we can generate many negative data
by sampling from the background. For thermal eye detection, with the learned thermal features using the proposed
method, we train SVM classifier to search the eye with a
scanning window manner.
5.2. Implementation details
Databases: We use four databases including the visible and thermal facial behavior database(VTFB), the MAHNOB laughter database [13], the Natural visible and thermal facial expression database (NVIE) [21], and the Facial
Recognition Technology (FERET) database [14]. VTFB
has synchronized visible and thermal videos (FLIR SC6800
thermal camera) for 7 subjects and additional thermal
videos for 13 subjects with spontaneous facial expressions and arbitrary head poses. The MAHNOB Laughter database provides thermal facial sequences of 22 subjects with moderate head poses, neutral and happy facial
expressions. The NVIE database contains thermal facial sequences of 215 subjects with spontaneous and posed expressions. FERET database provides visible facial images
with different head poses and moderate expressions.
During training, we use the synchronized thermal and
visible images of the first 7 subjects from VTFB (1295 images) as pairwise data. We use the thermal images of ad5105
ditional 3 subjects from the VTFB (573 images), and visible images from FERET (3830 images) as unpaired data.
We test the method on the thermal images of remaining 10
subjects from VTFB (542 images), the MAHNOB database
(114 images) and the NVIE database (35550 images).
The method: We use two layer DBM with 800 and 600
hidden nodes to learn features. The RBM models used
to learn the joint distributions p(t, s; θl ) have 400 hidden
nodes. The hyper-parameters α, β, λ and γ are 0.4, 0.3,
0.002, and 0.3, respectively. In our experiments, the height
and width of the image patches are about 1/2 the inter-ocular
distance and the patches are normalized to 40×40. The
background patches are at least 1/4 inter-ocular distance
away from the eyes. We augment the training data by rotating and resizing the images. Following [16], we learn
the Gaussian-binary RBMs [9] with 1000 hidden nodes for
the raw visible and thermal image patches, respectively, and
then treat the values of the hidden layers as the preprocessed
data to speed up the learning procedure. With Matlab implementation, it takes about 30 hours to train the full model
with two layers and the constraint on a single core machine.
To impose the target domain constraint as discussed in
section 4.2.2, we propose to impose the constraint that the
transferred thermal eyes must satisfy the general appearance
pattern as shown in Fig. 3(c) for the thermal eye. To achieve
this goal, we propose to capture such a target data pattern
by using a thermal mean eye, which can be obtained by averaging the existing target data. The basic idea is that while
individual thermal eye may vary because of each person’s
unique eye structure, through averaging, the thermal mean
eye can capture their commonality while canceling out their
differences. The commonality is resulted from the shared
underlying eye structure. Figure 3(c) shows the mean eye
as an example. It apparently can capture the unique pattern of a thermal eye, i.e., brighter in the inner eye corner
and darker in the eye center that are true across subjects at
different conditions.
For transferring the visible eyes to thermal domain to
help the thermal feature learning, the transfer learning step
in Equation 13 becomes:
θ∗ = arg max L(θ; Data+ ) − λk
θ
1
NsU +
X
j
ht+ iQj − m+ k22 .
(15)
Here, “+” denotes the positive eye data. The second term
enforces
mean of the transferred pseudo thermal eye
P the
1
+
+
ht
i
Qj is close to the given mean eye m . SpecifU+
j
N
s
U+
ically, for each source data s+
j ∈ Datas , htiQj represents the expected transferred
thermal eye and
P pseudo
1
+
will be the mean
ht
i
Qj = p(t+ |s+
;
θ).
Then,
Q
U
+
j
j
j
Ns
of the transferred pseudo thermal eyes and it should be close
to the given mean eye m+ . Assume the gradient of the second constraint term of the objective function in Equation 15
w.r.t θ is denoted as δ. Then, it is calculated as follows:
δ =2 ∗ [
∗
1
NsU +
1
NsU +
X
j
X
ht+ iQj − m+ ]T
[−ht+
j
∂E
∂E
iR + h
iR ht+ iQj ],
∂θ j
∂θ j
(16)
+
U+
where Rj = p(t , h|s+
j ; θ), sj ∈ Datas .
Evaluation criterion: The eye detection error is de−Gl ||2 ,||Dr −Gr ||2 )
, where D and
fined as error = max(||Dl||G
l −Gr ||2
G represent the detected and ground truth eye locations,
and the subscript denotes left and right eyes. We regard
error < 0.15 as the successful detection. The evaluation
criteria follows the methods [10] [22] for fair comparison.
+
5.3. Evaluation of the proposed method
In this section, we evaluate the proposed constrained
deep transfer feature learning method on the VTFB
database. Note that, in the constrained transfer learning
step (discussed in section 4.2), the joint probability of thermal and visible eyes p(t+ , s+ ; θ) can be learned with different approaches. They are (M1) learning with pairwise
data using standard CD algorithm [7], (M2) proposed semisupervised learning with paired and unpaired data as discussed in section 4.2.1, (M3) learning with pairwise data
and constraints (second term in Equation 13), and (M4)
learning with semi-supervised data and constraints (the full
model). In the experiments, we compare the four variations
and study the other properties of the proposed method.
5.3.1
Evaluation of the constrained transfer learning
method in layer one
First, we evaluate the constrained transfer learning method
in layer one. We evaluate the learned joint probabilities
p(t+ , s+ ; θ) with different learning strategies (M1 to M4)
based on two criteria, including the reconstruction error and
the log likelihood on the hold-out pairwise data. The reconstruction error refers to the average pixel difference between the transferred pseudo thermal eyes sampled from
p(t+ |s+
j ; θ) and the ground truth thermal eyes. We calculate the log-likelihood on the hold-out testing set using the
method in [17].
As can be seen in Table 2, while both the semisupervised learning and the constraint (M2&M3) improve
the performances over standard learning method M1, combining them together (M4, the full model) achieves the best
performance.
Table 2. Evaluation of different constrained transfer learning methods in layer one.
Methods
M1: Pairwise data
M2: Semi-supervised
M3: Pairwise + constraint
M4: Semi + constraint
5106
Reconstruction error
0.0627
0.0601
0.0588
0.0580
Log likelihood
-514.1
-484.8
-492.0
-476.9
Evaluation of the thermal eye detector with the
constrained deep transfer features
In this subsection, we further evaluate the eye detection
performance based on the features learned using the proposed method with two-layer DBM (two iterations in Algorithm 1). For the constrained transfer learning step in
each layer of the deep model, we use four different learning
strategies (M1-M4).
(1) Different methods: We compare the proposed
method with different strategies (M1-M4) to the baseline
method (M0). The baseline method learns features using
the standard Deep Boltzmann Machine model based on the
thermal data without any knowledge transfer. As shown in
Table 3, even with only the pairwise data, the proposed
transfer feature learning method (M1) improves over the
baseline (M0). The semi-supervised learning (M2) and
constraint (M3) further boost the performances. By combining them together (M4), the constrained deep transferred
features learned from multi-modality data increase the detection rate by 6.09%, comparing to the baseline (M0).
We also implement two other baselines using DBM and
visible training data. (V0) refers to DBM feature learning
based on the visible data. (V1) fine-tune the visible features
learned with visible data on thermal data, so that the model
parameters for thermal feature learning are initialized as the
parameters of visible features. As can be seen in Table 3,
they are all inferior to the proposed method (M4).
Table 3. Eye detection rates using different methods
Methods
M0: DBM (baseline)
M1: Pairwise data
M2: Semi-supervised
M3: Pairwise + constraint
M4: Semi + constraint
V0: DBM visible (baseline)
V1: DBM visible finetune (baseline)
Eye detection rate
87.45%
89.48%
90.04%
91.88%
93.54%
73.25%
86.72%
(3) Learning with different amount of training data
We vary the training data to train the proposed method (features and classifier) and the baseline method, and the eye
detection rates are shown in Figure 5. Specifically, we keep
reducing the number of training subjects from “P7+UP3” (7
subjects with pairwise data + 3 subjects with unpaired data)
to “P2+UP2”. Comparing M4 to M0, the proposed method
always learns better features than the baseline. Comparing
M4 to M2, the constraints are important and they improve
the performances with different sets of data.
M0: DBM
M2: Semi−supervise
M4: Semi + constraint
0.95
0.9
Eye detection rate
5.3.2
0.85
0.8
0.75
0.7
P7+UP3
P7
P4+UP3
P4
Different training data sets.
P2+UP2
Figure 5. Learning with different amounts of training data.
(4) Comparison with other features: We compare the
learned features with the proposed method (M4) to standard
image features, such as the Scale Invariant Feature Transform (SIFT) feature, and the Histogram of Oriented Gradients (HOG) feature. For fair comparison, we train the
linear SVM with same training data (P7+UP3), and the experimental results only differ due to the features. As shown
in Figure 6, the learned features with the proposed method
significantly outperforms the other designed features.
1
percentage of images with successful detections
0.9
(2) Transfer in different layers: Figure 4 shows that
it’s important to perform the constrained transfer learning
in multiple layers, since it further boosts the performance
comparing to one layer transfer. In addition, transferring
in the deeper feature space (layer 2) is slightly better than
transferring in the shallow feature space (layer 1).
0.8
0.7
0.6
0.5
0.4
0.3
SIFT features
HOG features
Proposed method (M4: Semi+ constraint)
0.2
0.1
0.942
M4: semi + constraint
0
0.94
0.938
Eye detection rate
0.05
0.1
0.15
error
0.2
0.25
0.3
Figure 6. Cumulative error distribution curves using eye detectors
with different features.
0.936
0.934
0.932
0.93
0.928
0.926
0.924
0.922
transfer in layer 1
0
transfer in layer 2
transfer in both layers
Different constrained deep transfer feature learning methods
Figure 4. Transfer in different layers.
(5) Visualization: Figure 7 (a)(b) show the learned filters (parameters ξ 1 and ξ 2 ) with the proposed method (M4).
Filters in the lower level capture local dependencies. They
represent small dots, and some of them are similar to the
Gabor Filters. Filters in the higher level capture more global
variations.
5107
(a) Frontal image (source)
(b) Non-frontal image (target)
Figure 8. Cross-view neutral (left) and non-neutral (right) facial
expression recognition.
5.4. Comparison with existing thermal eye detectors
on other databases
To the best of our knowledge, there are only two
works [10][22] that report eye detection results on publicly
available thermal face databases. In [10], image patches
are represented by Haar wavelet coefficients. Two successive classifiers (coarse and fine) are constructed based on
features in different levels of details in a cascade manner.
In [22], information from the whole face region is used to
support eye detection on thermal facial images. It identifies
15 sub-regions on the face. Haar-like features and SVM are
used to learn the eye detector.
Table 4 illustrates that our detector outperforms the
method [10] on the MAHNOB Laughter database [13]. On
the NVIE database [21], our detector is significantly better
than the method in [22].
different features, including the learned features using the
proposed constrained deep transfer feature learning method,
the learned features using the conventional DBM, the handcrafted HOG and LBP features. In addition, we vary the
number of training subjects in the target domain (100, 50,
20). There are a few observations. First, the learned features are significantly better than the hand-crafted features.
Second, for all settings, by transferring the knowledge in
the source domain, the learned features using the proposed
method outperform the features learned with DBM.
0.9
facial expression recognition rate
(a) learned filters in layer 1 (b) learned filters in layer 2
Figure 7. (a)(b): Learned filters in different layers.
0.85
0.8
0.75
0.7
0.65
0.6
0.55
0.5
HOG
LBP
DBM
Proposed method
100
50
20
number of training subjects in the target domain
Table 4. Comparison with existing thermal eye detectors on the
MAHNOB laughter database and the NVIE database.
MAHNOB Laughter Database:
Methods
reported in [10] Proposed method (M4)
Detection rate
83.3%
87.72%
NVIE Database:
Methods
reported in [22] Proposed method (M4)
Detection rate
68%
81.60%
5.5. Second Application
The proposed constrained deep transfer feature learning
method is not limited to visible and thermal domains. It can
be extended to other domains for simultaneous knowledge
transfer and deep feature learning. In this section, we apply the proposed framework to cross-view facial expression
recognition as the second application. The goal of this application is to learn the effective feature representation to
classify neutral and non-neutral face in non-frontal view by
transferring the data in frontal view (source) to non-frontal
view (target). The unique facial structure in non-frontal
view is used to constrain the transferring learning. In the
experiments, we used the Multi-Pie database [6] (Figure 8),
which contains facial images with varying head poses, facial expressions, and illumination conditions (training: id
1-200, testing: id 201-337).
Figure 9 below shows the results. In the experiments, we
compared the classification accuracies (linear SVM) with
Figure 9. Facial expression classification accuracies with different
features and numbers of training subjects in the target domain.
6. Conclusion
In this paper, we propose a constrained deep transfer feature learning framework in order to perform feature learning
in a data-scarce target domain. Instead of performing transfer learning in a fixed feature space, we propose to simultaneously perform transfer and feature learning iteratively in
increasingly higher level of feature spaces in order to minimize the semantic gap between the source and target domains. Furthermore, to ensure the transferred data to be semantically meaningful and to be consistent with the underlying properties of the target domain, we incorporate target
domain knowledge as constraints into the transfer learning.
We applied the proposed framework for thermal feature learning for thermal eye detection by transferring the
knowledge from visible domain. We also applied the it for
cross-view facial expression recognition. The experiments
demonstrate the effectiveness of the proposed framework
for both applications. In the future, we would apply the
framework to other vision applications.
Acknowledgements: The work described in this paper was supported in part by the National Science Foundation under the grant number NSF CNS-1205664 and in
part by Army Research Office under the grant number ARO
W911NF-12-C-0017.
5108
References
[1] J. Blitzer, R. McDonald, and F. Pereira. Domain adaptation
with structural correspondence learning. In Proceedings of
the 2006 Conference on Empirical Methods in Natural Language Processing, EMNLP ’06, pages 120–128, Stroudsburg, PA, USA, 2006. Association for Computational Linguistics. 1
[2] X. Chen, P. J. Flynn, and K. W. Bowyer. Ir and visible light
face recognition. J. Comput. Vis. Image Underst, 99:332–
358, 2005. 5
[3] W. Dai, Q. Yang, G.-R. Xue, and Y. Yu. Boosting for transfer
learning. In Proceedings of the 24th international conference
on Machine learning, ICML ’07, pages 193–200, 2007. 2
[4] V. Espinosa-Duro, M. Faundez-Zanuy, and J. Mekyska. Beyond cognitive signals. Cognitive Computation, 3(2):374–
381, 2011. 5
[5] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic
segmentation. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition (CVPR), 2014. 1
[6] R. Gross, I. Matthews, J. Cohn, T. Kanade, and S. Baker.
Multi-pie. Image Vision Comput., 28(5):807–813, 2010. 8
[7] G. Hinton. Training products of experts by minimizing contrastive divergence. Neural Computation, 14(8):1771–1800,
2002. 2, 4, 5, 6
[8] G. E. Hinton and S. Osindero. A fast learning algorithm for
deep belief nets. Neural Computation, 18:2006, 2006. 3
[9] G. E. Hinton and R. R. Salakhutdinov. Reducing the
dimensionality of data with neural networks. Science,
313(5786):504–507, July 2006. 6
[10] B. Martinez, X. Binefa, and M. Pantic. Facial component detection in thermal imagery. In Computer Vision and Pattern
Recognition Workshops (CVPRW), IEEE Computer Society
Conference on, pages 48–54, 2010. 6, 8
[11] J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee, and A. Y.
Ng. Multimodal deep learning. In Internation conference on
Machine Learing (ICML), pages 689–696, 2011. 2
[12] S. J. Pan and Q. Yang. A survey on transfer learning.
IEEE Transactions on Knowledge and Data Engineering,
22(10):1345–1359, 2010. 1, 2
[13] S. Petridis, B. Martinez, and M. Pantic. The mahnoblaughter database. Image and Vision Computing Journal,
31(2):186–202, 2013. 4, 5, 8
[14] P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss. The feret
evaluation methodology for face-recognition algorithms.
IEEE Trans. Pattern Anal. Mach. Intell., 22(10):1090–1104,
Oct. 2000. 5
[15] K. Saenko, B. Kulis, M. Fritz, and T. Darrell. Adapting visual category models to new domains. In Proceedings of
the 11th European conference on Computer vision: Part IV,
pages 213–226, 2010. 2
[16] R. Salakhutdinov and G. Hinton. Deep boltzmann machines.
In Proceedings of the International Conference on Artificial
Intelligence and Statistics, volume 5, pages 448–455, 2009.
2, 3, 5, 6
[17] R. Salakhutdinov and I. Murray. On the quantitative analysis of deep belief networks. In In Proceedings of the International Conference on Machine Learning, pages 872–879,
2008. 6
[18] R. Salakhutdinov, J. Tenenbaum, and A. Torralba. Learning
with hierarchical-deep models. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 35(8):1958–1971,
2013. 2
[19] N. Srivastava and R. Salakhutdinov. Multimodal learning
with deep boltzmann machines. In P. Bartlett, F. Pereira,
C. Burges, L. Bottou, and K. Weinberger, editors, Advances
in Neural Information Processing Systems 25, pages 2231–
2239. 2012. 2
[20] Y. Taigman, M. Yang, M. Ranzato, and L. Wolf. Deepface:
Closing the gap to human-level performance in face verification. June 2014. 1
[21] S. Wang, Z. Liu, S. Lv, G. Wu, P. Peng, F. Chen, and
X. Wang. A natural visible and infrared facial expression
database for expression recognition and emition inference.
IEEE Trans. on Multimedia, 12(7):682–691, Nov. 2010. 5, 8
[22] S. Wang, Z. Liu, P. Shen, and Q. Ji. Eye localization from
thermal infrared images. Pattern Recognition, 46(10):2613
– 2621, 2013. 6, 8
[23] J. Zhang. Deep transfer learning via restricted boltzmann
machine for document classification. In Machine Learning and Applications and Workshops (ICMLA), 10th International Conference on, volume 1, pages 323–326, 2011. 1,
2
[24] B. Zhou, A. Lapedriza, J. Xiao, A. Torralba, and A. Oliva.
Learning deep features for scene recognition using places
database. In Z. Ghahramani, M. Welling, C. Cortes,
N. Lawrence, and K. Weinberger, editors, Advances in Neural Information Processing Systems 27, pages 487–495. Curran Associates, Inc., 2014. 1
5109
| 1cs.CV
|
PRIME IDEALS AND REGULAR SEQUENCES OF SYMMETRIC
POLYNOMIALS
arXiv:1309.1098v1 [math.AC] 4 Sep 2013
NEERAJ KUMAR
A BSTRACT. Let S = C[x1 , . . . , xn ] be a polynomial ring. Denote by pa the power
sum symmetric polynomial xa1 + · · · + xan . We consider the following two questions: Describe the subsets A ⊂ N such that the set of polynomials pa with a ∈ A
generate a prime ideal in S or the set of polynomials pa with a ∈ A is a regular
sequence in S. We produce a large families of prime ideals by exploiting Serre’s
criterion for normality [4, Theorem 18.15] with the help of arithmetic considerations, vanishing sums of roots of unity [9]. We also deduce several other results
concerning regular sequences of symmetric polynomials.
1. I NTRODUCTION
Let S = C[x1 , . . . , xn ] be a polynomial ring. A sequence of elements y1 , y2 , . . . , yd
in a ring S is called regular sequence on S if the ideal hy1 , y2 , . . . , yd i is proper and
for each i, the image of yi+1 is a nonzero divisor in S/hy1 , . . . , yi i.
Following the notation of Macdonald [10], let pa , ha and ea denote the power
sum symmetric polynomial, complete symmetric polynomial, and the elementary
symmetric polynomial of degree a in S respectively. Let N be the set of positive
integers. For a given set A ⊂ N, we denote by the set of power sum symmetric
polynomials as pA = {pa | a ∈ A}. In this paper, we discuss the following two
questions:
Question 1.1. Let S = C[x1 , . . . , xn ] be a polynomial ring. For which subsets A ⊂ N,
the ideal generated by the set of polynomials pA is a prime ideal in S.
Question 1.2. Let S = C[x1 , . . . , xn ] be a polynomial ring. For which subsets A ⊂ N,
the set of polynomials pA is a regular sequence in S.
Similarly, we ask these questions for the complete symmetric polynomials and
the elementary symmetric polynomials. For obvious reasons, whenever pA is a
regular sequence generating a prime ideal and pb ∈
/ hpA i, then pA , pb is a regular
sequence in S as well. More specifically, we will focus on Question 1.1.
These problems are fundamental in nature, and interesting, both in algebraic and
geometric point of view. In a more general setting of Question 1.1, it is mentioned
by Eisenbud that “ In general it is extremely difficult to prove that a given ideal
of polynomial is prime” [4, Chapter 10: pg.241]. The most powerful methods
known for showing primeness of ideal are Hochster’s method of “principal radical
system” [7] and Serre’s criterion for normality [4, Theorem 18.15]. We will use
the Serre’s criterion for normality in this paper.
The study of Question 1.2 began in the paper [1] in the dimention zero case by
Conca, Krattenthaler, and Watanabe. The Question 1.2 is highly non-trivial for
Key words: Regular sequence, Prime ideal, Symmetric polynomial.
2010 Mathematics Subject Classification: Primary 13A15, Secondary 14M10, 12E05.
1
2
NEERAJ KUMAR
n ≥ 3. For n = 3, a beautiful conjecture of Conca, Krattenthaler, and Watanabe
states that given a positive integers a < b < c with gcd(a, b, c) = 1, pa , pb , pc form
a regular sequence in C[x1 , x2 , x3 ] if and only if abc ≡ 0( mod 6), see [1, Conjecture 2.15]. The necessary condition follows from [1, Lemma 2.8]. For partial
evidence in support of sufficient condition, see [1, Theorem 2.11]. Similarly the
authors, also formulated a conjecture, when three complete symmetric polynomials form a regular sequence in C[x1 , x2 , x3 ], see [1, Conjecture 2.17]. In a joint
paper with Martino [8], we could provide evidence for these conjectures by proving it in special instances. Then we employed the technique of Serre’s criterion
to show the primeness of an ideal. For instance, we have shown that the ideal
I = hpa , pa+1 , . . . , pa+m−1 i is prime in S if m < n − 1, see [8, Theorem 3.3]. We
have also shown that the ideal I = hp1 , p2m i, where m ∈ N, is prime in C[x1 , . . . , x4 ],
see [8, Proposition 4.1]. In this way, we succeeded to give more families of regular sequences. With the help of Computer calculations, we proposed, Conjecture
4.5 and Conjecture 4.6 in [8]. One of the main result of this paper, Theorem 3.8,
partially answers the Conjecture 4.6 in [8].
In this paper, we have managed to produce families of prime ideals by exploiting
Serre’s criterion with the help of arithmetic considerations, vanishing sums of roots
of unity [9]. The main results of the paper are the following:
(i) Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring with n ≥ 4. Let I = hpa , pb i,
where a, b ∈ N. Let b − a = n0 . Suppose q1 is the smallest prime factor in
the factorization of n0 . If q1 > max{n, a}, then I is a prime ideal in S.
(ii) Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring with n ≥ 3. Let a ∈ N and
m < n − 1. Let I = hpa , p2a , . . . , pma i. Then I is a prime ideal in S.
Section 2 contains preliminary results. In Section 3, we discuss the problem of
whether two power sum symmetric polynomials generate a prime ideal in S for
n ≥ 4. We answer this to certain extent purely in terms of arithmetic conditions of
the degree of polynomials and the number of indeterminates, see Theorem 3.8. Let
I = hpa , p2a , . . . , pma i, where a ∈ N, and m < n − 1. We show that I is a prime ideal
in S for all n ≥ 3, see Theorem 3.13. For n ≥ 3, we show that ∂∂ hx1a , · · · , ∂∂ hxna form a
regular sequence in S for all a ≥ 2. We also show that any two complete symmetric
polynomial form a regular sequence in S for all n ≥ 3. Similar results also hold
for the power sum and elementary symmetric polynomials, see Lemma 3.1 and
Proposition 3.7. Computer calculations in CoCoA [2] suggest that I = hh1 , h2m i,
where m ∈ N, should be a prime ideal in C[x1 , . . . , x4 ]. It is obvious for m = 1. We
provide evidence for m = 2 in the Example 3.16.
2. G ENERALITIES
AND PRELIMINARY RESULTS
Let S = C[x1 , . . . , xn ] be a polynomial ring. Let pa , ha and ea be the power
sum symmetric polynomial, complete symmetric polynomial, and the elementary
symmetric polynomial of degree a in S respectively, that is,
n
pa (x1 , x2 , . . . , xn ) := ∑ xai ,
i=1
ha (x1 , x2 , . . . , xn ) :=
∑
xi1 xi2 · · · xia ,
∑
xi1 xi2 · · · xia .
1≤i1 ≤i2 ≤···≤ia ≤n
ea (x1 , x2 , . . . , xn ) :=
1≤i1 <i2 <···<ia ≤n
PRIME IDEALS AND REGULAR SEQUENCES
3
For instance, for n = 3 and a = 2, one has
p2 (x1 , x2 , x3 ) =x21 + x22 + x23 ,
h2 (x1 , x2 , x3 ) =x21 + x22 + x23 + x1 x2 + x1 x3 + x2 x3 ,
e2 (x1 , x2 , x3 ) =x1 x2 + x1 x3 + x2 x3 .
For these symmetric polynomials, we have the following Newton’s formula, see
[10, Equation’s 2.6′ , 2.11, 2.11′ respectively]:
n
∑ (−1)i ei hn−i = 0 for all n ≥ 1,
(1)
i=0
a
aha = ∑ pi ha−i for all a ≥ 1,
(2)
i=1
n
nen = ∑ (−1)i−1 en−i pi for all n ≥ 1.
(3)
i=1
We will use the following lemma to prove the smoothness of symmetric polynomials ha , ea , and pa in the Lemma 3.2. We will also use Lemma 2.1 in the Example
3.16.
Lemma 2.1. (Technical Lemma)
Let S = C[x1 , . . . , xn ] be a polynomial ring. Then for the symmetric polynomials
ha , ea , and pa , one has the following:
(i)
(ii)
(iii)
∂ ha
∂ xi
∂ ea
∂ xi
∂ pa
∂ xi
n ∂ ha
= ha−1 + xi ∂ ∂ha−1
xi and ∑i=1 ∂ xi = (n + a − 1)ha−1 .
n ∂ ea
= ea−1 − xi ∂ ∂ea−1
xi and ∑i=1 ∂ xi = (n − a + 1)ea−1 .
= axa−1
and ∑ni=1 ∂∂ pxai = apa−1 .
i
Proof. We can write ha = xi ha−1 + g for some polynomial g not involving xi . Taking partial derivative of ha w.r.t. xi , one obtains
∂ ha
∂ ha−1
= ha−1 + xi
.
∂ xi
∂ xi
(4)
By Euler’s formula, we have ∑ni=1 xi ∂ ∂ha−1
xi = (a − 1)ha−1 . Thus, we conclude that
∂ ha
n
∑ ∂ xi
i=1
= (n + a − 1)ha−1 .
Taking partial derivative of ea w.r.t. xi , one obtains
∂ ea
∂ ea−1
= ea−1 − xi
.
∂ xi
∂ xi
(5)
Proceeding as before, we conclude that
n
∂ ea
∑ ∂ xi
i=1
The claim of (iii) is obvious.
= (n − a + 1)ea−1 .
4
NEERAJ KUMAR
For a given natural number m, consider the m-th roots of unity in the field of
complex number C. We may ask ourself for which natural numbers n and k, do
there exist m-th roots of unity α1 , . . . , αn ∈ C such that α1k + α2k + · · · + αnk = 0? We
define such an equation to be Vanishing sum of k-th power of m-th roots of unity
of weight n. For k = 1, such an equation is said to be a vanishing sum of m-th
roots of unity of weight n. For instance, for m = 10 and k = 1, the set of n’s is
{0, 2, 4, 5, 6, 7, 8, 9, 10, . . . }. For a given m and k, let W (m, k) be the set of weights
n for which there exists a vanishing sum α1k + α2k + · · · + αnk = 0, where αi is a m-th
roots of unity. If m has a prime factorization of the form qa11 qa22 . . . qar r , then by the
theorem of Lam and Leung [9, Theorem 5.2], the weight set W (m, 1) is exactly
given by Nq1 + · · · + Nqr . Poonen and Rubinstein [13] have classified all minimal
vanishing sums α1 + · · · + αn = 0 of weight n ≤ 12. For similar treatment by Mann,
one may also see [11].
Remark 2.2. Note that by [9, Theorem 5.2], for a given m ∈ N, W (m, 1) depends
only on the prime divisors of m, and not on the multiplicity to which they occur
in the factorization of m. The theorem also shows that any (non-empty) vanishing
sum of m-th roots of unity must have weight ≥ q1 , where q1 is the smallest prime
divisor of m.
Lemma 2.3. Let m ∈ N and α1 , . . . , αn be a subset of m-th roots of unity in C.
Suppose that q1 is the smallest prime factor in the factorization of m. Let k ∈ N be
any natural number such that q1 > max{n, k}. Then one has α1k + α2k +· · ·+ αnk 6= 0.
Proof. The claim follows from Remark 2.2.
3. P RIME
IDEALS AND REGULAR SEQUENCES
We begin this section with a useful lemma, which states that all the partial
derivatives of a complete symmetric polynomial form a regular sequence in the
polynomial ring, see Lemma 3.1. Then we use Lemma 3.1 to show that the complete symmetric polynomials and their partial derivatives are smooth polynomials,
see Lemma 3.2 and Lemma 3.3. Then we recall the irreducibility of Schur polynomial in the polynomial ring, see [3, Theorem 3.1]. In a special case, we discuss
the smoothness of Schur polynomial, see Example 3.5. Then we discuss the main
results of this paper, Theorem 3.8 and Theorem 3.13 respectively. We also discuss
the case of two complete symmetric polynomials generating a prime ideal in the
polynomial ring.
Lemma 3.1. Let n ∈ N with n ≥ 3. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring.
Let a ≥ 2. Then the following holds:
(i)
(ii)
(iii)
∂ ha
∂ ha
∂ x1 , · · · , ∂ xn form a regular sequence in S.
∂ pa
∂ pa
∂ x1 , · · · , ∂ xn form a regular sequence in S.
∂ ea
∂ ea
∂ x1 , · · · , ∂ xn form a regular sequence in S for
all a < n.
Proof. Let the ideal generated by all the partial derivatives of ha be Ja , that is,
Ja = h
∂ ha
∂ ha
,··· ,
i.
∂ x1
∂ xn
(6)
PRIME IDEALS AND REGULAR SEQUENCES
5
We have aha = ∑ xi ∂∂hxai . Thus, clearly ha ∈ Ja . By Lemma 2.1 (i), we have
∂ ha
∈ Ja .
i=1 ∂ xi
n
(n + a − 1)ha−1 = ∑
That is, ha−1 ∈ Ja . By Lemma 2.1 (i), we have
∂ ha+1
∂ ha
= ha + xi
∈ Ja .
∂ xi
∂ xi
Thus, we observe that Ja+1 ⊂ Ja . Moreover, ha+1 ∈ Ja+1 . Proceeding similarly, we
have a chain of containment of ideals
Ja+n−2 ⊂ · · · ⊂ Ja+1 ⊂ Ja .
Therefore, we have ha−1 , ha , ha+1 , · · · ⊂ ha+n−2 ∈ Ja . Recall that by [1, Proposition
2.9], any n consecutive complete symmetric polynomials ha−1 , ha , . . . , ha+n−2 form
a regular sequence in S for all a ≥ 2. Thus, we conclude that ht(Ja ) = n, moreover
Ja is a complete intersection ideal in S. The claim (ii) is obvious. Let the ideal
generated by all the partial derivatives of ea be Ea . The proof of (iii) is similar
to above, except the fact that this time, we choose carefully a’s such that ea ∈
Ea . The reason for this is that ea = 0 for all a > n. We want to use the fact that
e1 , e2 , . . . , en ∈ Ea . As we know that e1 , · · · , en form a regular sequence in S.
In the following lemma, we discuss the smoothness of the symmetric polynomials ha , ea and pa .
Lemma 3.2. Let n ∈ N with n ≥ 3. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring.
Then the following holds:
(i) ha is smooth, hence an irreducible element in S for all a ≥ 1.
(ii) ea is smooth, hence an irreducible element in S for all 1 ≤ a ≤ n − 1.
(iii) pa is smooth, hence an irreducible element in S for all a ≥ 1.
Proof. If a = 1, the claims are obvious. We will give an elementary proof of (i).
The proof of (ii) and (iii) are similar.
Proof of (i): If ha = f · g with f and g non constant polynomial, then f and g
have to be homogeneous. By Bezout theorem, the hypersurfaces f = 0 and g = 0
intersects in the projective space Pn−1 , since n ≥ 3. This gives a singular point
on the hypersurface ha = 0. So, it suffices to prove that ha , ∂∂ hx1a , . . . , ∂∂ hxna have no
common zero in Cn − {0}. This claim follows from Lemma 3.1 (i).
In the following lemma, we discuss the smoothness of the partial derivatives of
the complete symmetric polynomials.
Lemma 3.3. Let n ∈ N with n ≥ 3. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring.
Let a ≥ 3. Then ∂∂hxai is smooth, and hence irreducible in S.
Proof. It is enough to show that
∂ ha
∂ x1
is smooth. Similar to the proof given in Lemma
3.2, it suffices to show that all its partial derivatives ∂∂x1 ∂hax1 , ∂∂x1 ∂hax2 , . . . , ∂∂x1 ∂haxn have
no common zero in Cn − {0}. We set few notations for convenience, for instance,
let ga,i = ∂∂hxai . Let the ideal generated by all the partial derivatives of ga,1 be Ia :
Ia = h
2
∂ ga,1 ∂ ga,1
∂ ga,1
,
··· ,
i.
∂ x1 ∂ x2
∂ xn
2
2
6
NEERAJ KUMAR
Also note that
∂ ga, j
∂ xi
=
∂ ga,i
∂xj .
With this observation, one obtains
Ia = h
∂ ga,1 ∂ ga,2
∂ ga,n
,
··· ,
i.
∂ x1 ∂ x1
∂ x1
Taking partial derivatives of ga,i w.r.t. x1 , for i = 1, . . . , n,
∂ ga,1 ∂ ha−1
∂ 2 ha
∂ ha−1
=
+ x1
+
,
∂ x1
∂ x1
∂ x1 ∂ x1
∂ xi
∂ ga,2 ∂ ha−1
∂ 2 ha
=
+ x2
∂ x1
∂ x1
∂ x2 ∂ x1
..
.
∂ ga,n ∂ ha−1
∂ 2 ha
=
+ xn
∂ x1
∂ x1
∂ xn ∂ x1
Then summing up, we get
n
∂ ga,i
∂ ha−1
∂ ∂ ha−1
=(n + 1)
+ ∑ xi
(
)
∂ x1
∂ x1
i=1 ∂ xi
i=1 ∂ x1
n
∑
=(♯)
∂ ha−1
,
∂ x1
for some integer number ♯, which is irrelevant. Thus, we conclude that
Also ga,1 ∈ Ia . We also know that ga,1 =
ha−1 ∈ Ia . Now consider the ideal
Ia+1 = h
∂ ha
∂ x1
=
ha−1 + x1 ∂∂hxa−1
.
1
∂ ha−1
∂ x1
∈ Ia .
Thus, we get
∂ ga+1,1 ∂ ga+1,1
∂ ga+1,1
,
··· ,
i.
∂ x1
∂ x2
∂ xn
Proceeding similarly, we obtain
n
∂ ga+1,i
∂ ha
∂ ∂ ha
=(n + 1)
+ ∑ xi
(
)
∂ x1 i=1 ∂ xi ∂ x1
i=1 ∂ x1
n
∑
=(♯1 )
∂ ha
,
∂ x1
for some integer number ♯1 , which is irrelevant. Thus, we conclude that
Also ga+1,1 ∈ Ia+1 . We also know that ga+1,1 =
∂ ga+1,1
∂ xi
∂ ha+1
∂ x1
=
ha + x1 ∂∂ hx1a .
∂ ha
∂ x1
∈ Ia+1 .
Thus, we get
ha ∈ Ia+1 . Also note that
∈ Ia for all i. That is, Ia+1 ⊂ Ia . Proceeding in a
similar way, we obtain the following relations
Ia+ j+1 ⊂ Ia+ j , and ha+ j−1 ∈ Ia+ j
for all j ≥ 0. Thus, using similar argument as in the Lemma 3.1, we conclude
that ht(Ia ) = n, moreover Ia is a complete intersection ideal in S. Thus the claim
follows.
Following Macdonald [10], the Schur polynomial is defined as
λ +n− j
sλ = sλ (x1 , . . . , xn ) =
det(xi j
)1≤i, j≤n
,
n− j
det(xi )1≤i< j≤n
PRIME IDEALS AND REGULAR SEQUENCES
7
where λ = (λ1 , λ2 , . . . , λn ) is the partition of non-negative integers with λi ≥ λi+1
for i = 1, . . . , n − 1. For Schur polynomial, we have the following relation, see [10,
Equation 3.4]:
where n ≥ l(λ ).
sλ = det(hλi −i+ j )1≤i, j≤n
(7)
Remark 3.4. Irreducibility of Schur polynomial is discussed by Dvornicich and
Zannier in [3]. Let n ≥ 3. For a given partition λ = (λ1 , λ2 , . . . , λn ), where λ1 >
λ2 > · · · > λn with λn = 0 and gcd(λ1 , λ2 , . . . , λn−1 ) = 1, then the Schur polynomial
sλ (x1 , . . . , xn ) is irreducible in S = C[x1 , x2 , . . . , xn ], see [3, Theorem 3.1]. Recall
that ha and ea are special forms of a Schur polynomial. Simply note that the irreducibility of ha and ea does not follow from [3, Theorem 3.1]. In the Lemma 3.2,
we not only show the irreducibility of these polynomials, but also the smoothness.
The obtained results partially extend the domain of partition for the irreducibility
of Schur polynomial.
Assuming that the Schur polynomial sλ (x1 , . . . , xn ) is irreducible in S. One may
ask, whether is it true that the Schur polynomial is also smooth? The answer is
positive in the case of ha and ea . Computational evidence shows that the answer
is negative in general. However, in a special case, when the partition λ is of the
form (λ1 , 1, 0) for λ1 ≥ 2, then the Schur polynomial sλ (x1 , x2 , x3 ) turns out to be
smooth in C[x1 , x2 , x3 ]. We discuss the proof of this in the following example:
Example 3.5. Let S = C[x1 , x2 , x3 ] be a polynomial ring. Let λ = (λ1 , 1, 0) be the
partition. Then the Schur polynomial sλ (x1 , x2 , x3 ) is smooth in S for all λ1 ≥ 2.
Proof. By (7), we have
sλ = s(λ1 ,1,0) = h1 hλ1 − hλ1 +1 .
Similar to the proof given in Lemma 3.2, it suffices to show that all its partial
derivatives ∂∂ sxλ1 , ∂∂ sxλ2 , ∂∂ sxλ3 have no common zero in C3 − {0}. Taking partial derivatives of sλ w.r.t. xi , we get
∂ hλ1 ∂ hλ1 +1
∂ sλ
=hλ1 + h1
−
∂ xi
∂ xi
∂ xi
∂ hλ1
=(h1 − xi )
for all i = 1, 2, 3.
∂ xi
∂ hλ1 ∂ hλ1 ∂ hλ1
∂ x1 , ∂ x2 , ∂ x3
By Lemma 3.1, we conclude that h ∂∂ sxλ1 , ∂∂ sxλ2 , ∂∂ sxλ3 i
We see that h1 6= xi , unless xi = 0 for all i. Thus the common zero of
is also a common zero of ∂∂ sxλ1 , ∂∂ sxλ2 , ∂∂ sxλ3 .
is a complete intersection ideal in S. Thus the claim follows.
We record the following convention, which we will follow from here onwards
throughout this paper:
Conventions 3.6. When we list the symmetric polynomials fi1 , fi2 , . . . , fik with respective degrees deg( fi j ) = i j , we always assume that i1 < i2 < · · · < ik , unless
otherwise specified.
In the following proposition, we will see that any two complete symmetric polynomials always form a regular sequence in S = C[x1 , . . . , xn ] for n ≥ 3. Similar
results also hold for the power sum and elementary symmetric polynomials.
8
NEERAJ KUMAR
Proposition 3.7. Let n ∈ N with n ≥ 3. Let S = C[x1 , x2 , . . . , xn ] be a polynomial
ring. Then the following holds:
(i) ha , hb form a regular sequence.
(ii) ea , eb form a regular sequence for all 1 ≤ a < b ≤ n − 1.
(iii) pa , pb form a regular sequence.
Proof. We will prove (i). By Lemma 3.2, ha is an irreducible polynomial in S.
Hence S/hha i is a domain. Now hb being an irreducible polynomial in S, can not
be factored into lower degree complete symmetric polynomials ha . So, hb is a
nonzero divisor in S/hha i for b > a. Hence ha , hb form a regular sequence in S.
Proof of (ii) and (iii) are similar.
We have seen that any two power sum polynomials pa , pb form a regular sequence in S = C[x1 , x2 , . . . , xn ] for n ≥ 3. We would like to know when two power
sum polynomials generate a prime ideal in S for n ≥ 4. In a special case, some
answers are known due to [8, Theorem 4.3 and Proposition 4.3]. In the following
theorem, we will answer this to certain extent, when two power sum polynomials
generate a prime ideal in S for n ≥ 4, purely in terms of arithmetic conditions of
the degree of polynomials and the number of indeterminates.
Theorem 3.8. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring with n ≥ 4. Let I =
hpa , pb i, where a, b ∈ N. Let b − a = n0 . Suppose q1 is the smallest prime factor in
the factorization of n0 . If q1 > max{n, a}, then I is a prime ideal in S. Moreover
pa , pb , pc form a regular sequence in S for all pc ∈
/ hpa , pb i.
Proof. If n0 = 1, then I is a prime ideal in S follows from [8, Theorem 4.3]. Thus,
we assume that n0 ≥ 2. Let R = S/I. We compute the Jacobian of I up to scalar
(We can ignore the coefficients, since we are in the field of characteristic zero.),
say Jacobian is J:
a−1 a−1
x
x
. . . xa−1
n
J = 1b−1 2b−1
.
x1
x2
. . . xb−1
n
Let J ′ = I2 (J), denotes the ideal generated by 2 × 2 minors of Jacobian. Also
ht(I) = 2, since I is generated by a regular sequence of length 2. The determinants
of 2 × 2 minors of the Jacobian can be written as
a−1 b−a
J ′ = h xa−1
(x j − xb−a
) i for 1 ≤ i < j ≤ n.
j xi
i
Thus, we have
a−1 b−a
I + J ′ = h pa , pb , xa−1
(x j − xb−a
) i for 1 ≤ i < j ≤ n.
j xi
i
√
Claim: I + J ′ = (x1 , x2 , . . . , xn ).
Suppose not, that is, there exists w = (w1 , w2 , . . . , wn ) ∈ Pn−1 with w ∈ Z(I + J ′ ).
Since w is in Pn−1 , we may assume w = (1, y1 , y2 , . . . , yn−1 ). As w ∈ Z(I + J ′ ), we
have that yb−a
= yni 0 = 1 for all i = 1, . . . n − 1, moreover w also satisfies pa , pb .
i
Therefore we have
1 + ya1 + ya2 + · · · + yan−1 = 0 and 1 + yb1 + yb2 + · · · + ybn−1 = 0.
Both the equations reduce to the existence of solution of 1+ya1 +ya2 +· · ·+yan−1 = 0.
We use the fact that all the yi ’s are n0 -th roots of unity, say 1, ζ1 , . . . , ζn0 −1 . Suppose
q1 is the smallest prime factor in the factorization of n0 . If q1 > max{n, a}, then
PRIME IDEALS AND REGULAR SEQUENCES
9
it follows from Lemma 2.3 that 1 + ya1 + ya2 + · · · + yan−1 6= 0. So, the only possible
solution has to be the trivial solution. Hence the claim is proved.
Thus ht(I + J ′ ) = n and dim S/(I + J ′ ) = 0. The co-dimension of J ′ in S is n − 2.
By [4, Theorem 18.15], R is a product of normal domain, since n ≥ 4. Thus, we
can write R = R1 × · · · × Rk . Since R is a standard graded C-algebra with R0 = C,
also R0 = (R1 )0 × · · · × (Rk )0 = Ck . Hence k = 1. Thus R is a normal domain and
I is a prime ideal in S.
Remark 3.9. Let p1 , p2 , p5 ∈ C[x1 , . . . , x4 ]. By Newton’s formula (3), we observe
that p5 ≡ 0 mod (p1 , p2 ). Hence p5 ∈ hp1 , p2 i. Replacing xi by xdi , we may also
conclude that p5d ∈ hpd , p2d i. Thus in the hypothesis of Theorem 3.8, we need the
condition pc ∈
/ hpa , pb i.
Remark 3.10. Computer calculations in CoCoA [2] suggest that whenever I =
hpa , pb i is a prime ideal in C[x1 , x2 , x3 , x4 ], then pa , pb , pc form a regular sequence,
except pa , p2a , p5a . It is clear from Remark 3.9 that pa , p2a , p5a do not form a
regular sequence. If this computational claim can be answered, then it will prove
[8, Conjecture 4.5] to certain extent.
Proposition 3.11. Let I and J be the prime ideal in K[x1 , . . . , xn ] and K[y1 , . . . , ym ]
respectively, where K is an algebraically closed field. Let (I, J) be the ideal generated by elements of I and J in K[x1 , . . . , xn , y1 , . . . , ym ]. Then (I, J) is a prime ideal
in K[x1 , . . . , xn , y1 , . . . , ym ].
Proof. There is a standard isomorphism
K[x1 , . . . , xn ]/I ⊗ K[y1 , . . . , ym ]/J ∼
= K[x1 , . . . , xn , y1 , . . . , ym ]/(I, J)
by sending f ⊗ g 7→ f g. We see that both K[x1 , . . . , xn ]/I and K[y1 , . . . , ym ]/J are
integral domains as well as K-algebras. By [12, Proposition 4.15(b)], the tensor
product of K[x1 , . . . , xn ]/I and K[y1 , . . . , ym ]/J is also an integral domain, since K
is algebraically closed field. Hence the claim follows.
Remark 3.12. Note that the goal of Proposition 3.11 is to generate more families
of prime ideals from given prime ideals.
By [1, Proposition 2.9], we know that p1 , p2 , . . . , pn form a regular sequence in
S = C[x1 , x2 , . . . , xn ]. We also know that a subset of a regular sequence is again a
regular sequence. Thus p1 , p2 , . . . , pm also form a regular sequence for all m < n.
Then by [1, Lemma 2.2], we conclude that pa , p2a , . . . , pma also form a regular
sequence. Let I = hpa , p2a , . . . , pma i, where a ∈ N, and m < n − 1. Let R = S/I.
Then R is a Cohen-Macaulay ring. In the following theorem, we will show that I
is a prime ideal in S. We show this by proving that R is a normal domain using
Serre’s criterion for normality.
Theorem 3.13. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring with n ≥ 3. Let a ∈ N.
Let I = hpa , p2a , . . . , pma i, where m < n − 1. Then I is a prime ideal in S.
Proof. For a = 1, it follows from [8, Proposition 4.3]. Assume a > 1. Let R = S/I.
We compute the Jacobian of I up to scaler, say Jacobian is J:
a−1
a−1
x1
xa−1
·
·
·
x
n
2
x2a−1 x2a−1 · · · x2a−1
n
1
2
J= .
.. .
..
..
.
.
···
x1ma−1 x2ma−1 · · ·
xnma−1
10
NEERAJ KUMAR
We can ignore the coefficients, since we are in the field of characteristic zero. We
have ht(I) = m, since I is generated by a regular sequence of length m. Let J ′ =
Im (J), denotes the ideal generated by m×m minors of Jacobian J. The determinants
of m × m minors of the Jacobian can be written as
J ′ = h xij11 xij22 · · · xijmm
∏
(xijaa − xijbb ) i for 1 ≤ i1 < i2 < · · · < im ≤ n,
1≤a<b≤m
where j1 , j2 , . . . , jm are some positive integers. Therefore
I + J ′ = hpa , p2a , . . . , pma , xij11 xij22 · · · xijmm
∏
(xijaa − xijbb )i.
1≤a<b≤m
√
Claim: I + J ′ = (x1 , x2 , . . . , xn ).
Suppose not, that is, there exists w ∈ Pn−1 with w ∈ Z(I + J ′ ). Then the vector
w can have at the most m − 1 distinct nonzero coordinates. If w has m or more
than m distinct nonzero coordinates, then w ∈
/ Z(J ′ ). Say w has v distinct nonzero
coordinates. We can write
w = (w1 , . . . w1 , w2 , . . . , w2 , . . . , wv , . . . , wv , 0, 0, . . . , 0),
where wi appears βi times and v ≤ m − 1. Also w should satisfy pia for i = 1, . . . , m.
Thus, we have
ia
ia
β1 wia
1 + β2 w2 + · · · + βv wv = 0 for i = 1, 2, . . . , m.
This is a system of equation, which can be represented in the matrix form with m
rows and v columns as
1
1
···
1
0
β1 wa1
a
a
a
wa1
w
·
·
·
w
w
β
v
2
2 2 0
..
.. .. = .. .
..
.
.
···
. . .
(m−1)a
w1
(m−1)a
w2
···
(m−1)a
wv
βv wav
0
We know that neither βi = 0 nor wi = 0 for i = 1, . . . , v. So βi wai 6= 0 for i = 1, . . . , v.
We can choose the matrix say M with first v rows out of m rows and look for
the solution. The matrix M is of full rank since wi 6= w j for i 6= j, so the only
possible solution has to be the trivial solution. Hence the claim is proved. By
similar argument as used in Theorem 3.8, we conclude that R is a normal domain
and I is a prime ideal in S.
For n ≥ 4, we know that the ideal hp1 , p2 , . . . , pm i is prime in S = C[x1 , x2 , . . . , xn ]
for all m < n − 1, see [8, Theorem 4.3]. We will see in the following theorem that
similar result holds for the complete symmetric polynomials and the elementary
symmetric polynomials.
Proposition 3.14. Let pa , ha , and ea in the polynomial ring S = C[x1 , x2 , . . . , xn ],
with n ≥ 4. Let m < n − 1. Then one has
hp1 , p2 , . . . , pm i = hh1 , h2 , . . . , hm i = he1 , e2 , . . . , em i.
Therefore the ideals hh1 , h2 , . . . , hm i and he1 , e2 , . . . , em i are also prime in S.
Proof. It follows from simple observation in the ring of symmetric polynomials
that the algebra generated by the power sum polynomials p1 , p2 , . . . , pm is same as
the algebra generated by h1 , h2 , . . . , hm , and also by e1 , e2 , . . . , em . Thus one has
hp1 , p2 , . . . , pm i = hh1 , h2 , . . . , hm i = he1 , e2 , . . . , em i.
(8)
PRIME IDEALS AND REGULAR SEQUENCES
11
One may also conclude (8) from Newton’s formula (1) and (3). By [8, Theorem 4.3], hp1 , p2 , . . . , pm i is a prime ideal in S. Thus, we can conclude that
hh1 , h2 , . . . , hm i and he1 , e2 , . . . , em i are also prime ideals in S.
Remark 3.15. Let n = 4 in Proposition 3.14. Then h1 , h2 , ha form a regular sequence in S provided ha ∈
/ hh1 , h2 i. By Newton’s formula (1), we observe that
h5 ≡ 0 mod (h1 , h2 ). Hence h5 ∈ hh1 , h2 i. We see that h1 , h2 generate a prime
ideal in S, but h1 , h2 , h5 do not form a regular sequence in S. Thus, we need the
condition ha ∈
/ hh1 , h2 i.
Computer calculations in CoCoA [2] suggest that I = hh1 , h2m i, where m ∈ N,
should be a prime ideal in S = C[x1 , x2 , x3 , x4 ]. For m = 1, it follows from Proposition 3.14. We prove for m = 2 in the following example.
Example 3.16. Let S = C[x1 , x2 , x3 , x4 ] be a polynomial ring. Let I = hh1 , h4 i.
Then I is a prime ideal in S.
Proof. Let R = S/I. We compute the Jacobian of I, say Jacobian is J. Let J ′ =
I2 (J), denotes the ideal generated by 2 × 2 minors of Jacobian. Also ht(I) = 2,
since I is generated by a regular sequence of length 2. The determinants of 2 × 2
minors of the Jacobian can be written as
∂ h4 ∂ h4
−
i for 1 ≤ i < j ≤ 4.
J′ = h
∂ xi ∂ x j
By Lemma 2.1 (i), we may write J ′ as
J ′ = h (x j − xi )h2 + (x2j − x2i )h1 + (x3j − x3i )i for 1 ≤ i < j ≤ 4.
Thus, we have
I + J ′ = hh1 , h4 , (x j − xi )h2 + (x2j − x2i )h1 + (x3j − x3i )i for 1 ≤ i < j ≤ 4.
√
Claim: I + J ′ = (x1 , x2 , x3 , x4 ).
Suppose not, that is, there exists w = (w1 , w2 , w3 , w4 ) ∈ P3 with w ∈ Z(I + J ′ ). We
assume that none of wi is zero. Also assume that wi 6= w j for i 6= j. Since w is in
P3 , we can make w1 = 1 as w1 6= 0. So, let w = (1, x, y, z). As w ∈ Z(I + J ′ ), we
have h1 (w) = 0 = h4 (w), moreover
(x j − xi )h2 (w) + (x3j − x3i ) = 0 for 1 ≤ i < j ≤ 4.
(9)
By (9), either xi = x j or h2 (w) = −(x2j + xi x j + x2i ) for 1 ≤ i < j ≤ 4. By assumption
xi 6= x j . Thus we have h2 (w) = −(x2j + xi x j + x2i ) for 1 ≤ i < j ≤ 4. An easy
simplification shows that it is not possible. We may argue similarly when wi = w j
for i 6= j. Hence there is no nontrivial solution. By similar argument as used in
Theorem 3.8, we conclude that R is a normal domain and I is a prime ideal.
Simply note that by [1, Lemma 2.2 and Proposition 2.9], the sequence of polynomials pa , p2a , . . . , pna and ha , h2a , . . . , hna form a regular sequence in S = C[x1 , x2 , . . . , xn ]
respectively. We partially extend the above conclusion in the following proposition:
Proposition 3.17. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring. Let n, b, k ∈ N.
Then the following holds:
(i) pa , p2a , . . . , p(n−1)a , pb form a regular sequence in S if and only if b = nak.
(ii) ha , h2a , . . . , h(n−1)a , hb form a regular sequences in S if and only if b = nak.
12
NEERAJ KUMAR
Proof. By Newton’s formula (3), one has
(
(−1)k nekn mod (p1 , p2 , . . . , pn−1 ),
pc =
0 mod (p1 , p2 , . . . , pn−1 ),
if c = nk;
otherwise.
Clearly p1 , p2 , . . . , pn−1 , pc form a regular sequence in S if and only if c = nk. Thus
the claim (i) follows from [1, Lemma 2.2 ]. By Newton’s formula (1), one has
(
(−1)k ekn mod (h1 , h2 , . . . , hn−1 ), if c = nk;
hc =
0 mod (h1 , h2 , . . . , hn−1 ),
otherwise.
Clearly h1 , h2 , . . . , hn−1 , hc form a regular sequence in S if and only if c = nk. Thus
the claim (ii) also follows from [1, Lemma 2.2 ].
4. F INAL R EMARKS
Following question is a special case of Question 1.1:
Question 4.1. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring with n ≥ 4. Let I =
hpa , pb i, where a, b ∈ N. For which pairs of integers a, b, I is a prime ideal in S.
We answer the previous question to some extent in the Theorem 3.8. We observe
that the Theorem 3.8 is still in weaker form, due to arithmetic condition q1 >
max{n, a}. In fact one can answer all the prime ideals which arises by using Serre
criterion for normality and vanishing sums of roots of unity, by answering the
following problem:
Problem 4.2. Let m ∈ N. Consider m-th roots of unity in the field of complex
number C. For which natural numbers n and k ≥ 2, do there exist m-th roots of
unity α1 , . . . , αn ∈ C such that α1k + α2k + · · · + αnk 6= 0.
Similar to Question 4.1, one may also ask the following question:
Question 4.3. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring with n ≥ 4. Let I =
hha , hb i, where a, b ∈ N. For which pairs of integers a, b, I is a prime ideal in S.
For n = 4 in the previous question, the computational calculations in CoCoA [2]
suggest that I = hh1 , h2m i, where m ∈ N, should be a prime ideal in S = C[x1 , x2 , x3 , x4 ].
Recall the following definition:
Definition 4.4. Let R = ci=0 Ri , Rc 6= 0 be a graded Artinian algebra. We say that
R has the strong Lefschetz property (SLP) if there exists an element L ∈ R1 such
that the multiplication map
×Ld : Ri −→ Ri+1
has full rank for all 0 ≤ i ≤ c − 1 and 1 ≤ d ≤ c − i. We call an L ∈ R1 with this
property a strong Lefschetz element.
L
Let J = hpa , pa+1 , . . . , pa+n−1 i in the polynomial ring S = K[x1 , x2 , . . . , xn ] over
a field K. Then the Artinian ring R = S/J has the SLP, see [6, Proposition 7.1].
In the following example, we will show that for a complete intersection ideal I =
hha , ha+1 , . . . , ha+n−1 i, the Artinian ring R = S/I have the SLP.
Example 4.5. Let K be a field of characteristic zero. Let S = K[x1 , x2 , . . . , xn ]
be a polynomial ring over K with standard grading, i.e. deg xi = 1 for all i. Let
I = hha , ha+1 , . . . , ha+n−1 i. Then R = S/I has the SLP.
PRIME IDEALS AND REGULAR SEQUENCES
13
Proof. Consider the initial ideal of I with respect to lexicographic term order, one
has
a+n−1
in(I) = hxa1 , xa+1
i.
2 , . . . , xn
Stanley [14] proved that every monomial complete intersection
a+n−1
K[x1 , x2 , . . . , xn ]/hxa1 , xa+1
i
2 , . . . , xn
has the SLP with x1 + x2 + · · · + xn as a strong Lefschetz element using the fact that
it is isomorphic to the cohomology ring of a direct product of projective spaces
over the complex number field. We see that S/in(I) has the SLP. Thus, by [15,
Proposition 2.9] we conclude that R has the SLP.
Question 4.6. Let S = C[x1 , x2 , . . . , xn ] be a polynomial ring. Let k ∈ N. Is it true
that for the ideal I = hha , h2a , . . . , h(n−1)a,hnak i, one has the initial ideal
nak
in(I) = hxa1 , x2a
2 , . . . , xn i.
If the answer to the previous question is positive. Then again one can construct
more examples of Artinian ring having the SLP. In a joint work with Martino [8],
we explicitly derive several examples of complete intersection ideal generated by
complete symmetric polynomials. Again, one can ask similar question for those
complete intersection ideals.
We conclude the section with one remark from the recent paper of Fröberg
and Shapiro [5], where the authors established a connection between regular sequences of complete symmetric polynomials and the codimention of the Vandermonde variety. To an arbitrary pair (k; I), where k ≥ 2 is a positive integer and
I = {i0 < i1 < · · · < im−1 }, m ≥ k is a sequence of integers, Fröberg and Shapiro
A in [5]. Under the assumption i = 0 and
discuss the Vandermonde variety V dk;I
0
gcd(i1 , . . . , im−1 ) = 1, the authors asked [5, Problem 2], for which pairs (k; I), the
A has the expected codimention. In the first non-trivial case k = 3, m =
variety V dk;I
A has the expected codimention (equal
5, the authors conclude that the variety V d3;I
to 3) if and only if three complete symmetric polynomials hi2 −2 , hi3 −2 , hi4 −2 form a
regular sequence in C[x1 , x2 , x3 ]. The problem of when three complete symmetric
polynomials ha , hb , hc , form a regular sequence in C[x1 , x2 , x3 ] was considered in
[1, Conjecture 2.17]. In [5, Conjecture 13], in a special case, it is mentioned that
if (a, b, c) = (1, 4, 3k + 2), k ≥ 1, then ha , hb , hc neither is a regular sequence, nor
hc ∈ (ha , hb ). This will be clear from the following proposition:
Proposition 4.7. Let S = C[x1 , x2 , x3 ] be a polynomial ring. Then h1 , h4 , hn form a
regular sequence in S if and only if n = 3k, k ≥ 1.
Proof. By Newton’s formula (1), one has
k
e3 mod (h1 , h4 ),
hn = 0 mod (h1 , h4 ),
−(k + 1)e2 ek3 mod (h1 , h4 ),
Thus the claim follows from [8, Theorem 2.2].
if n = 3k;
if n = 3k + 1;
if n = 3k + 2.
14
NEERAJ KUMAR
R EFERENCES
[1] A. Conca, C. Krattenthaler, and J. Watanabe. Regular sequences of symmetric polynomials.
Rend. Semin. Math. Univ. Padova 121, 179–199 (2009).
[2] The CoCoATeam. CoCoA: a system for doing Computations in Commutative Algebra. Available at http://cocoa.dima.unige.it.
[3] R. Dvornicich and U. Zannier. Newton functions generating symmetric fields and irreducibility
of Schur polynomials. Adv. Math. 222, no. 6, 1982–2003 (2009).
[4] D. Eisenbud. Commutative Algebra. With a view toward algebraic geometry. Graduate Texts in
Mathematics, 150 Springer-Verlag, New York, xvi+785 pp. (1995).
[5] R. Fröberg and B. Shapiro. Vandermonde varities and relations among Schur polynomials.
arXiv:1302.1298v1 [math.AC].
[6] T. Harima and J. Watababe. The strong Lefschetz property for Artinian algebras with nonstandard grading. J. Algebra. 311, no. 2, 511–537 (2007).
[7] M. Hochster. Big Cohen-Macaulay modules and algebras and embeddability in rings of Witt
vectors. Queen’s Papers on Pure and Applied Math. 42, 106–195 (1975).
[8] N. Kumar and I. Martino. Regular sequences of power sums and complete symmetric polynomials. Matematiche (Catania). 67, no. 1, 103–117 (2012).
[9] T. Y. Lam and K.H. Leung. On Vanishing sums of roots of unity. Journal of algebra. 224 , no. 1,
91–109 (2000).
[10] I. G. Macdonald. Symmetric functions and Hall polynomials. Second edition. With contributions by A. Zelevinsky. Oxford Mathematical Monographs. Oxford Science Publications. The
Clarendon Press, Oxford University Press, New York, x+475 pp, (1995).
[11] H. B. Mann. On linear relations between the roots of unity. Mathematika. 12, 107–117 (1965).
[12] J. S. Milne. Algebraic geometry. Allied Publishers. (2005).
[13] B. Poonen and M. Rubinstein. The number of intersection points made by the diagonal of a
regular polygon. SIAM J. Discrete Math. 11, no. 1, 135–156 (1998).
[14] R. P. Stanley. Weyl groups, the hard Lefschetz theorem, and the Sperner property. SIAM J.
Algebraic Discrete Methods. 1, no. 2, 168–184 (1980).
[15] A. Wiebe. The Lefschetz property for componentwise linear ideals and Gotzmann ideals.
Comm. Algebra. 32, no. 12, 4601–4611 (2004).
D IPARTIMENTO DI M ATEMATICA , U NIVERSIT Á DI G ENOVA , V IA D ODECANESO 35, 16146
G ENOVA , I TALY
E-mail address: [email protected]
| 0math.AC
|
DRAFT.
1
Optimal control of linear systems with limited control actions:
threshold-based event-triggered control
arXiv:1701.04871v1 [cs.SY] 17 Jan 2017
Burak Demirel, Euhanna Ghadimi, Daniel E. Quevedo and Mikael Johansson
Abstract—We consider a finite-horizon linear-quadratic optimal control problem where only a limited number of control
messages are allowed for sending from the controller to the
actuator. To restrict the number of control actions computed
and transmitted by the controller, we employ a threshold-based
event-triggering mechanism that decides whether or not a control
message needs to be calculated and delivered. Due to the nature of
threshold-based event-triggering algorithms, finding the optimal
control sequence requires minimizing a quadratic cost function
over a non-convex domain. In this paper, we firstly provide
an exact solution to the non-convex problem mentioned above
by solving an exponential number of quadratic programs. To
reduce computational complexity, we, then, propose two efficient
heuristic algorithms based on greedy search and the Alternating
Direction Method of Multipliers (ADMM) method. Later, we
consider a receding horizon control strategy for linear systems
controlled by event-triggered controllers, and we also provide
a complete stability analysis of receding horizon control that
uses finite horizon optimization in the proposed class. Numerical
examples testify to the viability of the presented design technique.
Index terms — Optimal control; Linear systems; Eventtriggered control; Receding horizon control
I. I NTRODUCTION
The problem of determining optimal control policies for
discrete-time linear systems has been extensively investigated
in the literature; see, e.g., [1]–[3]. The standard optimal control
problem assumes that an unlimited number of control actions
is available at the actuator. Although this assumption is valid
for many applications, it does not hold for some specific
scenarios where communication and computation resources
become scarce; for example, (a) control systems with constrained actuation resources [4]–[6], (b) control systems with
shared processor resources [7], or (c) information exchange
over a shared communication channel [8].
To reduce the communication burden between the controller
and the actuator, Imer and Başar [9] introduced a constraint
on the number of control actions while designing optimal
control policies for linear scalar systems. Later, Bommannavar
and Başar [10] and Shi et al. [11] extended the work of [9]
to a class of higher-order systems. The problem, proposed
in [9], can be also formulated as a cardinality-constrained
linear-quadratic control problem. The introduction of cardinality constraint changes the standard linear-quadratic control
B. Demirel and D. E. Quevedo are with the Faculty of Electrical Engineering and Information Technology, The University of Paderborn, Warburger Str. 100, 33098 Paderborn, Germany (e-mail: [email protected];
[email protected]).
E. Ghadimi is with Huawei Technologies Sweden AB, Skalhogatan 9-11
box 54, SE-164 94, Kista, Sweden (e-mail: [email protected]).
M. Johansson is with ACCESS Linnaeus Center, School of Electrical
Engineering, KTH Royal Institute of Technology, Osquldas väg 10, SE 10044
Stockholm, Sweden (e-mail: [email protected]).
problem from a quadratic programming (QP) to a mixedinteger quadratic programming (MIQP) problem. As it has
been proved in [12], it is an NP-complete problem. Therefore,
Gao and Lie [13] provided an efficient branch and bound
algorithm to compute the optimal control sequence. Since the
cardinality constraint is highly non-convex, a convex relaxation of this problem, based on `1 -regularized `2 optimization,
was considered in the literature; see, e.g., [14]–[17]. Although
`1 -norm regularization of the cost function is an effective way
of promoting sparse solutions, no performance guarantees can
be provided in terms of the original cost function due to the
transformed cost function.
Event- and self-triggered control systems have been broadly
used in the literature to reduce the amount of communication
between the controller and the actuator while guaranteeing an
attainable control performance; see, e.g., [18]–[22]. As distinct
from sparse control techniques as mentioned earlier, the eventand self-triggered control require the design of both a feedback
controller that computes control actions and a triggering
mechanism that determines when the control input has to be
updated. A vast majority of the works in the literature first
designed a controller without considering sparsity constraint,
and then, in the subsequent design phase, they developed
the triggering mechanism for a fixed controller. In contrast,
another line of research concentrates on the design of feedback
control law while respecting a predefined triggering condition.
The design of event- and self-triggered algorithms can
be extremely beneficial in the context of model predictive
control (MPC) strategies; see, e.g., [23]–[31]. MPC is a control
scheme that solves a finite-horizon optimal control problem
at each sampling instant and only applies the first element
of the resulting optimal control input trajectories. The use of
event-triggered algorithms, therefore, reduces the frequency
of solving optimization problems and transmitting control
actions from the controller to the actuator, and, consequently,
saves computational and communication resources. Lehmann
et al. [26] proposed an event-based strategy for discrete-time
systems under additive, bounded disturbances. The controller
only computes a new control command whenever the difference between actual state and predictive state exceeds a
threshold. Sijs et al. [23] combined state estimation with MPC
in order to design an event-based estimation framework. The
authors of [24], [25] combined MPC with event-triggered
sampling strategies based on the ISS concept. As different
from the aforecited works, the authors of [19]–[21] studied
infinite horizon quadratic cost. All works discussed above
focus on discrete-time linear/non-linear systems; however,
there are also a substantial number of works, which considers
continuous-time systems, in the literature; see, e.g., [30]–
[32]. For instance, the authors of [30], [32] investigated the
DRAFT.
2
stability of event-based MPC algorithms for continuous-time
nonlinear systems yet they did not consider disturbance. Later,
Li and Shi [31] studied the MPC problem for continuous-time
nonlinear systems subject to bounded disturbances.
Contributions: In this paper, we formulate a finite-horizon
optimal event-triggered control problem where a thresholdbased event-triggering algorithm dictates the communication
between the controller and the actuator. Then, we propose
various algorithms to compute a control action sequence that
provides optimal and sub-optimal solutions for this problem,
which is, in general, hard to solve due to two main reasons: (a)
it has the combinatorial nature since the decisions are binary
variable (i.e., transmit or not transmit), and (b) introduction
of a threshold-based triggering condition leads to optimizing
a convex cost function over a non-convex domain. The main
contributions of this paper are threefold:
(i) we show that the optimal solution of the control problem,
mentioned above, can be determined via solving a set of
quadratic programming problems;
(ii) we provide an efficient heuristic algorithm based on
ADMM to design a control input sequence that provides a
sub-optimal solution for the finite-horizon optimal eventtriggered control problem;
(iii) we describe the receding horizon implementation of the
event-triggered control algorithm, including a proof of
practical stability.
Outline: The remainder of this paper is organized as follows. Section II formulates the event-triggered finite-horizon
LQ control problem and introduces assumptions. Section III
provides a simple procedure for designing optimal control laws
to minimize the linear-quadratic cost function while Section IV
presents two heuristic methods that usually achieves tolerable sub-optimal performance while significantly reducing the
computational complexity. In Section V, a receding horizon
control scheme with event-triggered algorithm is presented.
Section VI demonstrates the effectiveness and advantages of
the presented approach while Section VII concludes the paper.
Notation: We write N for the positive integers, N0 for
N ∪ {0}, and R for the real numbers. Let Rn0 denote the
set of non-negative real vectors of dimension n, and Rn be
the set of real vectors of dimension n. Vectors are written
in bold lower case letters (e.g., u and v) and matrices in
capital letters (e.g., A and B). If u and v are two vectors
in Rn , the notation u ≤ v corresponds to component-wise
inequality. The set of all real symmetric positive semi-definite
matrices of dimension n is denoted by Sn0 . We let 0n be the
n–dimensional column vectors of all zeros, 1n be the vectors
of all ones. The Kronecker product of two matrices (e.g., A
and B) is denoted by A ⊗ B. For any given x ∈ Rn , the `∞ –
norm is defined by k x k∞ = max |xi |. For a square matrix
1≤i≤n
A, λmax (A) denotes its maximum eigenvalue in terms of
magnitude. The notation{xk }k∈K stands for {x(k) : k ∈ K},
where K ⊆ N0 . The power set of any set N , written P(N ),
is the set of all subsets of N , including the empty set and N
itself. The cardinality of a set denoted by |N |.
II. F INITE H ORIZON O PTIMAL E VENT-T RIGGERED
C ONTROL
We consider the feedback control loop, depicted in Fig. 1.
The dynamics of the physical plant G can be described by the
discrete-time linear time-invariant system:
G:
x(t + 1) = Ax(t) + Bu(t) ,
x(0) = x0 ,
(1)
where x(t) ∈ Rn is the state variable at time instant t, u(t) ∈
Rm is the control input at time instant t, A ∈ Rn×n and
B ∈ Rn×m are system matrices of appropriate dimensions,
and x0 ∈ Rn is the given initial condition. The pair (A, B)
is assumed to be stabilizable, and A is not necessarily Schur
stable.
In this paper, we assume that the sensor S takes periodic
noise-free samples of the plant state x(t) and transmits these
samples to the controller node. The controller K is eventtriggered, and it computes new control commands and transmits them to the actuator A only at times when x(t) ∈ S ,
Rn \ C0 with
C0 , {x ∈ Rn :k x k∞ < ε} ,
(2)
for a given threshold ε > 0. In case x(t) ∈ C0 , the controller
does not compute any new control actions, and the actuator
input to the plant is set to zero:
u(t) = 0m ,
where
∀t ∈ T ,
T , {t ∈ N0 ; t < N : x(t) ∈ C0 } .
(3)
(4)
It is worth noting that T denotes a set of time instants at which
no control computations are needed and, in turn, the plant runs
open loop. Notice that T is not a given set of variables; in
contrast, it is generated by the initial state x0 and the tentative
control actions u(t) for all t ∈ {0, · · · , T − 1}. Hence, to
determine the set T , it is necessary to compute the tentative
control actions u(t). In other words, the set of time instants
T is strongly coupled to the tentative control inputs u(t).
Throughout this paper, we aim at designing an admissible
optimal control sequence π = {u(0), u(1), · · · , u(N − 1)} to
minimize the quadratic cost function:
J(x(0), π) = x| (N )P x(N )
+
N
−1
X
x| (t)Qx(t) + u| (t)Ru(t) , (5)
t=0
where the matrices Q and P are symmetric and positive semidefinite while R is symmetric and positive definite. Then, we
consider the constrained finite-time optimal control problem:
J ? (x(0)) : minimize
π
J(x(0), π)
subject to x(t + 1) = Ax(t) + Bu(t),
∀t ∈ {0, · · · , N − 1},
x(0) = x0 ,
u(t) = 0m , ∀t ∈ T .
(6)
Recall that the set of time instants, at which no computations
(and also transmissions) are needed, i.e., T , is defined in (4).
DRAFT.
3
A
G
x0
0
S
x(t) 2 Rn \ C0
x(t) 2 C0
u(t)
x(t)
1
K
K
Fig. 1. Event-triggered control system with the process G, the actuator A,
the sensor S and the controller K.
Remark 1 Note that the event-triggered control problem,
described in Section II, is a particular class of hybrid systems.
One may, therefore, convert it into an equivalent mixed logical
dynamical (MLD) system that represents the system by using a
blend of linear and binary constraints on the original variables
and some auxiliary variables; see, e.g., [33], [34]. In this
paper, instead of using the MLD system formulation, we will
exploit geometric properties of the problem at hand, which
allows us to propose an optimization problem for optimal
finite-horizon control and establish stability result for its
receding horizon implementation.
Discussion: Although the problem (6) resembles the
cardinality-constrained optimal control problem (proposed
in [9]–[17]), there is a fundamental difference between them,
which stems from the question whether scheduling is an
exogenous input or autonomously generated? While solving
the cardinality-constrained control problem, one needs to
optimize both control action and scheduling sequence, which
are strongly coupled to each other in the optimization process.
On the other hand, the event-triggered control systems are
switched systems with internally forced switchings. In these
problems, scheduling sequences are generated implicitly based
on the evolution of the state x(t) and the control signal
u(t). The major difficulty of this problem is that scheduling
depends on the particular initial condition x0 and the tentative
control input u(t), and cannot be explicitly determined unless
a specific control signal was given; see the survey paper [35]
and references therein.
III. C OMPUTATION OF OPTIMAL CONTROL ACTIONS
In this section, we concentrate on finding the control input
sequence π that solves the finite-horizon optimal control problem, proposed in (6). Therefore, we present a framework which
is based on dividing the non-convex domain into convex subdomains. This is a simple yet effective procedure to follow;
however, the number of convex optimization problems, which
needs to be solved, grows exponentially in the length of the
control horizon.
The optimal control problem (6) is hard to solve due to the
restriction on the control space. Nevertheless, without loss of
generality, it is possible to convert this problem to a set of
2
3
t
Fig. 2. A decision tree diagram. Denote T , {t ∈ N0 ; t < N : x(t) ∈ C0 }.
This means that T represents a set of time instances at which a new control
signal does not need to be computed and transmitted from the controller to
the actuator. In the figure, dark colored circles represent the case x(t) ∈ C0
for any t ∈ T whereas light colored circles represent the case x(t) ∈ Rn \
C0 for any t ∈
/T . For instance, when N = 4, the set T gets values in
P({1, 2, 3}) = ∅, {1}, {2}, {3}, {1, 2}, {1, 3}, {2, 3}, {1, 2, 3} .
optimization problems of the form
JT? (x(0)) : minimize
π
J(x(0), π)
subject to x(t + 1) = Ax(t) + Bu(t),
∀t ∈ {0, 1, · · · , N − 1},
x(t) ∈ C0 , ∀t ∈ T ,
x(t) ∈ Rn \ C0 , ∀t ∈
/ T,
u(t) = 0m , ∀t ∈ T ,
x(0) = x0 ,
(7)
where T ∈ P(N ) with N = {1, 2, · · · , N − 1}. To obtain the
optimal solution of the problem (6), it is necessary to solve the
problem (7) for all subsets of the power set of N , i.e., P(N ),
and select the one providing the lowest cost; see Fig. 2. More
precisely, this can be written as:
J ? (x(0)) : minimize JT? (x(0)) .
T ∈P(N )
(8)
The number of sub-problems, which are needed to be
solved, grows exponentially with the control horizon N (i.e.,
|P(N )| = 2N −1 ). Bear in mind that since these sub-problems
are independent of each other, they can be also solved in
parallel. In addition to its combinatorial nature, the problem (7)
requires the optimization of a convex function over a nonconvex domain. In the literature, there exist some available
tools to solve the convex objective non-convex optimization;
see, e.g., [36]–[38].
As the feasible region S can be expressed as a finite
union of polyhedra, the disjunctive formulation can be applied.
In particular, assuming n-dimensional problem instance (6),
its feasibility region can be divided into 2n + 1 disjunctive
polyhedra1 . Following the construction above, we write:
S,
2n
[
p=1
Cp ,
(9)
where n is the state dimension, and Cp ⊂ Rn are full1 See Fig. 3 for an example of two dimensional problem where each
disjunctive set is shown in different colors.
DRAFT.
4
dimensional polyhedra, i.e.,
Cp , x ∈ Rn : Tp x ≤ d ,
1
gives a sequence Σ = {σ(0), · · · , σ(N − 1)}. Then, for given
T and Σ, we rewrite the optimization problem (7) as
JΣ? (x(0)) : minimize
π
J(x(0), π)
subject to x(t + 1) = Ax(t) + Bu(t),
∀t ∈ {0, 1, · · · , N − 1},
x(t) ∈ Cσ(t) , ∀σ(t) ∈ Σ,
u(t) = 0m , ∀t ∈ T ,
x(0) = x0 .
(11)
It is necessary to solve all possible combination of problem (11) to determine the global optimal solution. Particularly,
the problem (6) can be solved as a sequence of (2n + 1)N −1
quadratic programming (QP) problems. Hence, we have the
following series of optimization problems:
J ? (x(0)) :
minimize
Σ∈{0,··· ,2n}N −1
JΣ? (x(0)) .
(12)
It is worth noting that even though the number of QP
sub-problems grows exponentially with N and n, all these
problems are independent of each other; therefore, one can
parallelize the problems and reduce the computation time.
Corollary 1 The global optimal solution of the control problem (6) can be computed by solving a set of convex quadratic
programming problems of the form (11), in parallel, and
selecting the solution that provides the lowest control cost
among all feasible solutions.
The following examples should give the reader a better
understanding of the problem.
Example 1 Let n = 2 and S = R2 \C0 with C0 = {(x1 , x2 ) ∈
R2 : −ε < x1 < ε, −ε < x2 < ε}. The non-convex set S can
be divided into four convex subsets:
C1 = {(x1 , x2 ) ∈ R2 : x1 ≥ x2 , x1 ≥ −x2 , x1 ≥ ε} ,
C2 = {(x1 , x2 ) ∈ R2 : x1 ≤ x2 , x1 ≥ −x2 , x2 ≥ ε} ,
C3 = {(x1 , x2 ) ∈ R2 : x1 ≤ x2 , x1 ≤ −x2 , x1 ≤ −ε} ,
C4 = {(x1 , x2 ) ∈ R2 : x1 ≥ x2 , x1 ≤ −x2 , x2 ≤ −ε} ,
which are illustrated by different colors in Fig. 3. The optimal
control inputs can be computed by solving quadratic programs
for different combinations of convex sets. In order to compute
C1
0.5
State variable x2
for some Tp ∈ R(2n−1)×n and d ∈ R2n−1 .
We define a piece-wise constant function of time σ(t),
which takes on values in {0, 1, · · · , 2n} and whose value
p determines, at each time t ∈ {0, · · · , T − 1}, the state
variable x(t) to belong to the interior of the polyhedron Cp .
We divide the non-convex set S into convex subsets Cp with
p ∈ {0, 1, · · · , 2n} and, at each time step t ∈ {0, · · · , T − 1},
we choose only one active set. The switching signal,
(
0 if t ∈ T ,
(10)
σ(t) =
p otherwise,
C2
0
C0
−0.5
C3
−1
−1
C4
−0.5
0
0.5
1
State variable x1
Fig. 3. The non-convex set S , R2 \ C0 can be divided into four convex
regions, which are illustrated by different colors. For a given scheduling
sequence, i.e., T = {6, 7}, the optimal control inputs can be computed by
solving the optimization problem (11) for all possible combinations of five
convex sets. For N = 7, finding optimal control actions requires solving
15, 625 problems, and selecting the minimum control cost among 2, 650
feasible solutions. In Fig. 3, the blue curve represents the state trajectory
for Σ1 = {4, 4, 4, 1, 1, 0, 0}, the red curve represents the state trajectory for
Σ2 = {4, 1, 1, 2, 2, 0, 0}, and the magenta curve denotes the state trajectory
for Σ3 = {4, 1, 2, 2, 3, 0, 0}.
optimal control inputs, it is necessary to solve 5N −1 convex
quadratic programming problems.
Example 2 Let us consider the second-order system:
0.9 0.2
0.6
x(t + 1) =
x(t) +
u(t) ,
0.8 1.5
0.8
(13)
|
with the initial condition x0 = [ 0 −1 ] . The event-triggered
controller transmits control messages if the `∞ -norm of the
state variable x(t) is greater than ε = 0.25. The performance
indices are given by Q = diag{2, 2} and R = 5. The
control horizon is chosen as N = 7. The state trajectories,
depicted in Fig. 3, can be obtained via solving the optimization problem (11) for given sets Σ1 = {4, 4, 4, 1, 1, 0, 0},
Σ2 = {4, 1, 1, 2, 2, 0, 0}, and Σ3 = {4, 1, 2, 2, 2, 0, 0}. Fig. 3
shows the state trajectories for two different sets. The set Σ1
leads to the global optimal solution.
Example 1 demonstrates that obtaining the optimal solution
to the finite-horizon optimal control problem, mentioned earlier, requires solving an exponential number of QPs. Therefore,
in the next section, we propose heuristic algorithms that significantly reduce computational complexity, by compromising
the optimality guarantees slightly.
IV. C OMPUTATION OF SUB - OPTIMAL CONTROL ACTIONS
In this section, we propose two heuristic algorithms that usually achieve a low control loss while significantly decreasing
the computation time. We, firstly, develop a simple algorithm
that takes the initial state x0 as input and finds a suitable
sequence Σ in a greedy manner by increasing the horizon
of the problem from 1 to N . Secondly, we apply an algorithm based on ADMM to compute the heuristic scheduling
sequence Σ. This sequence is then used to solve the disjunctive
problem (11) and obtain a good approximate control sequence
DRAFT.
1
2
3
4
5
6
7
Data: x0 , n, N ;
Compute σ(0) based on x0 ;
for Iteration count k = 2, . . . , N do
Obtain x̃ = x? and ũ = u? by solving (11) with
Σ = {σ(0), · · · , σ(k − 2), p} for all
p ∈ {0, 1, · · · , 2n};
Compute p? = argminΣ JΣ? (x(0));
Set σ(k − 1) = p? ;
end
return Σ, x̃, and ũ;
Algorithm 1: Greedy heuristic
π. Both techniques are of polynomial time complexity, hence,
reducing the computational efforts significantly. Numerical
investigations (see Section VI) indicate that these heuristic
algorithms usually provide close to optimal solutions.
A. Greedy heuristic method
We construct an intuitive greedy algorithm to solve the optimal control problem, proposed in (6), efficiently. As discussed
earlier, given a feasible switching sequence Σ, a corresponding
optimal control problem can be formulated as a quadratic
programming problem of the form (11). One, then, solves
the combinatorial problem (12) to find the optimal switch
sequence Σ? , thereby solving the optimal control problem (6).
A good way to deal with the combinatorial nature of this
type of algorithms and reduce the computational complexity is
to employ a greedy algorithm, which solves a global problem
by making a series of locally optimal decisions. Greedy algorithms do not necessarily provide optimal solutions; however,
they might determine local optimal solutions, which can be
used to estimate a globally optimal solution, in a reasonable
time.
Our proposed greedy algorithm works as follows. Since x0
is known, we can compute corresponding switching signal
σ(0). Then, we set Σ = {σ(0), p} for all p ∈ {0, 1, . . . , 2n}
and solve 2n + 1 number of QPs of the form (11) to
obtain the optimal switch signal σ(1). The same procedure
then repeats for k = 2, . . . , N − 1, where at each step k,
we solve 2n + 1 times the QP problem (11) to find the
best σ(k) keeping the previously found scheduling sequence
Σ = {σ(0), . . . , σ(k − 1)} unchanged.
Algorithm 1 provides the detailed steps of discussed greedy
heuristic method. Algorithm 1 executes (2n + 1)(N − 1)
number of QPs compared to (2n+1)N −1 as in optimal control
procedure. As a result, it runs in polynomial time.
B. A heuristic method based on ADMM
In this section, we develop a computationally efficient
method for solving (6). Our approach is based on, Alternating
Direction Method of Multipliers (ADMM), a well developed
technique to solve large-scale disciplined problems [39]. The
idea of utilizing ADMM as a heuristic to solve non-convex
problems has been recently considered in literature [38]–[41].
In particular, [38], [40] employ ADMM to approximately solve
problems with convex costs and non-convex constraints. The
approximate ADMM solutions are improved by multiplicity
5
of random initial starts and a number of local search methods
applied to ADMM solutions.
In this paper, using some of the techniques introduced
above, we first apply ADMM to original non-convex problem
to achieve an intermediate solution. This algorithm, for a
general non-convex problem, does not necessarily converge;
however, when it does, the corresponding solution gives a
good initial guess for finding the optimal solution to this
problem. In a second phase of our heuristic method, we
perform a polishing technique with the aim of achieving a
feasible and hopefully closer to the optimal solution (see [38]
for an overview of polishing techniques). Our polishing idea
is based on disjunctive programming problem (11) with the
fixed event index T and trajectory sequence Σ.
Initially developed to solve large-scale convex structured
problems, ADMM has been recently advocated, to a great
extent, for being effective approximation technique to solve
non-convex optimization problems (see [38]–[40] and references therein). We start with casting (6) to the ADMM form.
Essentially, we have
minimize
z
1 >
z F z + I(w)
2
Gz = h,
z = y,
(14)
where z collects the state and control components; i.e.,
z , [x(0)> , . . . , x(N )> , u(0)> , . . . , u(N − 1)> ]> , F represents the positive definite Hessian of the quadratic cost. That is
F , blkdiag(Qs , Rs ) with Qs , IN +1 ⊗Q and Rs , IN ⊗R.
Moreover, I(y) is the indicator function enforcing the eventtriggering control law; that is
∞ if (16) holds,
I(y) =
(15)
0
otherwise,
{∃t ∈ {0, . . . , N − 1}|y(t + 1) ∈ C0 and y(t + N + 2) 6= 0m },
(16)
where (16) detects the constraint violation in (6) in terms
of having x(t) ∈ C0 while corresponding u(t) 6= 0m .
The constraints in (14) are twofold. The first constraint
in (14) describes the LTI system dynamics (1). Here G ∈
RnN ×(n(N +1)+mN ) have the following i = {1, . . . , N }, j =
{1, . . . 2N + 1}- blocks,
i−1
A
for i = 1 . . . N, j = 1,
−In
j = i and j > 1,
Gij =
i+N −j
A
B
if
j ≥ N + 2 and i + N ≥ j,
0
otherwise.
> >
and h ∈ Rn(N +1)+mN , [x(0)> , 0>
n , . . . , 0m ] . Finally, the
last constraint in (14) is of consensus-type to ensure that nonconvex constraint in (6) is asymptotically satisfied.
After formulating the problem, each iteration of ADMM
algorithm consists of (see [39] for a complete treatment of the
DRAFT.
6
subject):
1 >
z Fz
2
z
!
2
ρ
G
0
h
k
k
+
z−
z −
+u
I
I
0
2
(17)
k
k+1/2
= Π(z
+ 0 I u )
G
0
h
k
k+1/2
k
z −
.
=u +
z
−
I
I
0
1
Here, k denotes the iteration counter, ρ > 0 is the step-size
(penalty) parameter, and Π denotes the projection onto nonconvex constraint and is given by
0
if i ≥ N + 2 and x(i − N − 1) ∈ C0
Πi (x) =
x(i) otherwise.
(18)
When the cost function in hand is convex and the constraints set is closed and convex then the ADMM algorithm converges to the optimal solution of the problem.
In our case, since I(y) is non-convex the ADMM algorithm (17) may not converge to optimal point. Moreover,
examples can be found in which (17) does not even converge into a feasible point. To further improve the ADMM
solution, we utilize an additional convex problem to polish the intermediate results. That is, we restrict the search
space to a convex set that includes the ADMM solution pattern. Let z̃ , [x̃(0)> , . . . , x̃(N )> , ũ(0)> , . . . , ũ(N − 1)> ]>
e
be the output of the ADMM algorithm and the sets Σ
e
and T , {t ∈ N0 ; t < N : x̃(t) ∈ C0 } denote the trajectory
> >
and the restriction
sequence associated with [x̃>
1 , . . . , x̃N ]
index of x̃ into C0 , respectively. Then our heuristic polishing
e Algoprocedure formulates (11) with T = Te and Σ = Σ.
rithm 2 provides a summary of our heuristic method. The input
variables include the error-tolerance threshold tol , randomized
initial state z 0 as well as zbest and fbest to store the final
solution.
A few comments related to Algorithm 2 are in order.
10
z k+1/2 = argmin
z
k+1
u
k+1
1) In contrast to the ADMM algorithms for convex problems that converge to the optimum for all positive range
of the step-size parameter ρ, the stability of the ADMM
algorithm for non-convex problems is sensitive to the
choice of ρ. Moreover, similar to the convex case,
the convergence speed is also affected by the choice
of ρ. A variety of techniques including proper stepsize selection, over relaxation, constraint matrix preconditioning and caching can be employed to accelerate
the ADMM procedure (17) (see [42], [43] for a reference
on the topic).
2) One can utilize an adaptive iteration count procedure
to improve the probability of finding feasible solution
to (6). The procedure works as the following. Run the
ADMM algorithm for a fixed number of iterations and
then check if the disjunctive QP problem has feasible
solution. If not, then increase the number of iterations
(e.g., double it) and repeat the procedure (run ADMM
and disjunctive QP) until finding a feasible solution or
reaching to a point where the current ADMM solution
2
3
4
5
6
7
8
9
Data: tol , z 0 ∼ N (0, σ 2 I), zbest = ∅, and fbest = ∞;
for Iteration count k = 1, 2, . . . , K do
update z from (17);
if kGz k − hk ≤ tol and (1/2)z k> F z k < fbest then
zbest = z k ;
end
end
if fbest < ∞ then
Obtain zbest from disjunctive problem (11);
end
return zbest ;
Algorithm 2: ADMM-Disjunctive heuristic
does not improve the previous one in terms of constraint
violations and quadratic cost.
3) The variable z 0 is initialized randomly using a normal
distribution. In general, repeating the ADMM algorithm
for a multiple of initial points may improve the approximate solution at the cost of extra computational
complexity (as suggested in e.g., [40]). However, in
our application we did not experience significant performance improvement by repeating the ADMM algorithm
(steps 1−6 in Algorithm 2) with different initializations.
One reason could be that in Algorithm 2, we employ the
e and Te based on the ADMM sosolution trajectories Σ
lution z̃ and not z̃ itself in the disjunctive problem (11).
4) Using caching and LDL> matrix factorization techniques in the first-step of (17) [39], each z-update in Al-
gorithm 2 costs on the order of O (n(N + 1) + mN )2
for dense P matrices. Furthermore, if we assume N ≥
max{n, m} then each ADMM iteration costs on the
order of O(N 2 ). This means that overall cost of the
ADMM algorithm is of O(KN 2 ) where K is the
number of ADMM iterations. In our application, with
proper algorithm parameter selection, the ADMM algorithm converges almost always within a few hundreds
of iterations (see the results presented in Section VI).
5) The computational complexity of the disjunctive
step in our heuristic method falls into the generic
complexity of convex QPs on the order of
2
O((|T |2n + (N − |T |)(2n − 1)) ) [44].
V. R ECEDING HORIZON CONTROL
Except a few special cases, finding a solution to an infinite
horizon optimal control problem is not possible. Receding
horizon control is an alternative scheme to infinite horizon
problem that repeatedly requires solving a constrained optimization problem. At each time instant t ≥ 0, starting at
the current state x(t) (assuming that a full measurement of
the state x(t) is available at the current time t ∈ N0 ), the
following cost function
J(x(t), πt?N −1 ) = Vf (x(t + N | t))
+
t+N
X−1
k=t
`(x(k | t), u(k | t))
subject to system dynamics and constraints involving states
and controls is minimized over a finite horizon N . Here, the
DRAFT.
7
1.2
R = 5 while the prediction horizon is set to N = 6. Fig. 4
shows the state trajectories of the receding horizon implementation of the event-triggered control system, described by (1)
– (4), for different initial conditions x0 . As can be seen in
the same figure, the number of transmitted control commands
depends on the initial condition.
State variable x2
0.6
0
Dµ
VI. N UMERICAL EXAMPLES
−0.6
−1.2
−1.2
A. Performance of sub-optimal event-triggered control actions
−0.6
0
0.6
1.2
State variable x1
Fig. 4. Evolution of the state trajectories of the system (13) under the receding
horizon strategy (19) and constraints (2)–(4) for a set of initial conditions x0 .
function ` defines the stage cost, and Vf defines the terminal
cost. Denote the minimizing control sequence, which is a
function of the current state x(t), by
πt?N −1 = u? (t | t)| , · · · , u? (t + N − 1 | t)| ,
then the control applied to the plant at time t ≥ 0 is the first
element of this sequence, that is,
u(t) = I 0 · · · 0 πt?N −1 .
Time is then stepped forward one instant, and the procedure
described above is repeated for another N -step ahead optimization horizon.
It is worth noting that, due to the fundamental limitation of
the optimization problem (6), the state x(t) never converges
to the origin if the system is unstable. It can only converge
into a set including the origin. The following result shows the
existence of this set:
Theorem 1 Suppose that Dµ , {x ∈ Rn : k x k∞ ≤ µ} is a
neighborhood of the origin, where
s
κλmax (A| P A + Q)nε2
µ,
(19)
λ2min (Q)
for some κ > 0. Then, the system (1) with event-triggering
constraints (3) and (4) is uniformly practically asymptotically
stable, i.e., lim k x(t) k∞ ≤ µ.
t→∞
Theorem 1 establishes practical stability of the system (1)
with event-triggering constraints (3) and (4). It shows that
if provided conditions are met, then the plant state will be
ultimately bounded in an `∞ -norm ball of radius µ. It is worth
noting that, as the other stability results, which use Lyapunov
techniques, this bound will not be tight. Next, we would like
to exemplify the convergence of the state x(t) to the set Dµ
from a set of initial conditions x0 .
Example 3 Consider the second-order system, given by (13),
|
πk
for all 0 ≤
with initial conditions x0 = 1.2 [ sin( πk
6 ) cos( 6 ) ]
k ≤ 12. The controller transmits a control message whenever
the event-triggering condition, i.e., k x(t) k∞ > 0.25, holds.
The performance indices are chosen as Q = diag{2, 2} and
To illustrate performance benefits of the proposed heuristic
algorithms, we consider a third-order plant with the following
state-space representation:
0.53 −2.17 0.62
0.4
x(t + 1) = 0.22 −0.06 0.51 x(t) + 0.7 u(t)
−0.92 −1.01 1.69
0.9
+ Bw w(t) . (20)
Assume that there is no disturbance acting on the plant, i.e.,
Bw = 0.
Our aim, here, is to minimize (5) with performance indices
Q = P = diag{2, 2, 2} and R = 5, and the horizon length
N = 8. The initial condition is chosen as
|
x0 = sin θ cos φ sin θ sin φ cos θ ,
where 0 ≤ θ ≤ π and 0 ≤ φ ≤ π. To perform simulations,
we selected 577 different data points, which are equidistant
over a half spherical surface. We evaluated the performance of
the greedy and the ADMM-based heuristic algorithms for all
these initial conditions. For each data point on the half sphere,
we run 823, 543 number of QPs to obtain the global optimal
solution. In total, we run more than 475 million number of
QPs in our evaluation. We used a linux machine with 32 cores
in Intel Core i7 Extreme Edition 980X to solve these QPs
in parallel threads. Within this computing resources, it takes
approximately 6 days to perform simulations for one problem
setup.
To compare the (true) optimal control performance with
our heuristic method, we performed Algorithm 2 on the
same problem set. In particular, we evaluated three sets
of problem with ε = 0.2, ε = 0.4, and ε = 0.6. It is
generally expected that the control problem becomes more
challenging with increasing the event-threshold ε. We run
the ADMM-based heuristic algorithm with adaptive iteration
count procedure described in Section IV-B. Moreover, we
picked ρ = 9.8, ρ = 5.8, and ρ = 6.9 respectively,
for the aforementioned problem scenarios. Under this setup,
in both cases (i.e., ε = 0.2 and ε = 0.4), the ADMM
method produced always feasible solutions for maximum 300
number of ADMM-iterations. However, when ε = 0.6 and
ρ = 6.9, the method created infeasible solutions for two
>
initial conditions: x0 = [0.3036, 0.2330, 0.9239] and x0 =
>
[0.6830, 0.1830, 0.7071] . To compute feasible solutions, we
needed to adjust ρ accordingly for these initial conditions.
Fig. 5 shows the outcome of the comparison. As it shows,
for ε = 0.2, the ADMM-based heuristic algorithm is able
to find near optimal solutions (with relative error less than
DRAFT.
8
ε = 0.4
ε = 0.2
ε = 0.6
0.8
0.5
0.4
0.4
0
0
0
0
0.1
0.2
0.3
(Jadmm − J ? )/J ?
0.4
0.6
1
0.8
0
0.1
0.2
0.3
(Jadmm − J ? )/J ?
x1 (t)
1
0.4
0.6
0
0.1
0.2
0.3
(Jadmm − J ? )/J ?
0
−1
−2
0.4
exhaustive search
ADMM
0
10
20
30
1
0.4
0.2
0.2
0
0
-2
-1
0
1
2
3
|Tadmm | − |T ? |
4
0
-2
-1
0
1
2
3
|Tadmm | − |T ? |
4
-2
-1
0
1
2
3
|Tadmm | − |T ? |
4
ε = 0.4
ε = 0.2
−0.5
20
30
40
50
0
−1
exhaustive search
ADMM
−2
−3
0.4
0.4
0.2
10
1
ε = 0.6
0.4
0
2
Fig. 5. Relative error (Jadmm − J ? )/J ? and control-action cardinality
difference of the (sub-optimal) ADMM-based heuristic solution from the
optimal cost for 577 problem instances of third order plant model (20).
0.6
0
x3 (t)
0.4
x2 (t)
0.5
0.2
50
exhaustive search
ADMM
0.6
0.4
40
0
10
20
30
40
50
0
10
20
30
40
50
0
10
20
30
40
50
2
0.2
0.2
0
0
0.1
0.2
0.3
(Jgreedy − J ? )/J ?
0.4
0.6
1
0
0
0.1
0.2
0.3
(Jgreedy − J ? )/J ?
0.4
0.4
0
0.1
0.2
0.3
(Jgreedy − J ? )/J ?
0.4
u(t)
0
0.4
0.4
0.2
0
−1
2
0.2
0
0
-5
-4
-3
-2 -1
0
|Tgreedy | − |T ? |
1
0
-5
-4
-3
-2 -1
0
|Tgreedy | − |T ? |
1
-5
-4
-3 -2 -1 0
|Tgreedy | − |T ? |
1
2
Fig. 6. Relative error (Jgreedy −
and control-action cardinality
difference of the greedy solution from the optimal cost for 577 problem
instances of third order plant model (20).
J ? )/J ?
5%) in almost all cases, and for ε = 0.4 and ε = 0.6, the
algorithm finds solutions with relative error less than 5% in
more than 80% of problem instances. The average optimality
gap (Jadmm − J ? )/J ? for the three cases were 0.0035, 0.0237,
and 0.0716, respectively. Finally, by comparing the cardinality
of control event index T for the optimal solutions and our
ADMM method, one concludes that the heuristic method in
more than 50% of cases finds similar-sparse solution as the
optimum ones, and in the rest of cases it tends to find more
sparse control actions.
We also compared the true optimal control performance
with a greedy heuristic method, shown in Algorithm 1, for
three sets of problems, mentioned above, with ε = 0.2,
ε = 0.4, and ε = 0.6. The greedy algorithm detected 22,
90, and 135 optimal solutions of the aforementioned 577
problems, respectively. Also, it computed the optimal solution
with relative error less than 5% in more than 65% of problems
at hand for all three problem setups. It is important to note
that the greedy heuristic method always provided feasible
solutions for all problem cases. The average optimality gaps
(Jgreedy − J ? )/J ? in all three cases were 0.0514, 0.0780,
and 0.0826, respectively. As compared to the ADMM-based
heuristic method, the optimality gaps became larger.
B. Receding horizon control implementation
We consider the open-loop unstable discrete-time system
represented by (20) with Bw = 0. The prediction horizon
uadmm (t)
0.2
1
0
−1
Fig. 7. States and input versus time for the event-triggered model predictive
controller presented in Section VI-B. In this figure, x1 (t), x2 (t) and x3 (t)
represent state variables whereas u(t) and uadmm (t) denote the optimal and
the heuristic control inputs computed based on the exhaustive search and the
ADMM algorithm, respectively.
is chosen to be N = 6 with performance indices Q =
P = diag{2, 2, 2} and R = 5. The event-threshold ε for
the event-triggered receding horizon implementation is set to
0.4. Fig. 7 demonstrates the time responses of the eventtriggered receding
horizonicontrol system for the initial conh
√
√
>
dition x0 = 0, 22 , − 22 . Here, two different approaches
for computing control input trajectories are considered: the
exhaustive search algorithm and the heuristic ADMM algorithm with ρ = 4.8. As can be seen in Fig. 7, while the state
trajectories associated to two control approaches deviate from
one another (except for the few first sampling instants that
they match together), the corresponding control inputs follow
a rather similar sparsity pattern. The event-triggered receding
horizon control via exhaustive search algorithm uses the communication channel 14 times over the 50 sampling instants,
which results in a reduction of 72% in communication and
computational burden, whereas the event-triggered receding
horizon control via ADMM algorithm uses the channel 16
times over the 50 sampling instants, which leads to a reduction
of 68% in communication and computational burden. For the
aforementioned initial value, the exhaustive search achieves a
better control cost: 65.42 compared to 77.72 as of the control
cost of the ADMM-based heuristic. However, this conclusion
does not hold in general. In particular, we experienced cases
DRAFT.
9
4
175
3
150
2
125
1
Control loss J∞
200
100
0.6
0.7
0.8
0.9
programming formulation to obtain the optimal solution via
solving an exponential number of quadratic programs. Then,
we proposed a heuristic algorithms to reduce the computational efforts while achieving an acceptable performance.
Later, we provided a complete stability analysis of receding
horizon control that uses a finite-horizon optimization in the
proposed class. Our numerical study confirmed the theory.
0
Communication rate π∞
Fig. 8. A comparison of the control performance and the communication frequency for different event-threshold values ε > 0 (shown in gray scale). The
marked curve with is obtained by averaging 2, 500 Monte Carlo simulations
for the horizon length 500 samples with the process noise {w(t)}t∈N0 and
the initial condition x0 generated randomly.
where starting from a different initial value, the receding horizon controller derived by exhaustive search performs worse
than the one based on ADMM-based heuristic.
C. Trade-off between communication rate and control performance
We consider the case where a random disturbance w(t) ∈
Rn , which is modeled by a discrete-time zero-mean Gaussian
white process with co-variance Σw , is acting on the plant
characterized by the injection matrix Bw = diag{1, 1, 1}. The
initial condition x0 is modeled as a random variable having a
normal distribution with zero mean and co-variance Σx0 . The
process noise w(t) is independent of the initial condition x0 .
The control performance is measured by a quadratic function:
J∞ =
499
1 X |
x (t)Qx(t) + u| (t)Ru(t) ,
500 t=0
(21)
while the communication rate is measured by
499
π∞ =
1 X
1
.
500 t=0 {kx(t)k∞ ≥0}
(22)
The visualization of the trade-off between the control loss
and the communication rate is demonstrated in Fig. 8. Different data points on the curve correspond to different eventthreshold values ranging from 0.5 to 4.0, and the control
loss (21) and the communication rate (22) are evaluated via
Monte Carlo simulations. Note that the communication rate
decreases dramatically with an increased control loss as the
threshold ε varies between 0 and 2.25 (dark colors). For
ε > 2.25 (lighter color), both quantities become less sensitive
to changes in the threshold value. We can also identify
0 ≤ ε ≤ 1.5 as a particularly attractive region where a large
decrease in the communication rate can be obtained for a small
loss in control performance.
VII. C ONCLUSION
In this paper, we considered a feedback control system
where an event-triggering rule dictates the communication
between the controller and the actuator. We investigated the
optimal control problem with an additional constraint on
the event-triggered communication. While this optimization
problem, in general, is non-convex, we used a disjunctive
VIII. A PPENDIX
We begin with the definition of the practical stability of
control systems.
Definition 1 (practical stability [45]) The system (1) is said
to be uniformly practically asymptotically stable in A ⊆ Rn
if A is a positively invariant set for (1) and if there exist a
KL-function β, and a nonnegative constant δ ≥ 0 such that
k x(t) k≤ β(k x0 k, t) + δ .
Definition 2 (practical-Lyapunov function [45]) A function
V : Rn → R≥0 is said to be a practical-Lyapunov function
in A for the system (1) if A is a positively invariant set and
if there exist a compact set, Ω ⊆ A, neighbourhood of the
origin, some K∞ -functions α1 , α2 and α3 , and some constants
d1 , d2 ≥ 0, such that
V (x) ≥ α1 (k x k), ∀x ∈ A ,
V (x) ≤ α2 (k x k) + d1 , ∀x ∈ Ω ,
V (f (x)) − V (x) ≤ −α3 (k x k) + d2 , ∀x ∈ A .
(23)
(24)
(25)
Proof of Theorem 1. To prove the practical stability of
the system (1) with a set of control actions π ? = {u? (t |
t), · · · , u? (t + N − 1 | t)}, which fulfills constraints (3)
and (4), we will analyze the value function,
VN? (x(t)) , min J(x(t), π),
π
where J(x(t), π) is as seen in (5). We borrow the shifted
sequence approach, described in [46], and we use a feasible
control sequence, i.e., π̃ = {u? (t + 1 | t), · · · , u? (t + N − 1 |
t), û}. By the optimality property, we obtain the following
bound (with x(t | t) = x(t) and u? (t | t) = u(t)):
VN? (x(t + 1)) − VN? (x(t)) ≤ VN (x(t + 1), π̃) − VN? (x(t))
= −`(x(t), u(t)) + Vf Ax(t + N | t) + B û
− Vf (x(t + N | t)) + `(x(t + N | t), û)
(26)
for all x(t) ∈ Rn . We now investigate the quantity of
∆Vf (t) + `(x(t + N | t), û) ,
where ∆Vf (t) , Vf Ax(t+N | t)+B û −Vf (x(t+N | t)).
Based on x(t + N | t), there are two possibilities:
• Suppose that k x(t + N | t) k∞ > ε, then for any feasible
control law, i.e., û = Kx(t + N | t), the following
inequality holds:
∆Vf (t) + `(x(t + N | t), û)
= x(t + N | t)| A|K P AK − P + Q∗ x(t + N | t) < 0 ,
(27)
DRAFT.
10
where AK = A+BK (i.e., Schur) and Q∗ = Q+K | RK.
From (26) and (27), it follows that
VN? (x(t
•
+ 1)) −
VN? (x(t))
<0.
which implies that
k x(t + 1) k22 ≤ γ
a3
η
k x(t) k22 + .
a2
a2
(33)
a
Since 0 < a2 ≤ a3 , it follows that γ = 1 − a2 , i.e., 0 < γ ≤
3
1. Therefore, by iterating (33), it is possible to exponentially
bound the state evolution via:
∆Vf (t)+`(x(t + N | t), û)
a
1 − γt η
k x(t) k22 ≤ γ t 3 k x(0) k22 +
.
|
|
= x(t + N | t) A P A − P + Q x(t + N | t)
a2
1 − γ a2
√
≤ x(t + N | t)| A| P A + Q x(t + N | t)
Using the norm inequality k v k∞ ≤k v k2 ≤ n k v k∞ for
|
2
n
≤ λmax A P A + Q k x(t + N | t) k2
any v ∈ R (see [47]), we get:
|
2
≤ λmax A P A + Q n k x(t + N | t) k∞
a
1 − γt η
2
k x(t) k2∞ ≤ γ t n 3 k x(0) k2∞ +
.
|
≤ λmax A P A + Q nε ,
a2
1 − γ a2
√
where we used the norm inequality k v k2 ≤ n k v k∞ Thus, lim k x(t) k∞ ≤ µ.
t→∞
n
for any v ∈ R ; see [47].
Suppose that k x(t + N | t) k∞ ≤ ε, then û = 0. Hence,
it follows that:
As a result, we conclude that, for any x(t + N | t) ∈ Rn , the
following inequality holds:
∆Vf (t) + `(x(t + N | t), û) ≤ η ,
(28)
2
|
where η = λmax A P A + Q nε . Inserting (28) and a1 k
x(t) k22 ≤ `(x(t), u(t)) where a1 , λmin (Q) into (26) yields:
VN? (x(t + 1)) − VN? (x(t)) ≤ −λmin (Q) k x(t) k22 +η .
(29)
Now, let the binary variable δ(t) ∈ {0, 1}, for each time
instant t, represent the transmission of the control action as
follows:
(
0 if k x(t) k∞ ≤ ε ,
δ(t) =
(30)
1 otherwise .
For any feasible control sequence, i.e., π 0
=
{Kx(t), · · · , Kx(t + N − 1
|
t)}, there exists
an
associated
scheduling
sequence,
denoted
by
∆(t) = {δ(t), · · · , δ(t + N − 1)}. Applying these feasible
control inputs, the upper bound of VN? (x) becomes:
VN? (x(t)) ≤ x| (t)S∆(t) x(t) ≤ λmax (S∆(t) ) k x(t) k22 ,
≤ a3 k x(t) k22 ,
(31)
where a3 , max λmax (S∆ ) and
∆∈S
S∆ = Qδ(0) +
N
−1 i−1
X
Y
i=1 j=0
A|δ(j) Qδ(j) Aδ(j) +
N
−1
Y
A|δ(k) QAδ(k) ,
k=0
with Qδ(i) , δ(i)Q∗ + (1 − δ(i))Q and Aδ(i) , δ(i)AK +
(1 − δ(i))A for all i ∈ {0, · · · , N − 1}. Here, S denotes a
set of all possible feasible schedules generated by a stabilizing
control sequence π 0 .
To obtain the lower bound, we have x| (t)Qx(t) ≤
VN? (x(t)) and hence a2 k x(t) k22 ≤ VN? (x(t)) where a2 ,
λmin (Q). From, (29) and (31) we establish the following
relation:
a2
?
VN (x(t + 1)) ≤ 1 −
V ? (x(t)) + η ,
(32)
a3 N
R EFERENCES
[1] B. D. O. Anderson and J. B. Moore, Optimal Control: Linear Quadratic
Methods. Englewood Cliffs, NJ: Prentice Hall, 1990.
[2] D. P. Bertsekas, Dynamic Programming and Optimal Control. Athena
Scientific, 2000.
[3] K. J. Åström, Introduction to Stochastic Control Theory.
Dover
Publications Inc., 2006.
[4] M. Gallieri and J. M. Maciejowski, “`asso MPC: Smart regulation of
overactuated systems,” in American Control Conference, 2012.
[5] E. N. Hartley, M. Gallieri, and J. M. Maciejowski, “Terminal spacecraft rendezvous and capture with LASSO model predictive control,”
International Journal of Control, vol. 86, no. 11, pp. 2104–2113, Aug.
2013.
[6] M. Chyba, S. Grammatico, V. T. Huynh, J. Marriott, B. Piccoli, and R. N.
Smith, “Reducing actuator switchings for motion control for autonomous
underwater vehicle,” in Proceeding of the American Control Conference,
2013.
[7] V. Gupta, “On a control algorithm for time-varying processor availability,” in Proceedings of the Hybrid Systems, Control and Computation
Conference, 2010.
[8] B. Demirel, V. Gupta, D. E. Quevedo, and M. Johansson, “Threshold optimization of event-triggered multi-loop control systems,” in Proceedings
of the 13th International Workshop on Discrete Event Systems, 2016.
[9] O. C. Imer and T. Başar, “Optimal control with limited controls,” in
Proceedings of the American Control Conference, 2006.
[10] P. Bommannavar and T. Başar, “Optimal control with limited control
actions and lossy transmissions,” in Proceedings of the 47th IEEE
Conference on Decision and Control, 2008.
[11] L. Shi, Y. Yuan, and J. Chen, “Finite horizon LQR control with limited
controller-system communication,” IEEE Transactions on Automatic
Control, vol. 58, no. 7, pp. 1815–1841, July 2013.
[12] J. Gao, “Cardinality constrained discrete-time linear-quadratic control,”
The Chinese University of Hong Kong, Master of Philosophy Thesis,
July 2005.
[13] J. Gao and D. Li, “Cardinality constrained linear-quadratic optimal
control,” IEEE Transactions on Automatic Control, vol. 56, no. 8, pp.
1936–1941, Aug. 2011.
[14] M. Nagahara and D. E. Quevedo, “Sparse representations for packetized
predictive networked control,” in IFAC World Congress, 2011.
[15] M. Gallieri and J. M. Maciejowski, “Stabilising terminal cost and
terminal controller for `asso -MPC: Enhanced optimality and region of
attraction,” in European Control Conference, 2013.
[16] M. Nagahara, D. E. Quevedo, and J. Østergaard, “Sparse packetized
predictive control networked control over erasure channels,” IEEE
Transactions on Automatic Control, vol. 59, no. 7, pp. 1899–1905, July
2014.
[17] R. P. Aguilera, R. Delgado, D. Dolz, and J. C. Agüero, “Quadratic
MPC with `0 -input constraint,” in Proceedings of the 19th IFAC World
Congress, 2014.
[18] K. J. Åström and B. M. Bernhardsson, “Comparison of riemann and
lebesgue sampling for first order stochastic systems,” in Proceedings of
the 41st IEEE Conference on Decision and Control, 2002.
DRAFT.
[19] D. Antunes and W. Heemels, “Rollout event-triggered control: Beyond
periodic control performance,” IEEE Transactions on Automatic Control,
vol. 59, no. 12, pp. 3296–3311, Dec. 2014.
[20] T. Gommans, D. Antunes, T. Donkers, P. Tabuada, and M. Heemels,
“Self-triggered linear quadratic control,” Automatica, vol. 50, pp. 1279–
1287, 2014.
[21] T. M. P. Gommans and W. P. M. H. Heemels, “Resource-aware MPC
for constrained nonlinear systems: A self-triggered control approach,”
Systems & Control Letters, vol. 79, pp. 59–67, May 2015.
[22] B. Demirel, V. Gupta, D. E. Quevedo, and M. Johansson, “On the tradeoff between communication and control cost in event-triggered dead-beat
control,” To Appear in IEEE Transactions on Automatic Control, 2016.
[23] J. Sijs, M. Lazar, and W. P. M. H. Heemels, “On integration of eventbased estimation and robust MPC in a feedback loop,” in Proceedings
of the 13th ACM International Conference on Hybrid Systems: Computation and Control, 2010.
[24] A. Eqtami, D. V. Dimarogonas, and K. J. Kyriakopoulos, “Eventtriggered control for discrete-time systems,” in Proceedings of American
Control Conference, 2010.
[25] ——, “Event-triggered strategies for decentralized model predictive
controllers,” in Proceedings of the 18th IFAC World Congress, 2011.
[26] D. Lehmann, E. Henriksson, and K. H. Johansson, “Event-triggered
model predictive control of discrete-time linear systems subject to
disturbances,” in Proceeding of the European Control Conference, 2013.
[27] E. Henriksson, D. E. Quevedo, E. G. W. Peters, H. Sandberg, and K. H.
Johansson, “Multiple-loop self-triggered model predictive control for
network scheduling and control,” IEEE Transactions on Control Systems
Technology, vol. 23, no. 6, pp. 2167–2181, Nov. 2015.
[28] N. He and D. Shi, “Event-based robust sampled-data model predictive
control: A non-monotonic Lyapunov function approach,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 62, no. 10, pp.
2555–2564, Oct. 2015.
[29] F. D. Brunner, M. Heemels, and F. Allgöwer, “Robust self-triggered
MPC for constrained linear systems: A tube-based approach,” Automatica, vol. 72, pp. 73–83, Oct. 2016.
[30] P. Varutti, B. Kern, T. Faulwasser, and R. Findeisen, “Event-based model
predictive control for networked control systems,” in Proceedings of the
48th IEEE Conference on Decision and Control held jointly with the
28th Chinese Control Conference, 2009.
[31] H. Li and Y. Shi, “Event-triggered robust model predictive control of
continuous-time nonlinear systems,” Automatica, vol. 50, no. 5, pp.
1507–1513, May 2014.
[32] P. Varutti and R. Findeisen, “Event-based NMPC for networked control
11
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
systems over UDP-like communication channels,” in Proceedings of
American Control Conference, 2011.
A. Bemporad, G. Ferrari-Trecate, and M. Morari, “Observability and
controllability of piecewise affine and hybrid systems,” IEEE Transactions on Automatic Control, vol. 45, no. 10, pp. 1864–1876, Oct. 2000.
W. Heemels, B. D. Schutter, and A. Bemporad, “Equivalence of hybrid
dynamical models,” Automatica, vol. 37, no. 7, pp. 1085–1091, July
2001.
F. Zhu and P. J. Antsaklis, “Optimal control of hybrid switched systems:
A brief survey,” Discrete Event Dynamic Systems, vol. 25, no. 3, pp.
345–364, May 2014.
A. Michalka, “Cutting planes for convex objective nonconvex optimization,” Ph.D. dissertation, Columbia University, 2013.
D. Bienstock and A. Michalka, “Cutting-planes for optimization of
convex functions over nonconvex sets,” SIAM Journal on Optimization,
vol. 24, no. 2, pp. 643–677, 2014.
S. Diamond, R. Takapoui, and S. Boyd, “A general system for
heuristic solution of convex problems over nonconvex sets,” 2016,
arXiv:1601.07277.
S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed
optimization and statistical learning via the alternating direction method
of multipliers,” Foundations and Trends in Machine Learning, vol. 3,
no. 1, pp. 1–122, 2011.
R. Takapoui, N. Moehle, S. Boyd, and A. Bemporad, “A simple effective
heuristic for embedded mixed-integer quadratic programming,” in To
appear in Proceedings American Control Conference, 2016.
N. Derbinsky, J. Bento, V. Elser, and J. S. Yedidia., “An improved threeweight message-passing algorithm,” arXiv:1305.1961, 2013.
E. Ghadimi, A. Teixeira, I. Shames, and M. Johansson, “Optimal
parameter selection for the alternating direction method of multipliers
(ADMM): quadratic problems,” IEEE Transactions on Automatic Control, vol. 60, no. 3, pp. 644 – 658, March 2015.
P. Giselsson and S. Boyd, “Linear convergence and metric selection in douglas rachford splitting and admmlitting and ADMM,”
arXiv:1410.8479v5, 2016.
S. Boyd and L. Vandenberghe, Convex Optimization.
Cambridge
University Press, 2004.
Z.-P. Jiang and Y. Wang, “A converse Lyapunov theorem for discretetime systems with disturbances,” Systems & Control Letters, vol. 45, pp.
49–58, Aug. 2002.
J. B. Rawlings and D. Q. Mayne, Model Predictive Control: Theory and
Design. Nob Hill Publishing, 2009.
D. S. Bernstein, Matrix Mathematics. Princeton University Press, 2009.
| 3cs.SY
|
Variable screening with multiple studies
Tianzhou Ma1 , Zhao Ren2 and George C. Tseng1
1
Department of Biostatistics, University of Pittsburgh
2
Department of Statistics, University of Pittsburgh
arXiv:1710.03892v1 [stat.ME] 11 Oct 2017
Abstract
Advancement in technology has generated abundant high-dimensional data that allows integration of multiple relevant studies. Due to their huge computational advantage, variable screening methods based on marginal correlation have become promising
alternatives to the popular regularization methods for variable selection. However, all
these screening methods are limited to single study so far. In this paper, we consider
a general framework for variable screening with multiple related studies, and further
propose a novel two-step screening procedure using a self-normalized estimator for highdimensional regression analysis in this framework. Compared to the one-step procedure
and rank-based sure independence screening (SIS) procedure, our procedure greatly reduces false negative errors while keeping a low false positive rate. Theoretically, we
show that our procedure possesses the sure screening property with weaker assumptions on signal strengths and allows the number of features to grow at an exponential
rate of the sample size. In addition, we relax the commonly used normality assumption
and allow sub-Gaussian distributions. Simulations and a real transcriptomic application illustrate the advantage of our method as compared to the rank-based SIS method.
Key words and phrases: Multiple studies, Partial faithfulness, Self-normalized estimator, Sure screening property, Variable selection
1
Introduction
In many areas of scientific disciplines nowadays such as omics studies (including genomics,
transcriptomics, etc.), biomedical imaging and signal processing, high dimensional data with
much greater number of features than the sample size (i.e. p >> n) have become rule rather
than exception. For example, biologists may be interested in predicting certain clinical
outcome (e.g. survival) using the gene expression data where we have far more genes than
the number of samples. With the advancement of technologies and affordable prices in recent
biomedical research, more and more experiments have been performed on a related hypothesis
or to explore the same scientific question. Since the data from one study often have small
sample size with limited statistical power, effective information integration of multiple studies
can improve statistical power, estimation accuracy and reproducibility. Direct merging of the
data (a.k.a. “mega-analysis”) is usually less favored due to the inherent discrepancy among
the studies (Tseng et al., 2012). New statistical methodologies and theories are required to
solve issues in high-dimensional problem when integrating multiple related studies.
Various regularization methods have been developed in the past two decades and frequently used for feature selection in high-dimensional regression problems. Popular methods
include, but are not limited to, Lasso (Tibshirani, 1996), SCAD (Fan and Li, 2001), elastic
1
net (Zou and Hastie, 2005) and adaptive Lasso (Zou, 2006). When group structure exists
among the variables (for example, a set of gene features belonging to a pre-specified pathway), group version of regularization methods can be applied (Yuan and Lin, 2006; Meier
et al., 2008; Nardi et al., 2008). One can refer to Fan and Lv (2010) and Huang et al. (2012)
for a detailed overview of variable selection and group selection in high-dimensional models.
When the number of features grows significantly larger than the sample size, most regularization methods perform poorly due to the simultaneous challenges of computation expediency,
statistical accuracy and algorithmic stability (Fan et al., 2009). Variable screening methods
become a natural way to consider by first reducing to a lower or moderate dimensional problem and then performing variable regularization. Fan and Lv (2008) first proposed a sure
independent screening (SIS) method to select features based on their marginal correlations
with the response in the context of linear regression models and showed such fast selection
procedure enjoyed a “sure screening property”. Since the development of SIS, many screening methods have been proposed for generalized linear models (Fan et al., 2009, 2010; Chang
et al., 2013), nonparametric additive models or semiparametric models (Fan et al., 2011;
Chang et al., 2016), quantile linear regression (Ma et al., 2017), Gaussian graphical models
(Luo et al., 2014; Liang et al., 2015) or exploit more robust measures for sure screening (Zhu
et al., 2011; Li et al., 2012, 2017). However, all these screening methods are limited to single
study so far.
In this paper, we first propose a general framework for simultaneous variable screening
with multiple related studies. Compared to single study scenario, inclusion of multiple studies
gives us more evidence to reduce dimension and thus increases the accuracy and efficiency
of removing unimportant features during screening. To our knowledge, our paper is the first
to utilize multiple studies to help variable screening in high-dimensional linear regression
model. Such a framework provides a novel perspective to the screening problem and opens
a door to the development of methods using multiple studies to perform screening under
different types of models or with different marginal utilities. In this framework, it is natural
to apply a selected screening procedure to each individual study, respectively. However,
important features with weak signals in some studies may be incorrectly screened out if only
such a one-step screening is performed. To avoid such false negative errors and fully take
advantage of multiple studies, we further propose a two-step screening procedure, where one
additional step of combining studies with potential zero correlation is added to the one-step
procedure for a second check. This procedure has the potential to save those important
features with weak signals in individual studies but strong aggregate effect across studies
during the screening stage. Compared to the naive multiple study extension of SIS method,
our procedure greatly reduces the false negative errors while keeping a low false positive
rate. These merits are confirmed by our theoretical analysis. Specifically, we show that
our procedure possesses the sure screening property with weaker assumptions on signals and
allows the number of features to grow at an exponential rate of the sample size. Furthermore,
we only require the data to have sub-Gaussian distribution via using novel self-normalized
statistics. Thus our procedure can be applied to more general distribution family other than
Gaussian distribution, which is considered in Fan and Lv (2008) and Bühlmann et al. (2010)
for a related screening procedure under single study scenarios. After screening, we further
apply two general and applicable variable selection algorithms: the multiple study extension
of PC-simple algorithm proposed by Bühlmann et al. (2010) as well as a two-stage feature
selection method to choose the final model in a lower dimension.
2
The rest of the paper is organized as follows. In Section 2, we present a framework for
variable screening with multiple related studies as well as notations. Then we propose our
two-step screening procedure in Section 3. Section 4 provides the theoretical properties of our
procedure, and demonstrates the benefits of multiple related studies as well as the advantages
of our procedure. General algorithms for variable selection that can follow from our screening
procedure are discussed in Section 5. Section 6 and 7 include the simulation studies and
a real data application on three breast cancer transcriptomic studies, which illustrate the
advantage of our method in reducing false negative errors and retaining important features
as compared to the rank-based SIS method. We conclude and discuss possible extensions of
our procedure in Section 8. Section 9 provides technical proofs to the major theorems.
2
Model and Notation
Suppose we have data from K related studies, each has n observations. Consider a random
design linear model in each study k ∈ [K] ([K] = 1, . . . , K):
Y
(k)
=
p
X
(k)
(k)
βj Xj + (k) ,
(2.1)
j=1
(k)
(k)
(k)
where each Y (k) ∈ R, each X (k) = (X1 , . . . , Xp )T ∈ Rp with E(X (k) ) = µX and
(k)
cov(X (k) ) = ΣX , each (k) ∈ R with E((k) ) = 0 and var((k) ) = σ 2 such that (k) is
(k)
(k)
(k)
(k)
uncorrelated with X1 , . . . , Xp , and β (k) = (β1 , . . . , βp )T ∈ Rp . We assume implicitly
(k)
with E(Y (k)2 ) < ∞ and E{(Xj )2 } < ∞ for j ∈ [p] ([p] = 1, . . . , p).
When p is very large, we usually assume that only a small set of covariates are true
predictors that contribute to the response. In other words, we assume most of βj =
(1)
(K)
(βj , . . . , βj )T , where j ∈ [p], are equal to a zero vector. In addition, in this paper, we
(k)
assume βj ’s are either zero or non-zero in all K studies. This framework is partially motivated by a high-dimensional linear random effect model considered in literature (e.g.,Jiang
T
, 0T )T , where β(1) is the vector of the
et al. (2016)). More specifically, we can have β = (β(1)
first s0 non-zero components of β (1 ≤ s0 ≤ p). Consider a random effect model where only
(k)
the true predictors of each study are treated as the random effect, that is, β (k) = (β(1) , 0)T
(k)
and β(1) is distributed as N (β(1) , τ 2 Is0 ), where τ 2 is independent of and X. Consequently,
(k)
βj ’s are either zero or non-zero in all K studies with probability one. Such assumption
fits the reality well, for example, in a typical GWAS study, a very small pool of SNPs are
reported to be associated with a complex trait or disease among millions (Jiang et al., 2016).
With n i.i.d. observations from model (2.1), our purpose is to identify the non-zero β(1) ,
thus we define the following index sets for active and inactive predictors:
(k)
6= 0 for all k};
(k)
= 0 for all k},
A = {j ∈ [p]; βj 6= 0} = {j ∈ [p]; βj
AC = {j ∈ [p]; βj = 0} = {j ∈ [p]; βj
(2.2)
where A is our target. Clearly, under our setting, A and AC are complementary to each
other so that the identification of AC is equivalent to the identification of A. Let |A| = s0 ,
where | · | denotes the cardinality.
3
3
Screening procedure with multiple studies
3.1
Sure independence screening
For a single study (K = 1), Fan and Lv (2008) first proposed the variable screening method
called sure independence screening (SIS) which ranked the importance of variables according
to their marginal correlation with the response and showed its great power in preliminary
screening and dimension reduction for high-dimensional regression problems. Bühlmann
et al. (2010) later introduced the partial faithfulness condition that a zero partial correlation
for some separating set S implied a zero regression coefficient and showed that it held almost
surely for joint normal distribution. In the extreme case when S = ∅, it is equivalent to the
SIS method.
The purpose of sure screening is to identify a set of moderate size d (with d << p) that
will still contain the true set A. Equivalently, we can try to identify AC or subsets of AC
which contain unimportant features that need to be screened out. There are two potential
errors that may occur in any sure screening methods (Fan and Lv, 2010):
1. False Negative (FN): Important predictors that are marginally uncorrelated but
jointly correlated with the response fail to be selected.
2. False Positive (FP): Unimportant predictors that are highly correlated with the
important predictors can have higher priority to be selected than other relatively weaker
important predictors.
The current framework for variable screening with multiple studies is able to relieve us
from the FP errors significantly. Indeed, we have multiple studies in our model setting thus
we have more evidence to exclude noises and reduce FP errors than single study. In addition,
sure screening is used to reduce dimension at a first stage, so we can always include a second
stage variable selection methods such as Lasso or Dantzig selection to further refine the set
and reduce FP errors.
The FN errors occur when signals are falsely excluded after screening. Suppose ρj is
the marginal correlation of the jth feature with the response, with which we try to find the
set {j : ρj = 0} to screen out. Under the assumption of partial faithfulness (for explicit
definition, see Section 4.3), these variables have zero coefficients for sure so the FN errors
are guaranteed to be excluded. However, this might not be true for the empirical version
of marginal correlation. For a single study (K = 1), to rule out the FN errors in empirical
case, it is well-known that the signal-to-noise ratio has to be large (at least of an order of
(log p/n)1/2 after Bonferroni adjustment). In the current setting with multiple studies, the
requirement on strong signals remains the same if we naively perform one-step screening in
each individual study. As we will see next, we propose a novel two-step screening procedure
which allows weak signals in individual studies as long as the aggregate effect is strong
enough. Therefore our procedure is able to reduces FN errors in the framework with multiple
studies.
Before closing this section, it is worthwhile to mention that, to perform a screening test,
one usually applies Fisher’s z-transformation on the sample correlation (Bühlmann et al.,
2010). However, this will require the bivariate normality assumption. Alternatively, in this
paper, we propose to use the self-normalized estimator of correlation that works generally well
even for non-Gaussian data (Shao, 1999). Similar ideas have been applied in the estimation
of large covariance matrix (Cai and Liu, 2016).
4
3.2
Two-step screening procedure with multiple studies
(k)
In the presence of multiple studies, we have more evidence to reduce dimension and ρj = 0
for any k will imply a zero coefficient for that feature. On one hand, it is possible for features
(k)
with zero βj to have multiple non-zero ρj ’s. On the other hand, a non-zero βj will have
(k)
non-zero ρj ’s in all studies. Thus, we aim to identify the following two complementary sets
while performing screening with multiple studies:
(k)
A[0] = {j ∈ [p];
min |ρj | = 0},
A[1] = {j ∈ [p];
min |ρj | =
6 0}.
k
(k)
(3.1)
k
We know for sure that A[0] ⊆ AC and A ⊆ A[1] with the partial faithfulness assumption.
For j ∈ A[0] , the chance of detecting a zero marginal correlation in at least one study has
been greatly increased with increasing K, thus unimportant features will more likely be
screened out as compared to single study scenario.
(k)
One way to estimate A[1] is to test H0 : ρj = 0 of each k for each feature j. When any
of the K tests is not rejected for a feature, we will exclude this feature from Â[1] (we call it
the “One-Step Sure Independence Screening” procedure, or “OneStep-SIS” for short). This
can be viewed as an extension of the screening test to multiple study scenario. However, in
(k)
reality, it is possible for important features to have weak signals thus small |ρj |’s in at least
one study. These features might be incorrectly classified into Â[0] since weak signals can be
indistinguishable from null signals in individual testing. It will lead to the serious problem
of false exclusion of important features (FN) from the final set during screening.
This can be significantly improved by adding a second step to combine those studies
(k)
with potential zero correlation (i.e., fail to reject the null H0 : ρj = 0) identified in the
first step and perform another aggregate test. For the features with weak signals in multiple
studies, as long as their aggregate test statistics is large enough, they will be retained. Such
procedure will be more conservative in screening features as to the first step alone, but will
guarantee to reduce false negative errors.
(k)
(k)
For simplicity, we assume n i.i.d. observations (Xi , Yi ), i ∈ [n], are obtained from
all K studies. It is straightforward to extend the current procedure and analysis to the scenarios with different sample sizes across multiple studies, and thus omitted. Our proposed
“Two-Step Aggregation Sure Independence Screening” procedure (“TSA-SIS” for short) is
formally described below:
Step 1. Screening in each study
In the first step, we perform screening test in each study k ∈ [K] and obtain the estimate
of study set with potential zero correlations ˆlj for each j ∈ [p] as:
√ (k)
nσ̂
(k)
(k)
−1
ˆlj = {k; |T̂ | ≤ Φ (1 − α1 /2)} and T̂ = q j ,
(3.2)
j
j
(k)
θ̂j
P
P
(k)
(k)
(k)
(k)
(k)
(k)
where σ̂j = n1 ni=1 (Xij −X̄j )(Yi −Ȳ (k) ) is the sample covariance and θ̂j = n1 ni=1 [(Xij −
(k)
(k)
(k)
(k)
(k)
X̄j )(Yi − Ȳ (k) ) − σ̂j ]2 . T̂j is the self-normalized estimator of covariance between Xj
5
and Y (k) . Φ is the CDF of standard normal distribution and α1 the pre-specified significance
level.
(k)
In each study, we test if |T̂j | > Φ−1 (1 − α1 /2), if not, we will include study k into
ˆlj . This step does not screen out any variables, but instead separates potential zero and
non-zero study-specific correlations for preparation of the next step. Define the cardinality
of ˆlj as κ̂j = |ˆlj |. If κ̂j = 0 (i.e., no potential zero correlation), we will for sure retain feature
j and not consider it in step 2; Otherwise, we move on to step 2.
(k)
Remark 1. By the scaling property of T̂j , it is sufficient to impose assumptions on the stan(k)
(k)
(k)
dardized variables: W (k) = Y√ −E(Y(k) ) , Zj =
var(Y
)
(k)
(k)
Xj −E(Xj )
q
.
(k)
var(Xj )
(k)
Thus T̂j
(k)
can also be treated
(k)
as the self-normalized estimator of correlation. We thus can define θj = var(Zj W (k) ) and
(k)
(k)
(k)
σj = cov(Zj , W (k) ) = ρj .
Remark 2. In our analysis, the index set in (3.2) is shown to coincide with lj (j ∈ A[0] ) and
lj (j ∈ A[1] ) which will be introduced in more details in Section 4.
Step 2. Aggregate screening
In the second step, we wish to test whether the aggregate effect of potential zero correlations in ˆlj identified in step 1 is strong enough to be retained. Define the statistics
P (k) 2
L̂j =
(T̂j ) and this statistics will approximately follow a χ2κ̂j distribution with degree
k∈l̂j
of freedom κ̂j under null. Thus we can estimate Â[0] by:
Â[0] = {j ∈ [p]; L̂j ≤ ϕ−1
κ̂j (1 − α2 ) and κ̂j 6= 0},
(3.3)
or equivalently estimate Â[1] by:
Â[1] = {j ∈ [p]; L̂j > ϕ−1
κ̂j (1 − α2 ) or κ̂j = 0},
(3.4)
where ϕκ̂j is the CDF of chi-square distribution with degree of freedom equal to κ̂j and α2
the pre-specified significance level.
(k)
The second step takes the sum of squares of T̂j from studies with potential zero corP (k) 2
relation as the test statistics. For each feature j, we test if
(T̂j ) > ϕ−1
κ̂j (1 − α2 ). If
k∈l̂j
rejected, we conclude that the aggregate effect is strong and the feature needs to be retained,
otherwise, we will screen it out. This step performs a second check in addition to the individual testing in step 1 and potentially saves those important features with weak signals in
individual studies but strong aggregate effect.
In Table 1, we use a toy example to demonstrate our idea and compare the two approaches
(“OneStep-SIS” vs. “TSA-SIS”). In this example, suppose we have five studies (K = 5)
and three features (two signals and one noise). “S1” is a strong signal with β = 0.8 in all
studies, “S2” is a weak signal with β = 0.4 in all studies and “N1” is a noise with β = 0.
In hypothesis testing, both small β and zero β can give small marginal correlation and are
sometimes indistinguishable. Suppose T = 3.09 is used as the threshold (corresponding to
6
Table 1: Toy example to demonstrate the strength of two-step screening procedure.
k=1
k=2
k=3
k=4
k=5
ˆlj
κ̂j
TSA-SIS
L̂j
Â[0]
Â[1]
Â[0]
OneStep-SIS
Â[1]
S1 (signal)
S2 (signal)
N1 (noise)
(1)
(1)
(1)
|T̂1 | = 3.71
|T̂2 | = 3.70
|T̂3 | = 0.42
(2)
(2)
(2)
|T̂1 | = 3.16
|T̂2 | = 2.71
|T̂3 | = 0.54
(3)
(3)
(3)
|T̂1 | = 3.46
|T̂2 | = 2.65
|T̂3 | = 0.56
(4)
(4)
(4)
|T̂1 | = 3.63
|T̂2 | = 2.68
|T̂3 | = 0.12
(5)
(5)
(5)
|T̂1 | = 3.24
|T̂2 | = 1.94
|T̂3 | = 0.69
∅
{2, 3, 4, 5}
{1, 2, 3, 4, 5}
0
4
5
25.31 > ϕ4 (0.95) 1.27 < ϕ5 (0.95)
N
N
Y
Y
Y
N
N
Y
Y
Y
N (FN)
N
α1 = 0.001). For the strong signal “S1”, all studies have large marginal correlations, so both
“OneStep-SIS” and “TSA-SIS” procedures include it correctly. For the weak signal “S2”,
since in many studies it has small correlations, it is incorrectly screened out by “OneStepSIS” procedure (False Negative). However, the “TSA-SIS” procedure saves it in the second
step (with α2 = 0.05). For the noise “N1”, both methods tend to remove it after screening.
4
4.1
Theoretical properties
Assumptions and conditions
We impose the following conditions to establish the model selection consistency of our procedure:
(C1) (Sub-Gaussian Condition) There exist some constants M1 > 0 and η > 0 such that for
all |t| ≤ η, j ∈ [p], k ∈ [K]:
(k)2
E{exp(tZj
)} ≤ M1 ,
E{exp(tW (k)2 )} ≤ M1 .
(k)
In addition, there exist some τ0 > 0 such that min θj ≥ τ0 .
j,k
(C2) The number of studies K = O(pb ) for some constant b ≥ 0. The dimension satisfies:
log3 (p) = o(n) and κj log2 p = o(n), where κj is defined next.
(k)
(k)
(C3) For j ∈ A[0] , lj (j ∈ A[0] ) = {k; ρj = 0} and κj = |lj |. If k ∈
/ lj , then |ρj | ≥
q
q
(k)
log p
1.01θj , where C3 = 3(L + 1 + b).
C3
n
7
q
q
(k)
(k)
(C4) For j ∈ A[1] , lj (j ∈ A[1] ) = {k; |ρj | < C1 logn p 0.99θj } and κj = |lj |, where
q
q
(k)
(k)
C1 = L + 1 + b. If k ∈
/ lj , then |ρj | ≥ C3 logn p 1.01θj . In addition, we require
√
P (k) 2 C2 (log2 p+ κj log p)
|ρj | ≥
, where C2 is some large positive constant.
n
k∈lj
(k)
The first condition (C1) assumes that each standardized variable Zj or W (k) , j ∈ [p],
k ∈ [K], marginally follow a sub-Gaussian distribution in each study. This condition relaxes
the normality assumption in (Fan and Lv, 2008; Bühlmann et al., 2010). The second part
of (C1) assumes there always exist some positive τ0 not greater than the minimum variance
(k)
(k)
of Zj W (k) . In particular, if (Xj , Y (k) ) jointly follows a multivariate normal distribution,
(k)
(k)2
then θj = 1 + ρj ≥ 1, so we can always pick τ0 = 1.
The second condition (C2) allows the dimension p to grow at an exponential rate of
sample size n, which is a fairly standard assumption in high-dimensional analysis. Many
sure screening methods like “SIS”, “DC-SIS” and “TPC” have used this assumption (Fan
and Lv, 2008; Li et al., 2012, 2017). Though the PC-simple algorithm (Bühlmann et al.,
2010) assumes a polynomial growth of pn as a function of n, we notice that it can be readily
relaxed to an exponential of n level. Further, we require the product κj log2 p to be small,
which is used to control the errors in the second step of our screening procedure. It is always
true if K log2 p = o(n).
Conditions (C3) assumes a lower bound on non-zero correlation (i.e. k ∈
/ lj ) for features
(k)
[0]
from A . In other words, if the marginal correlation |ρj | is not zero, then it must have a
large enough marginal correlation to be detected. While this has been a key assumption for
a single study in many sure screening methods (Fan and Lv, 2008; Bühlmann et al., 2010;
Li et al., 2012, 2017), we only impose this assumption for j ∈ A[0] rather than all j ∈ [p].
This condition is used to control for type II error in step 1 for features from A[0] .
Condition (C4) gives assumptions on features from A[1] . We assume the correlations to
be small for those k ∈ lj and large for those k ∈
/ lj so that studies with strong or weak
signals can be well separated in the first step. This helps control the type II error in step
1 for features from A[1] . For those studies in lj , we further require their sum of squares of
correlations to be greater than a threshold, so that type II error can be controlled in step 2.
This condition is different from other methods with single study scenario, where they usually
assume a lower bound on each marginal correlation for features from A[1] just like (C3). We
relax this condition and only put restriction on their L2 norm. This allows features from A[1]
to have weak signals in each study but combined strong signal. To appreciate this relaxation,
we compare the minimal requirements with and without step 2. For each j ∈ A[1] , in order to
(k)
detect this feature, we need |ρj | ≥ C(log p/n)1/2 with some large constant C for all k ∈ lj ,
P (k) 2
and thus at least
|ρj | ≥ C 2 κj log p/n. In comparison, the assumption in (C4) is much
k∈lj
weaker in reasonable settings κj >> log p.
4.2
Consistency of the two-step screening procedure
We state the first theorem involving the consistency of screening in our step 1:
8
Theorem 1. Consider a sequence of linear models as in (2.1) which satisfy assumptions and
conditions (C1)-(C4), define the event A = {ˆlj = lj for √
all j ∈ [p]}, there exists a sequence
α1 = α1 (n, p) → 0 as (n, p) → ∞ where α1 = 2{1 − Φ(γ log p)} with γ = 2(L + 1 + b) such
that:
P (A) = 1 − O(p−L ) → 1 as (n, p) → ∞.
(4.1)
The proof of Theorem 1 can be found in Section 9. This theorem states that the screening
in our first step correctly identifies the set lj for features in both A[0] and A[1] (in which strong
and weak signals are well separated) and the chance of incorrect assignment is low. Given
the results in Theorem 1, we can now show the main theorem for the consistency of the
two-step screening procedure:
Theorem 2. Consider a sequence of linear models as in (2.1) which satisfy assumptions
and conditions (C1)-(C4), we know there exists a sequence
α1 = α1 (n, p) → 0 and α2 =
√
α2 (n, p) → 0 as (n, p) → ∞ where α1 = 2{1 −
pΦ(γ log p)} with γ = 2(L + 1 + b) and
α2 = 1 − ϕκj (γκj ) with γκj = κj + C4 (log2 p + κj log p) and some constant C4 > 0 such
that:
P {Â[1] (α1 , α2 ) = A[1] } = 1 − O(p−L ) → 1 as (n, p) → ∞.
(4.2)
The proof of Theorem 2 can be found in Section 9. The result shows that the two-step
screening procedure enjoys the model selection consistency and identifies the model specified
in (3.1) with high
√ probability. The choice of significance level that yields consistency is
α1 = 2{1 − Φ(γ log p)} and α2 = 1 − ϕκj (γκj ) .
4.3
Partial faithfulness and Sure screening property
Bühlmann et al. (2010) first came up with the partial faithfulness assumption which theoretically justified the use of marginal correlation or partial correlation in screening as follows:
ρj|S = 0 for some S ⊆ {j}C implies βj = 0,
(4.3)
where S is the set of variables conditioned on. For independence screening, S = ∅.
Under the two conditions: the positive definiteness of ΣX and non-zero regression coefficients being realization from some common absolutely continuous distribution, they showed
that partial faithfulness held almost surely (Theorem 1 in Bühlmann et al. (2010)). Since
the random effect model described in Section 2 also satisfies the two conditions, the partial
faithfulness holds almost surely in each study.
Thus, we can readily extend their Theorem 1 to a scenario with multiple studies:
Corollary 1. Consider a sequence of linear models as in (2.1) satisfying the partial faithfulness condition in each study and true active and inactive set defined in (2.2), then the
following holds for every j ∈ [p]:
(k)
ρj|S = 0 for some k for some S ⊆ {j}C implies βj = 0.
9
(4.4)
(k)
The proof is straightforward and thus omitted: if ρj|S = 0 for some study k, then with
(k)
partial faithfulness, we will have βj = 0 for that particular k. Since we only consider
(k)
features with zero or non-zero βj ’s in all studies in (2.2), we will have βj = 0. In the case
(k)
of independence screening (i.e. S = ∅), ρj = 0 for some k will imply a zero βj .
With the model selection consistency in Theorem 2 and the extended partial faithfulness
condition in Corollary 1, the sure screening property of our two-step screening procedure
immediately follows:
Corollary 2. Consider a sequence of linear models as in (2.1) which satisfy assumptions
and conditions (C1)-(C4) as well as the extended partial faithfulness condition in Corollary
1, there exists a sequence
√ α1 = α1 (n, p) → 0 and α2 = α2 (n, p) → 0 as (n, p) → ∞
where α1 = 2{1 − Φ(γ log p)} with γ = 2(L + 1 + b) and α2 = 1 − ϕκj (γκj ) with γκj =
p
κj + C4 (log2 p + κj log p) such that:
P {A ⊆ Â[1] (α1 , α2 )} = 1 − O(p−L ) → 1 as (n, p) → ∞.
(4.5)
The proof of this Corollary simply combines the results of Theorem 2 and the extended
partial faithfulness and is skipped here.
5
Algorithms for variable selection with multiple studies
Usually, performing sure screening once may not remove enough unimportant features. In our
case since there are multiple studies, we expect our two-step screening procedure to remove
many more unimportant features than in single study. If the dimension is still high after
applying our screening procedure, we can readily extend the two-step screening procedure
to an iterative variable selection algorithm by testing the partial correlation with gradually
increasing size of the conditional set S. Since such method is a multiple study extension of
the PC simple algorithm in Bühlmann et al. (2010), we call it “Multi-PC” algorithm (Section
5.1).
On the other hand, if the dimension has already been greatly reduced with the two-step
screening, we can simply add a second stage group-based feature selection techniques to
select the final set of variables (Section 5.2).
5.1
Multi-PC algorithm
We start from S = ∅, i.e., our two-step screening procedure and build a first set of candidate
active variables:
Â[1,1] = Â[1] = {j ∈ [p]; L̂j > ϕ−1
κ̂j (1 − α2 ) or κ̂j = 0}.
(5.1)
We call this set stage1 active set, where the first index in [, ] corresponds to the stage
of our algorithm and the second index corresponds to whether the set is for active variables
([, 1]) or inactive variables ([, 0]). If the dimensionality has already been decreased by a large
10
amount, we can directly apply group-based feature selection methods such as group lasso to
the remaining variables (to be introduced in Section 5.2).
However, if the dimension is still very high, we can further reduce dimension by increasing
the size of S and considering partial correlations given variables in Â[1,1] . We follow the
similar two-step procedure but now using partial correlation of order one instead of marginal
correlation and yield a smaller stage2 active set:
Â[2,1] = {j ∈ Â[1,1] ; L̂j|q > ϕκ̂−1j|q (1 − α2 ) or κ̂j|q = 0, for all q ∈ Â[1,1] \{j}},
(5.2)
where each self-normalized estimator of partial correlation can be computed by taking the
residuals from regressing over the variables in the conditional set.
We can continue screening high-order partial correlations, resulting in a nested sequence
of m active sets:
Â[m,1] ⊆ . . . ⊆ Â[2,1] ⊆ Â[1,1] .
(5.3)
Note that the active and inactive sets at each stage are non-overlapping and the union
of active and inactive sets at a stage m will be the active set in a previous stage m − 1, i.e.,
Â[m,1] ∪ Â[m,0] = Â[m−1,1] . This is very similar to the original PC-simple algorithm, but now
at each order-level, we perform the two-step procedure. The algorithm can stop at any stage
m when the dimension of Â[m,1] already drops to low to moderate level and other common
group-based feature selection techniques can be used to select the final set. Alternatively,
we can continue the algorithm until the candidate active set does not change anymore. The
algorithm can be summarized as follows:
Algorithm 1. Multi-PC algorithm for variable selection.
Step 1. Set m = 1, perform the two-step screening procedure to construct stage1 active set:
Â[1,1] = {j ∈ [p]; L̂j > ϕ−1
κ̂j (1 − α2 ) or κ̂j = 0}.
Step 2. Set m = m + 1. Construct the stagem active set:
Â[m,1] = {j ∈ Â[m−1,1] ; L̂j|S > ϕ−1
κ̂j|S (1 − α2 ) or κ̂j|S = 0,
for all S ⊆ Â[m−1,1] \{j} with |S| = m − 1}.
Step 3. Repeat Step 2 until m = m̂reach , where m̂reach = min{m : |Â[m,1] | ≤ m}.
11
5.2
Two-stage feature selection
As an alternative to “Multi-PC” algorithm for variable selection, we also introduce here a
two-stage feature selection algorithm by combining our two-step screening procedure and
other regular feature selection methods together. In single study, for example, Fan & Lv
(2008) performed sure independence screening in the first stage followed by model selection
techniques including Adaptive Lasso, Dantzig Selector and SCAD, etc., and named those
procedures as “SIS-AdaLasso”,“SIS-DS”, “SIS-SCAD” , accordingly.
In our case, since the feature selection is group-based, we adopt a model selection technique using group Lasso penalty in the second stage:
min
β
K
X
(k)
(k)
||y (k) − XÂ[1] βÂ[1] ||22 + λ
k=1
X
||βj ||2
,
(5.4)
j∈Â[1]
where Â[1] is the active set identified from our two-step screening procedure and the tuning
parameter λ can be chosen by cross-validation or BIC in practice just like for a regular group
Lasso problem. We call such two-stage feature selection algorithm as “TSA-SIS-groupLasso”.
In addition, at any stages of the “Multi-PC” algorithm when the dimension has already
been dropped to a moderate level, the group Lasso-based feature selection techniques can
always take over to select the final set of variables.
6
Numerical evidence
In this section, we demonstrate the advantage of TSA-SIS procedure in comparing to the
multiple study extension of SIS (named “Min-SIS”), which ranks the features by the minimum absolute correlation among all studies. We simulated data according to the linear
(k)
model in (2.1) including p covariates with zero mean and covariance matrix Σi,j = r|i−j|
(k)
(k)
where Σi,j denotes the (i, j)th entry of ΣX .
In the first part of simulation, we fixed the sample size n = 100, p = 1000, the number of
studies K = 5 and performed B = 1000 replications in each setting. We assumed that the
true active set consisted of only ten variables and all the other variables had zero coefficients
(i.e., s0 = 10). The indices of non-zero coefficients were evenly spaced between 1 and p.
The variance of the random error term in linear model was fixed to be 0.52 . We randomly
drew r from {0, 0.2, 0.4, 0.6} and allowed different r’s in different studies. We considered the
following four settings:
1. Homogeneous weak signals across all studies: nonzero βj generated from Unif(0.1, 0.3)
(1)
(2)
(K)
and βj = βj = . . . = βj = βj .
2. Homogeneous strong signals across all studies: nonzero βj generated from Unif(0.7, 1)
(1)
(2)
(K)
and βj = βj = . . . = βj = βj .
3. Heterogeneous weak signals across all studies: nonzero βj generated from Unif(0.1, 0.3)
(k)
and βj ∼ N (βj , 0.52 ).
12
Table 2: Sensitivity analysis on the choice of α1 and α2 in simulation (Sensitivity/Specificity)
Sensitivity/Specificity
α1 =0.01
0.001
0.0001
α2 = 0.15
0.05
0.01
0.001
0.793/0.901 0.525/0.984 0.210/0.999 0.142/1.000
0.947/0.826 0.864/0.943 0.691/0.990 0.373/0.999
0.966/0.816 0.922/0.932 0.840/0.985 0.681/0.998
Note: All value are based on average results from B = 1000 replications.
4. Heterogeneous strong signals across all studies: nonzero βj generated from Unif(0.7, 1)
(k)
and βj ∼ N (βj , 0.52 ).
We evaluated the performance of Min-SIS using receiver operating characteristic (ROC)
curves which measured the accuracy of variable selection independently from the issue of
choosing good tuning parameters (for Min-SIS, the tuning parameter is the top number of
features d). The OneStep-SIS procedure we mentioned above was actually one special case
of the Min-SIS procedure (by thresholding at α1 ). In presenting our TSA-SIS procedure,
we fixed α1 = 0.0001 and α2 = 0.05 so the result was just one point on the sensitivity vs.
1-specificity plot. We also performed some sensitivity analysis on the two cutoffs based on
the first simulation (see Table 2) and found the two values to be optimal since they had
both high sensitivity and high specificity. Thus we suggested fixing these two values in all
the simulations.
Figure 1 showed the results of simulation 1-4. When the signals were homogeneously weak
in all studies as in (1), TSA-SIS clearly outperformed the Min-SIS procedure (above its ROC
curve). It reached about 90% sensitivity with controlled false positive errors (specificity
∼ 95%). In order to reduce false negatives, Min-SIS had to sacrifice the specificity and
increased the false positives, which in the end lost the benefits of performing screening
(i.e. end up keeping too many features). When the signals became strong as in (2), both
procedures performed equally well. This fit our motivation and theory and showed the
strength of our two-step procedure in saving weak signals without much increase in false
positive rates. When the signals became heterogeneous as in (3) and (4), both procedures
performed worse than before. But the Min-SIS procedure never outperformed the TSASIS procedure since it only examined the minimum correlation among all studies while the
two-step procedure additionally considered the aggregate statistics.
7
Real data application
We next demonstrated our method in three microarray datasets of triple-negative breast
cancer (TNBC, sometimes a.k.a. basal-like), an aggressive subtype of breast cancer usually
with poor prognosis. Previous studies have shown that the tumor suppressor protein “p53”
played an important role in breast cancer prognosis and its expression was associated with
both disease-free survival and overall survival in TNBC (Yadav et al., 2015). Our purpose
was to identify the genes most relevant and predictive to the response - the expression level
of TP53 gene, which encodes p53 protein. The three datasets are publicly available on
authors’ website or at GEO repository including METABRIC (a large cohort consisting
of roughly 2000 primary breast tumours), GSE25066 and GSE76250 (Curtis et al., 2012;
13
Figure 1: Simulation results 1-4: the ROC curve is for Min-SIS, the black point is for our
TSA-SIS using α1 = 0.0001 and α2 = 0.05.
1.0
(2) Homogeneous strong
1.0
(1) Homogeneous weak
●
0.8
0.6
Sensitivity
0.0
0.2
0.4
0.6
0.4
0.0
0.2
Sensitivity
0.8
●
0.0
0.2
0.4
0.6
0.8
1.0
0.0
0.2
0.4
0.6
0.8
(3) Heterogeneous weak
(4) Heterogeneous strong
1.0
1.0
1−Specificity
1.0
1−Specificity
0.8
0.6
Sensitivity
0.0
0.2
0.4
0.6
0.4
0.0
0.2
Sensitivity
0.8
●
●
0.0
0.2
0.4
0.6
0.8
1.0
0.0
1−Specificity
0.2
0.4
0.6
0.8
1.0
1−Specificity
Itoh et al., 2014; Liu et al., 2016). We subset the data to focus on the TNBC cases only
and ended up with 275, 178 and 165 TNBC samples in each dataset, respectively. After
routine preprocessing and filtering by including genes sufficiently expressed and with enough
variation, a total of 3377 genes remained in common for the analysis.
We applied our Multi-PC algorithm and compared to the OneStep-SIS procedure as
well as the Min-SIS method by using d = n/ log(n) = 49 (as suggested by their paper).
We used α1 = 0.0001 and α2 = 0.05 (as determined by sensitivity analysis in simulation)
and the “Multi-PC” algorithm only ran up to the first order (i.e. m = 2) and stopped
with six features. This again showed the power of screening with multiple studies. After
feature selection, we fit the linear model in each study to obtain the coefficient estimates and
adjusted R2 . Table 3 showed the coefficient estimates and standard errors of the final set of
six genes selected by our procedure. We added three columns to indicate whether they were
also retained by the Min-SIS (and their relative rank) or OneStep-SIS procedures. As we
can see from the table, all the six genes selected by our procedure were missed by the other
14
Table 3: The six genes selected by our TSA-SIS procedure.
Gene
METABRIC
Est (SE)
Intercept
7.600 (1.502)
EXOC1
0.251 (0.081)∗∗
ITGB1BP1 -0.134 (0.045)∗∗
RBM23
0.168 (0.078)∗
SETD3
-0.166 (0.081)∗
SQSTM1 -0.114 (0.050)∗
TRIOBP -0.126 (0.062)∗
Adjusted-R2
0.151
GSE25066
Est (SE)
0.213 (0.553)
0.278 (0.157).
0.003 (0.111)
0.144 (0.167)
0.366 (0.184)∗
0.029 (0.099)
0.084 (0.118)
0.522
GSE76250 Min-SIS Rank in OneStep-SIS
Est (SE)
d=49 Min-SIS
|S|=25
-1.783 (0.971)
.
0.293 (0.167)
N
164
N
-0.178 (0.194)
N
123
N
0.367 (0.168)∗
N
152
N
-0.080 (0.175)
N
101
N
0.245 (0.183)
N
98
N
0.628 (0.261)∗
N
91
N
0.359
Note: “.” indicates significant level of 0.1, “∗” for level of 0.05, “∗∗” for level of 0.01.
methods. Those genes typically had weak signals in one or more studies thus were very likely
to be incorrectly excluded if only one step screening is performed. Since the METABRIC
study had a larger sample size, all the coefficients appeared to be more significant than the
other two studies.
The gene EXOC1 and p53 are both components of the Ras signaling pathway which
is responsible for cell growth and division and can ultimately lead to cancer (Rajalingam
et al., 2007). RBM23 encodes for an RNA-binding protein implicated in the regulation of
estrogen-mediated transcription and has been found to be associated with p53 indirectly via
a heat shock factor (Asano et al., 2016). ITGB1BP1 encodes for an integrin protein which is
essential for cell adhesion and other downstream signaling pathways that are also modulated
by p53 (Brakebusch et al., 2002).
8
Discussion
In this paper, we proposed a two-step screening procedure for high-dimensional regression
analysis with multiple related studies. In a fairly general framework with weaker assumptions
on the signal strength, we showed that our procedure possessed the sure screening property
for exponentially growing dimensionality without requiring the normality assumption. We
have shown through simulations that our procedure consistently outperformed the rankbased SIS procedure independent of their tuning parameter d. As far as we know, our paper
is the first proposed procedure to perform variable screening in high-dimensional regression
when there are multiple related studies. In addition, we also introduced two applicable
variable selection algorithms following the two-step screening procedure.
Variable selection in regression with multiple studies have been studied in a subfield of
machine learning called multi-task learning (MTL) before and the general procedure is to
apply regularization methods by putting group Lasso penalty, fused Lasso penalty or trace
norm penalty, etc. (Argyriou et al., 2007; Zhou et al., 2012; Ji and Ye, 2009). However, at
ultra-high dimension, such regularization methods usually fail due to challenges in computation expediency, statistical accuracy and algorithmic stability. Instead, sure screening can be
15
used as a fast algorithm for preliminary feature selection, and as long as it exhibits comparable statistical performance both theoretically and empirically, its computational advantages
make it a good choice in application (Genovese et al., 2012). Our method has provided an
alternative to target the high-dimensional multi-task learning problems.
The current two-step screening procedure is based on the linear models but relaxes the
Gaussian assumption to sub-Gaussian distribution. One can apply a modified Fisher’s ztransformation estimator rather than our self-normalized estimator to readily accommodate
general elliptical distribution families (Li et al., 2017). In biomedical applications, noncontinuous outcomes such as categorical, count or survival outcomes are more commonly
seen. Fan et al. (2010) extended SIS and proposed a more general independent learning
approach for generalized linear models by ranking the maximum marginal likelihood estimates. Fan et al. (2011) further extended the correlation learning to marginal nonparametric
learning for screening in ultra-high dimensional additive models. Other researchers exploited
more robust measure for the correlation screening (Zhu et al., 2011; Li et al., 2012; Balasubramanian et al., 2013). All these measures can be our potential extension by modifying the
marginal utility used in the screening procedure. Besides, the idea of performing screening
with multiple studies is quite general and is applicable to relevant statistical models other
than the regression model, for example, Gaussian graphical model with multiple studies. We
leave these interesting problems in future study.
9
Proofs
We start by introducing three technical lemmas that are essential for the proofs of the main
(k)
results. By the scaling property of T̂j and Remark 1, without loss of generality, we can
(k)
(k)
assume E(Xj ) = E(Y (k) ) = 0 and var(Xj ) = var(Y (k) ) = 1 for all k ∈ [K], j ∈ [p].
(k)
(k)
Therefore in the proof we do not distinguish between σj and ρj . The first lemma is on
(k)
the concentration inequalities of the self-normalized covariance and θ̂j .
Lemma 1. Under the assumptions (C1) and (C2), for any δ ≥ 2 and M > 0, we have:
q
(k)
(k)
σ̂ −σj
(i) P (max | j (k) 1/2
| ≥ δ logn p ) = O((log p)−1/2 p−δ+1+b ),
j,k
(θ̂j )
(k)
(k)
(ii) P (max |θ̂j − θj | ≥ Cθ
q
j,k
log p
)
n
= O(p−M ),
where Cθ is a positive constant depending on M1 , η and M only.
The second and third lemmas, which will be used in the proof of Theorem 2, describe
n
P
r (k)
(k)
(k)
(k)
(k)
√ (k)
√1
[(Xij −X̄j )(Yi −Ȳ (k) )−ρj ]
n
θ̂j
nρ
(k)
(k)
i=1
q
q j
the concentration behaviors of Ĥj :=
=
T̂
−
(k)
j
(k)
(k)
θj
n
P
(k)
and Ȟj
:=
(k) (k)
(k)
√1
(Xij Yi −ρj )
n
i=1
q
(k)
θj
.
16
θj
θj
Lemma 2. There exists some constant c > 0 such that,
P (|
X
(k)2
[Ȟj
− 1]| > t) ≤ 2 exp(−c min[
k∈lj
t2 1/2
, t ]),
κj
where c depends on M1 and η only.
Lemma 3. There exists some constant CH > 0 such that,
s
log2 p
(k)
(k)
P (max |Ȟj − Ĥj | > CH
) = O(p−M ),
j,k
n
s
log3 p
(k)2
(k)2
P (max |Ȟj − Ĥj | > CH
) = O(p−M ),
j,k
n
where CH depends on M1 , η, M and τ0 only.
The proofs of the three lemmas are provided in the Appendix.
Proof of Theorem 1. We first define the following error events:
[0]
I,A
Ej,k
[0]
II,A
Ej,k
[1]
I,A
Ej,k
[1]
II,A
Ej,k
(k)
= {|T̂j | > Φ−1 (1 − α1 /2) and j ∈ A[0] , k ∈ lj },
(k)
/ lj },
= {|T̂j | ≤ Φ−1 (1 − α1 /2) and j ∈ A[0] , k ∈
(k)
= {|T̂j | > Φ−1 (1 − α1 /2) and j ∈ A[1] , k ∈ lj },
(k)
/ lj }.
= {|T̂j | ≤ Φ−1 (1 − α1 /2) and j ∈ A[1] , k ∈
To show Theorem 1 that P (A) = 1 − O(p−L ), it suffices to show that,
[ I,A[0]
II,A[0]
P { (Ej,k
∪ Ej,k
)} = O(p−L ),
(9.1)
j,k
and
P{
[ I,A[1]
II,A[1]
(Ej,k ∪ Ej,k
)} = O(p−L ).
(9.2)
j,k
One√can apply Lemma 1 to bound each component in (9.1) and (9.2) with α1 = 2{1 −
Φ(γ log p)} and γ = 2(L + 1 + b). Specifically, we obtain that,
[ I,A[0]
P ( Ej,k
) = P ( max
j,k
j∈A[0] ,k∈lj
(k)
|T̂j | ≥ γ
p
1
log p) = O( √
p−γ+1+b ) = o(p−L ),
log p
17
(9.3)
(k)
where the second equality is due to Lemma 1 (i) with δ = γ, noting that σj
√ (k) q (k)
(k)
T̂j = nσ̂j / θ̂j . In addition, we have that,
[ I,A[1]
P ( Ej,k
) =P { max
j∈A[1] ,k∈lj
j,k
(k)
|T̂j | ≥ γ
(k)
≤P ( max
|
p
j∈A[1] ,k∈lj
log p}
(k)
σ̂j − ρj
r
| ≥ (γ − C1 )
(k)
(θ̂j )1/2
= 0 and
log p
) + O(p−L )
n
(9.4)
1
p−(γ−C1 )+1+b ) + O(p−L )
log p
=O(p−L ),
=O( √
where the inequality on the second line is due to assumption (C4) on lj for j ∈ A[1] , Lemma
(k)
(k)
(k)
1 (ii) with M = L, and assumption (C1) minj,k θj ≥ τ0 , i.e., θ̂j ≥ θj − Cθ (log p/n)1/2 ≥
(k)
0.99θj . The equality on the third line follows from Lemma 1 (i) where δ = γ −C1 = L+1+b.
In the end, we obtain that,
[ II,A[0]
p
(k)
II,A[1]
P { (Ej,k
∪ Ej,k
)} =P (max |T̂j | < γ log p)
j,k∈l
/j
j,k
(k)
≤P (max |
j,k∈l
/j
(k)
σ̂j − ρj
(k)
(θ̂j )1/2
r
| ≥ (C3 − γ)
log p
) + O(p−L )
n
(9.5)
1
p−(C3 −γ)+1+b ) + O(p−L )
log p
−L
=O(p ),
=O( √
where the inequality on the second line is due to assumptions (C3) and (C4) on lj , Lemma
(k)
(k)
1 (ii) with M = L and assumption (C1) on sub-Gaussian distributions, i.e., θ̂j ≤ θj +
(k)
(k)
Cθ (log p/n)1/2 ≤ 1.01θj . In particular, we have implicitly used the fact that maxj,l θj is
upper bounded by a constant depending on M1 and η only. The equality on the third line
follows from Lemma 1 (i) where δ = C3 − γ = L + 1 + b.
Finally, we complete the proof by combining (9.3)-(9.5) to show (9.1)-(9.2).
Proof of Theorem 2. We first define the following error events:
[0] ,2
EjA
[1] ,2
EjA
= {|L̂j | > ϕ−1 (1 − α2 ) or κ̂j = 0} for j ∈ A[0] ,
= {|L̂j | < ϕ−1 (1 − α2 ) and κ̂j 6= 0} for j ∈ A[1] .
To prove Theorem 2, we only need to show that,
[ A[0] ,2
[ A[1] ,2
Ej
Ej
P(
) = O(p−L ) and P (
) = O(p−L ),
j∈A[0]
with α2,κj := 1 − ϕκj [κj + C4 (log2 p +
j∈A[1]
p
κj log p)] := 1 − ϕκj (γκj ).
18
(9.6)
Recall the event A defined in Theorem 1. Thus we have that,
[
[0]
[1]
P {(∪j∈A[0] EjA ,2 ) (∪j∈A[1] EjA ,2 )}
X (k)2
X
≤P (AC ) + p max P (
T̂j > γκj ) + p max P (
T̂ (k)2 < γκj ).
j∈A[0]
j∈A[1] ,κj 6=0
k∈lj
k∈lj
Therefore, given the results in Theorem 1, it suffices to show,
X
P(
T̂ (k)2 > γκj ) = O(p−L−1 ) for any j ∈ A[0] ,
(9.7)
k∈lj
and
P(
X
T̂ (k)2 < γκj ) = O(p−L−1 ) for any j ∈ A[1] and κj > 0.
(9.8)
k∈lj
[0]
We first prove equation (9.7). Since j ∈ A , we have
P
(k)2
to bound the probability of k∈lj T̂j > γκj below.
P(
X
(k)2
T̂j
> γκj )
(k)2
Ĥj
Cθ
> (1 −
τ0
(k)
Ĥj
=
(k)
T̂j
r
(k)
θ̂j
(k)
θj
. We are ready
k∈lj
≤P (
X
k∈lj
r
log p
)γκj ) + O(p−L−1 )
n
r
s
log3 p
) + O(p−L−1 )
n
j
s
X (k)2
p
κ2j log p
C
θ
2
=P ( (Ȟj − 1) > κj + C4 (log p + κj log p) −
τ0
n
k∈lj
s
s
s
Cθ C4
log5 p
κj log2 p
log3 p
−
(
+
) − κj − κj CH
) + O(p−L−1 )
τ0
n
n
n
X (k)2
p
≤P ( (Ȟj − 1) > C20 (log2 p + κj log p)) + O(p−L−1 )
X (k)2
Cθ
≤P ( (Ȟj − 1) > (1 −
τ0
k∈l
log p
)γκj − κj − κj CH
n
k∈lj
=O(p−L−1 ).
(k)
The inequality on the second line is due to assumption (C1) that min θj
j,k
≥ τ0 > 0 and
Lemma 1 (ii) with M = L + 1. The inequality on the third line follows from Lemma 3 with
M = L + 1. The inequality on the fifth line is by the choice of γκj with a sufficiently large
C4 > 0 and the assumption (C2) that log3 p = o(n) and κj log2 p = o(n). The last equality
follows from Lemma 2.
19
Lastly, we prove (9.8) as follows,
X (k)2
P(
T̂j < γκj )
k∈lj
√ (k)
(k)
X (k)
nρj 2 θj
) (k) < γκj )
=P ( (Ĥj + q
(k)
θ̂j
k∈lj
θj
r
√ (k)
X (k)
nρj 2
Cθ log p
)γκj ) + O(p−L−1 )
≤P ( (Ĥj + q
) ≤ (1 +
(k)
τ
n
0
k∈lj
θj
s
r
X (k)2
X (k)2
log3 p
Cθ log p
≤P ( (Ȟj − 1) ≤ κj CH
− κj + (1 +
)γκj − Cm n
ρj
n
τ
n
0
k∈lj
k∈lj
s
√ (k)
√
(k)
X (k) nρj
log2 p X n|ρj |
q
Ȟj q
+ 2CH
) + O(p−L−1 ).
−2
(k)
(k)
n
k∈lj
k∈lj
θj
θj
(k)
The inequality on the third line is due to assumption (C1) that min θj
j,k
(9.9)
≥ τ0 > 0 and
Lemma 1 (ii) with M = L + 1. The inequality on the fourth line follows from Lemma 3
(k)
(both equations) and min(θj )−1 := Cm > 0, guaranteed by the sub-Gaussian assumption
j,k
in assumption (C1).
We can upper bound the term 2CH
s
2CH
q
log2 p
n
√ (k)
n|ρ |
q j
k∈lj
(k)
θj
P
in (9.9) as follow,
s
√ (k)
√
s X
sX
X
n|ρj |
log p
log2 p n √
(k)2
(k)2
q
ρj = o( n
≤ 2CH
κj
ρj ).
√
(k)
n k∈l
n
τ0
k∈lj
k∈lj
θj
j
2
(9.10)
The first inequality is by the Cauchy-Schwarz inequality and assumption (C1), and the
second equality by the assumption (C2) that κj log2 p = o(n).
√ (k)
P
(k)
(k) nρj
We next upper bound the term −2 k∈lj Ȟj q (k)
with high probability. Note that θj
θj
(k)
θj
(k)
−1
Cm
is bounded below and above, i.e., τ0 ≤
≤
by assumption (C1). In addition, Ȟj has
zero mean and is sub-exponential with bounded constants by assumption (C1). By Bernstein
inequality (Proposition 5.16 in Vershynin (2010)), we have with some constant c0 > 0,
P (|2
X
k∈lj
We pick t = CB
(k)
|Ȟj
√ (k)
n|ρ |
t2
t
q j | > t) ≤ 2 exp(−c0 min[ P (k)2 ],
).
√
(k)
(k)
n
ρj
max n|ρj |
θj
k∈lj
k∈lj
q P
(k)2
n k∈lj ρj log2 p with a large constant CB in the inequality above and
20
apply (9.10) to reduce (9.9) as follows,
X (k)2
P(
T̂j < γκj )
k∈lj
s X
X (k)2
X (k)2
(k)2
≤P ( (Ȟj − 1) ≤ −Cm n
ρj log2 p
ρj + 2CB n
k∈lj
k∈lj
k∈lj
p
+ 2C4 κj log p + 2C4 log2 p) + O(p−L−1 )
q
X (k)2
p
p
2
≤P ( (Ȟj − 1) ≤ −Cm C2 (log p + κj log p) + 2CB C2 log2 p(log2 p + κj log p)
k∈lj
p
+ 2C4 κj log p + 2C4 log2 p) + O(p−L−1 )
X (k)2
p
≤P ( (Ȟj − 1) ≤ −C20 (log2 p + κj log p)) + O(p−L−1 )
k∈lj
=O(p−L−1 ).
The inequality on the first line is obtained by the choice of γκj with the chosen C4 > 0
and the assumption (C2) that κj log2 p = o(n). The inequalities
√ on the second line and third
P
C2 (log2 p+ κj log p)
(k) 2
for a sufficiently large
line are by the assumption (C4) that k∈lj |ρj | ≥
n
C2 > 0. The last equality is by Lemma 2.
This completes the proof of (9.7) and (9.8), which further yields to
[
[0]
[1]
P {(∪j∈A[0] EjA ,2 ) (∪j∈A[1] EjA ,2 )} = O(p−L ),
with the results from Theorem 1. Therefore we complete the proof of Theorem 2.
Appendix
S1. Proof of Lemma 1
Proof. Part (i) immediately follows from Lemma 2 (i) equation (25) in Cai and Liu (2011).
To prove part (ii), we need to bound the three terms on the right side of the following
inequality,
(k)
(k)
(k)
(k)
(k)
(k)
(k)
(k)
max |θ̂j − θj | ≤ max |θ̂j − θ̃j | + max |θ̃j − θ̌j | + max |θ̌j − θj |,
j,k
(k)
where θ̃j
(k)
:=
j,k
1
n
n
P
(k)
(k)
(Xij Yi
j,k
(k)
(k)
− ρ̃j )2 with ρ̃j =
i=1
(k)
1
n
(A1)
j,k
n
P
(k)
(k)
(k)
Xij Yi , and θ̌j
i=1
(k)
:=
1
n
n
P
(k)
(k)
(Xij Yi
−
i=1
ρj )2 . Note that E(θ̌j ) = θj .
By the marginal sub-Gaussian distribution assumption in assumption (C1), we have that
(k) (k)
(k)
(k)
(Xij Yi − ρj )2 has mean θj and finite Orlicz ψ1/2 -norm (see, e.g., Adamczak et al.
(2011)). Thus we can apply equation (3.6) of Adamczak et al. (2011), i.e.,
√ (k)
t2
(k)
P (max n|θ̌j − θj | > t) ≤ 2 exp(−c min[ , t1/2 ]),
j,k
n
21
√
with t = (Cθ /3) n log p for a large enough constant Cθ > 0 depending on M1 , η and M only
to obtain that,
r
log p
(k)
(k)
P (max |θ̌j − θj | > (Cθ /3)
) = O(p−M ).
(A2)
j,k
n
2
We have used the assumption log p = o(n1/3 ) in assumption (C2) to make sure tn ≤ t1/2 .
By applying equation (1) in supplement of Cai and Liu (2011), we obtain that,
r
log p
(k)
(k)
P (max |θ̃j − θ̂j | > (Cθ /3)
) = O(p−M ).
(A3)
j,k
n
In addition, by a similar truncation argument as that in the proof of Lemma 2 in Cai and
Liu (2011) and equation (7) therein, we obtain that by picking a large enough Cθ > 0,
r
log p
(k)
(k)
P (max |θ̃j − θ̌j | > (Cθ /3)
) = O(p−M ).
(A4)
j,k
n
We complete the proof by combining (A1)-(A4) with a union bound argument.
S2. Proof of Lemma 2
(k)
(k)
Proof. It is easy to check that E(Ȟj ) = 0 and var(Ȟj ) = 1. The marginal sub-Gaussian
(k)
distribution assumption in assumption (C1) implies that Ȟj has finite Orlicz ψ1 -norm (i.e.,
(k)
sub-exponential distribution with finite constants). Therefore, (Ȟj )2 −1 is centered random
(k)
variable with finite Orlicz ψ1/2 -norm. Note that Ȟj are independent for k ∈ [K]. The result
follows from equation (3.6) of Adamczak et al. (2011).
S3. Proof of Lemma 3
√
(k) √
√ (k)
nX̄j
nȲ (k)
(k)
(k)
q
Proof. Note that Ȟj −Ĥj =
. By assumption (C1), we have that E( nX̄j ) =
(k)
nθj
√ (k)
√ (k)
√
√ (k)
√
E( nȲ ) = 0, var( nX̄j ) = var( nȲ (k) ) = 1, and both nX̄j and nȲ (k) are subGaussian with bounded constants. Therefore, the first equation follows from Bernstein
inequality (e.g., Definition 5.13 in Vershynin (2010)) applied to centered sub-exponential
√ (k) √
(k)
variable nX̄j · nȲ (k) , noting θj ≥ τ0 by assumption (C1). The second equation follows
from the first one, log3 p = o(n), and a Bernstein inequality (e.g., Corollary 5.17 in Vershynin
(k)
(2010)) applied to the sum of centered sub-exponential variables Ȟj .
References
Adamczak, R., Litvak, A. E., Pajor, A., and Tomczak-Jaegermann, N. (2011). Restricted
isometry property of matrices with independent columns and neighborly polytopes by
random sampling. Constructive Approximation, 34(1):61–88.
22
Argyriou, A., Evgeniou, T., and Pontil, M. (2007). Multi-task feature learning. In Advances
in neural information processing systems, pages 41–48.
Asano, Y., Kawase, T., Okabe, A., Tsutsumi, S., Ichikawa, H., Tatebe, S., Kitabayashi,
I., Tashiro, F., Namiki, H., Kondo, T., et al. (2016). Ier5 generates a novel hypophosphorylated active form of hsf1 and contributes to tumorigenesis. Scientific reports,
6.
Balasubramanian, K., Sriperumbudur, B., and Lebanon, G. (2013). Ultrahigh dimensional
feature screening via rkhs embeddings. In Artificial Intelligence and Statistics, pages 126–
134.
Brakebusch, C., Bouvard, D., Stanchi, F., Sakai, T., and Fassler, R. (2002). Integrins in
invasive growth. The Journal of clinical investigation, 109(8):999.
Bühlmann, P., Kalisch, M., and Maathuis, M. H. (2010). Variable selection in highdimensional linear models: partially faithful distributions and the pc-simple algorithm.
Biometrika, 97(2):261–278.
Cai, T. and Liu, W. (2011). Adaptive thresholding for sparse covariance matrix estimation.
Journal of the American Statistical Association, 106(494):672–684.
Cai, T. T. and Liu, W. (2016). Large-scale multiple testing of correlations. Journal of the
American Statistical Association, 111(513):229–240.
Chang, J., Tang, C. Y., and Wu, Y. (2013). Marginal empirical likelihood and sure independence feature screening. Annals of statistics, 41(4).
Chang, J., Tang, C. Y., and Wu, Y. (2016). Local independence feature screening for
nonparametric and semiparametric models by marginal empirical likelihood. Annals of
statistics, 44(2):515.
Curtis, C., Shah, S. P., Chin, S.-F., Turashvili, G., Rueda, O. M., Dunning, M. J., Speed, D.,
Lynch, A. G., Samarajiwa, S., Yuan, Y., et al. (2012). The genomic and transcriptomic
architecture of 2,000 breast tumours reveals novel subgroups. Nature, 486(7403):346–352.
Fan, J., Feng, Y., and Song, R. (2011). Nonparametric independence screening in sparse
ultra-high-dimensional additive models. Journal of the American Statistical Association,
106(494):544–557.
Fan, J. and Li, R. (2001). Variable selection via nonconcave penalized likelihood and its
oracle properties. Journal of the American statistical Association, 96(456):1348–1360.
Fan, J. and Lv, J. (2008). Sure independence screening for ultrahigh dimensional feature space. Journal of the Royal Statistical Society: Series B (Statistical Methodology),
70(5):849–911.
Fan, J. and Lv, J. (2010). A selective overview of variable selection in high dimensional
feature space. Statistica Sinica, 20(1):101.
23
Fan, J., Samworth, R., and Wu, Y. (2009). Ultrahigh dimensional feature selection: beyond
the linear model. Journal of Machine Learning Research, 10(Sep):2013–2038.
Fan, J., Song, R., et al. (2010). Sure independence screening in generalized linear models
with np-dimensionality. The Annals of Statistics, 38(6):3567–3604.
Genovese, C. R., Jin, J., Wasserman, L., and Yao, Z. (2012). A comparison of the lasso and
marginal regression. Journal of Machine Learning Research, 13(Jun):2107–2143.
Huang, J., Breheny, P., and Ma, S. (2012). A selective review of group selection in highdimensional models. Statistical science: a review journal of the Institute of Mathematical
Statistics, 27(4).
Itoh, M., Iwamoto, T., Matsuoka, J., Nogami, T., Motoki, T., Shien, T., Taira, N., Niikura, N., Hayashi, N., Ohtani, S., et al. (2014). Estrogen receptor (er) mrna expression
and molecular subtype distribution in er-negative/progesterone receptor-positive breast
cancers. Breast cancer research and treatment, 143(2):403–409.
Ji, S. and Ye, J. (2009). An accelerated gradient method for trace norm minimization.
In Proceedings of the 26th annual international conference on machine learning, pages
457–464. ACM.
Jiang, J., Li, C., Paul, D., Yang, C., Zhao, H., et al. (2016). On high-dimensional misspecified mixed model analysis in genome-wide association study. The Annals of Statistics,
44(5):2127–2160.
Li, R., Liu, J., and Lou, L. (2017). Variable selection via partial correlation. Statistica
Sinica, 27(3):983.
Li, R., Zhong, W., and Zhu, L. (2012). Feature screening via distance correlation learning.
Journal of the American Statistical Association, 107(499):1129–1139.
Liang, F., Song, Q., and Qiu, P. (2015). An equivalent measure of partial correlation coefficients for high-dimensional gaussian graphical models. Journal of the American Statistical
Association, 110(511):1248–1265.
Liu, Y.-R., Jiang, Y.-Z., Xu, X.-E., Hu, X., Yu, K.-D., and Shao, Z.-M. (2016). Comprehensive transcriptome profiling reveals multigene signatures in triple-negative breast cancer.
Clinical cancer research, 22(7):1653–1662.
Luo, S., Song, R., and Witten, D. (2014). Sure screening for gaussian graphical models.
arXiv preprint arXiv:1407.7819.
Ma, S., Li, R., and Tsai, C.-L. (2017). Variable screening via quantile partial correlation.
Journal of the American Statistical Association, pages 1–14.
Meier, L., Van De Geer, S., and Bühlmann, P. (2008). The group lasso for logistic regression.
Journal of the Royal Statistical Society: Series B (Statistical Methodology), 70(1):53–71.
Nardi, Y., Rinaldo, A., et al. (2008). On the asymptotic properties of the group lasso
estimator for linear models. Electronic Journal of Statistics, 2:605–633.
24
Rajalingam, K., Schreck, R., Rapp, U. R., and Albert, S. (2007). Ras oncogenes and
their downstream targets. Biochimica et Biophysica Acta (BBA)-Molecular Cell Research,
1773(8):1177–1195.
Shao, Q.-M. (1999). A cramér type large deviation result for student’s t-statistic. Journal
of Theoretical Probability, 12(2):385–398.
Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal
Statistical Society. Series B (Methodological), pages 267–288.
Tseng, G. C., Ghosh, D., and Feingold, E. (2012). Comprehensive literature review and
statistical considerations for microarray meta-analysis. Nucleic acids research, 40(9):3785–
3799.
Vershynin, R. (2010). Introduction to the non-asymptotic analysis of random matrices. arXiv
preprint arXiv:1011.3027.
Yadav, B. S., Chanana, P., and Jhamb, S. (2015). Biomarkers in triple negative breast
cancer: A review. World journal of clinical oncology, 6(6):252.
Yuan, M. and Lin, Y. (2006). Model selection and estimation in regression with grouped
variables. Journal of the Royal Statistical Society: Series B (Statistical Methodology),
68(1):49–67.
Zhou, J., Liu, J., Narayan, V. A., and Ye, J. (2012). Modeling disease progression via fused
sparse group lasso. In Proceedings of the 18th ACM SIGKDD international conference on
Knowledge discovery and data mining, pages 1095–1103. ACM.
Zhu, L.-P., Li, L., Li, R., and Zhu, L.-X. (2011). Model-free feature screening for ultrahighdimensional data. Journal of the American Statistical Association, 106(496):1464–1475.
Zou, H. (2006). The adaptive lasso and its oracle properties. Journal of the American
statistical association, 101(476):1418–1429.
Zou, H. and Hastie, T. (2005). Regularization and variable selection via the elastic net.
Journal of the Royal Statistical Society: Series B (Statistical Methodology), 67(2):301–
320.
25
| 10math.ST
|
Solving the Resource Constrained Project Scheduling Problem Using the
Parallel Tabu Search Designed for the CUDA Platform1
Libor Bukata∗, Přemysl Šůcha, Zdeněk Hanzálek
arXiv:1711.04556v1 [cs.DC] 13 Nov 2017
Department of Control Engineering, the Czech Technical University in Prague,
Karlovo náměstı́ 13, 121 35 Prague 2, the Czech Republic
Abstract
In the paper, a parallel Tabu Search algorithm for the Resource Constrained Project Scheduling Problem is proposed. To deal with this NP-hard combinatorial problem many optimizations have been
performed. For example, a resource evaluation algorithm is selected by a heuristic and an effective
Tabu List was designed. In addition to that, a capacity-indexed resource evaluation algorithm was
proposed and the GPU (Graphics Processing Unit) version uses a homogeneous model to reduce the
required communication bandwidth. According to the experiments, the GPU version outperforms the
optimized parallel CPU version with respect to the computational time and the quality of solutions.
In comparison with other existing heuristics, the proposed solution often gives better quality solutions.
Cite as: Libor Bukata, Premysl Sucha, Zdenek Hanzalek, Solving the Resource Constrained Project
Scheduling Problem using the parallel Tabu Search designed for the CUDA platform, Journal of Parallel
and Distributed Computing, Volume 77, March 2015, Pages 58-68, ISSN 0743-7315, http://dx.doi.
org/10.1016/j.jpdc.2014.11.005.
Source code: https://github.com/CTU-IIG/RCPSPCpu, https://github.com/CTU-IIG/RCPSPGpu
Keywords: Resource Constrained Project Scheduling Problem, Parallel Tabu Search, CUDA,
homogeneous model, GPU
1. Introduction
The Resource Constrained Project Scheduling
Problem (RCPSP), which has a wide range of applications in logistics, manufacturing and project
management [1], is a universal and well-known
problem in the operations research domain. The
problem can be briefly described using a set of
∗
The corresponding author.
Email addresses: [email protected] (Libor
Bukata), [email protected] (Přemysl Šůcha),
[email protected] (Zdeněk Hanzálek)
1 c
2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://
creativecommons.org/licenses/by-nc-nd/4.0/.
Preprint submitted to J. Parallel Distrib. Comput.
activities and a set of precedence constraints describing the relationships among activities. Each
activity requires a defined amount of the resources
and every resource has a limited capacity. The
objective is to find the best feasible schedule according to a criterion. The RCPSP was proved
to be NP-hard in the strong sense when the criterion is makespan [2]. For that reason only small
instances (approximately up to 30 activities) can
be reliably solved by exact methods like Branch &
Bound [3], therefore a heuristic or a meta-heuristic
is required to solve the problem satisfactorily.
In recent times, there is an increased interest
in using graphics cards to solve difficult combinatorial problems (e.g. [4, 5, 6]), since a modern
March 12, 2018
graphics card is usually much more powerful than
a current multi-core CPU. Although the graphics
cards have some restrictions (e.g. a high-latency
global memory access), the new GPU architectures like Kepler and Fermi can significantly reduce these bottlenecks. As a consequence modern
GPUs are applicable to the problems which were
solvable only on CPUs previously.
Not only the high computational power makes
graphics cards attractive to researchers and practitioners, but also the mature Nvidia CUDA framework which enables us to create GPU programs
in an effective and relatively easy way since it extends standard languages like C/C++ by adding
GPU specific functions and language keywords.
Nevertheless, the CUDA is only designed for the
Nvidia graphics cards.
From the implementation point of view, there
are two models. The first one is called a homogeneous model where all required data structures
are stored in a GPU at the beginning of an algorithm and the results are read at the end of the
algorithm. There is no communication between
the CPU and the GPU during the computations.
The second approach is a heterogeneous model.
The main logic of an algorithm runs on the CPU
and the GPU is used only for the most computationally intensive tasks. The disadvantage of the
heterogeneous model is the frequent communication during computations, therefore, the communication bandwidth can state a bottleneck. However, the heterogeneous model is usually simpler
to implement.
cores). Every location (i.e. an index of a thread)
has different parameters (a tabu tenure, stopping
criteria). At the beginning of the search each
thread initializes its own location by a short TS
operator, i.e. a modified version of the Taillard’s
robust tabu search. Then the asynchronous parallel tabu search is started. Every thread independently reads a solution and parameters from the
location, possibly makes a diversification, runs the
TS operator on the solution, and writes back and
sets an UPDATE flag if an improving solution is
found. After that the thread location index is circularly incremented. Diversification takes place if
the read solution does not have the UPDATE flag
set. Every best global solution is copied to half of
the locations of the circular buffer to propagate
elite solutions. Since the circular buffer is shared
by many threads, the access has to be as short as
possible and the locations have to be protected by
critical sections.
Relatively many authors try to use a GPU
for solving combinatorial problems. For example,
Czapiński and Barnes [10] implemented a GPU
version of TS to solve the Flowshop Scheduling
Problem (FSP). The success of the implementation illustrates an achieved speedup against the
CPU version. The GPU version was up to 89.01
times faster than the CPU (Intel Xeon 3.0 GHz,
2 GB memory, Nvidia Tesla C1060 GPU). Nevertheless, the quality of solutions was not investigated.
The Flowshop Scheduling Problem was also
solved by Zajı́ček and Šůcha [11]. The authors
implemented a GPU version of an island based
genetic algorithm. Islands are used for migration
of individuals among sub-populations, where each
sub-population is a subset of solutions and an individual corresponds to a specific solution. Subpopulation can be evaluated, mutated and crossed
over independently of other sub-populations, therefore, huge parallelization can be achieved. It should
be noted that a homogeneous model was used.
The maximal speedup against the CPU was 110
for 100 activities and 5 machines (AMD Phenom
II X4 945 3.0 GHz, Nvidia Tesla C1060).
Czapiński [5] proposed a Parallel Multi-start
Tabu Search for the Quadratic Assignment Prob-
1.1. Related works
The Tabu Search meta-heuristic was proposed
by Glover in 1986 [7]. Hundreds of publications
have been written since that time. The basic concept of the TS meta-heuristic is clarified in Gendreau [8]. The author has described the basic
terms of the TS, as a Tabu List (TL), aspiration
criteria, diversification, intensification, etc.
From the Tabu Search parallelization point of
view James et al. [9] proposed a sophisticated solution. The authors use a circular buffer where
the size of the buffer is equivalent to the number
of the started threads (often the number of CPUs
2
lem. The main idea is to start several Parallel
Tabu Search instances with different parameters
and initial solutions. All Tabu Search instances
should terminate approximately at the same time
since the synchronization is required to get the
most promising solutions. When a stop criterion
is met, the modified solutions are read back and
the most promising solutions are used as the initial solutions in the next run. The Tabu Search
instance runs entirely on the GPU, therefore communication overheads are reduced to minimum.
The achieved results reveal the effectiveness of the
implementation since Nvidia GTX 480 is up to 70
times faster than a six-core Intel Core i7-980x 3.33
GHz.
Hofmann et al. [12] investigated the suitability
of graphics cards for genetic algorithms. The authors selected two problems to solve, namely the
Weierstrass function minimization and the Traveling Salesman Problem. The first problem can
be very effectively implemented on the GPU since
the Weierstrass function is comprised of floatingpoint operations and trigonometric functions that
are directly supported by the GPU hardware. In
contrast to the first problem the second problem
was not tailor-made for the GPU, therefore, the
multi-core CPU was able to compete with the
GPU. The authors suggest that all parts of a genetic algorithm should be performed on the Fermi
or newer GPUs (i.e. homogeneous model).
Boyer et al. [13] used dynamic programming
to solve the knapsack problem on a GPU. An effective data compression was proposed to reduce
memory occupancy. The achieved results show
that the Nvidia GTX 260 graphics card was up
to 26 faster than Intel Xeon 3.0 GHz.
The above mentioned combinatorial problems
have something in common. The solution evaluation is quite simple since it is usually a “simple sum”. On the other hand, the RCPSP requires much more complicated schedule evaluation methods and data structures.
CPU version in both performance speedup and
the quality of solutions. This is possible thanks
to an effective schedule evaluation and a GPUoptimized Simple Tabu List. In addition, the required data transfers are reduced to minimum due
to the homogeneous model. Our Parallel Tabu
Search is able to outperform other Tabu Search
implementations in the quality of the resulting solutions.
The paper is structured as follows: The following section introduces the RCPSP mathematical formulation and notation. The Tabu Search
meta-heuristic is briefly described in Section 3.
Our proposed Parallel Tabu Search algorithm for
the CUDA platform is described in detail in Sections 4, 5, and 6. The performed experiments are
located in Section 7 and the last section concludes
the work.
2. Problem Statement
According to the standard notation, classification for the RCPSP is PS|prec|Cmax [14]. A
project can be described as follows: There is a set
of activities V = {0, . . . , N − 1} with durations
D = {d0 , . . . , dN −1 } where N is the number of
activities. There are two dummy activities 0 and
N −1 such that d0 = dN −1 = 0. Activity 0 is a predecessor of all other activities and activity N − 1
is the end activity of a project. A schedule of the
RCPSP can be represented as a vector of activities’ start times S = {s0 , . . . , sN −1 } where si ∈ N.
Alternatively, a schedule can be expressed as an
order of activities W = {w0 , . . . , wN −1 } ∈ W
where wu is the u-th activity of the schedule and
W is a set of all feasible solutions.
The RCPSP can be represented as Direct Acyclic
Graph G(V, E) where nodes V are activities and
edges E are precedence relations. If there is edge
(i, j) ∈ E then si + di ≤ sj since activity j has to
be scheduled after activity i.
Each activity requires some amount of renewable resources. The number of project resources is
denoted as M and a set of resources capacities is
R = {R0 , . . . , RM −1 } where Rk ∈ N. Maximal re−1
source capacity Rmax is equal to maxM
k=0 Rk . Activity resource requirement ri,k ∈ N means that
1.2. Contribution and Paper Outline
The proposed solution is the first known GPU
algorithm for the RCPSP. The performed experiments revealed that the GPU outperforms the
3
Activity i
0
1
2
3
4
5
6
7
8
9
10
11
activity i requires ri,k ≤ Rk resource units of resource k during its execution. As si and di values
are positive integers, the resulting schedule length
Cmax (i.e. the project makespan) will also be an
integer as well.
A lower bound of the project makespan can be
found by neglecting resources. For each activity
i ∈ V all outgoing edges (i, j) ∈ E are weighted
by its duration di . The longest path from 0 to
N −1 in graph G(V, E) corresponds to the critical
path. Its length is equal to the optimal project
makespan on the condition that all resources have
an unlimited capacity.
∀i∈V
sj ≥ si + di
∀(i, j) ∈ E
!
X
Cmax
max
ri,k ≤ Rk
t=0
ri,0
0
5
2
3
2
3
4
2
4
1
2
0
ri,1
0
3
1
2
3
4
1
2
5
2
2
0
Successors
{1, 2}
{3, 6}
{4, 5}
{5, 10}
{7}
{8, 9}
{7, 9}
{8, 10}
{11}
{11}
{11}
{}
Table 1: Data of an example instance.
2.1. Mathematical Formulation
minimize Cmax
s.t. Cmax = max (si + di ) = sN −1
di
0
4
3
5
5
3
2
4
2
3
4
0
3. Brief description of the Tabu Search metaheuristic
(1)
(2)
To move through solution space W, a transformation of the current solution to a neighborhood
solution is required. This transformation is called
a move which can be seen as a light solution modification like a swap of two elements in an order,
etc.
The Tabu Search meta-heuristic was proposed
by Glover [7] as an improvement of the local search
technique [8]. A local search algorithm starts
from the initial solution and iteratively improves
this solution by applying the best neighborhood
moves until a local optimum is reached, whereas
the Tabu Search introduces a short-term memory called Tabu List which reduces the probability of getting stuck in a local optimum or plateau
by forbidding the previously visited solutions. As
a consequence, not only improving solutions are
permitted and the search process is able to climb
(3)
(4)
i∈Ft
∀k ∈ {0, . . . , M − 1}
Ft = {i ∈ V |si ≤ t < si + di }
The objective of the RCPSP is to find a feasible schedule W with the minimal schedule length
Cmax . The schedule length is the latest finish
time of any activity (Equations (1),(2)). Equation (3) ensures that all precedence relations are
satisfied. A schedule is feasible if all precedence
relations are satisfied and the resources are not
overloaded, i.e. the activities requirements do not
exceed the capacity of any resource at any time
(Equation (4)).
2.2. Instance Example
The data of an example instance are showed in
Table 1. In the project there are 10 non-dummy
activities and 2 renewable resources with maximal
capacity 6. The corresponding graph of precedences is shown in Figure 1. The critical path
is highlighted by bold lines and its length is 16.
One of the feasible solutions of the instance is the
activity order W = {0, 1, 2, 3, 4, 6, 5, 7, 9, 10, 8, 11}
with Cmax = 22. The resource utilization for this
order is depicted in Figure 2.
3
i
10
5
di
4
1
6
0
4
2
0
2
4
3
5
7
4
8
11
2
0
5
3
9
3
Figure 1: Graph of precedences for the example instance.
4
R1
resource utilization
6
5
5
4
4
9
3
2
8
2
1
3
1
0
0
1
2
3
4
5
6
7
6
7
8
9
10
11
12
13
14
10
15
16
17
18
19
20
21
t [s]
R0
6
resource utilization
22
5
6
4
3
5
3
1
9
8
2
2
1
0
0
1
2
3
4
5
4
6
7
8
9
7
10
11
12
13
14
10
15
16
17
18
19
20
21
22
t [s]
Figure 2: Utilization of resources for the example instance.
to the hills in the search space W if it is necessary.
Due to efficiency, the Tabu List usually contains only parts of solutions or several previously
applied moves. As moves or parts of solutions do
not have to be unique, it is possible that a forbidden move leads to the best solution. In this case
it is reasonable to permit the move since the resulting solution was not visited before. In general,
exceptions allowing forbidden moves are called aspiration criteria [8].
The quality of the resulting solutions can be
further improved by a suitable search strategy.
For example, if a current location in the solution space is promising, i.e. the best solution
was found recently, then a more thorough search
is performed – intensification. It can be accomplished by concentrating more computational power
to this locality of the space. Opposite to that, if
a current location is unpromising, i.e. only poor
solutions were found, then diversification is performed. The diversification moves the current
search location to another one where better solutions could be found. It is often realized by
applying a few random moves.
The Tabu Search process is stopped if a stop
criterion is met. The stop criterion can be the
5
number of iterations, achieved quality of the best
found solution, the maximal number of iterations
since the last best solution was found, etc.
4. Exploration of the Solution Space
4.1. Creating Initial Activity Order
Our Tabu Search algorithm starts from initial
feasible solution W init ∈ W which is created in
the following way: First of all, the longest paths
in graph G from the start activity 0 to all other
activities are found. The weight of each graph
edge (i, j) ∈ E is set to 1. Activities with the
same maximal distance from the start activity are
grouped to levels. The level lk corresponds to all
activities with maximal distance k from the start
activity, therefore, activity 0 is at level l0 and activity N − 1 is at level lmax where subscript max
corresponds with the last level number. The final
feasible schedule can be created from levels such
that W = {{l0 }, . . . , {lmax }}. Alternative feasible
schedules can be created by shuffling the activities
on the same level.
4.2. Move Transformation
Schedule order W is changed in our Tabu Search
algorithm by a swap move. A simple example is
illustrated in Figure 3. Two dummy activities (0
and N − 1) cannot be swapped due to precedence
constraints, therefore the activity at w0 is always
0 and the activity at wN −1 is always N − 1. The
swap move is defined as swap(u, v) where u and
v are swapped indices. As swap(u, v) modifies a
schedule in the same way as swap(v, u) only swaps
with u < v are taken into account without loss of
generality.
reduced neighborhood, moves are restricted to all
swap(u, v), where u < v and |v − u| ≤ δ. Value δ
is the maximal distance between the swapped activities in order W . The size of the neighborhood
|Nreduced (W )| is parametrized by δ.
There are two reasons why only feasible moves
are applied. The neighborhood size is reduced
without noticeable deterioration of the project makespan and there is no need to check the feasibility
of schedules.
swap(3, 6)
0
3
7
1
2
8
4
6
5
9
0
3
7
4
2
8
1
6
5
9
4.4. Filtering Infeasible Moves
In order to saturate a GPU, feasible schedules in Nreduced should be evaluated in a parallel way by dividing the schedules equally among
the threads. Since the evaluation of a schedule is
much more time-consuming than checking whether
a move is feasible it is advantageous to filter out
all infeasible moves before the neighborhood evaluation. It reduces the branch divergency of warps,
hence the overall performance of the resources
evaluation is improved.
In Algorithm 1 is shown how infeasible moves
are filtered out from the neighborhood. The filter
works in two phases since it was discovered that
it is more effective due to the lower branch divergency than to filter out all the infeasible moves
at once. In the end, only part of the array with
feasible moves is taken into account in the neighborhood evaluation.
Figure 3: Example of the swap move.
Let W ∈ W be a feasible activity order. A
feasible order means that there is not a violated
precedence relation. A feasible move is a move
which does not violate any precedence relation,
therefore if this move is applied to a feasible schedule then the modified schedule will be feasible as
well. Move swap(u, v) is feasible if the following
equations are satisfied.
(wu , wx ) ∈
/E
(wx , wv ) ∈
/E
∀x ∈ {u + 1, . . . , v}
∀x ∈ {u, . . . , v − 1}
(5)
(6)
The First Equation (5) means that there are
no edges from activity wu to the activities at indices from u+1 to v. If there is any edge, then activity wu cannot be moved to position v without
a precedence violation. In a similar way, Equation (6) states that activity wv cannot be moved
to index u if there is a precedence relation that
becomes violated.
4.3. Neighborhood Generation
Full neighborhood Nf ull (W ) ⊆ W of schedule
W is a set of schedules obtained by applying all
feasible moves. Since the full neighborhood is usually too large to be evaluated in a reasonable time
only a subset of the neighborhood is usually taken
into account. Such a subset will be called as a reduced neighborhood denoted Nreduced (W ). In the
Algorithm 1 Removing infeasible moves from the reduced neighborhood.
Require: Nreduced (W )
Ensure: It filters out infeasible moves from the reduced
neighborhood.
1: Let MovesArray be an array containing all potential
swaps in Nreduced (W ).
2: All moves not satisfying Equation (5) are removed, i.e.
set empty.
3: Reorder MovesArray such that all empty moves are in
the end of the array.
4: Remove moves that do not satisfy Equation (6).
5: Move all feasible moves to the beginning of
MovesArray.
4.5. Simple Tabu List and Cache
The tabu list in [10] is not suitable for a GPU
since it is necessary to go through all moves in
6
5. Schedule Evaluation
the tabu list to decide whether a move is in the
tabu list or not. As a consequence it places higher
demands on the device memory bandwidth. To
avoid this a simple and efficient Simple Tabu List
(STL) with constant algorithmic complexity is proposed. Access to the STL is performed like an
access to a circular buffer. Its size is fixed and is
equal to |tabuList|. In our case, the STL stores
swap moves. Each swap(u, v) is stored to the STL
as a pair of swapped indices (u, v). A special value
is used for an empty move, e.g. swap(0, 0). At
each iteration of the TS algorithm one move is
added (see Algorithm 3) and the oldest one is removed if the STL is full.
During the evaluation of W , precedence relations and resource constraints have to be taken
into account to calculate activities start times si
and Cmax . The precedence earliest start time esprec
i
of activity i can be calculated as max∀(j,i)∈E (sj + dj ),
where j are predecessors of activity i. The resources earliest start time esres
can be computed
i
using either a time-indexed or capacity-indexed resources evaluation algorithm. The capacity-indexed
algorithm is a completely new approach to the
best of our knowledge, whereas the time-indexed
algorithm is well-known [15]. The names of the
algorithms were selected with respect to the indexed unit of a resource state array. According
to a heuristic the probable faster resources evaluation algorithm is selected in the schedule evaluation procedure. Having considered both precedence and resource constraints the final earliest
start time is esi = max(esprec
, esres
i ).
i
Algorithm 2 Check if a move is in the STL.
Require: tabuCache − STL cache.
Require: (u, v) − Swap move indices.
Ensure: It returns true if the move is in the STL, otherwise false.
1: return tabuCache[u, v]
The Tabu Cache (TC) was proposed for effective checking if the move is in the STL. It is illustrated in Algorithm 2. Checking if a swap is in the
STL occurs much more often than adding a new
move since a move is added only once per iteration and check if the move is in the STL occurs for
every neighborhood schedule. The TC is implemented as a 2-dimensional N × N boolean array
which is synchronized with the STL. A check if a
move is in the STL requires one read operation,
thus, the required memory bandwidth is very low.
It is obvious that a check if the move is in the STL
has O(1) algorithmic complexity.
5.1. Capacity-indexed resources evaluation
5.1.1. Required Data Structures
The most difficult part during the project makespan evaluation is computation of the activities’
start times with respect to the resource capacities.
In our approach, the evaluation of resources requires one array ck with length Rk per resource k.
Value ck [Rk − ri,k ] corresponds to the earliest resource start time of activity i with resource requirement ri,k > 0 on resource k. At the start of
the evaluation, all the resources arrays are set to
zeros. After that, activities are added one by one
to a schedule according to W and arrays are updated with respect to the activity requirements
and precedences. The resources arrays are ordered descendly, i.e. ck [Rk − l] ≤ ck [Rk − l −
1] | ∀l ∈ {1, . . . , Rk − 1}. The state of resources
is represented as a set C = {c0 , . . . , cM −1 }.
Algorithm 3 Add a move to the STL.
Require: tabuList − Fixed size array.
Require: tabuCache − STL cache.
Require: writeIndex − Current write position.
Require: (u, v) − Swap move indices.
Ensure: Add move to STL and update TC.
1: (uold , vold ) = tabuList[writeIndex ]
2: tabuCache[uold , vold ] = false
3: tabuList[writeIndex ]= (u, v)
4: tabuCache[u, v] = true
5: writeIndex = (writeIndex + 1) % |tabuList|
5.1.2. The Earliest Resources Start Time
∈ N of activResource earliest start time esres
i
ity i with respect to an occupation of resources
can be calculated using Equation (7). It is guaranteed that resources are not overloaded if activity i start time si ≥ esres
i . Final activity start
7
time si can be more delayed due to the precedence
relations.
esres
=
i
max ck [Rk − ri,k ]
k∈{0,...,M −1}: ri,k >0
0
∃ri,k > 0
to be decremented to zero (lines 2, 13, 19) for each
resource k.
It is performed by setting ri,k elements of ck
to the activity finish time si + di after the last
ck ≥ si + di . Until the variable requiredEffort is
zero, the shifted (right shift about ri,k ) copy of
the original resource array ck (original values are
stored in copy auxiliary variable) is made. The
complexity of the algorithm is O(M · Rmax ).
(7)
otherwise
5.1.3. Update of the Resources Arrays
If activity i is added into the schedule, resources arrays C have to be updated by Algorithm 4. Each resource array ck is updated indi-
resource availability - ck
si
Algorithm 4 Method updates state of resources after
adding activity i.
Require: ri,k , di , C, R
Require: copy − Auxiliary array with length Rmax ).
Require: si − Scheduled start time of activity i.
Ensure: Update C - activity i is added.
1: for (k = 0; k < M ; ++k) do
2:
requiredEffort = ri,k · di
3:
if (requiredEffort > 0) then
4:
resIdx = 0; copyIdx = 0
5:
newTime = si + di
6:
while (requiredEffort > 0 AND resIdx < Rk )
do
7:
if (ck [resIdx ] < newTime) then
8:
if (copyIdx ≥ ri,k ) then
9:
newTime = copy[copyIdx − ri,k ]
10:
end if
11:
timeDiff = newTime − max(ck [resIdx ], si )
12:
if (requiredEffort − timeDiff > 0) then
13:
requiredEffort -= timeDiff
14:
copy[copyIdx ++] = ck [resIdx ]
15:
ck [resIdx ] = newTime
16:
else
17:
ck [resIdx ] = max(ck [resIdx ], si )
18:
ck [resIdx ] += requiredEffort
19:
requiredEffort = 0
20:
end if
21:
end if
22:
resIdx = resIdx + 1
23:
end while
24:
end if
25: end for
si + di
7
+1
6
+1
5
Rmax
+3
4
+2
3
+2
activity
required
effort
2
9 units
1
4
5
6
7
8
9
10
resource earliest start time
Figure 4: An example of the resource state update.
The algorithm is illustrated on an example in
Figure 4. There is one resource with maximal
capacity 7. Added activity i requires 3 resource
units (i.e. ri,k = 3) and its duration di is 3. The
activity was scheduled at si = 5. The solid line
corresponds to the original resource state ck =
{7, 7, 5, 5, 5, 5, 4} and the dotted line corresponds
to the updated resource c0k = {8, 8, 8, 7, 7, 5, 4}.
Activity required effort is depicted by a square
with dashed border. The positive numbers between solid and dotted lines are effort contributions when old start time (solid line) will be changed
to the new start time (dotted line). It should be
noticed, that the sum of all contributions is the
requiredEffort for a given activity.
vidually (line 1). Value requiredEffort = ri,k · di
will be called Required Resource Effort. Activity
i can be added to the schedule if and only if each
resource is able to provide its Required Resource
Effort. In other words, variable requiredEffort has
8
5.2. Time-indexed resources evaluation
5.2.1. Required Data Structures
In the time-indexed evaluation algorithm the
state of each resource k is stored in array τk . Each
element τk [t] corresponds to the number of available resource units that resource k is able to provide at time t ∈ {0, . . . , UBCmax }, where UBCmax
is the upper boundPof the makespan which can be
calculated as e.g. ∀i∈V di . Each τk array has initialized all its elements to the Rk value before the
start of the evaluation. The state of all resources
will be denoted as T = {τ0 , . . . , τM −1 }.
5.2.3. Update of the Resources Arrays
The state of resources is updated as is shown
in Algorithm 6. Having scheduled activity i at si
the τk arrays have to be updated in the [si , si +
di ) interval. For each resource k, values in the
interval are decreased by ri,k units.
Algorithm 6 Updating of resources after adding activity i.
Require: di , T, ri,k
Require: si − Scheduled start time of activity i.
Ensure: It updates state of resources T .
for (k = 0; k < M − 1; ++k) do
for (t = si ; t < si + di ; ++t) do
τk [t] -= ri,k
end for
end for
5.2.2. The Earliest Resources Start Time
Algorithm 5 Algorithm calculates the earliest start time
of activity i.
Require: ri,k , di , R, UBCmax , T
Require: esprec
− The precedence earliest start time.
i
Ensure: Calculate the earliest start time esi of activity i.
1: loadTime = 0;
2: for (t = esprec
; t < UBCmax AND loadTime < di ;
i
++t) do
3:
sufficientCapacity = true
4:
for (k = 0; k < M − 1; ++k) do
5:
if (τk [t] < ri,k ) then
6:
loadTime = 0
7:
sufficientCapacity = false
8:
end if
9:
end for
10:
if (sufficientCapacity == true) then
11:
++loadTime
12:
end if
13: end for
14: return t − loadTime
5.3. Schedule Evaluation Procedure
The schedule evaluation procedure is shown
in Algorithm 7. Activities are read one by one
from the activities order W . For each activity wu ,
all its predecessors are found and the precedence
relations are used to update activity wu ’s precedence earliest start time esprec
wu ∈ N (see lines 3–6).
Then the resources restrictions are checked and
res
the start time is adjusted to swu = max(esprec
wu , eswu ).
Project makespan Cmax is the finish time of activAlgorithm 7 Complete schedule evaluation.
Require: W, C, T, E
Ensure: Calculate Cmax and the activities’ start times.
1: Cmax = 0
2: for (u = 0; u < N ; ++u) do
3:
esprec
wu = 0
4:
for all ((j, wu ) ∈ E) do
prec
5:
esprec
wu = max(eswu , sj + dj )
6:
end for
prec
7:
esres
wu = getEarliestResourcesTime(activity wu , eswu )
prec
res
8:
swu = max(eswu , eswu )
9:
updateResources(activity wu , swu )
10:
Mark current activity wu as scheduled.
11:
Cmax = max(Cmax , swu + dwu )
12: end for
13: return Cmax
The earliest start time of activity i can be calculated using Algorithm 5. In the algorithm, the
loadTime variable corresponds with the number
of consecutive time units in which resources are
able to meet resource requirements of activity i. If
loadTime = di then a time interval into which activity i can be scheduled was found. Having considered variable t as a finish time of a candidate
interval, the resulting interval is the first interval
[t − loadTime, t) ∩ N such that loadTime = di .
The final earliest start time is the lower endpoint
of the interval.
ity N − 1. As only feasible moves are allowed, an
infeasibility test of the resulting schedules is not
required.
9
5.4. Heuristic Selection of Resources Evaluation
Algorithms
Before the search is started on the GPU, the
probable faster resources evaluation algorithm is
heuristically selected by decision rules and the required resources arrays are allocated. To create
the rules, the JRip classifier from the Weka datamining tool [16] was learned using pre-calculated
attributes shown in Table 2.
Min. resource capacity:
Avg. resource capacity:
Max. resource capacity:
Avg. activity duration:
Avg. branch factor:
Critical path length:
Evaluation algorithm:
Min. resource capacity ≥ 29
true
TIME
false
Avg. resource capacity ≥ 29
Avg. branch factor ≥ 2.1
true
TIME
min Rk
∀k∈{0,...,M −1}
X
1
Rk
M
∀k∈{0,...,M −1}
false
Min. resource capacity ≥ 25
Max. resource capacity ≥ 42
true
TIME
max Rk
∀k∈{0,...,M −1}
X
1
di
N
∀i∈V
|E|
N
false
CAPACITY
Figure 5: An example of the decision tree.
see Section 2
CAPACITY/TIME
Table 2: Attributes used for learning.
Attribute “Evaluation algorithm” determines
the class, i.e. the time-indexed or capacity-indexed
evaluation algorithm, to which the classifier should
classify. As the final class dependends on the
hardware and instance parameters it is necessary
to determine the probable correct class by measuring — each evaluation algorithm was selected
for a small number of iterations and the faster
one was selected as the desired one. The resulting rules heuristically decide which of the two
algorithms should be more effective for a given
instance. The rules can be transformed into a
decision tree as is shown in Figure 5. Once the
rules are created they can be applied to other similar instances without any measuring overhead as
well. To show the effectivity and usefulness of
the heuristic the experiments were performed in
Section 7.
6. Parallel Tabu Search for CUDA platform
Our Parallel Tabu Search for GPU (PTSG) is
proposed with respect to the maximal degree of
parallelization since thousands of CUDA threads
10
are required to be fully loaded to exploit the graphics card power. In our approach, the parallelization is carried out in two ways. The first one
is a parallelization performed within the scope of
a block, for example the parallel filter (see Section 4.4), the parallel neighborhood evaluation,
and other parallel reductions. The second one is
a parallelization introduced by launching many
blocks on the multi-processors simultaneously.
The basic steps of the PTSG are described in
Figure 6. First of all, an instance is read and the
initial solutions are created in accordance with
Section 4.1. After that, every second solution
is improved by using the forward-backward improvement method. The method is iteratively
shaking a schedule from the left to the right in
order to make a resource profile straight as long
as the schedule is getting shorter. To get more details about the method, refer to the original article
by Li and Willis [17]. The created solutions are
copied into a working set, i.e. a set of shared solutions. The best solution in the working set will
be called the global best solution and its make∗
span will be denoted as Cmax
. Furthermore, the
block’s Tabu Lists and Tabu Caches are initialized and auxiliary arrays such as τk , and ck are
allocated. Having had prepared required datastructures, the host is ready to launch the kernel.
In the GPU part, every block is an independent Tabu Search instance communicating with
the others through the global memory (see Section 6.1). At the beginning, every block reads
nication conditions are satisfied (see Section 6.1).
The search is stopped if the specified number of
∗
is equal to the
iterations was achieved or Cmax
length of a critical path.
After the termination of the kernel, the best
global solution is copied from the global memory
to the host memory. The solution is printed and
all allocated data-structures are freed.
create initial solutions
apply forward-backward improvement method for every second solution
CPU
6.1. Co-operation Among CUDA Blocks and Iterations Distribution
To assure the high quality solutions, the cooperation among Tabu Search instances is accomplished by exchanging solutions through the working set F that has a fixed number of solutions
|F |. Each solution k ∈ F consists of the ork
, the tabu
der of activities W k , makespan Cmax
k
list and iterations counter IC . The solutions exchange takes place if the last read solution has not
been improved for more than Iassigned iterations
or the block found an improvement of the last
read solution. The block writes the best found
solution to F if it improves the last read solution
and reads the next solution from F . Since the
working set could be accessed by many blocks at
the same time, it is necessary to use read/write
locks in order to maintain data integrity. The
co-operation among Tabu Search instances was
inspired by James et al. [9].
After the block has read a solution from the
working set, it is checked whether the solution
was not read more than Φmax times without being
improved. If it is the case, a small number Φsteps
of random feasible swaps is applied to randomize
the read solution — diversification. After that,
the read solution k ∈ F has assigned the number
of iterations Iassigned according to the following
equation.
initialize and fill GPU structures
launch kernel
read an initial solution
generate Nreduced and filter
out all infeasible moves
GPU
(a block)
main loop
evaluate the neighborhood
and select the best move m∗
apply m∗ and add it to STL
no
exchange data?
yes
co-operation
with other blocks
no
stop condition?
yes
load data to CPU
CPU
print the best GPU solution
Figure 6: Parallel Tabu Search for the CUDA platform.
an initial solution from the working set. After
that, the search is started for a specified number
of iterations of the main loop. In the main loop,
the neighborhood is generated, evaluated and the
best move m∗ is selected, applied and added into
the STL. Move m∗ leads to the best criterion improvement or to the smallest criterion deterioration. This move cannot be in the STL with one
exception — the move leads to the global best solution. At the end of an iteration the solutions are
exchanged through the working set if the commu-
quality
}|
{
k
Cmax
−100
−1
∗
quantity
Iassigned
$ z }| {
1 Iblock
=
5 Itotal
z
Cmax
0.8e
z
intactness
}|
{ !%
IC k
−4
+ 0.2e
11
Iblock
(8)
Iblock is the number of iterations assigned to
each Tabu Search instance and Itotal is the total
number of iterations calculated as Iblock B, where
B is the number of launched blocks. The part
denoted as quantity corresponds to the maximal
number of iterations which can be assigned to
read solution k. It is ensured, that at least 5 solutions are read from the working set by each block.
The quality part takes into account the quality of
read solution k. It is obvious that the high quality
solutions are preferred to poor ones — intensification. And the last part intactness guarantees
that each solution k ∈ F has been given some
iterations to prove the quality.
CUDA toolkit (version 5.0.35) and Microsoft Visual Studio 2010.
The sequential CPU version of the algorithm
corresponds to one Tabu Search instance with the
exception that solutions are not interchanged (|F | =
1 and B = 1). Instead of using the selection
heuristic (see Section 5.4) the faster evaluation
algorithm was selected dynamically by periodic
measuring every 1000 iterations. The parallel CPU
version differs from the sequential version in the
neighborhood evaluation. The feasible schedules
in the neighborhood are divided among CPU threads
to reduce evaluation time. Both the CPU and
GPU versions were fully optimized with respect
to memory access patterns and hardware architecture (cache sizes). To fully saturate the GPU the
maximal number of available registers per CUDA
thread was limited to 32 due to possibility to
launch 4 blocks on a multiprocessor at once (altogether 16 blocks on the GPU), where each block
has 512 CUDA threads.
6.2. Memory Model
The placement of the data-structures is a crucial task highly influencing the effectiveness of the
GPU program, therefore, each decision should be
considered thoroughly with respect to the access
pattern, required bandwidth and data visibility
(local or shared data). In the shared memory current block order Wblock , durations of activities D,
and auxiliary arrays are stored. Although D is
a read-only array which could be located in the
constants memory, it was moved to the shared
memory due to the higher bandwidth. The texture memory is used for storing read-only data as
ri,k values and predecessors of the activities. In
the local memory, private data-structures of each
thread are located, i.e. resources arrays ck , τk ,
and start times of activities S. The long latency
of the memory is compensated by using a partial coalescing since the arrays are often accessed
at the same relative indices as the majority of
threads evaluate similar schedules (Wblock + swap
move). Finally, the global memory is employed to
store the working set F .
J30
J60
J90 J120
N
30+2 60+2 90+2 120+2
M
4
|dataSet|
480
480
480
600
δ
30
60
60
60
|tabuList|
60
250
600
800
Φsteps
20
Φmax
3
|F |
16
Table 3: PTSG parameters and data-sets information.
To evaluate the performance and the quality of
resulting solutions the benchmark using the wellknown J30, J60, J90 and J120 data-sets was performed. The number of instances in a data-set
will be denoted as |dataSet|. The selected PTSG
parameters and data-sets information are stated
in Table 3.
The results for the J30 data-set are shown in
Tables 4 and 6. The CPM dev and OPT dev values are the average percentage distance from the
critical path length and the average percentage
distance from the optimal makespan respectively.
Best sol states the number of optimal solutions
which have been proved to be optimal according
7. Experimental Results
Experiments were performed on the AMD Phenom(tm) II X4 945 server (4 cores, 8 GB memory) equipped with a mid-range Nvidia Geforce
GTX 650 Ti (1 GB, 768 cuda cores, 4 multiprocessors) graphics card. The testing environment
was the Windows Server 2008 with an installed
12
CPU
OPT dev
0.04
–
Itotal CPM dev
10000
13.43
20000
–
Best sol
471
–
CPM dev
13.41
13.38
GPU
OPT dev
0.02
0.01
Best sol
473
478
Table 4: Quality of solutions — J30.
Itotal CPM dev
10000
11.13
20000
–
30000
–
50000
–
CPU
UB dev
0.51
–
–
–
Best sol
380
–
–
–
CPM dev
11.22
11.08
10.99
10.91
GPU
UB dev
0.57
0.47
0.41
0.36
Best sol
375
388
394
394
Table 5: Quality of solutions — J60.
CPU seq.
CPU par.
GPU
GPU
Itotal Comp time
10000
1255
10000
343
10000
176
20000
306
Sched sec
126400
478300
985543
1120900
CPU seq.
CPU par.
GPU
GPU
GPU
GPU
Speedup
1.00
3.65
7.12
–
Table 6: Performance comparison — J30.
Itotal CPM dev
10000
10.81
20000
–
30000
–
50000
–
CPU
UB dev
0.92
–
–
–
Itotal Comp time
10000
7094
10000
1732
10000
257
20000
485
30000
709
50000
1164
Sched sec
59700
248700
1733800
1818600
1861900
1879400
Speedup
1.00
4.10
27.60
–
–
–
Table 7: Performance comparison — J60.
Best sol
367
–
–
–
CPM dev
11.04
10.82
10.73
10.56
GPU
UB dev
1.09
0.93
0.86
0.74
Best sol
365
371
373
375
Table 8: Quality of solutions — J90.
Itotal CPM dev
10000
33.41
20000
–
30000
–
50000
–
CPU
UB dev
2.70
–
–
–
Best sol
215
–
–
–
CPM dev
34.67
34.04
33.66
33.54
GPU
UB dev
3.50
3.11
2.85
2.76
Best sol
194
208
213
222
Table 9: Quality of solutions — J120.
CPU seq.
CPU par.
GPU
GPU
GPU
GPU
Itotal Comp time
10000
20294
10000
5001
10000
475
20000
923
30000
1348
50000
2221
Sched sec
36000
148300
1599600
1632000
1660700
1674000
Speedup
1.00
4.06
42.70
–
–
–
CPU seq.
CPU par.
GPU
GPU
GPU
GPU
Table 10: Performance comparison — J90.
Itotal Comp time
10000
148170
10000
35812
10000
2938
20000
5742
30000
8513
50000
14160
Sched sec
25700
107200
1340400
1351900
1353300
1347800
Speedup
1.00
4.14
50.40
–
–
–
Table 11: Performance comparison — J120.
13
Algorithm and reference
Genetic Algorithm - Gonçalves et al. [18]
This work - Nvidia Geforce GTX 650 Ti
This work - AMD Phenom(tm) II X4 945
CARA algorithm - Valls et al. [19]
Ant Colony Optimization - Zhou et al. [20]
Tabu Search - Artigues et al. [21]
Simulated Annealing - Bouleimen and Lecocq [22]
J30
13.38
13.38
13.43
13.46
-
CPM dev
J60
J90 J120
10.49
30.08
10.91 10.56 33.54
11.13 10.81 33.41
11.45 11.12 34.53
11.42
35.11
12.05
36.16
11.90
37.68
Table 12: Comparison with other heuristics.
to the results in the PSPLIB homepage — http:
//www.om-db.wi.tum.de/psplib/. Comp time
is the total run-time stated in seconds and the
Sched sec is the number of evaluated schedules
per second. It is obvious that the GPU version
is able to achieve a similar quality of solutions in
terms of CPM dev as the CPU version. Having
had Itotal doubled, the GPU version found 478
optimal solutions from the 480 solutions in the
data-set. From the performance point of view Table 6 reveals a significant improvement in computational time if parallelization is performed. For
example, the parallel CPU version is 3.65 times
faster than the sequential CPU version and the
GPU is almost 2 times faster than the parallel
CPU version. If Itotal is increased to 20000 the
GPU is still slightly faster and achieves better
quality solutions.
For the J60 data-set the results are shown in
Tables 5 and 7, where UB dev is the average percentage distance from the best currently known
upper bounds. The CPU version gives slightly
better solutions for 10000 iterations, but on the
other hand if the GPU is given 20000 iterations
the quality of solutions is comparable with the
CPU version and the GPU is still 3.56 times faster
than the parallel CPU version. The lower quality
of GPU solutions for the same Itotal is probably
caused by wasting work when many Parallel Tabu
Search instances have read the same solution from
the working set and only one writes the best improvement. It can be noted, that the parallel CPU
version is more than 4 times faster than the sequential one. The reason of that is either better
cache utilization or the AMD True Core Scalability technology.
The results in Tables 8 and 10 for the J90 dataset show that the GPU is better utilized for bigger instances and the GPU is more than 10 times
faster than the parallel CPU version for the same
number of iterations. The same quality of solutions is achieved 5.4 times faster on the GPU.
Results for the J120 data-set are shown in Tables 9 and 11. It can be noted that the quality
of GPU solutions is substantially lower for 10000
iterations. The GPU requires about 50000 iterations to achieve the quality of the CPU solutions. On the other hand, the GPU is able to
compete with the CPU since 50000 iterations is
performed 2.5 times faster than 10000 iterations
for the parallel CPU version. The GPU evaluates more than one million schedules per second,
whereas the CPU evaluates one hundred thousand.
The quality of the solutions is compared with
the existing solutions for the RCPSP in Table 12.
Our proposed PTSG outperforms other Tabu Search
implementations with respect to the quality of
solutions. For example, Artigues’ Tabu Search
[21] has been given at least 11000 iterations for
the J120 data-set and achieves 36.16 % CPM dev.
Having had 10000 iterations the proposed PTSG
reaches 33.41 % and 34.67 % for the CPU and
GPU respectively. In addition, the proposed PTSG
can be just as good as other heuristic approaches
like Ant Colony Optimization and Simulated Annealing. On the other hand, the state of the art
random-key genetic algorithms give even better
solutions than the PTSG.
From the performance point of view it is difficult to compare since the different algorithms and
hardware architectures were used for experiments.
14
dependent on the characteristics of instances and
it cannot be generally determined which evaluation algorithm is faster. The capacity-indexed
evaluation algorithm is usually faster for long schedules with low resource capacities in contrast to the
time-indexed algorithm which usually performs
better for short schedules with high resource capacities.
For example, Artigues’s Tabu Search requires 67 s
per J120 instance on average. The testing configuration was not stated. The PTSG requires 4.9 s
(10000 iterations) on the mid-range GPU with the
substantially higher quality of solutions. The genetic algorithm by Gonçalves et al. [18] takes
180 s per J120 instance on average on the Intel
Core 2 Duo 2.4 GHz processor.
7.1. Evaluation of the Selection Heuristic
The heuristic (see Section 5.4) is using the
JRip classifier from the Weka data mining tool [16]
to decide which resources evaluation algorithm
should be faster. To get data for the learning,
the Progen generator [23] was used to generate
4 data-sets with 30, 60, 90, and 120 activities
respectively. The parameters of the generated
data-sets were set the same as for J30, J60, J90,
and J120 data-sets with the exception that different random seeds were used. For each generated data-set the classifier was learned using
weka.classifiers.rules.JRip -F 3 -N 2.0
-O 10 -S 0 command and tested on the corresponding standard data-set with the same number of activities. The achieved results in Table 13
reveal that the accuracy is decreasing with the
number of activities. The reason for this behavior
can be the smaller ratio of the resources evaluation time to the total run-time.
J30
72.3 %
J60
85.8 %
J90
91.9 %
time-indexed
capacity-indexed
heuristic
J30 J60 J90 J120
1.02 1.10 1.09 1.23
1.27 1.34 1.96 1.73
1
1
1
1
Table 14: Effect of the heuristic on the PTSG performance.
7.2. Demonstration of Convergence
To demonstrate that co-operation among blocks
is beneficial the graph of convergency (in Figure 7)
was created for j1206_4.sm instance. It can be
seen that the quality of solutions is getting better
with the increasing number of launched blocks,
therefore, it is obvious that co-operation leads to
the better solutions. To ensure the smoothness of
J120
96.3 %
Table 13: Accuracy of the Selection Heuristic — the percentage of correctly classified.
To prove that the proposed heuristic also improves the PTSG performance the run-time was
measured for each evaluation algorithm and normalized with respect to the reference run-time, i.e.
the run-time achieved by using the heuristic. The
results in Table 14 show that the heuristic accelerates the PTSG up to 2 times and its effect is decreasing as the evaluation of schedules becomes a
less time-consuming part of the PTSG. The timeindexed algorithm seems to be faster than the
capacity-indexed algorithm on the standard datasets. On the other hand, the achieved speedup is
Figure 7: Graph of convergence for the GPU version.
the graph each point was averaged over 50 measurements.
8. Conclusion
The first known GPU algorithm dealing with
the Resource Constrained Project Scheduling Prob15
lem has been proposed. The performed experiments on the standard benchmark instances reveal the merits of the proposed solution. The
achieved quality of solutions is very good and outperforms the other Tabu Search implementations
to the best of our knowledge. In addition to this,
the GPU algorithm design has proved to be very
effective since the mid-range GPU was substantially faster than the optimized parallel CPU version. The Nvidia Geforce GTX 650 Ti GPU is
able to evaluate more than one million schedules
per second for the J120 data-set on average. The
achieved performance boost could not be reached
without effective structures and auxiliary algorithms. The Simple Tabu List implementation is
adapted to the features of the GPU, the capacityindexed evaluation algorithm was proposed and
many parallel reductions were applied. In addition to this, the homogeneous model reduces the
required communication bandwidth between the
CPU and the GPU.
In spite of the fact that GPUs are not primarily designed for solving combinatorial problems
the rising interest about these solutions can be
seen [24]. The reason for this is the high computational power of graphics cards and the relatively
user friendly programming API that the CUDA
offers. So it can be expected that GPUs will be
more and more used in operations research in the
future.
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
References
[1] N. Fu, H. C. Lau, P. Varakantham, F. Xiao, Robust
Local Search for Solving RCPSP/max with Durational Uncertainty, J. Artif. Int. Res. 43 (1) (2012)
43–86.
[2] J. Blazewicz, J. Lenstra, A. Kan, Scheduling subject
to resource constraints: classification and complexity,
Discrete Applied Mathematics 5 (1) (1983) 11–24.
[3] A. S. Chaleshtarti, S. Shadrokh, Branch and
Bound Algorithms for Resource Constrained Project
Scheduling Problem Subject to Cumulative Resources, in: Proceedings of the 2011 International
Conference on Information Management, Innovation
Management and Industrial Engineering - Volume 01,
ICIII ’11, IEEE Computer Society, Washington, DC,
USA, 2011, pp. 147–152.
[4] A. Delvacq, P. Delisle, M. Gravel, M. Krajecki, Parallel Ant Colony Optimization on Graphics Processing
[15]
[16]
[17]
[18]
16
Units, Journal of Parallel and Distributed Computing
73 (1) (2013) 52–61.
M. Czapiński, An effective Parallel Multistart Tabu
Search for Quadratic Assignment Problem on CUDA
platform, Journal of Parallel and Distributed Computing (2012).
W. Božejko, Z. Hejducki, M. Uchroński, M. Wodecki,
Solving the Flexible Job Shop Problem on MultiGPU, Proceedings of the International Conference on
Computational Science, ICCS 2012 9 (0) (2012) 2020–
2023.
F. Glover, Future Paths for Integer Programming and
Links to Artificial Intelligence, Comput. Oper. Res.
13 (5) (1986) 533–549.
M. Gendreau, An Introduction to Tabu Search, in:
F. Glover, G. Kochenberger (Eds.), Handbook of
Metaheuristics, Vol. 57 of International Series in Operations Research & Management Science, Springer
New York, 2003, pp. 37–54.
T. James, C. Rego, F. Glover, A cooperative parallel
tabu search algorithm for the quadratic assignment
problem, European Journal of Operational Research
195 (3) (2009) 810–826.
M. Czapiński, S. Barnes, Tabu Search with two approaches to parallel flowshop evaluation on CUDA
platform, J. Parallel Distrib. Comput. 71 (2011) 802–
811.
T. Zajı́ček, P. Šůcha, Accelerating a Flow Shop
Scheduling Algorithm on the GPU, Workshop on
Models and Algorithms for Planning and Scheduling
Problems (MAPSP).
J. Hofmann, S. Limmer, D. Fey, Performance investigations of genetic algorithms on graphics cards,
Swarm and Evolutionary Computation (2013).
V. Boyer, D. El-Baz, M. Elkihel, Solving knapsack
problems on gpu, Computers & Operations Research
39 (1) (2012) 42–47.
P. Brucker, A. Drexl, R. Möhring, K. Neumann,
E. Pesch, Resource-constrained project scheduling:
Notation, classification, models, and methods, European Journal of Operational Research 112 (1) (1999)
3–41.
J. E. Kelley, 1963. The critical-path method:
Resources planning and scheduling. In: Muth,
J.F., Thompson, G.L. (Eds.), Industrial Scheduling.
Prentice-Hall, Englewood Cliffs, NJ, pp. 347–365.
M. Hall, E. Frank, G. Holmes, B. Pfahringer,
P. Reutemann, I. H. Witten, The WEKA Data Mining Software: An Update, SIGKDD Explor. Newsl.
11 (1) (2009) 10–18.
K. Li, R. Willis, An iterative scheduling technique
for resource-constrained project scheduling, European Journal of Operational Research 56 (3) (1992)
370–379.
J. F. Gonçalves, M. G. Resende, J. J. Mendes, A Biased Random-Key Genetic Algorithm with Forward-
[19]
[20]
[21]
[22]
[23]
[24]
Backward Improvement for the Resource Constrained
Project Scheduling Problem, Journal of Heuristics
17 (5) (2011) 467–486.
V. Valls, S. Quintanilla, F. Ballestı́n, Resourceconstrained project scheduling: A critical activity reordering heuristic, European Journal of Operational
Research 149 (2) (2003) 282–301.
L. Zhou, D. Wang, W. Peng, An ACO for Solving
RCPSP, in: Computer Science and Computational
Technology, 2008. ISCSCT ’08. International Symposium on, Vol. 2, 2008, pp. 250–253.
C. Artigues, P. Michelon, S. Reusser, Insertion techniques for static and dynamic resource-constrained
project scheduling, European Journal of Operational
Research 149 (2) (2003) 249–267.
K. Bouleimen, H. Lecocq, A new efficient simulated
annealing algorithm for the resource-constrained
project scheduling problem and its multiple mode
version, European Journal of Operational Research
149 (2) (2003) 268–281.
R. Kolisch, C. Schwindt, A. Sprecher, Benchmark Instances for Project Scheduling Problems, in: Handbook on Recent Advances in Project Scheduling,
Kluwer, 1998, pp. 197–212.
A. R. Brodtkorb, T. R. Hagen, M. L. Sætra, Graphics
processing unit (GPU) programming strategies and
trends in GPU computing, Journal of Parallel and
Distributed Computing 73 (1) (2013) 4–13.
17
| 2cs.AI
|
Optimal Resource Allocation in Distributed
Broadband Wireless Communication Systems
Yao Yao, Mustafa Mehmet-Ali, Shahin Vakilinia
Department of Electrical & Computer Engineering, Concordia University
Montreal, Canada
E-mail: {y_yao11,s_vakili}@encs.concordia.ca, [email protected],
Abstract—This paper is concerned with optimization of
distributed broadband wireless communication (BWC) systems.
BWC systems contain a distributed antenna system (DAS)
connected to a base station with optical fiber. Distributed BWC
systems have been proposed as a solution to the power constraint
problem in traditional cellular networks. So far, the research on
BWC systems have advanced on two separate tracks, design of
the system to meet the quality of service requirements (QoS) and
optimization of location of the DAS. In this paper, we consider a
combined optimization of BWC systems. We consider uplink
communications in distributed BWC systems with multiple levels
of priority traffic with arrivals and departures forming renewal
processes. We develop an analysis that determines packet delay
violation probability for each priority level as a function of the
outage probability of the DAS through the application of results
from renewal theory. Then, we determine the optimal locations of
the antennas that minimize the antenna outage probability. We
also study the trade off between the packet delay violation
probability and packet loss probability. This work will be helpful
in the designing of the distributed BWC systems.
Index Terms— Queuing delay, multiple levels of priority
traffic, distributed antenna system (DAS), outage probability,
antenna placement.
I. INTRODUCTION
The future services in wireless networks will be requiring
higher transmission rates. This rate is expected to rise to
1Gbits/s for the next generation communication systems
according to the objective of IMT-Advanced (International
Mobile Telecommunications) system, which is set by ITU-R
(International
Telecommunication
UnionRadiocommunication Standardization Sector) [1-3]. However,
the constraint on the transmit power limits the transmission
rate, especially in the uplink communications from user to
base station. One promising solution to this problem is the
distributed broadband wireless communications (BWC)
systems [2].
A distributed BWC system is made up of a distributed
antenna system (DAS) and the radio over fiber (RoF)
technology [2]. In DAS, antennas are placed at geographically
separate locations in the cell [2], which is a contrary to the so
called centralized antenna system (CAS) that having an
antenna set at the center of a cell. The RoF technology, which
is very reliable and has very small delay, is responsible for
providing communication between these antennas and a
central processor where they are jointly processed [2]. In this
way, a user is very likely to have an antenna nearby compared
to CAS, which will in turn reduce the transmission power
requirement of that user. What’s more, it’s possible to place
many distributed antennas in each cell due to the relatively
low cost of distributed antennas [4].
By adopting DAS, a BWC system can solve the power
constraint problem naturally instead of shrinking the cell size
as in conventional CAS, which results in larger overhead and
delay due to higher frequency of handovers between cells.
There has been a number of research works on distributed
BWC systems. These work have dealt with two main
problems, which are determining the antenna set that meet
QoS metrics such as delay and packet loss and the other
optimal placement of the antennas.
[5] considers the downlink transmission, from base station
to the user, and assumes that the central server at the base
station maintains a separate queue for each of the users. This
work considers selection of a subset of the available
distributed antennas such that the probability of packet
queuing delay is less than a threshold. [6] considers uplink
transmission in a distributed BWC system. Again, the
objective has been selection of a subset of distributed antennas
at each user to keep packet loss probability below a threshold
value. In both [5] and [6], locations of the antennas are fixed
and the objective function has not been optimized with respect
to (wrt) the location of the antennas.
Optimal placement of antennas has been considered in other
works but independent of QoS metrics. In [4, 7], the objective
has been to optimize the sum-rate uplink capacity of a single
cell with multiple users. It is assumed that the antennas are
placed on a circle centered at the cell center and their locations
on the circle are uniformly distributed independent of each
other. The optimal radius of the antenna circle has been
determined, however, this work is more appropriate to the
CDMA systems since all the users in the cell will be
transmitting simultaneously. Further, the paper considers the
effects of inter-cell interference only by simulation.
In [8], the optimal location of antennas in a cellular setting
has been studied for the downlink transmission based on the
performance metrics of capacity and power efficiency. This
work takes the inter-cell interference into account. Though no
closed form results are obtained, their numerical results show
that for some certain cases, the optimal layout consists of
placement of one antenna at center and remaining ones on a
circle around it, and that circle shrinks as the interference
coefficient increases. This work does not provide any results
on the positions of the antennas on the circle.
In this paper, we consider the uplink communications and
assume that each user has multiple levels of priority traffic
Fig. 1.
Topology of the distributed BWC system which has
a cellular network architecture
with different QoS requirements. We determine the packet
delay violation probability through the use of results from
renewal theory for each type of traffic as a function of outage
probability. Then, we determine the optimal location of
antennas that minimizes the antenna outage probability. We
note that our work is more general compared to [5, 6], because
it considers multiple types of traffic with different QoS
requirements. In relation to optimal placement of antennas,
our work is closer to that in [8], but we consider the uplink as
opposed to downlink communications, which is more critical
due to limited transmit power of the users.
The outline of the remainder of the paper is as follows.
Section Ⅱ. describes our system model. Section Ⅲ presents
the queuing delay analysis for multiple types of traffic flows.
Section Ⅳ gives the application of these results to a system
with two types of traffic flows. Section V. extends the
application to a system with four types of traffic flows. Next,
section VI. presents the work on the optimal placement of the
antennas. Section VII presents the numerical and simulation
results regarding the analysis. And finally section VIII gives
the conclusions of the paper.
II. SYSTEM MODEL
A. Network Topology
We consider a cellular network architecture with distributed
antenna system. Each cell together with its neighbors are
referred to as a cluster. The cells in a cluster will be numbered
as 𝐴𝑗 , 0≤j≤F-1, where F is the cluster size. 𝐴0 will denote
the cell at the center of the cluster and it will be referred as the
target cell. Fig. 1 shows an example network with a cluster of
seven cells. Each cell contains a central processor and M
distributed antennas, which are placed at different
geographical locations and are linked to the central processor
through RoF technology. In the figure only the antennas in the
target cell 𝐴0 have been shown to prevent crowding, however,
each of the other cells also contains M distributed antennas.
It will be assumed that all the antennas have the same height
𝒽, and the users are all at the ground level. In the target cell,
locations of the M antennas wrt the cell center will be denoted
by (𝐿𝑚 , 𝛩𝑚 , 𝒽) in polar coordinates, for 1≤m≤M. We
number the antennas according to their increasing polar angles,
thus, 𝜃𝑚 > 𝜃𝑚−1 . Define antennas location vector 𝑳 =
((𝐿1 , 𝛩1 , 𝒽), (𝐿2 , 𝛩2 , 𝒽), … (𝐿𝑀 , 𝛩𝑀 , 𝒽))
B. Frequency Reuse Model
We will assume that all the frequencies will be available in
every cell, thus the reuse factor will be one as in [8]. The
available spectrum will be divided into a number of channels
and each user will be assigned a single channel at any time.
We will also assume that the system is saturated, so that all the
channels will always be busy, and the users using the same
channel in the neighboring cells will be interfering with each
other. This corresponds to the worst case scenario of
co-channel interference which is the major cause of an outage
in a cellular system [9]. From Fig. 1, a user in the target cell
will be considered as a target user and the users in the
neighboring cells using the same channel are considered as the
interferers.
Thus there will be a single user in each cell using the same
channel in a cluster. Let user i refer to the user in cell 𝐴i , who
is using a particular channel in the cluster. We will let
(ℓ𝑖 , 𝜃𝑖 , 0) denote the location of user i in polar coordinates
relative to the center of its home cell and (𝑥𝑖 , 𝑦𝑖 , 0) denote its
location in Cartesian coordinates relative to the center of cell
𝐴0 . Then, the latter may be expressed in terms of the former as
follows,
(𝑥𝑖 , 𝑦𝑖 , 0) = (𝑥𝑖𝐶 + ℓ𝑖 𝑐𝑜𝑠 𝜃𝑖 , 𝑦𝑖𝐶 +ℓ𝑖 𝑠𝑖𝑛 𝜃𝑖 , 0)for 0≤i ≤F-1.
C. Transmission Model
The time-axis is slotted and the transmission of a packet
always starts at the beginning of a slot and it takes one slot. A
user will broadcast its packet which will be received by the
antennas in its cell, the received signals will be locally
decoded and the results will be forwarded to the central
processor through fiber lines, respectively. If at least one of
the antennas can decode the packet successfully, the central
processor will receive the transmitted packet correctly. On the
other hand, if none of the antennas is able to decode the packet
successfully, then the central processor will drop this packet or
ask for retransmissions, depending on the type of the packet.
III. QUEUING DELAY
In this section, we will determine the queuing delay bounds
for a user with multiple types of traffic with different QoS
requirements. We will assume that a user has N types of traffic
flows, numbered as 1≤n≤N. The packets of flows are stored
in separate queues. Each traffic flow is assigned a priority
level, which increases with decreasing flow number. A packet
of a traffic flow is only served if the queues of higher priority
traffic flows are empty. Let 𝑥𝑛 , 𝑦𝑛 denote independent and
identically distributed inter-arrival time and service time of the
packets of traffic flow n respectively, if the system was
serving only this traffic flow. Let 𝜇𝑥𝑛 , 𝜎𝑥2𝑛 and 𝜇𝑦𝑛 , 𝜎𝑦2𝑛
denote the mean and variance of the random variables 𝑥𝑛 , 𝑦𝑛
respectively. We note that the service time of a packet begins
when it reaches to the head of its queue and completed either
following its successful transmission or discarding by the
system.
In this section, we will determine the queuing delay bounds
of packets of different flows. We will use the delay bound
violation probability from the theory of effective bandwidth in
our analysis [10, 11]. The same metric had also been used in
[5]. The delay-bound violation probability is defined as the
probability that the packet delay exceeds a certain value
𝑛
𝑃𝑟𝑜𝑏(𝐷𝑛 > 𝐷𝑡ℎ
)
(1)
𝑛
for the traffic flow n, where 𝐷𝑛 and 𝐷𝑡ℎ
represent the
queuing delay and a queuing delay threshold respectively. The
delay bound is determined through the utilization of energy
function, which is defined as the asymptotic log moment
generating function of arrival and service processes [10].
Initially, we will assume that the system is operating with a
single type of traffic, 𝑛𝑡ℎ traffic flow, and later on the results
will be extended to multiple types of traffic. Let 𝐴𝑛 (𝑡)
denote the number of packet arrivals to the queue during the
time interval [0, t). Defining 𝐶𝑛 (t) as the number of
departures from the queue during the interval [0, t) assuming
that it is under saturation. Let 𝛬𝑛 (𝜑) and 𝛤𝑛 (𝜑), (𝜑 > 0),
denote the energy functions of the arrival and service
processes [10],
1
𝛬𝑛 (𝜑) = 𝑙𝑖𝑚𝑡→∞ 𝑙𝑜𝑔 𝐸(𝑒 𝜑𝐴𝑛 (𝑡) )
Λ𝑛 (𝜑) =
𝜑
𝜇𝑥 𝑛
+
𝜑2 𝜎2𝑥𝑛
2𝜇3𝑥𝑛
𝛤𝑛 (𝜑) = 𝑙𝑖𝑚𝑡→∞ 𝑙𝑜𝑔 𝐸(𝑒 𝜑𝐶𝑛 (𝑡) )
(3)
𝑡
From [5], we have the delay-bound violation probability for
the packets of 𝑛𝑡ℎ traffic flow,
∗ )𝐷𝑛
𝑡ℎ
(4)
𝛤𝑛 (𝜑) =
,
𝜑
𝜇𝑦
+
𝑛
𝜑2 𝜎2𝑦
2𝜇3𝑦
𝑛
(5)
𝑛
Next, we will extend the results to a user with multiple types
of traffic. In this scenario, the 𝑛𝑡ℎ traffic flow will have
priority level n. The arrival process of this traffic flow will
remain as before but its service process will change because of
the services given to the packets of higher priority flows. Let
𝐶̃𝑛 (t) denote the number of departures from the 𝑛𝑡ℎ flow
during the interval [0, t),
𝐶̃𝑛 (𝑡) = 𝐶𝑛 (𝑡 − ∑𝑛−1
𝑗=1 𝑌𝑗 (𝑡))
(6)
𝐴𝑗 (𝑡)
∑𝑖=1
𝑦𝑗,𝑖
where,
𝑌𝑗 (𝑡) =
with 𝑦𝑗,𝑖 denoting the service time of the 𝑖 𝑡ℎ packet from the
𝑗𝑡ℎ flow. Then the above may be written as,
𝐶̃𝑛 (𝑡) = 𝐶𝑛 (𝑡) − ∑𝑛−1
𝑗=1 𝐶𝑛 (𝑌𝑗 (𝑡))
(7)
Next letting 𝛤̃𝑛 (𝜑) denote the energy function of the
service process 𝐶̃𝑛 (t),
𝑛−1
1
(𝑡)−𝜑 ∑𝑗=1 𝐶𝑛 (𝑌𝑗 (𝑡))
𝛤̃𝑛 (𝜑) = 𝑙𝑖𝑚𝑡→∞ 𝑙𝑜𝑔 𝐸 [𝑒 𝜑𝐶𝑛
]
𝑡
(8)
We will assume that the system is stable, thus none of the
queues are starving for service. Then, we have 𝑡 > ∑𝑛−1
𝑗=1 𝑌𝑗 (𝑡),
as a result, the random variables 𝑌𝑗 (𝑡) with different j will be
independent of each other. Thus,
1
−𝜑𝐶𝑛 (𝑌𝑗 (𝑡))
𝛤̃𝑛 (𝜑) = 𝑙𝑖𝑚𝑡→∞ 𝑙𝑜𝑔 {𝐸[𝑒 𝜑𝐶𝑛 (𝑡) ] ∏𝑛−1
]} (9)
𝑗=1 𝐸 [𝑒
𝑡
Expressing the above as sum of two logarithms and
substituting from (3),
(2)
𝑡
1
𝑛
𝑃𝑟𝑜𝑏(𝐷𝑛 > 𝐷𝑡ℎ
) ≈ 𝑒 −𝛬𝑛 (𝜑
infinity where 𝜇 and 𝜎 2 are the mean and variance of the
renewal interval [12]. The application of this result gives the
energy function of the arrival and service processes as follows,
1
𝑛−1
𝛤̃𝑛 (𝜑) = 𝛤𝑛 (𝜑) + 𝑙𝑖𝑚 {∑ 𝑙𝑜𝑔𝐸 [𝐸[𝑒−𝜑𝐶𝑛(𝑘) |𝑌𝑗 (𝑡)]]} (10)
𝑡→∞
𝑡
𝑗=1
Again, application of the central limit theorem for the
renewal processes to the conditional expectation gives,
𝜑2 𝜎2
𝑦𝑛
)
𝑦𝑛 2𝜇3
𝑦𝑛 ]
𝜑
𝑌𝑗 (𝑡)(−𝜇
𝐸 [𝐸[𝑒 −𝜑𝐶𝑛 (𝑘) |𝑌𝑗 (𝑡)]] = 𝐸 [𝑒
+
(11)
∗
where 𝜑 is the unique solution of 𝛬𝑛 (𝜑) + 𝛤𝑛 (−𝜑) = 0.
In general, it may not be possible to find the energy
functions defined in (2-3), which limits the applicability of
this method. In that case, we propose to use the asymptotic
central limit theorem for renewal processes in their
evaluations, which states that in a renewal process, the number
of renewal points asymptotically approaches to a Gaussian
distribution with mean
𝑡
𝜇
, and variance
𝜎2𝑡
𝜇3
as 𝑡 goes to
From its definition in (6), 𝑌𝑗 (𝑡) is a random sum with mean
and variance given by,
𝜇𝑌𝑗 (𝑡) =
𝜇𝑦𝑗 𝑡
𝜇 𝑥𝑗
,
𝜎𝑌2𝑗 (𝑡) = 𝜇𝑦2𝑗
𝜎𝑥2𝑗 𝑡
3
𝜇𝑥
𝑗
+
𝜎𝑦2𝑗 𝑡
𝜇 𝑥𝑗
(12)
From the general central limit theorem, 𝑌𝑗 (𝑡) approaches
to a normal distribution for large values of t with mean and
variance given in the above. Then, the expectation on the RHS
of (11) corresponds to the moment generating function of a
normal random variable, as a result (10) becomes,
𝜙2 𝜎𝑌2
𝑛−1
1
𝜙𝜇
+
∑ 𝑙𝑜𝑔𝑒 𝑌𝑗 (𝑡)
𝑡→∞ 𝑡
𝛤̃𝑛 (𝜑) = 𝛤𝑛 (𝜑) + 𝑙𝑖𝑚
𝑗 (𝑡)
2
𝑗=1
𝜙=−
{
Substituting from (5,12) in the above,
𝑛
2𝜇𝑦
𝑛
𝜇𝑥
𝑗
{
2
2 2
𝜑 𝜑 𝜎𝑦𝑛
𝜇𝑦
𝑛
𝜇𝑦
2
𝜎2𝑦𝑗
𝜎2𝑥𝑗
𝜑2 𝜎2𝑦
𝜑
𝜙
𝑗
𝛤̃𝑛 (𝜑) =
+ 3 𝑛 + ∑𝑛−1
+ (𝜇2𝑦 3 + )|
𝑗=1 𝜙
𝜇𝑦
|
𝑗
𝜇𝑥
𝑗
𝜇𝑥
𝑗
+
2𝜇3𝑦
𝑛
𝜑2 𝜎2
𝜑
𝑦𝑛
+
𝑦𝑛 2𝜇3
𝑦𝑛
𝜙=−𝜇
}
(13)
}
This completes the derivation of the energy function of the
service process of the 𝑛𝑡ℎ flow.
Next, we will demonstrate the accuracy of the asymptotic
central limit theorem for renewal processes through an
example. Let us consider the Binomial process, whose exact
energy function is known [11]. The exact and asymptotic
energy functions of a Binomial process are given by,
respectively. The voice and data packets will be stored in
separate queues and voice will be given higher priority wrt
data traffic. It will be assumed that a transmitted voice packet
that can not be decoded will be dropped since voice is delay
sensitive. On the other hand, the failed data packets will be
retransmitted and will be lost only after L unsuccessful
transmissions. In the following, we will study the delay and
packet losses of data flow since voice flow is redundant and is
given higher priority. Assume that both voice and data arrive
according to independent Poisson processes with rates 𝜆𝑉 and
𝜆𝐷 packets/sec respectively. The exact energy function of a
Poisson process is known, [11], giving the energy functions of
voice and data as,
𝛬1 (𝜑) = 𝜆𝑉 (𝑒 𝜑 − 1),
𝛬2 (𝜑) = 𝜆𝐷 (𝑒 𝜑 − 1)
From (3) and (13), the energy functions of the voice and
data departure processes are respectively,
1
𝛤(𝜑) = 𝑙𝑜𝑔(𝑞 + (1 − 𝑞)𝑒 𝜑 ), 𝛤 ∗ (𝜑) = (1 − 𝑞)𝜑(1 + 𝑞𝜑)
2
where 1-q is the success probability. These two results have
been plotted in Fig. 2 as a function of 𝜑. It may be seen that
they are very close to each other, which gives confidence to
the use of asymptotic energy function.
2 2
−𝜑 𝜑 𝜎𝑦
2
+
𝜑 2 𝜎𝑦22
𝜑
3
𝜇
𝛤1 (𝜑) = 𝛤̃1 (𝜑) = 𝜑; 𝛤̃2 (𝜑) =
+
+ 𝜆𝑉 (𝑒 𝑦2 2𝜇𝑦2 − 1)
3
𝜇𝑦2
2𝜇𝑦2
Next, we determine 𝜇𝑦2 , 𝜎𝑦22 which are the mean and
variance of the service time of data packets. The service time
of the data packets has a truncated geometric distribution,
{
𝑃𝑟𝑜𝑏(𝑦2 = 𝑖 𝑠𝑙𝑜𝑡𝑠) = (1 − 𝑝)𝑝𝑖−1 𝑓𝑜𝑟 𝑖 < 𝐿
𝑃𝑟𝑜𝑏(𝑦2 = 𝑖 𝑠𝑙𝑜𝑡𝑠) = 𝑝𝐿−1 𝑓𝑜𝑟 𝑖 = 𝐿
where p is the probability that transmission of a packet will
result in an outage. Let 𝑀𝐷 (𝑧) denote the PGF of the above
service time distribution,
𝑀𝐷 (𝑧) = 𝐸[𝑧 𝑦2 ] = (1 − 𝑝)𝑧
1−(𝑧𝑝)𝐿−1
1−𝑧𝑝
+ 𝑧 𝐿 𝑝𝐿−1
(14)
From the above PGF,
Fig.2. Comparison of asymptotic and exact energy functions of Binomial
process with success probability of 1-q for q=0.1
1−𝑝𝐿
1−𝑝
, 𝜎𝑦22 =
−𝑝2𝐿 −𝑝𝐿+1 (1+2𝐿)+𝑝𝐿 (1−2𝐿)+2𝑝
(1−𝑝)2
Finally, the delay violation probability of data packets is given
by,
∗
1
1
𝜇𝑦2 =
2
2
2
𝑃𝑟𝑜𝑏(𝐷2 > 𝐷𝑡ℎ
) ≈ 𝑒 −Λ2(𝜑 )𝐷𝑡ℎ
∗
where 𝜑 is the unique solution of the equation 𝛬2 (𝜑) +
𝛤̃2 (−𝜑) = 0. The packet loss probability of data packets is
given by,
𝑃𝑟𝑜𝑏(𝑝𝑎𝑐𝑘𝑒𝑡 𝑙𝑜𝑠𝑠) = 𝑝𝐿
2
Fig. 3: A two-state Markov fluid. 𝛾 𝑖 is the transition rate from state i to
state the other state. 𝜋 𝑖 is the probability that the system will be at state
i.
IV. A SYSTEM WITH TWO TYPES OF TRAFFIC FLOWS
Next, we will apply the above results to a system with two
types of traffic flows, which will be referred as voice and data
V. A SYSTEM WITH FOUR TYPES OF TRAFFIC FLOWS
In this section, we will extend the analysis to a system
with four types of traffic flows by adding a multimedia A and
a multimedia B traffic flow into the formal system model.
In the new system, multimedia A is given a lower
priority than the voice traffic but higher than the multimedia B,
while multimedia B is given a higher priority than the data
traffic. We assume multimedia A is a two-state Markov fluid
which is characterized by four parameters: λ1A , λ2A , γ1A and
γ2A . Where λ1A , λ2A refers to the Poisson packet arrival rate at
state 1 and 2, and γ1A , γ2A refers to the transition rate from
state 1 to 2 and from 2 to 1 respectively. Similar thing is for
the multimedia B traffic with suffix B. We also assume that
service of multimedia packets will be the same as the service
of the voice packets.
Let 𝑔2 (𝑡) denote the pdf of the inter-arrival time of the
packets of the 2nd traffic flow, the multimedia A, then, it is
given by,
1
2
𝑔𝑥2 (𝑡) = 𝜋𝐴1 𝜆𝐴1 𝑒 −𝜆𝐴 𝑡 + 𝜋𝐴2 𝜆𝐴2 𝑒 −𝜆𝐴 𝑡
(15)
where 𝜋𝐴1 , 𝜋𝐴2 are the steady-state probabilities of the
two-state Markov source being in states 1 and 2 respectively.
These probabilities are given by 𝜋𝐴1 =
2
𝛾𝐴
1
2
𝛾𝐴 +𝛾𝐴
, 𝜋𝐴2 = 1 − 𝜋𝐴1 .
Next we can determine the mean and variance of 𝑥2 by
obtaining the first and second moment of the Laplace
transform of the above expression. Then we have,
𝜋𝐴1 𝜋𝐴2
𝜇𝑥2 = 1 + 2
𝜆𝐴 𝜆𝐴
2
2
1
1
2
2
𝜎𝑥22 = ( 1 ) (2𝜋𝐴1 − 𝜋𝐴1 ) + ( 2 ) (2𝜋𝐴2 − 𝜋𝐴2 )
𝜆𝐴
𝜆𝐴
Same thing is for the 3rd traffic flow, the multimedia B.
And thus we can have the following equation set:
1
𝜇𝑥1 = ,
𝜇𝑦1 = 1
𝜆𝑉
1
𝜎𝑥21 = 2 , 𝜎𝑦21 = 0
𝜆𝑉
𝜋𝐴1 𝜋𝐴2
𝜇𝑥2 = 1 + 2 ,
𝜇𝑦2 = 1
𝜆𝐴 𝜆𝐴
2
2
2
2
1
1
2
2
𝜎𝑥22 = ( 1 ) (2𝜋𝐴1 − 𝜋𝐴1 ) + ( 2 ) (2𝜋𝐴2 − 𝜋𝐴2 ) , 𝜎𝑦22 = 0
𝜆𝐴
𝜆𝐴
𝜋𝐵1 𝜋𝐵2
𝜇𝑥3 = 1 + 2 ,
𝜇𝑦3 = 1
𝜆𝐵 𝜆𝐵
1
1
1
12
2
22
2
1 ) (2𝜋𝐵 − 𝜋𝐵 ) + ( 2 ) (2𝜋𝐵 − 𝜋𝐵 ) , 𝜎𝑦3 = 0
𝜆𝐵
𝜆𝐵
1
1 − 𝑝𝐿
𝜇𝑥4 =
,
𝜇𝑦4 =
𝜆𝐷
1−𝑝
2𝐿
𝐿+1 (1
1
−𝑝
−
𝑝
+
2𝐿)
+ 𝑝𝐿 (1 − 2𝐿) + 2𝑝
= 2 , 𝜎𝑦24 =
(1 − 𝑝)2
𝜆𝐷
(16)
𝜎𝑥23 = (
{
𝜎𝑥24
Submitting (16) into (13), we could have 𝛤̃4 (𝜑). And
finally the delay violation probability of data packets is given
by,
4
𝑃𝑟𝑜𝑏(𝐷4 > 𝐷𝑡ℎ
) ≈ 𝑒 −𝛬4(𝜑
∗ )𝐷4
𝑡ℎ
where 𝜑 ∗ is the unique solution of the equation
𝛬4 (𝜑) + 𝛤̃4 (−𝜑) = 0.
VI. OPTIMAL DISTRIBUTED ANTENNA PLACEMENT
In this section, we will determine optimal locations of
antennas by minimizing system’s outage probability seen by a
target user. First, we will determine the signal to noise ratio of
the target user, and then we will derive the probability of
system outage.
The distance between user i and the 𝑚𝑡ℎ antenna is given
by,
𝜌𝑚,𝑖 = √(𝑥𝑖 − 𝐿𝑚 𝑐𝑜𝑠(𝛩𝑚 ))2 + (𝑦𝑖 − 𝐿𝑚 𝑠𝑖𝑛(𝛩𝑚 ))2 + 𝒽2 (17)
0 ≤ 𝑖 ≤ 𝐹 − 1 and 1 ≤ 𝑚 ≤ 𝑀.
In the above, 2λ is the path loss exponent. hm,i are
independent identically distributed (i.i.d) complex Gaussian
random variables of Rayleigh fading channels. Since |hm,i |
2
has a Rayleigh distribution, |hm,i | has an exponential
distribution with mean equal to one.
In the following, we treat interferences from other
co-channel users as noises, which are assumed to be the only
source of noise. We consider that ach channel is time slotted
such that the neighbor cell users communicate with in a
synchronous manner. Meanwhile, a user, in a main cell is
imposed by interference of the neighbor-cells users. In this
paper, we mainly focus on the scenarios where user utilizes
the channel used by set of neighbor-cells users. This implies
that channel interference level sensed by the user is a random
variable dependent on the other users’ transmission states. We
model each channel as an ON-OFF source alternating between
state ON (active) and state OFF (inactive). An ON/OFF
channel usage model specifies a time slot in which the
neighbor user signals is or isn’t transmitting over the channel.
When more neighbor users are in the OFF time slot, main user
transmission is affected less interference. Suppose that each
channel changes its state independently. Let α𝑖 be the
probability that the 𝑖𝑡ℎ neighbor user channel exists in state
ON, Then, the channel state can be characterized by a
two-state Markov chain.
Let W denote the received signal strength at an antenna
when a user is transmitting at a distance 1 from that antenna.
Then 𝑆𝑚,𝑖 , the received signal strength at the antenna m from
user i, can be written as,
ì
2
ï W (rm,i )-2 l hm,i
Sm,i = í
ïî 0
with probability a ,0 ≤ 𝑖 ≤ 𝐹 − 1
with probability 1-a
(18)
As a result the instantaneous SNR, Γm , at the antenna m is
given by,
𝑆
𝑚,0
𝛤𝑚 = ∑𝐹−1
𝑖=1 𝑆𝑚,𝑖
=
𝕏𝑚,0
𝕐𝑚
(19)
𝑆𝑚,𝑖
𝕏𝑚,𝑖 =
where,
𝕐𝑚 = ∑𝐹−1
𝑖=1 𝕏𝑚,𝑖
,
𝑊
In general, the outage probability at the antenna m can be
expressed as [13],
𝑃𝑟𝑜𝑏𝑚 (𝑜𝑢𝑡𝑎𝑔𝑒) = 𝑃𝑟𝑜𝑏(𝐼𝑚 < 𝑅)
(20)
where 𝐼𝑚 denotes the mutual information between the
transmitter and receiver antenna m, and R is the required
transmission rate or spectrum efficiency in bits/sec/Hz [6].
From [14], 𝐼𝑚 can be expressed as,
𝐼𝑚 = 𝑙𝑜𝑔 (1 + 𝛤𝑚 )
(21)
where,
1
𝑗
𝑏𝑚,𝑛 = (𝑗−1)!
(22)
ℤ𝑚 = 𝐾𝕐𝑚 − 𝕏𝑚,0
Then, substituting (19) in (22), 𝛲𝑟𝑜𝑏𝑚 (outage) may be
expressed as,
𝛲𝑟𝑜𝑏𝑚 (𝑜𝑢𝑡𝑎𝑔𝑒) = 𝑃𝑟𝑜𝑏[ℤ𝑚 > 0]
(23)
We continue our analysis by setting α = 1 . For Let
𝒻ℤm (x) denote the pdf of the random variable (rv) ℤ𝑚 and
ℤ𝑚 (𝑠) its Laplace transform,
ℤ𝑚 (𝑠) = 𝕐𝑚 (𝐾𝑠)𝕏𝑚,0 (−𝑠) = 𝕐𝑚 (𝐾𝑠)𝕏𝑚,0 (−𝑠)
𝕐𝑚 (𝑠) = ∏𝐹−1
𝑖=1 𝕏𝑚,𝑖 (𝑠)
𝕏𝑚,𝑖 (𝑠) = 𝐸[𝑒 −𝑠𝕏𝑚,𝑖 ] =
𝑁
2𝜆
−𝑠+(𝜌𝑚,0 )
∏𝐹−1
𝑖=1
(25)
𝑠+(𝜌𝑚,𝑖 )
2𝜆
𝛼+1−𝛼 ,
2𝜆
(𝜌𝑚,𝑖 )
𝐾𝑠+(𝜌𝑚,𝑖 )
2𝜆
= 𝛨𝑚 ℱ𝑚 (𝑠)
2𝜆
−𝐹+1
𝛨𝑚 = − ∏𝐹−1
, ℱ𝑚 (𝑠) = ∏𝑁
𝑛=1
𝑖=0 (𝜌𝑚,𝑖 ) (𝐾)
where
𝑢[𝑥] = {
2𝜆
𝐾
𝑏𝑚,𝑛
𝑥 𝑗−1 𝑒 −𝑐𝑚,𝑛 𝑥 𝑢[𝑥]}
(𝑗 − 1)!
0 , 𝑥<0
From (23), the probability of outage of antenna m is given by,
1
𝑁
2𝜆
… , (𝜌𝑚,𝐹−1 ) }
𝐾
(26)
1
𝑘
(𝑠+𝑐𝑚,𝑛 ) 𝑛
where
2𝜆
1 ≤ 𝑛 ≤ 𝑁 with 1 ≤ 𝑁 ≤ 𝐹, and 𝑐𝑚,1 = −(𝜌𝑚,0 ) .
Now, expanding the above in a partial fraction,
𝑘𝑛
𝛲𝑟𝑜𝑏𝑚 (𝑜𝑢𝑡𝑎𝑔𝑒) = ∫ 𝒻ℤ𝑚 (𝑥)𝑑𝑥 = 𝛨𝑚 ∑ ∑
𝑗
𝑏𝑚,𝑛
𝑛=2 𝑗=1 (𝑐𝑚,𝑛 )
0
𝑗
(29)
ℙ(𝑜𝑢𝑡𝑎𝑔𝑒) = ∏𝑀
𝑚=1 𝛲𝑟𝑜𝑏𝑚 (𝑜𝑢𝑡𝑎𝑔𝑒)
(30)
Next, unconditioning the above result wrt the location
vector
of
the
users
(𝓵, 𝜽, 𝟎) = {(ℓ0 , 𝜃0 , 0), (ℓ1 , 𝜃1 , 0), … , (ℓ𝐹−1 , 𝜃𝐹−1 , 0)} , we
have,
1
1
𝛦(ℙ) = ∫ …
∫
2𝜋
2𝜋
ℓ𝐹−1 =0 𝜃0 =0
𝐹−1
∫ ℙ(𝑜𝑢𝑡𝑎𝑔𝑒) ∏ 𝑝(ℓ𝑖 ) 𝑝(𝜃𝑖 )𝑑ℓ𝑖 𝑑𝜃𝑖
∫…
𝑖=0
𝜃𝐹−1 =0
(31)
where 𝑝(ℓ𝑖 ), 𝑝(𝜃𝑖 ) are the marginal pdfs of the coordinates
of user i, ℓ𝑖 and 𝜃𝑖 respectively. Since we are assuming that
user locations are uniformly distributed in a cell we have,
𝑃𝑟𝑜𝑏(ℓ < ℓ𝑖 ) =
have,
ℓ𝑖 2
𝑟2
, and taking into account that r=1, we
p(θi ) =
1
2π
, for 0 ≤ θ < 2π (32)
for
(27)
with 𝑐𝑚,𝑛 , 𝑘𝑛 denoting a distinct value and its frequency in
2𝜆 1
𝑗
𝑛=2 𝑗=1
1 , 𝑥≥0
p(ℓi ) = 2ℓi , for 0 ≤ ℓ ≤ 1,
2𝜆
(𝜌𝑚,𝑖 )
where,
the set {−(𝜌𝑚,0 ) , (𝜌𝑚,1 )
𝑘𝑛
1
𝒻ℤ𝑚 (𝑥) = 𝐻𝑚 { 𝑏𝑚,1
𝑒 −𝑐𝑚,1 𝑥 𝑢[−𝑥] + ∑ ∑
ℓ0 =0
0≤𝑖 ≤𝐹−1
Substituting (25) in (24) gives,
2𝜆
| (𝑠 = −𝑐𝑚,𝑛 )
(24)
where 𝕐𝑚 (𝑠) and 𝕏𝑚,0 (𝑠) are Laplace transform of the rvs
𝕐𝑚 and 𝕏𝑚,0 . From (19), 𝕐m is the sum of F-1 independent
exponentially distributed rvs, we have,
(𝜌𝑚,0 )
𝑑𝑠 𝑗−1
We assume that outages of the antennas are independent of
each other, therefore, the system outage probability,
ℙ(𝑜𝑢𝑡𝑎𝑔𝑒), for a fixed set of user locations is given by,,
Next let us define,
ℤ𝑚 (𝑠) =
𝑑 𝑗−1 [(𝑠+𝑐𝑚,𝑛)𝑗 ℱ𝑚 (𝑠)]
+∞
𝛲𝑟𝑜𝑏𝑚 (𝑜𝑢𝑡𝑎𝑔𝑒) = 𝑃(𝛤𝑚 < 2𝑅 − 1)
where
(28)
𝑗
(𝑠+𝑐𝑚,𝑛 )
A Taking the inverse transform of the above gives the pdf
of the rv ℤ𝑚 ,
Substituting (21) in the (20),
𝐾 = 2𝑅 − 1 ,
𝑗
𝑏𝑚,𝑛
𝑘
𝑛
ℤ𝑚 (𝑠) = 𝐻𝑚 ∑𝑁
𝑛=1 ∑𝑗=1
We define the antenna locations that minimize the expected
outage probability of the system in (31) as being optimal.
Unfortunately, it has not been possible to obtain the minimum
of the expected outage probability of the system analytically
due to complexity of this function. As a result, we have
determined minimum value of the expected outage probability
of the system numerically by applying the Robbins-Monro
stochastic approximation method as in [8].
VII. NUMERICAL RESULTS
In this section, we present some numerical results regarding
the analysis in the paper and simulation results to verify the
accuracy of the analysis.
First, we present numerical and simulation results regarding
the a system with two types of traffics which consist a voice
traffic and a data traffic. It will be assumed that a transmitted
voice packet that can not be decoded will be dropped since
voice is delay sensitive. On the other hand, the failed data
packets will be retransmitted and a data packet will be
dropped only after L unsuccessful transmissions. Dropped
packets will be treated as packet loss. Both voice and data
arrive according to independent Poisson processes with rates
𝜆𝑉 and 𝜆𝐷 packets/sec respectively.
Fig.s 3, 4 present the delay violation probabilities of data
packets as a function of the delay threshold for the data traffic
with λV , λD , p and L as parameters. From Fig. 3. it may be
seen that increasing λV increases the delay violation
probability for a fixed value of λD . Similarly, from Fig. 4,
increasing λD increases the delay violation probability for a
fixed value of λV .
In Fig 5, we plot numerical and simulation results of delay
violation probability to show the accuracy of our analysis. As
may be seen, there is a very good match between numerical
and simulation results. This increases the confidence in the
validity of the analysis, specially, in the use of asymptotic
results from the renewal theory.
Fig. 6 presents the delay violation probabilities of data
packets as a function of the data delay threshold with total
number of transmissions, L, as a parameter. As may be seen,
delay violation probability increases, while packet loss
probability decreases as L increases, which shows the tradeoff
between delay violation and the packet loss probabilities.
Fig. 7,8,9 present the similar delay violation probabilities
of data packets with respect to different parameters in a
system with four types of traffics. These three numerical
results show the same trend as in the system with two types of
traffics.
Fig. 3. Probability of queuing delay being greater than a threshold value
2
𝐷𝑡ℎ
, for 𝜆𝐷 = 0.5 packets/slot, 𝐿 = 4, wrt different values of 𝜆𝑣 and p
2
Fig. 4. Probability of queuing delay being greater than a threshold value 𝐷𝑡ℎ
,
for 𝜆𝑉 = 0.1 packets/slot, 𝑝 = 0.1 wrt to different values of 𝜆𝐷 and L
Fig. 5. Simulation and numerical results of probability of queuing delay being
2
greater than a threshold value 𝐷𝑡ℎ
, for
𝜆𝐷 = 0.6 packets/slot, 𝜆𝑉 = 0.2 packets/slot, 𝑝 = 0.1, 𝐿 = 4
Fig. 6. Probability of queuing delay being greater than a threshold value
2
𝐷𝑡ℎ
, for λD = 0.7 packets/slot, λV = 0.1 packets/slot , 𝑝 = 0.2 wrt
different values of 𝐿
a.
b.
c.
d.
Fig. 7. Probability of queuing delay being greater than a threshold value
4
𝐷𝑡ℎ
, for 𝜆𝑉 = 0.4packets/slot, 𝜆𝐴1 = 0.1packets/slot, 𝜆𝐴2 = 0.2packets/
slot, 𝜋𝐴1 = 0.4, 𝜋𝐴2 = 0.6, 𝜆1B = 0.3packets/slot, 𝜆2𝐵 = 0.2packets/slot,
𝜋𝐵1 = 0.7, 𝜋𝐵2 = 0.3, 𝑝 = 0.1 wrt different values of 𝜆𝐷 and L
Fig. 8. Probability of queuing delay being greater than a threshold
4
value𝐷𝑡ℎ
, for 𝜆𝐴1 = 0.1packets/slot, 𝜆𝐴2 = 0.2packets/slot, 𝜋𝐴1 =
2
0.4, 𝜋𝐴 = 0.6, 𝜆1B = 0.3packets/slot, 𝜆2𝐵 = 0.2packets/slot, 𝜋𝐵1 =
0.7, 𝜋𝐵2 = 0.3, 𝜆𝐷 = 0.4packets/slot, 𝐿 = 4, wrt different values of 𝜆𝑉
and p
Fig. 9. Probability of queuing delay being greater than a threshold value
4
𝐷𝑡ℎ
, for 𝜆𝑉 = 0.2packets/slot, 𝜆1𝐵 = 0.3𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝜆2𝐵 = 0.2𝑝𝑎𝑐𝑘𝑒𝑡𝑠/
𝑠𝑙𝑜𝑡, 𝜋𝐵1 = 0.7, 𝜋𝐵2 = 0.3, 𝜆𝐷 = 0.2𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝐿 = 4, 𝑝 = 0.1 wrt
different values of 𝜆𝐴1 , 𝜆𝐴2 , 𝜋𝐴1 and 𝜋𝐴2
Next, we present numerical and simulation results about the
analysis of the antenna placement part in the paper as well as
simulation results. The numerical results for the optimal
location of the antennas have been obtained through the
application of the Robbins-Monro algorithm [15], the steps of
which are given below,
Initialize the antennas location vector 𝑳 and let this
vector to be 𝑳(𝟏)
Randomly generate a user location vector (𝓵, 𝛉, 𝟎)
according to their uniform distributions in the cells.
Update the optimum locations of the antennas by applying
the equation below
𝜕ℙ(𝑜𝑢𝑡𝑎𝑔𝑒)
𝑳(𝒏 + 𝟏) = 𝑳(𝒏) + 𝑐𝑛 (
)| 𝑳 = 𝑳(𝒏)
𝜕𝑳
Let n=n+1 and iteratively run steps b, c, d until ̅̅̅̅̅̅
𝑳(𝒏)
1
𝑛−1
̅̅̅̅̅̅
∑
converges,
where
𝑳(𝒏) =
𝑳(𝒊) . ̅̅̅̅̅̅
𝑳(𝒏)
𝑛−1 𝑖=1
converges to the optimum antenna location vector 𝑳′ .
In this implementation of the Robbins-Monro algorithm, we
chose the sequence of positive 𝑐𝑛 as 𝑐𝑛 = 15𝑛−0.75 , which
satisfies the Polyak and Juditsky constraints in [16].
We compared delay performance of the proposed algorithm
with the case algorithm, where bandwidth slots are distributed
between the data and voice traffics with different ratios in the
case algorithm. Considering a TDMA system, the entire slot
has 20 sub-slots and each sub-slot has a frame for potential
voice or data transmission. The entire slot has both data and
voice frames. The different ratios (Figures 12, 13) represent
number of frames of data within the entire slot. Let r represent
this ratio. When there is no data or voice arrival, the TDMA
system will transmit empty frames. Using the case algorithm,
in spite of sensitivity to the data delay (as is shown in Figure
12), voice delay increases significantly (as is shown in Figure
13). However, the proposed algorithm has the lowest voice
delay and doesn’t have much data delay sensitivity.
Also, to reduce the amount of computations for the
execution of the algorithm, we assumed that the optimal
locations of the antennas will be a circle centered at the cell
center and the antennas will be spaced evenly on the circle.
The reason for this assumption is that the cells are symmetric
in every aspect. The number of antennas is assumed to be M=4
and the cluster size to be F=7, R=1 bits/sec/Hz. In figures 5-10
wireless channel parameters are set as follows: 𝒽 = 0.05
and path loss exponent 2λ = 4.
The application of the
Robbins-Monro procedure gives the optimum locations of
π
π
antennas as (𝐿𝑚 , 𝛩𝑚 , 𝒽)=(0.58, 𝑚 − ,0.05), for m=1,…4,
2
2
which results in the minimum expected value of outage
probability of, 𝛦(ℙ) = 0.0087, see Table 1.
In fig 11-13 wireless channel parameters are set as follows :
𝒽 = 0.05 and path loss exponent 2λ = 2 . In this case,
Robbins-Monro procedure gives the optimum locations of
π
π
antennas as (𝐿𝑚 , 𝛩𝑚 , 𝒽) = (0.416, 𝑚 − , 0. 05), for
2
2
m=1,…4, which results in the minimum expected value of
outage probability of, 𝛦(ℙ) = 0.1081, see Table 2.
In Fig. 10, we plotted simulation results for the expected
value of the system outage probability as a function for the
optimal radius of the antenna circle for different values of
neighbor users’ activation probability. From the figure it
may be seen that there is an optimal radius of the antenna
circle, 0.42, which results (for α = 1 ) in the minimum
expected value of outage probability of Ε(ℙ) = 0.106
Comparing to the case that all the antennas are at the center,
the optimal location provides almost 33% improvements in
system’s average outage probability. Simulation and
numerical results show a very good match.
Fig. 10: Simulation result for system’s average outage probability 𝛦(ℙ) as a
function of the first antenna’s location. (different curves represents for different
π 2π
8π
value of 𝛩1 = (0 , …,
)
18
18
18
𝑛
̅̅̅
𝐿1
𝑛
̅̅̅
𝐿1
1
0.00
2
0.90
0.013
35
0.55
0.0095
0.091
36
0.55
3
0.63
0.0094
0.011
37
0.55
4
0.0094
0.54
0.009
38
0.55
0.0094
5
0.50
0.0099
39
0.55
0.0094
6
0.47
0.010
40
0.55
0.0094
7
0.45
0.010
41
0.55
0.0094
8
0.46
0.010
42
0.56
0.0094
9
0.48
0.010
43
0.56
0.0094
10
0.49
0.010
44
0.56
0.0093
11
0.50
0.0099
45
0.56
0.0093
12
0.50
0.0099
46
0.56
0.0093
13
0.50
0.0099
47
0.56
0.0093
14
0.51
0.0098
48
0.56
0.0093
15
0.51
0.0097
49
0.57
0.0093
16
0.51
0.0097
50
0.57
0.0093
17
0.51
0.0096
51
0.57
0.0093
18
0.51
0.0096
52
0.57
0.0092
19
0.52
0.0096
53
0.57
0.0092
20
0.52
0.0096
54
0.57
0.0092
21
0.52
0.0095
55
0.57
0.0092
22
0.52
0.0095
56
0.57
0.0092
23
0.53
0.0095
57
0.58
0.0091
24
0.53
0.0095
58
0.58
0.0091
25
0.53
0.0095
59
0.58
0.0091
26
0.54
0.0095
60
0.58
0.0090
27
0.54
0.0095
61
0.58
0.0090
28
0.54
0.0095
62
0.58
0.0090
29
0.54
0.0095
63
0.58
0.0090
30
0.54
0.0095
64
0.58
0.0090
31
0.54
0.0095
65
0.58
0.0090
32
0.54
0.0095
66
0.58
0.0090
33
0.54
0.0095
67
0.58
0.0090
34
0.54
0.0095
68
0.58
0.0090
E(p)
E(p)
Table 1. Robbins-Monro outcome of the optimum location of the
first antenna as. ( here we only show the optimum antenna radius
𝐿1 (𝑛) since angles 𝛩1 (𝑛) changes slightly around 0 as n increases.)
Fig. 11: Probability of queuing delay being greater than a threshold value
𝐷𝑡ℎ
,
for 𝜆𝑉 = 0.2packets/slot, 𝜆𝐴1 = 0.2𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝜆𝐴2 =
0.3𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝜋𝐴1 = 0.8, 𝜋𝐴2 = 0.2, 𝜆1𝐵 = 0.3𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝜆2𝐵 =
0.2𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝜋𝐵1 = 0.7, 𝜋𝐵2 = 0.3, 𝜆𝐷 = 0.2𝑝𝑎𝑐𝑘𝑒𝑡𝑠/𝑠𝑙𝑜𝑡, 𝐿 =
4, 𝑝 = 0.1
𝑛
̅̅̅
𝐿1
E(p)
𝑛
̅̅̅
𝐿1
E(p)
𝑛
̅̅̅
𝐿1
E(p)
1
0. 9
0.293
18
0.37
0.114
35
0.40
0.11
2
0.89
0.293
19
0.37
0.114
36
0.40
0.11
3
0.71
0.173
20
0.37
0.113
37
0.40
0.11
4
0.54
0.119
21
0.37
0.113
38
0.40
0.11
5
0.44
0.109
22
0.38
0.113
39
0.40
0.11
6
0.35
0.115
23
0.38
0.113
40
0.40
0.109
7
0.34
0.115
24
0.38
0.113
41
0.40
0.109
8
0.35
0.115
25
0.38
0.113
42
0.40
0.109
9
0.35
0.115
26
0.38
0.113
43
0.40
0.109
10
0.35
0.115
27
0.38
0.113
44
0.41
0.108
11
0.36
0.114
28
0.39
0.113
45
0.41
0.108
12
0.36
0.114
29
0.39
0.113
46
0.41
0.108
13
0.36
0.114
30
0.39
0.113
47
0.41
0.108
14
0.36
0.114
31
0.39
0.113
48
0.41
0.108
15
0.36
0.114
32
0.39
0.112
49
0.41
0.108
16
0.37
0.114
33
0.39
0.112
50
0.41
0.108
17
0.37
0.114
34
0.39
0.112
51
0.41
0.108
Table 2. Robbins-Monro outcome of the optimum location of the first
antenna as. ( here we only show the optimum antenna radius 𝐿1 (𝑛) since
angles 𝛩1 (𝑛) changes slightly around 0 as n increases.)
Fig. 12: Simulation result for system’s average outage probability 𝛦(ℙ)
as a function of the first antenna’s location. (different curves represents
for different value of α= 1, 0.8, 0.5)
Fig. 14: Probability of voice queuing delay being greater than a threshold
1
value 𝐷𝑡ℎ
, for 𝜆𝐷 = 0.5 packets/slot, 𝑝 = 0.1
VIII. CONCLUSION
Presently, distributed broadband wireless communication
(BWC) system is a very promising wireless technology due to
its low cost and high performance. This paper considers uplink
Fig. 13: Probability of data queuing delay being greater than a threshold communications with multiple levels of priority traffic having
2
value 𝐷𝑡ℎ
, for 𝜆𝑉 = 0.1 packets/slot, 𝑝 = 0.1 𝑎𝑛𝑑 𝑟 = 0.85
any renewal arrival and departure processes. We develop an
analysis that determines packet delay violation probability for
each priority level as a function of the outage probability of
the distributed antenna system through the application of
results from the renewal theory. Then, we determine the
optimal locations of the antennas that minimize the antenna
outage probability. We also present simulation results that
show the accuracy of the analysis. The results are very easy to
use and they will be useful in the design of BWC systems.
Finally, the packet delay violation probability result may also
be applicable in any other communication systems with
multiple types of priority traffic.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
W. Mohr, J.F. Monserrat, A. Osseiran, M. Werner “IMT-advanced
and next-generation mobile networks [Guest Editorial]” , IEEE
Communications Magazine, Vol. 49, Issue 2, pp. 82 – 83, 2011.
J. Z. Wang, F. Adachi, A. Gameiro, N.J. Gomes, K.I. Kitayama, P.
Monteiro, M. Sawahashi, X.G. Xia “Guest Editorial: Distributed
broadband wireless communications”, IEEE Journal on Selected Areas
in Communications, Vol. 29 , No. 6, pp. 1121 – 1122, 2011.
J.W. Lee, D. Toumpakaris, Yu Wei “Interference mitigation via joint
detection” , IEEE Journal on Selected Areas in Communications, Vol.
29 , Issue 6, pp: 1172 – 1184, 2011.
J.S. Gao, Y.Z. Li, S.D. Zhou, J. Wang “On sum rate of multi-user
distributed antenna system with circular antenna layout”, Proceedings of
the IEEE Vehicular Technology Conference , VTC-66, pp: 596 – 600,
Fall 2007.
Q.H Du, X. Zhang “QoS-aware base-station selections for distributed
MIMO links in broadband wireless networks”, IEEE Journal on
Selected Areas in Communications, Vol. 29, No.6, pp.1123 – 1138,
2011.
D. Zennaro, S. Tomasin, L. Vangelista “Base station selection in uplink
macro diversity cellular Systems with hybrid ARQ” , IEEE Journal on
Selected Areas in Communications, Vol. 29, Issue 6, pp: 1249 – 1259,
2011.
W. Feng, X.B. Xu, S.D. Zhou, J. Wang, M.H. Xia “Sum rate
characterization of distributed antenna systems with circular antenna
layout” Proceedings of the IEEE Vehicular Technology Conference,
VTC-69, pp: 1 – 5, Spring 2009.
S. Firouzabadi, A. Goldsmith “ Optimal placement of distributed
antennas in cellular systems”, Proceedings of the IEEE International
Workshop on Signal Processing Advances in Wireless Communications,
SPAWC-12, pp. 461 – 465, 2011.
J.-P.M.G Linnartz “Exact analysis of the outage probability in
multiple-user mobile radios”, IEEE Transactions on Communications,
Vol. 40 , Issue 1, pp. 20 – 23, 1992.
C.S. Chang , J.A. Thomas “Effective bandwidth in high-speed digital
networks”, IEEE Journal on Selected Areas in Communications, Vol.
13, No. 6, pp. 1091 – 1100, 1995.
P. Rabinovitch, D. De Vleeschauwer “What is Effective Bandwidth”
Available http://www3.sympatico.ca/peter.rabinovitch/eb.pdf
W. Feller, An Introduction to Probability Theory and Its Applications,
Volume 2, Chapter Ⅺ,John Wiley & Sons, Inc.
Y. Zhao, R. Adve, T.J. Lim “Outage probability at arbitrary SNR with
cooperative diversity networks” IEEE Communications Letters, Vol.9 ,
Issue 8, pp.: 700 – 702, 2005.
T.M. Cover, J.A.Thomas, Elemenst of Information Theory, John
Wiley,1991
H.J. Kushner and D.S. Clark “Stochastic Approximation Methods for
Constrained and Unconstrained Systems”, Chapter 1, Spinger-Verlag,
New York, Heidelberg, Berlin
B. T. Polyak and A. B. Juditsky “Acceleration of Stochastic
Approximation by Averaging” SIAM Jorunal of control and
optimization Vol. 30, No. 4, pp. 838-855, July 1992
Shoja M, Taheri H, Vakilinia S. A new approach to prevent black hole
attack in AODV. International Journal of Computer Science and
Information Security. 2011 Jan;9(1):24-9.
Kiskani MK, Khalaj BH, Vakilinia S. Delay qos provisioning in
cognitive radio systems using adaptive modulation. InProceedings of the
6th ACM workshop on QoS and security for wireless and mobile
networks 2010 Oct 20 (pp. 49-54). ACM.
Vakilinia S, Khalaj BH, Froushani MH. Qos-aware water-filling for
real-time transmission in ofdma systems. InTelecommunications (ICT),
2011 18th International Conference on 2011 May 8 (pp. 84-89). IEEE.
Rastegar, S.H., Vakilinia, S. and Khalaj, B.H., 2012, June. Rate
adaptation and power allocation for time-correlated MISO Rayleigh
fading channel with delay-limited HARQ. In Communications (ICC),
2012 IEEE International Conference on (pp. 3915-3919). IEEE.
Hosseini M, Lee B, Vakilinia S. Energy performance of cool roofs under
the impact of actual weather data. Energy and Buildings. 2017 Jun
15;145:284-92.
Vakilinia S, Alvandi M, Shoja MK, Vakilinia I. Cross-Layered Secure
and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks.
International Journal of Business Data Communications and Networking
(IJBDCN). 2013 Oct 1;9(4):23-45.
[23] Vakilinia, Shahin, Xinyao Zhang, and Dongyu Qiu. "Analysis and
optimization of big-data stream processing." In Global Communications
Conference (GLOBECOM), 2016 IEEE, pp. 1-6. IEEE, 2016.
[24] Vakilinia, Shahin, and Iman Vakilinia. "QoS aware energy efficient
resource allocation in wireless cooperative OFDMA relay networks." In
Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint
IFIP, pp. 1-4. IEEE, 2013.
[25] Vakilinia, Shahin, Behdad Heidarpour, and Mohamed Cheriet. "Energy
Efficient Resource Allocation in Cloud Computing Environments."
IEEE Access 4 (2016): 8544-8557.
[26] Zemmouri, Samy, Shahin Vakilinia, and Mohamed Cheriet. "Let's adapt
to network change: Towards energy saving with rate adaptation in
SDN." In Network and Service Management (CNSM), 2016 12th
International Conference on, pp. 272-276. IEEE, 2016.
[27] Vakilinia, S., Cheriet, M., & Rajkumar, J. (2016, October). Dynamic
resource allocation of smart home workloads in the cloud. In Network
and Service Management (CNSM), 2016 12th International Conference
on (pp. 367-370). IEEE.
[28] Heidarpour, Behdad, Zbigniew Dziong, and Shahin Vakilinia.
"Volume-based pricing in Stackelberg duopoly wireless markets."
Telecommunications Network Strategy and Planning Symposium
(Networks), 2016 17th International. IEEE, 2016.
| 1cs.CV
|
Optimal locally repairable codes of distance 3 and 4 via cyclic codes
arXiv:1801.03623v1 [cs.IT] 11 Jan 2018
Yuan Luo∗, Chaoping Xing and Chen Yuan †
Abstract
Like classical block codes, a locally repairable code also obeys the Singleton-type bound (we call
a locally repairable code optimal if it achieves the Singleton-type bound). In the breakthrough work of
[14], several classes of optimal locally repairable codes were constructed via subcodes of Reed-Solomon
codes. Thus, the lengths of the codes given in [14] are upper bounded by the code alphabet size q.
Recently, it was proved through extension of construction in [14] that length of q-ary optimal locally
repairable codes can be q + 1 in [7]. Surprisingly, [2] presented a few examples of q-ary optimal locally
repairable codes of small distance and locality with code length achieving roughly q 2 . Very recently,
it was further shown in [8] that there exist q-ary optimal locally repairable codes with length bigger
than q + 1 and distance propositional to n. Thus, it becomes an interesting and challenging problem to
construct new families of q-ary optimal locally repairable codes of length bigger than q + 1.
In this paper, we construct a class of optimal locally repairable codes of distance 3 and 4 with unbounded length (i.e., length of the codes is independent of the code alphabet size). Our technique is
through cyclic codes with particular generator and parity-check polynomials that are carefully chosen.
1 Introduction
Due to applications to distributed storage systems, locally repairable codes have recently attracted great
attention of researchers [5, 4, 12, 13, 7, 8, 3, 11, 14, 15, 1]. A local repairable code is nothing but a
block code with an additional parameter called locality. For a locally repairable code C of length n with
k information symbols and locality r (see the definition of locally repairable codes in Section 2.1), it was
proved in [4] that the minimum distance d(C) of C is upper bounded by
k
d(C) 6 n − k −
+ 2.
(1)
r
The bound (1) is called the Singleton-type bound for locally repairable codes and was proved by extending
the arguments in the proof of the classical Singleton bound on codes. In this paper, we refer an optimal
locally repairable code to a block code achieving the bound (1).
1.1 Known results
The early constructions of optimal locally repairable codes gave codes with alphabet size that is exponential
in code length (see [6, 13]. There was also an earlier construction of optimal locally repairable codes given
∗
Department of Computer Sciences and Engineering, Shanghai Jiaotong University, Shanghai 200240, P. R. China. (email:
[email protected])
†
The authors are with Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore 637371, Republic of Singapore (email: {xingcp,YUAN0064}@ntu.edu.sg).
1
in [12] with alphabet size comparable to
length. However, the construction in [12] only produced a
kcode
specific value of the length n, i.e., n = r (r + 1). Thus, the rate of the code is very close to 1. There are
also some existence results given in [12] and [14] with less restriction on locality r. But the results in both
the papers require large alphabet size which is an exponential function of the code length.
A recent breakthrough construction given in [14] makes use of subcodes of Reed-Solomon codes. This
construction produces optimal locally repairable codes with length linear in alphabet size although the length
of codes is upper bounded by alphabet size. The construction in [14] was extended via automorphism group
of rational function fields by Jin, Ma and Xing [7] and it turns out that there are more flexibility on locality
and the code length can go up to q + 1, where q is the alphabet size.
Based on the classical MDS conjecture, one should wonder if q-ary optimal locally repairable codes
can have length bigger than q + 1. Surprisingly, it was shown in [2] that there exist q-ary optimal locally
repairable codes of length exceeding q + 1. Although [2] produced a few optimal locally repairable codes
with specific parameters, it paves a road for people to continue search for such optimal codes. Very recently,
it was shown in [8] via elliptic curves that there exist q-ary optimal locally repairable codes with length n
bigger than q + 1 and distance proportional to length n.
1.2 Our result
In this paper, by carefully choosing generator polynomials, we can show that there exist optimal locally
repairable codes of distance 3 and 4 that are cyclic. One feature of these codes is that their lengths are
unbounded, i.e., lengths are independent of the code alphabet sizes. More precisely, we have the following
main result in this paper.
Theorem 1.1. Let q be a prime power. Assume that n is a positive integer with gcd(n, q) = 1. Then
i
h
n
, 3 cyclic locally repairable code with locality r if
(i) there is a q-ary optimal n, k = n − 1 + r+1
r > 2 and gcd(n, q − 1) ≡ 0 (mod r + 1); and
i
h
n
, 4 cyclic locally repairable code with locality r if
(ii) there is a q-ary optimal n, k = n − 2 + r+1
n
r > 3, gcd(n, q − 1) ≡ 0 (mod r + 1) and gcd r+1
, r + 1 divides 2.
Remark 1.
(i) The conditions in Theorem 1.1 are easy to be satisfied and the length n is unbounded.
(ii) Indeed, parameters given in Theorem 1.1 satisfy the equality of (1). Let us verify this only for part (i)
of Theorem 1.1. We have
n
n − 1 − r+1
n
1
n
n
k
−
−
−
+2=1+
+2 =3+
= 3.
n−k−
r
r+1
r
r+1
r+1 r
1.3 Open problems
In view of the known results and our result in this paper, all known optimal q-ary locally repairable codes
with length n and minimum distance satisfy either (i) d is small and n is unbounded; or (ii) d is proportional
to n and q is linear in n. One natural question is
Open problem 1. Are there optimal q-ary locally repairable codes with length n much bigger than q (for
instance n = Ω(q 2 )) and minimum distance proportional to n?
2
The other open problem is the following.
Open problem 2. Are there optimal q-ary locally repairable codes with unbounded length n for every constant d.
1.4 Organization of the paper
The paper is organized as follows. In Section 2, we provide some preliminaries on locally repairable codes
and cyclic codes. In Section 3, we present proof of Theorem 1.1. In addition, we also give a construction of
optimal q-ary locally repairable codes of length 2(q − 1) and distance 4.
2 Preliminaries
In this section, we present some preliminaries on locally repairable codes and cyclic codes.
2.1 Locally repairable codes
Informally speaking, a block code is said with locality r if every coordinate of a given codeword can be
recovered by accessing at most r other coordinates of this codeword. Precisely speaking, a locally repairable
code with locality r is given as follows.
Definition 1. Let C ⊆ Fnq be a q-ary block code of length n. For each α ∈ Fq and i ∈ {1, 2, · · · , n},
define C(i, α) := {c = (c1 , . . . , cn ) ∈ C | ci = α}. For a subset I ⊆ {1, 2, · · · , n} \ {i}, we denote by
CI (i, α) the projection of C(i, α) on I. Then C is called a locally repairable code with locality r if, for
every i ∈ {1, 2, · · · , n}, there exists a subset Ii ⊆ {1, 2, · · · , n} \ {i} with |Ii | 6 r such that CIi (i, α) and
CIi (i, β) are disjoint for any α 6= β ∈ Fq .
Apart from the usual parameters: length, rate and minimum distance, the locality of a locally repairable
code plays a crucial role. In this paper, we always consider locally repairable codes that are linear over Fq .
Thus, a q-ary locally repairable code of length n, dimension k, minimum distance d and locality r is said to
be an [n, k, d]q -locally repairable code with locality r.
2.2 Cyclic codes
Cyclic codes are well known and understood in the coding community. We briefly introduce them and list
some useful facts on cyclic codes in this subsection. A q-ary cyclic code C is identified with an ideal of
the ring Fq [x]/(xn − 1). As every ideal of Fq [x]/(xn − 1) is a principal ideal generated by a divisor g(x)
of xn − 1, we can just write C = hg(x)i. The dimension of C is n − deg(g(x)). Furthermore, c(x) is a
codeword of C if and only if c(x) is divisible by g(x). In other words, if α1 , . . . , αn−k ∈ F̄q are all n − k
roots of g(x) (where F̄q stands for algebraic closure of Fq ), then c(x) belongs to C if and only if c(αi ) = 0
for all i = 1, 2, . . . , n − k.
n −1
. Let h̃(x) be the reciprocal polynomial of
Let C = hg(x)i for a divisor g(x) of xn − 1. Put h(x) = xg(x)
h(x). Then the Euclidean dual code of C is C ⊥ = hh̃(x)i. We recall some facts about cyclic codes without
giving proof. The reader may refer to the books [10, 9].
Lemma 2.1.
(i) Let h(x) be a divisor of xn − 1, then the codes hh(x)i and hh̃(x)i are equivalent.
3
(ii) Let C = hg(x)i a q-ary cyclic code of length n for a divisorP
g(x) of xn −1 and assume that α1 , . . . , αt
are roots of g(x). If C has a nonzero codeword c(x) = tj=1 cij xij of weight at most t, then the
determinant
i
det αℓj
16ℓ6t,16j6t
is zero.
(iii) Let C = hg(x)i be a q-ary cyclic code of length n for a divisor g(x) of xn − 1. Let β ∈ F̄q be an nth
primitive root of unity. If there exist an integer t and a positive integer δ such that β t , β t+1 , . . . , β t+δ−2
are roots of g(x), then C has minimum distance at least δ.
Let Sn denote the symmetric group of length n. An automorphism of a q-ary block code C is a permutation σ ∈ Sn satisfying that (cσ(1) , cσ(2) , . . . , cσ(n) ) ∈ C whenever (c1 , c2 , . . . , cn ) ∈ C. All automorphisms
C form a subgroup of Sn , denoted by Aut(C). It is called the automorphism group of C. The code C
is called transitive if, for any i, j ∈ {1, 2, . . . , n}, there exists an automorphism σ ∈ Aut(C) such that
σ(i) = j.
If C is the cyclic code, then Aut(C) contains the subgroup generated by the cyclic shift (12 · · · n). Thus,
C is transitive.
3 Constructions
In this section, we first give a general result on locality for transitive codes and then apply it to the proof of
Theorem 1.1. In addition, we also present a construction of q-ary [2(q − 1), 4] locally repairable code with
locality r.
3.1 A general result
Lemma 3.1. If C is a q-ary transitive linear code with dual distance d⊥ 6 r + 1, then C has locality r.
Proof. Let a = (a1 , a2 , . . . , an ) be a codeword of C ⊥ with the Hamming weight d⊥ . Let I denote the
support of a. Then |I| = d⊥ 6 r + 1. Let J be a subset of {1, 2, . . . , n} such that |J| = r + P
1 and I ⊆ J.
Choose an element i ∈ I. Then for every codeword c = (c1 , c2 , . . . , cn ) ∈ C, we have 0 = j∈I aj cj =
P
−1 P
j∈J aj cj . This gives ci = −ai
j∈J\{i} aj cj . This implies that ci can be repaired by {cj }j∈J\{i} . Now
for any ℓ ∈ {1, 2, . . . , n}, there exists an automorphism σ ∈ Sn such that σ(i) = ℓ. This implies that
X
X
0=
aj cσ(j) =
aj cσ(j) .
j∈I
Hence, cℓ = cσ(i) = −a−1
i
P
j∈J\{i} aj cσ(j) .
j∈J
The proof is completed.
Example 3.2. Let q be a prime power. Let r, n be positive integers with r > 2, n|(q − 1) and (r + 1)|n. We
present a q-ary optimal cyclic locally repairable code of length n minimum distance d and locality r for any
1 6 d 6 n. Although such a code was already given in [14], we provide different view for this code. Such
an observation finally leads to discovery of optimal locally repairable codes with unbounded length given
in Theorem 1.1. Let β be an nth primitive root of unity. For a positive integer d with 1 6 d 6 n, d can be
uniquely written as d = (r + 1)a + b for some integer a > 0 and integer b ∈ {0, 1, . . . , r}.
4
Case 1. b ∈ {2, 3, 4, . . . , r}.
Let
g(x) =
n
−1
r+1
d−2
Y
i=0
g(x)|(xn
Y
(x − β i ) ×
(x − β (r+1)j+b−2 ).
j=a+1
It is obvious that
− 1) since all roots of g(x) are the nth roots of unity and they are distinct. We
denote by C the cyclic code with generator polynomial g(x). Due to the fact that g(x) contains the d − 1
roots 1, β, . . . , β d−2 , it follows from Lemma 2.1(i) that C has the minimum distance at least d. Moreover,
rn
n
− (d − a − 2) = r+1
− ar − b + 2. Thus, we have
the dimension of C is k := n − deg(g(x)) = n − r+1
k
n
−b + 2
n
n−k−
+ ar + b − 2 −
−a+
+2=
+ 2 = a(r + 1) + b = d.
r
r+1
r+1
r
Thus, to show that C satisfies the Singleton-type bound (1), it remains to show that the locality of C is r.
By Lemma 3.1, it is sufficient to the dual distance of C is at most r + 1. By Lemma 2.1(i), it is sufficient to
n −1
. Observe that
show that the cyclic code hh(x)i has minimum distance at most r + 1, where h(x) = xg(x)
n
−1
r+1
Y
n
(x − β (r+1)j+b−2 ) = x r+1 − β
(b−2)n
r+1
.
j=0
Thus, we write
n
g(x) = (x r+1 − β
(b−2)n
r+1
d−2
Y
)
(x − β i ).
i=0,i6=b−2 mod r+1
Then
h(x)
d−2
Y
xn − 1
(x − β i ) =
x
i=0,i6=b−2 mod r+1
n
r+1
−β
(b−2)n
r+1
=
r
X
β
(b−2)in
r+1
x
(r−i)n
r+1
i=0
is a codeword of hh(x)i and it has Hamming weight r + 1. This implies that C ⊥ has minimum distance at
most r + 1.
Case 2. b ∈ {0, 1}.
In this case, we define the cyclic code C generated by
g(x) =
d−2
Y
(x − β i ) ×
i=0
n
r+1
Y
(x − β (r+1)j+b−2 ).
j=a+1
Compared with Case 1, the degree of g(x) increases by 1 due to fact that b − 2 is negative. We can mimic
the proof of Case 1 and skip the detail.
Example 3.3. Let q be a prime power. Let r, n be positive integers with r > 2, n|(q + 1) and (r + 1)|n.
We present a q-ary optimal cyclic locally repairable code of length n, locality r and minimum distance
d = a(r + 1) + b with 2|a and b ∈ {2, 4, 6, . . . , 2⌈ r−1
2 ⌉}. The codes in this example were founded in [7]
already, but we provide a new view on the construction.
2
Since n|(q + 1), we have (xn − 1)|(xq −1 − 1). This implies that each irreducible factor of xn − 1 is
either linear or quadratic. If an irreducible factor f (x) of xn − 1 is quadratic and γ is a root of f (x), then
5
the other root is γ q . As n|(q + 1) and γ n = 1, we have γ q+1 = 1. This gives γ q = γ −1 . In conclusion, for
each nth root of unity γ, (x − γ)(x − γ −1 ) is a polynomial over Fq .
Let β be an nth primitive root of unity. Let
n
− a+2
r+1
2
d−2
g(x) =
2
Y
Y
(x − β i ) ×
(x − β (r+1)j ).
j= a+2
2
i=− d−2
2
d−2
We first show that g(x) is defined over Fq . If β i is a root of g(x), then either − d−2
2 6 i 6 2 or (r + 1)|i.
This implies that both β i and β −i are the roots of g(x). Thus, g(x) is the product of x − 1 with some
polynomials of the form (x − β i )(x − β −i ). We conclude that g(x) is defined over Fq . It is clear that
g(x)|(xn − 1) since all roots of g(x) are nth roots of unity and they are distinct. Denote by C the cyclic
d−2
d−2
code with generator polynomial g(x). Due to the fact that g(x) contains the d − 1 roots β − 2 , . . . , β 2 ,
it follows from Lemma 2.1(i) that C has the minimum distance at least d. Moreover, the dimension of C is
n
rn
k := n − deg(g(x)) = n − r+1
− (d − a − 2) = r+1
− ar − b + 2. Thus, we have
n−k−
n
−b + 2
n
k
+ ar + b − 2 −
−a+
+2=
+ 2 = a(r + 1) + b = d.
r
r+1
r+1
r
To show that C satisfies the Singleton-type bound (1), it remains to show that the locality of C is r. By
Lemma 3.1, it is sufficient to show that the dual distance of C is at most r + 1. By Lemma 2.1(i), it is
n −1
.
sufficient to show that the cyclic code hh(x)i has minimum distance at most r + 1, where h(x) = xg(x)
Observe that
d−2
2
Y
n
g(x) = (x r+1 − 1)
(x − β i ).
i= 2−d
,(r+1)∤i
2
Then
d−2
h(x)
2
Y
(x − β i ) =
,(r+1)∤i
i= 2−d
2
xn − 1
x
n
r+1
−1
=
r
X
x
(r−i)n
r+1
i=0
is a codeword of hh(x)i and it has Hamming weight r + 1. This implies that C ⊥ has minimum distance at
most r + 1.
3.2
Proof of part (i) of Theorem 1.1
.
q−1
n
Proof. Let β ∈ F̄q be an nth primitive root of unity. Put α = β r+1 . Then α 6= 1 and αq−1 = (β n ) r+1 = 1,
n
i.e., α is an element of Fq \ {0, 1}. Let g(x) = (x − 1)(x r+1 − α).
Note that
!
r
X
n
in
r−i
(x r+1 − α)
α x r+1 = xn − αr+1 = xn − 1.
i=0
n
r+1
n
This means that x
− α is a factor of xn − 1. Furthermore, since gcd(x − 1, x r+1 − α) = 1, we have
n
g(x)|(x − 1). Let C be the cyclic code generated by g(x).
6
Let us first show that the locality of C is r. By Lemma 3.1, it is sufficient to show that the Hamming
n −1
distance of C ⊥ is at most r + 1. Put h(x) = xg(x)
. By Lemma 2.1(i), it is sufficient to show that the
Hamming distance of hh(x)i is at most r + 1 since hh(x)i and C ⊥ are equivalent. Consider the codeword
in
P
(x − 1)h(x) of hh(x)i. As (x − 1)h(x) = ri=0 αr−i x r+1 , the Hamming weight of (x − 1)h(x) is r + 1.
Hence, the Hamming distance of hh(x)i is upper bounded by r + 1.
Finally, as 1, β are roots of g(x), the minimum distance is at least 3 by Lemma 2.1(iii). By the bound
(1), the minimum distance of C is upper bounded by 3. Thus, the minimum distance of C is exactly 3. This
completes the proof.
3.3
Proof of part (ii) of Theorem 1.1
.
q−1
n
Proof. Let β ∈ F̄q be an nth primitive root of unity. Put α = β r+1 . Then α 6= 1 and αq−1 = (β n ) r+1 =
1, i.e.,
α is an element of Fq \ {0, 1}. Furthermore, α is a (r + 1)th primitive root of unity. Since
gcd
Then
n
r+1 , r
+ 1 divides 2, there exist integers a, b such that a ×
n
n
r+1
+ b(r + 1) = 2. Put γ = αa ∈ Fq .
an
γ r+1 = α r+1 = α2−b(r+1) = α2 .
As r > 3, we must have γ ∈ Fq \ {0, 1}. Since γ is a (r + 1)th root of unity, the linear polynomial (x − γ)
n
n
2 − α 6= 0, i.e, x − γ is not a factor of x r+1 − α. This
−
α
=
α
divides xn − 1. Furthermore, we have γ r+1
n
implies that g(x) := (x − 1)(x − γ)(x r+1 − α) is a divisor of xn − 1. Let C be the q-ary cyclic code of
length n generated by g(x).
By Lemma 3.1, to show that the locality of C is r, it is sufficient to show that the Hamming distance of
n −1
⊥
. Then by Lemma 2.1(i), it is sufficient to show that the Hamming
C is at most r + 1. Put h(x) = xg(x)
distance of hh(x)i is at most r + 1 since hh(x)i and C ⊥ are equivalent. Consider the codeword (x − 1)(x −
in
P
γ)h(x) of hh(x)i. Since (x−1)(x−γ)h(x) = ri=0 αr−i x r+1 , the Hamming weight of (x−1)(x−γ)h(x)
is r + 1. Hence, the Hamming distance of hh(x)i is upper bounded by r + 1.
Now, we claim that the cyclic code C generated by g(x) has minimum distance at least 4. We prove
this claim by contradiction. Suppose that the minimum distance of C were at most 3. Then there exists a
nonzero polynomial c(x) = c0 + c1 xj + c2 xk ∈ C with 0 < j < k 6 n − 1 divisible by g(x). Since
n
β, β r+2 , β 1+2(r+1) are roots of x r+1 − α and hence roots of g(x), by Lemma 2.1(ii) we have
1
βj
βk
0 = det 1 β j β (r+1)j β k β (r+1)k = β j+k (β (r+1)j − 1)(β (r+1)k − 1)(β (r+1)j − β (r+1)k ). (2)
1 β j β 2(r+1)j β k β 2(r+1)k
This forces that n|j(r + 1) or n|(k − j)(r + 1) or n|k(r + 1) since β ∈ F̄q is an nth primitive root of unity.
We claim that each of these three divisibilities leads to both n|j(r + 1) and n|k(r + 1).
Case 1. n|j(r + 1).
Since 1, β, β r+2 are also the roots of c(x), by Lemma 2.1(ii) we have
1
1
1
= (β j − 1)(β k(r+2) − 1) − (β k − 1)(β j(r+2) − 1) = 0.
βj
βk
det 1
(3)
(r+2)j
(r+2)k
1 β
β
7
By using the condition β j(r+1) = 1, Equation (3) is simplified to
0 = (β j − 1)(β k(r+2) − 1) − (β k − 1)(β j(r+2) − 1)
= (β j − 1)(β k(r+2) − 1) − (β k − 1)(β j − 1)
= (β j − 1)(β k(r+2) − β k ) = β k (β j − 1)(β k(r+1) − 1).
Observe that β is a primitive nth root of unity and 0 < j < n. It follows that β k(r+1) = 1, or equivalently
n|k(r + 1).
Case 2. n|(k − j)(r + 1).
By using the condition β (k−j)(r+1) = 1, i.e., β j(r+1) = β k(r+1) , Equation (3) is simplified to
0 = (β j − 1)(β k(r+2) − 1) − (β k − 1)(β j(r+2) − 1)
= (β j − 1)(β j(r+1)+k − 1) − (β k − 1)(β j(r+2) − 1)
= (β k − β j )(1 − β j(r+1) ) = β j (β k−j − 1)(1 − β j(r+1) ).
Since 0 < k 6= j < n, we must have n|j(r + 1). This gives β k(r+1) = β j(r+1) = 1. Therefore, we have
n|k(r + 1) as well.
Case 3. n|k(r + 1).
In this case, we can mimic the proof of Case 1 by swapping j and k.
All three cases lead to the conclusion that n|k(r + 1) and n|j(r + 1). Set h1 =
Then h1 6= h2 ∈ {1, 2, . . . , r}. Moreover, we have the following four identities.
n
αh1 = β r+1 ×h1 = β j ;
n
n
αh2 = β r+1 ×h2 = β k ;
α2h1 = γ r+1 ×h1 = γ j ;
j(r+1)
n
and h2 =
k(r+1)
n .
n
α2h2 = γ r+1 ×h2 = γ k .
Finally, we notice that 1, β, γ are the roots of c(x). By Lemma 2.1(ii), this gives
1 1 1
1
1
1
0 = det 1 β j β k = det 1 αh1 αh2 = (αh1 − 1)(αh2 − 1)(αh1 − αh2 ).
1 γj γk
1 α2h1 α2h2
This is a contradiction due to fact that α is a (r + 1)th primitive root of unity and h1 6= h2 ∈ {1, 2, . . . , r}.
The minimum distance of C is at most 4 by the bound (1). The proof is completed.
3.4 A locally reparable codes of length 2(q − 1) and distance 4
Finally, we present a q-ary optimal locally repairable code of length n = 2(q − 1) and minimum distance 4.
Theorem 3.4. If r + 1 divides 2(q − 1), then there exists a q-ary optimal [n = 2(q − 1), n −
locally repairable code with locality r + 1.
n
r+1
− 2, 4]
n
Proof. Let β ∈ F̄q be a nth primitive root of unity. Then β 2 is an element of Fq . Put α = β r+1 . Then α 6= 1
q−1
n
and αq−1 = (β n ) r+1 = 1, i.e., α is an element of Fq \ {0, 1}. Let g(x) = (x − 1)(x − β 2 )(x r+1 − α). It is
straightforward to verify that g(x) is a divisor of xn − 1. Let C be the cyclic code with generator polynomial
g(x).
By the similar augments in the proof of Theorem 1.1(i), one can show that dual code of C has minimum
distance at most r + 1.
Since 1, β, β 2 are roots of g(x), C has distance at least 4.
It is easy to check that code C meets the Singleton-type bound (1). The proof is completed.
8
References
[1] A. Barg, I. Tamo, and S. Vlăduţ, Locally recoverable codes on algebraic curves, IEEE Trans. Inform.
Theory 63(8)(2017), 4928–4939. 1
[2] A. Barg, K. Haymaker, E. Howe, G. Matthews, and A. Vrilly-Alvarado, Locally recoverable codes
from algebraic curves and surfaces, in Algebraic Geometry for Coding Theory and Cryptography,
E.W. Howe, K.E. Lauter, and J.L. Walker, Editors, Springer, 2017, pp. 95–126. 1, 2
[3] M. Forbes and S. Yekhanin, On the locality of codeword symbols in non-linear codes, Discrete Mathematics 324(6)(2014), 78–84. 1
[4] P. Gopalan, C. Huang, H. Simitci and S. Yekhanin, On the locality of codeword symbols, IEEE Trans.
Inf. Theory 58(11)(2012), 6925–6934. 1
[5] J. Han and L. A. Lastras-Montano, Reliable memories with subline accesses, Proc. IEEE Internat.
Sympos. Inform. Theory, 2007, 2531–2535. 1
[6] C. Huang, M. Chen, and J. Li, Pyramid codes: Flexible schemes to trade space for access efficiency
in reliable data storage systems, Sixth IEEE International Symposium on Network Computing and
Applications, 2007, 79–86. 1
[7] L. Jin, L. Ma and C, Xing, Construction of optimal locally repairable codes via automorphism groups
of rational function fields, https://arxiv.org/abs/1710.09638. 1, 2, 5
[8] X. Li, L. Ma and C. Xing, Optimal locally repairable codes via elliptic curves,
https://arxiv.org/abs/1712.03744. 1, 2
[9] S. Ling and C. Xing, “Coding Theory–a first course”, Cambridge, 2004. 3
[10] F. J. MacWilliams and N. J. A. Sloane, “The Theory of Error-Correcting Codes”, North-Holland, 2006.
3
[11] D. S. Papailiopoulos and A.G. Dimakis, Locally repairable codes, IEEE Trans. Inf. Theory
60(10)(2014), 5843–5855. 1
[12] N. Prakash, G.M. Kamath, V. Lalitha and P.V. Kumar, Optimal linear codes with a local-errorcorrection property, Proc. 2012 IEEE Int. Symp. Inform. Theory, 2012, 2776–2780. 1, 2
[13] N. Silberstein, A.S. Rawat, O.O. Koyluoglu and S. Vichwanath, Optimal locally repairable codes via
rank-matric codes, Proc. IEEE Int. Symp. Inf. Theory, 2013, 1819–1823. 1
[14] I. Tamo and A. Barg, A family of optimal locally recoverable codes, IEEE Trans. Inform. Theory
60(8)(2014), 4661–4676. 1, 2, 4
[15] I. Tamo, D.S. Papailiopoulos and A.G. Dimakis, Optimal locally repairable codes and connections to
matroid theory, IEEE Trans. Inform. Theory 62(12)(2016), 6661–6671. 1
9
| 7cs.IT
|
arXiv:1707.05021v2 [math.ST] 16 Nov 2017
Strong Local Nondeterminism of Spherical
Fractional Brownian Motion
Xiaohong Lan ∗
School of Mathematical Sciences
University of Science and Technology of China
Yimin Xiao †
Department of Statistics and Probability
Michigan State University
November 17, 2017
Abstract
Let B = B (x) , x ∈ S2 be the fractional Brownian motion indexed
by the unit sphere S2 with index 0 < H ≤ 21 , introduced by Istas [12].
We establish optimal upper and lower bounds for its angular power spectrum {dℓ , ℓ = 0, 1, 2, . . .}, and then exploit its high-frequency behavior to
establish the property of its strong local nondeterminism of B.
Key words: Angular power spectrum, Karhunen-Loève expansion, Spherical fractional Brownian motion, Strong local nondeterminism.
2010 Mathematics Subject Classification: 60G60, 60G22, 60G17.
1
Introduction
The spherical fractional Brownian motion (SFBM, for brevity) was introduced
by Istas in 2005 [12], as an extension of the spherical Brownian motion of Lévy
[18] as well as a spherical analogue of fractional Brownian motion indexed by the
Euclidean spaces. Later Istas [13, 14] established the Karhunen-Loève expansion
and studied quadratic variations of the spherical fractional Brownian motion.
The purpose of this paper is to investigate the property of strong local nondeterminism (SLND) for the spherical fractional Brownian motion. This is motivated by studies of sample path properties of Gaussian random fields indexed
by the Euclidean space RN and by the currently increasing interest in stochastic
∗ Corresponding author. Research of X. Lan is supported by NSFC grants 11501538. Email: [email protected]
† Research of Y. Xiao is partially supported by NSF grants DMS-1612885 and DMS1607089. E-mail: [email protected]
1
modeling of spherical data in statistics, cosmology and other applied areas (see
below).
The concept of local nondeterminism (LND) of a Gaussian process was first
introduced by Berman [3] to unify and extend his methods for studying the
existence and joint continuity of local times of real-valued Gaussian processes.
Roughly speaking, a Gaussian process is said to have the LND property if has
locally approximately independent increments, see [3, Lemma 2.3] for precise
description. This property allowed Berman to overcome some difficulties caused
by the complex dependence structure of a non-Markovian Gaussian process
for studying its local times. Pitt [24] and Cuzick [6] extended Berman’s LND
to Gaussian random fields. However, the property of LND is not enough for
establishing fine regularity properties such as the law of the iterated logarithm
and the uniform modulus of continuity for the local times or self-intersection
local times of Gaussian random fields. For studying these and many other
problems on Gaussian random fields, the appropriate properties of strong local
nondeterminism (SLND) have proven to be more powerful. Instead of recalling
definitions of various forms of strong local nondeterminism for (isotropic or
anisotropic) Gaussian random fields indexed by RN and their applications, we
refer to Xiao [26, 27, 28] for more information.
Recently, Lan, Marinucci and Xiao [16] have studied the SLND property of
a class of Gaussian random fields indexed by the unit sphere S2 , which are also
called spherical Gaussian random fields. The main difference between [16] and
the aforementioned work for Gaussian fields indexed by the Euclidean space is
that [16] takes the spherical geometry of S2 into full consideration and its method
relies on harmonic analysis on the sphere. More specifically, Lan, Marinucci and
Xiao have considered a centered isotropic Gaussian random field T = {T (x), x ∈
S2 }. That is, T satisfies
E T (x)T (y) = E T (gx)T (gy)
(1)
for all g ∈ SO(3) which is the group of rotations in R3 . See [20] for a systematic
account on random fields on S2 . By applying harmonic analytic tools on the
sphere, Lan, Marinucci and Xiao [16] have proved that the SLND property of an
isotropic Gaussian field T on S2 is determined by the high-frequency behavior of
its angular power spectrum. Moreover, by applying SLND, they have established
exact uniform modulus of continuity for a class of isotropic Gaussian fields on
S2 .
Since SFBM B = B (x) , x ∈ S2 is not isotropic in the sense of (1), the
results on SLND in [16] are not directly applicable. In our approach we will
make use of the Karhunen-Loève expansion of the spherical fractional Brownian motion obtained by Istas [13] and derive optimal upper and lower bounds
for the coefficients {dℓ , ℓ = 0, 1, . . .} (see (7) below for the definition). These
bounds for {dℓ } correct the last part of Theorem 1 in [13] and will be useful for
studying the dependence structures and sample path properties of SFBM. This
paper provides an important step towards this direction. More specifically, we
demonstrate that the coefficients {dℓ } play the same role as the angular power
2
spectrum of an isotropic Gaussian field on S2 in [16] and their high frequency
behavior determines the property of strong local nondeterminism of SFBM. For
this reason, we will also call the sequence {dℓ , ℓ = 0, 1, . . .} the angular power
spectrum of SFBM.
Similarly to the cases of Gaussian random fields indexed by the Euclidean
space RN (cf. [26, 27, 28]), we expect that the SLND property in Theorem
3.2 will be useful for studying regularity (e.g., the exact modulus of continuity,
exact modulus of nondifferentiability, etc) and fractal properties of SFBM. This
will be carried out in a subsequent paper [17].
Our analysis on SFBM and other spherical Gaussian random fields is strongly
motivated by applications in a number of scientific areas, such as geophysics, astrophysics, cosmology, and atmospheric sciences (see e.g. [2, 4, 7, 8]). Huge data
sets from satellite missions such as the Wilkinson Microwave Anisotropy Probe
(WMAP ) of NASA (see http://map.gsfc.nasa.gov/) and the Planck mission of
the European Space Agency (see http://sci.esa.int/planck/53103-planck-cosmology/)
have been collected and made publicly available. Spherical random fields (usually assumed to be Gaussian) have been proposed for modeling such data sets.
Related to aforementioned aspects, we also mention that in probability and
statistics literature various isotropic or anisotropic Gaussian random fields on
S2 have been constructed and studied (see e.g. [9, 10, 11, 15, 23]). Excursion
probabilities and topological properties of excursion sets of isotropic Gaussian
random fields on S2 have been studied in [5, 21]. Many interesting questions
on probabilistic and statistical properties of anisotropic Gaussian random fields
on the sphere can be raised. In order to study these problems. it would be
interesting to establish appropriate properties of strong local nondeterminism
for anisotropic Gaussian random fields on S2 .
The rest of the paper is organized as follows. In Section 2, we recall briefly
some background material on SFBM, including its Karhunen-Loève expansion
from [13], and an analysis of its random coefficients. Our main result in this
section is Theorem 2.2, which provides optimal upper and lower bounds for the
angular power spectrum {dℓ , ℓ = 0, 1, . . .} of SFBM. In Section 3, we combine
the high frequency behavior of {dℓ } and Proposition 7 in [16] to establish the
property of strong local nondeterminism for SFBM.
2
SFBM and asymptotic behavior of its angular
power spectrum
Let N be the North pole on S2 , and dS2 (x, y) the geodesic distance between x
and y on S2 . Recall from Istas [12] the definition of SFBM.
Definition 2.1 The SFBM B = B (x) , x ∈ S2 is a centered Gaussian random field with
B (N ) = 0, a.s.
(2)
and
2
2H
E [B (x) − B (y)] = dS2 (x, y)
3
,
(3)
for any x, y ∈ S2 and 0 < H ≤ 21 .
It is well known that fractional Brownian motion indexed by Rd can be
defined for every 0 < H ≤ 1. This is different from the case when the index
set is S2 . Istas [12] proved that SFBM exists if and only if the Hurst index
H ∈ (0, 12 ]. When H = 12 , it is the classical Lévy spherical Brownian motion,
see [18, 22].
Our work is based on the following Karhunen-Loève expansion of B (x) ,
x ∈ S2 proved by Istas [13, Theorem 1]:
∞ X
ℓ
X
p
i πdℓ εℓm (Yℓm (x) − Yℓm (N )) .
B (x) =
(4)
ℓ=0 m=−ℓ
Here {Yℓm : ℓ = 0, 1, ..., m = −ℓ, ..., ℓ} are the spherical harmonic functions on
S2 ; that is, they are eigenfunctions of the spherical Laplacian:
1 ∂
∂
1 ∂2
∆S2 =
,
sin θ
+
sin θ ∂θ
∂θ
sin2 θ ∂φ2
where (θ, φ) ∈ [0, π] × [0, 2π) denotes the spherical coordinates of x ∈ S2 . More
precisely, {Yℓm : ℓ = 0, 1, ..., m = −ℓ, ..., ℓ} satisfy
∆S2 Yℓm (θ, φ) = −ℓ(ℓ + 1)Yℓm (θ, φ).
It is known (cf. [20]) that {Yℓm
: ℓ = 0, 1, ..., m = −ℓ, ..., ℓ} form an orthonormal
basis for the space L2 S2 , dσ , where dσ = sin θdθdφ is the Lebesgue measure
on S2 . An explicit form for spherical harmonics is given by
s
2ℓ + 1 (ℓ − m)!
Pℓm (cos θ) eimφ , for m ≥ 0,
Yℓm (θ, φ) =
4π (ℓ + m)!
(5)
m
Yℓm (θ, φ) = (−1) Y ℓ,−m (θ, φ) ,
for m < 0,
where z denotes the complex conjugate of z ∈ C, and Pℓm (cos ϑ) are the associated Legendre functions (cf. [20, pp.315–316]) defined in terms of the Legendre
polynomials {Pℓ , ℓ = 0, 1, . . .} as
Pℓm (x) = (−1)m (1 − x2 )m/2
dm
Pℓ (x)
dxm
for m = 0, 1, . . . , ℓ, and
Pℓm (x) = (−1)m
(ℓ − m)!
Pℓ,−m (x)
(ℓ + m)!
for m negative. Moreover, the following orthonormality property holds:
Z
′
′
Ylm (x) Y l′ m′ (x) dσ (x) = δ ll δ m
m .
S2
4
(6)
by
Now recall from [13] that, for all ℓ ≥ 0, the coefficients dℓ in (4) are defined
Z
1
2H
dℓ =
dS2 (x, N ) Pℓ (hx, N i) dσ (x) ,
(7)
2π S2
where h·, ·i is the usual inner product in R3 . Similarly to the angular power spectrum of an isotropic Gaussian random field on S2 , the sequence {dℓ , ℓ = 0, 1, 2, ...}
plays an important role in determining the dependence structure and other probabilistic properties of the SFBM {B (x) , x ∈ S2 }. Hence we will also refer to
{dℓ , ℓ = 0, 1, 2, ...} as the angular power spectrum of SFBM.
Moreover, it follows from Theorem 1 ofIstas [13] that the Karhunen-Loève
expansion (4) holds in L2 S2 × Ω, dσ ⊗ P sense and in L2 (P) sense for every fixed x ∈ S2 . Hence one can represent the random coefficients εℓm , ℓ =
0, 1, ..., m = −ℓ, ..., ℓ in (4) by
Z
−1/2
εℓm = −i (πdℓ )
B(x)Yℓm (x)dσ(x),
S2
where the equality holds in L2 (P) sense. Notice that {εℓm }lm is a set of complexvalued Gaussian random variables. Obviously, E (εℓm ) = 0 for all ℓ, m, due to
the zero-mean property of B(x). Moreover, recall (5) and (6), we can verify that
m
1
εℓm = (−i) εℓ,−m and E (εℓ1 m2 εℓ2 m2 ) = δ ℓℓ12 δ m
m2 .
(8)
Therefore, {εℓm , ℓ ≥ 0, m = 0, 1, ..., ℓ} is a set of i.i.d. standard complex Gaussian random variables.
The following is the main result of this section. The bounds in (9) correct
the last part of Theorem 1 in [13]. The high-frequency behavior of dℓ in (9) is
essential for proving the SLND property of B in Theorem 3.2 below. Together,
they will allow us to study precise analytic and geometric properties of the
sample functions of SFBM. See [17] for further information.
Theorem 2.2 Let B(x), x ∈ S2 be the spherical fractional Brownian motion
of index H ∈ (0, 1/2]. There exists a uniform constant K1 such that
K1−1 ≤ d0 ≤ K1
K1−1 ℓ−(2H+2) ≤ dℓ ≤ K1 ℓ−(2H+2)
for all ℓ = 1, 2, ....
(9)
Proof. We work in spherical coordinates (θ, φ) with θ ∈ [0, π] and φ ∈ [0, 2π] .
By the definition of dℓ in (7) and a change of variable x = cos θ we obtain
Z π
dℓ =
θ2H Pℓ (cos θ) sin θdθ.
(10)
0
Recall from [13] the Dirichlet-Mehler representation for Pℓ (cos θ) (0 < θ < π),
√ Z π
sin (ℓ + 12 )ϕ
2
√
Pℓ (cos θ) =
dϕ,
π θ
cos θ − cos ϕ
5
we see that (10) becomes
√ Z π
Z π
sin ℓ + 12 ϕ
2
√
dℓ =
dϕdθ
θ 2H sin θ
π 0
cos θ − cos ϕ
θ
#
√ Z π
"Z ϕ
1
θ 2H sin θ
2
√
ϕ
sin
ℓ+
=
dθ dϕ.
π 0
2
cos θ − cos ϕ
0
From the elementary fact that sin θ2 ≤
0 ≤ θ ≤ π, it follow that
θ
sin
2
2H
h
≤ θ 1−
2H
2H
θ
θ
2H
≤
≤ 2 · sin
,
2
2
Hence, we have
Z
0
1
6
θ 2
2
i
≤ 2 sin 2θ for all
0 ≤ θ ≤ π.
deℓ ≤ dℓ ≤ 22H deℓ ,
where
22H+1/2
deℓ =
π
θ
2
π
(11)
2H
Z ϕ
sin θ2
sin θ
1
√
dθdϕ.
ϕ
sin
ℓ+
2
cos θ − cos ϕ
0
Meanwhile, by a change of variable u = sin 2θ in the inside integral, we have
Z
0
ϕ
2H
Z sin ϕ2
sin 2θ
sin θ
u2H+1
3
2
√
q
du
dθ = 2
cos θ − cos ϕ
0
sin2 ϕ2 − u2
Z
ϕ 2H+1 1 v H
1
2
√
= 2 sin
dv
2
1−v
0
1
1
ϕ 2H+1
sin
= 2 2 B H + 1,
,
2
2
where B (·, ·) is the Beta function defined on R+ × R+ . Consequently,
Z π
22H+1
ϕ 2H+1
1
1
e
dℓ =
ϕ sin
dϕ.
B H + 1,
sin
ℓ+
π
2
2
2
0
For ℓ = 0,
(12)
Z π
1
ϕ 2H+2
22H+1
dϕ,
B H + 1,
sin
de0 =
π
2
2
0
which is readily seen that de0 ≤ 8. For ℓ ≥ 1, we will make use of some
techniques from complex analysis. Let z = eiϕ/2 , then the integral in (12) can
be written as
Z π
Z
1
ϕ 2H+1
sin
ℓ+
ϕ
sin
(13)
dϕ = 2 Im fℓ (z) dz,
2
2
0
C
6
where C = z : z = eit , 0 ≤ t ≤ π/2 is the unit circle in the first quadrant with
the direction counterclockwise and fℓ (z) is the principal branch of the complex
function
2H+1
z 2ℓ
1
Fℓ (z) = 2H 2H+1 z −
, z ∈ C,
2 i
z
Obviously, fℓ (z) is analytic in C\ {0, ±1}. Moreover, let ǫ > 0 be an arbitary
small value, L1 and L2 the two line segments defined by
L1 = {z : z = i (1 − t) , ǫ ≤ t ≤ 1}
and
L2 = {z : z = t, ǫ ≤ t ≤ 1 − ǫ} ;
Meantime, let C1 and C2 be the circles with radius ǫ in the first and second
quadrants, defined respectively by
C1 = z : z = ǫeit , 0 ≤ t ≤ π/2
and
n
o
C2 = z : z = ǫei(π−t) + 1, 0 ≤ t ≤ π/2 .
Now consider the following integrals
Z
Z
h
i2H+1
i2ℓ−2H−1 1
2
2ℓ−2H−1
−
(1
−
t)
−
1
(1
−
t)
dt
fℓ (z) dz =
22H i2H+1 ǫ
L1
Z
2H+1
(−1)ℓ 1 2ℓ−2H−1 2
=
dt,
u
u +1
2H
2
ǫ
Z
fℓ (z) dz
Z 1
2H+1
1
dt
t2ℓ−2H−1 t2 − 1
2H
2H+1
2 i
ǫ
Z
i2H+1 1
ℓ−H−1/2 2H+1
(1 − v)
v
dt,
22H ǫ
=
L2
=
and
Z
fℓ (z) dz =
C1
Z
C2
fℓ (z) dz =
1
2H
2 i2H+1
1
22H i2H+1
Z
0
Z
0
π
2
π
2
2ℓ−2H−1
2H+1
ǫ2 e2i(π−t) − 1
dt,
ǫei(π−t)
2H+1
2ℓ−2H−1
dt.
ǫ2 e2i(π−t) + 2ǫei(π−t)
1 + ǫei(π−t)
Careful calculations show that
Z
Z
fℓ (z) dz = 0, lim
Im
L1
ǫ→0
Cj
7
fℓ (z) dz = 0, j = 1, 2
(14)
and
lim
ǫ→0
Z
fℓ (z) dz =
L2
i2H+1
B (2H + 2, ℓ − H + 1/2)
22H
(15)
Thus, by the Cauchy integral theorem in complex analysis, we have
Z
Z
fℓ (z) dz = − lim
fℓ (z) dz
C
ǫ→0
= − lim
ǫ→0
Z
L1 +C1 +L2 +C2
L1
fℓ (z) dz −
i2H+1
1
B
2H
+
2,
ℓ
−
H
+
22H
2
which leads to that
Z
1
1
sin H +
π .
Im fℓ (z) dz = 2−2H−1 B 2H + 2, ℓ − H +
2
2
C
(16)
in view of the equalities (14) and (15). Therefore, by combining the equalities
(16) and (12), (13) above, we obtain that
1
1
2
1
B 2H + 2, ℓ − H +
sin H +
π .
deℓ = B H + 1,
π
2
2
2
Here, recall the formula
B (a, b) =
Γ (a) Γ (b)
, a > 0, b > 0
Γ (a + b)
with Gamma function Γ (y) = (y − 1) Γ (y − 1) for any y > 1 and the stirling’s
approximation
y y
p
1
1+O
, as y → ∞,
Γ (y) = 2πy
e
y
where the error term O y1 being the same order as y1 , we derive the following
estimates: there exists a uniform constant C1 such that for any ℓ ≥ 1,
C1−1 ℓ−(2H+2) ≤ deℓ ≤ C1 ℓ−(2H+2) .
Let K1 = 2C1 , then the inequalities in (9) are derived in view of (11).
3
Strong local nondeterminism
In order to prove the strong local nondeterminism property of B (x) , x ∈ S2 ,
we first recall the following lemma, which is a consequence of Proposition 7 in
[16].
8
Lemma 3.1 Assume a sequence {dℓ , ℓ = 0, 1, ...} satisfies the condition (9).
Then there exists a constant C2 > 0 depending on H only, such that for all
choices of n ∈ N, all x, x1 , ..., xn ∈ S2 , and γ j ∈ R, j = 1, 2, ..., n, we have
∞ X
ℓ
X
ℓ=0 m=−ℓ
2
n
X
γ j Yℓm (xj ) ≥ C2 ε2H ,
dℓ Yℓm (x) −
(17)
j=1
where ε = min {dS2 (x, xk ) , k = 1, ..., n}.
Now we are ready to state and prove the following theorem. Its conclusion
is referred to as the property of strong local nondeterminism of SFBM
B (x) , x ∈ S2 .
Theorem 3.2 For a SFBM B (x) , x ∈ S2 , there exists a constant K2 > 0
depending only on the Hurst index H ∈ (0, 1/2], such that for all integers n ≥ 1
and all x, x1 , ..., xn ∈ S2 , we have
Var (B (x) |B (x1 ) , ..., B (xn )) ≥ K2 min dS2 (x, xk )
0≤k≤n
2H
,
(18)
where Var (B (x) |B (x1 ) , ..., B (xn )) denotes the conditional variance of B(x)
given B (x1 ) , ..., B(xn ), and x0 = N .
Remark 3.3 Note that the strong local nondeterminism (18) here is slightly
different from the SLND property proved in [16] for isotropic Gaussian random
fields: the minimum on the right hand side of (18) is not only taken over
x1 , ..., xn but also over x0 = N . This is because of the assumption B (N ) = 0 in
the definition of SFBM. From statistics viewpoint, Var (B (x) |B (x1 ) , ..., B (xn ))
is the squared error of predicting the value B(x), given observations of B at
locations x1 , . . . , xn . Since we already know that B (N ) = 0, this information
may reduce the prediction error.
Proof of Theorem 3.2. It is known that for a Gaussian random field B,
n
2
X
γ j B(xj )
,
Var (B(x)|B (x1 ) , ..., B (xn )) = inf E B(x) −
j=1
where the infimum is taken over all (γ 1 , ..., γ n ) ∈ Rn . Hence, in order to establish
(18), it is sufficient to prove that there exists a positive constant C3 such that
n
2
X
γ j B(xj )
≥ C3 ε2H
E B(x) −
(19)
j=1
holds for all γ 1 , ..., γ n ∈ R, where ε = min {dS2 (x, xk ) , k = 0, ..., n} . Let γ 0 =
n
X
γ j , then it follows from the Karhunen-Loève expansion (4) of B (x) and
1−
j=1
9
the properties of random coefficients {εℓm }lm in (8) that the left hand side of
(19) is equal to
( ∞ ℓ
)
n
2
X X p
X
E
γ j Yℓm (xj )
i πdℓ εℓm Yℓm (x) −
j=0
ℓ=0 m=−ℓ
=
∞ X
ℓ
X
ℓ=0 m=−ℓ
=π
πdℓ E |εℓm |
∞ X
ℓ
X
ℓ=0 m=−ℓ
2
dℓ Yℓm (x) −
Yℓm (x) −
n
X
n
X
2
γ j Yℓm (xj )
(20)
j=0
2
γ j Yℓm (xj ) ,
j=0
where x0 = N. Therefore (19) is an immediate consequence of Lemma 3.1 in
view of the equalities (20). This completes the proof of (18).
References
[1] Adler, R. J. and Taylor, J. E. (2007). Random Fields and Geometry.
Springer, New York.
[2] Alkhaled, A. A., Michalak, A. M., Kawa, S. R., Olsen, S. C. and Wang, J.W. (2008). A global evaluation of the regional spatial variability of column
integrated CO2 distributions. J Geophys Res 113: D20303.
[3] Berman, S. M. (1973), Local nondeterminism and local times of Gaussian
processes. Indiana Univ. Math. J. 23, 69–94.
[4] Cabella, P. and Marinucci, D. (2009). Statistical challenges in the analysis
of Cosmic Microwave Background radiation. Ann. Appl. Statist. 2, 61–95.
[5] Cheng, D. and Xiao, Y. (2016). Excursion probability of Gaussian random
fields on sphere. Bernoulli 22, 1113–1130.
[6] Cuzick, J. (1982), Multiple points of a Gaussian vector field. Z. Wahrsch.
Verw. Gebiete 61, 431–436.
[7] de Boyer Montégut, C., Madec, G., Fischer, A. S., Lazar, A. and Iudicone,
D. (2004). Mixed layer depth over the global ocean: an examination of
profile data and a profile-based climatology. J. Geophys. Res. 109, C12003.
[8] Dodelson, S. (2003). Modern Cosmology. Academic Press.
[9] Estrade, A. and Istas, J. (2010). Ball throwing on spheres. Bernoulli 16,
953–970.
[10] Huang, C., Zhang, H. and Robeson S. M. (2011). On the validity of
commonly used covariance and variogram functions on the sphere. Math.
Geosci. 43, 721–733.
10
[11] Huang, C., Zhang, H. and Robeson S. M. (2012). A simplified representation of the covariance structure of axially symmetric processes on the
sphere. Stat. Prob. Lett. 82, 1346–1351.
[12] Istas, J. (2005). Spherical and hyperbolic fractional Brownian motion.
Elect. Comm. Probab. 10, 254–262.
[13] Istas, J. (2006). Karhunen-Loève expansion of spherical fractional Brownian
motions. Statist. Probab. Lett. 76, 1578–1583.
[14] Istas, J. (2007). Quadratic variations of spherical fractional Brownian motions. Stoch. Process. Appl. 117, 476–486.
[15] Jun, M. and Stein, M. L. (2008). Nonstationary covariance models for global
data. Ann. Appl. Statist. 2, 1271–1289.
[16] Lan, X., Marinucci, D. and Xiao, Y. (2016). Strong local nondeterminism and exact modulus of continuity for spherical Gaussian fields, Stoch.
Process. Appl., accepted, arXiv:1603.03642.
[17] Lan, X. and Xiao, Y. (2017). Exact moduli of continuity and nonwhere
differentiability of spherical fractional Brownian motion. In Preparation.
[18] Lévy, P. (1965). Processus Stochastiques et Mouvement Brownien,
Gauthier-Villars.
[19] Marcus, M. B. and Rosen J. (2006). Markov Processes, Gaussian Processes,
and Local Times, Cambridge University Press, Cambridge.
[20] Marinucci, D. and Peccati, G. (2011). Random Fields on the Sphere. Representation, Limit Theorem and Cosmological Applications, Cambridge University Press, Cambridge.
[21] Marinucci, D. and Vadlamani, S. (2016). High-frequency asymptotics for
Lipschitz-Killing curvatures of excursion sets on the sphere. Ann. Appl.
Probab. 26, 462–506.
[22] Noda, A. (1987). Generalized Radon transform and Lévy’s Brownian motion. Nagoya Math. J. 105, 71–87.
[23] Panchenko, D. and Talagrand, M. (2007). On the overlap in the multiple
spherical SK models. Ann. Probab. 35, 2321–2355.
[24] Pitt, L. D. (1978), Local times for Gaussian vector fields. Indiana Univ.
Math. J. 27, 309–330.
[25] Stein, E. M. and Weiss, G. (1971). Introduction to Fourier Analysis on
Euclidean Spaces. Princeton University Press.
11
[26] Xiao, Y. (2007). Strong local nondeterminism and sample path properties
of Gaussian random fields. Asymptotic Theory in Probability and Statistics
with Applications (Tze Leung Lai, Qiman Shao, Lianfen Qian, editors), pp.
136–176, Higher Education Press, Beijing.
[27] Xiao, Y. (2009). Sample path properties of anisotropic Gaussian random
fields. In: A Minicourse on Stochastic Partial Differential Equations, (D.
Khoshnevisan and F. Rassoul-Agha, editors), Lecture Notes in Math. 1962,
pp. 145–212. Springer, New York.
[28] Xiao, Y. (2013). Recent developments on fractal properties of Gaussian
random fields. In: Further Developments in Fractals and Related Fields,
(J. Barral and S. Seuret, eds.) pp.255–288, Springer, New York.
12
| 10math.ST
|
arXiv:1205.6010v1 [q-bio.GN] 27 May 2012
The Chromatin Organization of an Eukaryotic Genome : Sequence
Specific+ Statistical=Combinatorial
(Extended Abstract)∗
Davide Corona†
Valeria Di Benedetto‡
Raffaele Giancarlo§
Filippo Utro¶
January 22, 2018
Abstract
Nucleosome organization in eukaryotic genomes has a deep impact on gene function. Although
progress has been recently made in the identification of various concurring factors influencing nucleosome
positioning, it is still unclear whether nucleosome positions are sequence dictated or determined by a
random process. It has been postulated for a long time that, in the proximity of TSS, a barrier determines
the position of the +1 nucleosome and then geometric constraints alter the random positioning process
determining nucleosomal phasing. Such a pattern fades out as one moves away from the barrier to become
again a random positioning process. Although this statistical model is widely accepted, the molecular
nature of the barrier is still unknown. Moreover, we are far from the identification of a set of sequence
rules able: to account for the genome-wide nucleosome organization; to explain the nature of the barriers
on which the statistical mechanism hinges; to allow for a smooth transition from sequence-dictated to
statistical positioning and back. Here we show that sequence complexity, quantified via various methods,
can be the rule able to at least partially account for all the above. In particular, we have conducted our
analyses on four high resolution nucleosomal maps of the model eukaryotes S.cerevisiae, C. elegans and
D.melanogaster, and found that nucleosome depleted regions can be well distinguished from nucleosome
enriched regions by sequence complexity measures. In particular, the depleted regions are less complex
than the enriched ones. Moreover, around TSS, complexity measures alone are in striking agreement
with in vivo nucleosome occupancy, in particular precisely indicating the positions of the +1 and -1
nucleosomes. Those findings indicate that the intrinsic richness of subsequences within sequences plays a
role in nucleosomal formation in genomes, and that sequence complexity constitutes the molecular nature
of nucleosome barrier.
1
Background
It is well known that chromatin organization in Eukaryotic genomes has a deep impact on gene regulation
and function, e.g., [1]. Therefore, it comes as no surprise that a substantial amount of research has been
devoted to this fascinating topic, with particular focus on the identification of nucleosome positions within
the genomes of model organisms and of mechanisms influencing that positioning. Although quite a bit
of progress has been made on the identification of various concurring factors that influence nucleosome
positioning [10], an answer to the question raised by Kornberg in 1981 [4] as to which extend nuclesome
positions are “sequence dictated” or determined by a random process has remained elusive. As a matter
∗ Work presented at the 8th SIBBM Seminar (Annual Conference Meeting of the Italian Biophysics and Molecular Biology
Society)- May 24-26 2012, Palermo, Italy
† Dulbecco Telethon Institute c/o Università di Palermo, Dipartimento di Biologia Cellulare e dello Sviluppo, Palermo, Italy;
[email protected]
‡ Università di Palermo, Dipartimento di Matematica ed Informatica, Palermo, Italy; [email protected]
§ Università di Palermo, Dipartimento di Matematica ed Informatica, Palermo, Italy; [email protected]
¶ Computational Genomics Group, IBM T.J. Watson Research Center, Yorktown Heights, USA; [email protected]
1
of fact, it has been the object of intense debate, in particular in view of a result by Widom et al. [9]
claiming that there exists a genomic code for nucleosome positioning. In mathematical terms, a code
is a very specific and constrained object, even when it is degenarate as the genetic code. Therefore, it
seems that a verbatim use of the term code in the context of chromatin studies would be quite misleading
and actually very easy to challenge, e.g., [11, 12]. Indeed, the focus has shifted from sequence dictating
to sequence influencing chromatin organization, a finding that is much less amenable to challenge and
dismissal [3]. In contrast to the “sequence dictating-influencing” debate just outlined, the statistical
positioning mechanism has had very little challenge. It is worth recalling that it is based on two main
ingredients: the existence of a barrier and of a statistical law governing the positioning of the nucleosomes
[5]. Generalizing the just mentioned earlier results by Kornberg and Stryer, Möbius and Gerland [8] have
shown that such a mechanism can be described and quantified by the Tonks model of statistical physics.
In particular, in the proximity of TSS [6, 8], the barrier determines the position of the +1 nucleosome and
then geometric constraints alter the random positioning process determining the well known nucleosomal
pattern in DNA. Such a pattern fades out as one moves away from the barrier to become again a random
positioning process. An analogous behaviour is followed by the -1 nucleosome.
2
Statement of Results
All of the above studies leave open several questions. Indeed, given the poor results in finding a consistent
and concise set of “sequence-rules” , e.g., [11, 12], that explain how the sequence influences nucleosome
positioning, it is a challenging problem to show that such a set of rules exists. Analogously, although
the statistical model is widely accepted [10, 12], the molecular nature of the barrier is unknown [12].
Moreover, the interplay between sequence-dictated vs statistical positioning has been hardly explored,
although it is to be expected that the true cellular state is probably a combination of both machanisms
[2]. A study by Mavrich et al. [6], performed on DNA regions around 4799 TSS in Yeast, addresses in
part this latter problem indicating that the sequence dictates the positioning of the so-called +1 and -1
nucleosomes, leaving the rest to the statistical positioning mechanism. In that study, an effort is also
made to identify some of the compositional properties of the nucleosome-free region (NFR) responsible for
the formation of the barriers. However, it is also pointed out that the identified sequence biases, mostly
for dinucleotides, may be special cases of more general, and yet unknown, properties of the genomic
sequences up and downstram of a TSS. In a nutshell, we are far from the identification of a concise set
of sequence rules able: (a) to account for the genome-wide nucleosome organization in a genome; (b) to
explaing the nature of the barriers on which the statistical mechanism hinges; (c) to allow for a smooth
transition from sequence-dictated to statistical positioning and back.
As said before, a code for nucleosome positioning seems to be too stringent. Fortunately, there are
other intrinsic properties of sequences, in particular the ones measured by complexity measures, that
may play a role in influencing nucleosomal organization in a eukaryotic genome. It is worth recalling
that complexity measures usually quantify the “intrinsic richness” of distinct subsequences within a given
sequence. Here we study whether sequence complexity, quantified via various methods, can be the rule
able to at least partially account for all (a)-(c) above. Towards this end, we have the following results.
(1) We have conducted extensive studies on four high resolution nucleosomal maps of three model
orgamisms, i.e., Yeast, C. Elegans and Drosophila Melanogaster [3, 7, 12], to obtain the following
results. Nucleosome depleted regions in each map can be well distinguished from nuclesome enriched
regions in each map by sequence complexity measures. In particular, the depleted regions are less
complex than the enriched ones. Such a finding indicates that the intrinsic richness of subsequences
within sequences plays a role in influencing nucleosomal formation in genomes, addressing point (a)
above.
(2) We have applied our methodology to the same TSS dataset of Mavrich et al. [6], and also accounted
for the additional insights by Möbius and Gerland [8]. We find that the NFR is characterized by
an area of lower complexity with respect to the two regions flanking it, with the TSS being placed
in the proximity of the absolute minimum of each complexity curve we have computed. The two
barriers are towards the local maxima at the left and right of the TSS. Particularly striking is the
complexity curve obtained with linguistic complexity, based on a dictionary of words of length up to
seventeen (therefore much larger than the one considered by Mavrich et al.). Indeed, the positions
of the +1 and -1 nucleosomes, respectively, are in the proximity of the first maximum to the right
2
and to the left, respectively, of the TSS on the complexity curve. In view of point (b) above, such a
finding suggests, at least as far as TSS are concerned, that the combinatorial properties of the NFR
subsequence are strongly associated with the creation of the barriers, highlighting that its nature
is at least in part combinatorial, i.e., dictated by intrinsic properties of sequences.
(3) Since the complexity of subsequences within a sequence can be modulated, points (1) and (2) above
suggest that, at least for TSS, such a modulation can smoothly accomodate for both sequencedictated and statistical positioning, in a continuum that requires no other particular arrangement
for switching between the two “states” of interest. Indeed, the low complexity area characterizing
the NFR indicated where nucleosomes should not be, giving also an indication that the +1 and -1
nucleosomes must be placed towards the local maxima of the complexity curve at the end of the
NFR. Such an interpretation sheds some light on point (c) above.
References
[1] G. Felsenfeld and M. Groudine. Controlling the double helix. Nature, 421:448–453, 2003.
[2] C. Jiang and B.F. Pugh. Nucleosome positioning and gene regulation: advances through genomics.
Nature Genetics, 10:161–172, 2010.
[3] N. Kaplan, I.K. Moore, Y. Fondufe-Mittendorf, A. J. Gossett, D. Tillo, Y. Field, E. M. LeProust,
T.R. Hughes, J. D. Lieb, J. Widom, and E. Segal. The DNA-encoded nucleosome organization of a
eukaryotic genome. Nature, 2008.
[4] R. D. Kornberg. The locations of nucleosomes in chromatin:specific or statistical? Nature, 292:579–
580, 1981.
[5] R.D. Kornberg and L. Stryer. Statistical distributions of nucleosomes: nonrandom locations by a
stochastic mechanism. Nucleic Acids Research, 16:6677–6690, 1988.
[6] T.N. Mavrich, I.P. Ioshikhes, B.J. Venters, C. Jiang, L.P. Tomsho, J. Qi, S.C. Schuster, I. Albert,
and B. F. Pugh. A barrier nucleosome model for statistical positioning of nucleosomes throughout
the yeast genome. Genome Research, 2008.
[7] T.N. Mavrich, C. Jiang, I.P. Ioshikhes, X. Li, B.J. Venters, S.J. Zanton, L.P. Tomsho, J. Qi, R.L.
Glaser, S.C. Schuster, D.S. Gilmour, I. Albert, and B.F. Pugh. Nucleosome organization in the
Drosophila genome. Nature, 453:358–364, 2008.
[8] W. Möbius and U. Gerland. Quantitative test of the barrier nucleosome model for statistical positioning of nucleosomes up- and downstream of transcription start sites. PLoS Computational
Biology, 6:e891, 2010.
[9] E. Segal, Y. Fondufe-Mittendorf, L. Chen, A. Thastrom, Y. Field, J.K. Moore, J.P. Wang, and
J. Widom. A genomic code for nucleosome positioning. Nature, 442:772–778, 2006.
[10] E. Segal and J. Widom. What controls nucleosome positions? Trends in Genetics, 746:1–9, 2009.
[11] A. Valouev, J. Ichikawa, T. Thaisan, J. Stuart, R. Swati, H. Peckham, K. Zeng, J.A. Malek, G. Costa,
K. McKernan, A. Sidow, A. Fire, and S. M. Johnson. A high-resolution, nucleosome position map of
c. elegans reveals a lack of universal sequence-dictated positioning. Genome Research, 18:1051–1063,
2008.
[12] Y. Zhang, Z. Moqtaderi, B. P. Rattner, G. Euskirchen, M. Snyder, J.T. Kadonaga, X . Shirley Liu,
and K. Struhl. Intrinsic histone-DNA interactions are not the major determinant of nucleosome
positions in vivo. Nature Structural and Molecular Biology, 16:847–852, 2009.
3
| 5cs.CE
|
Submitted to the Annals of Statistics
arXiv: arXiv:0000.0000
ACCURACY ASSESSMENT FOR HIGH-DIMENSIONAL
LINEAR REGRESSION∗
arXiv:1603.03474v2 [math.ST] 24 Sep 2016
By T. Tony Cai, and Zijian Guo
University of Pennsylvania
This paper considers point and interval estimation of the `q loss
of an estimator in high-dimensional linear regression with random
design. We establish the minimax rate for estimating the `q loss and
the minimax expected length of confidence intervals for the `q loss of
rate-optimal estimators of the regression vector, including commonly
used estimators such as Lasso, scaled Lasso, square-root Lasso and
Dantzig Selector. Adaptivity of the confidence intervals for the `q loss
is also studied. Both the setting of known identity design covariance
matrix and known noise level and the setting of unknown design
covariance matrix and unknown noise level are studied. The results
reveal interesting and significant differences between estimating the
`2 loss and `q loss with 1 ≤ q < 2 as well as between the two settings.
New technical tools are developed to establish rate sharp lower
bounds for the minimax estimation error and the expected length of
minimax and adaptive confidence intervals for the `q loss. A significant difference between loss estimation and the traditional parameter
estimation is that for loss estimation the constraint is on the performance of the estimator of the regression vector, but the lower bounds
are on the difficulty of estimating its `q loss. The technical tools developed in this paper can also be of independent interest.
1. Introduction. In many applications, the goal of statistical inference
is not only to construct a good estimator, but also to provide a measure of
accuracy for this estimator. In classical statistics, when the parameter of
interest is one-dimensional, this is achieved in the form of a standard error
or a confidence interval. A prototypical example is the inference for a binomial proportion, where often not only an estimate of the proportion but also
its margin of error are given. Accuracy measures of an estimation procedure
have also been used as a tool for the empirical selection of tuning parameters.
A well known example is Stein’s Unbiased Risk Estimate (SURE), which has
been an effective tool for the construction of data-driven adaptive estimators in normal means estimation, nonparametric signal recovery, covariance
∗
The research was supported in part by NSF Grants DMS-1208982 and DMS-1403708,
and NIH Grant R01 CA127334.
MSC 2010 subject classifications: Primary 62G15; secondary 62C20, 62H35
Keywords and phrases: Accuracy assessment, adaptivity, confidence interval, highdimensional linear regression, loss estimation, minimax lower bound, minimaxity, sparsity.
1
2
T. T. CAI AND Z. GUO
matrix estimation, and other problems. See, for instance, [25, 21, 15, 11, 32].
The commonly used cross-validation methods can also be viewed as a useful
tool based on the idea of empirical assessment of accuracy.
In this paper, we consider the problem of estimating the loss of a given
estimator in the setting of high-dimensional linear regression, where one
observes (X, y) with X ∈ Rn×p and y ∈ Rn , and for 1 ≤ i ≤ n,
yi = Xi· β + i .
iid
Here β ∈ Rp is the regression vector, Xi· ∼ Np (0, Σ) are the rows of X,
iid
and the errors i ∼ N (0, σ 2 ) are independent of X. This high-dimensional
linear model has been well studied in the literature, with the main focus
on estimation of β. Several penalized/constrained `1 minimization methods,
including Lasso [28], Dantzig selector [12], scaled Lasso [26] and square-root
Lasso [3], have been proposed. These methods have been shown to work well
in applications and produce interpretable estimates of β when β is assumed
to be sparse. Theoretically, with a properly chosen tuning parameter, these
estimators achieve the optimal rate of convergence over collections of sparse
parameter spaces. See, for example, [12, 26, 3, 23, 4, 5, 30].
b the `q loss kβb − βk2 with 1 ≤ q ≤ 2 is comFor a given estimator β,
q
b
monly used as a metric of accuracy for β. We consider in the present paper
b
both point and interval estimation of the `q loss kβb − βk2q for a given β.
Note that the loss kβb − βk2q is a random quantity, depending on both the
estimator βb and the parameter β. For such a random quantity, prediction
and prediction interval are ususally used for point and interval estimation,
respectively. However, we slightly abuse the terminologies in the present paper by using estimation and confidence interval to represent the point and
interval estimators of the loss kβb − βk2q . Since the `q loss depends on the
b it is necessary to specify the estimator in the discussion of loss
estimator β,
estimation. Throughout this paper, we restrict our attention to a broad collection of estimators βb that perform well at least at one interior point or a
small subset of the parameter space. This collection of estimators includes
most state-of-art estimators such as Lasso, Dantzig selector, scaled Lasso
and square-root Lasso.
High-dimensional linear regression has been well studied in two settings.
One is the setting with known design covariance matrix Σ = I and known
noise level σ = σ0 and sparse β. See for example, [16, 2, 22, 30, 27, 20, 7, 1,
19]. Another commonly considered setting is sparse β with unknown Σ and
σ. We study point and interval estimation of the `q loss kβb − βk2q in both
settings. Specifically, we consider the parameter space Θ0 (k) introduced in
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
3
(2.3), which consists of k-sparse signals β with known design covariance
matrix Σ = I and known noise level σ = σ0 , and Θ(k) defined in (2.4),
which consists of k-sparse signals with unknown Σ and σ.
1.1. Our contributions. The present paper studies the minimax and adaptive estimation of the loss kβb − βk2q for a given estimator βb and the minimax
expected length and adaptivity of confidence intervals for the loss. A major
step in our analysis is to establish rate sharp lower bounds for the minimax
estimation error and the minimax expected length of confidence intervals for
the `q loss over Θ0 (k) and Θ(k) for a broad class of estimators of β, which
contains the subclass of rate-optimal estimators. We then focus on the estimation of the loss of rate-optimal estimators and take the Lasso and scaled
Lasso estimators as generic examples. For these rate-optimal estimators, we
propose procedures for point estimation as well as confidence intervals for
their `q losses. It is shown that the proposed procedures achieve the corresponding lower bounds up to a constant factor. These results together
establish the minimax rates for estimating the `q loss of rate-optimal estimators over Θ0 (k) and Θ(k). The analysis shows interesting and significant
differences between estimating the `2 loss and `q loss with 1 ≤ q < 2 as well
as between the two parameter spaces Θ(k) and Θ0 (k).
n
o
2 over Θ (k) is min √1 , k log p
b
• The minimax rate for estimating kβ−βk
0
2
n
n
and over Θ(k) is k logn p . So loss estimation is much easier with the prior
√
information Σ = I and σ = σ0 when lognp k . logn p .
• The minimax rate for estimating kβb − βk2q with 1 ≤ q < 2 over both
2
Θ0 (k) and Θ(k) is k q logn p .
√
In the regime lognp k . logn p , a practical loss estimator is proposed
for estimating the `2 loss and shown to achieve the optimal convergence
rate √1n adaptively over Θ0 (k). We say estimation of loss is impossible if
the minimax rate can be achieved by the trivial estimator 0, which means
that the estimation accuracy of the loss is at least of the same order as the
loss itself. In all other considered cases, estimation of loss is shown to be
impossible. These results indicate that loss estimation is difficult.
We then turn to the construction of confidence intervals for the `q loss.
A confidence interval for the loss is useful even when it is “impossible”
to estimate the loss, as a confidence interval can provide non-trivial upper
and lower bounds for the loss. In terms of convergence rate over Θ0 (k)
or Θ(k), the minimax rate of the expected length of confidence intervals
for the `q loss, kβb − βk2q , of any rate-optimal estimator βb coincides with
4
T. T. CAI AND Z. GUO
the minimax estimation rate. We also consider the adaptivity of confidence
b (The framework for
intervals for the `q loss of any rate-optimal estimator β.
adaptive confidence intervals is discussed in detail in Section 3.1.) Regarding
confidence intervals for the `2 loss in the case of known Σ = I and σ = σ0 ,
a procedure is proposed and is shown to achieve the optimal length √1n
√
adaptively over Θ0 (k) for lognp . k . logn p . Furthermore, it is shown that
this is the only regime where adaptive confidence intervals
exist, even over
√
n
two given parameter spaces. For example, when k1 log p and k1 k2 , it is
impossible to construct a confidence interval for the `2 loss with guaranteed
coverage probability over Θ0 (k2 ) (consequently also over Θ0 (k1 )) and with
the expected length automatically adjusted to the sparsity. Similarly, for
the `q loss with 1 ≤ q < 2, adaptive confidence intervals is impossible over
Θ0 (k1 ) and Θ0 (k2 ) for k1 k2 . logn p . Regarding confidence intervals for
the `q loss with 1 ≤ q ≤ 2 in the case of unknown Σ and σ, the impossibility
of adaptivity also holds over Θ(k1 ) and Θ(k2 ) for k1 k2 . logn p .
Establishing rate-optimal lower bounds requires the development of new
technical tools. One main difference between loss estimation and the traditional parameter estimation is that for loss estimation the constraint is
on the performance of the estimator βb of the regression vector β, but the
lower bound is on the difficulty of estimating its loss kβb − βk2q . We introduce
useful new lower bound techniques for the minimax estimation error and
the expected length of adaptive confidence intervals for the loss kβb − βk2q .
In several important cases, it is necessary to test a composite null against
a composite alternative in order to establish rate sharp lower bounds. The
technical tools developed in this paper can also be of independent interest.
In addition to Θ0 (k) and Θ(k), we also study an intermediate parameter
space where the noise level σ is known and the design covariance matrix Σ is
unknown but of certain structure. Lower bounds for the expected length of
minimax and adaptive confidence intervals for kβb − βk2q over this parameter
space are established for a broad collection of estimators βb and are shown to
be rate sharp for the class of rate-optimal estimators. Furthermore, the lower
bounds developed in this paper have wider implications. In particular, it is
shown that they lead immediately to minimax lower bounds for estimating
kβk2q and the expected length of confidence intervals for kβk2q with 1 ≤ q ≤ 2.
1.2. Comparison with other works. Statistical inference on the loss of
specific estimators of β has been considered in the recent literature. The
papers [16, 2] established, in the setting Σ = I and n/p → δ ∈ (0, ∞), the
b
b
limit of the normalized loss p1 kβ(λ)
− βk22 where β(λ)
is the Lasso estimator with a pre-specified tuning parameter λ. Although [16, 2] provided an
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
5
exact asymptotic expression of the normalized loss, the limit itself depends
on the unknown β. In a similar setting, the paper [27] established the limit
of a normalized `2 loss of the square-root Lasso estimator. These limits of
the normalized losses help understand the properties of the corresponding
estimators of β, but they do not lead to an estimate of the loss. Our results imply that although these normalized losses have a limit under some
regularity conditions, such losses cannot be estimated well in most settings.
A recent paper, [20], constructed a confidence interval for kβb − βk22 in
the case of known Σ = I, unknown noise level σ, and moderate dimension
where n/p → ξ ∈ (0, 1) and no sparsity is assumed on β. While no sparsity
assumption on β is imposed, their method requires the assumption of Σ = I
and n/p → ξ ∈ (0, 1). In contrast, in this paper, we consider both unknown
Σ and known Σ = I settings, while allowing p n and assuming sparse β.
Honest adaptive inference has been studied in the nonparametric function
estimation literature, including [8] for adaptive confidence intervals for linear
functionals, [18, 10] for adaptive confidence bands, and [9, 24] for adaptive
confidence balls, and in the high-dimensional linear regression literature,
including [22] for adaptive confidence set and [7] for adaptive confidence
interval for linear functionals. In this paper, we develop new lower bound
tools, Theorems 8 and 9, to establish the possibility of adaptive confidence
intervals for kβb − βk2q . The connection between `2 loss considered in the
current paper and the work [22] is discussed in more detail in Section 3.2.
1.3. Organization. Section 2 establishes the minimax lower bounds of
estimating the loss kβb − βk2q with 1 ≤ q ≤ 2 over both Θ0 (k) and Θ(k)
and shows that these bounds are rate sharp for the Lasso and scaled Lasso
2 . Secb
estimators, respectively. We then turn to interval estimation of kβ−βk
q
tions 3 and 4 present the minimax and adaptive minimax lower bounds for
the expected length of confidence intervals for kβb−βk2q over Θ0 (k) and Θ(k).
For Lasso and scaled Lasso estimators, we show that the lower bounds can
be achieved and investigate the possibility of adaptivity. Section 5 considers
the rate-optimal estimators and establishes the minimax convergence rate
of estimating their `q losses. Section 6 presents new minimax lower bound
techniques for estimating the loss kβb −βk2q . Section 7 discusses the minimaxity and adaptivity in another setting, where the noise level σ is known and
the design covariance matrix Σ is unknown but of certain structure. Section
8 applies the newly developed lower bounds to establish lower bounds for a
related problem, that of estimating kβk2q . Section 9 proves the main results
and additional proofs are given in the supplemental material [6].
6
T. T. CAI AND Z. GUO
1.4. Notation. For a matrix X ∈ Rn×p , Xi· , X·j , and Xi,j denote respectively the i-th row, j-th column, and (i, j) entry of the matrix X. For
a subset J ⊂ {1, 2, · · · , p}, |J| denotes the cardinality of J, J c denotes
the complement {1, 2, · · · , p}\J, XJ denotes the submatrix of X consisting of columns X·j with j ∈ J and for a vector x ∈ Rp , xJ is the subvector of x with indices in J. For a vector x ∈ Rp , supp(x) denotes the
1
P
support of x and the `q norm of x is defined as kxkq = ( pi=1 |xi |q ) q
for q ≥ 0 with kxk0 = |supp(x)| and kxk∞ = max1≤j≤p |xj |. For a ∈ R,
a+ = max {a, 0}. We use max kX·j k2 as a shorthand for max1≤j≤p kX·j k2
and min kX·j k2 as a shorthand for min1≤j≤p kX·j k2 . For a matrix A, we define the spectral norm
Pp kAk2 = supkxk2 =1 kAxk2 and the matrix `1 norm
kAkL1 = sup1≤j≤p i=1 |Aij |; For a symmetric matrix A, λmin (A) and
λmax (A) denote respectively the smallest and largest eigenvalue of A. We
use c and C to denote generic positive constants that may vary from place
to place. For two positive sequences an and bn , an . bn means an ≤ Cbn
for all n and an & bn if bn . an and an bn if an . bn and bn . an , and
an bn if lim supn→∞ abnn = 0 and an bn if bn an .
2. Minimax estimation of the `q loss. We begin by presenting the
minimax framework for estimating the `q loss, kβb − βk2q , of a given estimator
b and then establish the minimax lower bounds for the estimation error for
β,
b We also show that such minimax lower
a broad collection of estimators β.
bounds can be achieved for the Lasso and scaled Lasso estimators.
2.1. Problem formulation. Recall the high-dimensional linear model,
(2.1)
yn×1 = Xn×p βp×1 + n×1 ,
∼ Nn (0, σ 2 I).
iid
We focus on the random design with Xi· ∼ N (0, Σ) and Xi· and i are
independent. Let Z = (X, y) denote the observed data and βb be a given
b q (Z) any estimator of the loss kβb − βk2q , the
estimator of β. Denoting by L
minimax rate of convergence for estimating kβb − βk2q over a parameter space
Θ is defined as the largest quantity γβ,`
b q (Θ) such that
(2.2)
b q (Z) − kβb − βk2 | ≥ γ b (Θ) ≥ δ,
inf sup Pθ |L
q
β,`q
b q θ∈Θ
L
b q for
for some constant δ > 0 not depending on n or p. We shall write L
b
Lq (Z) when there is no confusion.
We denote the parameter by θ = (β, Σ, σ), which consists of the signal β, the design covariance matrix Σ and the noise level σ. For a given
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
7
θ = (β, Σ, σ), we use β(θ) to denote the corresponding β. Two settings are
considered: The first is known design covariance matrix Σ = I and known
noise level σ = σ0 and the other is unknown Σ and σ. In the first setting,
we consider the following parameter space that consists of k-sparse signals,
Θ0 (k) = {(β, I, σ0 ) : kβk0 ≤ k} ,
(2.3)
and in the second setting, we consider
(2.4)
1
Θ(k) = (β, Σ, σ) : kβk0 ≤ k,
≤ λmin (Σ) ≤ λmax (Σ) ≤ M1 , 0 < σ ≤ M2 ,
M1
where M1 ≥ 1 and M2 > 0 are constants. The parameter space Θ0 (k) is a
subset of Θ(k), which consists of k-sparse signals with unknown Σ and σ.
2
b
The minimax rate γβ,`
b q (Θ) for estimating kβ − βkq also depends on the
b Different estimators βb could lead to different losses kβb − βk2
estimator β.
q
b We
and in general the difficulty of estimating the loss kβb −βk2 varies with β.
q
first recall the properties of some state-of-art estimators and then specify
the collection of estimators on which we focus in this paper. As shown in
[12, 4, 3, 26], Lasso, Dantzig Selector, scaled Lasso and square-root Lasso
satisfy the following property if the tuning parameter is properly chosen,
2 log p
2
(2.5)
sup Pθ kβb − βkq ≥ Ck q
→ 0,
n
θ∈Θ(k)
where C > 0 is a constant. The minimax lower bounds established in [30, 23,
2
31] imply that k q logn p is the optimal rate for estimating β over the parameter
space Θ(k). It should be stressed that all of these algorithms do not require
knowledge of the sparsity k and is thus adaptive to the sparsity provided
k . logn p . We consider a broad collection of estimators βb satisfying one of
the following two assumptions.
(A1) The estimator βb satisfies, for some θ0 = (β ∗ , I, σ0 ) ∈ Θ0 (k),
2
∗ 2
∗
∗ q log p 2
b
σ ≤ α0 ,
(2.6)
Pθ0 kβ − β kq ≥ C kβ k0
n 0
where 0 ≤ α0 < 14 and C ∗ > 0 are constants.
(A2) The estimator βb satisfies
2
∗ 2
∗
∗ q log p 2
b
(2.7)
sup
Pθ kβ − β kq ≥ C kβ k0
σ ≤ α0 ,
n
{θ=(β ∗ ,I,σ):σ≤2σ0 }
where 0 ≤ α0 <
1
4
and C ∗ > 0 are constants and σ0 > 0 is given.
8
T. T. CAI AND Z. GUO
In view of the minimax rate given in (2.5), Assumption (A1) requires βb
to be a good estimator of β at at least one point θ0 ∈ Θ0 (k). Assumption
(A2) is slightly stronger than (A1) and requires βb to estimate β well for a
single β ∗ but over a range of noise levels σ ≤ 2σ0 while Σ = I. Of course,
any estimator βb satisfying (2.5) satisfies both (A1) and (A2). In addition
to Assumptions (A1) and (A2), we also introduce the following sparsity
assumptions that will be used in various theorems.
(B1) Let c0 be the constant defined in (9.14). The sparsity levels k and
k0 satisfy k ≤ c0 min{pγ , logn p } for some constant 0 ≤ γ < 21 and
√
k0 ≤ c0 min{k, lognp }.
(B2) The sparsity levels k1 , k2 and k0 satisfy k1 ≤ k2 ≤ c0 min{pγ , logn p } for
some constant 0 ≤ γ <
1
2
√
and c0 > 0 and k0 ≤ c0 min{k1 , lognp }.
2.2. Minimax estimation of the `q loss over Θ0 (k). The following theorem establishes the minimax lower bounds for estimating the loss kβb − βk2q
over the parameter space Θ0 (k).
Theorem 1. Suppose that the sparsity levels k and k0 satisfy Assumption (B1). For any estimator βb satisfying Assumption (A1) with kβ ∗ k0 ≤ k0 ,
log p 1
2
b
b
√
(2.8)
inf sup Pθ |L2 − kβ − βk2 | ≥ c min k
,
σ02 ≥ δ.
n
n
b
L2 θ∈Θ0 (k)
For any estimator βb satisfying Assumption (A2) with kβ ∗ k0 ≤ k0 ,
2 log p
2
2
b
b
(2.9) inf sup Pθ |Lq − kβ − βkq | ≥ ck q
σ ≥ δ, for 1 ≤ q < 2,
n 0
b q θ∈Θ0 (k)
L
where δ > 0 and c > 0 are constants.
Remark 1. Assumption (A1) restricts our focus to estimators that can
perform well at at least one point (β ∗ , I, σ0 ) ∈ Θ0 (k). This weak condition
makes the established lower bounds widely applicable as the benchmark for
evaluating estimators of the `q loss of any βb that performs well at a proper
subset, or even a single point of the whole parameter space.
In this paper, we focus on estimating the loss kβb − βk2q with 1 ≤ q ≤ 2.
q
b
Similar results can be established for the loss in the form of kβ−βk
q with 1 ≤
q ≤ 2; Under the same assumptions as those in Theorem 1, the lower bounds
for estimating the loss kβb − βkqq hold with replacing the convergence rates
with their 2q power; that is, (2.8) remains the same while the convergence
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
9
p
2 p
rate k q ( log p/nσ0 )2 in (2.9) is replaced by k( log p/nσ0 )q . Similarly, all
the results established in the rest of the paper for kβb − βk2q hold for kβb − βkqq
with corresponding convergence rates replaced by their 2q power.
Theorem 1 establishes the minimax lower bounds for estimating the `2
loss kβb − βk22 of any estimator βb satisfying Assumption (A1) and the `q
loss kβb − βk2q with 1 ≤ q < 2 of any estimator βb satisfying Assumption
(A2). We will take the Lasso estimator as an example and demonstrate
the implications of the abovetheorem. We randomly split Z = (y, X) into
subsamples Z (1) = y (1) , X (1) and Z (2) = y (2) , X (2) with sample sizes n1
and n2 , respectively.
The Lasso estimator βbL based on the first subsample
Z (1) = y (1) , X (1) is defined as
(1)
p
X
kX·j k2
ky (1) − X (1) βk22
βbL = arg minp
+λ
|βj |,
√
β∈R
n1
n1
(2.10)
j=1
p
√
where λ = A log p/n1 σ0 with A > 2 being a pre-specified constant.
Without loss of generality, we assume n1 n2 . For the case 1 ≤ q < 2,
(2.5) and (2.9) together imply that the estimation of the `q loss kβbL − βk2q
is impossible since the lower bound can
be achieved by the trivial
estimator
2
log
p
L
2
b
of the loss, 0. That is, supθ∈Θ0 (k) Pθ |0 − kβ − βkq | ≥ Ck q n
→ 0.
√
p
For the case q = 2, in the regime k lognp , the lower bound k log
in
n
(2.8) can be achieved by the zero estimator and hence estimation √of the loss
kβbL − βk22 is impossible. However, the interesting case is when lognp . k .
n
e 2 proposed in (2.11) achieves the minimax lower
, the loss estimator L
log p
bound
√1
n
in (2.8), which cannot be achieved by the zero estimator. We now
e 2 . Based on the second half
detail the construction of the loss estimator L
(2)
(2)
(2)
sample Z = y , X
, we propose the following estimator,
2
1
2
(2)
(2) bL
e
− σ0
(2.11)
L2 =
y −X β
.
n2
2
+
Note that the first subsample Z (1) = y (1) , X (1) is used to produce the
Lasso estimator βbL in (2.10) and the second subsample Z (2) = y (2) , X (2)
is retained to evaluate the loss kβbL − βk22 . Such sample splitting technique
is similar to cross-validation and has been used in [22] for constructing confidence sets for β and in [20] for confidence intervals for the `2 loss.
e 2 achieves the
The following proposition establishes that the√ estimator L
n
n
minimax lower bound of (2.8) over the regime log p . k . log p .
10
T. T. CAI AND Z. GUO
Proposition 1. Suppose that k . logn p and βbL is the Lasso estimator
√
defined in (2.10) with A > 2, then the estimator of loss proposed in (2.11)
satisfies, for any sequence δn,p → ∞,
1
L
2
b
e
(2.12)
lim sup sup Pθ L2 − kβ − βk2 ≥ δn,p √
= 0.
n
n,p→∞ θ∈Θ0 (k)
2.3. Minimax estimation of the `q loss over Θ(k). We now turn to the
case of unknown Σ and σ and establish the minimax lower bound for estimating the `q loss over the parameter space Θ(k).
Theorem 2. Suppose that the sparsity levels k and k0 satisfy Assumption (B1). For any estimator βb satisfying Assumption (A1) with kβ ∗ k0 ≤ k0 ,
2 log p
2
b q − kβb − βk | ≥ ck q
≥ δ, 1 ≤ q ≤ 2,
(2.13)
inf sup Pθ |L
q
n
b q θ∈Θ(k)
L
where δ > 0 and c > 0 are constants.
Theorem 2 provides a minimax lower bound for estimating the `q loss
of any estimator βb satisfying Assumption (A1), including the scaled Lasso
estimator defined as
p
(2.14)
{βbSL , σ̂} = arg
min
β∈Rp ,σ∈R+
X kX·j k2
ky − Xβk22 σ
√ |βj |,
+ + λ0
2nσ
2
n
j=1
p
√
where λ0 = A log p/n with A > 2. Note that for the scaled Lasso estimator, the lower bound in (2.13)
trivial
can be achieved by the
loss estimator
2
log
p
SL
2
b
0 in the sense, supθ∈Θ(k) Pθ |0 − kβ − βkq | ≥ Ck q n
→ 0, and hence
estimation of loss is impossible in this case.
3. Minimaxity and adaptivity of confidence intervals over Θ0 (k).
We focused in the last section on point estimation of the `q loss and showed
the impossibility of loss estimation except for one regime. The results naturally lead to another question: Is it possible to construct “useful” confidence
intervals for kβb − βk2q that can provide non-trivial upper and lower bounds
for the loss? In this section, after introducing the framework for minimaxity
and adaptivity of confidence intervals, we consider the case of known Σ = I
and σ = σ0 and establish the minimaxity and adaptivity lower bounds for
the expected length of confidence intervals for the `q loss of a broad collection of estimators over the parameter space Θ0 (k). We also show that such
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
11
minimax lower bounds can be achieved for the Lasso estimator and then discuss the possibility of adaptivity using the Lasso estimator as an example.
The case of unknown Σ and σ will be the focus of the next section.
3.1. Framework for minimaxity and adaptivity of confidence intervals. In
this section, we introduce the following decision theoretical framework for
confidence intervals of the loss kβb −βk2q . Given 0 < α < 1 and the parameter
b `q the set of all (1 − α)
space Θ and the loss kβb − βk2 , denote by Iα Θ, β,
q
level confidence intervals for kβb − βk2q over Θ,
(3.1)
2
b `q = CIα β,
b `q , Z = [l (Z) , u (Z)] : inf Pθ kβb − β(θ)k ∈ CIα β,
b `q , Z
Iα Θ, β,
≥1−α .
q
θ∈Θ
b `q , Z when there is no confusion. For any
We will write CIα for CIα β,
b `q , Z = [l (Z) , u (Z)], its length is denoted by
confidence interval CIα β,
b `q , Z
L CIα β,
= u (Z) − l (Z) and the maximum expected length over
a parameter space Θ1 is defined as
b `q , Z , Θ1 = sup Eθ L CIα β,
b `q , Z .
(3.2)
L CIα β,
θ∈Θ1
b `q ,
For two nested parameter spaces Θ1 ⊆ Θ2 , we define the benchmark L∗α Θ1 , Θ2 , β,
measuring the degree of adaptivity over the nested spaces Θ1 ⊂ Θ2 ,
(3.3)
b `q =
b `q , Z .
sup Eθ L CIα β,
L∗α Θ1 , Θ2 , β,
inf
b q ,Z )∈Iα (Θ2 ,β,`
b q ) θ∈Θ1
CIα (β,`
b `q , which is the minimax
b `q for L∗ Θ1 , Θ1 , β,
We will write L∗α Θ1 , β,
α
expected length of confidence intervals of kβb − βk2q over Θ1 . The bench
b `q is the infimum of the maximum expected length
mark L∗α Θ1 , Θ2 , β,
over Θ1 among
all (1 − α)-level confidence intervals over Θ2 . In contrast,
∗
b
Lα Θ1 , β, `q is considering all (1 − α)-level confidence intervals over Θ1 .
In words, if there is priorinformation
that the parameter lies in the smaller
b `q measures the benchmark length of conparameter space Θ1 , L∗α Θ1 , β,
fidence intervals over the parameter space Θ1 , which is illustrated in the left
of Figure 1; however, if there is only prior
information
that the parameter
∗
b
lies in the larger parameter space Θ2 , Lα Θ1 , Θ2 , β, `q measures the benchmark length of confidence intervals over the parameter space Θ1 , which is
illustrated in the right of Figure 1.
12
T. T. CAI AND Z. GUO
Θ
𝐋∗ (Θ , 𝛽, ℓ𝓁 )
Θ
𝐋∗ (Θ , Θ , 𝛽, ℓ𝓁 )
ΘΩ
b `q and L∗α Θ1 , Θ2 , β,
b `q .
Fig 1. The plot demonstrates the definition of L∗α Θ1 , β,
∗
Rigorously, we define a confidence
interval
CI to be simultaneously adapb `q ,
tive over Θ1 and Θ2 if CI∗ ∈ Iα Θ2 , β,
b `q , and L (CI∗ , Θ2 ) L∗ Θ2 , β,
b `q .
(3.4) L (CI∗ , Θ1 ) L∗α Θ1 , β,
α
The condition (3.4) means that the confidence interval CI∗ has coverage over
the larger parameter space Θ2 and achieves
the minimax
rate
over both Θ1
∗
∗
∗
b
b `q
and Θ2 . Note that L (CI , Θ1 ) ≥ Lα Θ1 , Θ2 , β, `q . If Lα Θ1 , Θ2 , β,
b `q , then the rate-optimal adaptation (3.4) is impossible to achieve
L∗α Θ1 , β,
for Θ1 ⊂ Θ2 . Otherwise, it is possible to construct confidence intervals simultaneously adaptive over parameter spaces Θ1 and Θ2 . The possibility of
adaptation over parameter spaces Θ1 and
by in
Θ2 can thus be answered
∗
∗
b `q .
b `q and L Θ1 , Θ2 , β,
vestigating the benchmark quantities Lα Θ1 , β,
α
Such framework has already been introduced in [7], which studies the minimaxity and adaptivity of confidence intervals for linear functionals in highdimensional linear regression.
We will adopt the minimax and adaptationframework
discussed above
∗
b
and establish the minimax expected length Lα Θ0 (k), β, `q and the adap
b `q . In terms of the minimax extation benchmark L∗α Θ0 (k1 ), Θ0 (k2 ), β,
pected length and the adaptivity behavior, there exist fundamental differences between the case q = 2 and 1 ≤ q < 2 . We will discuss them separately
in the following two sections.
3.2. Confidence intervals for the `2 loss over Θ0 (k). The following theorem establishes the minimax lower bound for the expected length of confidence intervals of kβb − βk22 over the parameter space Θ0 (k).
Theorem 3. Suppose that 0 < α < 14 and the sparsity levels k and k0
satisfy Assumption (B1). For any estimator βb satisfying Assumption (A1)
13
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
with kβ ∗ k0 ≤ k0 , then there is some constant c > 0 such that
k
log
p
1
∗
b `2 ≥ c min
(3.5)
Lα Θ0 (k), β,
,√
σ02 .
n
n
√
In particular, if βbL is the Lasso estimator defined in (2.10) with A > 2,
then the minimax expected length for (1 − α) level confidence intervals of
kβbL − βk22 over Θ0 (k) is
k log p 1
∗
L
b
σ02 .
(3.6)
Lα Θ0 (k), β , `2 min
,√
n
n
We now consider adaptivity of confidence intervals for the`2 loss. The fol
b `2 .
lowing theorem gives the lower bound for the benchmark L∗α Θ0 (k1 ), Θ0 (k2 ), β,
We will then discuss Theorems 3 and 4 together.
Theorem 4. Suppose that 0 < α < 41 and the sparsity levels k1 , k2 and
k0 satisfy Assumption (B2). For any estimator βb satisfying Assumption (A1)
with kβ ∗ k0 ≤ k0 , then there is some constant c > 0 such that
k2 log p 1
∗
b
(3.7)
Lα Θ0 (k1 ), Θ0 (k2 ), β, `2 ≥ c min
,√
σ02 .
n
n
In particular, if βbL is the Lasso estimator defined in (2.10) with A >
the above lower bound can be achieved.
√
2,
The lower bound established in Theorem 4 implies that of Theorem 3 and
both lower bounds hold for a general class of estimators satisfying Assumption(A1). There is a phase
bound of the benchmark
transition for the lower
√
n
∗
b
Lα Θ0 (k1 ), Θ0 (k2 ), β, `2 . In the regime k2 log p , the lower bound in (3.7)
√
when lognp . k2 . logn p , the lower bound in (3.7) is √1n σ02 . For the
p 2
Lasso estimator βbL defined in (2.10), the lower bound k log
n σ0 in (3.5) and
k2 log p 2
0
n σ0 in (3.7) can be achieved by the confidence intervals CIα (Z, k, 2)
0
and CIα (Z, k2 , 2) defined in (3.15), respectively. Such an interval estimator
is also used for the `q loss with 1 ≤ q < 2. The minimax lower bound √1n σ02
in (3.6) and (3.7) can be achieved by the following confidence interval,
!
!
ψ (Z)
ψ (Z)
(3.8)
CI1α (Z) = 1 2
, 1 2
− σ02
− σ02 ,
χ
χ
α (n2 )
α (n2 )
n2 1−
n2
is
k2 log p 2
n σ0 ;
2
+
2
+
14
T. T. CAI AND Z. GUO
where χ21− α (n2 ) and χ2α (n2 ) are the 1 − α2 and α2 quantiles of χ2 random
2
2
variable with n2 degrees of freedom, respectively, and
2
1
2
(2)
(2) bL
, σ0 log p .
y −X β
(3.9)
ψ (Z) = min
n2
2
Note that the two-sided confidence interval (3.8) is simply based on the
observed data Z, not depending on any prior knowledge of the sparsity k.
Furthermore, it is a two-sided confidence interval, which tells not only just an
upper bound, but also a lower bound for the loss. The coverage property and
the expected length of CI1α (Z) are established in the following proposition.
Proposition 2. Suppose k . logn p and βbL is the estimator defined in
√
(2.10) with A > 2. Then CI1α (Z) defined in (3.8) satisfies,
(3.10)
lim inf inf P kβbL − βk22 ∈ CI1α (Z) ≥ 1 − α,
n,p→∞ θ∈Θ0 (k)
and
1
L CI1α (Z) , Θ0 (k) . √ σ02 .
n
(3.11)
Θ0 𝑘1
Θ0 𝑘 2
𝑘1 log 𝑝
𝑛
𝑘1 log 𝑝
𝑛
Θ0 𝑘1
𝑘2 log 𝑝
𝑛
Θ0Ω𝑘1
Θ0 𝑘2
1
𝑛
1
𝑛
Θ0 𝑘1
Θ0 𝑘 2
1
𝑛
Θ0 Ω𝑘1
Θ0Ω𝑘1
Fig 2. Illustration of L∗α Θ0 (k1 ), βbL , `2 (top) and L∗α Θ0 (k1 ), Θ0 (k2 ), βbL , `2 (bottom)
over regimes k1 ≤ k2 .
k2 . logn p (rightmost).
√
n
log p
(leftmost), k1 .
√
n
log p
. k2 .
n
(middle)
log p
and
√
n
log p
. k1 ≤
Regarding the Lasso estimator βbL defined in (2.10), we will discuss the
possibility of adaptivity of confidence intervals for kβbL −βk22 . The adaptivity
behavior of confidence intervals for kβbL − βk22 is demonstrated in
Figure 2.
√
n
As illustrated in the rightmost plot of Figure 2, in the regime log p . k1 ≤
k2 . n , we obtain L∗ Θ0 (k2 ), Θ0 (k2 ), βbL , `2 L∗ Θ0 (k1 ), βbL , `2
log p
α
α
15
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
√1 ,
n
which implies that adaptation is possible over this regime. As shown
in Proposition 2, the confidence
interval CI1α (Z) defined in (3.8) is fully
√
n
adaptive over the regime log p . k . logn p in the sense of (3.4).
Illustrated in the leftmost and middle plots of Figure 2, it is impossible
to construct an adaptive confidence interval for kβbL − βk22 over regimes k1 ≤
√
√
k2 . lognp and k1 lognp . k2 . logn p since L∗α Θ0 (k1 ), Θ0 (k2 ), βbL , `2
√
L∗α Θ0 (k1 ), βbL , `2 if k1 lognp and k1 k2 . To sum up, adaptive confidence intervals for kβbL −βk22 is only possible over the regime
√
n
log p
.k.
n
log p .
Comparison with confidence balls. We should note that the problem of
constructing confidence intervals for kβb − βk22 is related to but different from
that of constructingnconfidence sets for β itself.
o Confidence balls constructed
2
b
in [22] are of form β : kβ − βk2 ≤ un (Z) , where βb can be the Lasso estimator and un (Z) is a data dependent squared radius. See [22] for further
details. A naive application of this confidence ball leads to a one-sided confidence interval for the loss kβb − βk22 ,
n
o
(3.12)
CIinduced
(Z) = kβb − βk22 : kβb − βk22 ≤ un (Z) .
α
Due to the reason that confidence sets
n for β were sought foroin Theorem
b 2 ≤ un (Z) will suffice
1 in [22], confidence sets in the form β : kβ − βk
2
to achieve the optimal length. However, since our goal is to characterize
kβb − βk22 , we apply the unbiased risk estimation discussed in Theorem 1 of
[22] and construct the two-sided confidence interval in (3.8). Such a twosided confidence interval is more informative than the one-sided confidence
interval (3.12) since the one-sided confidence interval does not contain the
information whether the loss is close to zero or not. Furthermore, as shown in
[22], the length of confidence interval CIinduced
(Z) over the parameter space
α
k log p
1
√
Θ0 (k) is of order n + n . The two-sided confidence interval CI1α (Z)
constructed in (3.8) is of expected length
√1 + k log p
n
n
√
n
log p .
√1 ,
n
which is much shorter than
in the regime k
That is, the two-sided confidence interval
(3.8) provides a more accurate interval estimator of the `2 loss. This is
illustrated in Figure 3.
The lower bound technique developed in the literature of adaptive confidence sets [22] can also be used to establish some of the lower bound
results for the case q = 2 given in the present paper. However, new techniques are needed in order to establish the rate√sharp lower bounds for the
minimax estimation error (2.9) in the region lognp ≤ k . logn p and for the
16
T. T. CAI AND Z. GUO
CI (Z)
0
∥𝛽−𝛽 ∥
CI
(Z)
Fig 3. Comparison of the two-sided confidence interval CI1α (Z) with the one-sided confidence interval CIinduced
(Z).
α
expected
length of the confidence intervals (3.18) and (7.3) in the region
√
n
n
log p . k1 ≤ k2 . log p , where it is necessary to test a composite null against
a composite alternative in order to establish rate sharp lower bounds.
3.3. Confidence intervals for the `q loss with 1 ≤ q < 2 over Θ0 (k).
We now consider the case 1 ≤ q < 2 and investigate the minimax expected
length and adaptivity of confidence intervals for kβb −βk2q over the parameter
space Θ0 (k). The following theorem characterizes the minimax convergence
rate for the expected length of confidence intervals.
Theorem 5. Suppose that 0 < α < 41 , 1 ≤ q < 2 and the sparsity levels k
and k0 satisfy Assumption (B1). For any estimator βb satisfying Assumption
(A2) with kβ ∗ k0 ≤ k0 , then there is some constant c > 0 such that
2
b `q ≥ ck q log p σ 2 .
(3.13)
L∗α Θ0 (k), β,
n 0
√
In particular, if βbL is the Lasso estimator defined in (2.10) with A > 4 2,
then the minimax expected length for (1 − α) level confidence intervals of
kβbL − βk2q over Θ0 (k) is
2 log p
(3.14)
L∗α Θ0 (k), βbL , `q k q
σ2.
n 0
We now construct the confidence interval achieving the minimax convergence rate of (3.14),
2 log p
0
∗
q
(3.15)
CIα (Z, k, q) = 0, C (A, k)k
,
n
(
)
2
3η
where C ∗ (A, k) = max
√
√
0 Aσ
0
η0 +1
(22Aσ0 )2
4 ,
4
q
q
2k log p
1
1
−42
−(9+11η0 ) 2knlog p
4
n
4
1
with η0 =
1
√2 . The following proposition establishes the coverage property and
1.01 √A+
A− 2
the expected length of CI0α (Z, k, q).
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
17
Proposition 3. Suppose k . logn p and βbL is the estimator defined in
√
(2.10) with A > 4 2. For 1 ≤ q ≤ 2, the confidence interval CI0α (Z, k, q)
defined in (3.15) satisfies
(3.16)
lim inf inf Pθ kβb − βk2q ∈ CI0α (Z, k, q) = 1,
n,p→∞ θ∈Θ0 (k)
and
(3.17)
2 log p
L CI0α (Z, k, q) , Θ0 (k) . k q
σ2.
n 0
In particular, for the case q = 2,√(3.16) and (3.17) also hold for the estimator
βbL defined in (2.10) with A > 2.
This result shows that the confidence interval CI0α (Z, k, q) achieves the
minimax rate given in (3.14). In contrast to the `2 loss where the two-sided
confidence interval (3.8) is significantly shorter than
the one-sided interval
√
and achieves the optimal rate over the regime lognp . k . logn p , for the `q
loss with 1 ≤ q < 2, the one-sided confidence interval achieves the optimal
rate given in (3.14).
We now consider adaptivity of confidence
intervals. Thefollowing theorem
b `q with 1 ≤ q < 2.
establishes the lower bound for L∗α Θ0 (k1 ), Θ0 (k2 ), β,
Theorem 6. Suppose 0 < α < 41 , 1 ≤ q < 2 and the sparsity levels k1 , k2
and k0 satisfy Assumption (B2). For any estimator βb satisfying Assumption
(A2) with kβ ∗ k0 ≤ k0 , then there is some constant c > 0 such that
(3.18)
2
√
n
q log p 2
σ
if
k
≤
k
.
ck
1
2
2 n 0
log p ;
2
√
n
b `q ≥ ck q −1 √1 σ 2
n
L∗α Θ0 (k1 ), Θ0 (k2 ), β,
if
k
.
1
2
log p . k2 . log p ;
n 0
√
2q −1 log p 2
ck2 k1 n σ0 if lognp . k1 ≤ k2 . logn p .
In particular,
if p ≥ n and βbL is the Lasso estimator defined in (2.10) with
√
A > 4 2, the above lower bounds can be achieved.
The lower bounds of Theorem 6 imply that of Theorem 5 and both lower
bounds hold for a general class of estimators satisfying Assumption (A2).
However, the lower bound (3.18) in Theorem 6 has a significantly different meaning from (3.13) in Theorem 5 where (3.18) quantifies the cost
of adaptation without knowing the sparsity level. For the Lasso estimator
18
T. T. CAI AND Z. GUO
βbL defined in (2.10), by comparing
Theorem 5 and
Theorem 6, we obtain
∗
L
∗
L
b
b
Lα Θ0 (k1 ), Θ0 (k2 ), β , `q Lα Θ0 (k1 ), β , `q if k1 k2 , which implies
the impossibility of constructing adaptive confidence intervals for the case
1 ≤ q < 2. There exists marked difference between the case 1 ≤ q < 2 and
the case q = 2, where
it is possible to construct adaptive confidence intervals
√
n
over the regime log p . k . logn p .
For the Lasso estimator βbL defined in (2.10), it is shown in Proposition 3
that the confidence interval CI0α (Z, k2 , q) defined in (3.15) achieves the lower
2
2
2
−1
−1
bound k2q logn p σ02 of (3.18). The lower bounds k2q k1 logn p σ02 and k2q √1n σ02
of (3.18) can be achieved by the following proposed confidence interval,
(3.19)
!
!
2
ψ
(Z)
ψ
(Z)
−1
CI2α (Z, k2 , q) = 1 2
− σ02
, (16k2 ) q
− σ02 ,
1 2
(n
)
(n
)
χ
χ
2
2
n2 1− α
n2 α
+
2
+
2
where ψ (Z) is given in (3.9). The following result verifies the above claim.
Proposition 4. Suppose p ≥ n, k1 ≤ k2 . logn p and βbL is defined in
√
(2.10) with A > 4 2. Then CI2α (Z, k2 , q) defined in (3.19) satisfies,
(3.20)
lim inf inf Pθ kβb − βk2q ∈ CI2α (Z, k2 , q) ≥ 1 − α,
n,p→∞ θ∈Θ0 (k2 )
and
(3.21)
L
CI2α (Z, k2 , q) , Θ0 (k1 )
2
−1
q
. k2
1
log p
+√
k1
n
n
σ02 .
4. Minimaxity and adaptivity of confidence intervals over Θ(k).
In this section, we focus on the case of unknown Σ and σ and establish the
rates of convergence for the minimax expected length of confidence intervals
for kβb − βk2q with 1 ≤ q ≤ 2 over Θ(k) defined in (2.4). We also study
the possibility of adaptivity of confidence intervals for kβb − βk2q . The following
establishes the lower bounds
for the benchmark
quantities
theorem
∗
∗
b
b
Lα Θ (ki ) , β, `q with i = 1, 2 and Lα Θ (k1 ) , Θ (k2 ) , β, `q .
Theorem 7. Suppose that 0 < α < 14 , 1 ≤ q ≤ 2 and the sparsity
levels k1 , k2 and k0 satisfy Assumption (B2). For any estimator βb satisfying
Assumption (A1) at θ0 = (β ∗ , I, σ0 ) with kβ ∗ k0 ≤ k0 , there is a constant
c > 0 such that
2
b `q ≥ ck q log p , for i = 1, 2;
(4.1)
L∗α Θ (ki ) , β,
i
n
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
(4.2)
19
2
b `q ≥ ck q log p .
L∗α {θ0 } , Θ (k2 ) , β,
2
n
In particular,
if βbSL is the scaled Lasso estimator defined in (2.14) with
√
A > 2 2, then the above lower bounds can be achieved.
The lower bounds (4.1) and (4.2) hold for any βb satisfying Assumption
(A1) at an interior point θ0 , including the scaled Lasso estimator as a special case. We demonstrate the impossibility of adaptivity of confidence inbSL defined in (2.14).
tervals for the `q loss of the scaled
Lassoestimator β
Since L∗α Θ (k1 ) , Θ (k2 ) , βbSL , `q ≥ L∗α {θ0 } , Θ (k2 ) , βbSL , `q , by (4.2),
we have L∗α Θ (k1 ) , Θ (k2 ) , βbSL , `q L∗α Θ (k1 ) , βbSL , `q if k1 k2 .
The comparison of L∗α Θ (k1 ) , βbSL , `q and L∗α Θ (k1 ) , Θ (k2 ) , βbSL , `q is
illustrated in Figure 4. Referring to the adaptivity defined in (3.4), it is
impossible to construct adaptive confidence intervals for kβbSL − βk2q .
Θ 𝑘
Θ 𝑘
𝑘 log 𝑝
𝑛
ΘΩ
𝑘
𝑘 log 𝑝
𝑛
Fig 4. Illustration of L∗α Θ (k1 ) , βbSL , `q (left) and L∗α Θ (k1 ) , Θ (k2 ) , βbSL , `q (right).
b `q , Z for the
Theorem 7 shows that for any confidence interval CIα β,
b
loss of any estimator
Assumption
(A1),
under the coverage
β satisfying
b
b
constraint that CIα β, `q , Z ∈ Iα Θ (k2 ) , β, `q , its expected length at
2
any given θ0 = (β ∗ , I, σ) ∈ Θ (k0 ) must be of order k2q logn p . In contrast to
Theorem 4 and 6, Theorem 7 demonstrates that confidence intervals must
be long at a large subset of points in the parameter space, not just at a small
number of “unlucky” points. Therefore, the lack of adaptivity for confidence
intervals is not due to the conservativeness of the minimax framework.
In the following, we detail the construction of confidence intervals for
b
kβ SL −βk2q . The construction of confidence intervals is based on the following
20
T. T. CAI AND Z. GUO
definition of restricted eigenvalue, which is introduced in [4],
(4.3)
κ(X, k, s, α0 ) =
min
√
min
δ6=0,
J0 ⊂{1,··· ,p},
kδJ c k1 ≤α0 kδJ0 k1
|J0 |≤k
0
kXδk2
,
nkδJ01 k2
where J1 denotes the subset corresponding to the s largest in absolute value
coordinates of δ outside of J0 and J01 = J0 ∪ J1 . Define the event B =
{σ̂ ≤ log p} . The confidence interval for kβbSL − βk2q is defined as
(4.4)
CIα (Z, k, q) =
on B
on B c ,
[0, ϕ (Z, k, q)]
{0}
where
2
2
2 log p
2 log p
16Amax kX·j k2 σ
b
k q
ϕ (Z, k, q) = min
, kq
log p σ
b2 .
max
kX
k
·j 2
nκ2 X, k, k, 3
n
n
min kX·j k2
Properties of CIα (Z, k, q) are established as follows.
Proposition 5. Suppose k . logn p and βbSL is the estimator defined in
√
(2.14) with A > 2 2. For 1 ≤ q ≤ 2, then CIα (Z, k, q) defined in (4.4)
satisfies the following properties,
(4.5)
lim inf inf Pθ kβb − βk2q ∈ CIα (Z, k, q) = 1,
n,p→∞ θ∈Θ(k)
and
(4.6)
2
L (CIα (Z, k, q) , Θ (k)) . k q
log p
.
n
Proposition 5 shows that the confidence interval CIα (Z, ki , q) defined in
(4.4) achieves the lower bound in (4.1), for i = 1, 2, and the confidence
interval CIα (Z, k2 , q) defined in (4.4) achieves the lower bound in (4.2).
5. Estimation of the `q loss of rate-optimal estimators. We have
established the minimax lower bounds for the estimation accuracy of the
loss of a broad class of estimators βb satisfying the weak assumptions (A1)
or (A2) and also demonstrated that such minimax lower bounds are sharp
for the Lasso estimator or scaled Lasso estimator. In this section, we will
show that the minimax lower bounds are sharp for the class of rate-optimal
estimators satisfying the following Assumption (A).
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
(A) The estimator βb satisfies, for k
(5.1)
21
n
log p ,
2
q log p
2
∗
b
≤ Cp−δ ,
sup Pθ kβ − βkq ≥ C kβk0
n
θ∈Θ(k)
for constants δ > 0, C ∗ > 0 and C > 0.
We say an estimator βb is rate-optimal if it satisfies Assumption (A). As
shown in [12, 4, 3, 26], Lasso, Dantzig Selector, scaled Lasso and squareroot Lasso are rate-optimal when the tuning parameter is chosen properly.
We shall stress that Assumption (A) implies Assumptions (A1) and (A2).
Assumption (A) requires the estimator βb to perform well over the whole
parameter space Θ(k) while Assumptions (A1) and (A2) only require βb
to perform well at a single point or over a proper subset. The following
proposition shows that the minimax lower bounds established in Theorem
1 to Theorem 7 can be achieved for the class of rate-optimal estimators.
Proposition 6.
Let βb be an estimator satisfying Assumption (A).
1. There exist estimators of the loss kβb − βk2q with 1 ≤ q < 2 achieving,
up to a constant factor, the minimax lower bounds (2.9) in Theorem 1
2 with 1 ≤ q ≤ 2
b
and (3.13) in Theorem 5 and estimators of loss kβ−βk
q
achieving, up to a constant factor, the minimax lower bounds (2.13)
in Theorem 2 and (4.1) in Theorem 7.
2. Suppose that the estimator
βb is constructed based on the subsample
(1)
(1)
(1)
Z
= y ,X
, then there exist estimators of the loss kβb − βk22
achieving, up to a constant factor, the minimax lower bounds (2.8) in
Theorem 1, (3.5) in Theorem 3 and (3.7) in Theorem 4.
(1)
b
3. Suppose the
estimator β is constructed based on the subsample Z =
(1)
(1)
y ,X
and it satisfies Assumption (A) with δ > 2 and the assumption k(βb − β)S c k1 ≤ c∗ k(βb − β)S k1 where S = supp(β). Then
for p ≥ n there exist estimators of the loss kβb − βk2q with 1 ≤ q < 2
achieving the minimax lower bounds (3.18) in Theorem 6.
For reasons of space, we do not discuss the detailed construction of confidence intervals achieving these minimax lower bounds here and postpone
the construction to the proof of Proposition 6.
Remark 2. Sample splitting has been widely used in the literature. For
(1)
b
example, the
condition that β is constructed based on the subsample Z =
(1)
(1)
y ,X
has been introduced in [22] for constructing confidence sets for
β and in [20] for constructing confidence intervals for the `2 loss. Such a
22
T. T. CAI AND Z. GUO
condition is imposed purely for technical reasons to create the independence
between the estimator βb and the subsample Z (2) = y (2) , X (2) , which is used
b As shown in [4], the assumption
to evaluate the `q loss of the estimator β.
k(βb − β)S c k1 ≤ c∗ k(βb − β)S k1 is satisfied for Lasso and Dantzig Selector.
6. General tools for minimax lower bounds. A major step in our
analysis is to establish rate sharp lower bounds for the estimation error and
expected length of confidence intervals for the `q loss. We introduce in this
section new technical tools that are needed to establish these lower bounds.
A significant distinction of the lower bound results given in the previous
sections from those for the traditional parameter estimation problems is that
the constraint is on the performance of the estimator βb of the regression
vector β, but the lower bounds are on the difficulty of estimating its loss
kβb − βk2q . It is necessary to develop new lower bound techniques to establish
rate-optimal lower bounds for the estimation error and the expected length
of confidence intervals for the loss kβb − βk2q . These technical tools may also
be of independent interest.
We begin with notation. Let Z denote a random variable whose distribution is indexed by some parameter θ ∈ Θ and let π denote a prior
on the parameter space Θ. We will use fθ (z) to denote the density of Z
given θ and fπ (z) to denote the marginal density of Z under the prior π.
Let
R Pπ denote the distribution of Z corresponding to fπ (z), i.e., Pπ (A) =
1z∈A fπ (z) dz, where 1z∈A is the indicator function. For a function g, we
write
Eπ (g(Z)) for the expectation
R
R under fπ . More specifically, fπ (z) =
fθ (z) π (θ) dθ and Eπ (g(Z)) = g (z) fπ (z) dz. The L1 distance between
two
R probability distributions with densities f0 and f1 is given by L1 (f1 , f0 ) =
|f1 (z) − f0 (z)| dz. The following theorem establishes the minimax lower
bounds for the estimation error and the expected length of confidence intervals for the `q loss, under the constraint that βb is a good estimator at at
least one interior point.
Theorem 8. Suppose 0 < α, α0 < 41 , 1 ≤ q ≤ 2, Σ0 is positive definite,
θ0 = (β ∗ , Σ0 , σ0 ) ∈ Θ, and F ⊂ Θ. Define d = minθ∈F kβ (θ) − β ∗ kq . Let π
denote a prior over the parameter space F. If an estimator βb satisfies
1 2
∗ 2
b
(6.1)
Pθ0 kβ − β kq ≤ d ≥ 1 − α0 ,
16
then
(6.2)
1 2
2
b
b
inf sup Pθ |Lq − kβ − βkq | ≥ d ≥ c̄1 ,
4
b q θ∈{θ0 }∪F
L
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
23
and
(6.3)
b `q =
L∗α {θ0 } , Θ, β,
b `q , Z
inf
Eθ0 L CIα β,
≥ c∗2 d2 ,
b
b
CIα (β,`q ,Z )∈Iα (Θ,β,`q )
n
o
1
9
where c̄1 = min 10
, 10
− α0 − L1 (fπ , fθ0 ) + and c∗2 = 12 (1 − 2α − α0 − 2L1 (fπ , fθ0 ))+ .
Remark 3. The minimax lower bound (6.2) for the estimation error
and (6.3) for the expected length of confidence intervals hold as long as the
estimator βb estimates β well at an interior point θ0 . Besides Condition (6.1),
another key ingredient for the lower bounds (6.2) and (6.3) is to construct
the least favorable space F with the prior π such that the marginal distributions fπ and fθ0 are non-distinguishable. For the estimation lower bound
(6.2), constraining that kβb − β ∗ k2q can be well estimated at θ0 , due to the
non-distinguishability between fπ and fθ0 , we can establish that the loss
kβb − βk2q cannot be estimated well over F. For the lower bound (6.3), by
Condition (6.1) and the non-distinguishability between fπ and fθ0 , we will
show that kβb − βk2q over F is much larger than kβb − β ∗ k2q and hence the
honest confidence intervals must be sufficiently long.
Theorem 8 is used to establish the minimax lower bounds for both the
estimation error and the expected length of confidence intervals of the `q loss
over Θ(k). By taking θ0 ∈ Θ(k0 ) and Θ = Θ(k), Theorem 2 follows from
(6.2) with a properly constructed subset F ⊂ Θ(k). By taking θ0 ∈ Θ(k0 )
and Θ = Θ(k2 ), Theorem 7 follows from (6.3) with a properly constructed
F ⊂ Θ(k2 ). In both cases, Assumption (A1) implies Condition (6.1).
Several minimax lower bounds over Θ0 (k) can also be implied by Theorem
8. For the estimation
error, the minimax lower bounds (2.8) and (2.9) over
√
n
the regime k . log p in Theorem 1 follow from (6.2). For the expected length
of confidence intervals, the minimax
lower bounds
(3.7) in Theorem 4 and
√
√
n
n
(3.18) in the regions k1 ≤ k2 . log p and k1 . log p . k2 . logn p in Theorem
6 follow from (6.3). In these cases, Assumption (A1) or (A2) can guarantee
that Condition (6.1) is satisfied. However,
the minimax lower bound for esti√
n
mation error (2.9) in the region log p ≤ k . logn p and for the expected length
√
of confidence intervals (3.18) in the region lognp . k1 ≤ k2 . logn p cannot
be established using the above theorem. The following theorem, which requires testing a composite null against a composite alternative, establishes
the refined minimax lower bounds over Θ0 (k).
24
T. T. CAI AND Z. GUO
Theorem 9. Let 0 < α, α0 < 41 , 1 ≤ q ≤ 2, and θ0 = (β ∗ , Σ0 , σ0 ) where
Σ0 is a positive definite matrix. Let k1 and k2 be two sparsity levels. Assume
that for i = 1, 2 there exist parameter spaces Fi ⊂ {(β, Σ0 , σ0 ) : kβk0 ≤ ki }
such that for given disti and di
kΣ0 (β (θ) − β ∗ )k2 = disti
and
kβ (θ) − β ∗ kq = di ,
for all θ ∈ Fi .
Let πi denote a prior over the parameter space Fi for i = 1, 2. Suppose
that for θ1 = β ∗ , Σ0 , σ02 + dist21 and θ2 = β ∗ , Σ0 , σ02 + dist22 , there exist
constants c1 , c2 > 0 such that
∗ 2
2 2
b
(6.4)
Pθi kβ − β kq ≤ ci di ≥ 1 − α0 , for i = 1, 2.
Then we have
(6.5)
inf
sup
b q θ∈F1 ∪F2
L
b q − kβb − βk2q | ≥ c∗3 d22 ≥ c̄3 ,
Pθ |L
and
(6.6)
b `q ≥ c∗ (1 − c2 )2 d2 − (1 + c1 )2 d2 ,
L∗α Θ0 (k1 ) , Θ0 (k2 ) , β,
4
2
1
+
P
d2
, c∗4 = 1 − 2α0 − 2α − 2i=1 L1 (fπi , fθi ) − 2L1 (fπ2 , fπ1 ) +
(1 − c2 )2 − 41 − (1 + c1 )2 d12
2 +
n
o
P
1
9
and c̄3 = min 10
, 10
− 2α0 − 2i=1 L1 (fπi , fθi ) − 2L1 (fπ2 , fπ1 ) + .
where c∗3 = min
1
,
4
Remark 4. As long as the estimator βb performs well at two points, θ1
and θ2 , the minimax lower bounds (6.5) for the estimation error and (6.6) for
the expected length of confidence intervals hold. Note that θi in the above
theorem does not belong to the parameter space {(β, Σ0 , σ0 ) : kβk0 ≤ ki }, for
i = 1, 2. In contrast to Theorem 8, Theorem 9 compares composite hypotheses F1 and F2 , which will lead to a sharper lower bound than comparing the
simple null {θ0 } with the composite alternative F. For simplicity, we construct least favorable parameter spaces Fi such that the points in Fi is of
fixed `2 distance and fixed `q distance to β ∗ , for i = 1, 2, respectively. More
importantly, we construct F1 with the prior π1 and F2 with the prior π2 such
that fπ1 and fπ2 are not distinguishable, where θ1 and θ2 are introduced to
facilitate the comparison. By Condition (6.4) and the construction of F1
and F2 , we establish that the `q loss cannot be simultaneously estimated
well over F1 and F2 . For the lower bound (6.6), under the same conditions,
it is shown that the `q loss over F1 and F2 are far apart and any confidence interval with guaranteed coverage probability over F1 ∪ F2 must be
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
25
sufficiently long. Due to the prior information Σ = I and σ = σ0 , the lower
bound construction over Θ0 (k) is more involved than that over Θ(k). We
shall stress that the construction of F1 and F2 and the comparison between
composite hypotheses are of independent interest.
The minimax lower bound (2.9) in the region
√
n
log p
n
follows from
√log p
n
log p . k1 ≤ k2 .
.k.
(6.5) and the minimax lower bound (3.18) in the region
n
log p for the expected length of confidence intervals follows from (6.6). In
these cases, Σ0 is taken as I and Assumption (A2) implies Condition (6.4).
7. An intermediate setting with known σ = σ0 and unknown Σ.
The results given in Sections 3 and 4 show the significant difference between
Θ0 (k) and Θ(k) in terms of minimaxity and adaptivity of confidence intervals
for kβb − βk2q . Θ0 (k) is for the simple setting with known design covariance
matrix Σ = I and known noise level σ = σ0 , and the Θ(k) is for unknown
Σ and σ. In this section, we further consider minimaxity and adaptivity of
confidence intervals for kβb − βk2q in an intermediate setting where the noise
level σ = σ0 is known and Σ is unknown but of certain structure. Specifically,
we consider the following parameter space,
(7.1)
1
kβk0 ≤ k,
≤ λmin (Σ) ≤ λmax (Σ) ≤ M1
M1
Θσ0 (k, s) = (β, Σ, σ0 ) :
,
kΣ−1 kL1 ≤ M, max k Σ−1 i· k0 ≤ s
1≤i≤p
for some constants M1 ≥ 1 and M > 0. Θσ0 (k, s) basically assumes known
noise level σ and imposes sparsity conditions on the precision matrix of the
random design. This parameter space is similar to those used in the literature
of sparse linear regression with random design [29, 13, 14]. Θσ0 (k, s) has two
sparsity parameters where k represents the sparsity of β and s represents
the maximum row sparsity of the precision matrix Σ−1 . Note that Θ0 (k) ⊂
Θσ0 (k, s) ⊂ Θ(k) and Θ0 (k) is a p
special case of Θσ0 (k, s) with M1 = 1.
n/ log p, the minimaxity and adaptivity
Under the assumption s
lower bounds for the expected length of confidence intervals for kβb − βk2q
with 1 ≤ q < 2 over Θσ0 (k, s) are the same as those over Θ0 (k). That
is, Theorems 5 and 6 hold with Θ0 (k1 ), Θ0 (k2 ), and Θ0 (k) replaced by
Θσ0 (k1 , s), Θσ0 (k2 , s), and Θσ0 (k, s), respectively. For the case q = 2, the
following theorem establishes the minimaxity and adaptivity lower bounds
for the expected length of confidence intervals for kβb − βk22 over Θσ0 (k, s).
26
T. T. CAI AND Z. GUO
p
Theorem 10. Suppose 0 < α, α0 < 1/4, M1 > 1, s n/log p and
the sparsity levels k1 , k2 and k0 satisfy Assumption (B2) with the constant
c0 replaced by c∗0 defined in (9.14). For any estimator βb satisfying
2
∗ 2
∗
∗ q log p 2
b
(7.2)
sup Pθ kβ − β kq ≥ C kβ k0
σ ≤ α0 ,
n
θ∈Θ(k0 )
with a constant C ∗ > 0, then there is some constant c > 0 such that
(7.3)
log p
log p 1
∗
b
√
, max k1
,
σ02
Lα Θσ0 (k1 , s), Θσ0 (k2 , s), β, `2 ≥ c min k2
n
n
n
and
b `2 ≥ c ki log p σ 2
L∗α Θσ0 (ki , s), β,
0
n
(7.4)
and
i = 1, 2.
In particular,
if p ≥ n and βb is constructed based on the subsample Z (1) =
y (1) , X (1) and satisfies Assumption (A) with δ > 2, the above lower bounds
can be attained.
In contrast to Theorems 3 and 4, the lower bounds for the case q = 2
change in the absence of the prior knowledge Σ = I but the possibility of
adaptivity of confidence intervals over Θσ0 (k, s) is similar to that
√ over Θ0 (k).
L
b
Since the Lasso estimator β defined in (2.10) with A > 4 2 satisfies Assumption (A) with δ > 2, by Theorem 10, the minimax lower
bounds (7.3)
√
n
L
L
b
b
and (7.4) can be attained for β . For β , only when log p . k1 ≤ k2 .
n
b `2 k1 log p
, L∗ Θσ (k1 , s), βbL , `2 L∗ Θσ (k1 , s), Θσ (k2 , s), β,
log p
α
0
α
0
0
n
and adaptation between
s) is possible. In other regimes,
Θσ0 (k1 , s) andΘσ0 (k2 ,
∗
L
∗
b
b `2
if k1 k2 , then Lα Θσ0 (k1 , s), β , `2 Lα Θσ0 (k1 , s), Θσ0 (k2 , s), β,
and adaptation between Θσ0 (k1 , s) and Θσ0 (k2 , s) is impossible. For reasons
of space, more discussion on Θσ0 (k, s), including
the construction of adap√
n
tive confidence intervals over the regime log p . k1 ≤ k2 . logn p , is postponed
to the supplement [6].
8. Minimax lower bounds for estimating kβk2q with 1 ≤ q ≤
2. The lower bounds developed in this paper have broader implications.
In particular, the established results imply the minimax lower bounds for
estimating kβk2q and the expected length of confidence intervals for kβk2q
with 1 ≤ q ≤ 2. To build the connection, it is sufficient to note that the
trivial estimator βb = 0 satisfies Assumptions (A1) and (A2) with β ∗ = 0.
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
27
Then we can apply the lower bounds (2.8), (2.9) and (2.13) to the estimator
βb = 0 and establish the minimax lower bounds of estimating kβk2q ,
(8.1)
log p 1
2
b
σ02 ≥ δ;
inf sup Pθ |L2 − kβk2 | ≥ c min k
,√
n
n
b 2 θ∈Θ0 (k)
L
(8.2)
2 log p
2
2
b
q
inf sup Pθ |Lq − kβkq | ≥ ck
σ ≥ δ,
n 0
b q θ∈Θ0 (k)
L
(8.3)
2 log p
2
b
q
inf sup Pθ |Lq − kβkq | ≥ ck
≥ δ,
n
b q θ∈Θ(k)
L
for 1 ≤ q < 2,
for 1 ≤ q ≤ 2,
for some constants δ > 0 and c > 0. Similarly, all the lower bounds for the
expected length of confidence intervals for kβb−βk2q established in Theorem 3
to Theorem 7 imply corresponding lower bounds for kβk2q . The lower bound
min{k logn p , √1n }σ02 in (8.1) is the same as the detection boundary in the
sparse linear regression for the case Σ = I and σ = 1; See [19] and [1] for
more details. Estimation of kβk22 in high-dimensional linear regression has
been considered in [17] under the general setting where Σ and σ are unknown
and the lower bound (8.3) with q = 2 leads to one key component of the
lower bound ck logn p for estimating kβk22 .
9. Proofs. In this section, we present the proofs of the lower bound
results. In Section 9.1, we establish the general lower bound result, Theorem
8. By applying Theorem 8 and Theorem 9, we establish Theorems 4 and 6
in Section 9.2. For reasons of space, the proofs of Theorems 1, 2, 3, 5, 7, 9,
10, the upper bound results, including Propositions 1, 2, 3, 4, 5, 6 and the
proofs of technical lemmas are postponed to the supplement [6].
We define the χ2 distance between two density functions f1 and f0 by
2
R
R f 2 (z)
0 (z))
χ2 (f1 , f0 ) = (f1 (z)−f
dz = f10 (z) dz − 1, and it is well known that
f0 (z)
(9.1)
L1 (f1 , f0 ) ≤
p
χ2 (f1 , f0 ).
Let PZ,θ∼π denote the joint probability of Z and θ with the joint density
function f (θ, z) = fθ (z) π (θ) . We introduce the following lemma, which is
used in the proofs of Theorem 8 and Theorem 9. The proof of this lemma
can be found in the supplement [6].
28
T. T. CAI AND Z. GUO
Lemma 1.
For any event A, we have
(9.2)
Pπ (Z ∈ A) = PZ,θ∼π (Z ∈ A) ,
(9.3)
|Pπ1 (Z ∈ A) − Pπ2 (Z ∈ A)| ≤ L1 (fπ2 , fπ1 ) .
We will write Pπ (A) and PZ,θ∼π (A) for Pπ (Z ∈ A) and PZ,θ∼π (Z ∈ A)
b q (Z) denotes a data-dependent loss estimator and
respectively. Recall that L
β(θ) denotes the corresponding β of the parameter θ.
1
9.1. Proof of Theorem 8. We set c0 = 14 and α1 = 10
.
Proof of (6.2)
We assume
1 2
∗ 2
b
b
(9.4)
Pθ0 Lq (Z) − kβ(Z) − β kq ≤ d ≥ 1 − α1 .
4
Otherwise, we have
1
2
∗
2
b
b q (Z) − kβ(Z)
(9.5)
Pθ0 L
− β kq ≥ d ≥ α1 .
4
and hence (6.2) follows. Define the event
1
∗
2
2
2
∗
2
2
b −β k ≤c d , L
b −β k ≤ d .
b q (z) − kβ(z)
(9.6) A0 = z : kβ(z)
q
0
q
4
By (6.1) and (9.4), we have Pθ0 (A0 ) ≥ 1 − α0 − α1 . By (9.3), we obtain
Z
(9.7)
Pπ (A0 ) ≥ 1 − α0 − α1 − |fθ0 (z) − fπ (z)| dz.
For z ∈ A0 and θ ∈ F, by triangle inequality,
(9.8)
b − β(θ)kq ≥ kβ(θ) − β ∗ kq − kβ(z)
b − β ∗ kq ≥ (1 − c0 ) d.
kβ(z)
b − β (θ) k2 ≥ kβ(z)
b − β (θ) k2 − kβ(z)
b − β ∗ k2 −
b q (z) − kβ(z)
For z ∈ A0 and θ ∈ F, then L
q
q
q
b − β ∗ k2 ≥ (1 − 2c0 − 1 )d2 , where the first inequality follows
b q (z) − kβ(z)
L
q
4
from triangle inequality and the last inequality follows from (9.6) and (9.8).
Hence, for z ∈ A0 , we obtain
(9.9)
b − β (θ) k2 ≥ (1 − 2c0 − 1 )d2 .
b q (z) − kβ(z)
inf L
q
θ∈F
4
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
29
b
b q (Z) − kβ(Z)
Note that supθ∈F Pθ L
− β (θ) k2q ≥ (1 − 2c0 − 14 )d2 ≥
b
b q (Z) − kβ(Z)
supθ∈F Pθ inf θ∈F L
− β (θ) k2q ≥ (1 − 2c0 − 14 )d2 . Since the
max risk is lower bounded
by the Bayesian risk, we can further lower bound
b
b q (Z) − kβ(Z)
the last term by Pπ inf θ∈F L
− β (θ) k2q ≥ (1 − 2c0 − 14 )d2 .
Combined with (9.9), we establish
1 2
2
b
b
(9.10) sup Pθ Lq (Z) − kβ(Z) − β (θ) kq ≥ (1 − 2c0 − )d ≥ Pπ (A0 ).
4
θ∈F
Combining (9.5), (9.7) and (9.10), we establish (6.2).
Proof of (6.3)
b `q , Z ∈ Iα Θ, β,
b `q , we have
For CIα β,
(9.11)
b
b `q , Z
− β (θ) k2q ∈ CIα β,
inf Pθ kβ(Z)
≥ 1 − α.
θ∈Θ
n
o
b − β ∗ kq < c0 d, kβ(z)
b − β ∗ k2 ∈ CIα β,
b L, z .
Define the event A = z : kβ(z)
q
By (6.1) and (9.11), we have Pθ0 (A) ≥ 1 − α − α0 . (9.2) and (9.3) imply
PZ,θ∼π (A) = Pπ (A) ≥ 1 − α − α0 − L1 (fπ , fθ0 ) .
n
o
b − β (θ) k2 ∈ CIα β,
b `q , z
Define the event Bθ = z : kβ(z)
and M =
q
∪θ∈F Bθ . By (9.11), we have
Z Z
Z Z
PZ,θ∼π (M) =
1z∈M fθ (z)dz π (θ) dθ ≥
1z∈Bθ fθ (z)dz π (θ) dθ ≥ 1−α.
(9.12)
Combined with (9.12), we have PZ,θ∼π (A ∩ M) ≥ 1 − 2α − α0 − L1(fπ , fθ0) .
b − β(θ̄)k2 ∈ CIα β,
b `q , z ;
For z ∈ M, there exists θ̄ ∈ F such that kβ(z)
q
b − β ∗ k2 ∈ CIα β,
b `q , z and kβ(z)
b − β ∗ kq < c0 d.
For z ∈ A, we have kβ(z)
q
b `q , z
b − β(θ̄)k2 , kβ(z)
b − β ∗ k2 ∈ CIα β,
Hence, for z ∈ A ∩ M, we have kβ(z)
q
q
∗
∗
b
b
and kβ(z) − β(θ̄)kq ≥ kβ(θ̄) − β kq − kβ(z) − β kq ≥ (1 − c0 ) d and hence
(9.13)
b `q , z
L CIα β,
≥ (1 − 2c0 ) d2 .
n
o
b `q , z
≥ (1 − 2c0 ) d2 . By (9.13), we
Define the event C = z : L CIα β,
have Pπ (C) = PZ,θ∼π (C) ≥ PZ,θ∼π (A ∩ M) ≥ 1 − 2α − α0 − L1 (fπ , fθ0 ) . By
(9.3), we establish Pθ0 (C) ≥ 1 − 2α − α0 − 2L1 (fπ , fθ0 ) and hence (6.3).
30
T. T. CAI AND Z. GUO
9.2. Proof of Theorems 4 and 6. We first specify some constants used in
0
and
the proof. Let C ∗ be given in (2.6). Define 1 = 1−2α−2α
12
(9.14)
(
c0 = min
2
1
, 32 log 1 + 21 ,
2
3
q
log(1 + 21 ),
1 − 2γ
,
16C ∗
1 − 2γ
16C ∗
2 )
, c∗0 = min c0 ,
√
M1 − 1
√
C ∗ M1 + M1 − 1
Theorems 4 and 6 follow from Theorem 11 below.
Theorem 11. Suppose 0 < α < 14 , 1 ≤ q ≤ 2 and the sparsity levels
k1 , k2 and k0 satisfy Assumption (B2). Suppose that βb satisfies Assumption
(A2) with kβ ∗ k0 ≤ k0 .
1. If k2 .
√
n
log p ,
then there is some constant c > 0 such that
2
b `q ≥ ck q log p σ 2 .
L∗α Θ0 (k1 ) , Θ0 (k2 ) , β,
2
n 0
(9.15)
√
2. If lognp . k2 . logn p , then there is some constant c > 0 such that
(9.16)
b `q
L∗α Θ0 (k1 ) , Θ0 (k2 ) , β,
2
−1
q
2
2
−1
log p
log p
k2
σ02 ,
≥ c max
− (1 + c1 )2 k1q
, √
(1 − c2 )2 k2q k1
n
n
n
+
1
where c1 =
C ∗ M1 k0q
1
(k1 −k0 ) q
1
and c2 =
C ∗ k0q
1−1
1
2 (k1 −k0 ) 2
.
M1 (k2 −k0 ) q
2 −1
k2q
√
In particular, the minimax lower bound (9.15) and the term n σ02 in (9.16)
can be established under the weaker assumption (A1) with kβ ∗ k0 ≤ k0 .
By Theorem 11, we
establish (3.7) in Theorem 4 and (3.18) in Theorem 6.
√
n
In the regime k2 . log p , the lower bound (3.7) for q = 2 and (3.18) for 1 ≤
√
q < 2 follow from (9.15). For the case q = 2, in the regime lognp . k2 . logn p ,
the first term of the right hand side of (9.16) is 0 while the second term is √1n ,
which leads to (3.7). For 1 ≤ q < 2, let k1∗ = min{k
1 , ζ0 k2 } for some constant
∗
b `q ≥
0 < ζ0 < 1, an application of (9.16) leads to Lα Θ0 (k1∗ ) , Θ0 (k2 ) , β,
(
)
2
2
c max k2q
−1
−1
k1∗ logn p ,
k2q
√
n
σ02 . By this result, if k1 ≤ ζ0 k2 , the lower bounds
√
(3.18) in the regions k1 .
n
log p
. k2 .
n
log p
√
and
n
log p
. k1 ≤ k2 .
n
log p
.
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
31
b `q ≥
follow; if ζ0 k2 < k1 ≤ k2 , by the fact that L∗α Θ0 (k1 ) , Θ0 (k2 ) , β,
b `q and k ∗ = ζ0 k2 ≥ ζ0 k1 , the lower bounds (3.18)
L∗α Θ0 (k1∗ ) , Θ0 (k2 ) , β,
1
√
n
log p
. k2 .
n
log p
√
n
log p
. k1 ≤ k2 . logn p follow.
The following
lemma shows that (3.7) holds for βbL defined in (2.10) with
√
bL
A > 2 by verifying
√ Assumption (A1) and (3.18) holds for β defined in
(2.10) with A > 4 2 by verifying Assumption (A2). Its proof can be found
in the supplement [6].
over the regions k1 .
and
√
If A > 4 2, then we have
2
log p 2
inf
Pθ kβbL − β ∗ k2q ≤ Ckβ ∗ k0q
σ ≥ 1−c exp −c0 n −p−c .
n
{θ=(β ∗ ,I,σ):σ≤2σ0 }
√
In particular, the above result holds for q = 2 under the assumption A > 2.
Lemma 2.
References.
[1] Ery Arias-Castro, Emmanuel J Candès, and Yaniv Plan. Global testing under sparse
alternatives: Anova, multiple comparisons and the higher criticism. The Annals of
Statistics, 39(5):2533–2556, 2011.
[2] Mohsen Bayati and Andrea Montanari. The lasso risk for gaussian matrices. Information Theory, IEEE Transactions on, 58(4):1997–2017, 2012.
[3] Alexandre Belloni, Victor Chernozhukov, and Lie Wang. Square-root lasso: pivotal
recovery of sparse signals via conic programming. Biometrika, 98(4):791–806, 2011.
[4] Peter J Bickel, Ya’acov Ritov, and Alexandre B Tsybakov. Simultaneous analysis of
lasso and dantzig selector. The Annals of Statistics, 37(4):1705–1732, 2009.
[5] Peter Bühlmann and Sara Van De Geer. Statistics for high-dimensional data: methods, theory and applications. Springer Science & Business Media, 2011.
[6] T Tony Cai and Zijian Guo. Supplement to “accuracy assessment for highdimensional linear regression”. 2016.
[7] T Tony Cai and Zijian Guo. Confidence intervals for high-dimensional linear regression: Minimax rates and adaptivity. The Annals of Statistics, to appear.
[8] T Tony Cai and Mark G Low. An adaptation theory for nonparametric confidence
intervals. The Annals of statistics, 32(5):1805–1840, 2005.
[9] T Tony Cai and Mark G Low. Adaptive confidence balls. The Annals of Statistics,
34(1):202–228, 2006.
[10] T Tony Cai, Mark G Low, and Zongming Ma. Adaptive confidence bands for nonparametric regression functions. Journal of the American Statistical Association,
109:1054–1070, 2014.
[11] T. Tony Cai and Harrison H Zhou. A data-driven block thresholding approach to
wavelet estimation. The Annals of Statistics, 37(2):569–595, 2009.
[12] Emmanuel Candès and Terence Tao. The dantzig selector: statistical estimation when
p is much larger than n. The Annals of Statistics, 35(6):2313–2351, 2007.
[13] Victor Chernozhukov, Christian Hansen, and Martin Spindler. Post-selection and
post-regularization inference in linear models with many controls and instruments.
2015.
32
T. T. CAI AND Z. GUO
[14] Victor Chernozhukov, Christian Hansen, and Martin Spindler. Valid post-selection
and post-regularization inference: An elementary, general approach. arXiv preprint
arXiv:1501.03430, 2015.
[15] David L Donoho and Iain M Johnstone. Adapting to unknown smoothness via wavelet
shrinkage. Journal of the American Statistical Association, 90(432):1200–1224, 1995.
[16] David L Donoho, Arian Maleki, and Andrea Montanari. The noise-sensitivity
phase transition in compressed sensing. Information Theory, IEEE Transactions
on, 57(10):6920–6941, 2011.
[17] Zijian Guo, Wanjie Wang, T Tony Cai, and Hongzhe Li. Optimal estimation of
co-heritability in high-dimensional linear models. arXiv preprint arXiv:1605.07244,
2016.
[18] Marc Hoffmann and Richard Nickl. On adaptive inference and confidence bands. The
Annals of Statistics, 39(5):2383–2409, 2011.
[19] Yuri I Ingster, Alexandre B Tsybakov, and Nicolas Verzelen. Detection boundary in
sparse regression. Electronic Journal of Statistics, 4:1476–1526, 2010.
[20] Lucas Janson, Rina Foygel Barber, and Emmanuel Candès. Eigenprism: Inference
for high-dimensional signal-to-noise ratios. arXiv preprint arXiv:1505.02097, 2015.
[21] Ker-Chau Li. From stein’s unbiased risk estimates to the method of generalized cross
validation. The Annals of Statistics, 13(4):1352–1377, 1985.
[22] Richard Nickl and Sara van de Geer. Confidence sets in sparse regression. The Annals
of Statistics, 41(6):2852–2876, 2013.
[23] Garvesh Raskutti, Martin J Wainwright, and Bin Yu. Minimax rates of estimation
for high-dimensional linear regression over-balls. Information Theory, IEEE Transactions on, 57(10):6976–6994, 2011.
[24] James Robins and Aad Van Der Vaart. Adaptive nonparametric confidence sets. The
Annals of Statistics, 34(1):229–253, 2006.
[25] Charles M Stein. Estimation of the mean of a multivariate normal distribution. The
Annals of Statistics, 9(6):1135–1151, 1981.
[26] Tingni Sun and Cun-Hui Zhang. Scaled sparse linear regression. Biometrika,
101(2):269–284, 2012.
[27] Christos Thrampoulidis, Ashkan Panahi, and Babak Hassibi. Asymptotically exact
error analysis for the generalized `22 -lasso. arXiv preprint arXiv:1502.06287, 2015.
[28] Robert Tibshirani. Regression shrinkage and selection via the lasso. Journal of the
Royal Statistical Society. Series B (Methodological), 58(1):267–288, 1996.
[29] Sara van de Geer, Peter Bühlmann, Yaacov Ritov, and Ruben Dezeure. On asymptotically optimal confidence regions and tests for high-dimensional models. The Annals
of Statistics, 42(3):1166–1202, 2014.
[30] Nicolas Verzelen. Minimax risks for sparse regressions: Ultra-high dimensional phenomenons. Electronic Journal of Statistics, 6:38–90, 2012.
[31] Fei Ye and Cun-Hui Zhang. Rate minimaxity of the lasso and dantzig selector for the
`q loss in `r balls. The Journal of Machine Learning Research, 11:3519–3540, 2010.
[32] Feng Yi and Hui Zou. SURE-tuned tapering estimation of large covariance matrices.
Computational Statistics & Data Analysis, 58:339–351, 2013.
HIGH-DIMENSIONAL ACCURACY ASSESSMENT
DEPARTMENT OF STATISTICS
THE WHARTON SCHOOL
UNIVERSITY OF PENNSYLVANIA
PHILADELPHIA, PENNSYLVANIA 19104
USA
E-mail: [email protected]
[email protected]
URL: http://www-stat.wharton.upenn.edu/∼tcai/
33
| 10math.ST
|
arXiv:1502.05445v3 [math.GR] 30 May 2017
Effective Separability of Finitely Generated Nilpotent Groups
1
Effective Separability of
Finitely Generated Nilpotent Groups
Mark Pengitore∗
June 1, 2017
Abstract
We give effective proofs of residual finiteness and conjugacy separability for finitely generated
nilpotent groups. In particular, we give precise asymptotic bounds for a function introduced
by Bou-Rabee that measures how large the quotients that are needed to separate non-identity
elements of bounded length from the identity which improves the work of Bou-Rabee. Similarly, we give polynomial upper and lower bounds for an analogous function introduced by
Lawton, Louder, and McReynolds that measures how large the quotients that are needed to
separate pairs of distinct conjugacy classes of bounded word length using work of Blackburn
and Mal’tsev.
1
Introduction
We say that Γ is residually finite if for each γ ∈ Γ − {1} there exists a surjective homomorphism
to a finite group ϕ : Γ → Q such that ϕ (γ ) 6= 1. Mal’tsev [29] proved that if Γ is a residually
finite finitely presentable group, then there exists a solution to the word problem of Γ. We say
that Γ is conjugacy separable if for each non-conjugate pair γ , η in Γ there exists a surjective
homomorphism to a finite group ϕ : Γ → Q such that ϕ (γ ) and ϕ (η ) are not conjugate. Mal’tsev
[29] also proved that if Γ is a conjugacy separable finitely presentable group, then there exists a
solution to the conjugacy problem of Γ
Residual finiteness, conjugacy separability, subgroup separability, and other residual properties
have been extensively studied and used to great effect in resolving important conjectures in geometry, such as the work of Agol on the Virtual Haken conjecture. Much of the work in the literature
has been to understand which groups satisfy various residual properties. For example, free groups,
polycyclic groups, surface groups, and fundamental groups of compact, orientable 3-manifolds
have all been shown to be residually finite and conjugacy separable [2, 13, 17, 18, 34, 36]. Recently, there have been several papers that have made effective these separability properties for
certain classes of groups. The main purpose of this article is to improve on the effective residual
∗ Purdue
University, West Lafayette, IN. E-mail: [email protected]
Effective Separability of Finitely Generated Nilpotent Groups
2
finiteness results of [4] and establish effective conjugacy separability results, both for the class of
finitely generated nilpotent groups.
1.1
Residual Finiteness
For a finitely generated group Γ with a finite generating subset S, [4] (see also [33]) introduced a
function FΓ,S (n) on the natural numbers that quantifies residual finiteness. Specifically, the value of
FΓ,S (n) is the maximum order of a finite group needed to distinguish a non-identity element from
the identity as one varies over non-identity elements in the n-ball. Numerous authors have studied
the asymptotic behavior of FΓ,S (n) for a wide collection of groups Γ (see [3, 4, 5, 8, 9, 20, 31, 33]).
To state our results, we require some notation. For two non-decreasing functions f , g : N → N,
we write f g if there exists a C ∈ N such that f (n) ≤ Cg(Cn) for all n ∈ N. We write f ≈ g
when f g and g f . For a finitely generated nilpotent group Γ, we denote T (Γ) to be the
normal subgroup of finite order elements. As we will see in Subsection 2.2.1, the dependence of
FΓ,S (n) is mild; subsequently, we will suppress the dependence of FΓ on the generating subset in
this subsection.
For finitely generated nilpotent groups, Bou-Rabee [4, Thm 0.2] proved that FΓ (n) (log(n))h(Γ)
where h(Γ) is the Hirsch length of Γ. Our first result establishes the precise asymptotic behavior
of FΓ (n).
Theorem 1.1. Let Γ be an infinite, finitely generated nilpotent group. There exists a ψRF (Γ) ∈
N such that FΓ (n) ≈ (log(n))ψRF (Γ) . Additionally, one can compute ψRF (Γ) given a basis for
(Γ/T (Γ))c where c is the step length of Γ/T (Γ).
The proof of Theorem 1.1 is done in two steps. To establish the upper bound, we appeal to
some structural properties of finitely generated nilpotent groups. To establish the lower bound, we
construct a sequence {γi } ⊆ Γ such that the order of the minimal finite group that separates γi from
the identity is bounded below by C(log(Ckγi kS ))ψRF (Γ) for some C ∈ N.
The following is a consequence of the proof of Theorem 1.1.
Corollary 1.2. Let Γ be a finitely generated nilpotent group. Then FΓ (n) ≈ (log(n))h(Γ) if and
only if h(Z(Γ/T (Γ))) = 1.
We now introduce some terminology. Suppose that G is a connected, simply connected nilpotent
Lie group with Lie algebra g. We say that G is Q-defined if g admits a basis with rational structure constants. The Mal’tsev completion of a torsion free, finitely generated nilpotent group Γ
is a connected, simply connected, Q-defined nilpotent Lie group G such that Γ embeds into as a
cocompact lattice.
The next theorem demonstrates that the asymptotic behavior of FΓ (n) is an invariant of the Mal’tsev
completion of Γ/T (Γ).
Theorem 1.3. Suppose that Γ1 and Γ2 are two infinite, finitely generated nilpotent groups such
that Γ1 /T (Γ1 ) and Γ2 /T (Γ2 ) have isomorphic Mal’tsev completions. Then FΓ1 (n) ≈ FΓ2 (n).
Effective Separability of Finitely Generated Nilpotent Groups
3
The proof of theorem 1.3 follows by an examination of a cyclic series that comes from a refinement
of the upper central series and its interaction with the topology of the Mal’tsev completion.
Since the 3-dimensional integral Heisenberg group embeds into every infinite, non-abelian nilpotent group, Theorem 1.1, Theorem 1.3, [4, Thm 2.2], and [4, Cor 2.3] allow us to characterize
Rd within the collection of connected, simply connected Q-defined nilpotent Lie groups by the
asymptotic behavior of residual finiteness of a cocompact lattice.
Corollary 1.4. Let G be a connected, simply connected, Q-defined nilpotent Lie group. Then G is
Lie isomorphic to Rdim(G) if and only if FΓ (n) (log(n))3 where Γ ⊆ G is any cocompact lattice.
For the last result of this section, we need some terminology. We say that a group Γ is irreducible
if there is no non-trivial splitting of Γ as a direct product. For a function of the form f (n) =
(log(n))m , we call m the polynomial in logarithm degree of growth for f (n).
Theorem 1.5.
(i) For c ∈ N, there exists m(c) ∈ N satisfying the following. For each ℓ ∈ N there exists an
irreducible, torsion free, finitely generated nilpotent group Γ of step length c and h(Γ) ≥ ℓ
such that FΓ (n) (log(n))m(c) .
(ii) Every natural number not equal to 2 can be realized as the polynomial in logarithm degree of
growth for FΓ (n) where Γ is an irreducible, torsion free, finitely generated nilpotent group.
(iii) Suppose 2 ≤ c1 < c2 are natural numbers. For each ℓ ∈ N, there exist irreducible, torsion
free, finitely generated nilpotent groups Γℓ and ∆ℓ of step lengths c1 and c2 , respectively,
such that FΓℓ (n) ≈ F∆ℓ (n).
(iv) For natural numbers c > 1 and m ≥ 1, there exists an irreducible, torsion free, finitely
generated nilpotent group Γ of step length c such that (log(n))m FΓ (n).
For Theorem 1.5(i), we consider free nilpotent groups of a fixed step length and increasing rank.
We make use of central products of filiform nilpotent groups for Theorem 1.5(ii) - (iv).
Using Theorem 1.5, we are able to relate the polynomial in logarithm degree of growth of the
residual finiteness function with well known invariants of the class of finitely generated nilpotent
groups. Theorem 1.5(i) implies the polynomial in logarithm degree of growth of FΓ (n) does not
depend on the Hirsch length of Γ. Similarly, Theorem 1.5(iv) implies there is no upper bound in
terms of step length of Γ for the polynomial in logarithm degree of growth of FΓ (n). On the other
hand, the step size of Γ is not determined by the polynomial in logarithm growth of FΓ (n) as seen
in Theorem 1.5(iii).
1.2
Conjugacy Separability
We now turn our attention to effective conjugacy separability. Lawton–Louder–McReynolds [24]
introduced a function ConjΓ,S (n) on the natural numbers that quantifies conjugacy separability. To
Effective Separability of Finitely Generated Nilpotent Groups
4
be precise, the value of ConjΓ,S (n) is the maximum order of the minimal finite quotient needed to
separate a pair of non-conjugate elements as one varies over non-conjugate pairs of elements in
the n-ball. Since the dependence of ConjΓ,S (n) on S is mild (see Lemma 2.1), we will suppress the
generating subset throughout this subsection.
To the author’s knowledge, the only previous work on the asymptotic behavior of ConjΓ (n) is due
to Lawton–Louder–McReynolds [24]. They demonstrate that if Γ is a surface group or a finite
2
rank free group, then ConjΓ (n) nn [24, Cor 1.7]. In this subsection, we initiate the study of the
asymptotic behavior of ConjΓ (n) for the collection of finitely generated nilpotent groups.
Our first result is the precise asymptotic behavior of ConjH2m+1 (Z) (n) where H2m+1 (Z) is the (2m +
1)-dimensional integral Heisenberg group.
Theorem 1.6. ConjH2m+1 (Z) (n) ≈ n2m+1 .
For general nilpotent groups, we establish the following upper bound for ConjΓ (n).
Theorem 1.7. Let Γ be a finitely generated nilpotent group. Then ConjΓ (n) nk for some k ∈ N.
Blackburn [2] was the first to prove conjugacy separability of finitely generated nilpotent groups.
Our strategy for proving Theorem 1.7 is to effectivize [2].
For the same class of groups, we have the following lower bound which allows us to characterize
virtually abelian groups within the class of finitely generated nilpotent groups. Moreoever, we
obtain the first example of a class of groups for which the asymptotic behavior of FΓ (n) and
ConjΓ (n) are shown to be dramatically different.
Theorem 1.8. Let Γ be a finitely generated nilpotent group.
(i) If Γ contains a normal abelian subgroup of index m, then log(n) ConjΓ (n) (log(n))m .
(ii) Suppose that Γ is not virtually abelian. Then there exists a ψLower (Γ) ∈ N such that nψLower (Γ)
ConjΓ (n). Additionally, one can compute ψLower (Γ) given a basis for (Γ/T (Γ))c where c is
the step length of Γ/T (Γ).
The proof of Theorem 1.8(i) is elementary. We prove Theorem 1.8(ii) by finding an infinite sequence of non-conjugate elements {γi , ηi } such that the order of the minimal finite group that
ψ
(Γ)
separates the conjugacy classes of γi and ηi is bounded below by C ni Lower for some C ∈ N
where kγi kS , kηi kS ≈ ni for some finite generating subset S.
We have the following theorem which is similar in nature to Theorem 1.3.
Theorem 1.9. Let Γ and ∆ be infinite, finitely generated nilpotent groups of step size greater than
or equal to 2, and suppose that Γ/T (Γ) and ∆/T (∆) have isomorphic Mal’tsev completions. Then
nψLower (Γ) Conj∆ (n) and nψLower (∆) ConjΓ (n).
We apply Theorem 1.8 to construct nilpotent groups that help demonstrate the various asymptotic
behaviors that the growth of conjugacy separability may exhibit.
Effective Separability of Finitely Generated Nilpotent Groups
5
Theorem 1.10. For natural numbers c > 1 and k ≥ 1, there exists an irreducible, torsion free,
finitely generated nilpotent group Γ of step length c such that nk ConjΓ (n).
Theorem 1.10 implies that the conjugacy separability function does not depend of the step length
of the nilpotent group. We consider central products of filiform nilpotent groups for Theorem 1.10.
1.3
Acknowledgements
I would like to thank my advisor Ben McReynolds for all his help and my mentor Priyam Patel for
her guidance. I am indebted to Karel Dekimpe for his suggestions for Proposition 11.1. I also want
to thank Khalid Bou-Rabee for looking at earlier drafts of this article and for his many insightful
comments. Finally, I want to thank Alex Barrios, Rachel Davis, Jonas Deré, Artur Jackson, Gijey
Gilliam, Brooke Magiera, and Nick Miller for conversations on this article.
2
Background
We will assume the reader is familiar with finitely generated groups, Lie groups and Lie algebras.
2.1
Notation and conventions
We let lcm {r1 , . . . , rm } be the lowest common multiple of {r1 , · · · , rm } ⊆ Z with the convention
that lcm(a) = |a| and lcm(a, 0) = 0. We let gcd(r1 , · · · , rm ) be the greatest common multiple of
{r1 , · · · , rm } ⊆ Z with the convention that gcd(a, 0) = |a|.
We denote kγ kS as the word length of γ with respect to S and denote the identity of Γ as 1. We
denote the order of γ as an element of Γ as OrdΓ (γ ). We write γ ∼ η when there exists a g ∈ Γ such
that g−1 γ g = η . For a normal subgroup ∆ E Γ, we set π∆ : Γ → Γ/∆ to be the natural projection
and write γ̄ = π∆ (γ ) when ∆ is clear from context. For a subset X ⊆ Γ, we denote hX i to be the
subgroup generated by X .
We define the commutator of γ and η as [γ , η ] = γ −1 η −1 γ η . We denote the m-fold commutator
of {γi }m
i=1 ⊆ Γ as [γ1 , . . . , γm ] with the convention that [γ1 , . . . , γm ] = [[γ1 , , . . . , γm−1 ], γm ].
We denote the center of Γ as Z(Γ) and the centralizer of γ in Γ as CΓ (γ ). We define Γi to be the
i-th term of the lower central series and Z i (Γ) to be the i-th term of the upper central series. For
γ ∈ Γ − {1}, we denote Height(γ ) as the minimal j ∈ N such that πZ j−1 (Γ) (γ ) 6= 1.
We define the abelianization of Γ as Γab with the associated projection given by πab = π[Γ,Γ] . For
m ∈ N, we define Γm ∼
= hγ m | γ ∈ Γi and denote the associated projection as σm = πΓm .
dim (g)
dim (g)
dim (g)
When given a basis X = {Xi }i=1R for g, we denote k ∑i=1R αi Xi kX = ∑i=1R |αi |. For a Lie
algebra g with a Lie ideal h, we define πh : g → g/h to be the natural Lie projection.
For a R-Lie algebra g, we denote Z(g) to the center of g, gi to be the i-th term of the lower central
series, and Z i (g) to be the i-th term of the upper central series.
Effective Separability of Finitely Generated Nilpotent Groups
6
For A ∈ g, we define the map adA : g → g to be given by adA (B) = [A, B]. We denote the m-fold Lie
bracket of {Ai }m
i=1 ⊆ g as [A1 , · · · Am ] with the convention that [A1 , · · · , Am ] = [[A1 , · · · , Am−1 ], Am ].
2.2
2.2.1
Finitely generated groups and separability
Residually finite groups
Following [4] (see also [33]), we define the depth function of Γ as DΓ : Γ − {1} → N ∪ {∞} for
finitely generated groups to be given by
def
DΓ (γ ) = min {|Q| | ϕ : Γ → Q, |Q| < ∞, and ϕ (γ ) 6= 1} .
def
We define FΓ,S : N → N by FΓ,S (n) = max {DΓ (γ ) | kγ kS ≤ n and γ 6= 1} . When Γ is a residually
finite group, then FΓ,S (n) < ∞ for all n ∈ N. For any two finite generating subsets S1 and S2 ,
we have FΓ,S1 (n) ≈ FΓ,S2 (n) (see [4, Lem 1.1]). Therefore, we will suppress the choice of finite
generating subset.
2.2.2
Conjugacy separable groups
Following [24], we define the conjugacy depth function of Γ as CDΓ : Γ × Γ − {(γ , η ) | γ ∼ η } →
N ∪ {∞} to be given by
def
CDΓ (γ , η ) = min {|Q| | ϕ : Γ → Q, |Q| < ∞, and ϕ (γ ) ≁ ϕ (η )} .
def
We define ConjΓ,S (n) : N → N as ConjΓ,S (n) = max {CDΓ (γ , η ) | γ ≁ η and kγ kS , kη kS ≤ n} .
When Γ is a conjugacy separable group, then ConjΓ,S (n) < ∞ for all n ∈ N.
Lemma 2.1. If S1 , S2 are two finite generating subsets of Γ, then ConjΓ,S1 (n) ≈ ConjΓ,S2 (n).
The proof is similar to [4, Lem 1.1] (see also [24, Lem 2.1]). As before, we will suppress the
choice of finite generating subset.
[24, Lem 2.1] implies that the order of minimal finite group required to separate a non-identity
element γ ∈ Γ from the identity is bounded above by order of the minimal finite group required
to separate the conjugacy class of γ from the identity. Thus, FΓ (n) ConjΓ (n) for all conjugacy
separable groups. In particular, if Γ is conjugacy separable, then Γ is residually finite.
2.3
Nilpotent groups and nilpotent Lie groups
See [12, 16, 22, 35] for a more thorough account of the material in this subsection. Let Γ be a
def
non-trivial, finitely generated group. The i-th term of the lower central series is defined by Γ1 = Γ
def
def
and for i > 1 as Γi = [Γi−1 , Γ]. The i-term of the upper central series is defined by Γ0 = {1} and
def
i−1 (Γ))) for i > 1.
Z i (Γ) = πZ−1
i−1 (Γ) (Z(Γ/Z
Effective Separability of Finitely Generated Nilpotent Groups
7
Definition 2.2. We say that Γ is a nilpotent group of step size c if c is the minimal natural number
such that Γc+1 = {1}, or equivalently, Z c (Γ) = Γ. If the step size is unspecified, we simply say
that Γ is a nilpotent group. We say that finitely generated nilpotent group is an admissible group.
For an admissible group Γ, the set of finite order elements of Γ, denoted as T (Γ), is a finite order
characteristic subgroup. Moreover, when |Γ| = ∞, then Γ/T (Γ) is torsion free.
Let g be a non-trivial, finite dimensional R-Lie algebra. The i-th term of the lower central series
def
def
of g is defined by g1 = g and for i > 1 as gi = [gi−1 , g]. We define the i-th term of the upper
def
def
central series as Z 0 (g) = {0} and Z i(g) = πZ i−1 (g) (Z(g/Z i−1 (g))) for i > 1.
Definition 2.3. We say that g is a nilpotent Lie algebra of step length c if c is the minimal natural
number satisfying gc = g, or equivalently, gc+1 = {0}. If the step size is unspecified, we simply
say that g is a nilpotent Lie algebra.
For a connected, simply connected nilpotent Lie group G of step length c with Lie algebra g, the
exponential map, written as exp : g → G, is a diffeomorphism [22, Thm 1.127] whose inverse is
formally denoted as Log. The Baker-Campbell-Hausdorff formula [12, (1.3)] implies that every
A, B ∈ g satisfies
∞
1
def
def
A ∗ B = Log(exp A · exp B) = A + B + [A, B] + ∑ CBm (A, B)
2
m=3
(1)
where CBm (A, B) is as rational linear combination of m-fold Lie brackets of A and B. By assumption, CBm (A, B) = 0 for m > c. For {Ai }m
i=1 in g, we may more generally write
c
A1 ∗ · · · ∗ Am = Log(exp A1 · · · exp Am ) = ∑ CBi (A1 , · · · , Am )
(2)
i=1
ℓ ⊆ {A }m
where CBi (A1 , · · · , Am ) is a rational linear combination of i-fold Lie brackets of {A jt }t=1
i i=1
via repeated applications of the Baker-Campbell-Hausdorff formula.
We define the adjoint representation Ad : G → Aut(g) of G as Ad(g)(X ) = (dΨg )1 (X ) where
Ψg (x) = g x g−1 . By [22, 1.92], we may write for γ ∈ Γ and A ∈ g
i
c (ad
1
Log(γ ) ) (A)
Ad(γ )(A) = A + [Log(γ ), A] + ∑
.
2
i!
i=3
(3)
By [28], a connected, simply connected nilpotent Lie group G with Lie algebra g admits a codim(G)
compact lattice Γ if and only if g admits a basis {Xi }i=1 with rational structure constants (see
[27, Thm 7] for more details). We say G is Q-defined if it admits a cocompact lattice. For any
torsion free admissible group Γ, [27, Thm 6] implies that there exists a Q-defined group unique
up to isomorphism in which Γ embeds as a cocompact lattice.
Definition 2.4. We call this Q-defined group the Mal’tsev completion of Γ. When given a Qdefined group G, the tangent space at the identity with the Lie bracket of vector fields is a finite
dimensional, nilpotent Lie algebra. We say that a connected, simply connected nilpotent Lie group
is an admissible Lie group.
Effective Separability of Finitely Generated Nilpotent Groups
2.4
8
Polycyclic groups
See [19, 32, 35] for the material contained in the following subsection.
Definition 2.5. A group Γ is polycyclic if there exists an ascending chain of subgroups {∆i }m
i=1
such that ∆1 is cyclic, ∆i E ∆i+1 , and ∆i+1 /∆i is cyclic for all i. We call {∆i }m
i=1 a cyclic series
m
for Γ. We say {ξi }m
i=1 is a compatible generating subset with respect to {∆i }i=1 if hξ1 i = ∆1 and
hξi+1 , ∆i i = ∆i+1 for i > 1. We define the Hirsch length of Γ, denoted as h(Γ), as the number of
indices i such that |∆i+1 : ∆i | = ∞.
For a general polycyclic group, there may be infinitely many different cyclic series of arbitrary
length (see [19, Ex 8.2]). However, the Hirsch length of Γ is independent of the choice of cyclic
series. With respect to the compatible generating subset {ξi }m
i=1 , [19, Lem 8.3] implies that we may
αi
m
represent every γ ∈ Γ uniquely as γ = ∏i=1 ξi where αi ∈ Z if |∆i+1 : ∆i | = ∞ and 0 ≤ αi < ri if
|∆i+1 : ∆i | = ri . If |Γ| < ∞, then the second paragraph after [19, Defn 8.2] implies that |Γ| = ∏m
i=1 ri .
Definition 2.6. We call the collection of such m-tuples a Mal’tsev basis for Γ with respect to the
m
compatible generating subset {ξi }m
i=1 . We call (αi )i=1 the Mal’tsev coordinates of γ .
For an admissible group Γ, we may refine the upper central series of Γ to obtain a cyclic series and
compatible generating subset. First assume that Γ is abelian. We may write Γ ∼
= Zm ⊕T (Γ), and we
h(Γ)
let {ξi }i=1 be a free basis for Zm . Since T (Γ) is a finite abelian group, there exists an isomorphism
ϕ : T (Γ) → ⊕ℓi=1 Z/pki i Z. If xi generates Z/pki i Z in ⊕ℓi=1 Z/pki i Z, we then set ξi = ϕ −1 (xi−h(Γ) ) for
h(Γ)+ℓ
h(Γ) + 1 ≤ i ≤ h(Γ) + ℓ. Thus, the groups {∆i }i=1
h(Γ)+ℓ
Γ with a compatible generating subset {ξi }i=1 .
i
form a cyclic series for
given by ∆i = hξt it=1
h(Γ)
Now assume that Γ has step length c > 1. There exists a generating basis {zi }i=1 for Z(Γ) and
h(Γ )
h(Γ)
integers {ti }i=1 such that ztii i=1c is a basis for Γc and for each i there exist xi ∈ Γc−1 and
h(Γ)
yi ∈ Γ such that ztii = [xi , yi ]. We may choose a cyclic series {Hi }i=1 such that Hi = hzs iis=1 .
Induction implies that there exists cyclic series {Λi }ki=1 and compatible generating subset {λi }ki=1
−1
(Λi−ℓ ). For
for Γ/Z(Γ). For 1 ≤ i ≤ ℓ, we set ∆i = Hi , and for ℓ + 1 ≤ i ≤ ℓ + k, we set ∆i = πZ(Γ)
1 ≤ i ≤ ℓ, we set ξi = zi . For ℓ + 1 ≤ i ≤ ℓ + k, we choose a ξi such that πZ(Γ) (ξi ) = λi−ℓ . It then
ℓ+k
follows that {∆i }ℓ+k
i=1 is a cyclic series for Γ with a compatible generating subset given by {ξi }i=1 .
c
i
i−1
Moreover, the given construction implies that h(Γ) = ∑i=1 rankZ (Z (Γ)/Z (Γ)). Whenever Γ is
an admissible group, we choose the cyclic series and compatible generating subset this way.
Definition 2.7. An admissible Γ with a cyclic series {∆i } and a compatible generating subset {ξi }
is called an admissible 3-tuple and is denoted as {Γ, ∆i , ξi }.
Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free. [16, Thm 6.5] implies that
multiplication of γ , η ∈ Γ can be expressed as polynomials in terms of the Mal’tsev basis ash(Γ)
h(Γ)
sociated to the cyclic series {∆i }i=1 and the compatible generating subset {ξi }i=1 . Specifih(Γ) b
h(Γ)
h(Γ)
cally, we may write γ η = (∏i=1 ξiai ) · (∏ j=1 ξ j j ) = ∏s=1 ξsds where each ds can be expressed
as a polynomial in the Mal’stev coordinates of γ and η , respectively. Similarly, we may write
Effective Separability of Finitely Generated Nilpotent Groups
h(Γ)
9
h(Γ)
γ ℓ = (∏i=1 ξiai )ℓ = ∏ j=1 ξ e j where each e j can be expressed as a polynomial in the Mal’tsev
coordinates of γ and the integer ℓ.
The polynomials that define the group product and group power operation of Γ with respect to
the given cyclic series and compatible generating subset have unique extensions to Rh(Γ) . That
implies G is diffeomorphic to Rh(Γ) (see [16, Thm 6.5], [22, Cor 1.126]) where G is the Mal’tsev
completion of Γ. Consequently, the dimension and step length of G are equal to the Hirsch length
and step length of Γ, respectively. Thus, we may write h(Γ) = dim(G). Furthermore, we may
identify Γ with its image in GΓ which is the set Zh(Γ) .
The following definition will be of use for the last lemma of this subsection.
Definition 2.8. Let Γ be a torsion free admissible group, and let ∆ ≤ Γ be a subgroup. We define
the isolator of ∆ in Γ as the subgroup given by
√
Γ
∆ = {γ ∈ Γ | there exists k ∈ N such that γ k ∈ ∆} ∪ {1} .
We make some
observations. By the paragraph
proceeding exercise 8 of [35, Ch 8] and [16,
√
√
Γ
∆ is a subgroup such that | Γ ∆ : ∆| < ∞. If Γ √
is abelian, then we may write Γ =
Thm√4.5], √
Γ
Γ
(Γ/ ∆) ⊕ ∆. We also have for any subgroup ∆ E Γ that Γ/ Γ ∆ is torsion free.
We finish this section with the following result. When given a torsion free admissible group Γ, the
following lemma relates the word length of element γ in Γ to the Mal’tsev coordinates of γ with
respect to a choice of a cyclic series and a compatible generating subset.
Lemma 2.9. Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ has step length c. If γ ∈ Γ such
that kγ kS ≤ n, then |αi | ≤ C nc where (αi ) are the Mal’tsev coordinates of γ for some C ∈ N.
Proof. If Γ is finite, then the statement is evident. Thus, we may assume that |Γ| = ∞. We proceed
by induction on step length, and observe that the base case of abelian groups is clear. Now suppose
that Γ has step length c > 1 and that kγ kS ≤ n. Since kπΓi (γ )kπΓi (S) ≤ n, the inductive hypothesis
implies there exists a constant C0 > 0 such that |αt | ≤ C0 nt when πΓt (ξi ) 6= 1. We let m be the
smallest integer such that ξi ∈
/ Γc when i > m and ξi ∈ Γc for i ≤ m, and let k be the length of the
cyclic series ∆i .
Suppose that ξi ∈
/ Γt+1 , but ξi ∈ Γt where t < c. We have by assumption that |αi | ≤ C0 nt . By
[15, 3.B2], we have kξiαi kS ≈ |αi |1/t . Thus, there exists a constant C1 such that kξiαi kS ≤ C1 |αi |1/t
1/t
when OrdΓ (ξi ) = ∞. Therefore, we may write kξiαi kS ≤ C0 C1 n. Thus, for ξi ∈
/ Γc such that
OrdΓ (ξi ) = ∞, we have kξiαi kS ≤ C2 n for some C2 ∈ N. By increasing C2 , we may assume that
|C2 | > |T (Γ)|, and thus, we cover the cases where OrdΓ (ξi ) < ∞.
Letting ζ = (∏ki=m+1 ξiαi )−1 where ξi ∈ Γc , it is evident that kζ kS ≤ C3 n for some C3 ∈ N. Thus,
αi
if η = ∏m
i=1 ξi , we may write kη kS = kγ ζ kS ≤ kγ kS + kζ kS ≤ 2C0 n. Hence, we may assume
that γ ∈ Γc .
αi
− αi
m
, we may write kξtαt kS =
We may write γ = ∏m
i=1 ξi where ξi ∈ Γc . If we let λt = ∏i=1,i6=t ξi
kζ λt kS ≤ kζ kS + kλt kS ≤ 4C0 n. Thus, we need only consider when γ = ξiαi for ξi ∈ Γc . Since
ξi ∈ Γc , [15, 3.B2] implies that |αi | ≤ C3 nc for some C3 ∈ N.
Effective Separability of Finitely Generated Nilpotent Groups
3
10
Torsion-free Quotients with One Dimensional Centers
In the following subsection, we define what a choice of an admissible quotient with respect to a
central non-trivial element is, what a choice of a maximal admissible quotient is, and define the
constants ψRF (Γ) and ψLower (Γ) for an infinite admissible group Γ.
3.1
Existence of torsion free quotients with one dimensional center
The following proposition will be useful throughout this article.
Proposition 3.1. Let Γ be a torsion free admissible group, and suppose that γ is a central, nontrivial element. There exists a normal subgroup Λ in Γ such that Γ/Λ is an irreducible, torsion
free, admissible group such that hπΛ (γ )i is a finite index subgroup of Z(Γ/Λ). If γ is primitive,
then Z(Γ/Λ) ∼
= hπΛ (γ )i.
Proof. We construct Λ by induction on Hirsch length, and since the base case is trivial, we may
assume that h(Γ) > 1. If Z(Γ) ∼
= Z, then the proposition is now evident by letting Λ = {1}.
h(Z(Γ))
for Z(Γ) such that zk1 = γ for some
Now assume that h(Z(Γ)) ≥ 2. There exists a basis {zi }i=1
h(Z(Γ))
k ∈ Z − {0}. Letting K = hzi ii=2 , we note that K E Γ and πK (γ ) 6= 1. Additionally, it follows
that Γ/K is a torsion free, admissible group. If h(Z(Γ/K)) = 1, then our proposition is evident by
defining Λ ∼
= K.
Now suppose that h(Z(Γ/K)) ≥ 2. Since h(Γ/K) < h(Γ), the inductive hypothesis implies there
exists a subgroup Λ1 such that Λ1 E Γ/K and where (Γ/K)/Λ1 is a torsion free admissible
group. Letting ρ : Γ/K → (Γ/K)/Λ1 be the natural projection, induction additionally implies that
Z((Γ/K)/Λ1 ) ∼
= hρ (πK (γ ))i. Taking Λ2 = πK−1 (Λ1 ), we note that Λ2 /K ∼
= Λ1 and that K ≤ Λ2 .
Thus, the third isomorphism theorem implies that (Γ/K)/(Λ2 /K) ∼
= Γ/Λ2 . Hence, Γ/Λ2 is a
torsion free admissible, and by construction, hπΛ2 (γ )i is a finite index subgroup of Z(Γ/Λ2 ).
Letting Λ satisfy the hypothesis of the proposition for γ , we now demonstrate that Γ/Λ is irreducible. Suppose for a contradiction there exists a pair of non-trivial admissible groups ∆1 and ∆2
such that Γ/Λ ∼
= ∆1 × ∆2 . Since Γ/Λ is torsion free, ∆1 and ∆2 are torsion free. By selection, it
follows that Z(∆1 ) and Z(∆2 ) are torsion free, finitely generated abelian groups. Hence, Z2 is isomorphic to a subgroup of Z(Γ/Λ). Subsequently, h(Z(Γ/Λ)) ≥ 2 which is a contradiction. Thus,
either ∆1 ∼
= {1} or ∆2 ∼
= {1}, and subsequently, Γ/Λ is irreducible.
Definition 3.2. Let γ ∈ Γ be a central, non-trivial element, and let J be the set of subgroups of
Γ that satisfy Proposition 3.1 for γ . Since the set {h(Γ/Λ) | Λ ∈ J } is bounded below by 1, there
exists an Ω ∈ J such that h(Γ/Ω) = min{h(Γ/Λ) | Λ ∈ J }. We say Ω is a choice of a admissible
quotient of Γ with respect to γ .
For a primitive γ ∈ Z(Γ) − 1, we let Γ/Λ1 and Γ/Λ2 be two different choices of admissible quotients of Γ with respect to γ . In general, Γ/Λ1 ≇ Γ/Λ2 . On the other hand, we have, by definition,
that h(Γ/Λ1 ) = h(Γ/Λ2 ). Subsequently, the Hirsch length of a choice of an admissible quotient
Effective Separability of Finitely Generated Nilpotent Groups
11
with respect to γ is a natural invariant of Γ associated to γ . Such a quotient corresponds to a torsion
free quotient of Γ of minimal Hirsch length such that γ has a non-trivial image that generates the
center. That will be useful in finding the smallest finite quotient in which γ has a non-trivial image.
Definition 3.3. Let Γ be a torsion free admissible group of step length c. For each γ ∈ Z(Γ) − {1},
we let Γ/Λγ be a choice of an admissible quotient of Γ with respect to γ . Let J be the set of
γ ∈ Z(Γ) − {1} such that there exists a k such that γ k = [a, b] where a ∈ Γc−1 and b ∈ Γ. Observe
that the set h(Γ/Λ
γ | γ ∈ J ) is bounded above by h(Γ). Thus, there exists an η ∈ J such that
h(Γ/Λη ) = max h(Γ/Λγ ) | γ ∈ J . We say that Γ/Λη corresponds to a choice of a maximal
admissible quotient of Γ.
We now define ψRF (Γ) and ψLower (Γ) when Γ is an infinite admissible group.
Definition 3.4. Let Γ be an infinite admissible group, and let (Γ/T (Γ))/Λ be a choice of a maximal admissible quotient of Γ/T (Γ). We set ψRF (Γ) = h((Γ/T (Γ))/Λ). When Γ is not virtually
abelian, we define ψLower (Γ) = ψRF (Γ) (c − 1) where c is the step length of Γ/T (Γ).
Suppose that Γ/Λ1 and Γ/Λ2 are two choices of a maximal admissible quotients of Γ when Γ
is torsion free. In general, Γ/Λ1 ≇ Γ/Λ2 . However, h(Γ/Λ1 ) = h(Γ/Λ2 ) = ψRF (Γ) by definition; hence, ψRF (Γ) is a well defined invariant of Γ. The value ψRF (Γ) is important because it
corresponds to the polynomial in logarithm degree of growth for FΓ (n). Similarly, we have that
ψLower (Γ) is a well defined invariant of admissible groups that are not virtually abelian. Moreover,
the value ψLower (Γ) will correspond to the polynomial degree of growth of an asymptotic lower
bound for ConjΓ (n).
A natural observation is that if h(Z(Γ/T (Γ))) = 1, then ψRF (Γ) = h(Γ). Additionally, if Γ is an
infinite, finitely generated abelian group, then ψRF (Γ) = 1.
Let Γ be a torsion free admissible group with a primitive γ ∈ Z(Γ) − {1}, and let Γ/Λ be a choice
of an admissible quotient Γ/Λ with respect to γ . The next proposition demonstrates that we may
choose a cyclic series and a compatible generating subset such that a subset of the compatible
generating subset generates Λ.
Proposition 3.5. Let Γ be a torsion free admissible group, and let γ be a primitive, central nontrivial element. Let Γ/Λ be a choice of an admissible quotient with respect to γ . There exists a
h(Γ)
h(Γ)
cyclic series {∆i }i=1 and a compatible generating subset {ξi }i=1 such that Γ/Λ is a choice of
an admissible quotient with respect to ξ1 where γ = ξ1 . Moreover, there exists a subset, possibly
h(Λ)
empty, ξi j j=1 of the compatible generating subset satisfying the following. The subgroups
t
h(Λ)
Wt = ξi j j=1 form a cyclic series for Λ with a compatible generating subset given by ξi j j=1 .
Proof. We proceed by induction on h(Γ), and note that the base case of h(Γ) = 1 is evident. Thus,
we may assume that h(Γ) > 1. If h(Z(Γ)) = 1, then Λ ∼
= {1}; hence, we may take any cyclic series
and compatible generating subset. Therefore, we may also assume that h(Z(Γ)) > 1.
h(Z(Γ)
h(Z(Γ))
There exists a generating basis {zi }i=1 for Z(Γ) such that z1 = γ . Letting K = hzi ii=2 , we
note that K ≤ Λ. By passing to the quotient Γ/K, we note that (Γ/K)/(Λ/K) is a choice of an
Effective Separability of Finitely Generated Nilpotent Groups
12
admissible quotient with respect to πK (γ ) = 1. Induction implies that there exists a cyclic series
h(Γ/K)
h(Γ/K)
such that there exists a subset
{∆i /K}i=1
and a compatible generating subset {πK (ξi )}i=1
t
h(Γ/K)
πK (ξi j ) j=1 satisfying the following. The subgroups Wt /K = ξi j j=1 form a cyclic series for
h(Λ/K)
Λ/K with a compatible generating subset πK (ξi j ) j=1 . We let Hi = hzs iis=1 for 1 ≤ i ≤ h(Z(Γ))
D
E
i−h(K)
and for i > h(Z(Γ)), we let Hi = {K} ∪ {ξt }t=1
. We also take ηi = zi for 1 ≤ i ≤ h(Z(Γ)) and
h(Γ)
for i > h(Z(Γ)), we take ηi = ξi−h(Z(Γ)) . Thus, {Hi }i=1 is cyclic series for Γ with a compatible
h(Γ)
generating subset {ηi }i=1 .
h(Λ)
Consider the subset ηi j j=1 where ηi j = z j+1 for 1 ≤ j ≤ h(K) and where ηi j = ξi j−h(K) for
h(Λ)
j > h(K). Thus, by selection, ηi j j=1 is the required subset.
For the next two propositions, we establish some notation. Let Γ be a torsion free admissible nilpotent group. For each primitive element γ ∈ Z(Γ) − {1}, we let Γ/Λγ be a choice of an admissible
quotient with respect to γ .
We demonstrate that we may calculate ψRF (Γ) for Γ when given a generating basis for (Γ/T (Γ))c
where c is the step length of Γ/T (Γ).
h(Z(Γ))
Proposition 3.6. Let Γ be a torsion free admissible group, and let {zi }i=1
be a basis of
ti h(Γc )
h(Γc )
Z(Γ). Moreover, assume there exist integers {ti }i=1 such that zi i=1 is a basis of Γc and
√
that there exist ai ∈ Γc−1 and bi ∈ Γ such that ztii = [ai , bi ]. For each γ ∈ Z(Γ) Γc , there exists an
i0 ∈ {1, · · · , h(Γc )} such that Γ/Λzi0 is a choice of an admissible quotient with respect to γ . More
h(Z(Γ)
generally, if {zi }i=1 is any basis of Z(Γ), then there exists i0 ∈ {1, · · · , h(Z(Γ))} such that Γ/Λi0
is a choice of an admissible quotient with respect to γ .
√
h(M)
Proof. Letting M = Z(Γ) Γc , we may write γ = ∏i=1 zαi i . There exist indices 1 ≤ i1 < · · · < iℓ ≤
h(M) such that αi j 6= 0 for 1 ≤ j ≤ ℓ and αi = 0, otherwise. We observe that Γ/Λzit satisfies the
conditions of Proposition 3.1 for γ for each 1 ≤ t ≤ ℓ. Therefore, h(Γ/Λγ ) ≤ min{h(Γ/Λzit ) | 1 ≤
t ≤ ℓ}.
Since πΛγ (γ ) 6= 1, there exists it0 such that πΛγ (zit0 ) 6= 1. Thus, Γ/Λγ satisfies the conditions of
Proposition 3.1 for zit0 . Thus, h(Γ/Λzit ) ≤ h(Γ/Λγ ). In particular, min{h(Γ/Λzit ) | 1 ≤ t ≤ ℓ} ≤
0
h(Γ/Λγ ). Therefore, h(Γ/Λγ ) = min{h(Γ/Λzit ) | 1 ≤ i ≤ ℓ}. The last statement follows using
similar reasoning.
The following proposition demonstrates that ψRF (Γ) can always be realized as the Hirsch length
of a choice of an admissible quotient with respect to a central element of a fixed basis of Γc .
h(Z(Γ))
Proposition 3.7. Let Γ be a torsion free admissible group of step length c with a basis {zi }i=1
h(Γ )
h(Γ )
for Z(Γ). Moreover, assume there exist integers {ti }i=1c such that ztii i=1c is a basis of Γc
and that there exist elements ai ∈ Γc−1 and bi ∈ Γ such that ztii = [ai , bi ]. There exists an i0 ∈
Effective Separability of Finitely Generated Nilpotent Groups
13
{1, · · · , h(Γc )} such that ψRF (Γ) = h(Γ/Λzi0 ). Hence, ψRF (Γ) = max {h(Γ/Λzi ) | 1 ≤ i ≤ h(Γc )} .
More generally, if {zi } is any basis of Z(Γ), then ψRF (Γ) = max {h(Γ/Λzi ) | 1 ≤ i ≤ h(Γ)}
Proof. Let J be the set of central non-trivial γ such that there exists a k where γ k is a c-fold
commutator bracket. Given that the set {h(Γ/Λγ ) |γ ∈ J } is bounded above by h(Γ), there exists
a non-trivial element η ∈ J such that h(Γ/Λη ) = max{h(Γ/Λγ )|γ ∈ J }. Proposition 3.6 implies
there exists an i0 ∈ {1, · · · , h(Z(Γ))} such that h(Γ/Λη ) = h(Γ/Λzi0 ). By the definition of ψRF (Γ),
it follows ψRF (Γ) = max{h(Γ/Λzi0 ) | 1 ≤ i ≤ h(Γc )}. The last statement follows using similar
reasoning.
3.2
Properties of admissible quotients of Γ
We demonstrate conditions for a choice of an admissible quotient of Γ with respect to some primitive, central, non-trivial element to have the same step length as Γ. For the next proposition, if Γ
is an admissible group,then we fix its step length as c(Γ).
p
Proposition 3.8. Let Γ be a torsion free admissible group. If we let γ ∈ Z(Γ) Γc(Γ) − {1} be a
primitive element with a choice of admissible quotient Γ/Λ with respect to γ , then c(Γ/Λ) = c(Γ).
In particular, if Γ/Λ is a choice of a maximal admissible quotient of Γ, then c(Γ/Λ) = c(Γ). If
c(Γ) > 1, then h(Γ/Λ) ≥ 3.
Proof. By definition, there exists k ∈ Z − {0} such that γ k ∈ Γc(Γ) Suppose for a contradiction that
c(Γ/Λ) < c(Γ). That implies Γc(Γ) ≤ ker(πΛ ), and hence, πΛ (γ k ) = 1. Since Γ/Λ is torsion free,
it follows that πΛ (γ ) = 1. That contradicts the construction of Γ/Λ, and thus, c(Γ/Λ) = c(Γ).
Since every irreducible, torsion free admissible group Γ where c(Γ) ≥ 2 contains a subgroup
isomorphic to the 3-dimensional integral Heisenberg group, we have h(Γ/Λ) ≥ 3.
The following proposition relates the value ψRF (Γ) to the value ψRF (Λ) when Λ is a torsion-free
quotient of Γ of lower step length.
√
Proposition 3.9. Let Γ be a torsion free admissible group of step length c > 1. If M = Z(Γ) Γc ,
then ψRF (Γ) ≥ ψRF (Γ/M).
h(N)
h(Z(Γ/M))
and integers {ti }i=1 satisfying the following. The
Proof. There exist elements {zi }i=1
h(Z(Γ/M))
set {πM (zi )}i=1
generates Z(Γ/M)
ai ∈ (Γ/M)c−2 and bi ∈ Γ/M such that
E
D and there exist
p
h(N)
ti
t
π ([ai , bi ]) = πM (zi ). Finally, the set {πM (zi ) i }i=1 generates Z(Γ/M) (Γ/M)c−1 .
h(Γ )
h(M)
There also exist γi ∈ Γ such that the {[zi , γi ]}i=1c generate Γc . Finally, there exist elements {yi }i=1
h(M)
in Z(Γ) and integers {si }i=1 such that ysi i = [zi , γi ]. For each i ∈ {1, · · · , h(M)}, we let Γ/Λi be a
choice of an admissible quotient with respect to yi .
−1
Let (Γ/M)/Ωi be a choice of an admissible with respect to πM (zi ). It is evident that Λ ≤ πM
(Ωi ).
−1
Thus, it follows that h(Γ/Λi ) ≥ h(Γ/πM (Ωi )) = h((Γ/M)/Ωi ). Proposition 3.7 implies ψRF (Γ) ≥
h((Γ/M)/Ωi ). Applying Proposition 3.7 again, we have that ψRF (Γ) ≥ ψRF (Γ/M).
Effective Separability of Finitely Generated Nilpotent Groups
14
This last proposition demonstrates that the definition of ψRF (Γ) is the maximum value over all
possible Hirsch lengths of choice of admissible quotients with respect to primitive, central nontrivial elements of Γ.
Proposition 3.10. Let Γ be a torsion free admissible group of step length c, and for each primitive
γ ∈ Z(Γ)
− {1}, let Γ/Λγ be a choice of an admissible quotient with respect to γ . Then ψRF (Γ) =
max h(Γ/Λγ ) | γ ∈ Z(Γ) − {1} .
√
Proof. The statement is evident for torsion free, finitely generated, abelian groups since Z(Γ) Γc ∼
=
Γ. Thus, we may assume that c > 1.
√
Let M = Z(Γ) Γc , and let γ ∈ Z(Γ) − {1}. There exists a basis {zi }h(Z(Γ)) for Z(Γ) and integers
h(Γ)
h(Γ )
{ti }i=1c such that ztii i=1 is a basis for Γc . Moreover, there exist ai ∈ Γc−1 and bi ∈ Γ such
that ztii = [ai , bi ]. If γ ∈ M, then by definition of ψRF (Γ) and Proposition 3.7, we have h(Γ/Λγ ) ≤
ψRF (Γ). Thus, we may assume that γ ∈
/ M.
/ M, πM (γ ) 6= 1. Hence, it is evident that (Γ/M)/πM (Λγ ) satisfies Proposition 3.1 for
Since γ ∈
πM (γ ). Thus, if (Γ/M)/Ω is a choice of an admissible quotient with respect to πM (γ ), we note
that Γ/πK−1 (Ω) satisfies Proposition 3.1 for γ . Thus, by definition,
h(Γ/Λγ ) ≤ h(Γ/πK−1 (Ω)) ≤ h((Γ/M)/Ω) ≤ ψRF (Γ/M).
Proposition 3.9 implies that ψRF (Γ/M) ≤ ψRF (Γ). Thus, h(Γ/Λγ ) ≤ ψRF (Γ) giving the result.
Definition 3.11. A choice of a torsion free admissible group Γ with a choice of a maximal admish(Γ)
sible quotient Γ/Λ, and cyclic series {∆i }i=1 a compatible generating subset {ξi }m
i=1 that satisfy
Proposition 3.5 is called an admissible 4-tuple and is denoted as {Γ, Λ, ∆i , ξi }.
Whenever we are given an admissible 4-tuple {Γ, Λ, ∆i , ξi }, we take the Mal’tsev completion to be
constructed as defined in §2.4. We observe that the vectors vi = Log(ξi ) span g the Lie algebra of
h(Γ)
the Mal’tsev completion. We call the subset {vi }i=1 an induced basis for g.
Definition 3.12. An admissible 4-tuple {Γ, Λ, ∆i , ξi }, Mal’tsev completion G with Lie algebra g,
h(Γ)
and induced basis {vi }i=1 is called an admissible 7-tuple and is denoted as {Γ, Λ, ∆i , ξi , G, g, νi }.
h(Γ)
h(Γ)
We always take S = {ξi }i=1 as a generating subset of Γ and X = {νi }i=1 as a basis of g.
If we are given a admissible 4-tuple {Γ, Λ, ∆i , ξi }, then we have a natural choice of an admissible
3-tuple given by {Γ, ∆i , ξi }. Whenever we are given an admissible 7-tuple {Γ, Λ, ∆i , ξi , G, g, νi },
then {Γ, Λ, ∆i , ξi } is an admissible 4-tuple and {Γ, ∆i , ξi } is an admissible 3-tuple.
4
Commutator geometry and lower bounds for residual finiteness
The following definitions and propositions will be important in the construction of the lower
bounds found in the proof of Theorem 1.1.
Effective Separability of Finitely Generated Nilpotent Groups
4.1
15
Finite Index Subgroups and Cyclic Series
The following proposition tells us how to view finite index subgroups in light of a choice of a
cyclic series and compatible generating subset.
Proposition 4.1. Let {Γ, ∆i , ξi } be an admissible 3-tuple. Suppose Γ is torsion free, and let K ≤ Γ
h(Γ)
be a finite index subgroup. Then there exist natural numbers {ti }i=1 satisfying the following. The
h(Γ)
subgroups {Hi }i=1 given by Hi = hξsts iis=1 form a cyclic series for K with a compatible generating
h(Γ)
subset given by {ξiti }i=1 .
Proof. We proceed by induction on Hirsch length. For the base case, assume that h(Γ) = 1. In this
case, we have that Γ ∼
= Z and that K ∼
= tZ for some t ≥ 1. Now the statement of the proposition is
evident by choosing H1 = K and the compatible generating subset is given by t.
Thus, we may assume h(Γ) > 1. Observing that ∆h(Γ)−1 ∩ K is a finite index subgroup of ∆h(Γ)−1
and that h(∆h(Γ)−1 ) = h(Γ) − 1, the inductive hypothesis implies there exist natural numbers
h(Γ)−1
h(Γ)
given by Hi = hξsts iis=1 form a cyclic
{ti }i=1 satisfying the following. The groups {Hi }i=1
h(Γ)−1
series for ∆h(Γ)−1 ∩ K with a compatible generating subset given by {ξiti }i=1 . We also have that
π∆h(Γ)−1 (K) is a finite index subgroup of Γ/∆h(Γ)−1 . Thus, there exists a natural number th(Γ) such
D
E
E
D
t
th(Γ)
h(Γ)
that K/∆h(Γ)−1 ∼
, then the groups {Hi }
(ξ h(Γ) ) . If we set Hh(Γ) ∼
= π∆
= Hh(Γ)−1 , ξ
h(Γ)−1
h(Γ)
i=1
h(Γ)
form a cyclic series for K with a compatible generating subset given by
h(Γ)
{ξiti }i=1 .
We now apply Proposition 4.1 to give a description of the subgroups of Γ of the form Γm for m ∈ N.
Corollary 4.2. Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free, and let m ∈ N.
The subgroups Hi = hξsm iis=1 form a cyclic series for Γm with a compatible generating subset given
h(Γ)
by {ξim }i=1 . In particular, |Γ/Γm | = mh(Γ) .
h(Γ)
h(Γ)
Proof. Proposition 4.1 implies there exist natural numbers {ti }i=1 such that the subgroups {Hi }i=1
given by Hi = hξsts iis=1 form a cyclic series for Γm with a compatible generating subset given by
ti h(Γ)
h(Γ)
ξi i=1 . We observe that (Γ/∆1 )m ∼
= (Γm /∆1 ). It is also evident that the series {Hi /∆1 }i=2 is a
h(Γ)
cyclic series for (Γ/∆1 )m with a compatible generating subset given by π∆1 (ξiti ) i=2 . Thus,
the inductive hypothesis implies that ti = m for all 2 ≤ i ≤ h(Γ). To finish, we observe that
Γm ∩ ∆ 1 ∼
= ∆m
1 . Thus, t1 = m as desired.
Let Γ be a torsion free admissible group, and let K ≤ Γ be a finite index subgroup. The following
proposition allows us to understand how K intersects a fixed choice of an admissible quotient of Γ
with respect to a primitive central element.
Proposition 4.3. Let {Γ, Λ, ∆i , ξi } be an admissible 4-tuple. Let K be a finite index subgroup of Γ.
ThereDexistEindices 1 ≤ i1 < i2 < · · · iℓ ≤ h(Γ) with natural numbers {ts }ℓs=1 such that the subgroups
t
Hs = ξi jj
s
j=1
form a cyclic series for K ∩ Λ with a compatible generating subset {ξitss }ℓs=1 .
Effective Separability of Finitely Generated Nilpotent Groups
16
h(Γ)
h(Γ)
Proof. By assumption, the cyclic series {∆i }i=1 and compatible generating subset {ξi }i=1 satisfy
the conditions of Proposition 3.5 for Λ. Thus, there exists indices 1 ≤ i1 < i2 < · · · iℓ such that the
j
subgroups M j = hξis is=1
form a cyclic series for Λ with a compatible generating subset given by
h(Λ)
{ξis }s=1 . Applying Proposition 4.1 to the admissible 3-tuple {Γ, ∆i , ξi }, we have that there exist
h(Γ)
natural numbers {ti }i=1 such that the subgroups given by Wi = hξsts iis=1 form a cyclic series for K
h(Γ)
with a compatible generating subset given by ξiti i=1 . Since K ∩ Λ is a finite index subgroup of
D ti Es
Λ, the groups given by Hs = ξi j j
form the desired cyclic series for K ∩ Λ with a compatible
t
j=1
generating subset given by {ξisis }ℓs=1 . Therefore, {tis }ℓs=1 are the desired integers.
4.2
Reduction of Complexity for Residual Finiteness
We first demonstrate that we may assume that Γ is torsion free when calculating FΓ (n).
Proposition 4.4. Let Γ be an infinite admissible group. Then FΓ (n) ≈ FΓ/T (Γ) (n).
Proof. We proceed by induction on |T (Γ)|, and observe that the base case is evident. Thus,
we may assume that |T (Γ)| > 1. Note that πZ(T (Γ)) : Γ → Γ/Z(T (Γ)) is surjective and that
ker(πZ(T (Γ)) ) = Z(T (Γ)) is a finite central subgroup. Since admissible groups are linear, [5, Lem
2.4] implies that FΓ (n) ≈ FΓ/T (Z(Γ)) (n). Since (Γ/Z(T (Γ)))/T (Γ/Z(T (Γ))) ∼
= Γ/T (Γ), the inductive hypothesis implies that FΓ (n) ≈ FΓ/T (Γ) (n).
The following proposition implies that we may pass to a choice of a maximal admissible quotient
of Γ when computing the lower bounds of FΓ (n) when Γ is a torsion free admissible group.
Proposition 4.5. Let {Γ, Λ, ∆i , ξi } be an admissible 4-tuple. If ϕ : Γ → Q is a surjective homomorphism to a finite group, then ϕ (ξ1m ) 6= 1 if and only if πϕ (Λ) (ϕ (ξ1m )) 6= 1 where m ∈ N.
Proof. If Λ ∼
= {1}, then there is nothing to prove. Thus, we may assume that Λ ≇ {1}. Proposition
3.5 implies that ξ1 ∈
/ Λ and that there exists a collection of elements of the Mal’tsev basis {ξis }ℓs=1
h(Λ)
s
such that Λ ∼
= hξis is=1 . Moreover, we have that Hs = hξit it=1 is cyclic series for Λ with a compatℓ
ible generating subset given by {ξis }ℓs=1 . Proposition
D E4.3 implies there exist {ts }s=1 ⊆ N such that
t
h(Λ)
the series of subgroups {Ws }s=1 given by Ws = ξi jj
s
j=1
forms a cyclic series for ker(ϕ ) ∩ Λ with
h(Λ)
a compatible generating subset given by {ξitss }s=1
Since the backwards direction is clear, we proceed with forward direction. To be more specific,
we demonstrate that if ϕ (ξ1m ) 6= 1, then πϕ (Λ) (ξ1m ) 6= 1. We proceed by induction on |ϕ (Λ)|, and
observe that the base case is clear. Thus, we may assume that |ϕ (Λ)| > 1. In order to apply the
inductive hypothesis, we find a non-trivial normal subgroup M ≤ Z(Q) such that ϕ (ξ1m ) ∈
/ M.
We first observe that if ϕ (ξi0 ) 6= 1 for some i0 ∈ {2, · · · , h(Z(Γ))}, we may set M = hϕ (ξi0 )i. It is
/ M. Thus, we may assume that ξi ∈ ker(ϕ ) for
straightforward to see that M 6= {1} and that ϕ (z) ∈
i ∈ {2, · · · , h(Z(Γ))}.
Effective Separability of Finitely Generated Nilpotent Groups
17
In this next paragraph, we prove that there exists an element of the compatible generating subset,
/ ker(ϕ ), and ϕ (ξi0 ) ∈ Z(Q). To that end, we note that if |tis | = 1,
say ξi0 , such that ξi0 ∈ Λ, ξi0 ∈
then ξis ∈ ker(ϕ ). Since |ϕ (Λ)| > 1, the set E = {ξis | |tis | =
6 1} is non empty. Given that E is
a finite set, there exists ξis0 ∈ E such that Height(ξis0 ) = min{Height(ξis ) | ξis ∈ E}. We claim
that ϕ (ξis0 ) is central in Q, and since we are assuming that ϕ (ξi ) = 1 for i ∈ {2, · · · , h(Z(Γ))},
we may assume that Height(ξis0 ) > 1. Since Height([ξis0 , ξt ]) < Height(ξis0 ) for any ξt and that
ϕ (Λ) E Q, it follows [ϕ (ξis0 ), ϕ (ξt )] ∈ ϕ (Λ). Thus, [ϕ (ξis0 ), ϕ (ξt )] is a product of ϕ (ξis j ) where
Height(ξis j ) < Height(ξis0 ). Since ξis j ∈ ϕ (Λ) and Height(ξis j ) < Height(ξis0 ), the definition of
E and the choice of ξi0 implies that tis j = 1. Thus, ξis j ∈ ker(ϕ ), and subsequently, ϕ (ξis j ) = 1.
Hence, [ϕ (ξis0 ), ϕ (ξt )] = 1, and thus, ϕ (ξi0 ) ∈ Z(Q) − {1}.
Since ϕ (ξis0 ) is central in Q, the group M = hϕ (ξi0 )i is a normal subgroup of Q. By selection,
ϕ (ξ1m ) ∈
/ M, and since |πM (ϕ (Λ))| < |ϕ (Λ)|, we may apply the inductive hypothesis to the surjective homomorphism πM ◦ ϕ : Γ → Q/M. Letting N = πM ◦ ϕ (Λ), we have that πN (πM (ϕ (ξ1m ))) 6= 1.
Thus, πϕ (Λ)(ξ1m ) 6= 1.
4.3
Rank and Step Estimates
Definition 4.6. Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is an infinite admissible group
of step size c, and let ℓ ≤ h(Γ). Let ~a = (ai )ℓi=1 where 1 ≤ ai ≤ h(Γ) for all i. We write [ξ~a ] =
[ξa1 , . . . , ξaℓ ]. We call [ξ~a ] a simple commutator of weight ℓ with respect to ~a. Let Wk (Γ) be the set
of non-trivial simple commutators of weight k. Since Γ is a nilpotent group of step size c, Wk (Γ) is
an empty set for k ≥ c + 1. Thus, the set of non-trivial simple commutators of any weight, denoted
as W (Γ), is finite.
When considering a surjective homomorphism to a finite group ϕ : Γ → Q, we need to ensure that
the step length of Q is equal to the step length of Γ. We do that by assuming that ϕ ([ξ~a ]) 6= 1 for
all [ξ~a ] ∈ W (Γ) ∩ Z(Γ).
Proposition 4.7. Let {Γ, ∆i , ξi } be an admissible 3-tuple, and assume that Γ is torsion free. Let
ϕ : Γ → Q be a surjective homomorphism to a finite group such that if [ξ~a ] ∈ W (Γ) ∩ Z(Γ), then
ϕ ([ξ~a ]) 6= 1. Then ϕ ([ξ~a ]) 6= 1 for all [ξ~a ] ∈ W (Γ). If c1 and c2 are the step sizes of Γ and Q,
respectively, then c1 = c2 .
Proof. We first demonstrate that ϕ ([ξ~a ]) 6= 1 for all [ξ~a ] ∈ W (Γ) by induction on Height([ξ~a ]).
Observe that if [ξ~a ] ∈ Wk (Γ), then Height([ξ~a ]) = c(Γ) − k + 1. Thus, if [ξ~a ] ∈ Wc(Γ) (Γ), then
Height([ξ~a ]) = 1. Hence, the base case follows from assumption.
Now consider [ξ~a ] ∈ W (Γ) where Height([ξ~a ]) = ℓ > 1. If [ξ~a ] ∈ Z(Γ), then the assumptions
of the proposition imply ϕ ([ξ~a ]) 6= 1. Thus, we may assume there exists an element ξi0 of the
Mal’tsev basis such that [[ξ~a ], ξi0 ] 6= 1. The induction hypothesis implies that ϕ ([[ξ~a ], ξi0 ]) 6= 1
since [[ξ~a ], ξi0 ] is a simple commutator of Height([[ξ~a ], ξi0 ]) ≤ ℓ − 1. Thus, ϕ ([ξ~a ]) 6= 1. Therefore,
for each [ξ~a ] ∈ W (Γ), it follows that ϕ ([ξ~a ]) 6= 1.
Effective Separability of Finitely Generated Nilpotent Groups
18
If c1 < c2 , then ϕ factors through Γ/Γc1 , and subsequently Wc1 ⊆ ker(ϕ ). Since Wc1 ⊆ W (Γ) ∩
Z(Γ), we have a contradiction, and subsequently, c1 = c2 .
For a surjective homomorphism to a finite p-group ϕ : Γ → Q, the following proposition gives
conditions for |Q| ≥ ph(Γ) . To be more specific, if ϕ is an injective map when restricted to the set
of central simple commutators and is an injective map when restricted to a central elements of a
fixed compatible generating subset, then ϕ is an injection when restricted to that same compatible
generating subset.
Proposition 4.8. Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free. Let ϕ : Γ → Q
be a surjective homomorphism to a finite p-group. Suppose that ϕ ([ξ~a ]) 6= 1 for all [ξ~a ] ∈ W (Γ) ∩
Z(Γ). Also, suppose that ϕ (ξi ) 6= 1 for ξi ∈ Z(Γ) and ϕ (ξi ) 6= ϕ (ξ j ) for ξi , ξ j ∈ Z(Γ) where i 6= j.
Then ϕ (ξi ) 6= 1 for 1 ≤ i ≤ h(Γ) and ϕ (ξi ) 6= ϕ (ξ j ) for 1 ≤ j1 < j2 ≤ h(Γ).
/ Z(Γ). By selection, there exists ξ j2 such that [ξ j1 , ξ j2 ] 6= 1. Since [ξ j1 , ξ j2 ] is a
Proof. Let ξ j1 ∈
simple commutator of weight 2, Proposition 4.7 implies that ϕ ([ξ j1 , ξ j2 ]) 6= 1. Thus, ϕ (ξ j1 ) 6= 1.
We now demonstrate that ϕ (ξi ) 6= ϕ (ξ j ) for all i < j. Assume for a contradiction that ϕ (ξi ) =
ϕ (ξ j ). That implies ξi ξ j−1 ∈ ker(ϕ ). Since ker(ϕ ) is a normal finite index subgroup, Proposition
h(Γ)
h(Γ)
4.1 implies that there exist natural numbers {ti }i=1 such that the subgroups {Hi }i=1 given by Hi ∼
=
ti h(Γ)
i
t
s
hξs is=1 form a cyclic series for ker(ϕ ) with a compatible generating subset given by ξi i=1 .
/ ker(ϕ ) for all i, each ti must be a non-zero power of p. We may
Since Q is a p-group and ξi ∈
h(Γ) sℓ tℓ
−1
write ξi ξ j = ∏ℓ=1 ξℓ for sℓ ∈ Z. We observe that si ti is divisible by p for all i, and since each
element can be represented uniquely in terms of its Mal’tsev coordinates, it follows that sℓ = 0 for
s t
all ℓ 6= i, j. Thus, we may write ξi ξ j−1 = ξisi ti ξ j j j . That implies 1 = si ti and −1 = s j t j . Since p
divides si ti , we have a contradiction. Thus, ϕ (ξi ) 6= ϕ (ξ j ).
h(Γ)
Thus, {ϕ (ξi )}i=1 is a generating subset of Q where OrdQ (ϕ (ξi )) ≥ p for all i. [16, Thm 1.10]
implies that |Q| divides some power of ph(Γ) . Hence, |Q| ≥ ph(Γ) .
The following definition will be important in the proofs of Theorem 1.1 and Theorem 1.8.
Definition 4.9. Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free and h(Z(Γ)) = 1.
k([ξ ])
For [ξ~a ] ∈ W (Γ) ∩ Z(Γ), we let k ([ξ~a ]) satisfy ξ1 ~a = [ξ~a ]. Let B(Γ) = lcm{|k ([ξ~a ]) | | [ξ~a ] ∈
W (Γ) ∩ Z(Γ)}.
Proposition 4.10. Let {Γ, ∆i , ξi } be a admissible 3-tuple where Γ is torsion free and h(Z(Γ)) = 1.
Suppose ϕ : Γ → Q is a surjective homomorphism to a finite p-group such that p > B(Γ), and
suppose that ϕ (ξ1 ) 6= 1. Then c1 = c2 , Z(Q) = hϕ (ξ1 )i and |Q| ≥ ph(Γ) where c1 and c2 are the
step lengths of Q and Γ, respectively.
Proof. Since ϕ (ξ1 ) 6= 1 and Q is p-group, we have OrdQ (ϕ (ξ1 )) ≥ p. We claim that if [ξ~a ] ∈
W (Γ) ∩ Z(Γ), then ϕ ([ξ~a ]) 6= 1. Suppose for a contradiction that ϕ ([ξ~a ]) = 1 for some [ξ~a ] ∈
B(Γ)
B(Γ)
W (Γ) ∩ Z(Γ). Since ϕ (ξ1 ) is a power of ϕ ([ξ~a ]) by definition, we have ϕ (ξ1 ) = 1. Thus,
ϕ (ξ1 ) has order strictly less than p which is a contradiction.
Effective Separability of Finitely Generated Nilpotent Groups
19
Since ϕ ([ξ~a ]) 6= 1 for [ξ~a ] ∈ W (Γ) ∩ Z(Γ), Proposition 4.7 implies that c1 = c2 . On the other
hand, Proposition 4.8 implies that ϕ (ξi ) 6= 1 for all 1 ≤ i ≤ h(Γ) and ϕ (ξ j1 ) 6= ϕ (ξ j2 ) for all
h(Γ)
h(Γ)
1 ≤ j1 < j2 ≤ h(Γ). Thus, {ϕ (∆i )}i=1 is a cyclic series for Q and {ϕ (ξi )}i=1 is a compatible
generating subset for Q. Since Q is a p-group, |ϕ (∆i ) : ϕ (∆i−1 )| ≥ p for each 1 ≤ i ≤ h(Γ)
with the convention that ∆0 = {1}. Hence, the second paragraph after [19, Defn 8.2] implies
h(Γ)
|Q| = ∏i=1 |∆i : ∆i−1 | ≥ ph(Γ) .
h(Γ)
We finish by demonstrating Z(Q) = hϕ (ξ1 )i. Since {ϕ (∆i )}i=1 is an ascending central series that
is a refinement of the upper central series, there exists i0 such that ϕ (∆i0 ) = Z(Q). For t > 1, there
exists j 6= t such that [ξt , ξ j ] 6= 1. Since [ξt , ξ j ] is a simple commutator of weight 2, Proposition
/ Z(Q).
4.7 implies that ϕ ([ξt , ξ j ]) 6= 1. Given that ϕ ([ξt , ξ j ]) = [ϕ (ξt ), ϕ (ξ j )], it follows ϕ (ξt ) ∈
That implies ϕ (∆t ) Z(Q) for all t > 1. Hence, Z(Q) = hϕ (ξ1 )i.
If {Γ, Λ, ∆i , ξi } is an admissible 4-tuple with a surjective homomorphism to a finite group ϕ : Γ →
Q and m ∈ Z − {0}, then the following proposition gives conditions such that Q has no proper
quotients in which ϕ (ξ1m ) 6= 1.
Proposition 4.11. Let {Γ, Λ, ∆i , ξi } be an admissible 4-tuple. Suppose that ϕ : Γ → Q is a surjective homomorphism to a finite p-group where ϕ (Λ) ∼
= {1}, p > B(Γ/Λ), and |Q| ≤ pψRF (Γ) . If
m
ψ
(Γ)
ϕ (ξ1 ) 6= 1 for some m ∈ Z, then |Q| = p RF . Additionally, if N is a proper quotient of Q, then
ρ (ϕ (ξ1m )) = 1 where ρ : Q → N is the natural projection. Finally, Z(Q) ∼
= Z/pZ.
Proof. Let us first demonstrate that |Q| = pψRF (Γ) . Since Λ ≤ ker(ϕ ), we have an induced homomorphism ϕe : Γ/Λ → Q such that ϕe ◦ πΛ = ϕ . Since ϕe : Γ/Λ → Q is a surjective homomorphism
to a finite p-group where p > B(Γ/Λ), h(Z(Γ/Λ)) = 1, and ϕ (ξ1 ) 6= 1, Proposition 4.10 implies
that ϕ (Z(Γ/Λ)) ∼
= Z(Q) and |Q| ≥ pψRF (Γ) . Therefore, |Q| = pψRF (Γ) .
We now demonstrate that Z(Q) ∼
= Z/pZ. Since ϕ (∆i /Λ) is a cyclic series for Q with a compatible
generating given by {ϕ (ξi ) | ξi ∈
/ Λ}, it follows that |Q| = ∏ξi ∈Λ
/ OrdQ (ϕ (ξi )) (see the second paragraph after [19, Defn 8.2]). Thus, we must have that OrdQ (ϕ (ξi )) ≤ p. Since OrdQ (ϕ (ξ1 )) ≥ p.
we have OrdQ (ϕ (ξ1 )) = p. Since Z(Q) ∼
= hϕ (ξ1 )i, it follows that Z(Q) ∼
= Z/pZ.
Since Z(Q) ∼
= Z/pZ, there are no proper, non-trivial subgroups of Z(Q). Given that ker(ρ ) E Q,
we have Z(Q) ∩ ker(ρ ) = Z(Q); hence, ρ (ϕ (ξim )) = 1 because ϕ (ξ1m ) ∈ Z(Q) ≤ ker(ρ ).
5
Some Examples of Precise Residual Finiteness
To demonstrate the techniques used in the proof of Theorem 1.1, we make a precise calculation of
FH2m+1 (Z) (n) where H2m+1 (Z) is the (2m + 1)-dimensional integral Heisenberg group.
Effective Separability of Finitely Generated Nilpotent Groups
5.1
20
Integral Heisenberg Group Basics
We start by introducing basic facts about the (2m + 1)-dimensional integral Heisenberg group
which will be useful in the calculation of FH2m+1 (Z) (n) and in Section 9. We may write
1 ~x z
H2m+1 (Z) = ~0 Im ~y z ∈ Z, ~x,~yT ∈ Zm
0 ~0 1
where Im is the m × m identity matrix. If γ ∈ H2k+1 (Z), we write
1 ~xγ zγ
γ = ~0 Im ~yγ
0 ~0 1
where ~xγ = [xγ ,1 , . . . , xγ ,m ] and ~yTγ = [yγ ,1 , . . . , yγ ,m ].
m
We let E = {~ei }m
i=1 be the standard basis of Z and then choose a generating subset for H2m+1 (Z)
given by S = {α1 , . . . , αm , β1 , . . . , βm , λ } where
~
~
1 ~ei 0
1 0 0
1 0 1
αi = ~0 Im ~0 , βi = ~0 Im ~eTi , and λ = ~0 Im ~0 .
0 ~0 1
0 ~0 1
0 ~0 1
Thus, if γ ∈ BH2m+1 (Z),S (n), then ~xγ ,~xη ,~yTγ ,~yTη ∈ BZm ,E (C0 n) and |zγ | ≤ C0 n2 for some C0 ∈ N [15,
3.B2]. Lastly, we obtain a finite presentation for H2m+1 (Z) written as
H2m+1 (Z) = κ , µi , ν j for 1 ≤ i, j ≤ m | [µt , νt ] = κ for 1 ≤ t ≤ m
(4)
with all other commutators being trivial.
5.2
Residual Finiteness of H2m+1 (Z)
Since the upper and lower asymptotic bounds for FH2m+1 (Z) (n) require different strategies, we
approach them separately. We start with the upper bound as it is more straight forward.
Before we begin with the upper bound, we collect some basic facts. We take presentation given in
t−1
Equation D4 with S = {µi , ν j , κ |1
E ≤ i, j ≤ m}. Let ∆1 = hκ i, ∆i = h{κ } ∪ {µs }is=1 for 2 ≤ i ≤ m+1,
i−m−1
2m+1
and ∆i = {∆m+1 } , {νt }t=1
for m+2 ≤ i ≤ 2m+1. One can see that {∆i }i=1
is a cyclic series
for H2m+1 (Z) and that S is a compatible generating subset.
Proposition 5.1. FH2m+1 (Z) (n) (log(n))2m+1 .
Proof. Let kγ kS ≤ n. We seek to construct a surjective homomorphism ϕ : H2m+1 (Z) → Q to
a finite group such that ϕ (γ ) 6= 1. Moreover, we want to construct this finite group such that
|Q| ≤ C0 (log(C0 n))2m+1 for some C0 > 0.
Effective Separability of Finitely Generated Nilpotent Groups
21
λj
βi
m
Via the Mal’tsev basis, we may write γ = κ α ∏m
µ
ν
. We proceed based on
∏
j=1 j
i=1 i
whether γ has a trivial image in the abelianization or not.
Suppose that πab (γ ) 6= 1. Since γ 6= 1, either βi 6= 0 for some i, or λ j 6= 0 for some j. Without
loss of generality, we may assume that there exists some i0 such that βi0 6= 0. The Prime Number
Theorem [37, 1.2] implies there exists a prime p such that p ∤ |βi0 | and where p ≤ C2 log(C2 |βi0 |) ≤
C2 log(C1 C2 n2 ). Consider the map ρ : H2m+1 (Z) → Z/pZ given by
κα
m
βi
∏ µi
i=1
!
m
λj
∏ νj
j=1
!
−→ (β1 , · · · , βm , λ1 , · · · , λm ) −→ βi0 −→ βi0 ( mod p ).
Here, the first arrow is the abelianization map, the second arrow is the projection to the βi0 coordinate, and the last arrow is the natural projection from Z to Z/pZ. By construction, ρ (γ ) 6= 1 and
|Z/pZ| ≤ C1 C2 log(C1 C2 n2 ). Thus, DH2m+1 (Z) (γ ) ≤ C3 log(C3 n) for some C3 > 0.
Now suppose that πab (γ ) = 1. That implies βi , λ j = 0 for all i, j. As before, the Prime Number Theorem [37, 1.2] implies there exists a prime p such that p ∤ |α | and p ≤ C4 log(C4 n) for
some C4 ∈ N. We have that σ p (γ ) = σ p (κ α1 ) 6= 1. The second paragraph after [19, Defn 8.2]
implies that | H2m+1 (Z)/(H2m+1 (Z)) p | = p2m+1 since |∆i+1 : ∆i | = p for 1 ≤ i ≤ 2m + 1. Hence,
| H2m+1 (Z)/(H2m+1 (Z)) p | ≤ (C4 )2m+1 (log(C4 n))2m+1 . Thus, DH2m+1 (Z) (γ ) ≤ C4 (log(C4 n))2m+1 ,
and therefore, FH2m+1 (Z) (n) (log(n))2m+1 .
Proposition 5.2. (log(n))2m+1 FH2m+1 (Z) (n).
Proof. In order to demonstrate that (log(n))2m+1 FH2m+1 (Z) (n), we construct a sequence of elements {γi } such that C1 (log(C1 kγi kS ))2m+1 ≤ DH2m+1 (Z) (γi ) for some C1 > 0. The proof of Proposition 5.1 implies that when γ ∈
/ Z(H2m+1 (Z)) that DH2m+1 (Z) (γ ) ≤ C1 log(C1 kγ kS ) for some C1 ∈ N.
Thus, the elements we are looking for will be central elements.
Let {pi } be an enumeration of the primes, and let αi = (lcm{1, 2, · · · , pi − 1})2m+2 . We claim for
all i that DH2m+1 (Z) (κiα ) ≈ log(kκ αi kS ))2m+1 . It is clear that κ̄ αi 6= 1 in H2m+1 (Z)/(H2m+1 (Z)) pi .
p
[15, 3.B2] implies that kκ αi kS ≈ |αi |, and the Prime Number Theorem [37, 1.2] implies that
log(|αi |) ≈ pi . Subsequently, log(kκ αi kS ) ≈ pi , and thus, (log(kκ αi kS ))2m+1 ≈ pi2m+1 . Given
that | H2m+1 (Z)/ (H2m+1 (Z)) pi | = pi2m+1 , we establish that (log(kγi kS ))2m+1 ≈ DH2m+1 (Z) (γi ) by
demonstrating for all surjective homomorphisms ϕ : H2m+1 (Z) → Q to finite groups satisfying
|Q| < pi2m+1 that ϕ (κ )αi = 1.
[16, Thm 2.7] implies that we may assume that |Q| = qβ where q is a prime. Since ϕ (κiα ) = 1 when
ϕ (κ ) = 1, we may assume that ϕ (κ ) 6= 1. Since [µi , νi ] = κ for all i, it follows that ϕ (νi ), ϕ (µ j ) 6= 1
for all i, j and that |Q| ≥ q2m+1 (see the second paragraph after [19, Defn 8.2]).
Suppose Q is a pi -group. If ϕ (γi ) 6= 1, then Proposition 4.11 implies that |Q| = pi2m+1 and that
there are no proper quotients of Q where the image of ϕ (γi ) does not vanish. In particular, there
are no proper quotients of H2m+1 (Z)/(H2m+1 (Z)) pi where σ pi (γi ) does not vanish. Thus, we may
assume that q 6= pi .
Effective Separability of Finitely Generated Nilpotent Groups
22
If q > pi , then we have OrdQ (ϕ (νi )), OrdQ (ϕ (µ j )) ≥ pi for all i, j. That implies |∆i : ∆i−1 | > pi .
Thus, the second paragraph after [19, Defn 8.2] implies that |Q| > pi2m+1 ; hence, we may disregard
this possibility. We now assume that Q is a q-group where q < pi . If qβ < p, then |Q| | αi . Since
the order of an element of a finite group divides the order of the group, we have λ | αi where
λ = OrdQ (ϕ (κ )). Thus, ϕ (γi ) = 1.
Hence, we may assume that Q is a q-group where q < pi and pi < qβ < pi2m+1 . There exists
v such that q(2m+1)v < pi2m+1 < p(2m+1)(v+1) . Thus, we may write β = vt + r where t ≤ 2m + 1
and 0 ≤ r < t. By construction, q(2m+1)t+r ≤ αi , and since q < pi , it follows that q(2m+1)t+r | αi .
Subsequently, λ | αi and ϕ (κ αi ) = 1 as desired.
Corollary 5.3. Let H2m+1 (Z) be the integral Heisenberg group. Then FH2m+1 (Z) (n) ≈ (log(n))2m+1 .
6
Proof of Theorem 1.1
Our goal for Theorem 1.1 is to demonstrate that FΓ (n) ≈ (log(n))ψRF (Γ) . Proposition 4.4 implies
that we may assume that Γ is torsion free. We proceed with the proofs of the upper and lower
asymptotic bounds for FΓ (n) separately since they require different strategies. We start with the
upper bound as its proof is simpler.
For the upper bound, our task is to prove for any non-identity element γ ∈ Γ there exists a surjective
ψRF (Γ)
ϕ : Γ → Q such that ϕ (γ ) 6= 1 and |Q| ≤ C0 (log(C
homomorphism to a finite groupp
p 0 kγ kS ))
Z(Γ)
Z(Γ)
/
Γc(Γ) , we pass to thep
quotient given by Γ/
Γc(Γ) and then
for some C0 ∈ N. When γ ∈
appeal to induction on step length. Otherwise, for γ ∈ Z(Γ) Γc(Γ) , we find a choice of an admissible
quotient of Γ with respect to some primitive central element in which γ has a non-trivial image.
Proposition 6.1. Let Γ be a torsion free admissible group. Then FΓ (n) (log(n))ψRF (Γ) .
h(Γ)
h(Γ)
Proof. Let {∆i }i=1 be a cyclic series with a compatible generating subset {ξi }i=1 . By assumption,
h(Γ )
h(Γ )
there exist integers {ti }i=1c such that ξiti i=1c is a basis for Γc and there exist ai ∈ Γc−1 and bi ∈ Γ
such that ξiti = [ai , bi ] for 1 ≤ i ≤ h(Γc ).
Suppose γ ∈ Γ such that kγ kS ≤ n. Using the Mal’tsev coordinates of γ , we may write γ =
h(Γ) α
∏i=1 ξi i , and Lemma 2.9 implies that |αi | ≤ C1 nc(Γ) for some C1 ∈ N for all i. We construct
a surjective homomorphism ϕ : Γ → Q to a finite group where ϕ (γ ) 6= 1 and |Q| ≤ C2 (kγ kS )ψRF (Γ)
for some C2 > 0.
p
Letting M = Z(Γ) Γc(Γ) , suppose that πM (γ ) 6= 1. Passing to the group Γ/M, the inductive hypothesis implies there exists a surjective homomorphism ϕ : Γ/M → Q such that ϕ (γ̄ ) 6= 1, and DΓ (γ ) ≤
C3 (log(C3 n))ψRF (Γ/M) for some C3 ∈ N. Proposition 3.9 implies that ψRF (Γ/M) ≤ ψRF (Γ), and
thus, DΓ (γ ) ≤ C3 (log(C3 n))ψRF (Γ) .
h(Γ )
Otherwise, we may assume that γ ∈ M. Therefore, we may write γ = ∏i=1c ξiαi , and since γ 6= 1,
there exists 1 ≤ j ≤ h(Γc ) such that α j 6= 0. The Prime Number Theorem [37, 1.2] implies that
there exists a prime p such that p ∤ |α j | and p ≤ C4 log(C4 |α j |) for some C4 ∈ N. If Γ/Λ j is a choice
Effective Separability of Finitely Generated Nilpotent Groups
23
of an admissible quotient with respect to ξ j , then γ̄ 6= 1 in Γ/Λ j · Γ p . Corollary 4.2 implies |Γ/Λ j ·
h(Γ/Λ )
j
Γ p | ≤ C4
· (log(C4 |α j |))h(Γ/Λ j ) . Proposition 3.7 implies that h(Γ/Λ j ) ≤ ψRF (Γ). Thus, we
have DΓ (γ ) ≤ C5 (log(C5 n))ψRF (Γ) for some C5 ∈ N. Hence, FΓ (n) (log(n))ψRF (Γ) .
In order to demonstrate that (log(n))ψRF (Γ) FΓ (n), we require a sequence of elements {γ j } ⊆
Γ such that C1 (log(C1 kγ j kS ))ψRF (Γ) ≤ DΓ (γ j ) for some C1 ∈ N independent of j. That entails
finding elements that are of high complexity with respect to residual finiteness, i.e. non-identity
elements that have relatively short word length in comparison to the order of the minimal finite
group required to separate them from the identity.
Proposition 6.2. Let Γ be torsion free admissible group. Then (log(n))ψRF (Γ) FΓ (n).
Proof. Let Γ/Λ be a choice of a maximal admissible quotient of Γ. There exists a g ∈ Z(Γ) − {1}
such that Γ/Λ is an admissible quotient with respect to γ . Moreover, there exists a k ∈ Z − {0},
a ∈ Γc−1 , and b ∈ Γ such that gk = [a, b]. If g is not trivial, then there exists a primitive xΛ ∈ Z(Γ)
such that xs = g for some s. In particular, xΛ is a primitive, central non-trivial element such that
xsΛk = [a, b].
h(Γ)
h(Γ)
Let {∆i,Λ }t=1 be a choice of cyclic series with a compatible generating subset given by {ξi,Λ }i=1
that satisfy Proposition 3.5 for Λ such that ξ1,Λ = xΛ . Proposition 3.5 implies that Γ/Λ is a choice
of an admissible quotient with respect to ξ1,Λ . Let α j,Λ = (lcm{1, 2, · · · , p j,Λ − 1})ψRF (Γ)+1 where
α
{p j,Λ } is an enumeration of primes greater than B(Γ/Λ). Letting γ j,Λ = ξ1 j,Λ , we claim that {γ j,Λ }
is our desired sequence.
Before continuing, we make some remarks. The value B(Γ/Λ) depends on the choice of a maximal
admissible quotient of Γ. To be more specific, if Γ/Ω is another choice of a maximal admissible
quotient of Γ, then, in general, Γ/Λ ≇ Γ/Ω, and subsequently, B(Γ/Λ) 6= B(Γ/Ω). As a natural
consequence, the sequence of elements {γi,Λ } depends on the choice of a maximal admissible
quotient of Γ. However, we will demonstrate that the given construction will work for any choice
of a maximal admissible quotient we take.
We claim for all j that DΓ (γ j,Λ ) ≈ (log(p j,Λ ))ψRF (Γ) . It is evident that γ j,Λ 6= 1 in Γ/Λ · Γ p j,Λ , and
ψRF (Γ)
Proposition 4.2 implies that |Γ/Λ · Γ p j,Λ | = p j,Λ
. To proceed, we demonstrate for all surjective
ψ (Γ)
RF
homomorphisms ϕ : Γ → Q to finite groups where |Q| < p j,Λ
that ϕ (γ ) = 1.
[16, Thm 2.7] implies that we may assume that |Q| = qβ where q is a prime. If ξ1,Λ ∈ ker(ϕ ), then
ϕ (γ j,Λ ) = 1. Hence, we may assume that ϕ (ξ1,Λ ) 6= 1. Proposition 4.5 implies that ϕ (γ j,Λ ) 6= 1 if
and only if πϕ (Λ) (ϕ (γ j,Λ )) 6= 1. Thus, we may restrict our attention to surjective homomorphisms
that factor through Γ/Λ, i.e. homomorphisms ϕ : Γ → Q where ϕ (Λ) ∼
= {1}.
Suppose that q = p j,Λ . If ϕ (γ j,Λ ) = 1, then there is nothing to prove. So we may assume that
ψRF (Γ)
ψRF (Γ)
, Proposition 4.11 implies that |Q| = p j,Λ
and that if N is a
ϕ (γ j,Λ ) 6= 1. Since |Q| ≤ p j,Λ
proper quotient of Q with natural projection given by ρ : Q → N, then ρ (ϕ (γ j,Λ )) = 1. We have
two natural consequences. There are no proper quotients of Γ/Λ · Γ p j,Λ where ϕ (γ j,Λ ) has nontrivial image. Additionally, If ϕ : Γ → Q is a surjective homomorphism to a finite p j,Λ -group
Effective Separability of Finitely Generated Nilpotent Groups
ψ (Γ)
RF
where |Q| < p j,Λ
24
then ϕ (γ j,Λ ) = 1. Thus, we may assume that q 6= p j,Λ .
Suppose that q > p j,Λ . Since ϕe : Γ/Λ → Q is a surjective homomorphism to a finite q-group where
ψRF (Γ)
q > B(Γ/Λ), Proposition 4.10 implies that |Q| > p j,Λ
. Hence, we may assume that q < p j,Λ .
Now suppose that Q is a q-group where |Q| < p j,Λ . By selection, it follows that |Q| divides α j,Λ .
Since the order of an element divides the order of the group, we have that OrdQ (ϕ (ξ1,Λ )) divides
α j,Λ . That implies ϕ (γ j,Λ ) = 1.
Now suppose that Q is a q-group where q < p j,Λ and qβ > p j,Λ . Thus, there exists ν ∈ N such
ψRF (Γ)
that qν ψRF (Γ) < p j,Λ
< q(ν +1) ψRF (Γ) . Subsequently, we may write β = ν t + r where t ≤ ψRF (Γ)
and 0 ≤ r < ν . By construction, qvt+r ≤ α j,Λ , and since q < p j,Λ , it follows that qβ = qvt+r | α j .
Given that the order of any element in a finite group divides the order of the group, it follows that
ψRF (Γ)
OrdQ (ϕ (ξ1,Λ )) divides α j,Λ . Thus, ϕ (γΛ, j ) = 1, and therefore, DΓ (γ j,Λ ) = p j,Λ
.
Since γ j,Λ ∈ Γc where c is the step length fo Γ, [15, 3.B2] implies (kγ j,Λ kS ) ≈ (|α j,Λ |)1/c , and
ψ (Γ)
the Prime Number Theorem [37, 1.2] implies log(|α j,Λ |) ≈ p j,Λ . Hence, log(kγ j,Λ kS ) RF ≈
ψ (Γ)
ψRF (Γ)
p j,Λ
. Thus, DΓ (γ j,Λ ) ≈ log(kγ j,Λ kS ) RF , and subsequently, (log(n))ψRF (Γ) FΓ (n).
Proof. Theorem 1.1
Let Γ be an infinite admissible group. Proposition 4.4 implies that FΓ (n) ≈ FΓ/T (Γ) (n). Proposition 6.1 implies that FΓ/T (Γ) (n) (log(n))ψRF (Γ) , and Proposition 6.2 implies (log(n))ψRF (Γ)
FΓ/T (Γ) (n). Thus, FΓ (n) ≈ (log(n))ψRF (Γ) .
7
Cyclic series, lattices in nilpotent Lie groups, and Theorem 1.3
Let Γ be a torsion free admissible group, and let G be its Mal’tsev completion. Let Γ/Λ be a
choice of a maximal admissible quotient. The main task of this section is the demonstration that
the value h(Γ/Λ) is a well-defined invariant of the Mal’tsev completion of Γ. Thus, we need
to establish some properties of cocompact lattices in admissible Lie groups. We start with the
following lemma that relates the Hirsch lengths of centers of cocompact lattices within the same
admissible Lie group.
Lemma 7.1. Let G be an admissible Lie group with two cocompact lattices Γ1 and Γ2 . Then
dim(G) = h(Z(Γ1 )) = h(Z(Γ2 )).
Proof. This proof is a straightforward application of [12, Lem 1.2.5].
We now introduce the notion of one parameter families of group elements of a Lie group.
Definition 7.2. Let G be a connected, simply connected Lie group. We call a map f : R → G a
one parameter family of group elements of G if f is an injective group homomorphism from the
real line with addition.
Effective Separability of Finitely Generated Nilpotent Groups
25
Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free. Via the exponential map and [12,
Lem 1.2.5], the maps given by fΓ,i (t) = exp(t vi ) are one parameter families of group elements.
The discussion below [12, Thm 1.2.4 Pg 9] implies that we may uniquely write each g ∈ G as
h(Γ)
g = ∏i=1 fΓ,i (ti ) where G is the Mal’tsev completion of Γ.
Definition 7.3. We say that the one parameter families fΓ,i are associated to {Γ, ∆i , ξi }.
We characterize when a discrete subgroup of an admissible Lie group is a cocompact lattice based
on how it intersects a collection of one parameter families of group elements.
Proposition 7.4. Let G be a Q-defined admissible Lie group, and suppose that Γ is a discrete
subgroup of G. Suppose there exists a collection of one parameter families of group elements of
dim(G)
G, written as fi : R → G for 1 ≤ i ≤ dim(G), such that G is homeomorphic to ∏i=1 fi (R). Then
Γ is a cocompact lattice in G if and only if Γ ∩ fi(R) ∼
= Z for all i.
Proof. Let ρ : G → G/Γ be the natural projection onto the space of cosets. Suppose that there
exists i0 such that fi0 (R) ∩ Γ ≇ Z. Since Γ is discrete in Γ, Γ ∩ fi0 (R) is a discrete subset of fi0 (R).
Given that Γ ∩ fi0 (R) is discrete and not infinite cyclic, we have Γ ∩ fi0 (R) ∼
= {1}. Hence, each
element of the sequence { fi0 (t)}t∈N projects to a unique element of G/Γ. Thus, {ρ ( fi0 (t))}t∈N is
an infinite sequence in G/Γ with no convergent subsequence. Hence, Γ is not a cocompact lattice
of G
Now suppose that fi (R) ∩ Γ ∼
= Z for all i. That implies for each i ∈ {1, · · · , h(Γ)} there exists ti > 0
dim(G)
∼
such that Γ ∩ fi (R) = { fi (n ti ) | n ∈ Z}. Letting E = ∏i=1 fi ([0,ti ]), we claim that E is compact
and that ρ (E) ∼
= G/Γ.
dim(G)
Let f : Rdim(G) → G be the continuous map given by f ( ai , · · · , adim(G) ) = ∏i=1 fi (ai ). Since
dim(G)
∏i=1 [0,ti ] is a closed and bounded subset of Rdim(G) , the Heine-Borel theorem implies that
dim(G)
∏i=1 [0,ti ] is compact. Since f is continuous, E is compact.
dim(G)
We now claim that each coset of Γ in G has a representative in E. Let g = ∏i=1 fi (ℓi ). For
each i, there exists si ∈ Z such that si ti ≤ ℓi ≤ (si + 1) ti . Let ki = ℓi − si ti and write h ∈ E to be
dim(G)
given by h = ∏i=1 f (ki ). By construction, ρ (h) = ρ (g), and subsequently, ρ (g) ∈ ρ (E). Thus,
ρ (E) = ρ (G). Since G/Γ is the image of a compact set under a continuous map, G/Γ is compact.
[32, Thm 2.1] implies that Γ is a cocompact lattice of G.
These next two propositions give some structural information needed about the Mal’tsev completion of a torsion free admissible group and some structural information of choices of an admissible
quotients with respect to some primitive, central non-trivial element.
Proposition 7.5. Let Γ be a torsion free admissible group. Let γ ∈ Z(Γ) − {1} be a primitive
element, and let Γ/Λ be a choice of an admissible quotient with respect to γ . Suppose that G is
the Mal’tsev completion of Γ, and let H be the Mal’tsev completion of Λ. Then H is isomorphic to
a closed, connected, normal subgroup of G.
Effective Separability of Finitely Generated Nilpotent Groups
26
h(Γ)
h(Γ)
Proof. Proposition 3.5 there exists a cyclic series {∆i }i=1 and compatible generating subset {ξi }i=1
h(Λ)
h(Γ)
s
satisfying the following. There exists a subset {ξis }s=1 ⊆ {ξi }i=1 such that if Ws = hξit it=1
, then
h(Λ)
h(Λ)
{Ws }s=1 is a cyclic series for Λ with a compatible generating subset given by {ξis }s=1 where
h(Γ)
ξ1 = γ . Let { fΓ,i }i=1 be the one parameter families of group elements of G associated to the
admissible 3-tuple {Γ, ∆i , ξi }.
[12, Thm 1.2.3] implies that we may view H as a connected subgroup of G. We proceed by
induction on h(Γ) to demonstrate that H is a closed and normal subgroup of G. If h(Γ) = 1, then
Γ = Z. It then follows that G is Lie isomorphic to R and that H ∼
= {1}. Now our claim is evident.
Now suppose that h(Γ) > 1. If h(Z(Γ)) = 1, then we may take Λ = {1} which implies H ∼
= {1}.
h(Z(Γ))
Thus, our claims are evident. Now suppose that h(Z(Γ)) > 1. Let Ω = hξi ii=1 , and let K be
the Mal’tsev completion of Ω. By [12, Lem 1.2.5], it follows that K ≤ Z(G). Thus, K is a closed,
connected, normal subgroup of G.
h(Λ)
We claim that H/K is Mal’tsev completion of πK (Λ). We may write H = ∏s=1 fΓ,is (R). Since Λ
is a cocompact lattice of H, Proposition 7.4 implies that Λ ∩ fΓ,is (R) ∼
= Z for all 1 ≤ s ≤ ℓ. By
Proposition 7.4 again, we have that K ∩ Λ is a cocompact lattice of K. [11, Prop 5.1.4] implies that
πK (Λ) is a cocompact lattice in H/K.
Observe that πK (Λ) ∼
= Λ/Ω. We have that Λ/Ω satisfies Proposition 3.1 for πK (ξ1 ). Thus, the
inductive hypothesis implies that H/K is a closed normal subgroup of G/K. Since H isomorphic
to the pullback of the closed normal subgroup of G/K, H is a closed normal subgroup of G.
The next proposition that G is the Mal’tsev completion of Γ with a choice of an admissible quotient
Γ/Λ with respect to a primitive, central non-trivial element of Γ, then the Mal’tsev completion of
H intersects any cocompact as a cocompact lattice.
Proposition 7.6. Let Γ be a torsion free admissible group. Let γ ∈ Z(Γ) − {1} be a primitive
element, and let Γ/Λ be a choice of an admissible quotient with respect to γ , G be the Mal’tsev
completion of Γ, and let H ≤ G be the Mal’tsev completion of Λ. If Ω ≤ G is another cocompact
lattice of G, then Ω ∩ H is a cocompact lattice of H.
h(Γ)
Proof. Proposition 3.5 implies that there exists a cyclic series {∆i }i=1 and a compatible generat
h(Λ)
h(Γ)
ing subset {ξi }i=1 satisfying the following. There exists a subset ξi j j=1 such that the groups
i
{Wi } where Wi ∼
= ξi j j=1 form a cyclic series for Λ with a compatible generating subset given by
h(Λ)
h(Γ)
ξi j j=1 . Let { fi }i=1 be the associated one parameter families of group elements of the Mal’tsev
∼ ∏h(Λ) fi (R). Proposi∼ ∏h(Γ) fi (R). By construction, H =
completion G of Γ. We may write G =
j=1 j
i=1
tion 7.4 implies that Ω ∩ fi,Γ ∼
= Z for all i. In particular, Ω ∩ fi ,Γ (R) ∼
= Z for all j. Proposition 7.4
j
implies that Ω ∩ H is a cocompact lattice in H as desired.
The following lemma demonstrates that you can select a cyclic series and compatible generating subset for a cocompact lattice in an admissible Lie group by intersecting the lattice with a
collection of one parameter families of group elements.
Effective Separability of Finitely Generated Nilpotent Groups
27
Lemma 7.7. Let G be a Q-defined admissible Lie group with a cocompact lattice Γ. Let fi be a coldim(G)
lection of one parameter families of elements of G such that G is homeomorphic to ∏i=1 fi (R).
i
Let hξi i ∼
= fi (R) ∩ Γ. Then the groups given by ∆i = hξt it=1 form a cyclic series for Γ with a
h(Γ)
compatible generating subset given by {ξi }i=1 .
Proof. We proceed by induction on the dimension of G. If dim(G) = 1, then our statement is
dim(G)−1
evident. Now suppose that dim(G) > 1. If we let H ∼
fi (R), then Proposition 7.4
= ∏i=1
implies that Γ ∩ H is a cocompact lattice in H. The inductive hypothesis implies that the elet
ments ξi given by hξi i ∼
= fi (R) ∩ Γ satisfy the following. The groups given by ∆t = hξi ii=1 for
1 ≤ t ≤ dim(G) − 1 form a cyclic series for Γ ∩ H with a compatible generating subset given by
dim(G)−1
. Since Γ is a cocompact lattice in G, Proposition 7.4 implies that fdim(G) (R) ∩ Γ ∼
{ξi }i=1
= Z.
dim(G)
Letting ∆dim(G) = ∆dim(G)−1 , ξdim(G) , we have that the groups given by {∆i }i=1
series for Γ with a compatible generating subset given by
form a cyclic
dim(G)
{ξi }i=1 .
Let Γ be a torsion free admissible group. We now demonstrate that the value ψRF (Γ) is a welldefined invariant of the Mal’tsev completion of Γ.
Proposition 7.8. Let G be a Q-defined admissible Lie group, and suppose that Γ1 and Γ2 are two
cocompact lattices of G. Then ψRF (Γ1 ) = ψRF (Γ2 ).
Proof. If h(Z(Γ1 )) = 1, then Proposition 7.1 implies that h(Z(Γ2 )) = 1. It then follows from the
definition of ψRF (Γ1 ) and ψRF (Γ2 ) that ψRF (Γ1 ) = h(Γ) = ψRF (Γ2 ).
Therefore, we may assume that h(Z(Γ1 )), h(Z(Γ2 )) ≥ 2. In this case, we demonstrate the equality
by showing that ψRF (Γ1 ) ≤ ψRF (Γ2 ) and ψRF (Γ2 ) ≤ ψRF (Γ1 ).
h(Γ)
Let G be the Mal’tsev completion of G. Let {∆i }i=1 be a cyclic series for Γ with a compatible
h(Γ)
generating subset {ξi }i=1 , and let fi be the associated one parameter families of group elements.
h(Γ)
We may write G ∼
= ∏i=1 fi (R).
h(Γ )
Let {ηi }i=12 ⊆ Γ2 such that hηi i ∼
= Γ2 ∩ fi (R). If we let Wi ∼
= ηj
h(Γ )
that {Wi }i=12 is a
Let ξi be a central
i
, then Proposition
j=1
7.7 implies
h(Γ )
cyclic series for Γ2 with a compatible generating subset given by {ηi }i=12 .
element of the compatible generating subset of Γ, and let Γ1 /Λ be a choice
of an admissible quotient with respect to ξi . Let H be the Mal’tsev completion of Λ. Since
πΛ (ξi ) ∼
= Z(Γ/H), it is evident that hπH ( fi (R))i ∼
= Z(Γ/H). In particular, πH (ηi ) 6= 1. Proposition
7.6 implies that H ∩ Ω is a compact lattice of H and Proposition 7.5 implies that H is a closed
connected normal subgroup of G. Thus, [11, Prop 5.1.4] implies that πH (Ω) is a compact lattice
in G/H. Proposition 7.1 implies that h(Γ2 /Λ) ∼
= h(πH (Γ2 )), it follows that πH (Γ2 ) satisfies the
conditions of Proposition 3.1. If we let Γ2 /Ω be a choice of an admissible quotient with respect
to ηi , it follows that h(Γ/Ω) ≤ πH (Γ2 ) ≤ h(Γ/Λ). By Proposition 3.7, h(Γ2 /Ω) ≤ ψRF (Γ1 ). [12,
Lem 1.2.5] implies that ηi ∈ Z(Γ2 ), and thus, the above inequality holds for each element of the
compatible generating subset of Γ2 in Z(Γ2 ). Therefore, Proposition 3.7 implies that ψRF (Γ2 ) ≤
ψRF (Γ1 ). By interchanging Γ1 and Γ2 , we have ψRF (Γ1 ) ≤ ψRF (Γ2 ).
Effective Separability of Finitely Generated Nilpotent Groups
28
We now come to the main result of this section.
Proof. Theorem 1.3
Suppose that Γ1 and Γ2 are two infinite admissible groups such that Γ1 /T (Γ1 ) and Γ2 /T (Γ2 ) have
isomorphic Mal’tsev completions. Proposition 4.4 implies that FΓ1 (n) ≈ FΓ1 /T (Γ1 ) (n) and FΓ2 (n) ≈
FΓ2 /T (Γ2 ) (n). Theorem 1.1 implies FΓ1 (n) ≈ (log(n))ψRF (Γ1 ) and FΓ2 /T (Γ2 ) (n) ≈ (log(n))ψRF (Γ2 ) .
Proposition 7.8 implies ψRF (Γ1 /T (Γ1 )) = ψRF (Γ2 /T (Γ2 )). Thus, FΓ1 (n) ≈ FΓ2 (n).
8
8.1
Some Examples and the Proof of Theorem 1.5
Free nilpotent groups and Theorem 1.5(i)
Definition 8.1. Let F(X ) be the free group of rank m generated by X . We define N(X , c, m) =
F(X )/(F(X ))c+1 as the free nilpotent group of step size c and rank m on the set X .
Following [21, Sec 2.7], we construct a cyclic series for N(X , c, m) and a compatible generating
subset using iterated commutators in the set X .
Definition 8.2. We call elements of X basic commutators of weight 1 of N(X , c, m), and we choose
an arbitrary linear order for weight 1 basic commutators. If γ1 and γ2 are basic commutators of
weight i1 and i2 , respectively, then [γ1 , γ2 ] is a basic commutator of weight i1 + i2 of N(X , c, m) if
γ1 > γ2 and if γ1 = [γ1,1 , γ1,2 ] where γ1,1 and γ1,2 are basic commutators such that γ1,2 ≤ γ2 .
Basic commutators of higher weight are greater with respect to the linear order than basic commutators of lower weight. Moreover, we choose an arbitrary linear order for commutators of the
same weight.
For xi0 ∈ X , we say that a 1-fold commutator γ contains xi0 if γ = xi0 . Inductively, we say that a
j-fold commutator [γ1 , γ2 ] contains xi0 if either γ1 contains xi0 or γ2 contains xi0 .
Note that any basic commutator of weight greater or equal to 2 must contain two distinct commutators of weight 1 but not necessarily more than 2. Additionally, if γ is a basic commutator of
weight k, then γ can contain at most k distinct basic commutators of weight 1.
It is well known that the number of basic commutators of N(X , c, m) is equal to the Hirsch length
of N(X , c, m). Letting µ be the Möbius function, we may write
!
c
r
1
h(N(X , c, m)) = ∑
∑ µ (d)m d .
r=1 r d|r
h(N(X,c,m))
We label the basic commutators as {ξi }i=1
with respect to the given linear order.
h(N(X,c,m))
i
where ∆i = hξt it=1
Definition 8.3. One can see that the subgroup series {∆i }i=1
is a cyclic
h(N(X,c,m))
is a compatible generating subseries for N(X , c, m), and [21, Cor 2.7.3] implies that {ξi }i=1
Effective Separability of Finitely Generated Nilpotent Groups
29
h(N(X,c,m))
h(N(X,c,m))
the cyclic series of basic commutators for N(X , c, m) and {ξi }i=1
set. We call {∆i }i=1
the compatible generating subset of basic commutators for N(X , c, m).
Proposition 8.4. Let N(X , c, m) be the free nilpotent group of step size c and rank m on the set X =
{xi }m
i=1 . Let γ be a basic commutator of weight c in the set X that contains only Y ( X . There exists
a normal subgroup Ω such that N(X , c, m)/Ω is torsion free where hπΩ (γ )i ∼
= Z(N(X , c, m)/Ω).
Additionally, if η is a j-fold commutator that contains elements of X /Y , then πΩ (η ) = 1.
h(N(X,c,m))
h(N(X,c,m))
be
be the cyclic series of basic commutators, and let {ξi }i=1
Proof. Let {∆i }i=1
the compatible generating subset of basis commutators. By assumption, there exists an i0 ∈
{1, · · · , h(Z(N(X , c, m)))} such that ξi0 = γ . Without loss of generality, we may assume that ξ1 = γ .
c
We will construct a normal descending series {Kt }t=1
such that N(X , c, m)/Kt is torsion free for
each t, πKt (ξ1 ) 6= 1 for each t, and if η is a i-fold commutator that contains only elements of X /Y
where i ≥ t, then πKt (η ) = 1. We will also have that Kt is generated by basis commutators of
weight greater than or equal to t, and finally, we will have hπK1 (ξ1 )i ∼
= Z(N(X , c, m)/K1 ). We
proceed by induction on t.
h(Z(N(X,c,m)))
. Observe that if η is a c-fold commutator
Consider the subgroup given by Kc = hξi ii=2
such that η contains only elements of X /Y , then it follows by construction that πK1 (η ) = 1. Thus,
we have the base case.
Now suppose that subgroup Kt has been constructed for t < c, and let η be a (t − 1)-fold commutator bracket that contains elements of X /Y . It then follows that [η , xi ] contains elements of
X /Y . Thus, πKt ([η , xi ]) = 1 by assumption. Since that is true for all 1 ≤ i ≤ m, we have that
πKt (η ) ∈ Z(N(X , c, m)/Kt ). Let W be the set of basic commutator brackets ξi such that ξi 6= ξ1
/ hπKt (W )i and if η is a ℓ-fold commutator bracket
and πKt (ξi ) is central. By construction, πKt (ξ1 ) ∈
that contains elements of X /Y where ℓ ≥ t − 1, then πKt (η ) ∈ hπKt (W )i. We set Kt−1 ∼
= hKt ,W i,
and suppose that η is a ℓ-fold commutator that contains elements of X /Y and where ℓ ≥ t − 1.
(hπKt (W )i), we have that Kt−1 is
By construction, we have that πKt−1 (η ) = 1. Since Kt−1 ∼
= πK−1
t
normal in N(X , c, m) and Kt ≤ Kt−1 . Finally, it is evident that N(X , c, m)/Kt is torsion free. Hence,
induction gives the construction of Kt for all i. Additionally, the construction of K1 implies that
Z(N(X , c, m)/K1 ) ∼
= K1 , we have our proposition.
= hπK1 (ξ1 )i. Thus, by taking Ω ∼
Proof. Theorem 1.5(i)
Let c ≥ 1 and ℓ ≥ 2, and let Xℓ = {xi }ℓi=1 . Let N(Xℓ , c, ℓ) to be the free nilpotent group of step size
c and rank ℓ on the set Xℓ . Theorem 1.1 implies that there exists a natural number ψRF (N (Xℓ , c, ℓ))
such that FN(Xℓ ,c,ℓ) (n) ≈ (log(n))ψRF (N(Xℓ ,c,ℓ)) . We will demonstrate that (log(n))ψRF (N(Xℓ ,c,ℓ))
(log(n))ψRF (N(Xc ,c,c)) for each ℓ > c, and since N (Xℓ , c, ℓ) is a nilpotent group of step size c and
Hirsch length greater than ℓ, we will have our desired result.
h(N(X ,c,ℓ))
h(N(X ,c,ℓ))
be the compatbe the cyclic series of basic commutators and {ξi }i=1 ℓ
Let {∆i }i=1 ℓ
ible generating subset of basic commutators for N(Xℓ , c, ℓ). For each ξi ∈ Z(N(Xℓ , c, ℓ)), let
N(Xℓ , c, ℓ)/Λi be a choice of an admissible quotient with respect to ξi . Proposition 3.7 implies
there exists an i0 ∈ {1, · · · , h(Z(N(Xℓ , c, ℓ)))} such that h(Γ/Λi0 ) = ψRF (N(Xℓ , c, ℓ)).
Effective Separability of Finitely Generated Nilpotent Groups
30
For each ξi ∈ Z(N(Xℓ , c, ℓ)), there exists a subset Yi ⊆ X such that ξi is a basic commutator of
weight c that contains only elements of Yi . Proposition 8.4 implies that there exists a subgroup Ωi
such that N(Xℓ , c, ℓ)/Ωi satisfies Proposition 3.1 with respect to ξi . Moreover, elements of X −Yi
are contained in Ωi .
There is a natural surjective homomorphism ρi : N(Xℓ , c, ℓ) → N(Yi , c, |Yi |) given by sending elements of X −Yi to the identity. Therefore, we have an induced map ϕ : N(Yi , c, |Yi |) → N(Xℓ , c, ℓ)/Ωi
such that πΩi = ϕ ◦ ρi . In particular, N(Xℓ , c, ℓ)/Ωi ∼
= N(Yi , c, |Yi |)/ρi (Ωi ). Thus, N(Xℓ , c, ℓ)/Ωi satisfies the conditions of Proposition 3.1 for ρi (ξi ). Proposition 3.7 implies that h(N(Xℓ , c, ℓ)/Λi ) ≤
ψRF (N(Yi , c, |Yi |)). Since N(Xℓ , c, ℓ) has step size c, we have that |Yi | ≤ c for any ξi ∈ Z(N(Xℓ , c, ℓ)).
Additionally, we have that N(Yi , c, |Yi |) ∼
= N(X j , c, j) when |Yi | = j. In particular, ψRF (N(Yi , c, |Yi |)) =
ψRF (N(X j , c, j)). By setting m(c) = max{ψRF (N(X j , c, j)) | 1 ≤ j ≤ c}, Proposition 3.7 implies
FN(Xℓ ,c,ℓ) (n) (log(n))m(c) .
8.2
Central products and applications
The examples we contruct for Theorem 1.5(ii), (iii) and (iv) arise as iterated central products of
torsion free admissible groups whose centers have Hirsch length 1. In the given context, Corollary
1.2 allows us to compute the precise residually finiteness function in terms of the Hirsch length of
the torsion free admissible groups of whom we take the central product.
Definition 8.5. Let Γ and ∆ be finitely generated groups, and let θ : Z(Γ) → Z(∆) be an isomorphism. We define the central product of Γ and ∆ with respect to θ as Γ ◦θ ∆ = (Γ × ∆)/K where
K = {(z, θ (z)−1 ) | z ∈ Z(Γ)}. We define the central product of the groups {Γi }ℓi=1 with respect to
the automorphism θi : Z(Gi) → Z(Gi+1 ) for 1 ≤ i ≤ ℓ − 1 inductively. Assuming that (Γi ◦θi )ℓi=1
has already been defined, we define (Γi ◦θi )ℓi=1 as the central product of (Γi ◦θi )ℓ−1
i=1 and Γℓ with
ℓ−1
respect to the induced isomorphisms θ̄ℓ−1 : Z((Γi ◦θi )i=1 ) → Z(Γℓ ). When Γ = Γi and θ = θi for
all i, we write the central product as (Γ◦θ )ℓi=1 .
Suppose that Γ ◦θ ∆ is a central product of two nilpotent groups. Since products and quotients of
nilpotent groups are nilpotent, it follows that Γ ◦θ ∆ is a nilpotent group. However, the isomorphism type of Γ ◦θ ∆ is dependent on θ .
Proposition 8.6. Let {Γi }ℓi=1 be a collection of torsion free admissible groups where h(Z(Γi )) = 1
for all i. Let Z(Γi ) = hzi i, and let θi : Z(Γi ) → Z(Γi+1 ) be the isomorphism given by θ (zi ) = zi+1
for 1 ≤ i ≤ ℓ − 1. Then h((Γi ◦θi )ℓi=1 ) = ∑ℓi=1 h(Γi ) − ℓ + 1 and h(Z(Γi ◦θi )ℓi−1 )) = 1
Proof. We may assume that ℓ = 2. First note that if Γ is a torsion free admissible group with
a normal subgroup ∆ E Γ such that Γ/∆ is torsion free, then h(Γ) = h(∆) + h(Γ/∆). Observe
that Γ1 ◦θ Γ2 /Z(Γ1 ◦θ Γ2 ) ∼
= Γ1 /Z(Γ1 ) × Γ2 /Z(Γ2 ). Since h(Z(Γ1 ◦θ Γ2 )) = 1, we may write
h(Γ1 /Z(Γ1 )) + h(Γ2 /Z(Γ2 )) + 1 = h(Γ1 ◦θ Γ2 ). Thus, h(Γ1 ◦θ Γ2 ) = h(Γ1 ) − 1 + h(Γ2 ) − 1 + 1 =
h(Γ1 ) + h(Γ2 ) − 1.
Definition 8.7. For ℓ ≥ 3, we define Λℓ to be the torsion free admissible group generated by the
set Sℓ = {xi }ℓi=1 with relations consisting of commutator brackets of the form [x1 , xi ] = xi+1 for
2 ≤ i ≤ ℓ − 1 and all other commutators being trivial.
Effective Separability of Finitely Generated Nilpotent Groups
31
Λℓ is an example of a Filiform nilpotent group. It has Hirsch length ℓ and has step length ℓ −
1. Defining ∆i = hxs iℓs=m−i+1 , it follows that {∆i }ℓi=1 is a cyclic series for Λℓ and {ξi }ℓi=1 is a
compatible generating subset where ξi = xℓ−i+1 . Additionally, h(Z(Λℓ )) = 1.
Proof. Theorem 1.5(ii), (iii) and (iv)
Assume that ℓ ≥ 3. By construction, Λℓ is a torsion free admissible group of Hirsch length ℓ such
that h(Z(Γℓ )) = 1 . Corollary 1.2 implies that FΛm (n) ≈ (log(n))ℓ which gives Theorem 1.5(ii).
For 2 ≤ c1 < c2 and ℓ ≥ 1, there exist natural numbers jℓ and ιℓ satisfying ( jℓ − 1) (c1 + 1) =
jℓ
ℓ lcm(c1 + 1, c2 + 1) and (ιℓ − 1) (c2 + 1) = ℓ lcm(c1 + 1, c2 + 1), respectively. Let Γℓ = (Λi ◦θΓ )i=1
ιℓ
where θΓ : Z(Λc1 +1 ) → Z(Λc1 +1 ) and θ∆ : Z(Λc2 +1 ) → Z(Λc2 +1 ) are the
and ∆ℓ = (Λi ◦θ∆ )i=1
identity isomorphisms, respectively. Proposition 8.6 implies that h(Γℓ ) = h(∆ℓ ) and h(Z(Γℓ )) =
h(Z(∆ℓ )) = 1, and thus, Corollary 1.2 implies that FΓℓ (n) ≈ F∆ℓ (n).
m with finite generating
Lastly, let c > 1 and m ≥ 1, and consider the group Γc m = (Λc+1 ◦θ )ci=1
2
subset Scm . Proposition 8.6 implies that h(Γcm ) = c m + c m − 1, and since c m2 + c m − 1 ≥ m,
Corollary 1.2 implies that (log(n))m FΓc m (n) as desired.
9
A review of Blackburn and a proof of Theorem 1.6
We start with a review of Blackburn’s proof of conjugacy separability for infinite admissible
groups. This section provides motivation for estimates in the following sections and how one
obtains an upper bound for ConjΓ (n).
Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free, and let γ , η ∈ Γ such that γ ≁ η .
In order to construct a surjective homomorphism to a finite group that separates the conjugacy
classes of γ and η , we proceed by induction on h(Γ). Since the base case is evident, we may
assume that h(Γ) > 1. When π∆1 (γ ) ≁ π∆1 (η ), induction implies there exists a surjective homomorphism to a finite group ϕ : Γ → Q such that ϕ (γ ) ≁ ϕ (η ). Otherwise, we may assume that
η = γ ξ1t for some t ∈ Z − {0}. The following integer is of particular importance.
h(Γ)
Definition 9.1. Let Γ be a torsion free admissible group with a cyclic series {∆i }i=1 and a comh(Γ)
(CΓ/∆1 (γ̄ )) → ∆1 be given by
patible generating subset {ξi }i=1 . Let γ ∈ Γ. If we let ϕ : π∆−1
1
D
E
τ (γ ) ∼
ϕ (η ) = [γ , η ], we then define τ (Γ, ∆i , ξi , γ ) = τ (γ ) ∈ N such that ξ
= Im(ϕ ).
1
We choose a prime power pα such that pα | τ (Γ, ∆i , ξi , γ ) and pα ∤ t. We then find a w ∈ N such
α
α −w
that if α ≥ w, then for each γ ∈ Γ p there exists η ∈ Γ satisfying η p
= γ (see [2, Lem 2]).
Consider the following definition (see [2, Lem 3]).
Definition 9.2. Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free, and let γ ∈ Γ.
We define e(Γ, ∆i , ξi , γ ) = e(γ ) ∈ N to be the smallest natural number such that if α ≥ e(γ ), then
α −e(γ )
).
CΓ/Γ pα (γ̄ ) ⊆ σ pα (CΓ (γ ) · Γ p
Letting e′ (γ̄ ) = e(Γ/∆1 , ∆i /∆1 , ξ̄i , γ̄ ), we set ω = α + w + e′ (γ̄ ). Blackburn then proves that
σ pβ (γ ) ≁ σ pβ (η ) (see §12 and [2]). However, as a consequence of the choice of a cyclic series
Effective Separability of Finitely Generated Nilpotent Groups
32
and a compatible generating subset, it becomes evident that the integer w is unnecessary. When
Γ has finite order elements, Blackburn inducts on |T (Γ)|. Thus, it suffices to bound pe(Γ,∆i ,ξi ,γ )
and τ (Γ, ∆i , ξi , γ ) in terms of kγ kS and kη kS . Following Blackburn’s method, we calculate the
asymptotic upper bound for ConjH2m+1 (Z) (n). We then demonstrate that the upper bound is sharp.
Before starting, we make the following observations for H2m+1 (Z). Using the cyclic series and
compatible generating subset given in the second paragraph of Subsection 5.2, we have τ (γ ) =
τ (H2m+1 (Z), ∆i , ξi , γ ) = gcd{xγ ,i , yγ , j |1 ≤ i, j ≤ m}. Thus, τ (γ ) ≤ C0 kγ kS for some C0 ∈ N. Moreover, via Subsection 5.1 we may write the conjugacy class of γ as
1 ~xγ τ (γ ) β + zγ
β ∈Z .
~0 Im
~yγ
(5)
0 ~0
1
Proposition 9.3. ConjH2m+1 (Z) (n) n2m+1 .
Proof. Let γ , η ∈ Γ such that kγ kS , kη kS ≤ n and γ ≁ η . We need to construct a surjective homomorphism ϕ : H2m+1 (Z) → Q to a finite group such that ϕ (γ ) ≁ ϕ (η ) and |Q| ≤ C n2m+1 for some
C ∈ N. We proceed based on whether γ and η have equal images in (H2m+1 (Z))ab . Corollary 1.4
(see also [4, Cor 2.3]) implies that there exists a surjective homomorphism ϕ : Z2m → Q such that
ϕ (πab (γ η −1 )) 6= 1 and |Q| ≤ C1 log(C1 n) for some C1 ∈ N. Since γ and η are non-equal central
elements in Q, it follows that ϕ (πab (γ )) ≁ ϕ (πab (η )), and thus, CDH2m+1 (Z) (γ , η ) ≤ C1 log(C1 n).
Thus, we may assume that πab (γ ) = πab (η ). In particular, we may write η = γ λ t where |t| ≤ C0 n2 .
Let pω be a prime power that divides τ (γ ) but not t. We claim that σ pω (γ ) ≁ σ pω (γ λ t ), and for a
contradiction, suppose otherwise. That implies
there exists x ∈ H2m+1 (Z) such that σ pω ([γ , x]) =
t
ω
σ p (λ ). Equation (5) implies that zη ∈ ℓγ β + zγ : β ∈ Z ( mod pω ) . Therefore, there exist
a, b ∈ Z such that t = a τ (γ ) + b pω . Thus, pω | t, a contradiction. Hence, σ pω (γ ) ≁ σ pω (η ).
When τ (γ ) 6= 0, we have that pω ≤ τ (γ ) ≤ C0 n. Hence, CDH2m+1 (Z) (γ , η ) ≤ C02m+1 n2m+1 . When
τ (γ ) = 0, the Prime Number Theorem [37, 1.2] implies that there exists a prime p such that p ∤ t
where p ≤ C2 log(C2 |t|) for some C2 ∈ N. Hence, p ≤ C3 log(C3 n) for some C3 ∈ N, and thus,
CDH2m+1 (Z) (γ , η ) ≤ C3 (log(C3 n))2m+1 . Hence, ConjH2m+1 (Z) (n) n2m+1 .
The following proposition finishes the proof of Theorem 1.6.
Proposition 9.4. n2m+1 ConjH2m+1 (Z) (n).
Proof. We will construct a sequence of non-conjugate pairs {γi , ηi } such that CDH2m+1 (Z) (γi , ηi ) =
ni2m+1 where kγi k, kηi k ≈ ni . Let {pi } be an enumeration of the primes. Writing pi · e1 as the scalar
product, we consider the following pair of elements:
1 pi ·~e1 1
1 pi ·~e1 2
Im ~0 and ηi = ~0
Im ~0 .
γi = ~0
~0
~0
0
1
0
1
Effective Separability of Finitely Generated Nilpotent Groups
33
Equation (5) implies that we may write the conjugacy class of γi as
1 pi ·~e1 t pi + 1
~0 t ∈ Z .
~0
Im
~0
0
1
(6)
Since σ pi (γi ) and σ pi (ηi ) are non-equal central elements of H2m+1 (Z)/(H2m+1 (Z)) pi , it follows
that γi ≁ ηi for all i. Moreover, we have kγi kS , kηi kS ≈ pi . Given that | H2m+1 (Z)/(H2m+1 (Z)) pi | =
pi2m+1 , we claim CDH2m+1 (Z) (γi , ηi ) = pi2m+1 . In order to demonstrate our claim, we show for all
surjective homomorphisms to a finite group ϕ : H2m+1 (Z) → Q where |Q| < pi2m+1 that ϕ (γi ) ∼
ϕ (ηi ). [16, Thm 2.7] implies that we may assume that |Q| = qµ . Since ϕ (γi ) = ϕ (ηi ) when
ϕ (λ ) = 1, we may assume that ϕ (λ ) 6= 1.
Suppose first that q = pi . We demonstrate that if Q is a group where ϕ (γi ) ≁ ϕ (ηi ), then there
exists no proper quotient of Q such that the images of ϕ (γi ) and ϕ (ηi ) are non-conjugate. Since
B(H2m+1 (Z)) = 1, Proposition 4.10 implies that |Q| = pi2m+1 . Since every choice of an admissible
quotient with respect to any primitive, central, non-trivial element is isomorphic to the trivial
subgroup, Proposition 4.11 implies that there exist no proper quotients of Q such that the image of
ϕ (λ 2 ) is non-trivial Thus, if N is a proper quotient of Q with natural projection ρ : Q → N, then
ker(ρ ) ∩ Z(Q) ∼
= Z(Q) since Z(Q) ∼
= Z/p j Z by Proposition 4.11. Thus, ρ (ϕ (γi )) = ρ (ϕ (ηi ));
hence, ρ (ϕ (γi )) ∼ ρ (ϕ (ηi )). In particular, if Q is a p-group where |Q| < pi2m+1 , then ϕ (γi ) ∼
ϕ (ηi ). Thus, we may assume that q 6= pi .
If q > pi , then Proposition 4.10 implies that p2m+1 > qµ . Thus, we may assume that q < pi .
Since Proposition 4.10 implies that Z/qν Z ∼
= Z(Q), Equation 6 implies that if 1 ≡ p t ( mod qν Z)
for some t ∈ Z , then ϕ (γ p ) ∼ ϕ (η p ). The smallest qν where this fails is qν = pi since p̄i is a
unit in Z/qν Z if and only if gcd(pi , qν ) = 1. Therefore, ϕ (γi ) ∼ ϕ (ηi ) when qµ < pi . Hence,
n2m+1 ConjH2m+1 (Z) (n).
The following corollary will be useful for the proof of Theorem 1.8.
Corollary 9.5. Let H3 (Z) be the 3-dimensional Heisenberg group with the presentation given by
hκ , µ , ν : [µ , ν ] = κ , κ central i, and let p be a prime. Suppose ϕ : H3 (Z) → Q is a surjective
homomorphism such that Q is a q-group where q is a distinct from p and where ϕ (κ ) 6= 1. Then
ϕ (µ p κ ) ∼ ϕ (µ p κ 2 ).
Proof. We may write the conjugacy class of µ p κ as {µ p κ t p+1 | t ∈ Z}. Proposition 4.10 implies
that Z(Q) ∼
= hϕ (κ )i. Hence, Z(Q) ∼
= Z/mZ where m = OrdQ (ϕ (κ )). Since Q is a q-group, it
β
follows that m = q . Given that gcd(p, qβ ) = 1, there exists integers r, s such that r p+sqβ = 1. We
β
have that µ p κ r p+1 ∼ µ p κ . We may write ϕ (µ p κ r p+1 ) = ϕ (µ p κ 1−s q +1 ) = ϕ (µ p κ 2 ). Therefore,
ϕ (µ p κ ) ∼ ϕ (µ p κ 2 ) as desired.
Effective Separability of Finitely Generated Nilpotent Groups
34
10 Relating complexity in groups and Lie algebras
Let Γ be a torsion free admissible group with finite generating subset S, Mal’tsev completion G,
and Lie algebra g of G. The overall goal of this section is to provide a bound of k Log(γ )kLog(S) in
terms of kγ kS where Log(S) gives a norm for the additive structure of g.
Proposition 10.1. Let {Γ, ∆i , ξi , G, g, νi } be an admissible 6-tuple, and suppose that Γ has step
2
length c. Let γ ∈ Γ. Then there exists a C ∈ N such that k Log(γ )kX ≤ C (kγ kS )c .
Proof. Using the Mal’tsev coordinates of γ , we may write γ = ∏i=1 ξiαi . Lemma 2.9 implies
that there exists a C1 ∈ N such that |αi | ≤ C1 (kγ kS )c for all i. A straightforward application of
the Baker-Campbell-Hausdorff formula (2) implies that Log(ξiαi ) = αi νi . Writing Ai = αi νi , it
follows that kAi kX ≤ C1 (kγ kS )c . Equation (2) implies that we may write
h(Γ)
c
k Log(γ )kX ≤ ∑ kCBi (A1 , · · · , Ah(Γ) )kX
i=1
where CBi (A1 , · · · , Ah(Γ) ) is a rational linear combination of i-fold Lie brackets in {A js }ts=1 ⊆
h(Γ)
h(Γ)
{Ai }i=1 . Let {A js }ts=1 ⊂ {Ai }i=1 where [A j1 , · · · A jt ] 6= 0. Via induction on the length of the
iterated Lie bracket, one can see that there exists Ct ∈ N such that [A j1 , · · · , A jt ] ≤ Ct ∏ts=1 kA js kX ≤
h(Γ)
Ct C1 (kγ kS )t c . By maximizing over all possible t-fold Lie brackets of elements of {Ai }i=1 , there
2
exists a Di ∈ N such that kCBi (A1 , · · · , Ah(Γ) )kX ≤ Di (kγ kS )t c . Hence, k Log(γ )kX ≤ C (kγ kS )c
for some C ∈ N.
An immediate application of Proposition 10.1 is that the adjoint representation of Γ has matrix
coefficients bounded by a polynomial in terms of word length.
Proposition 10.2. Let {Γ, Λ, ∆i , ξi , G, g, νi } be an admissible 7-tuple. Let γ ∈ Γ, and let (µi, j ) be
the matrix representative of Ad(γ ) with respect to X . Then |µi, j | ≤ C (kγ kS )c for some C ∈ N where
c is the step length of Γ.
2
Proof. Proposition 10.1 implies there exists a C1 ∈ N such that k Log(γ )kX ≤ C1 (kγ kS )c . Via
3
induction on the length of the Lie bracket and Equation (3), we have k Ad(γ )(vi )kX ≤ C2 (kγ kS )c
for some C2 ∈ N.
11 Preliminary estimates for Theorem 1.7
Let {Γ, ∆i , ξi } be an admissible 3-tuple such that Γ is torsion free. Let γ be a non-trivial element
of Γ, and let p be some prime. In the following section, we demonstrate the construction of the
integer e(γ ) = e(Γ, ∆i , ξi , γ ) and give an asymptotic bound for pe(γ ) in terms of kγ kS independent
of the prime p. We first provide a bound for τ (Γ, ∆i , ξi , γ ) in terms of kγ kS .
Effective Separability of Finitely Generated Nilpotent Groups
35
Proposition 11.1. Let {Γ, Λ, ∆i , ξi , G, g, νi } be an admissible 7-tuple, and let γ ∈ Γ. There exists
k,C ∈ N such that |τ (Γ, ∆i , ξi , γ )| ≤ C (kγ kS )k .
Proof. Before we start, we make some simplifying notation by letting τ (γ ) = τ (Γ, ∆i , ξi , γ ). Conτ (Γ,γ )
sider the smooth map Φ : G → G given by Φ(g) = [γ , g]. Suppose η ∈ Γ satisfies Φ(η ) = ξ1
.
−1
The commutative diagram (1.2) on [12, Pg 7] implies that we may write (I − Ad(γ ))(Log(η )) =
τ (Γ,γ )
Log(ξ1
) where (dΦγ )1 = I − Ad(γ −1 ). Proposition 10.2 implies that I − Ad(γ −1 ) is a strictly
3
upper triangular matrix whose coefficients are bounded by C (kγ kS )(c(Γ)) for some C ∈ N. Since
τ (γ )
it is evident that Log(ξ1 ) = τ (γ )ν1 , backwards substitution gives our result.
The first statement of the following proposition is originally found in [2, Lem 3]. We reproduce
its proof so that we may provide estimates for the value e(Γ, ∆i , ξi , γ ) in terms of kγ kS .
Proposition 11.2. Let {Γ, Λ, ∆i , ξi , G, g, νi } be an admissible 7-tuple. Let p be prime and γ ∈ Γ.
Then there exists e(Γ, ∆i , ξi , γ ) = e(γ ) ∈ N such that if α ≥ e(γ ), then CΓ/Γ pα (γ̄ ) ⊆ σ pα (CΓ (γ ) ·
α −e(γ )
Γp
). Moreover, pe(γ ) ≤ C(kγ kS )k for some C ∈ N and k ∈ N.
Proof. We proceed by induction on Hirsch length, and given that the statement is clear for Z by
setting e(γ ) = 0 for all γ , we may assume that h(Γ) > 1.
We construct e(γ ) based on the value of τ (γ ) = τ (Γ, ∆i , ξi , γ ) (see Definition 9.1). By induction,
we may assume that we have already constructed e′ (γ̄ ) = e(Γ/∆1 , ∆i /∆1 , ξ̄i , γ¯). When τ (γ ) = 0,
we set e(γ ) = e′ (γ̄ ). Suppose α ≥ e(γ ) and that η̄ ∈ CΓ/Γ pα (γ̄ ) for some η ∈ Γ. By selection,
α −e(γ )
(CΓ/∆1 (γ̄ )) · Γ p
η̄ ∈ CΓ/Γ pα ·∆1 (γ̄ ). Thus, we may write η ∈ π∆−1
1
it follows that η̄ ∈ σ pα (CΓ (γ ) · Γ
pα −e(γ )
. Since π∆−1
(CΓ/∆1 (γ̄ )) = CΓ (γ ),
1
α −e(γ )
). Thus, CΓ/Γ pα (γ̄ ) ⊆ σ pα (CΓ (γ ) · Γ p
).
When τ (γ ) 6= 0, we let β be the largest power of p such that pβ | τ (γ ), and set e(Γ) = e′ (γ̄ )+ β . Let
α ≥ e(γ ), and let η ∈ Γ satisfy η̄ ∈ CΓ/Γ pα (γ̄ ). Thus, η̄ ∈ CΓ/Γ pα ·∆1 (γ̄ ), and subsequently, induction
α −e(γ )+β
implies η̄ ∈ πΓ pα ·∆1 (CΓ/∆1 (γ̄ ) · Γ p
α −e(γ )+β
τ (γ )
). Thus, we may write η = µ ε a λ where µ ∈ CΓ (γ ), λ ∈
α −e(γ )+β
α −e′ (γ̄ )
Γp
, and ϕγ (ε ) = ξ1 . Hence, we have [γ , η ] = [γ , ε a ] ∈ Γ p
. Since [γ , ε a ] ∈ Γ p
a
α
−e(
γ
)+
β
β
and [γ , ε ] ∈ ∆1 , we have that p
| a τ (γ ). By definition of p , it follows that pα −e(γ ) | a,
α
−e(
γ
)
α −e(γ )
). Hence, CΓ/Γ pα (γ̄ ) ⊆ σ pα (CΓ (γ ) · Γ p
).
and thus, η̄ ∈ σ pα (CΓ (γ ) · Γ p
We proceed by induction on Hirsch length to demonstrate the asymptotic upper bound, and since
the base case is clear, we assume that h(Γ) > 1. Let γ ∈ Γ, and suppose that τ (γ ) = 0. By
′
construction, e(γ ) = e′ (γ̄ ), and thus, induction implies that there exist C1 , k1 ∈ N such that pe (γ̄ ) ≤
C1 (kγ̄ kS̄ )k1 . When τ (γ ) 6= 0, it follows that e(γ ) = e′ (γ̄ ) + β where β is the largest power of
p that divides τ (γ ). Proposition 11.1 implies there exist k2 ,C2 ∈ N such that pβ ≤ C2 (kγ kS )k2 .
Consequently, pe(γ ) ≤ C1 C2 (kγ kS )k1 +k2 .
Effective Separability of Finitely Generated Nilpotent Groups
36
12 Proof of Theorem 1.7
Let Γ be an infinite admissible group. In order to demonstrate that there exists k1 ∈ N such that
ConjΓ (n) nk1 , we need to show for any γ , η ∈ Γ where γ ≁ η and kγ kS , kη kS ≤ n there exists
a prime power pω ≤ C nk2 such that σ pω (γ ) ≁ σ pω (η ) for some C, k2 ∈ N. It then follows that
CDΓ (γ , η ) ≤ Ch(Γ) nh(Γ) k2 . We first specialize to torsion free admissible groups.
Proposition 12.1. Let {Γ, Λ, ∆i , ξi , g, νi } be an admissible 7-tuple. Then there exists k ∈ N such
that ConjΓ (n) nk .
Proof. Let γ , η ∈ Γ such that kγ kS , kη kS ≤ n and where γ ≁ η . We demonstrate that there exists a
k0 ∈ N such that CDΓ (γ , η ) ≤ C0 nk0 for some C0 ∈ N by induction on h(Γ), and since the base case
is clear, we may assume that h(Γ) > 1. If π∆1 (γ ) ≁ π∆1 (η ), then the inductive hypothesis implies
that there exists a surjective homomorphism to a finite group ϕ : Γ/∆1 → Q such that ϕ (γ ) ≁ ϕ (η )
and where |Q| ≤ C1 nk1 for some C1 , k1 ∈ N. Thus, CDΓ (γ , η ) ≤ C1 nk1 . Otherwise, we may assume
that η = γ ξ1t , and Lemma 2.9 implies that |t| ≤ C2 nc(Γ) for a constant C2 ∈ N.
For notational simplicity, let τ (γ ) = τ (Γ, ∆i , ξi , γ ) and e′ (γ ) = e(Γ, ∆i /∆1 , ξ̄i , γ¯). Since γ ≁ γ ξ1t ,
there exists a prime power pα such that pα | τ (γ ) but pα ∤ t. We set ω = α +e′ (γ̄ ), and suppose for a
contradiction there exists x ∈ Γ such that σ pω (x−1 γ x) = σ pω (γ ξ1 )t . That implies x̄ ∈ CΓ/Γ pω ·∆1 (γ̄ ),
α
and thus, x̄ ∈ πΓ pω ·∆1 (CΓ/∆1 (γ ) · Γ p ) by Proposition 11.2. Subsequently, x = g µ for some g ∈
q τ (Γ,γ )
α
(CΓ/∆1 (γ̄ )) and µ ∈ Γ p . Hence, σ pω ([γ , g]) = σ pω (ξ1 )t , and since [γ , g] = ξ1
π∆−1
1
q ∈ Z, it follows that
σ pω (γ ) ≁ σ pω (η ).
t−q τ (Γ,γ )
ξ1
α +e(Γ/∆1 ,γ̄ )
∈ Γp
.
That implies
pα
for some
| t, which is a contradiction. Hence,
′
Proposition 11.2 implies that pe (γ̄ ) ≤ C3 nk2 for C3 , k2 ∈ N. When τ (γ ) = 0, the Prime Number
Theorem [37, 1.2] implies that we may choose p such that |p| ≤ C4 log(C4 n) for some C4 ∈ N.
Hence, CDΓ (γ , η ) ≤ C5 (log(C5 n))h(Γ) k2 for some C5 ∈ N. When τ (γ ) 6= 0, Proposition 11.1
implies that τ (γ ) ≤ C6 nk3 for some C6 , k3 ∈ N. Thus, pω ≤ C3 C6 nk2 +k3 . Therefore, CDΓ (γ , η ) ≤
(C3 C6 )h(Γ) nh(Γ)(k2 +k3 ) . Hence, ConjΓ (n) nk3 where k3 = max{k1 , h(Γ)(k2 + k3 )}.
Proof. Theorem 1.7
Let Γ be an infinite admissible group Γ with a choice of a cyclic series {∆i }m
i=1 and a compatible
m
generating subset {ξi }i=1 . Let k1 be the natural number from Proposition 12.1 and k2 be the
natural number from Proposition 11.2, both for Γ/T (Γ). Letting k3 = h(Γ) · max{k1 , k2 }, we
claim that ConjΓ (n) nk3 . Let γ , η ∈ Γ satisfy γ ≁ η and kγ kS , kη kS ≤ n. In order to show that
CDΓ (γ , η ) ≤ C0 nk3 where C0 ∈ N, we construct a surjective homomorphism to a finite group that
distinguishes the conjugacy classes of γ and η via induction on |T (Γ)|. To simplify the following
arguments, we let e(γ̄ ) = e(Γ/T (Γ), ∆i /T (Γ), ξ̄i , γ̄ ).
Proposition 12.1 implies that we may assume that there exists a subgroup P ⊆ Z(Γ) of prime order
p. If πP (γ ) ≁ πP (η ), then induction implies that there exists a surjective homomorphism to a
finite group ϕ : Γ/P → N such that ϕ (γ ) ≁ ϕ (η ) and where |N| ≤ C1 nk3 for some C1 ∈ N. Thus,
CDΓ (γ , η ) ≤ C1 nk3 . Otherwise, we may assume that η = γ µ where hµ i = P.
Effective Separability of Finitely Generated Nilpotent Groups
37
Suppose there exists Q ⊆ Z(Γ) such that |Q| = q where q is a prime distinct from p. Suppose for a
contradiction that there exists x ∈ Γ such that x−1 γ x = γ µ λ where Q = hλ i. Since [γ , x] ∈ Z(Γ) and
OrdΓ (λ ) = q, basic commutator properties imply that [γ , xq ] = µ q . Given that ps+qr = 1 for some
r, s ∈ Z, it follows that [γ , xq r ] = γ µ 1−p s = γ µ which is a contradiction. Hence, induction implies
there exists a surjective homomorphism to a finite group θ : Γ/Q → M such that θ (γ ) ≁ θ (γ µ )
and where |M| ≤ C2 nk3 for some C2 ∈ N. Thus, CDΓ (γ , η ) ≤ C2 nk3 .
Suppose that T (Γ) is a p-group with exponent pm . We set ω = m + e′ (γ̄ ), and suppose for a contradiction there exists x ∈ Γ such that σ pω (x−1 γ x) ∼ σ pω (γ µ ). Thus, x̄ ∈ CΓ/T (Γ)·Γ pω (γ̄ ), and subm
sequently, Proposition 11.2 implies that x̄ ∈ πT (Γ)·Γ pω (CΓ/T (Γ) (γ̄ ) · Γ p ). Therefore, we may write
m
−1 ∈ Γ pm . Moreover,
x = g λ where λ ∈ Γ p and g ∈ πT−1
(Γ) (CΓ/T (Γ) (γ̄ )). Subsequently, [γ , g] µ
m
since [γ , g] ∈ T (Γ) and T (Γ) ∩ Γ p = 1, it follows that [γ , x] = µ which is a contradiction. Propo′
h(Γ)
sition 11.2 imply that pe (γ̄ ) ≤ C3 nk2 for some C3 ∈ N. Thus, CDΓ (γ , η ) ≤ C3 |T (Γ)| nh(Γ) k2 , and
k
subsequently, ConjΓ (n) n 3 .
13 Proofs of Theorem 1.8 and Theorem 1.9
Let Γ be an infinite admissible group with a choice of a cyclic series {∆i }m
i=1 and a compatible
m
generating subset {ξi }i=1 . Since the proofs of Theorem 1.8(i) and Theorem 1.8(ii) require different strategies, we approach them separately. We start with Theorem 1.8(i) since it only requires
elementary methods.
We assume that Γ contains an infinite, finitely generated abelian group K of index ℓ. We want to
demonstrate that log(n) ConjΓ (n) (log(n))ℓ . Since FΓ,S (n) ConjΓ (n), Corollary 1.4 (see also
[4, Cor 2.3]) implies that log(n) ConjΓ (n). Thus, we need only to demonstrate that ConjΓ (n)
(log(n))ℓ . For any two non-conjugate elements γ , η ∈ Γ such that kγ kS , kη kS ≤ n we want to
construct a surjective homomorphism ϕ : Γ → Q such that ϕ (γ ) ≁ ϕ (η ) and |Q| ≤ C (log(C n))ℓ
for some C ∈ N.
Proof. Theorem 1.8(i)
Let S1 be a finite generating subset for K, and let {υi }ℓi=1 be a set of coset representatives of
K in Γ. We take S = S1 ∪ {υi }ℓi=1 as the generating subset for Γ. If kγ kS ≤ n, we may write
γ = gγ υγ where kgγ kS1 ≤ C1 n for some C1 ∈ N and υγ ∈ {υi }ℓi=1 . Conjugation in Γ induces a
map ϕ : Γ/K → Aut(K) given by ϕ (πK (υi )) = ϕi . Thus, we may write the conjugacy class of γ as
ℓ
ϕi (gγ ) (υi−1 υγ υi ) i=1 . Finally, there exists C2 ∈ N such that if kγ kS1 ≤ n, then kϕi (γ )kS ≤ C2 n
for all i.
Suppose γ , η ∈ Γ are two non-conjugate elements such that kγ kS , kη kS ≤ n. If πK (γ ) ≁ πK (η ),
then by taking the map πK : Γ → Γ/K, it follows that CDΓ (γ , η ) ≤ ℓ. Otherwise, we may assume
that η = gη υγ . By Corollary 1.4 (see also [4, Cor 2.3]), there exists a surjective homomorphism
−1
−1
fi : Γ → Qi such that fi (g−1
γ υγ ϕi (gη ) (υi υη υi )) 6= 1 and |Qi | ≤ C3 log(2C2 C3 n) for some C3 ∈
N. By letting H = ∩ℓi=1 ker( fi ), it follows that πH (γ ) ≁ πH (η ) and |Γ/H| ≤ C3ℓ (log(2C2 C3 n))ℓ .
Therefore, ConjΓ (n) (log(n))ℓ , and subsequently, log(n) ConjΓ (n) (log(n))ℓ .
Effective Separability of Finitely Generated Nilpotent Groups
38
For Theorem 1.8(ii), suppose that Γ does not contain an abelian group of finite index. In order
to demonstrate that nψRF (Γ)(c(Γ/T (Γ))−1) ConjΓ (n), we desire a sequence of non-conjugate pairs
ψ (Γ)(c(Γ/T (Γ))−1)
where kγi kS , kηi kS ≈ ni . In particular, we must
{γi , ηi } such that CDΓ (γi , ηi ) = ni RF
find non-conjugate elements whose conjugacy classes are difficult to separate i.e. non-cojugate
elements that have relatively short word length in comparison to the order of the minimal finite
group required to separate their conjugacy classes.
We first reduce to the calculation of the lower asymptotic bounds for ConjΓ (n) to torsion free
admissible groups by appealing to the conjugacy separability of two elements within a finite index
subgroup.
Proposition 13.1. Let Γ be an infinite admissible group, and let ∆ be a subgroup. Suppose there
exist γ , η ∈ ∆ such that γ ≁ η in Γ. Then CD∆ (γ , η ) ≤ CDΓ (γ , η ).
Proof. We first remark that since Γ and ∆ are admissible groups, Theorem 1.7 implies CDΓ (γ , η ) <
∞ and CD∆ (γ , η ) < ∞. Suppose that ϕ : Γ → Q is surjective homomorphism to a finite group such
that |Q| = CDΓ (γ , η ). If we let ι : ∆ → Γ be the inclusion, then we have a surjective map ϕ ◦ ι :
∆ → ϕ (∆) to a finite group where ϕ (ι (γ )) ≁ ϕ (ι (η )). By definition, CD∆ (γ , η ) ≤ |ϕ (∆)| ≤ |Q|.
Thus, CDΓk (γ , η ) ≤ CDΓ (γ , η ).
Proof. Theorem 1.8(ii)
We first assume that Γ is torsion free. Let Γ/Λ be a choice of a maximal admissible quotient of Γ.
There exists a g ∈ Z(Γ) − {1} such that Γ/Λ is a choice of an admissible quotient with respect to
g. Moreover, there exists a k such that gk = [y, z] for some y ∈ Γc−1 and z ∈ Γ. If g is not primitive,
then there exists a xΛ ∈ Z(Γ) − {1} such that xsΛ = g for some s ∈ Z − {0}. In particular, xtΛ = [y, z]
where t = s k.
t B(Γ/Λ)
. Equation 4 implies that HΛ =
There exists aΛ ∈ Γc(Γ)−1 and bΛ ∈ Γ such that [aΛ , bΛ ] = xΛ
E
D
t B(Γ/Λ) ∼
aΛ , bΛ , xΛ
= H3 (Z). Let p j,Λ be an enumeration of primes greater than B(Γ/Λ), and
p
t B(Γ/Λ)
p
2 t B(Γ/Λ)
and η j,Λ = aΛj,Λ xΛ
. Since the images of γ j,Λ and η j,Λ are non-equal
let γ j,Λ = aΛj,Λ xΛ
p
j,Λ
central elements of Γ/Λ · Γ , it follows that γ j,Λ ≁ η j,Λ for all j.
We claim that γ j,Λ and η j,Λ are our desired non-conjugate elements. In particular, we will demonψ (Γ)(c(Γ)−1)
and that kγ j,Λ kS , kη j,Λ kS ≈ ni . By construction, we have
strate CDΓ (γ j,Λ , η j,Λ ) ≈ ni RF
that γ j,Λ , η j,Λ ∈ Γc(Γ)−1 and kγ j,Λ kS′ , kη j,Λ kS′ ≈ p j,Λ where S′ = S ∩ Γ2 . [15, 3.B2] implies that
1/(c(Γ)−1)
ψ (Γ)
RF
kγ j,Λ kS , kη j,Λ kS ≈ p j,Λ
. Hence,
. Therefore, (kγ j,Λ kS )ψLower (Γ) , (kη j,Λ kS )ψLower (Γ) ≈ p j,Λ
we need to demonstrate for all surjective homomorphisms to finite groups ϕ : Γ → Q where
ψRF (Γ)
|Q| < p j,Λ
that ϕ (γ j,Λ ) ∼ ϕ (η j,Λ ).
[16, Thm 2.7] implies that we may assume that |Q| = qβ where q is prime. Since ϕ (γ j,Λ ) =
t B(Γ/Λ)
t B(Γ/Λ)
) = 1, we may also assume that ϕ (xΛ
) 6= 1. Suppose that q >
ϕ (η j,Λ ) when ϕ (xΛ
p j,Λ . Consider the homomorphism given by ρ ◦ ϕ : Γ → Q/ϕ (Λ) where ρ : Q → Q/ϕ (Λ) is the
◦ ϕ : Γ/Λ →
natural projection. Since Λ ≤ ker(ρ ◦ ϕ ), we have an induced homomorphism ρ]
Q/ϕ (Λ). Since h(Z(Γ/Λ)) = 1, ρ]
◦ ϕ (xt B(Γ/Λ) ) 6= 1, and q > B(Γ/Λ), Proposition 4.10 implies
ψRF (Γ)
ψRF (Γ)
. Hence, |Q| > p j,Λ
. Thus, we may assume that q ≤ p j,Λ
that |Q/ϕ (Λ)| > p j,Λ
Effective Separability of Finitely Generated Nilpotent Groups
39
Now assume that q = p j,Λ . Suppose that ϕ (Λ) is a non-trivial subgroup of Q. As before, we have
ψRF (Γ)
◦ ϕ : Γ/Λ → Q/ϕ (Λ). Since |Q/ϕ (Q)| ≤ p j,Λ
an induced homomorphism ρ]
, Proposition 4.11
ψ (Γ)
RF
implies that |Q/ϕ (Q)| = p j,Λ
ϕ (Λ) = {1}.
ψ (Γ)
. Thus, we have that |Q| > p j RF
. Hence, we may assume that
Suppose that q = p j,Λ . If ϕ (γ j,Λ ) ∼ ϕ (η j,Λ ), then there is nothing to prove. Thus, we may assume
that ϕ (γ j,Λ ) ≁ ϕ (η j,Λ ). Proposition 4.11 implies that if N is a proper quotient of Q with natural
projection θ : Q → N, then ker(θ ) ∩ Z(Q) ∼
= Z(Q). Thus, we have that θ (ϕ (γ j,Λ )) = θ (ϕ (η j,Λ ))
ψRF (Γ)
since θ (ϕ (xΛ )) = 1. In particular, if Q is a p j,Λ -group where ϕ (Λ) ∼
, then
= {1} and |Q| < p j,Λ
ϕ (γ j,Λ ) ∼ ϕ (η j,Λ ). Hence, we may assume that q 6= p j,Λ .
Since ϕ (HΛ ) is a q-group where q 6= p j,Λ , Corollary 9.5 implies that there exists g ∈ HΛ such that
ϕ (g−1 γ j,Λ g) = ϕ (η j,Λ ) as elements of ϕ (HΛ ). Thus, ϕ (γ j,Λ ) ∼ ϕ (η j,Λ ). Since we have exhausted
ψRF (Γ)
all possibilities, it follows that CDΓ (γ j , η j ) = p j,Λ
. Hence, nψRF (Γ)(c(Γ)−1) ConjΓ,S (n).
Now suppose that Γ is an infinite admissible group where |T (Γ)| > 1. There exists a finite index,
torsion free subgroup of Γ which we denote as ∆. Let ∆/Λ be a choice of a maximal admissible
quotient of ∆. Using above reasoning, there exists xΛ ∈ ∆ such that ∆/Λ is a choice of an admissible
quotient with respect to xΛ where xtΛ = [y, z] for some y ∈ ∆c−1 and z ∈ ∆.
Let {p j,Λ } be an enumeration of primes greater than B(∆/Λ). There exist an aΛ ∈ ∆c(Γ)−1
t B(∆/Λ)
p
t B(∆/Λ)
p
2 t B(∆/Λ)
and η j,Λ = aΛj xΛ
be
. Let γ j,Λ = aΛj xΛ
and bΛ ∈ ∆ such that [aΛ , bΛ ] = xΛ
p
the elements from the above construction for ∆. Let ρ : Γ → Γ/T (Γ) · Γ be the natural projection. We have that ρ (γ j ) 6= ρ (η j ) and ρ (γ j ), ρ (η j ) 6= 1 by construction. Additionally, we
have that πT (Γ) (∆) is a finite index subgroup of Γ/T (Γ). Thus, [16, Lem 4.8(c)] implies that
Z(πT (Γ) (∆)) = πT (Γ) (∆) ∩ Z(Γ/Z(Γ)). Hence, πT (Γ) (xΛ ) ∈ Z(Γ/T (Γ)). Since ρ (γ j ) and ρ (η j ) are
non-equal central elements of Γ/T (Γ) · Γ p , we have that γ j ≁ η j .
Proposition 13.1 implies that CD∆ (γ j,Λ , η j,Λ ) ≤ CDΓ (γ j,Λ , η j,Λ ). By the above construction, we
ψ (∆)(c(∆)−1)
have n j RF
≤ CDΓ (γ j,Λ , η j,Λ ) where kγ j,Λ kS , kη j,Λ kS ≈ n j . If S′ is a finite generating
subset of Γ, then kγ j,Λ kS ≈ kγ j,Λ kS′ and kη j,Λ kS ≈ kη j,Λ kS′ . Hence, kγ j,Λ kS′ , kη j,Λ kS′ ≈ n j ,
ψ (∆)(c(∆)−1)
and n j RF
CDΓ (γ j,Λ , η j,Λ ). Since the projection to the torsion free quotient πT (Γ) :
Γ → Γ/T (Γ) is injective when restricted to ∆, ∆ is isomorphic to a finite index subgroup of
Γ/T (Γ), and thus, Theorem 1.3 implies that ψRF (Γℓ ) = ψRF (Γ). Since c(Γ/T (Γ)) = c(∆), we
have nψRF (Γ)(c(Γ/T (Γ))−1) ConjΓ (n).
Proof. Theorem 1.9
Suppose that Γ and ∆ are two infinite admissible of step size 2 or greater such that Γ/T (Γ)
and ∆/T (∆) has isomorphic Mal’tsev completions. Proposition 7.8 implies that ψRF (Γ/T (Γ)) =
ψRF (∆/T (∆)). By definition of ψRF (Γ) and ψRF (∆), we have ψRF (Γ) = ψRF (∆). Since c(Γ/T (Γ)) =
c(∆/T (∆)), our theorem is now evident.
Effective Separability of Finitely Generated Nilpotent Groups
40
14 Proof of Theorem 1.10
Proof. For s ∈ N, let Λs be the group given in Definition 8.7, and let θ : Z(Λs ) → Z(Λs ) be
the identity morphism. Let c > 1 and m ≥ 1, and consider the group Γcm = (Λc+1 ◦θ )m
i=1 with
a finite generating subset Scm . Proposition 8.6 implies that h(Γcm ) = c m2 + c m − 1, and since
c2 m2 + c2 m − 1 ≥ m, Theorem 1.8(ii) implies that nm ConjΓcm (n) as desired.
References
[1] H. Bass, The degree of polynomial growth of finitely generated nilpotent groups, Proc. London Math. Soc. 25
(1972), 603–614.
[2] N. Blackburn, Conjugacy in nilpotent groups, Proc. Amer. Math. Soc. 16 (1965), 143–148.
[3] K. Bou-Rabee, Approximating a group by its solvable quotients, New York J. Math. 17 (2011), 699–712.
[4] K. Bou-Rabee, Quantifying residual finiteness, J. Algebra 323 (2010), 729–737.
[5] K. Bou-Rabee, T. Kaletha, Quantifying residual finiteness of arithmetic groups, Compos. Math. 148 (2012),
907–920.
[6] K. Bou-Rabee, D. B. McReynolds, Asymptotic growth and least common multiples in groups, Bull. Lond.
Math. Soc. 43 (2011), 1059–1068.
[7] K. Bou-Rabee, D. B. McReynolds, Extremal behavior of divisibility functions, Geom. Dedicata 2 (2014), 1–9
[8] K. Bou-Rabee, M. Hagen, P. Patel, Residual finiteness growths of virtually special groups, to appear in Math.
Zeit., ArXiv (2014).
[9] N. V. Buskin, Efficient separability in free groups, Sib. Math. J. 50 (2009), 603–608.
[10] J. S. Chahal, Solution of the congruence subgroup problem for solvable algebraic groups, Nagoya Math. J.
79 (1980), 141-144
[11] L. Corwin, F. Greenleaf, Representations of nilpotent Lie groups and their applications. Part 1. Basic theory
and Examples, Cambridge Studies in Advanced Mathematics, 18. Cambridge University Press, Cambridge.
1990, viii+269 pp.
[12] K. Dekimpe, Almost-Beiberbach groups: Affine and polynomial structures, Springer–Verlag, 1996.
[13] E. Formanek, Conjugate separability in polycyclic groups, J. Algebra 42 (1976), 1–10.
[14] V. V. Gorbacevic̆, Discrete subgroups of solvable Lie groups of type (E). Math. USSR Sbornik, 1971, 14 N◦ ,
pp. 233-251.
[15] M. Gromov, Asymptotic invariants of infinite groups, Geometric group theory, Vol. 2 (Sussex, 1991), 1-295,
London Math. Soc. Lecture Note Ser., 182, Cambridge Univ. Press, 1993.
[16] P. Hall, The Edmonton notes on nilpotent groups, Queen Mary College Math. Notes. Math. Dept., Queen
Mary College, London 1969.
[17] E. Hamilton, H. Wilton, and P. A. Zalesskii, Separability of double cosets and conjugacy classes in 3-manifold
groups, J. Lond. Math. Soc. (2) 87 (2013), no. 1, 269–288
Effective Separability of Finitely Generated Nilpotent Groups
41
[18] J. Hempel, Residual finiteness for 3-manifolds, Combinatorial group theory and topology (Alta, Utah, 1984),
379–396, Ann. of Math. Study., 111, Princeton Univ. Press, Princeton, NJ, 1987
[19] D. F. Holt, B. Eick, E. A. O’Brien, Handbook of computational group theory, Discrete Mathematics and its
Applications (Boca Ralton). Chapman & Hall/CRC, Boca Raton, FL, 2005., xvi+514 pp.
[20] M. Kassabov, F. Matucci, Bounding the residual finiteness of free groups, Proc. Amer. Math. Soc. 139 (2011),
2281–2286.
[21] E. Khukhro, Nilpotent Groups and their automorphisms, de Gruyter Expositions in Mathematics, 8. Walter
de Gruyter & Co., Berlin, 1993.
[22] A. W. Knapp, Lie groups beyond an introduction, Birkhäuser, 2002.
[23] G. Kozma, A. Thom, Divisibility and laws in finite simple groups, ArXiv (2014).
[24] S. Lawton, L. Louder, D. B. McReynolds, Decision problems, complexity, traces, and representations, ArXiv
(2013).
[25] C. R. Leedham-Green, S. McKay, The structure of groups of prime power order, London Mathematical Society Monographs. New Series, 27. Oxford Science Publications, Oxford University Press, Oxford, 2002.
xii+334 pp.
[26] R. C. Lyndon, P. E. Schupp, Combinatorial group theory, Springer–Verlag, 2001.
[27] A. I. Mal’tsev. On a class of homogeneous spaces, Amer. Math. Soc. Translation (1951), 33 pp.
[28] A. I. Mal’tsev, On homomorphisms onto finite groups, Uchen. Zap. Ivanovskogo Gos. Ped. Inst. 18 (1958),
49–60.
[29] A. I. Mal’tsev, On isomorphic matrix representations of infinite groups, Amer. Math. Soc. Transl. (2) 45
(1965), 1–18.
[30] D. V. Osin, Subgroup distortions in nilpotent groups, Comm. Algebra 29 (2001), 5439–5463.
[31] P. Patel, On a theorem of Peter Scott, Proc. Amer. Math. Soc. 142 (2014), 2891–2906.
[32] M. S. Raghunathan, Discrete subgroups of Lie groups, Math. Student 2007, Centenary Volume, 59–70 (2008).
[33] I. Rivin, Geodesics with one self-intersection, and other stories, Adv. Math. 231 (2012), 2391–2412.
[34] V. N. Remeslennikov, Finite approximability of groups with respect to conjugacy, Siberian Math. J. 23 (1971)
783–792.
[35] D. Segal, Polycyclic Groups, Cambridge University Press, 1983.
[36] P. Stebe, Conjugacy separability of groups of integer matrices, Proc. Amer. Math. Soc. 32 (1972), 1–7.
[37] G. Tenenbaum, Introduction to analytic and probabilistic number theory, Cambridge University Press, 1995
[38] A. Thom, About the length of laws for finite groups, ArXiv (2015)
| 4math.GR
|
1
Pilot Reuse Among D2D Users in D2D Underlaid
Massive MIMO Systems
arXiv:1708.01358v1 [cs.IT] 4 Aug 2017
Hao Xu, Student Member, IEEE, Wei Xu, Senior Member, IEEE, Zhaohui Yang, Student Member, IEEE, Jianfeng
Shi, Student Member, IEEE, and Ming Chen, Member, IEEE
Abstract—In a device-to-device (D2D) underlaid massive
MIMO system, D2D transmitters reuse the uplink spectrum
of cellular users (CUs), leading to cochannel interference. To
decrease pilot overhead, we assume pilot reuse (PR) among
D2D pairs. We first derive the minimum-mean-square-error
(MMSE) estimation of all channels and give a lower bound
on the ergodic achievable rate of both cellular and D2D links.
To mitigate pilot contamination caused by PR, we then propose
a pilot scheduling and pilot power control algorithm based on
the criterion of minimizing the sum mean-square-error (MSE)
of channel estimation of D2D links. We show that, with an
appropriate PR ratio and a well designed pilot scheduling scheme,
each D2D transmitter could transmit its pilot with maximum
power. In addition, we also maximize the sum rate of all D2D
links while guaranteeing the quality of service (QoS) of CUs, and
develop an iterative algorithm to obtain a suboptimal solution.
Simulation results show that the effect of pilot contamination can
be greatly decreased by the proposed pilot scheduling algorithm,
and the PR scheme provides significant performance gains over
the conventional orthogonal training scheme in terms of system
spectral efficiency.
I. I NTRODUCTION
With the increasing demand on broadband wireless communications, the problem of spectrum insufficiency has become
a major factor limiting the wireless system performance [1].
Massive multiple-input multiple-output (MIMO) transmission
was proposed in [2] and has triggered considerable research
interest recently due to its great gains in spectral efficiency
(SE) and energy efficiency (EE) [3]–[5]. Besides, device-todevice (D2D) communication has also been proven promising
in enhancing the SE of the traditional cellular systems and
has drawn great attention recently [6]–[8]. Different from the
conventional cellular communication where all traffic is routed
via base station (BS), D2D communication allows two closely
located users to communicate directly, and thus have distinct
Copyright (c) 2015 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained
from the IEEE by sending a request to [email protected]. This work
was in part supported by the NSFC (Nos. 61372106, 61471114, & 61221002),
NSTMP under 2016ZX03001016-003, the Six Talent Peaks project in Jiangsu
Province under GDZB-005, Science and Technology Project of Guangdong
Province under Grant 2014B010119001, the Scholarship from the China
Scholarship Council (No. 201606090039), Program Sponsored for Scientific
Innovation Research of College Graduate in Jiangsu Province under Grant
KYLX16 0221, and the Scientific Research Foundation of Graduate School
of Southeast University under Grant YBJJ1651. (Corresponding author: Hao
Xu, Wei Xu.)
H. Xu, W. Xu, Z. Yang, J. Shi and M. Chen are with the National
Mobile Communications Research Laboratory, Southeast University, Nanjing
210096, China (Email: {xuhao2013, wxu, yangzhaohui, shijianfeng and
chenming}@seu.edu.cn).
advantages such as high SE, short packet delay, low energy
consumption and increased safety.
There has been extensive research on design and analysis of
massive MIMO systems [9]–[13]. In [9], the uplink capacity
bounds were derived under both perfect and imperfect channel
state information (CSI), and the tradeoff between SE and EE
was studied. Ref. [10] compared two most prominent linear
precoders with respect to (w.r.t.) SE and radiated EE in a
massive MIMO system. Unlike [9] and [10], which considered
simplified single-cell scenarios, [11]–[13] studied multi-cell
massive MIMO systems. As for underlaid D2D communication, a great challenge to the existing cellular architecture is the
cochannel interference due to spectrum reuse. There has been
a lot of literature working on interference mitigation for D2D
underlaid systems [14]–[20]. In [14]–[17], resource allocation
and power control algorithms were proposed to maximize the
SE of D2D users (DUs), and in [18]–[20], extended algorithms
were carried out to maximize the EE of DUs.
Though massive MIMO and D2D communication have been
widely studied, only a few papers investigated the interplay
between massive MIMO and D2D communication [21], [22].
In [22], the SE of cellular and D2D links was investigated
under both perfect and imperfect CSI, but the overhead for
acquiring CSI was not considered. In massive MIMO systems,
orthogonal pilots are transmitted by cellular users (CUs) to
obtain CSI. When D2D communication is introduced and
orthogonal pilots are used at each D2D transmitter (D2D-Tx)
for channel estimation, the pilot overhead is large which will
significantly affect the system performance. Furthermore, as a
multi-user transmission strategy, massive MIMO is designed
to support multiple users transmitting on the same timefrequency block. Though D2D-to-cellular interference can be
greatly reduced by a large antenna array at BS, cellular-to-D2D
interference still persists and may be worse than a conventional
single-input single-output (SISO) D2D underlaid system.
In order to shorten pilot overhead, an effective strategy
is allowing orthogonal pilots to be reused among different
users. Most of the existing works with pilot reuse (PR) mainly
focus on multiple-cell scenarios, i.e., mobile users in the same
cell use orthogonal pilots, and users in different cells reuse
the same set of pilots [23]–[27]. To the best of the authors’
knowledge, only a few works have considered the strategy
of PR within a cell [28]–[31]. In [28], the authors analyzed
the feasibility of PR over spatially correlated massive MIMO
channels with constrained channel angular spreads. Authors of
[29] and [30] allowed D2D-Txs to reuse the pilots of CUs and
proposed an interference-aided minimum-mean-square-error
2
(MMSE) detector to suppress the D2D-to-cellular interference.
[31] also studied a D2D underlaid massive MIMO system with
PR, but the performance of CUs was left out of consideration
for simplicity. In contrast to these existing works, our work
analyzes the achievable rate of both cellular and D2D links
under PR, and proposes pilot scheduling as well as power
control algorithms to optimize the system performance. The
main contributions of this paper are summarized as follows:
• We assume that CUs use orthogonal pilots while all D2DTxs reuse another set of pilots for channel estimation. The
motivation of PR stems from that D2D pairs usually locate
dispersively and use low power for short-distance transmission. Hence, letting several D2D pairs which are far away
from each other use the same pilot for channel estimation
would cause endurable pilot contamination. Under PR, we
first derive the expression of MMSE estimate of all channels.
With the obtained imperfect CSI, all receivers apply the partial
zero forcing (PZF) receive filters studied in [32] for signal
detection. Then, we derive the effective signal-to-interferenceplus-noise ratio (SINR) and a lower bound on the ergodic
achievable rate of each user.
• Different from the estimation of cellular channel vectors
which is only affected by noise, the channel estimation of D2D
links experiences effect from both noise and pilot contamination due to PR. To mitigate pilot contamination, we develop a
pilot scheduling and pilot power control algorithm under the
criterion of minimizing the sum mean-square-error (MSE) of
channel estimation of D2D links. We first show that with an
appropriate number of orthogonal pilots available for DUs and
a well designed pilot scheduling scheme, each D2D-Tx should
transmit its pilot using the maximum power. Then, we develop
a heuristic pilot scheduling scheme to allocate pilots to DUs,
and show that the sum MSE of channel estimation of D2D
links can be decreased significantly.
• We study the sum SE maximization for D2D links while
guaranteeing the quality of service (QoS) of CUs. Efficient
power control algorithms often play an important role in reducing cochannel interference and reaping the potential benefits of
D2D communication. However, these algorithms are usually
carried out based on the knowledge of instantaneous CSI of
all links [14]–[17]. Apart from the computational complexity,
such algorithms require BS to gather instantaneous CSI of all
links, which is difficult for implementation. Therefore, in this
paper, we consider performing the power control algorithm
periodically at a coarser frame level granularity based on
large-scale fading coefficients which vary slowly. Simulation
results show that the proposed algorithm converges rapidly and
obtains a much higher sum SE of D2D links compared to the
typical orthogonal training scheme.
Note that since PR among D2D pairs in a D2D underlaid
massive MIMO system has been less well researched, we
consider a simplified single-input multiple-output (SIMO)
transmission for D2D communication as [22], and mainly
focus on analyzing the effect of PR on the system performance.
As for MIMO transmission, similar results can be obtained
by simply modifying the analysis and optimization of this
manuscript. On the other hand, our analysis in this paper
focuses on a single-cell scenario for the sake of clarity. Re-
garding the multi-cell massive MIMO system, there has been
a lot of literature working on mitigating pilot contamination
[33]–[35]. As a result, for a multi-cell D2D underlaid massive
MIMO system, where PR among D2D pairs persists, we can
first use the algorithms developed in [33]–[35] to allocate
pilots to CUs if CSI can be exchanged among cells, and then
straightforwardly extend the proposed algorithms to improve
system performance.
In this paper, we follow the common notations. N, R and
C denote the set of natural numbers, the real space and the
complex space, respectively. The boldface upper (lower) case
letters are used to denote matrices (vectors). IM stands for
the M × M dimensional identity matrix and 0 denotes the
all-zero vector or matrix. “ \ ” represents the set subtraction
operation. Superscript (·)H denotes the conjugated-transpose
operation and E{·} denotes the expectation operation. We use
kak2 to denote the Euclidean norm of a. a 0(a ≻ 0)
means that each element in a is positive (nonnegative).
The rest of this paper is organized as follows. In Section
II, a D2D underlaid massive MIMO system is introduced. In
Section III, we present the MMSE estimate of all channels
under PR and show how PR affects the channel estimation.
The achievable rate of both cellular and D2D links is analyzed
in Section IV. In Section V, we aim to minimize the sum MSE
of channel estimation of D2D links and maximize the sum SE
of all D2D links. Finally, numerical verifications are presented
in Section VI before concluding remarks in Section VII.
II. S YSTEM M ODEL
Consider the uplink of a D2D underlaid massive MIMO
system with one BS, N CUs and K D2D pairs. The set
of CUs and D2D pairs are denoted by N = {1, · · · , N }1
and K = {1, · · · , K}, respectively. The BS is equipped with
B antennas and each CU has one transmit antenna. As for
the D2D communication, we assume SIMO transmission, i.e.,
each D2D-Tx is equipped with one antenna and each D2D
receiver (D2D-Rx) is equipped with M antennas as in [22].
In this system, all transmitters use the same time-frequency
resource block to transmit signals, leading to cochannel interference. The B × 1 dimensional received data vector at BS
is
y (c) =
N q
X
n=1
(c)
(c)
qs,n un h(c)
n xn +
K q
X
(d) (d) (d)
ps,i ui hi xi + z, (1)
i=1
(c)
where qs,n is the data transmit power of CU n, and xn is the
(c)
zero-mean unit-variance data symbol of CU n. un is the realvalued large-scale fading coefficient from CU n to BS and is
(c)
assumed to be known as a priori. hn ∼ CN (0, IB ) denotes
(d)
the fast fading vector channel from CU n to BS. ps,i , xi ,
(d)
(d)
ui and hi are similarly defined for D2D-Tx i. z ∈ CB is
the complex Gaussian noise at BS with covariance N0 IB .
1 Here we misuse the notation N while avoiding possible ambiguity with
the N in the complex normal distribution sign CN .
3
Analogously, the M × 1 dimensional received data vector
at D2D-Rx k is given by
(d)
yk =
N q
K q
X
X
(d) (d) (d)
(c) (c)
ps,i vik gik xi +
qs,n vnk gnk x(c)
n + nk , (2)
n=1
i=1
(d)
vik
(d)
gik
where
and
∼ CN (0, IM ) denote the real-valued
large-scale fading coefficient and the fast fading vector channel
(c)
(c)
from D2D-Tx i to D2D-Rx k, respectively. vnk and gnk
are similarly defined for the link from CU n to D2D-Rx k.
nk ∈ CM is the complex Gaussian noise at D2D-Rx k with
covariance N0 IM .
(d)
We then analogously derive the MMSE estimate of hk as
follows
q
(d)
pp,k uk
(d)
ĥk = P
Y (c) λk , ∀k ∈ K,
(7)
(d)
pp,i ui + N0
i∈Xk
where Xk is the set of all D2D pairs using the same pilot as
(d)
(d)
(d)
(d)
(d)
D2D pair k. Denote hk = ĥk + h̃k . Then, ĥk and h̃k
are statistically independent satisfying
(d)
A. Channel Estimation at BS
Similar as the uplink data transmission in (1), the B × τ
dimensional received signal matrix of pilot transmission at BS
is
K q
N q
X
X
(c) (c) H
(d) (d)
(c)
qp,n un hn ωn +
pp,i ui hi λH
Y =
i +Z, (3)
i=1
where qp,n and pp,i denote the pilot transmit powers of CU n
and D2D-Tx i, respectively. λi ∈ {ωN +1 , · · · , ωτ } is the pilot
allocated to D2D pair i. Z is the noise matrix which consists
of independently and identically distributed (i.i.d.) Gaussian
elements with zero mean and variance N0 . Then, the MMSE
(c)
estimate of hn is given by [36]
q
(c)
qp,n un
(c)
Y (c) ωn , ∀n ∈ N .
(4)
ĥn =
(c)
qp,n un + N0
(c)
Given the channel estimate vector ĥn , we can express the
(c)
(c)
(c)
(c)
true channel vector hn as hn = ĥn + h̃n , where the error
(c)
vector h̃n represents the CSI uncertainty. Due to the property
(c)
of MMSE estimation [36], ĥn is statistically independent of
(c)
h̃n , and they follow
(c)
(c)
(c)
ĥ(c)
n ∼ CN (0, δn IB ), h̃n ∼ CN (0, εn IB ),
(5)
where
(c)
δn(c)
=
qp,n un
(c)
qp,n un + N0
, ε(c)
n
=1−
δn(c) .
(6)
(d)
(d)
pp,k uk
(d)
Orthogonal pilots are usually adopted to obtain the CSI of
all links. In a D2D underlaid system, to reduce pilot overhead,
we assume that CUs use orthogonal pilots while all D2DTxs reuse another set of pilots for channel estimation. Denote
Ω = (ω1 , · · · , ωN , ωN +1 , · · · , ωτ ) ∈ Cτ ×τ as the pilot
matrix with orthogonal column vectors (i.e., ΩH Ω = Iτ ). τ
(N < τ ≤ N + K) is the length of the pilots and is also
the number of pilots available for channel estimation (this is
the smallest amount of pilots that are required). Then, without
loss of generality, we assume that pilot ωn (1 ≤ n ≤ N ) is
allocated to CU n and the remaining pilots {ωN +1 , · · · , ωτ }
are reused among all D2D pairs.
(d)
(8)
where
δk = P
III. C HANNEL E STIMATION
n=1
(d)
ĥk ∼ CN (0, δk IB ), h̃k ∼ CN (0, εk IB ),
(d)
pp,i ui
i∈Xk
(d)
+ N0
(d)
, ε k = 1 − δk .
(9)
B. Channel Estimation at D2D-Rxs
The M ×τ dimensional received pilot signal matrix at D2DRx k can be written as
N q
K q
X
X
(d)
(c) (c)
(d) (d)
Yk =
qp,n vnk gnk ωnH +
pp,i vik gik λH
i +Nk ,
n=1
i=1
(10)
where Nk is the noise matrix consisting of i.i.d. Gaussian
elements with zero mean and variance N0 . Then, the MMSE
(d)
estimate of gik is given by
q
(d)
pp,i vik
(d)
(d)
Yk λi , ∀i, k ∈ K,
(11)
ĝik = P
(d)
pp,j vjk + N0
j∈Xk
(d)
(d)
(d)
(d)
Denote gik = ĝik + g̃ik . Then, as mentioned above, ĝik is
(d)
statistically independent of g̃ik , and the distributions of them
are given by
(d)
(d)
(d)
(d)
ĝik ∼ CN (0, µik IM ), g̃ik ∼ CN (0, ǫik IM ),
(12)
where
(d)
(d)
µik = P
j∈Xk
pp,i vik
(d)
pp,j vjk
(d)
+ N0
(d)
, ǫik = 1 − µik .
(c)
Similarly, we have the MMSE estimate of gnk as follows
q
(c)
qp,n vnk
(c)
(d)
ĝnk =
Yk ωn , ∀n ∈ N , k ∈ K.
(13)
(c)
qp,n vnk + N0
(c)
(c)
Denote the channel estimation error vector by g̃nk , then, ĝnk
(c)
and g̃nk are statistically independent and satisfy
(c)
(c)
(c)
(c)
ĝnk ∼ CN (0, µnk IM ), g̃nk ∼ CN (0, ǫnk IM ),
where
(c)
µnk =
(c)
qp,n vnk
(c)
qp,n vnk
+ N0
(c)
(c)
, ǫnk = 1 − µnk .
(14)
(15)
From (4) and (13), it can be observed that the estimation
(c)
(c)
of hn and gnk is only affected by pilot noise. The pilot
interference from other CUs and DUs disappear completely
4
due to the orthogonality of the pilots. As for the estimation of
(d)
(d)
hk and gik , it is clear from (7) and (11) that apart from the
effect of pilot noise, it is also affected by pilot contamination
due to PR among D2D pairs.
IV. ACHIEVABLE R ATE A NALYSIS
In this section, we analyze the achievable rate of both
(c)
cellular and D2D links under PR. Let βn denote the unit
norm receive filter used by BS for detecting the signal of CU
(d)
n, and βk denote the unit norm receive filter adopted by
D2D-Rx k for detecting the signal from D2D-Tx k. Since the
receive filter can be used either to boost the desired signal
power or to eliminate interference signal, the SINR of each
link critically depends on the receive filter that is used. In this
paper, we adopt PZF receivers, which use part of degrees of
freedom for signal enhancement and the remaining degrees of
freedom for interference suppression, for signal detection at
both BS and D2D-Rxs.
We assume that BS uses bc and bd degrees of freedom to
cancel the interference from the nearest bc cellular interferers
and the nearest bd D2D interferers using different orthogonal
pilots. From (7), we can obtain the following relationship
v
u
u pp,k u(d) (d)
(d)
k
(16)
ĥ , ∀k ∈ K, i ∈ Xk \ k,
ĥk = t
(d) i
pp,i ui
which indicates that the estimation of channels from two
different D2D-Txs using the same pilot to BS are in the same
direction. As a result, the interference from D2D interferers
applying the same pilot can be eliminated simultaneously by
using one degree of freedom. Since τ − N orthogonal pilots
are reused by K D2D pairs, we divide all D2D pairs into
τ − N sets with D2D pairs in each set using the same pilot for
channel estimation. Then, we know that BS is able to cancel
the interference from bd sets of D2D interferers. The feasible
set of (bc , bd ) is given by
{(bc , bd ) ∈ N×N | bc ≤ N −1, bd ≤ τ −N, bc +bd ≤ B −1} .
(17)
(c)
The PZF filter βn can be obtained by normalizing the
(c)
projection of channel estimation ĥn on the nullspace of
channel estimation vectors of cancelled interferers (refer to
(c)
(45) in Appendix A). For the sake of convenience, let Cn
(c)
denote the set of uncancelled CUs when detecting xn , and
D(c) denote the set of uncancelled DUs when detecting cellular
signals.
Similarly, each D2D-Rx uses mc and md degrees of freedom to cancel the interference from the nearest mc cellular
interferers and the nearest md D2D interferers using different
orthogonal pilots. (mc , md ) should be in the following set
Compared with MMSE receivers which optimally balance
signal enhancement and interference suppression, PZF receivers are suboptimal. However, we adopt PZF receivers in
this paper due to the following advantages. First, PZF receivers
take both signal boosting and interference cancellation into
account, which is similar as MMSE receivers in concept. It has
been shown that the performance of PZF receivers in terms of
system throughput can approach that of MMSE receivers and
is much better than that of maximum ratio combining (MRC)
or fully zero forcing (ZF) receivers [32]. Second, the simple
structure of PZF receivers makes the analysis of the system
more tractable, and allows us to evaluate the performance of
the D2D underlaid massive MIMO system in a more explicit
way. In addition, PZF receivers can be simplified as MRC
receivers by letting (bc , bd ) = (0, 0) or (mc , md ) = (0, 0),
and can also be reduced to fully ZF receivers by letting
(bc , bd ) = (N −1, τ −N ) or (mc , md ) = (N, τ −N −1), which
can make the analysis of this paper more general. In order to
cancel the nearest interferers and obtain PZF receivers, BS
and D2D-Rxs have to know the positions of all transmitters.
To relax this requirement and make it more practical, we can
obtain PZF receivers by cancelling the interferers with the
largest large-scale fading coefficients.
A. A lower bound on achievable rate of cellular links
Since BS only has the information of estimated channel
vectors (4) and (7), which are treated as the true CSI, using
(c)
(c)
PZF receiver βn for detecting xn , we can write the postprocessing received signal associated with CU n at BS as
H
rn(c) = βn(c)
y (c)
q
H
(c)
(c)
= qs,n un βn(c) ĥ(c)
n xn
H
X q
Xq
(c)
(d) (d) (d)
(c)
qs,a ua ĥ(c)
ps,i ui ĥi xi
+ βn(c)
x
+
a
a
(c)
i∈D (c)
a∈Cn \n
+
N q
X
(c)
(c)
qs,a ua h̃(c)
a xa
+
a=1
K q
X
(d) (d) (d)
ps,i ui h̃i xi
!
+ z , (19)
i=1
where only the first term of the second equality is the desired
information, while the other terms represent the cochannel
interference, channel estimation error and noise, respectively.
Thus, the effective SINR of cellular link n can be expressed
as
(c)
{(mc , md ) ∈ N×N | mc ≤ N, md ≤ τ −N −1, mc +md ≤ M−1}.
(18)
(d)
The PZF filter βk can be obtained by first projecting chan(d)
nel estimation ĝkk onto the nullspace of channel estimation
vectors of cancelled interferers, and then normalizing the
(d)
(d)
projection. Let Ck and Dk respectively denote the sets of
(d)
uncancelled CU and DUs when detecting xk .
ηn(c) =
Sn
(c→c)
In
(c)
(c)
where Sn = qs,n un
(d→c)
+ In
(c→c)
signal from CU n, In
(c)
βn
H
(c)
+ α(c) βn
(c)
(20)
2
2
ĥn
(d→c)
and In
2,
represents the desired
respectively denote the
5
cochannel interference from all uncancelled cellular and D2D
interferers, and they are given by
2
H
X
ĥa(c) ,
In(c→c) =
qs,a ua(c) βn(c)
(c)
a∈Cn \n
X
In(d→c) =
(d)
ps,i ui
i∈D (c)
H
(d)
ĥi
βn(c)
2
.
(21)
α(c) characterizes the effect of both channel estimation error
and noise experienced by CU n, and can be formulated as
α(c) =
N
X
(c)
qs,a u(c)
a εa +
a=1
K
X
(d) (d)
ps,i ui εi + N0 .
(22)
i=1
In [9] and [22], the asymptotic uplink rate of cellular links in
a massive MIMO (or D2D underlaid massive MIMO) system
has been studied. As for the system considered in this paper,
we can also obtain a similar result about the asymptotic
uplink rate of CUs as shown in the following corollary. Since
corollary 1 can be analogously verified as that in [22], we omit
the proof process for brevity.
Corollary 1: With fixed transmit powers at all transmitters,
using linear filters for signal detection at BS, the asymptotic
uplink rate of each cellular link grows unboundedly as B goes
to infinity.
In fact, the number of antennas at BS is usually finite due
to multiple practical constraints. Hence, in the following of
this paper, we consider a more practical scenario where BS is
equipped with large but finite numbers of antennas. Consider
the block fading model, where all channels remain unchanged
over the coherence interval with length T . Then, based on
(5), (8) and (20), we can derive a lower bound on the ergodic
achievable rate of cellular links as shown in the following
theorem.
Theorem 1: Given the SINR formula in (20), the ergodic
achievable rate of cellular link n is lower bounded by
τ
Rn(c,lb) = 1 −
(23)
log2 1 + ηn(c,lb) , ∀n ∈ N ,
T
where
(c)
qs,n φn
ηn(c,lb) = N
,
(24)
P
(c)
(c)
qs,a ϕan + σ
a=1
and
(c)
φ(c)
− bc − bd − 1)u(c)
n = (B
n δn ,
(
(c)
(c)
ua ,
a ∈ Cn \ n
ϕ(c)
an =
(c) (c)
(c) ,
ua εa , a = n or a ∈ N \ Cn
σ (c) =
K
X
(d)
ϕi
=
(d)
To detect xk , the received signal at D2D-Rx k after using
(d)
PZF receiver βk can be written as
H
(d)
(d)
(d)
yk
rk = βk
q
H
(d)
(d)
(d) (d)
= ps,k vkk βk
ĝkk xk
q
H
X q
X
(d) (d) (d)
(c) (c)
(d)
ps,i vik ĝik xi +
qs,n vnk ĝnk x(c)
+ βk
n
(d)
(d)
i∈Dk \k
n∈Ck
!
N q
K q
X
X
(d) (d) (d)
(c) (c) (c)
ps,i vik g̃ik xi +
qs,n vnk g̃nk xn + nk . (26)
+
n=1
i=1
where only the first term of the second equality is the desired
signal, while the other terms respectively denote the cochannel
interference, channel estimation error and noise. Then, the
effective SINR of D2D link k is
(d)
Sk
(d)
ηk =
(d→d)
Ik
(d)
where Sk
(d)
= ps,k vkk
(c→d)
+ Ik
(d)
βk
H
(d→d)
Ik
,
(d)
+ αk
(d)
2,
(d)
βk
(27)
2
2
ĝkk
denotes the desired
(c→d)
Ik
signal from D2D-Rx k.
respectively denote
(d)
D2D and cellular cochannel interference, αk characterizes the
effect of both channel estimation error and noise experienced
by D2D-Rx k, and they are given by
2
H
X
(d)
(d→d)
(d)
(d)
Ik
=
ps,i vik βk
ĝik ,
(d)
(c→d)
Ik
=
X
(c)
qs,n vnk
(d)
n∈Ck
(d)
ps,i ϕi + N0 ,
(d)
αk =
K
X
i=1
(d)
i ∈ D(c)
ui ,
.
(d) (d)
ui εi , i ∈ K \ D(c)
B. A lower bound on achievable rate of D2D links
i∈Dk \k
i=1
(
(c)
affected by channel estimation error of cellular link n, i.e., εn ,
and channel estimation errors of bc cancelled cellular links,
(c)
(c)
i.e., εa , a ∈ N \ Cn . Since CUs use orthogonal pilots for
(c)
channel estimation, the value of τ has no effect on εn and
(c)
(c)
(c,lb)
εa , a ∈ N \Cn . Hence, for fixed pilot transmit power, Rn
decreases monotonically w.r.t. τ . In contrast, when bd > 0,
(c)
(c)
(c)
(c,lb)
except the effect of εn and εa , a ∈ N \ Cn , ηn
is
also influenced by the estimation errors of channels from bd
(d)
cancelled D2D-Txs to BS, i.e., εi , i ∈ K \ D(c) . Due to PR,
(d)
increasing τ results in smaller εi , i ∈ K \ D(c) , and thereby
(c,lb)
helps increase ηn . Therefore, it would be hard to determine
(c,lb)
the monotonicity of Rn
w.r.t. τ .
(25)
Proof: See Appendix A.
Remark 1: When considering the effect of pilot length τ
(c,lb)
(c,lb)
is
on Rn , from (24), we can find that when bd = 0, ηn
(d) (d)
ps,i vik ǫik +
H
(d)
(c)
βk
ĝnk
N
X
2
(c) (c)
,
qs,n vnk ǫnk + N0 .
(28)
n=1
Similarly as the cellular uplink case, we can also derive a
lower bound on the ergodic achievable rate of D2D links.
Theorem 2: Given the SINR formula in (27), the ergodic
achievable rate of D2D link k is lower bounded by
τ
(d,lb)
(d,lb)
Rk
= 1−
log2 1 + ηk
, ∀k ∈ K,
(29)
T
6
where
(d,lb)
ηk
(d)
=
ps,k φk
K
P
i=1
and
(d)
φk
(d)
ψik
(d)
σk
(d)
ps,i ψik
,
+
(30)
(d)
σk
(d) (d)
= (M − mc − md − 1)vkk µkk ,
(d)
(d)
vik , i ∈ Dk \ Xk
(d) (d)
(d)
= vik
,
ǫik , i = k or K \ Dk
(d) (d)
(d) (d)
(M −mc −md −1)vik µik +vik ǫik , i ∈ Xk \ k
X
X
(c)
(c) (c)
=
qs,n vnk +
qs,n vnk ǫnk + N0 .
(31)
(d)
Since orthogonal pilots {ωN +1 , · · · , ωτ } are reused among
K D2D pairs, denote the PR pattern by O ∈ R(τ −N )×K
with each element in O being binary-valued. If D2D pair k is
assigned pilot ωt ∈ {ωN +1 , · · · , ωτ }, we have ot−N,k = 1,
otherwise, we have ot−N,k = 0. Denote the pilot transmit
T
power vector of DUs by pp , [pp,1 , · · · , pp,K ] . Then, aiming
at minimizing (32), we arrive at the following problem
min
O,pp
s.t.
(d)
n∈N \Ck
n∈Ck
Proof: See Appendix B.
Remark 2: From (30), it can be found that for any (mc , md )
(d,lb)
in feasible set (18), ηk
is an implicit function of τ due to
PR. Increasing τ results in more accurate channel estimations
(d,lb)
of D2D links, and thereby helps increase ηk . However,
as τ increases, the number of symbols available for data
transmission becomes smaller. In Section VI, we show by
(d,lb)
simulation results that Rk
first increases and then decreases
w.r.t. τ .
In the following, we focus on pilot scheduling and power
control design based on (23) and (29). Since large-scale fading
coefficients vary slowly, the proposed pilot scheduling and
power control algorithms can be performed periodically at a
coarser frame level granularity, which will greatly decrease the
computational complexity of BS. As a result, Theorem 1 and
Theorem 2 are helpful for the following analysis.
V. P ILOT S CHEDULING
AND
P OWER C ONTROL
Up to now, we have investigated the cannel estimation as
well as achievable rate of both cellular and D2D links in a
D2D underlaid massive MIMO system with PR. Based on
the above analysis, we focus on two problems in this section.
The first problem aims to minimize the sum MSE of channel
estimation of D2D links, and the second problem aims to
maximize the sum rate of all D2D links while guaranteeing
the QoS requirements of CUs.
A. Pilot Power Control and Pilot Scheduling
As mentioned in Section III, the channel estimation of
cellular links is only affected by additive noise. Therefore, we
assume that each CU transmits pilot signal with the maximum
power. As for D2D links, apart from the effect of additive
noise, channel estimation is also influenced by pilot contamination. Due to the location dispersion of D2D pairs and shortdistance D2D transmission, it should be preferred that the pilot
contamination can be greatly reduced by using an effective
pilot scheduling and pilot power control algorithm. According
to (12) and (13), the sum MSE of channel estimation of D2D
links can be written as
X
K
K
X
2
(d)
(d)
E g̃kk
M ǫkk .
(32)
=
k=1
2
k=1
K
X
(d)
M ǫkk
(33a)
k=1
0 ≤ pp,k ≤ τ Pk , ∀k ∈ K,
τ
X
ot−N,k = 1, ∀k ∈ K,
(33b)
(33c)
t=N +1
where Pk is the maximum data transmit power of D2D-Tx k.
Constraints (33c) indicate that each D2D pair can be allocated
(d)
only one pilot. Note that for simplicity, ǫkk is formulated
as a function of O in an implicit way in (13). We can also
equivalently rewrite it in an explicit way as follows
(d)
ǫkk =
τ
X
ot−N,k 1 − K
P
t=N +1
j=1
(d)
pp,k vkk
(d)
, ∀k ∈ K.
ot−N,j pp,j vjk +N0
(34)
To solve problem (33), we first give the optimal condition
for pp in the following theorem.
Theorem 3: There always exists τ ≤ N + K such that when
the optimal pilot scheduling matrix O opt has been determined,
opt
the optimal popt
p satisfies pp,k = τ Pk , ∀k ∈ K.
Proof: See Appendix C.
The above theorem
indicates that with a proper τ and the optimal O opt , constraints
(33b) are always active. We can explain Theorem 3 in an
intuitive way as follows. When the number of orthogonal pilots
available for DUs is appropriate (i.e., with a relatively low PR
ratio) and these pilots are allocated to D2D pairs by using
the optimal pilot scheduling scheme (a special case is τ =
N + K and all D2D pairs use different orthogonal pilots for
channel estimation), ignorable pilot contamination would be
caused due to the dispersive positions of D2D pairs. Hence, all
D2D-Txs should transmit their pilot signals in the maximum
power to increase the estimation accuracy. In contrast, with
a small τ (i.e., with a relatively high PR ratio), even using
the optimal pilot scheduling scheme, pilot contamination may
still influence the estimation accuracy greatly and solving (59)
may yield popt
p,k = 0. In this case, we need to enlarge the set
of pilots for DUs to decrease PR ratio.
Based on Theorem 3, in the following, we assume that
D2D-Txs always transmit pilots in the maximum power. Then,
problem (33) becomes
min
O
s.t.
K
X
(d)
M ǫkk
k=1
τ
X
t=N +1
ot−N,k = 1, ∀k ∈ K,
(35a)
(35b)
which is a mixed integer programming problem. The optimal
O can be obtained through exhaustive search (ES). Recalling
7
(13), the number of scalar multiplication required to compute
the objective function in (33) is O(K). Thus, obtaining the optimal O through ES involves a complexity of O(K(τ −N )K ).
Due to the exponential complexity, it will be impractical to
run ES when the number of D2D pairs is large. Therefore, we
propose a low complexity pilot scheduling algorithm.
To mitigate pilot contamination in a multi-cell massive
MIMO system, [33] proposed the GCPA scheme, in which
a metric is defined to indicate the interference strength among
CUs and a binary matrix is used to describe the connections
of CUs. However, to obtain the binary matrix, a suboptimal
threshold needs to be found by applying iterative grid search.
In this paper, we define a continuous-valued metric χik to
evaluate the potential interference strength between D2D pair
i and k
∀k ∈ K, i = k
0,
(d) 2 (d) 2 !
χik =
.
v
vik
+ ki
, ∀k ∈ K, i ∈ K \ k
(d)
(d)
ln 1+ vkk
vii
(36)
Denote Λ as the set of D2D pairs which have been allocated
pilots, then, we summarize the pilot scheduling algorithm in
Algorithm 1.
Denote the data transmit power vectors of CUs and DUs
T
T
by qs , [qs,1 , · · · , qs,N ] and ps , [ps,1 , · · · , ps,K ] , respectively. Then, we arrive at the following problem
max
qs ,ps
k∈K\Λ i∈K
′
2: t = arg
min
P
t∈{N +1,··· ,τ } {i|λi =ωt }
χik′ ,
′
3: λk′ = ωt′ , ot′ −N,k′ = 1, Λ = Λ ∪ k .
end for
The basic idea of the PSA algorithm is that the D2D pair
experiencing larger pilot contamination possesses a higher
priority for pilot allocation. The main steps in each iteration
′
can be explained as follows. First, D2D pair k ∈ K \ Λ
experiencing the largest potential interference from other DUs
is selected. Then, the pilot causing the least interference to
′
′
k is chosen. Finally, pilot ωt′ is assigned to D2D pair k ,
′
i.e., ot′ −N,k′ = 1, and Λ is updated by Λ = Λ ∪ k . The
algorithm will be carried out for K times until all D2D pairs
are allocated with pilots.
B. Data Power Control
In this subsection, we aim to maximize the sum rate of
all DUs while guaranteeing the QoS
n requirements
o
n of oCUs.
(c)
(d)
Since the exact expressions of E Rn
and E Rk
are
unapproachable, we use their lower bounds (23) and (29) for
replacement. Simulation results show that the gap between
the ergodic achievable rate and its lower bound is marginal,
verifying the feasibility of the approximation.
(d,lb)
Rk
k=1
ηn(c,lb)
s.t.
(37a)
≥ γn , ∀n ∈ N ,
(37b)
0 ≤ qs,n ≤ Qn , ∀n ∈ N ,
0 ≤ ps,k ≤ Pk , ∀k ∈ K,
(37c)
(37d)
where γn and Qn respectively denote the target SINR and
the maximum data transmit power of CU n. From (24) and
(29), we can see that qs and ps are coupled in the expressions
(c,lb)
(d,lb)
of ηn
and Rk . Moreover, the fractional structure of
SINR expressions and the log(·) operation make (37) nonconvex. Therefore, it is difficult to obtain the optimal solution
of (37). In the following, we divide the optimization into two
consecutive parts. In the first part, we optimize qs with ps
fixed, and vice versa for the other part.
1) Data Power Control for Cellular Links: For given ps ,
problem (37) can be rewritten as
max
qs
Algorithm 1 Pilot Scheduling Algorithm (PSA)
Initialization:
Λ = ∅, O = 0. Calculate χik , ∀i, k ∈ K.
Pilot Allocation:
for j = 1, · · · , K do
P
′
χik ,
1: k = arg max
K
X
K
X
(d,lb)
Rk
k=1
ηn(c,lb)
s.t.
(38a)
≥ γn , ∀n ∈ N ,
(38b)
0 ≤ qs,n ≤ Qn , ∀n ∈ N .
(38c)
Based on (24), we can write SINR constraints (38b) in a vector
form as
qs F qs + θ , ∆(qs ),
(39)
where
F=
θ=
"
...
γ1 ϕ N 1
..
.
..
..
.
(c)
φ1
(c)
φN
γ1 σ (c)
(c)
φ1
(c)
φ1
.
,
(c)
(c)
γN ϕ1N
(c)
(c)
γ1 ϕ11
...
,··· ,
γN ϕ N N
(c)
φN
γN σ (c)
(c)
φN
#T
,
T
∆(qs ) = [∆1 (qs ), · · · , ∆N (qs )] .
(40)
In (40), θ consists of scaled cochannel interference from D2D
interferers and additive noise, and ∆(qs ) can be seen as an
interference function [37].
Remark 3: If problem (38) is feasible, the SINR constraint
opt
of each CU would hold with equality for the optimal qs .
opt
Equivalently, for the vector form (39), we have qs
=
F qsopt + θ. This can be readily verified by reductio. Assume
(c,lb)
opt
that ηn
> γn for qs , then, we can further increase the
opt
objective function by decreasing qs,n
slightly.
According to [37], if the spectral radius of F is less than 1,
opt
−1
the optimal power vector has the form qs = (IN − F ) θ .
opt
To obtain qs , matrix inversion and spectral radius calculation
are required, resulting in high complexity. As a result, we
obtain qsopt by using the following low complexity iterative
scheme
qs (l + 1) = Λ(qs (l)),
(41)
8
where l represents the time instant, and Λ(qs (l)) =
{min {Q1 , ∆1 (qs (l))} , · · · , min {QN , ∆N (qs (l))}}. We denote this data power control algorithm for cellular links by
DPCC. By proving that Λ(qs ) is standard [38], we can readily
verify that the DPCC algorithm converges to the optimal
solution for any initial power vector qs 0. The detailed
proof is given in Appendix D.
2) Data Power Control for D2D Links: For fixed qs , we
arrive at the following problem. For notational simplicity, the
constant coefficient 1 − Tτ in (29) is omitted.
K
X
max
ps
k=1
K
X
s.t.
k=1
(d)
ps,k φk
K
P
i=1
(d)
ps,i ψik
+
(d)
σk
ps,k ϕk ≤ ζ,
(42a)
(42b)
(42c)
where ζ = min {ζ1 , · · · , ζN }, and ζn =
N
P
(c)
qs,a ϕan − N0 .
(c)
1
γn qs,n φn
−
a=1
It can be directly seen that problem (42) is non-convex due
(d,lb)
to the fractional expression of ηk
and the log(·) operation in
(42a). In order to solve (42), we transform it into the equivalent
form in (60) which admits suboptimal solutions using the wellknown WMMSE approach in [39]. The details are provided in
Appendix E. We summarize the data power control algorithm
for D2D links (labeled as ‘DPCD’) in Algorithm 2.
Algorithm 2 Data Power Control Algorithm for D2D Links
(DPCD)
√
1: Initialize fk = Pk , wk = 1, ∀k ∈ K, and accuracy ρ1 .
2: repeat
3:
wk′ = wk , ∀k ∈ K,
4:
νk =
5:
−1
q
(d)
wk = 1 − νk fk φk
, ∀k ∈ K,
q
(d)
fk φk
, ∀k
K
P
(d)
(d)
(d)
fk2 φk +
fi2 ψik +σk
∈ K,
i=1
7:
Since we propose to solve the original problem (37) using
the JDPC algorithm, which operates in an iterative mechanism, it is necessary to characterize its convergence. In each
iteration, the optimal qs is first obtained by using the DPCC
algorithm with fixed ps . Then, for determined qs , the DPCD
algorithm outputs a suboptimal ps . As a result, the sum SE
of D2D links increases in each iteration. Noting the fact that
the sum SE of D2D links is always upper bounded, we can
conclude that the JDPC algorithm converges to a suboptimal
solution of problem (37).
(d)
log2
1 +
0 ≤ ps,k ≤ Pk , ∀k ∈ K,
6:
C. Convergence Analysis for the JDPC Algorithm
Obtain λ by using the bisection method,
q
√
(d)
wk νk φk
Pk ,
, ∀k ∈ K,
fk = min
K
P
(d)
(d)
(d)
wk ν 2 φ +
wi νi2 ψ +λϕ
k
k
ki
D. Implementation and Complexity Analysis
Based on the above analysis, within a coherence interval,
each transmitter first transmits its pilot with the maximum
power for channel estimation, and then transmits its signal
using the power obtained by solving (37). To successfully
implement the proposed PSA and JDPC algorithms, BS
requires the information of large-scale fading coefficients
(c)
(d) (c) (d)
(c)
(d)
un , uk , vnk , vik , ∀n ∈ N , ∀i, k ∈ K. un , uk , ∀n ∈ N
(c) (d)
can be directly estimated by BS, whereas vnk , vik , ∀n ∈
N , ∀i, k ∈ K need to be estimated at all D2D-Rxs and fed
back to BS. After collecting these information, BS runs the
pilot scheduling and power control algorithms, and then sends
the results to all users. Since large-scale fading coefficients
vary slowly, the proposed algorithms can be carried out at a
coarser frame level granularity.
In the following, we analyze the computational complexity
of the PSA and JDPC algorithms. Since the PSA algorithm
has a complexity of O(K 2 ) per iteration and it is carried out
K times, the total complexity is O(K 3 ). As for the JDPC
algorithm, assume that it is carried out L1 times, and in
each loop L2 and L3 iterations are required for the DPCC
and DPCD algorithms to converge. The major complexity of
the DPCC algorithm lies in computing F qs , which involves
a complexity of O(N 2 ). Hence, the total complexity of the
DPCC algorithm is O(L2 K 2 ). Since the complexity of obtaining the Lagrange multipliers using the bisection method for
accuracy ρ is O(log2 (1/ρ)), the overall complexity of solving
problem (42) using the DPCD algorithm is O(L3 log2 (1/ρ)).
Therefore, the JDPC algorithm has a total complexity of
O(L1 (L2 K 2 + L3 log2 (1/ρ))). Simulation results show that
L1 , L2 and L3 are small, so the proposed algorithms involve
low complexity for efficient solutions.
k
i=1
8:
until
K
P
|ln wk − ln wk′ | ≤ ρ1 ,
k=1
9: ps,k = fk2 , ∀k
∈ K.
Based on the above analysis, we can alternatively optimize
qs and ps by iteratively applying the proposed DPCC and
DPCD algorithms, and a suboptimal solution of problem (37)
can be obtained. Let JDPC denote the joint data power control
algorithm which iteratively carries out DPCC and DPCD until
convergence. For brevity, we omit the detailed description of
the JDPC Algorithm.
VI. S IMULATION R ESULTS
In this section, we present simulation results to evaluate
the performance of the D2D underlaid massive MIMO system
with PR. We consider a network in a 1000 m × 1000 m square
area and all transmitters are located uniformly in this cell. The
distance between a D2D-Tx and its associated receiver is uniformly distributed in the range of [0 m, Dmax m]. For brevity,
we assume equal minimum SINR requirement for CUs, i.e.,
γn = γ, ∀n ∈ N , and equal maximum power constraint
for all transmitters, i.e., Qn = Pk = P, ∀n ∈ N , k ∈ K.
According to Theorem 3, with a relatively low PR ratio, all
9
100
17 dBm
-100 dBm
3.7
8 dB
10−3
45
40
Sum SE of CUs (bps/Hz)
τ=25
35
30
70
60
50
30
6
τ=10
15
10
Fully ZF, Simulation
Fully ZF, Lower bound
MRC, Simulation
MRC, Lower bound
τ=25
5
2000
3000
4000
10
12
14
16
18
20
22
24
Fig. 2. Simulated sum SE of D2D links and its lower bound versus pilot
length with qs,n = ps,k = P, ∀n ∈ N , k ∈ K, N = 5, K = 20, B = 1024,
T = 50 and Dmax = 100.
τ=15
1000
8
Pilot length
τ=10
20
0
80
40
τ=15
25
M=8, PZF, Simulation
M=8, PZF, Lower bound
M=8, MRC, Simulation
M=8, MRC, Lower bound
M=4, PZF, Simulation
M=4, PZF, Lower bound
M=4, MRC, Simulation
M=4, MRC, Lower bound
90
Sum SE of DUs (bps/Hz)
TABLE I
S IMULATION PARAMETERS
Maximum data transmit power P
Additive noise power N0
Path loss exponent
Standard deviation of log-normal shadowing fading
Accuracy ρ, ρ1
5000
6000
7000
8000
9000 10000
Number of BS Antennas
Fig. 1. Simulated cellular sum SE and its lower bound versus the number
of BS antennas with qs,n = ps,k = P, ∀n ∈ N , k ∈ K, N = 5, K = 20,
M = 8, T = 50 and Dmax = 100.
D2D-Txs can transmit their pilot signals in the maximum
power to increase the estimation accuracy. Therefore, in the
following, we assume that qp,n = pp,k = τ P, ∀n ∈ N , k ∈ K.
Unless otherwise specified, the other system parameters are
summarized in Table I. All simulation results are obtained
by averaging over 104 channel realizations, and each channel
realization is obtained by generating a random user distribution
as well as a random set of fading coefficients.
A. Spectral Efficiency Versus the Corresponding Lower Bound
In this subsection, we evaluate the tightness between the
simulated SE and the corresponding lower bound of both
cellular and D2D links.
First, we compare the simulated cellular sum SE with the
corresponding lower bound under different values of pilot
length and different receive filters at BS in Fig. 1. It can
be seen that cellular sum SE increases with the number of
BS antennas for all considered configurations, and fully ZF
receivers (i.e., (bc , bd ) = (N − 1, τ − N )) greatly outperform
MRC receivers (i.e., (bc , bd ) = (0, 0)) in terms of cellular SE.
As pilot length τ grows, cellular sum SE decreases for the
MRC case, while increases for the fully ZF case. This has
been explained in Remark 1. Moreover, Fig. 1 also shows
that the lower bound of cellular sum SE closely matches the
simulation for the MRC case, and almost coincides with the
simulation for the fully ZF case.
Next, in Fig. 2, we compare the simulated sum SE of
D2D links with the corresponding lower bound under different
numbers of D2D-Rx antennas and different receive filters.
Note that when D2D-Rxs adopt PZF receivers for signal
detection, as mentioned in Section IV, (mc , md ) should be
in feasible set (18). Therefore, in Fig. 2, we assume that
(mc , md ) = (1, min{τ − 6, 1}) when M = 4, and (mc , md ) =
(1, min{τ − 6, 2}) when M = 8. It can be seen from this
figure that PZF receivers greatly outperform MRC receivers
in terms of D2D sum SE. When M = 4, the lower bound on
the sum SE of DUs obtained by PZF receivers is approximate
to the simulated SE obtained by MRC receivers. The gap
between the simulated SE and its lower bound is small for
all considered configurations, indicating that it is feasible to
solve the data power control problem in Section V-B based
on lower bounds (24) and (29). Fig. 2 also shows that when
τ ≤ 9, D2D sum SE increases with pilot length, while after
that D2D sum SE decreases almost linearly with pilot length.
This is because only a few orthogonal pilots are reused among
D2D pairs for a small τ . In this case, the channel estimation is
significantly influenced by pilot contamination. Therefore, the
SE of D2D links can be enhanced by increasing τ . However,
as τ becomes large enough, the channel estimation accuracy
can be hardly improved by further enlarging τ . Counterproductively, increasing pilot length reduces the number of symbols
available for data transmission, and thereby decreases the SE
of D2D links.
In the following simulation, we assume that BS applies fully
ZF receivers for signal detection. As for D2D communication,
since the number of D2D-Rx antennas may be smaller than the
number of all transmitters in the cell, we assume that D2DRxs apply PZF receivers for signal detection. In addition,we
set B = 1024 and M = 8.
B. Performance of the PSA Algorithm
In this subsection, we evaluate the performance of the
proposed PSA algorithm. For comparison, in Fig. 3, we plot
sum MSE (32) versus pilot length for different pilot scheduling
algorithms: the proposed PSA scheme, the GCPA algorithm
proposed in [33] and the random pilot scheduling (RPS).
As a benchmark, we also depict the lower bound on the
sum MSE, which is obtained when all users apply different
orthogonal pilots for channel estimation. It can be observed
from Fig. 3 that the sum MSE decreases with pilot length for
all algorithms, which is consistent with intuition. Moreover,
10
2
10
110
100
1
Sum SE of DUs (bps/Hz)
Sum MSE
10
0
10
Proposed PSA
GCPA in [33]
RPS
Lower bound
−1
10
−2
90
80
70
60
(m , m )=(1, 2), τ=10
c
10
−3
10
6
8
10
12
14
16
18
20
22
40
1
24
c
2
3
4
90
80
70
(mc, md)=(1, 2), τ=10
(mc, md)=(1, 2), OT
MRC, τ=10
MRC, OT
50
180
80
70
60
(mc, md)=(1, 2), τ=10
(mc, md)=(1, 2), OT
50
4
6
8
Number of iterations
7
8
9
10
Fig. 5. Convergence behaviors of the JDPC algorithm with N = 5, K = 20,
T = 50, γ = 5 dB and Dmax = 100.
10
40
MRC, τ=10
MRC, OT
10
20
30
40
50
Number of iterations
Fig. 4. Convergence behaviors of the inner updates in the first outer iteration
of the JDPC algorithm with N = 5, K = 20, T = 50, γ = 5 dB and
Dmax = 100.
the proposed PSA scheme approaches the lower bound quickly
as τ increases, and outperforms the other two algorithms
significantly in terms of sum MSE.
C. Performance of the JDPC Algorithm
In this subsection, we evaluate the performance of the
proposed JDPC algorithm. Denote the orthogonal training
scheme (i.e., τ = N + K) by ‘ OT ’.
Fig. 4 and Fig. 5 illustrate the convergence behaviors of
the proposed power control algorithm under different configurations. Specifically, the left and right panels of Fig. 4
respectively correspond to the DPCC algorithm and the DPCD
algorithm, while Fig. 5 corresponds to the JDPC algorithm.
It can be seen from Fig. 4 that the sum SE of D2D links
monotonically increases during the iterative procedure and
converges rapidly for both DPCC and DPCD algorithms. By
iteratively carrying out these two algorithms to optimize the
data transmit power of CUs and DUs, the sum SE of D2D
links can be effectively increased. Fig. 5 shows that the JDPC
algorithm converges after only a few iterations (within 3
iterations for all considered configurations). This makes the
proposed data power control algorithm suitable for practical
applications.
Sum SE of the system (bps/Hz)
90
Sum SE of DUs (bps/Hz)
Sum SE of DUs (bps/Hz)
100
2
6
DPCD algorithm
100
40
5
Number of iterations
Fig. 3. Performances of different pilot scheduling algorithms versus pilot
length with N = 5, K = 20 and Dmax = 100.
60
d
MRC, τ=10
MRC, OT
Pilot length
DPCC algorithm
d
(m , m )=(1, 2), OT
50
Proposed scheme, τ=10
Proposed scheme, τ=15
Proposed scheme, OT
Classical massive MIMO
ICAPC in [40]
160
140
120
100
80
60
50
60
70
80
90
100
110
120
130
140
150
Maximum distance between a D2D pair (m)
Fig. 6. Sum SE of the system versus the maximum distance between a D2D
pair with (mc , md ) = (1, 2), N = 5, K = 20, T = 50 and γ = 5 dB.
In Fig. 6, the sum SE of the system versus the maximum
distance between a D2D pair is depicted. We compare the
proposed scheme with the iterative channel allocation and
power control (ICAPC) algorithm proposed in [40]. Note
that [40] considered a D2D underlaid cellular system with
each transceiver equipped with one antenna. Therefore, to be
fair, we set the same system configurations when simulating
the ICAPC algorithm. We also include the sum SE curve
obtained by using classical massive MIMO communication
as a benchmark in Fig. 6. To obtain this benchmark, instead
of applying direct communication between D2D pairs, data
signals of D2D-Txs are first forwarded to BS and then sent
(c)
to D2D-Rxs. Let Rn denote the uplink SE of cellular link n,
(d)
and Rk denote the SE of the transmission from D2D-Tx k to
D2D-Rx k with BS working as the relay. Then, the benchmark
N
K
P
P
(c)
(d)
Rn +
can be obtained by maximizing R =
Rk .
n=1
k=1
When fully ZF receivers are applied at the BS, the maximum R
can be obtained by letting all transmitters using the maximum
power for signal transmission. As expected, Fig. 6 shows
that the sum SE of the system decreases with Dmax when
D2D communication is adopted. Since the ICAPC algorithm
assumed perfect CSI and aimed to maximize the sum SE
11
300
110
N=5
N=10
N=15
105
Sum SE of DUs (bps/Hz)
Sum SE of DUs (bps/Hz)
250
200
150
100
100
95
(m , m )=(0,0)
c
90
d
(m , m )=(1,1)
c
d
(m , m )=(1,2)
c
85
d
(m , m )=(2,2)
c
d
(m , m )=(2,3)
c
d
(m , m )=(2,4)
50
10 20
40
60
80
100
120
140
160
180
Number of D2D pairs
180
Sum SE of DUs (bps/Hz)
160
140
120
100
80
Proposed scheme, K=20, τ=10
Proposed scheme, K=40, τ=10
Proposed scheme, K=20, OT
Proposed scheme, K=40, OT
ICAPC in [40], K=20
ICAPC in [40], K=40
40
20
0
50
60
70
80
90
100
110
c
−5
d
0
5
10
15
20
Target SINR of CUs (dB)
Fig. 7. Sum SE of D2D links versus the number of D2D pairs under different
values of coherence block length with (mc , md ) = (1, 2), τ = 10, T = 50,
γ = 5 dB and Dmax = 100.
60
80
−10
120
130
140
150
Coherence block length
Fig. 8. Sum SE of D2D links versus the coherence block length with
(mc , md ) = (1, 2), N = 5, γ = 5 dB and Dmax = 100.
of DUs based on instantaneous CSI, the ICAPC algorithm
outperforms the proposed scheme slightly in terms of system
throughput when OT is adopted. However, with PR among
DUs, the proposed scheme can obviously increase the system
SE. Moreover, we can also conclude from Fig. 6 that due to the
property of short-distance transmission, D2D communication
can help improve the sum SE of a massive MIMO system
significantly especially when Dmax is small.
Fig. 7 depicts the sum SE of D2D links versus the number of
D2D pairs under different values of N . It can be seen that the
sum SE of DUs first increases with K and then approaches
a saturation point when K > 150. This is because we set
τ = 10, as K grows, PR ratio increases, resulting in more
pilot contamination for D2D channel estimations. Moreover,
since a larger N results in more cochannel interference and
requires longer pilot overhead, as Fig. 7 shows, the sum SE
of DUs decreases with N .
The impact of the coherence block length T on the sum SE
of DUs is investigated in Fig. 8. As expected, the sum SE of
DUs increases with T for all considered configurations. For
both the proposed scheme with OT and the ICAPC algorithm,
as T grows, the sum SE of DUs with K = 40 is first lower
and then higher than that of the K = 20 case. This is because
Fig. 9. Sum SE of D2D links versus the target SINR of CUs under different
(mc , md ) with N = 5, K = 20 , τ = 10, T = 50 and Dmax = 100.
with OT, in the small T regime, the sum SE of DUs is mainly
influenced by τ , while in the high T regime, it is mainly
affected by K. Moreover, Fig. 8 also shows that compared
with OT, the sum SE of DUs can be greatly increased by PR
especially when T is small.
Fig. 9 illustrates how the target SINR of CUs and PZF
parameters (mc , md ) affect the sum SE of D2D links. Several
observations can be made from this figure. First, the sum SE
of D2D links decreases with γ, and the loss in D2D sum SE
resulted from the increase of γ reduces as mc grows from 0
to 2. Second, PZF receivers (i.e., mc + md > 0) outperform
the MRC receiver (i.e., mc = md = 0) in terms of D2D
sum SE for all different choices of (mc , md ). Moreover, for
the considered configuration, the maximum sum SE of D2D
links is obtained when (mc , md ) = (1, 2). Further increasing
the degrees of freedom for interference suppression results in
decrease of D2D sum SE since less degrees of freedom are
left for signal enhancement.
VII. C ONCLUSIONS
In this paper, we consider a D2D underlaid massive MIMO
system. Due to the fact that D2D pairs are usually located
dispersively and conduct short-distance transmission in low
power, letting several D2D pairs far from each other use
the same pilot for channel estimation would be feasible and
beneficial. Hence, we allow PR among DUs to reduce pilot
overhead. Based on this setup, we first investigate the channel
estimation under PR and derive a lower bound on the ergodic
achievable rate of each link. To mitigate pilot contamination
caused by PR, we develop a pilot scheduling algorithm under
the criterion of minimizing the sum MSE of channel estimation
of D2D links. In addition, we also maximize the sum rate of all
D2D links based on the large-scale fading coefficients instead
of the instantaneous CSI. An iterative power control algorithm
is proposed to obtain a suboptimal solution. Simulation results
show that the effect of pilot contamination can be decreased
greatly by exploiting the proposed pilot scheduling algorithm,
and the PR scheme can provide significant performance gains
over the conventional orthogonal training scheme in terms of
system SE.
12
A PPENDIX A
P ROOF OF T HEOREM 1
H
H
H
(c)
(c)
(c)
(c)
(c)
(d)
By definition, βn
ĥn , βn
ĥa and βn
ĥi
are respectively the projections of channel estimation vectors
(c)
(c)
(c)
(d)
ĥn , ĥa and ĥi onto PZF receiver βn . As mentioned in
Section III, channel estimation of cellular links is only affected
(d)
(c)
(c)
by additive noise. Hence, ĥn is independent of ĥa and ĥi ,
∀n ∈ N , a ∈ N \ n, i ∈ K. Then, from (20), we can find that the
(c)
desired signal of CU n Sn doesn’t dependent on cochannel
(c→c)
(d→c)
cellular and D2D interference
In
and In
. Using the
convexity of log2 1 + x1 (∀x > 0) and applying the Jensen’s
inequality, we have
E Rn(c) ≥ Rn(c,lb)
)!−1
(
τ
1
, ∀n ∈ N , (43)
, 1−
log2 1 + E
(c)
T
ηn
(c)
(c,lb)
where Rn and Rn
denote the instantaneous rate and a
lower bound on the ergodic achievable rate of cellular link n,
respectively. Based on (20) and the above analysis, we have
(
)
n
o
n
o
1
1
(c→c)
(d→c)
(c)
E
=
E
E
I
+
E
I
+
α
.
n
n
(c)
(c)
ηn
Sn
(44)
In order to obtain
expression
o we
o
n of (44),
n
n ano explicit
(d→c)
(c→c)
. For
and E In
need to calculate E 1(c) , E In
Sn
convenience, denote G = [G1 , G2 ] ∈ CB×B , where the
columns of G form an orthogonal basis of the B dimensional
space. Specifically, the columns of G2 ∈ CB×(bc +bd ) form
an orthogonal basis of the subspace spanned by channel
estimation vectors of cancelled interferers, and each column
of G1 ∈ CB×(B−bc −bd ) is orthogonal to G2 . Then, the unit
(c)
norm PZF receiver βn can be chosen as
(c)
βn(c) =
G1 GH
1 ĥn
(c)
G1 GH
1 ĥn
.
(45)
(c)
(c)
=
(c)
GH
1 ĥn
2
,
1
(c)
2
n
E In(c→c)
o
=
H
ĥ(c)
βn(c)
a
qs,a u(c)
a E
X
(c)
qs,a u(c)
a δa ,
(c)
a∈Cn \n
=
(
X
2
)
(c)
a∈Cn \n
o
n
X
(d)
ps,i ui E
E In(d→c) =
i∈D (c)
=
X
(
(d) (d)
βn(c)
H
(d)
ĥi
2
ps,i ui δi .
)
(48)
i∈D (c)
Substituting (47) and (48) into (43) yields lower bound (23).
A PPENDIX B
P ROOF OF T HEOREM 2
Unlike the channel estimation of cellular links which is only
affected by additive noise, pilot contamination exists when
estimating D2D channels due to PR. As a result, the estimation
(d)
of gkk is not only affected by noise, but also influenced by
pilot contamination caused by DUs i ∈ Xk \ k. From (11), we
can obtain the following relationship
v
u (d)
uµ
(d)
(d)
ĝik = t ik
ĝ , ∀i ∈ Xk \ k.
(49)
(d) kk
µkk
Denote
(d→d)
(d→d)
Iˆk
(d→d)
(d→d)
= Iˆk
+ I˜k
,
2
H
X
(d)
(d)
(d)
=
ps,i vik βk
ĝik ,
(d)
i∈Dk \Xk
(d→d)
I˜k
=
(d)
X
ps,i vik
i∈Xk \k
(46)
(c)
projection of ĥn on G1 . Obviously, ĥn is independent
(c)
of each column of G1 . Hence, each element of GH
1 ĥn
(c)
follows i.i.d. CN (0, δn ). According to [41, Section 2.1.6],
GH
∼ W1 (B − bc − bd , 1) is a central complex
1 ĥn
2
Wishart random variable with B − bc − bd degrees of freedom.
Then, we have
1
1
=
.
(47)
E
(c)
(c)
(c)
Sn
qs,n un (B − bc − bd − 1)δn
(c)
δn
δi
(d)
βk
H
(d)
ĝik
2
.
(50)
Then, from (49), we have
2
H
(c)
(c)
which indicates that βn
ĥn equals to the norm of the
(c)
(c)
complex Gaussian random variables and follows CN (0, δa ).
2
H
(c)
(c)
Hence, βn
follows exponential distribution, i.e.,
ĥa
2
H
(c)
(c)
(c)
1
βn
∼ Exp(1), ∀a ∈ Cn \ n. Similarly,
ĥa
(c)
δa
2
H
(c)
(d)
1
∼ Exp(1), ∀i ∈ D(c) . Then, we have
βn
ĥi
(d)
Ik
2
By expressing ĥn as the sum of projections of ĥn onto G1
and G2 , we have
H
H
(c)
(c)
H (c)
ĥ(c)
G1 GH
βn(c)
1 ĥn + G2 G2 ĥn
n = βn
(c)
= G1 GH
1 ĥn
(c)
Since βn is an unit
norm vector and is independent of
H
(c)
(c)
(c)
(c)
ĥa , ∀a ∈ Cn \ n, βn
ĥa is the linear combination of
(d→d)
I˜k
(d)
Sk
=
P
i∈Xk \k
(d) (d)
ps,i vik µik
(d) (d)
ps,k vkk µkk
.
(51)
Analogous to the proof process in Appendix A, we can
(d)
(d→d)
(c→d)
easily verify that Sk is independent of Iˆk
and Ik
.
Hence, the relationship between the ergodic achievable rate of
D2D link k and its lower bound can be expressed as
(d)
(d,lb)
E Rk ≥ Rk
)!−1
(
τ
1
, ∀k ∈ K, (52)
, 1−
log2 1+ E
(d)
T
η
k
13
where
(
E
Meanwhile, the optimal values of (κopt , ξ opt ) should satisfy
1
(d)
ηk
)
= E
+
(
1
(d)
Sk
(d→d)
I˜k
(d)
Sk
)
n
o
n
o
(d→d)
(c→d)
(d)
E Iˆk
+ E Ik
+ αk
.
(53)
Besides, we also have
(
)
1
1
E
=
,
(d)
(d)
(d)
Sk
ps,k vkk (M − mc − md − 1)µkk
n
o
X
(c→d)
(c) (c)
E Ik
=
qs,n vnk µnk ,
(d)
n∈Ck
n
o
1
, ∀k ∈ K,
Vk (popt
p )
opt
opt
Uk (popt
p ) − ξk Vk (pp ) = 0, ∀k ∈ K.
κopt
k =
(d→d)
E Iˆk
=
X
(d) (d)
ps,i vik µik .
(54)
(d)
i∈Dk \Xk
Substituting (51) and (54) into (52) yields lower bound (29).
(58)
opt
opt
From Lemma 1, we can obtain (popt
p , ξ , κ ) by iteratively
carrying out the following two steps until convergence: 1)
update (ξ, κ) based on (58) for given pp ; 2) update pp
for given (ξ, κ) by solving (57). In the last iteration of
the parametric algorithm, assume that (ξ opt , κopt ) has been
obtained. Then, we find the final popt
p by solving (57), which
can be further reformulated as
!
!
K
X opt opt (d)
X
opt (d)
opt opt
max
κi ξi vki −κk ξk N0
pp,k κk vkk −
pp
k=1
i∈Xk
(59a)
A PPENDIX C
P ROOF OF T HEOREM 3
s.t.
When the optimal pilot scheduling scheme has been determined to allocate pilots {ωN +1 , · · · , ωτ } to DUs, problem
(33) can be equivalently written as
max
pp
s.t.
K
X
Uk (pp )
k=1
Vk (pp )
=
K
X
k=1
(d)
pp,k vkk
P
i∈Xk
(d)
pp,i vik + N0
0 ≤ pp,k ≤ τ Pk , ∀k ∈ K.
(55a)
(55b)
Obviously, problem (55) is a non-convex sum-of-ratios optimization, which aims to maximize the summation of fractional
functions. The parametric algorithm is often adopted to solve
this kind of problem if the numerator of each summation term
is concave and the denominator of each summation term is
convex [42], [43]. Since Uk (pp ) and Vk (pp ) are both affine
w.r.t. pp for any k, we can optimally solve problem (55)
using the parametric algorithm. According to [42], (55) can
be equivalently transformed to the following problem
max
pp ,ξ
s.t.
K
X
ξk
pp
s.t.
K
X
k=1
κopt
Uk (pp ) − ξkopt Vk (pp )
k
0 ≤ pp,k ≤ τ Pk , ∀k ∈ K.
Since the above problem in (59) is linear w.r.t. pp , it is
P opt opt (d)
opt (d)
κi ξi vki ;
directly known that popt
p,k = τ Pk if κk vkk ≥
i∈Xk
opt
Otherwise, popt
p,k = 0. Notice that we have to guarantee pp,k > 0
opt
to estimate the channel vector of D2D link k. When pp,k = 0,
we can always change the pilot assigned to D2D pair k by
P opt opt (d)
(d)
κi ξi vki . The worst
increasing τ so that κopt
k vkk ≥
i∈Xk
case is that τ = N + K and all D2D pairs use different
orthogonal pilots for channel estimation. In this case, pilot
contamination vanishes and each D2D-Tx would transmit
its pilot with the maximum power to increase the channel
estimation accuracy. Therefore, Theorem 3 is proven.
A PPENDIX D
C ONVERGENCE P ROOF OF OF THE DPCC A LGORITHM
(57a)
(57b)
A PPENDIX E
(56b)
(56c)
where ξ = (ξ1 , · · · , ξK )T . In order to solve the problem in (56),
we resort to alternating optimization by using the following
Lemma. Applying [42, Lemma 2.1], we obtain
opt
Lemma 1: If (popt
p , ξ ) is the optimal solution of the
above maximization problem in (56), then there exists κopt =
opt T
opt
(κopt
1 , · · · , κK ) such that pp is the optimal solution to the
following problem
max
(59b)
As discussed in [38, Theorem 2], the iterative process in
(41) converges to the optimal solution for any initial power
vector qs 0 if function Λ(qs ) is standard. Moreover, the
sufficient condition for Λ(qs ) to be standard is that ∆(qs )
is standard. Therefore, we only need to prove that ∆(qs ) is
standard. Since the elements in F are nonnegative, qs 0
and θ ≻ 0, we have
• Positivity: ∆(qs ) = F qs + θ ≻ 0;
′
′
• Monotonicity: If qs qs , then ∆(qs ) − ∆(qs ) = F (qs −
′
′
qs ) 0, i.e. ∆(qs ) ∆(qs );
• Scalability: ∀ς > 1, ς∆(qs ) = ςF qs + ςθ ≻ ςF qs + θ =
∆(ςqs ).
As a result, Λ(qs ) is standard and the iterative process in
(41) converges to the optimal solution for any initial power
vector qs 0.
(56a)
k=1
Uk (pp )
≥ ξk , ∀k ∈ K,
Vk (pp )
0 ≤ pp,k ≤ τ Pk , ∀k ∈ K,
0 ≤ pp,k ≤ τ Pk , ∀k ∈ K.
14
S OLVING (42) VIA WMMSE A LGORITHM
√
For notational convenience, we denote fk = ps,k , ∀k ∈ K.
Then, (42) can be equivalently transformed into the following
weighted sum-MSE minimization problem
min
w,ν,f
s.t.
K
X
k=1
K
X
k=1
(wk ek − ln wk )
(d)
fk2 ϕk ≤ ζ,
i=1
(62)
Plugging (62) in (61) and simplifying (60), we have
s.t.
K
X
k=1
(d)
log2
1 +
(d)
fk2 φk
K
P
i=1
(d)
fk2 ϕk ≤ ζ,
0 ≤ fk ≤
(d)
fi2 ψik + σk
(63a)
(63b)
p
Pk , ∀k ∈ K,
(63c)
which is equivalent to (42). The equivalence implies that
a suboptimal solution of problem (42) can be obtained by
solving (60), which is easier to handle since the objective
function is convex w.r.t. each variable when the other variables
are fixed. The optimal w (or ν) can be obtained based on (62)
when ν and f (w and f ) are fixed. For given w and ν, to
get the optimal f , we attach Lagrange multiplier λ to the first
constraint of (60) and obtain the Lagrange function as follows
!
K
K
X
X
2 (d)
L(f , λ) ,
(wk ek − ln wk ) + λ
fk ϕk − ζ . (64)
k=1
k=1
From [44], the first-order optimality condition of L w.r.t. fk
yields
q
(d)
p
wk νk φk
.
Pk ,
fk (λ) = min
K
P
(d)
(d)
(d)
2
2
wi νi ψki + λϕk
wk νk φk +
i=1
= ζ. Since for any k ∈ K,
R EFERENCES
(60c)
1
, ∀k ∈ K.
=
ek
k=1
(d)
fk2 ϕk
(60b)
To prove the equivalence between (42) and (60), we derive
the optimal ν and w by checking the first-order optimality
condition of problem (60)
q
(d)
fk φk
opt
νk =
, ∀k ∈ K,
K
P
(d)
(d)
(d)
fi2 ψik + σk
fk2 φk +
f
K
P
fk (λ) strictly decreases with λ, we can obtain λopt using the
bisection method. Then, substituting λopt into (65), we get fkopt .
i=1
max
have λopt > 0 and
(60a)
where wk is a positive weight variable, and ek is the meansquare estimation error
!
2
q
K
X
(d)
(d)
2 (d)
2
fi ψik + σk
. (61)
ek = νk fk φk − 1 + νk
K
X
k=1
k=1
p
0 ≤ fk ≤ Pk , ∀k ∈ K,
wkopt
According to the complementary slackness condition, if λopt =
K
P
(d)
fk2 ϕk < ζ, then, fkopt = fk (0). Otherwise, we
0 yields
(65)
[1] FCC Spectrum Policy Task Force, “Report of the spectrum efficiency
working group,” Nov. 2002.
[2] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9,
no. 11, pp. 3590–3600, Nov. 2010.
[3] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta,
O. Edfors, and F. Tufvesson, “Scaling up MIMO: Opportunities and
challenges with very large arrays,” IEEE Signal Process. Mag., vol. 30,
no. 1, pp. 40–60, Jan. 2013.
[4] E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, “Massive
MIMO for next generation wireless systems,” IEEE Commun. Mag.,
vol. 52, no. 2, pp. 186–195, Feb. 2014.
[5] H. Xie, B. Wang, F. Gao, and S. Jin, “A full-space spectrum-sharing
strategy for massive MIMO cognitive radio systems,” IEEE J. Sel. Areas
Commun., vol. 34, no. 10, pp. 2537–2549, Oct. 2016.
[6] J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device communication in LTE-advanced networks: A survey,” IEEE Commun. Surveys
Tuts., vol. 17, no. 4, pp. 1923–1940, Dec. 2015.
[7] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device
communication in cellular networks,” IEEE Commun. Surveys Tuts.,
vol. 16, no. 4, pp. 1801–1819, Apr. 2014.
[8] X. Lin, J. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3GPP
device-to-device proximity services,” IEEE Commun. Mag., vol. 52,
no. 4, pp. 40–48, Mar. 2014.
[9] H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, “Energy and spectral efficiency of very large multiuser MIMO systems,” IEEE Trans. Commun.,
vol. 61, no. 4, pp. 1436–1449, Apr. 2013.
[10] H. Yang and T. L. Marzetta, “Performance of conjugate and zeroforcing beamforming in large-scale antenna systems,” IEEE J. Sel. Areas
Commun., vol. 31, no. 2, pp. 172–179, Feb. 2013.
[11] J. Hoydis, S. Ten Brink, and M. Debbah, “Massive MIMO in the UL/DL
of cellular networks: How many antennas do we need?” IEEE J. Sel.
Areas Commun., vol. 31, no. 2, pp. 160–171, Feb. 2013.
[12] N. Liang, W. Zhang, and C. Shen, “An uplink interference analysis for
massive MIMO systems with MRC and ZF receivers,” in Proc. IEEE
Wireless Commun. Netw. Conf. (WCNC), 2015, pp. 310–315.
[13] T. Bai and R. W. Heath Jr, “Asymptotic coverage probability and rate
in massive MIMO networks,” Proc. IEEE GlobalSIP, pp. 1–5, 2014.
[14] D. Zhu, J. Wang, A. L. Swindlehurst, and C. Zhao, “Downlink resource reuse for device-to-device communications underlaying cellular
networks,” IEEE Sig. Process. Lett., vol. 21, no. 5, pp. 531–534, May
2014.
[15] S. Maghsudi and S. Stanczak, “Joint channel allocation and power
control for underlay D2D transmission,” in Proc. IEEE Int. Conf.
Commun. (ICC), London, UK., 2015, pp. 2091–2096.
[16] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, “Deviceto-device communications underlaying cellular networks,” IEEE Trans.
Commun., vol. 61, no. 8, pp. 3541–3551, Aug. 2013.
[17] W. Zhao and S. Wang, “Resource allocation for device-to-device communication underlaying cellular networks: An alternating optimization
method,” IEEE Commun. Lett., vol. 19, no. 8, pp. 1398–1401, Aug.
2015.
[18] Y. Jiang, Q. Liu, F. Zheng, X. Gao, and X. You, “Energy efficient joint
resource allocation and power control for D2D communications,” IEEE
Trans. Veh. Tech., vol. 65, no. 8, pp. 6119 – 6127, Aug. 2016.
[19] F. Wang, C. Xu, L. Song, and Z. Han, “Energy-efficient resource
allocation for device-to-device underlay communication,” IEEE Trans.
Wireless Commun., vol. 14, no. 4, pp. 2082–2092, Apr. 2015.
[20] T. D. Hoang, L. B. Le, and T. Le-Ngoc, “Energy-efficient resource
allocation for D2D communications in cellular networks,” in Proc. IEEE
Int. Conf. Commun., London, UK., 2015, pp. 2251–2256.
[21] X. Lin, R. W. Heath, and J. G. Andrews, “Spectral efficiency of massive
MIMO systems with D2D underlay,” in Proc. IEEE Int. Conf. Commun.
(ICC), London, UK., 2015, pp. 4345–4350.
15
[22] X. Lin, R. Heath, and J. Andrews, “The interplay between massive
MIMO and underlaid D2D networking,” IEEE Trans. Wireless Commun.,
vol. 14, no. 6, pp. 3337–3351, June 2015.
[23] J. Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, “Pilot
contamination and precoding in multi-cell TDD systems,” IEEE Trans.
Wireless Commun., vol. 10, no. 8, pp. 2640–2651, Aug. 2011.
[24] H. Yin, D. Gesbert, M. Filippou, and Y. Liu, “A coordinated approach
to channel estimation in large-scale multiple-antenna systems,” IEEE J.
Sel. Areas Commun., vol. 31, no. 2, pp. 264–273, Feb. 2013.
[25] A. Ashikhmin and T. Marzetta, “Pilot contamination precoding in multicell large scale antenna systems,” in Proc. IEEE ISIT, Cambridge, MA,
USA, 2012, pp. 1137–1141.
[26] F. Fernandes, A. Ashikhmin, and T. L. Marzetta, “Inter-cell interference
in noncooperative TDD large scale antenna systems,” IEEE J. Sel. Areas
Commun., vol. 31, no. 2, pp. 192–201, Feb. 2013.
[27] H. Q. Ngo and E. G. Larsson, “Evd-based channel estimation in multicell
multiuser MIMO systems with very large antenna arrays,” in Proc. IEEE
ICASSP, Kyoto, Japan, 2012, pp. 3249–3252.
[28] L. You, X. Gao, X.-G. Xia, N. Ma, and Y. Peng, “Pilot reuse for massive
MIMO transmission over spatially correlated rayleigh fading channels,”
IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3352–3366, Feb.
2015.
[29] X. Liu, Q. He, Y. Li, L. Xiao, and J. Wang, “Pilot reuse for deviceto-device underlay massive MIMO systems,” in IEEE VTC-Fall, Sep.
2015, pp. 1–5.
[30] X. Liu, Y. Li, X. Li, L. Xiao, and J. Wang, “Pilot reuse and interferenceaided MMSE detection for D2D underlay massive MIMO,” IEEE Trans.
Veh. Tech., vol. 66, no. 4, pp. 3116 – 3130, Apr. 2017.
[31] H. Xu, N. Huang, Z. Yang, J. Shi, B. Wu, and M. Chen, “Pilot allocation
and power control in D2D underlay massive MIMO systems,” IEEE
Commun. Lett., vol. 21, no. 1, pp. 112–115, Jan. 2017.
[32] N. Jindal, J. G. Andrews, and S. Weber, “Multi-antenna communication
in ad hoc networks:achieving MIMO gains with SIMO transmission,”
IEEE Trans. Commun., vol. 59, no. 2, pp. 529–540, Feb. 2011.
[33] X. Zhu, L. Dai, and Z. Wang, “Graph coloring based pilot allocation
to mitigate pilot contamination for multi-cell massive MIMO systems,”
IEEE Commun. Lett., vol. 19, no. 10, pp. 1842–1845, Aug. 2015.
[34] M. Li, S. Jin, and X. Gao, “Spatial orthogonality-based pilot reuse for
multi-cell massive MIMO transmission,” in Proc. IEEE Int. Conf. WCSP,
Oct. 2013, pp. 1–6.
[35] R. Mochaourab, E. Björnson, and M. Bengtsson, “Adaptive pilot clustering in heterogeneous massive mimo networks,” IEEE Trans. Wireless
Commun., vol. 15, no. 8, pp. 5555–5568, Aug. 2016.
[36] T. Kailath, A. H. Sayed, and B. Hassibi, Linear Estimation. Prentice
Hall Upper Saddle River, NJ, 2000, vol. 1.
[37] R. Chen, J. G. Andrews, R. W. Heath, and A. Ghosh, “Uplink power
control in multi-cell spatial multiplexing wireless systems,” IEEE Trans.
Wireless Commun., vol. 6, no. 7, pp. 2700–2711, July 2007.
[38] R. D. Yates, “A framework for uplink power control in cellular radio
systems,” IEEE J. Sel. Areas Commun., vol. 13, no. 7, pp. 1341–1347,
Sep. 1995.
[39] Q. Shi, M. Razaviyayn, Z.-Q. Luo, and C. He, “An iteratively weighted
MMSE approach to distributed sum-utility maximization for a MIMO
interfering broadcast channel,” IEEE Trans. Signal Process., vol. 59,
no. 9, pp. 4331–4340, Sep. 2011.
[40] H. Xu, Z. Yang, N. Huang, J.-Y. Wang, J. Shi, and M. Chen, “Channel
allocation and power control in D2D uplink underlaid cellular networks,”
in Proc. IEEE Globecom Workshops (GC Wkshps), Washington, DC,
2016, pp. 1–6.
[41] A. M. Tulino and S. Verdú, Random Matrix Theory and Wireless
Communications. Now Publishers Inc, 2004, vol. 1.
[42] Y. Jong, “An efficient global optimization algorithm for nonlinear sumof-ratios problem,” online: www. optimizationonline. org, 2012.
[43] L. Xu, G. Yu, and Y. Jiang, “Energy-efficient resource allocation in
single-cell OFDM systems: Multi-objective approach,” IEEE Trans.
Wireless Commun., vol. 14, no. 10, pp. 5848–5858, Oct. 2015.
[44] S. Boyd and L. Vandenberghe, Convex Optimization.
Cambridge
University Press, 2004.
| 7cs.IT
|
A note on the penalty parameter in Nitsche’s method for unfitted boundary
value problems
Frits de Prentera,∗, Christoph Lehrenfeldb , André Massingc
a Department
of Mechanical Engineering, Eindhoven University of Technology, The Netherlands
for Numerical and Applied Mathematics, University of Göttingen, Germany
c Department of Mathematics and Mathematical Statistics, Umeå University, Sweden
arXiv:1709.05832v1 [math.NA] 18 Sep 2017
b Institute
Abstract
Nitsche’s method is a popular approach to implement Dirichlet-type boundary conditions in situations where
a strong imposition is either inconvenient or simply not feasible. The method is widely applied in the context
of unfitted finite element methods. From the classical (symmetric) Nitsche’s method it is well-known that
the stabilization parameter in the method has to be chosen sufficiently large to obtain unique solvability
of discrete systems. In this short note we discuss an often used strategy to set the stabilization parameter
and describe a possible problem that can arise from this. We show that in specific situations error bounds
can deteriorate and give examples of computations where Nitsche’s method yields large and even diverging
discretization errors.
Keywords: Nitsche’s method, unfitted/immersed finite element methods, penalty/stabilization parameter,
accuracy, stability, error analysis
1. Introduction
We consider the discretization of an unfitted Poisson problem. The problem domain is described separately from the encapsulating mesh, on which a finite element basis is defined. We consider the restriction of this finite element space with respect to the problem domain. Such an approach is used in many
methods which are similar in virtue, e.g., the fictitious domain method [1], the cut finite element method
(CutFEM) [2–5], the finite cell method (FCM) [6–12], immersogeometric analysis [13–15], the immersed
boundary method [16], the unfitted discontinuous Galerkin method (UDG) [17, 18], the extended finite element method (XFEM) [19–24], and several others. To impose essential boundary conditions, many of these
methods apply some version of the classical Nitsche’s method [25].
This requires stabilization by a penalization parameter to preserve the coercivity of the bilinear operator.
Without additional stabilization of cut elements with e.g., ghost penalty terms [2, 26] – which is customary
for methods referred to as CutFEM – this penalty parameter depends on the shape and size of the cut
elements, i.e., it depends on the position of the geometry relative to the computational mesh. A typical
choice which is sufficient to provide unique solvability of discrete problems, is to choose the stabilization
parameter as an element wise constant and proportional to the ratio between the surface measure of the
intersection between an element and the boundary and the volume measure of the intersection of the same
element and the domain. As this ratio can become arbitrarily large, the stabilization parameter is not
generally bounded.
In the mathematical literature, e.g., [2, 3], unfitted Nitsche formulations are generally supplemented by
the aforementioned additional stabilization to bound the stabilization parameter in order to prove properties
∗ Corresponding
author. Tel.: +31 61 516 2599
Email addresses: [email protected] (Frits de Prenter), [email protected] (Christoph Lehrenfeld),
[email protected] (André Massing)
Preprint submitted to Computers & Mathematics with Applications
September 19, 2017
of the method. In our opinion, the importance of this has not sufficiently been addressed in the literature
however. Moreover, the method has effectively (and successfully) been applied without additional stabilization in the engineering literature, see e.g., [10–12]. With this note, we therefore detailedly treat the possible
problem that can occur when no additional measures are taken to bound the stabilization parameter and aim
to provide a disclaimer for directly applying the classical form of Nitsche’s method to immersed problems.
To this end, we discuss and analyze the method and demonstrate that it can lead to poor results in the
discretization error when the geometry intersects the computational domain such that large values of the
stabilization parameter are required. We also investigate different situations where degenerated geometry
configurations yield satisfactory and unsatisfactory results and provide a possible interpretation. We further
review alternative formulations and possible modifications and stabilizations of the method.
Section 2 of this note introduces a model problem, followed by the Nitsche’s method under consideration
in Section 3. In Section 4 we carry out a simple error analysis of the method in a norm which is natural to the
formulation. This analysis reveals the possible large discretization errors for unfortunate cut configurations.
In Section 5 we give examples of bad cut configurations and show how these can lead to large and even
degenerating discretization errors. Finally, we list alternative approaches to impose boundary conditions
and variants of the classical Nitsche’s method to circumvent this possible problem in Section 6.
2. The model problem
As a model for more general elliptic boundary value problems, we consider the Poisson problem with
inhomogeneous Dirichlet boundary data posed on an open and bounded domain Ω ⊂ Rd with Lipschitz
boundary ∂Ω:
−∆u = f
u= g
in Ω,
(1a)
on ∂Ω.
(1b)
We assume that the properties of the domain Ω imply that a shift theorem of the form:
kukH 2 (Ω) . kf kL2 (Ω) + kgk
1
H 2 (∂Ω)
,
(2)
1
holds whenever f ∈ L2 (Ω) and g ∈ H 2 (∂Ω), e.g., when ∂Ω is smooth or Ω ⊂ R2 is a convex domain
with piecewise C 2 boundary [27]. In this note . is used to denote an inequality with a constant that is
independent of the mesh. This problem has the standard well-posed weak formulation: Find u ∈ Hg1 (Ω),
such that:
Z
Z
∇u∇v dx =
f v dx for all v ∈ H01 (Ω).
(3)
Ω
H01 (Ω)
Ω
Hg1 (Ω)
are the standard Sobolev spaces with corresponding homogeneous
In this formulation
and
and inhomogeneous boundary data. For simplicity, we assume that Dirichlet boundary conditions are posed
on the whole boundary of Ω. However, the results presented in this work extend to the case where Dirichlet
boundary data is only prescribed on a part of the boundary as demonstrated in Section 5.
3. A Nitsche-based unfitted finite element method
We consider a (triangular or rectilinear) shape regular background discretization Te which encapsulates
the domain Ω. To each element T ∈ Te we associate the local mesh size hT = diam(T ) and define the global
mesh size by h = maxT ∈Te hT . We define the active mesh T by:
T = {T ∈ Te : T ∩ Ω 6= ∅},
(4)
e =S
and set Ω
T ∈T T , denoting the union of all elements from the active mesh. The set of geometric entities
are illustrated in Figure 1. On the active mesh T we define the finite dimensional function space:
2
Figure 1: Example of a domain Ω with background mesh Te and active mesh T .
e : v|T ∈ Pk (T ), T ∈ T },
Vh = {v ∈ C(Ω)
(5)
consisting of continuous piecewise polynomials of order k. A simple prototype formulation for a Nitschebased unfitted finite element method is to find uh ∈ Vh , such that:
ah (uh , vh ) = lh (vh )
∀ vh ∈ Vh ,
(6)
where:
Z
ah (uh , vh ) :=
ZΩ
lh (vh ) :=
Z
Z
∇uh ∇vh dx +
(−∂n uh )vh ds +
∂Ω
Z
f vh dx +
(−∂n vh + λT vh )g ds.
Ω
Z
(−∂n vh )uh ds +
∂Ω
λT uh vh ds,
(7)
∂Ω
(8)
∂Ω
Here, ∂n denotes the partial derivative in normal direction of the boundary of Ω and λT denotes a elementwise stabilization parameter. The choice of the stabilization parameter is crucial. As the review of the error
analysis in Section 3 reveals, the local stabilization parameter λT has to be chosen sufficiently large in order
to guarantee the discrete coercivity of the bilinear form ah (·, ·). A common – see e.g., [10–12] – strategy is
to solve the eigenvalue problem:
Z
∂Ω∩T
Find (uµ , µT ) ∈ Vh |0T × R, such that:
Z
(∂n uµ )(∂n vh ) ds = µT
∇uµ ∇vh ds for all vh ∈ Vh |0T ,
(9)
Ω∩T
on each element T which has a non-empty intersection with ∂Ω, see for instance [28]. Here, Vh |0T is the
space of functions in Vh |T that are L2 (T )-orthogonal to constants. Let NT = dim(Vh |T ), then (9) is an
(NT − 1)-dimensional eigenvalue problem with only non-negative eigenvalues. Motivated by the forthcoming
stability analysis, a suitable choice of the stabilization parameter is to set:
R
(∂n uh )2 ds
> 0.
(10)
λT = 2 max{µT } = 2 max 0 R∂Ω∩T
|∇uh |2 dx
uh ∈Vh |T
Ω∩T
3
ε
|T ∩ Ω| ε→0
−→ 0
|T |
ε
|T ∩ Ω| ε→0
−→ 0
|T |
|T ∩ ∂Ω| ε→0
−→ 0
|∂T |
|T ∩ ∂Ω| ε→0
−→ c > 0
|∂T |
(a)
(b)
Figure 2: Different cut configurations. In (a) the part of the boundary in the element vanishes for vanishing volume, while for
the sliver case (b) the measure of the boundary part stays bounded from below as the volume goes to zero.
Remark 1. With techniques as in [29], it can be shown that λT scales with |T ∩ ∂Ω|d−1 /|T ∩ Ω|d . Thus,
shape-regularity implies that for a Nitsche-based formulation on a fitted and shape-regular mesh λT ∼ |T ∩
∂Ω|d−1 /|T ∩ Ω|d ∼ h−1 . In contrast, in an unfitted method, the ratio |T ∩ ∂Ω|d−1 /|T ∩ Ω|d depends not only
on the cut element size but also highly on the cut configuration (see Figure 2). In particular, a sliver cut can
lead to arbitrarily large values of λT on relatively large parts of the boundary, depending on the thickness of
the sliver. In Section 5 it is demonstrated how cut elements of approximately this shape can result in poor
discretization errors.
Remark 2. To generate and solve the discrete linear system associated with problem (6) several issues have
to be resolved, i.e., sufficiently accurate numerical integration on T ∩ Ω and T ∩ ∂Ω has to be provided, e.g.,
[30–39], and a particular tuning of the linear algebra solver might be necessary, e.g., [40, 41]. All these
aspects are important, but in this work we focus only of the choice of λT and its effect on the numerical
solution, assuming that numerical integration can be performed sufficiently accurate and applying a direct
solver to solve the linear systems exactly.
4. A simple error analysis
In this section we perform an error analysis for the variational form in (6). We first define a meshdependent norm in which a best approximation property holds in Section 4.1. In Section 4.2 we discuss
the approximability in the mesh-dependent norm and the consequences for the discretization error in the
H 1 (Ω)-norm.
4.1. Best approximation in the mesh-dependent energy norm
With the choice of the stabilization parameter as in (10), the stability analysis is natural in the following
mesh-dependent norm which we will refer to as the energy norm:
1
−1
|||v|||2 := k∇vk2Ω + kλT 2 ∂n vk2∂Ω + kλT2 vk2∂Ω ,
v ∈ Vh ⊕ H 2 (Ω).
(11)
We note that the use of this norm in the error analysis is essentially dictated by Nitsche’s method and not
by the model problem. We obtain coercivity and continuity in the following two lemmas.
Lemma 3 (Coercivity). There holds:
ah (u, u) ≥
1
|||u|||2 for all u ∈ Vh .
5
4
(12)
Proof. Exploiting the eigenvalue characterization in the definition of λT we obtain for arbitrary γ > 0:
Z
1
1
−1
λT 2 ∂n u λT2 u ds
ah (u, u) ≥ k∇uk2Ω + kλT2 uk2∂Ω − 2
∂Ω
1 − 12
kλ ∂n uk2∂Ω
γ T
1
1
−1
≥ (1 − γ)k∇uk2Ω + (1 − γ)kλT2 uk2∂Ω + (2γ − )kλT 2 ∂n uk2∂Ω ≥ c|||u|||2 ,
γ
≥
k∇uk2Ω
+ (1 −
1
2
γ)kλT uk2∂Ω
with c = 1 − γ ∗ for γ ∗ > 0 such that 1 − γ ∗ = 2γ ∗ −
that c > 15 .
−
1
γ∗ ,
(13)
which has only the positive solution γ ∗ =
√
1+ 13
6
so
Lemma 4 (Continuity). There holds:
ah (u, v) ≤ 2|||u||||||v||| for all u, v ∈ Vh ⊕ H 2 (Ω).
(14)
Proof. With Cauchy-Schwarz we directly obtain:
−1
1
−1
1
1
1
ah (u, v) ≤ k∇ukΩ k∇vkΩ +kλT 2∂n uk∂Ω kλT2 vk∂Ω +kλT 2∂n vk∂Ω kλT2 uk∂Ω +kλT2 uk∂Ω kλT2 vk∂Ω
1
1
−1
−1
≤ k∇ukΩ k∇vkΩ + kλT 2∂n uk∂Ω + kλT2 uk∂Ω kλT 2∂n vk∂Ω + kλT2 vk∂Ω
1
1
2 12
2 12
−1
−1
k∇vk2Ω + kλT 2∂n vk∂Ω + kλT2 vk∂Ω
≤ k∇uk2Ω + kλT 2∂n uk∂Ω + kλT2 uk∂Ω
12
21
1
1
−1
−1
≤ k∇uk2Ω + 2kλT 2∂n uk2∂Ω + 2kλT2 uk2∂Ω
k∇vk2Ω + 2kλT 2∂n vk2∂Ω + 2kλT2 vk2∂Ω .
(15)
Applying these lemmas and exploiting that the Nitsche formulation is consistent in the sense of Galerkin
orthogonality, we obtain Céa’s Lemma [42]:
Lemma 5 (Céa’s Lemma). Let u ∈ H 2 (Ω) be the solution to (1) and uh ∈ Vh be the solution to (6). Then
there holds:
|||u − uh ||| ≤ 11 inf |||u − vh |||.
(16)
vh ∈Vh
Proof. For an arbitrary vh ∈ Vh there holds |||u − uh ||| ≤ |||u − vh ||| + |||vh − uh ||| and:
|||vh − uh |||2 ≤ 5ah (vh − uh , vh − uh ) = 5ah (vh − u, vh − uh ) ≤ 10|||vh − uh ||||||vh − u|||,
(17)
s.t. the claim directly follows.
We note that in the proof we could not use coercivity for u − uh , but only for discrete functions. To
this end we applied the triangle inequality and were able to apply the coercivity estimate on the discrete
function vh − uh , which was then combined with Galerkin orthogonality and continuity in the usual way.
This version of Céa’s lemma suggests that Nitsche’s method provides a robust and quasi-optimal method.
The best approximation is, however, only provided in the mesh-dependent norm ||| · |||. In the next paragraph
we discuss the discretization error of the best approximation in this norm.
4.2. Approximability of the solution in the mesh-dependent energy norm
We consider the approximability of the solution u with the finite element space Vh in the energy norm, i.e.,
inf vh ∈Vh |||u − vh |||, which is the r.h.s. in (16). The aim of this paragraph is to show that the approximability
in the discrete energy norm is not robust with respect to the position of the domain boundary. To this end,
5
we split the energy norm, cf. (11), into two parts with one part that is robust and one part which is not
robust:
o
n
1
−1
inf |||u − vh |||2 ≥ inf k∇(u − vh )k2Ω + kλT 2 ∂n (u − vh )k2∂Ω + inf kλT2 (u − vh )k2∂Ω .
(18)
vh ∈Vh
vh ∈Vh
vh ∈Vh
k+1
We assume that the solution u is smooth, u ∈ H
(Ω), with k ≥ 1 denoting the order of the discretization.
In the sequel we use the notation & for an inequality with a constant that is independent of the cut
configuration. For the first part of the r.h.s. in (18) we take the idea from [21] to show that the solution can
be optimally approximated in Vh with respect to these parts of the norm independent of the cut position.
Afterwards, we show that the remaining part is the crucial problem which results in the missing robustness.
e be a continuous extension of u to Ω
e (the embedding domain, i.e., the union of all
Let ũ ∈ H k+1 (Ω)
active elements), then we have:
k∇(u − vh )kΩ = k∇(ũ − vh )kΩ . k∇(ũ − vh )kΩ
e,
∀ vh ∈ Vh .
To bound the latter part we can apply a standard best approximation result for Vh on the fitted mesh
Te . This estimate is robust in the position of the boundary, i.e., there is a vh ∈ Vh s.t. k∇(u − vh )kΩ .
−1
k
hk kũkH k+1 (Ω
e) . h kukH k+1 (Ω) . Further, due to λT . hT and a trace inequality, we have:
−1
kλT 2 ∂n vk∂Ω∩T . kvkH 1 (Ω∩T ) + hT kvkH 2 (Ω∩T ) ,
∀ v ∈ H 2 (Ω ∩ T ).
−1
Applying this to u−vh gives similar results (independent of the position of the boundary), hence kλT 2 ∂n (u−
vh )k∂ Ω . hk kukH k+1 (Ω) .
We now consider the second term in (18) which is the crucial problem for the approximation of u in the
energy norm:
X
1
kλT2 (u − vh ) k2∂Ω =
λT ku − vh k2T ∩∂Ω .
T ∈T
Let hΩ∩T := diam(Ω ∩ T ) and h∂Ω∩T := diam(∂Ω ∩ T ) be the characteristic lengths of the cut elements and
their parts on the boundary. Furthermore, let ṽh be the best approximation of u in Vh in the energy norm.
2k+2+(d−1)
We have that ku − ṽh k2T ∩∂Ω is typically not zero and scales with h∂Ω∩T
, d − 1 denoting the dimension of
the boundary. In the good case, if the cut element T ∩ Ω is shape regular, there holds h∂Ω∩T ∼ hΩ∩T ∼ λ−1
T
2k+1+(d−1)
such that we would have λT ku − ṽh k2T ∩∂Ω ≤ ch∂Ω∩T
≤ ch2k+d
for some (bounded) constant c > 0
T
which is a robust bound for the element contribution of T . In the bad case, if the cut element is not shape
regular however, such as for a sliver cut element in Figure 2, it can occur that λT h−1
∂Ω∩T , such that the
contribution of a single element λT ku − ṽh k2T ∩∂Ω becomes unbounded.
We conclude that the last term in (18) is unbounded and thus the same holds for the left hand side.
Therefore the discretization error in the mesh-dependent energy norm, regardless of the best approximation
property, can not be bounded from above. This missing robustness is essentially due to the possible existence
of unfortunate cut configurations such as sliver cuts, which introduce values of the penalization parameter,
λT , that are not bounded in terms of the reciprocal of the length of the boundary intersecting element T ,
h∂Ω∩T .
The energy norm is very natural with respect to the (symmetric) Nitsche formulation. Nevertheless,
one is typically not interested in this norm but rather in the H 1 (Ω)-norm of the error. To obtain a priori
estimates for the error in the H 1 (Ω)-norm we use a Poincaré-type inequality and combine it with the result
in Céa’s lemma:
ku − uh kH 1 (Ω) . |||u − uh ||| . inf |||u − vh |||.
(19)
vh ∈Vh
Whilst the approximability in the energy norm is not robust with respect to the boundary position, these
inequalities are independent of the boundary position† . Therefore we can not give an optimal a priori error
estimate for the H 1 (Ω)-norm.
1
† By
e.g., Lemma B.63 in [43] we have |||u|||2 ≥ k∇uk2Ω + kλT2 uk2∂Ω ≥ k∇uk2Ω + λ̃kuk2∂Ω ≥ δ 2 kvk2H 1 (Ω) , with λ̃ ∼ 1/h the
lower bound for λT .
6
Besides showing that the traditional method to show optimality does not hold for Nitsche’s method, we
can also give an intuitive derivation of why Nitche’s method can yield bad approximations in the H 1 (Ω)norm. To do this, we compare the energy and Sobolev norms. At first sight these norms are not even
1
equivalent, as kλ− 2 ∂n vk∂Ω is not bounded by the H 1 (Ω)-norm. This holds for all (even unsymmetric or
fitted) Nitsche-type formulations however, and is not related to the problem of unbounded stabilization
parameters we are targeting here. When we restrict ourselves to the space Wh = Vh ⊕ hui, both norms are
equivalent:
ckvh kH 1 (Ω) ≤ |||vh ||| ≤ Ckvh kH 1 (Ω) , ∀vh ∈ Wh .
(20)
To investigate the strength of this equivalence, we examine the constants c and C in (20). The first constant
0 < δ † < c < 1 is bounded from below and above independent of u or the cut configuration. The upper
bound of c follows from:
|||vh |||
|vh |H 1
|||vh |||
. min
= min
< 1,
(21)
c = min
⊥
⊥
vh ∈Wh kvh kH 1 (Ω)
vh ∈ Vh |∂Ω kvh kH 1 (Ω)
vh ∈ Vh |∂Ω kvh kH 1 (Ω)
⊥
with Vh |∂Ω the restriction of Vh to functions that do not intersect the boundary, i.e.,
⊥
Vh |∂Ω = {vh ∈ Vh |vh = ∂n vh = 0 on ∂Ω} .
The second constant in (20), C, does depend on the cut configuration:
C = max
vh ∈Wh
|||vh |||
|||vh |||
≥ max
.
vh ∈Vh kvh kH 1 (Ω)
kvh kH 1 (Ω)
(22)
Due to the finite dimensionality of Wh we have C < ∞, but, in contrast to c, C clearly depends on λ and
−1
therefore on the cut configuration. The inequality in (22) disregards the possibility that kλT 2 vh k∂Ω
kvh kH 1 (Ω) for vh ∈ Wh due to possibly large normal derivatives of solution u, i.e., the general limitation
for Nitsche-type methods we mentioned before. But also when this is not the case, C will be large for large
values of λ however. Therefore, depending on the cut configuration, the equivalence between the energy
norm and the H 1 (Ω)-norm can degenerate, such that the projections in the different norms can deviate from
each other. With the solution to Nitsche’s method closely resembling the projection in the energy norm,
this may deviate substantially from an optimal approximation in H 1 (Ω).
Remark 6. Using c and C we can also extend (19):
kuh − vh kH 1 (Ω) ≤
1
1
C
|||uh − vh ||| ≤ 10 |||u − vh ||| ≤ 10 ku − vh kH 1 (Ω) ,
c
c
c
∀vh ∈ Vh ,
(23)
such that:
C
10 + 1 inf ku − vh kH 1 (Ω) .
vh ∈Vh
c
This seems like a satisfying result, but note that C/c 1 when λ 1.
ku − uh kH 1 (Ω) ≤
(24)
5. Numerical examples
In this section we will demonstrate some examples of situations where the previously discussed discretization leads to large values for the stabilization parameter. The aim of this section is to illustrate the problem
described in Section 4 and to show that it is not just a problem in the a priori analysis, but really yields
large discretization errors in practice.
The numerical integration on elements that only partially intersect the domain is performed using the
bisection-based tessellation scheme proposed in [44] with a maximal refinement depth of two. This leads
to an exact representation of the domain for the first three examples and a reasonable good geometric
approximation for the other examples. To make sure the results of these last examples are not affected by
geometrical errors, we adapt the boundary conditions to the approximated geometry. On the approximated
geometry we apply Gauss quadrature such that functions of order 2k + 1 are integrated exactly, in order to
achieve an accurate integration of the force terms and the boundary conditions.
7
5.1. Example 1: An overlapping square on a triangular and quadrilateral mesh
The simplest example of a discretization with sliver cuts as described in the Section 3 is the squared
domain Ω = (−1 − ε, 1 + ε)2 with 0 < ε 1 on a structured grid that aligns with Ω for ε = 0. The domain
and the grid are shown in Figure 3a (for the triangular mesh), in which it is clearly visible that the cut
elements become of arbitrarily large aspect ratios for ε → 0.
Triangular grid
We use a triangular mesh of isosceles right triangles with legs of length h = 1/K with K = 16 and
continuous piecewise linear basis functions. We apply an element local stabilization parameter by the
procedure described in Section 3. We set up the problem such that the analytical solution equals u =
sin(πx) + sin(πy) and impose Dirichlet conditions through the previously discussed Nitsche method on all
boundaries.
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
104
102
100
10−2
ε
10−10
ε
(a) Mesh and domain Ω.
10−8
10−6
ε
10−4
10−2
(b) Discretization errors.
Figure 3: Example 1 with a triangular grid.
The resulting discretization errors in the mesh-dependent energy norm, the H 1 (Ω)-norm and the L2 (Ω)norm are given in Figure 3b. From the results it is clearly visible that for ε → 0 the discretization error
degenerates in both the energy as the H 1 (Ω)-norm.
Quadrilateral grid
We repeat the example on a quadrilateral grid with the same nodal positions as the triangular grid, i.e.,
the mesh size h = 1/K with K = 16, see Figure 4a. Piecewise bilinear elements are used which lead to the
same number of degrees of freedom. The results are shown in Figure 4b, from which we can observe the
same tendencies for the convergence ε → 0.
We observe that the impact of a small ε is less severe on the quadrilateral grid compared to the triangular
grid. The error is several orders of magnitude smaller and the diverging effect only starts at a smaller value
of ε. This difference is explained in the next paragraph, which is not a rigorous proof, but gives an intuitive
illustration of the nature of the difference. It further serves as a motivation for the design of Examples 2
and 3.
Discussion of the difference between triangular and quadrilateral grids
In Section 4.1 we have seen that the numerical solution closely approximates the energy norm projection
of the analytical solution on the finite dimensional function space. For large values of λT , the contribution
of normal derivatives to the energy norm diminishes and we can consider the energy norm to be a weighted
combination of an L2 (∂Ω)-norm on the boundary and an H01 (Ω)-seminorm in the interior. For increasing
8
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
104
102
100
10−2
ε
10−10
ε
(a) Mesh and domain Ω.
10−8
10−6
ε
10−4
10−2
(b) Discretization errors.
Figure 4: Example 1 with a quadrilateral grid.
λT ∝ ε−1 , the balance between these weighted norms is lost, and the energy norm projection basically
consists of an L2 (∂Ω)-norm projection for all d.o.f.’s supported on the boundary and an H01 (Ω)-seminorm
projection in the interior for the remaining d.o.f.’s. Hence, in the limit of ε → 0, the numerical solution uh
satisfies:
1
ε→0
uh |∂Ω −→ u∗h := argmin kλT2 (vh − g)k2L2 (∂Ω) .
(25)
vh ∈Vh |∂Ω
Hence M := dim(Vh |∂Ω ) d.o.f.’s are fixed independently of the remaining part of the variational formulation.
Note that M = 16K +7 for the triangular grid (corresponding to the number of dots minus one in Figure 5a)
and that M = 8K + 8 for the quadrilateral grid (corresponding directly to the number of dots in Figure 5b).
Besides constraining the boundary values, the L2 (∂Ω)-norm projection on the boundary can also affect the
normal derivatives or even the complete numerical solution in the cut elements however. Let N denote
the number of basis functions with support on ∂Ω (squares in Figure 5), then we have N = 16K + 8 for
both meshes. Note that N is also equal to the number of basis functions supported on cut elements. For
the triangular grid we have M = N − 1, which implies that in the limit of ε → 0 only one d.o.f. in all
cut elements together is not constrained by the boundary condition. For the quadrilateral mesh we have
M = 1/2N + 4, such that only approximately half of the d.o.f.’s supported on the boundary is constrained
by the boundary condition. Along the straight parts of the boundary, the normal derivatives can therefore
be set by the H01 (Ω)-seminorm projection in the interior independent of the boundary condition. Only in
the corners the normal derivatives are constrained by the boundary condition. As the problematic area is
much smaller compared to the case with the triangular mesh, the impact of large stabilization parameters
is – although asymptotically the same – less severe.
(a) Triangular grid.
(b) Quadrilateral grid.
Figure 5: Sketch of d.o.f.’s of Vh (squares) and d.o.f.’s of Vh |∂Ω (dots).
From Figures 3b and 4b it is clear that small values of ε do not only yield bad approximations, but
actually cause diverging discretization errors. To explain this effect, we note that the boundary data g has
9
magnitudes ∼ 1 whilst the basis functions that are only supported on cut elements have values of magnitude
∼ ε on the boundary. The L2 (∂Ω)-norm projection of the boundary condition therefore constrains the
coefficients of these basis functions to a value of magnitude ∼ ε−1 . This results in gradients in the cut
elements that scale with ε−1 , which has also been observed by peak stresses in immersed elasticity problems
1
[45, 46]. These large gradients introduce an O(ε− 2 ) error in the H 1 (Ω)-norm, i.e., the sum of the volumes of
the cut elements has a magnitude of ∼ ε, whilst the error in the gradient squared has a value of magnitude
∼ ε−2 . We notice that the L2 (Ω)-norm error seems to be unaffected by the sliver cuts.
5.2. Example 2: An overlapping square with mixed boundary conditions
In this example we reuse the quadrilateral mesh and try to remove the problematic corner regions. To
this end, we pose Neumann conditions on the left and right boundaries, ∂ΩN = {|x| = 1 + ε}, and Dirichlet
conditions on the lower and upper boundaries, ∂ΩD = {|y| = 1 + ε}. Our hypothesis is that this will
yield good approximation results in the H 1 (Ω)-norm for the quadrilateral grid, because in that case an
L2 (∂ΩD )-norm projection on the Dirichlet boundary will constrain M = 4K + 6 d.o.f.’s whilst the number of
basis functions supported on the Dirichlet boundary equals N = 2M . On all elements, including the corner
elements, there is exactly one constraint for every two degrees of freedom. This allows to approximate the
boundary values without affecting the normal derivatives.
The results are visible in Figure 6 and indeed show that in this situation the error in the H 1 (Ω)-norm
1
is robust with respect to ε, even though the error in the mesh-dependent energy norm still scales with ε− 2 .
This is because also the best possible approximation of the boundary conditions has an error, such that the
energy norm error increases for increasing
λ. Furthermore, we notice that the errors in the energy norm are
√
reduced by approximately a factor 2, which is accounted for by the reduction of the size of the Dirichlet
boundary by a factor 2.
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
102
100
10−2
10−10
10−8
10−6
ε
10−4
10−2
Figure 6: Discretization errors for Example 2.
5.3. Example 3: A tilted square with mixed boundary conditions
In this example we demonstrate that Example 2, be it useful for academic purposes, does not represent
a general case for straight boundaries and tensor product grids. The reason that the second example yields
robust approximation errors is that the Dirichlet boundary is parallel to a grid line, such that N = 2M ,
i.e., the number of d.o.f.’s constrained by the L2 (∂ΩD )-norm projection is exactly right for linear bases.
This is not generally the case for immersed methods however. In this third example we do not consider the
square with boundaries ∂ΩN = {|x| = 1 + ε} and ∂ΩD = {|y| = 1 + ε}, but consider a kinked domain with
boundaries ∂ΩN = {|x − εy| = 1} and ∂ΩD = {|y − εx| = 1} as can be seen in Figure 7a. The (quadrilateral)
grid and the analytical solution are the same as in the previous examples.
In this configuration we have M = 8K + 6 constraints in the L2 (∂ΩD )-norm projection on the Dirichlet
boundary and N = 8K +10 basis functions that are supported on the Dirichlet boundary. Even though there
is a kernel of dimension 4 in the projection of the boundary conditions on the nodes that are supported on
the Dirichlet boundary, basis functions with values of magnitude ∼ on the boundary will be constrained
10
103
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
2
10
101
100
10−1
ε
1−ε
10−2
ε
1+ε
ε
1−ε
ε
1+ε
10−10
ε
1+ε
10−8
(a) Mesh and domain Ω.
10−6
ε
10−4
10−2
(b) Discretization errors.
Figure 7: Example 3.
to nodal values of magnitude ∼ ε−1 . The results in Figure 7b indeed show similar behavior to the first
example.
5.4. Example 4: A rounded square (k · k8 -norm unit ball)
The previous examples consisted of domains with piecewise straight boundaries. Because unfitted methods are generally used for complex domains, this example involves a curved boundary that creates sliver-like
cuts which can occur in many realistic applications. The boundary of the domain is defined by the function
x8 + y 8 = (1 + ε)8 and Dirichlet conditions are imposed on the complete boundary. A sketch of the domain
is visible in Figure 8a.
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
102
101
100
10−1
10−2
ε
10−10
ε
10−8
10−6
ε
10−4
10−2
(b) Discretization errors.
(a) Mesh and domain Ω.
Figure 8: Example 4.
The results are visible in Figure 8b. From the results we note that for this example not even the error in
the L2 (Ω)-norm is robust with respect to the cut configuration. Furthermore, a peculiar effect is observed
as the errors don’t simply increase for decreasing ε, but peak at certain values. This occurs because a
smaller value of ε doesn’t simply imply thinner cut elements for this test case. The zones of the domain
that constitute the thin (or sliver) cut elements – the parts of the domain for which |x| > 1 or |y| > 1 – do
11
not only get thinner but also get shorter for decreasing ε. The intersections between the domain boundary
and the grid lines x = ±1 and y = ±1 form the boundaries of these zones, and move towards the points
x = ±1, y = 0 and x = 0, y = ±1 for ε → 0. As a result, the cut elements become thinner for decreasing
ε until these intersections shift through a vertex, removing the thinnest cut element from the system. At
this point the error decreases, after which it again increases until the intersection shifts through the next
vertex. Counting the number of degrees of freedom in the system confirms that the errors peak at values
of ε where the intersection between the boundary and the grid lines x = ±1 and y = ±1 shift through a
vertex, because at these values also the number of degrees of freedom is reduced, which is indicated by the
vertical gray dash dotted lines in the figure.
5.5. Higher order basis functions and three-dimensional domains
The same effects as observed in the previous examples occur for higher order basis functions and threedimensional domains. The fourth example has also been used to investigate the behavior of a second order
discretization. The results are visible in Figure 9. Note that this also requires a larger stabilization parameter
as the space Vh |0T in (10) is larger for higher order bases. In Figure 10 the results of example 4 in a threedimensional setting are visible. The domain is defined as x8 + y 8 + z 8 < (1 + ε)8 , Dirichlet conditions are
imposed on the complete boundary and the approximated solution equals u = sin(πx) + sin(πy) + sin(πz).
For this three-dimensional computation we have used a first order trilinear basis on a grid with size h = 1/8
instead of h = 1/16 and the maximal refinement depth has been reduced to 0 to save computation time.
Also in three dimensions the same effect is observed.
102
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
102
100
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
101
100
10−2
10−1
10−2
10−4
10−10
10−8
10−6
ε
10−4
10−10
10−2
Figure 9: Second order B-splines.
10−8
10−6
ε
10−4
10−2
Figure 10: Three-dimensional example.
5.6. Summary of observations
In the previous examples we observed that sliver-like cut configurations (on Dirichlet boundaries) can
cause severe problems in the discretization. The discretization error measured in the H 1 (Ω)-norm and
the mesh-dependent energy norm can not be bounded independently of ε, the parameter that controls the
volume ratios in the sliver cut elements. While the L2 (Ω)-norm error seems to be robust for the simple
cases, it is not for the more complex examples.
We tried to give an interpretation of the origins that trigger the large errors for small ε and were able to
characterize a difference in the relative number of d.o.f.’s involved in the projection of the Dirichlet conditions
by the penalty terms. As a result, in Example 1 the effect is more severe for the triangular discretization
than for the quadrilateral discretization. On specific domains, the instabilities due to the sliver cases are
even not triggered at all, as demonstrated in Example 2. This is similar to penalty methods for boundary
fitting discretizations, where exactly the right number of d.o.f.’s is involved in the penalty, such that very
large penalties can be applied [47]. However, small deviations immediately display the missing robustness
12
with respect to ε and lead to large errors, cf. Example 3. We have obtained similar results for a more
complicated domain with curved boundaries, for quadratic basis functions and in three dimensions, such
that the results do not only apply for piecewise (bi-)linear discretizations and two-dimensional problems on
simple domains.
6. Conclusion and resolutions of the problem
From Section 4 and 5 it is evident that the stabilization parameter needs to be bounded in order to
guarantee optimal approximation properties. In fact, several modifications of Nitsche’s method that preclude
the previously discussed problems already exist in the literature. We divide these in three groups. Firstly,
we discuss alternatives to the symmetric Nitsche formulation. Secondly, there exist approaches to preclude
degrees of freedom that have very small supports in the problem domain, such that the required stabilization
parameter is bounded. Thirdly, we discuss a stabilization mechanism called the ghost penalty, which achieves
a similar effect by penalizing jumps in normal derivatives along boundaries of cut elements.
6.1. Alternative formulations
The most obvious alternative for the symmetric Nitsche formulation is the unsymmetric Nitsche formulation, e.g., [48–50], which however is not adjoint consistent. Other methods to weakly impose Dirichlet
conditions are the penalty method and the use of Lagrange multipliers and related methods, e.g., [47, 51–53].
Another approach with unfitted grids is to manipulate the function space such that it allows for the strong
imposition of boundary conditions, i.e., [54–56].
6.2. Precluding d.o.f.’s with small supports in the problem domain
When the system does not contain functions with very small supports in the problem domain, it follows
from (10) that the required stabilization parameter is reduced. This is an additional advantage of methods
that eliminate functions with very small supports from the system, which were initially introduced in order
to improve the conditioning of the system matrix. The simplest way to achieve this is by simply excluding
these basis functions from the basis, e.g., [28, 44, 56, 57], which however may decrease the accuracy. In
[54, 55, 58–60], functions with small supports in the problem domain are constrained to geometrically
nearby functions, which decreases the required stabilization parameter without compromising the accuracy.
Another approach that precludes basis functions from having a very small stiffness (having the same effect
as precluding functions with a very small support) is using a fictitious domain stiffness, e.g., [12], which is
thoroughly analyzed in [61].
6.3. Ghost penalty
The ghost penalty, see [2, 26], is a consistent penalty term that can be added to the bilinear form and
which is customary in methods referred to as CutFEM, see e.g., [3]. The ghost penalty introduces a penalty
in the vicinity of the boundary that weakly bounds polynomials of neighboring elements to coincide. This
is done by adding terms that penalize jumps in the normal derivatives along element interfaces or local
projection type penalties [62]. This weakly enforces higher order continuity along element interfaces near
the boundary, and therefore relates functions with small support in the boundary region to interior functions.
Similar to strongly enforcing this higher order continuity by constraining basis functions with small supports
to geometrically nearby functions, this effectively controls and bounds the stabilization parameter. Besides
bounding the stabilization parameter, penalizing the jumps in the normal derivatives gives control over the
gradients in cut elements and therefore impede gradients of magnitude ∼ ε−1 , which we observed in the cut
elements.
Remark 7. Inspired by the observations in the experiments, we also suggest a quick fix that is simple to
implement. To alleviate the problem of unbounded stabilization parameters, we modify Nitsche’s method to
a hybrid Nitsche-penalty method. First, we manually set an upper bound for the stabilization parameter
Cλ > 0. We then use Nitsche’s method on the elements where the required stabilization parameter (computed
13
as in (10)) is smaller than this upper bound and use a penalty method ( i.e., no flux terms) with penalty
parameter Cλ on the elements where Nitsche’s method would require a larger value than this manually set
upper bound. Bounding the penalty parameter is easily motivated from an accuracy point of view, when
considering the results and analysis previously presented in this manuscript. It is noted that a pure penalty
method is not consistent with the initial problem (9). This inconsistency can be argued to be acceptable
however, considering that this generally only occurs on very small parts of the domain and that on these
parts of the boundary the flux terms are negligibly small compared to the penalty terms anyway.
This hybrid Nitsche-penalty method yields good approximations in the H 1 (Ω)-norm for the fourth test
case, with Cλ = 16·103 . The results are visible in Figure 11 and show that the quality of the approximation is
virtually independent of ε. This suggests that this could be a simple and straightforward fix for this problem.
We consider this a preliminary result however, as this adaptation of the method has not undergone rigorous
testing. Also setting the value of Cλ needs a more thorough analysis and could require different values for
different mesh sizes, higher order discretizations and other problems than Poisson’s problem.
102
|||u − uh |||
ku − uh kH 1 (Ω)
ku − uh kL2 (Ω)
100
10−2
10−10
10−8
10−6
ε
10−4
10−2
Figure 11: Discretization errors of the modification of Nitche’s method for Example 4. The energy norm error for this hybrid
−1
1
1
method is defined as: |||v|||2 := k∇vk2Ω + kλT 2 ∂n vk2ΓNitsche + kλT2 vk2ΓNitsche + kCλ2 vk2Γpenalty .
Acknowledgement
The research of F. de Prenter was funded by the NWO under the Graduate Program Fluid & Solid Mechanics.
C. Lehrenfeld gratefully acknowledges funding by the German Science Foundation (DFG) within the project
LE 3726/1-1.
References
[1] R. Glowinski, T. Pan, J. Periaux, A fictitious domain method for Dirichlet problem and applications, Computer Methods
in Applied Mechanics and Engineering 111 (3–4) (1994) 283–303.
[2] E. Burman, P. Hansbo, Fictitious domain finite element methods using cut elements: II. A stabilized Nitsche method,
Applied Numerical Mathematics 62 (4) (2012) 328–341.
[3] E. Burman, S. Claus, P. Hansbo, M. Larson, A. Massing, CutFEM: Discretizing geometry and partial differential equations,
International Journal for Numerical Methods in Engineering 104 (7) (2014) 472–501.
[4] A. Massing, M. Larson, A. Logg, M. Rognes, A stabilized Nitsche fictitious domain method for the Stokes problem, Journal
of Scientific Computing 61 (3) (2014) 604–628.
[5] E. Burman, S. Claus, A. Massing, A Stabilized Cut Finite Element Method for the Three Field Stokes Problem, SIAM
Journal on Scientific Computing 37 (4) (2015) A1705–A1726.
[6] J. Parvizian, A. Düster, E. Rank, Finite cell method, Computational Mechanics 41 (1) (2007) 121–133.
[7] A. Düster, J. Parvizian, Z. Yang, E. Rank, The finite cell method for three-dimensional problems of solid mechanics,
Computer Methods in Applied Mechanics and Engineering 197 (45) (2008) 3768–3782.
[8] D. Schillinger, L. Dede, M. Scott, J. Evans, M. Borden, E. Rank, T. Hughes, An isogeometric design-through-analysis
methodology based on adaptive hierarchical refinement of NURBS, immersed boundary methods, and T-spline CAD
surfaces, Computer Methods in Applied Mechanics and Engineering 249 (2012) 116–150.
14
[9] E. Rank, M. Ruess, S. Kollmannsberger, D. Schillinger, A. Düster, Geometric modeling, isogeometric analysis and the
finite cell method, Computer Methods in Applied Mechanics and Engineering 249 (2012) 104–115.
[10] M. Ruess, D. Schillinger, Y. Bazilevs, V. Varduhn, E. Rank, Weakly enforced essential boundary conditions for NURBSembedded and trimmed NURBS geometries on the basis of the finite cell methodod, International Journal for Numerical
Methods in Engineering 95 (10) (2013) 811–846.
[11] M. Ruess, D. Schillinger, A. Özcan, E. Rank, Weak coupling for isogeometric analysis of non-matching and trimmed
multi-patch geometries, Computer Methods in Applied Mechanics and Engineering 269 (2014) 46–71.
[12] D. Schillinger, M. Ruess, The Finite Cell Method: A review in the context of higher-order structural analysis of CAD and
image-based geometric models, Archives of Computational Methods in Engineering (2015) 1–65.
[13] D. Kamensky, M.-C. Hsu, D. Schillinger, J. Evans, A. Aggarwal, Y. Bazilevs, M. Sacks, T. Hughes, An immersogeometric
variational framework for fluid–structure interaction: Application to bioprosthetic heart valves, Computer Methods in
Applied Mechanics and Engineering 284 (2015) 1005–1053.
[14] V. Varduh, M.-C. Hsu, M. Ruess, D. Schillinger, The tetrahedral finite cell method: Higher-order immersogeometric
analysis on adaptive non-boundary-fitted meshes, International Journal for Numerical Methods in Engineering 107 (12)
(2016) 1054–1079.
[15] F. Xu, D. Schillinger, D. Kamensky, V. Varduhn, C. Wang, M.-C. Hsu, The tetrahedral finite cell method for fluids:
Immersogeometric analysis of turbulent flow around complex geometries, Computers & Fluids 141 (2016) 135–154.
[16] C. Peskin, The immersed boundary method, Acta Numerica 11 (2002) 479–517.
[17] P. Bastian, C. Engwer, An unfitted finite element method using discontinuous Galerkin, International Journal for Numerical
Methods in Engineering 79 (12) (2009) 1557–1576.
[18] R. Massjung, An Unfitted Discontinuous Galerkin Method Applied to Elliptic Interface Problems, SIAM Journal on
Numerical Analysis 50 (6) (2012) 3134–3162.
[19] T. Belytschko, N. Moes, S. Usui, C. Parimi, Arbitrary discontinuities in finite elements, International Journal for Numerical
Methods in Engineering 50 (4) (2001) 993–1013.
[20] T.-P. Fries, T. Belytschko, The extended/generalized finite element method: an overview of the method and its applications, International Journal for Numerical Methods in Engineering 84 (3) (2010) 253–304.
[21] A. Hansbo, P. Hansbo, An unfitted finite element method, based on Nitsche’s method, for elliptic interface problems,
Computer Methods in Applied Mechanics and Engineering 191 (47–48) (2002) 5537 – 5552.
[22] S. Groß, V. Reichelt, A. Reusken, A finite element based level set method for two-phase incompressible flows, Computing
and Visualization in Science 9 (4) (2006) 239–257.
[23] R. Becker, E. Burman, P. Hansbo, A Nitsche extended finite element method for incompressible elasticity with discontinuous modulus of elasticity, Computer Methods in Applied Mechanics and Engineering 198 (41) (2009) 3352 – 3360.
[24] R. Becker, E. Burman, P. Hansbo, A hierarchical NXFEM for fictitious domain simulations, International Journal for
Numerical Methods in Engineering 86 (4) (2011) 549–559.
[25] J. Nitsche, Über ein Variations zur Lösung von Dirichlet-Problemen bei Verwendung von Teilräumen die keinen Randbedingungen unterworfen sind, Abhandlungen aus dem mathematischen Seminar der Universität Hamburg 36 (1) (1971)
9–15.
[26] E. Burman, Ghost penalty, Comptes Rendus Mathematique 348 (21) (2010) 1217–1220.
[27] P. Grisvard, Elliptic problems in nonsmooth domains, Pitman, 1985.
[28] A. Embar, J. Dolbow, I. Harari, Imposing Dirichlet boundary conditions with Nitsche’s method and spline based finite
elements, International Journal for Numerical Methods in Engineering 83 (7) (2010) 877–898.
[29] T. Warburton, J. Hesthaven, On the constants in hp-finite element trace inverse inequalities, Computer Methods in
Applied Mechanics and Engineering 192 (25) (2003) 2765–2773.
[30] Z. Yang, M. Ruess, S. Kollmannsberger, A. Düster, E. Rank, An efficient integration technique for the voxel-based finite
cell method, International Journal for Numerical Methods in Engineering 91 (5) (2012) 457–471.
[31] A. Abedian, J. Parvizian, A. Düster, H. Khademyzadeh, E. Rank, Performance of different integration schemes in facing
discontinuities in the finite cell method, International Journal of Computational Methods 10 (3).
[32] S. Duczek, U. Gabbert, Efficient integration method for fictitious domain approaches, Computational Mechanics 56 (4)
(2015) 725–738.
[33] T.-P. Fries, S. Omerović, Higher-order accurate integration of implicit geometries, International Journal for Numerical
Methods in Engineering 106 (5) (2015) 323–371.
[34] C. Lehrenfeld, High order unfitted finite element methods on level set domains using isoparametric mappings, Computer
Methods in Applied Mechanics and Engineering 300 (2016) 716–733.
[35] M. Joulaian, S. Hubrich, A. Düster, Numerical integration of discontinuities on arbitrary domains based on moment fitting,
Computational Mechanics 57 (6) (2016) 979–999.
[36] L. Kudela, N. Zander, S. Kollmannsberger, E. Rank, Smart octrees: Accurately integrating discontinuous functions in 3D,
Computer Methods in Applied Mechanics and Engineering 306 (2016) 406–426.
[37] V. Thiagarajan, V. Shapiro, Adaptively Weighted Numerical Integration in the Finite Cell Method, Computer Methods
in Applied Mechanics and Engineering 311 (2016) 250–279.
[38] A. Stavrev, L. Nguyen, R. Shen, V. Varduhn, M. Behr, S. Elgeti, D. Schillinger, Geometrically accurate, efficient, and flexible quadrature techniques for the tetrahedral finite cell method, Computer Methods in Applied Mechanics and Engineering
310 (2016) 646–673.
[39] T.-P. Fries, S. Omerović, D. Schöllhammer, J. Steidl, Higher-order meshing of implicit geometries – Part i: Integration
and interpolation in cut elements, Computer Methods in Applied Mechanics and Engineering 313 (2017) 759–784.
[40] C. Lehrenfeld, A. Reusken, Optimal preconditioners for Nitsche-XFEM discretizations of interface problems, Numerische
15
Mathematik 135 (2) (2016) 313–332.
[41] F. de Prenter, C. Verhoosel, G. van Zwieten, E. van Brummelen, Condition number analysis and preconditioning for the
finite cell method, Computer Methods in Applied Mechanics and Engineering 316 (2017) 297–327.
[42] J. Céa, Approximation variationnelle des problèmes aux limites, Ph.D. thesis (1964).
[43] A. Ern, J. Guermond, Theory and Practice of Finite Elements, Springer, 2004.
[44] C. Verhoosel, G. Van Zwieten, B. Van Rietbergen, R. De Borst, Image-based goal-oriented adaptive isogeometric analysis
with application to the micro-mechanical modeling of trabecular bone, Computer Methods in Applied Mechanics and
Engineering 284 (2015) 138–164.
[45] L. van Miegroet, P. Duysinx, Stress concentration minimization of 2D filets using X-FEM and level set description,
Structural and Multidisciplinary Optimization 33 (4) (2007) 425–438.
[46] W. Jiang, C. Annavarapu, J. Dolbow, I. Harari, A robust Nitsche’s formulation for interface problems with spline-based
finite elements, International Journal for Numerical Methods in Engineering 104 (7) (2015) 676–696.
[47] I. Babuška, The finite element method with penalty, Mathematics of Computation 27 (122) (1973) 221–228.
[48] E. Burman, A penalty-free nonsymmetric Nitsche-type method for the weak imposition of boundary conditions, SIAM
Journal on Numerical Analysis 50 (4) (2012) 1959–1981.
[49] T. Boiveau, E. Burman, A penalty-free Nitsche method for the weak imposition of boundary conditions in compressible
and incompressible elasticity, IMA Journal of Numerical Analysis 36 (2) (2016) 770–795.
[50] D. Schillinger, I. Harari, M.-C. Hsu, D. Kamensky, S. Stoter, Y. Yu, Y. Zhao, The non-symmetric Nitsche method for the
parameter-free imposition of weak boundary and coupling conditions in immersed finite elements, Computer Methods in
Applied Mechanics and Engineering 309 (2016) 625–652.
[51] I. Babuška, The finite element method with Lagrangian multipliers, Numerische Mathematik 20 (3) (1973) 179–192.
[52] S. Fernández-Méndez, A. Huerta, Imposing essential boundary conditions in mesh-free methods, Computer Methods in
Applied Mechanics and Engineering 193 (12) (2004) 1257–1275.
[53] J. Baiges, R. Codina, F. Henke, S. Shahmiri, W. Wall, A symmetric method for weakly imposing Dirichlet boundary
conditions in embedded finite element meshes, International Journal for Numerical Methods in Engineering 90 (5) (2012)
636–658.
[54] K. Höllig, U. Reif, J. Wipper, Weighted extended B-spline approximation of Dirichlet problems, SIAM Journal on Numerical Analysis 39 (2) (2001) 442–462.
[55] K. Höllig, C. Apprich, A. Streit, Introduction to the WEB–method and its applications, Advances in Computational
Mathematics 23 (1) (2005) 215–237.
[56] R. Sanches, P. Bornemann, F. Cirak, Immersed b-spline (i-spline) finite element method for geometrically complex domains,
Computer Methods in Applied Mechanics and Engineering 200 (13) (2011) 1432–1445.
[57] A. Reusken, Analysis of an extended pressure finite element space for two-phase incompressible flows, Computing and
visualization in science 11 (4) (2008) 293–305.
[58] T. Rüberg, F. Cirak, Subdivision–stabilised immersed b–spline finite elements for moving boundary flows, Computer
Methods in Applied Mechanics and Engineering 209 (2012) 266–283.
[59] T. Rüberg, F. Cirak, A fixed-grid b-spline finite element technique for fluid–structure interaction, International Journal
for Numerical Methods in Fluids 74 (9) (2014) 623–660.
[60] T. Rüberg, F. Cirak, J. Garcı́a Aznar, An unstructured immersed finite element method for nonlinear solid mechanics,
Advanced Modeling and Simulation in Engineering Sciences 3 (1) (2016) 623–660.
[61] M. Dauge, A. Düster, E. Rank, Theoretical and Numerical Investigation of the Finite Cell Method, Journal of Scientific
Computing 65 (3) (2015) 1039–1064.
[62] R. Becker, M. Braack, A finite element pressure gradient stabilization for the Stokes equations based on local projections,
Calcolo 38 (4) (2001) 173–199.
16
| 5cs.CE
|
Solution of the square lid-driven cavity flow of a Bingham plastic using the
finite volume method
Alexandros Syrakosa , Georgios C. Georgioub,a,∗, Andreas N. Alexandrouc
a
Oceanography Centre, University of Cyprus, PO Box 20537, 1678 Nicosia, Cyprus
Department of Mathematics and Statistics, University of Cyprus, PO Box 20537, 1678 Nicosia, Cyprus
c
Department of Mechanical and Manufacturing Engineering, University of Cyprus, PO Box 20537, 1678 Nicosia, Cyprus
arXiv:1604.08461v1 [physics.comp-ph] 28 Apr 2016
b
Abstract
We investigate the performance of the finite volume method in solving viscoplastic flows. The creeping
square lid-driven cavity flow of a Bingham plastic is chosen as the test case and the constitutive equation
is regularised as proposed by Papanastasiou [J. Rheology 31 (1987) 385-404]. It is shown that the
convergence rate of the standard SIMPLE pressure-correction algorithm, which is used to solve the
algebraic equation system that is produced by the finite volume discretisation, severely deteriorates as
the Bingham number increases, with a corresponding increase in the non-linearity of the equations. It
is shown that using the SIMPLE algorithm in a multigrid context dramatically improves convergence,
although the multigrid convergence rates are much worse than for Newtonian flows. The numerical
results obtained for Bingham numbers as high as 1000 compare favorably with reported results of other
methods.
Keywords: Bingham plastic, Papanastasiou regularisation, lid-driven cavity, finite volume method,
SIMPLE, multigrid
This is the accepted version of the article published in: Journal of Non-Newtonian Fluid Mechanics
195 (2013) 19–31, doi:10.1016/j.jnnfm.2012.12.008
c 2016. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http:
//creativecommons.org/licenses/by-nc-nd/4.0/
1. Introduction
Viscoplastic flows constitute an important branch of non-Newtonian fluid mechanics, as many materials of industrial, geophysical, and biological importance are known to exhibit yield stress. In general,
yield-stress fluids are suspensions of particles or macromolecules, such as pastes, gels, foams, drilling
fluids, food products, and nanocomposites. A comprehensive review of viscoplasticity has been carried
out by Barnes [1]. Such materials behave as (elastic or inelastic) solids, below a certain critical shear
stress level, i.e. the yield stress, and as liquids otherwise. The flow field is thus divided into unyielded
(rigid) and yielded (fluid) regions.
∗
Corresponding author
Email addresses: [email protected] (Alexandros Syrakos), [email protected] (Georgios C.
Georgiou), [email protected] (Andreas N. Alexandrou)
Preprint submitted to Journal of Non-Newtonian Fluid Mechanics
April 29, 2016
The simplest constitutive equation describing viscoplasticity is that proposed by Bingham [2]:
τ ≤ τy
γ̇ = 0
,
τy
+ µ γ̇ , τ > τy
τ =
γ̇
(1)
where τy is the yield stress, µ is the plastic viscosity, τ is the stress tensor, γ̇ is the rate of strain tensor,
γ̇ ≡ ∇u + (∇u)T
(2)
u is the velocity vector, and the superscript T denotes the transpose of the velocity-gradient tensor ∇u.
The symbols τ and γ̇ denote the magnitudes of the stress and rate-of-strain tensors, respectively:
τ ≡
1
τ :τ
2
12
,
γ̇ ≡
1
γ̇ : γ̇
2
12
(3)
Another two-parameter viscoplastic equation is the Casson model, which is mostly used in hemodynamics. The Herschel–Bulkley model is the generalisation of the Bingham-plastic equation, which involves
a power-law exponent allowing shear-thinning or shear thickening.
Simulating viscoplastic flows poses extra-ordinary difficulties due to the discontinuity of the constitutive equations. In most cases, it is necessary to determine the location and the shape of the yield
surface at which the flow switches from one branch of the constitutive equation to the other, e.g. from
solid to liquid behavior. Mathematically, the yield surface is the locus of points where τ = τy . A
common approach to overcoming this burden is to regularise the constitutive equation, i.e. to describe
the two branches of (1) by one smooth equation using a stress-growth parameter. The most popular
regularization is that proposed by Papanastasiou [3]:
τy
{1 − exp(−mγ̇)} + µ γ̇
(4)
τ =
γ̇
where m denotes the stress growth parameter, which needs to be “sufficiently” large. Frigaard and
Nouar [4] reviewed systematically the convergence of the Papanastasiou and other regularized models
including the bi-viscosity model [5].
Another approach in solving viscoplastic flows is based on the use of variational inequalities, that is
rate-of-strain minimization or stress maximization, which form the basis of the Augmented Lagrangian
Method [6, 7]. Dean et al. [8] reviewed and compared numerical methods based on the variational
inequality approach.
In this paper, we adopt the regularisation approach and investigate the performance of the finite
volume/multigrid method in solving Bingham plastic flows. The finite volume method (FVM) is a
popular method for solving fluid flows, employed by many general-purpose CFD solvers. One of the
attractive features of the method is that it can be applied to a variety of physical problems with relative
ease. However, there are a limited number of published results on the use of the finite-volume method
to solve Bingham flow problems. Neofytou [9] used a FVM in conjunction with the SIMPLE algebraic
solver (Patankar and Spalding [10]) to simulate the lid-driven cavity flow of various non-Newtonian
fluids, including a Papanastasiou-regularised Bingham plastic at quite low Bingham numbers (0.01–1).
Turan and co-workers [11, 12] also used a commercial FVM/SIMPLE code employing the bi-viscosity
model in order to simulate natural convection of a Bingham plastic in a square cavity. The FVM was
also used to solve flows of a Casson fluid through a stenosis (Neofytou and Drikakis [13]) and through a
sudden expansion (Neofytou and Drikakis [14]), at rather low yield-stress values. Also, de Souza Mendes
et al. [15] and Naccache and Barbosa [16] used the FVM in order to simulate viscoplastic flow through
an expansion followed by a contraction.
2
A benchmark problem for testing numerical methods for both Newtonian and non-Newtonian flows
is the lid-driven cavity flow problem. For laminar Newtonian flow, the reader is referred to the works
of Botella and Peyret [17], Syrakos and Goulas [18], Bruneau and Saad [19], and the references therein.
The lid-driven cavity flow has also been used as a test case for Bingham flows by Sanchez [20], Mitsoulis
and Zisis [21], Vola et al. [22], Elias et al. [23], Yu and Wachs [24], Olshanskii [25], Zhang [26], and dos
Santos et al. [27], who used solution methods other than the FVM, mostly the Finite Element method.
To the authors’ knowledge, only Neofytou [9] used the FVM in order to solve the driven cavity flow of a
Bingham plastic or any other viscoplastic fluid, albeit for very small Bingham numbers (≤ 1). Although
some of the aforementioned published works contain results for non-zero Reynolds numbers, in most
cases the results concern creeping flows (Re = 0).
The objective of the present work is to apply the FVM along with a multigrid method in order to
improve the convergence of the SIMPLE solver when solving the lid-driven cavity Bingham flow for a
broad range of Bingham numbers. Multigrid methods use a hierarchy of grids of progressive fineness.
By applying the algebraic solver on each of these grids, all wavelengths of the algebraic error are reduced
with equal efficiency. Multigrid methods were originally proposed by Fedorenko [28] and later developed
by Brandt [29]. In the context of the FVM, they were first used in the late 80’s (Sivaloganathan and Shaw
[30]; Hortman et al. [31]). Since then, they have been employed in numerous studies involving the FVM,
many of which used the lid-driven cavity flow of a Newtonian fluid as a test problem; see Syrakos and
Goulas [18] and references therein. These Newtonian studies have shown that using multigrid algorithms
can result in very significant performance gains. To our knowledge, the finite volume/multigrid method
has not been tested in the case of Bingham flow.
The rest of the paper is organized as follows. In Section 2, the integral forms of the governing
equations are presented and dedimensionalized. In Section 3, the numerical method, that is the discretisation of the governing equations and the solution of the resulting algebraic system, is discussed. The
numerical results are presented in Section 4. These compare well with the results of Mitsoulis and Zisis
[21] and Yu and Wachs [24]. The convergence of the algebraic solver has also been studied and possible
ways for its acceleration have been investigated. Finally, Section 5 contains our concluding remarks.
2. Governing equations
We consider the steady-state, two-dimensional flow in a square cavity of side L, the top boundary
(lid) of which moves towards the right with a uniform horizontal velocity U , while the remaining sides
are fixed. We work in Cartesian coordinates (x,y), centered at the lower-left corner of the cavity and
denote the unit vectors in the x and y directions by i and j, respectively. Let also ρ and η = η(γ̇) denote
the density and the viscosity of any generalised-Newtonian fluid. By means of the Gauss theorem, the
integral forms of the continuity and the x– and y–components of the momentum equations over a control
volume P are as follows:
Z
ρu · dS = 0
(5)
SP
Z
∂u
· dS −
pi · dS
ρ u u · dS =
η ∇u +
∂x
SP
SP
SP
Z
Z
Z
∂u
ρ v u · dS =
η ∇v +
· dS −
pj · dS
∂y
SP
SP
SP
Z
Z
3
(6)
(7)
where SP is the boundary surface of the control volume, dS is an infinitesimal element of this surface
oriented so that the normal vector points out of P , u = ui + vj is the velocity vector, and p is the
pressure. In the case of the Papanastasiou model (4), the viscosity is given by
τy
{1 − exp(−mγ̇)} + µ
γ̇
η =
(8)
The advantage of the Papanastasiou regularization is that expression (8) is used over the entire flow
domain, i.e. over both yielded and unyielded regions. At high strain rates the viscosity tends towards
µ if the growth parameter m is large enough. In the unyielded regions the viscosity obtains high values
which result in very small values of γ̇ and thus solid body motion is approximated. When γ̇ tends to
zero, then the viscosity (8) tends not to infinity but to the finite value mτy + µ. Some authors [32, 33]
suggested that lower values of m can be used at higher yield stress values and vice versa.
To dedimensionalise the governing equations (5)–(7), we scale lengths by the cavity side L, the velocity components by U , and the pressure and stress by µU/L, and use stars to denote the dimensionless
variables. Taking into account that ρ is constant, the dimensionless equations are as follows:
Z
u∗ · dS∗ = 0
(9)
SP
Z
∂u∗
∗
∗ ∗
· dS −
p∗ i · dS∗
Re
u u · dS =
η ∇u +
∗
∗
∗
∗
∂x
SP
SP
SP
Z
Z
Z
∗
∂u
Re
v ∗ u∗ · dS∗ =
η ∗ ∇∗ v ∗ +
· dS∗ −
p∗ j · dS∗
∗
∗
∗
∗
∂y
SP
SP
SP
Z
∗
∗
∗
η∗ =
Z
∗
(10)
(11)
Bn
{1 − exp(−M γ̇ ∗ )} + 1
γ̇ ∗
(12)
Re ≡
ρU L
µ
(13)
Bn ≡
τy L
µU
(14)
M ≡
mU
L
(15)
where
is the Reynolds number,
is the Bingham number, and
is the stress-growth number.
For the sake of simplicity, the stars denoting the dimensionless variables are dropped hereafter.
3. Numerical method
3.1. Discretisation of the equations
The domain is split into a number of control volumes (CVs) using a Cartesian grid of equally spaced
horizontal and vertical grid lines. For each control volume, the continuity and momentum equations are
approximated using algebraic expressions involving the values of the unknowns u, v, p at the centre of
that CV and at the centres of neighbouring CVs [34]. The computer code which was used for the present
study has the ability to use curvilinear grids composed of quadrilateral CVs - see [35, 18] for details but in the present section only the simpler form that these discretisation schemes acquire when the grid
4
∆x = h
N
n
W
P
w
e
E
∆y = h
s
S
Figure 1: A control volume P and its neighbours.
is Cartesian will be presented. Although the present work concerns only creeping flow, the treatment of
the convection terms of the momentum equations is also described for completeness.
For each CV, the surface flux integrals are calculated separately on each face. Figure 1 shows a
control volume P and its neighbours, S, E, N and W . The letters P , S, E, N and W will also denote
the position vectors of the centres of the respective CVs. First, the flow variables and their normal
derivatives are calculated at the centre of each face using central differences, e.g. for face e:
ue =
∂u
∂x
=
e
uE + uP
2
uE − uP
∆x
(16)
(17)
The flux integrals are then approximated using the midpoint rule, e.g. for the x–momentum equation:
Z
u u · dS ≈ Fe ue
(18)
e
Z
∂u
η∇u · dS ≈ ηe
∆y
∂x e
e
Z
p i · dS ≈ pe ∆y
(19)
(20)
e
Equations (18) – (19) do not describe the approximation scheme sufficiently, and some definitions are
still missing: Fe denotes the mass flux through face e and will be defined shortly; the term (19) is only
part of the total viscous flux; and the term ηe requires that the viscosity has already been calculated
somehow at CV centres. To define these terms we first approximate the gradient operator at CV centres
(equation (17) only approximates the normal component at face centres). At the centre of control
5
volume P the following approximation is used:
∂u
∂x
=
P
uE − uW
,
2∆x
∂u
∂y
=
P
uN − uS
2∆y
(21)
If P is a boundary CV, and the domain boundary coincides with face w, then the horizontal component
of the gradient is calculated as follows:
∂u
∂x
=
P
uE + uP − 2uw
2∆x
(22)
where uw is the boundary value of u, specified by the Dirichlet boundary condition.
Now, the viscosity is calculated at CV centres from equation (12), where γ̇ is calculated from (3),
using the velocity gradients at CV centres (21):
γ̇P
"
∂u
= 2
∂x
2
+2
P
∂v
∂y
2
+
P
∂u
∂y
P
∂v
+
∂x
2 # 21
(23)
P
Thus ηe in (19) is calculated from ηP and ηE using linear interpolation (16). Since the viscosity is only
needed at face centres, an alternative would be to calculate it there directly. This would require the
velocity gradients at the face centres, the normal component of which is readily available from (17).
But the tangential component is not, and would require interpolation of velocity components at face
vertices. So, this alternative would not be less complex than the approach presently adopted.
For the same reason, the remaining part of the viscous fluxes is also calculated by interpolating
the velocity gradients at face centres from the CV centres. For example, for faces e and n we have,
respectively:
Z
Z
∂u
∂u
∂u
∂v
η
η
∆y ,
∆x
(24)
· dS ≈ ηe
· dS ≈ ηn
∂x e
∂x n
n ∂x
e ∂x
Here the derivatives (∂u/∂x)e and (∂v/∂n)e are not the same as in Eq. (17), but are interpolated
from the derivatives (21) at face centres according to (16). This approach is convenient in the case of
curvilinear grids, which is why it is adopted by the code we used for the present study.
This leaves only the mass fluxes to be defined. These are discretised using the central difference
scheme (16), but with the addition of an artificial pressure term whose role is to not allow the appearance
of spurious pressure oscillations in the discrete solution. The mass flux through face e, in non-dimensional
form, is discretised as:
Z
(∆y)2
1 ∂p
∂p
Fe =
u · dS ≈ ue ∆y +
(pP − pE ) −
+
(xP − xE )
(25)
ae
2 ∂x P ∂x E
e
where:
ae = Re (|ue |∆y + |ve |∆x) + 2ηe
∆y ∆x
+
∆x ∆y
(26)
Without this treatment, artificial pressure oscillations do appear when both velocity and pressure are
stored at the CV centres, as in the present scheme. This technique is known as momentum interpolation
and was first suggested by Rhie and Chow [36]. The above variant, proposed in [35], has the advantage
that it is decoupled from the SIMPLE solution algorithm. The resulting equations simplify further in
case of a uniform grid, ∆x = ∆y = h, but for completeness the more general forms are included here.
6
The artificial pressure term is very small, of order O(h5 ), and has a very small impact on the accuracy
of the discretisation of the mass flux.
The test cases examined in this work involve only no-slip solid wall boundaries, with Dirichlet
boundary conditions. The discretisation there is as follows: The pressure is linearly extrapolated from
the interior. The product ∇u · dS of the main viscous terms (19) is calculated as a one-sided difference,
i.e. if e is a boundary face then ∇u · dS is approximated as ∆y ·(u(e) − uP )/(∆x/2) where u(e) is the
exact value of u at the centre of face e, as defined by the Dirichlet boundary condition. Finally, in the
secondary viscous terms (24) both the derivative and the viscosity at the boundary face centre are taken
as equal to their values at the adjacent CV centre.
By substituting all terms in the continuity and momentum equations of each CV by their discrete
counterparts, a non-linear algebraic system is obtained, with four equations (x,y–momentum, continuity
and constitutive equation) and four unknowns (u,v,p,η) per CV. The overall discretisation scheme is of
second order accuracy, meaning that the discretisation error should decrease as O(h2 ). Solution of this
algebraic system gives the values of the unknowns, up to the discretisation error. The solver used to
solve this system is described next.
3.2. Solution of the algebraic system
The popular SIMPLE algorithm [10] was chosen as the non-linear solver. It is a widely used algorithm
and so it will not be fully described here – the interested reader is referred to [37] or [34]. In brief, SIMPLE
is an iterative algorithm which constructs and solves a number of linear systems within each iteration.
These linear systems come from breaking up and linearising the set of discretised equations: The systems
of equations for the momentum components are converted into linear systems for the corresponding
velocity components by evaluating some of the terms (including the viscosity (12)) using the velocity
and pressure values obtained from the previous SIMPLE iteration; and the continuity equations system
is used to construct an approximate “pressure correction” linear system, which attempts to improve
the current pressure estimate so as to force the velocity field to be more continuity-conservant. A
SIMPLE iteration (outer iteration) consists of the successive solution of the linear systems of the velocity
components and of pressure correction. Only a few iterations (inner iterations) of a linear solver are
applied to each linear system, since the matrices of coefficients will change in the next outer SIMPLE
iteration. In this work we used GMRES as the linear solver for the velocity systems, and conjugate
gradients (CG) for the pressure correction system, preconditioned by incomplete factorisations with
zero fill-in – see [38] for detailed descriptions. To achieve convergence, underrelaxation factors au , ap < 1
are applied to the velocity and pressure correction systems respectively [34]. SIMPLE iterations are
repeated until the residuals of all the original non-linear algebraic equations drop below a selected
threshold.
The only modification needed so that SIMPLE can be used for Bingham or other generalisedNewtonian flows is that, at the start of every SIMPLE iteration, the viscosity must be updated at
each CV according to (12), using the current estimate of the velocity field to calculate γ̇.
The SIMPLE algorithm converges rather slowly, so it was decided to implement it in a multigrid
context to accelerate its convergence. Many algebraic solvers are able to quickly reduce the short
wavelengths of the error but are quite slow in reducing the longer wavelengths. SIMPLE is such a
solver [39], not only because the linear solvers used for the inner iterations may themselves have this
property, but also because of local assumptions made in the linearisation of the non-linear terms and
in the construction of the pressure correction equation, which relate a CV to its direct neighbours. In
such a case, after a few iterations have been performed and the short wavelengths of the error have been
reduced, it is beneficial to move the solution procedure to a coarser grid, where the direct neighbours of
a CV are farther away and so the long wavelengths of the error appear shorter and can be reduced more
7
efficiently by the same algebraic solver. By using a cascade of progressively coarser grids, all wavelengths
of the error can be reduced with equal efficiency [29].
The solution procedure is transferred between grids as follows. Let the system of all algebraic
equations be written as:
Nh (xh ) = bh
(27)
where now the vector xh stores all the unknowns (velocity components, pressure, and viscosity) at all
CV centres of the grid whose spacing is h. After a few SIMPLE iterations an approximate solution x∗h
is obtained which satisfies the above equation up to a residual rh :
Nh (x∗h ) = bh − rh = Nh (xh ) − rh ⇒ Nh (xh ) = Nh (x∗h ) + rh
(28)
The algebraic system (28) can be approximated on a coarser grid of spacing 2h (grid 2h hereafter),
obtained by removing every second grid line of grid h, as follows:
N2h (x2h ) = N2h (Ih2h x∗h ) + Iˆh2h rh
(29)
The operator N2h is constructed on grid 2h using the same discretisation schemes as Nh on grid h, with
2∆x and 2∆y used instead of ∆x and ∆y. The restriction operator Ih2h transfers the variables from grid
h to grid 2h. The notation comes from the identity matrix I, since the variables are not transformed
but rather transferred from one grid to another. In the present study this restriction operator sets the
value of a variable at the centre of a control volume P of grid 2h equal to the average of the values of
that variable over the 4 CVs of grid h that overlap with P , which will hereafter be called the children of
P . The (possibly different) operator Iˆh2h is used for transferring the residuals to grid 2h. In the present
study the residuals at a control volume P of grid 2h are set equal to the sum of the residuals of all its
children. Since the residuals are essentially flux imbalances, this means that the flux imbalance of P is
set equal to the sum of the imbalances of its children.
The right hand side of (29) is known, so the system can be solved to obtain x2h . Then, the correction
x2h − Ih2h x∗h is transferred back to grid h, to obtain a better estimate xnew
of the exact solution xh , and
h
SIMPLE iterations can resume on grid h:
h
xnew
= x∗h + I2h
x2h − Ih2h x∗h
h
(30)
h
The prolongation operator I2h
transfers the correction from grid 2h to grid h; in the present study linear
interpolation is used. It is straightforward to see that if in (28) the exact solution has already been
obtained (x∗h = xh ) then the residuals will be zero and therefore so will be the last term of (29). Then
the solution of (29) will be x2h = Ih2h x∗h (it is important that Ih2h x∗h be used as the initial guess when
solving (29)), and therefore the correction x2h − Ih2h x∗h will be zero. So, (30) will leave the solution
unaltered: xnew
= x∗h = xh .
h
The coarse grid problem (29) can be solved using an even coarser grid 4h and so on. This whole
process of going down from grid h to some coarsest grid and then back again up to grid h constitutes
a multigrid cycle. In general, a number of multigrid cycles will be required to reduce the residuals by
a given amount. Different kinds of cycles have been suggested and used. The most popular are the
V(ν1 , ν2 ) and W(ν1 , ν2 ) cycles. In V(ν1 , ν2 ) cycles, after performing ν1 iterations on the fine grid h,
the coarse grid system (29) is solved using one multigrid cycle, and then the coarse grid correction is
transferred back to grid h according to (30), where another ν2 iterations are performed. The difference
between the W and V cycles is that in W cycles the coarse grid problems such as (29) are solved using
two rather than one cycle. In the present work we have observed that it is sometimes useful to perform
8
ν3 extra SIMPLE iterations on the finest grid h only, between cycles. Such cycles will be denoted
V(ν1 , ν2 )–ν3 or W(ν1 , ν2 )–ν3 respectively. These cycles are shown schematically in Figure 2. The costs
of a V(ν1 , ν2 )–ν3 and a W(ν1 , ν2 )–ν3 cycle are approximately equal to [ 34 (ν1 +ν2 )+ν3 ] and [2(ν1 +ν2 )+ν3 ]
times the cost of a single iteration on the finest grid h, respectively.
h
2h
4h
8h
16h
ν1
ν2 + ν3
ν1
ν2
ν1
ν2
ν1
ν2
ν0
ν1
ν2 + ν3
ν2 + ν1
ν1
ν2 + ν1
ν1
ν2 + ν1
ν1
ν0
ν2 + ν1
ν2 ν1
ν2 + ν1
ν2 ν1
ν0
ν2
ν0
ν0
ν2
ν2 + ν1
ν1
ν0
ν0
ν2
ν2 + ν1
ν2 ν1
ν0
ν2
ν0
Figure 2: Multigrid cycles: V(ν1 , ν2 )–ν3 (left) and W(ν1 , ν2 )–ν3 (right) cycles, using 5 grid levels.
4. Numerical results
The creeping flow (Re = 0) of a Bingham plastic in a square lid-driven cavity has been chosen as
the test case for the finite volume method described in the previous section. The computational domain
is a square, enclosed by solid boundaries of equal length. The top boundary (lid) moves towards the
right with a uniform horizontal velocity, while the rest of the boundaries are still. The problem was
solved for a range of Bingham numbers, up to 1000. In all cases an exponent M = 400 was used, except
for the two highest Bingham numbers tested, Bn = 500 and 1000, for which M = 100 was used due
to convergence difficulties. In order to check grid convergence, the domain was discretised using three
uniform Cartesian grids with 64 × 64, 128 × 128 and 256 × 256 CVs. Unless otherwise stated, the results
presented below were calculated on the 256 × 256 grid. The pressure was set to zero at the centre of the
domain.
Figure 3 shows the streamlines calculated for selected Bingham numbers. These are the Bingham
numbers chosen also by Mitsoulis and Zisis [21] and Yu and Wachs [24] for their corresponding figures.
The “unyielded” regions are also shown. These are defined here as the regions where τ < Bn, where
τ = η γ̇ is calculated from (12) and (23). Of course, they are not actually unyielded, but they approximate
the unyielded regions of an ideal Bingham flow. The results generally agree with those presented by
other researchers, in [21, 24–26]. The agreement is good with the results of Mitsoulis and Zisis [21]
in the whole range of Bingham numbers, except that these authors predict yielded regions with more
rounded corners than the present results. Also, their yield surfaces are not smooth, but this may be
due to the low resolution of the grid that they employed. The results also agree well with those of Yu
and Wachs [24] up to a Bingham number of 20, but there are notable differences at higher Bingham
numbers - however, Yu and Wachs state that, as far as capturing the yield surface is concerned, their
method performs well at low to moderate Bingham numbers but less so at high Bingham numbers.
Direct comparison can also be made between the present results and those of Olshanskii [25] for Bn = 2
and Bn = 5, who used an augmented Lagrangian approach instead of a regularisation method, and the
agreement is very good. Zhang [26], who also used an augmented Lagrangian approach, also provides
results for Bn = 2, 20, 50 and 200, where the unyielded regions appear somewhat smaller, flatter, and
rounded compared to the present results, although qualitatively similar.
The main characteristic of the flow field is the vortex which develops at the upper central region of
the cavity, similarly to the Newtonian case. Two distinct unyielded regions can be observed: A larger one
9
(a) Bn = 2
(b) Bn = 5
(c) Bn = 20
(d) Bn = 50
(e) Bn = 200
(f) Bn = 500
Figure 3: Streamlines plotted at intervals of 0.004 starting from zero. Unyielded areas (τ < Bn) are shown shaded.
10
at the bottom of the cavity, and a smaller one just below the vortex centre. The flow field is symmetric
with respect to the vertical centreline. As the Bn number increases, the unyielded regions expand and
the flow circulation becomes weaker and limited to the upper part of the cavity, with the centre of the
vortex coming closer to the lid. One can notice in Figure 3 that a couple of secondary vortices appear
at the lower two corners of the cavity, which are completely inside the lower unyielded region. These
vortices, which appear to slightly grow in size as Bn increases, are an artifact of the regularisation of the
Bingham model by the Papanastasiou approximation. In fact, the velocity is extremely low throughout
the lower unyielded region. In reality, since this region is in contact with the rigid walls which are
motionless, and a no-slip boundary condition applies, the unyielded material should also be motionless
throughout.
The situation is different at the upper unyielded region, where the velocity is non-zero as can be
clearly seen from the streamlines’ spacing. So, the upper unyielded regions move as solid bodies. In the
present case it appears that the material at the upper unyielded region moves as a solid body, and in
particular it rotates, with the streamlines forming circular arcs inside it. The fact that the streamlines
cross into this region means that the fluid “solidifies” on entry, and becomes fluid again on exit from
the region.
The behaviour of the vortex as a function of the Bn number is described in more detail in Figure 4,
where the vertical position and the strength of the vortex are plotted as functions of Bn. The weakening
of the circulation as Bn increases is accompanied by an increase in the stress and pressure levels in the
cavity, as greater stresses are needed in order to make the material flow. Figure 4 also serves to validate
the results of the present study against those of other researchers. It can be seen that the results are
quite close to previously published data of [21] and [24]. The results are closer to those of Mitsoulis and
Zisis [21] as far as the vortex strength is concerned, and to the results of Yu and Wachs [24] as far as
the vortex position is concerned (possibly because the grid of [21] is coarse).
Figure 5 shows the pressure and shear stress distributions at the left half of the lid. Increasing the
Bingham number from 2 to 50 causes a significant increase in pressure and stress, as discussed previously.
Figure 5 can also be used to verify grid convergence, as it contains results on the three grids used in this
work. In the interior of the lid the pressure and stress converge with grid refinement, and the rate of
convergence is that expected of a 2nd order method. However, grid refinement causes the pressure and
stress to tend to infinity at the lid corners. This is because of the discontinuity which exists at these
corners: the velocity jumps from zero (side walls) to one (lid). Due to this singularity, it was observed
that the pressure and stress integrals over the lid do not converge with grid refinement, and so the
shear force needed to drive the lid cannot be calculated accurately. The results on grid convergence are
discussed later on. The increase in pressure with the Bingham number can also be seen in the pressure
contours of Figure 6. It is clear that the presence of the unyielded regions causes a distortion in the
pressure field. The streamwise pressure gradients are greater inside the upper unyielded region.
An important issue when using the Papanastasiou regularisation is the choice of the exponent M .
The higher the value of M , the better the approximation, but also the more difficult it is to solve the
equations due to the increased degree of nonlinearity. Therefore, for practical reasons M has to be kept
within certain limits. Here we provide some comparisons showing the effect of M on the quality of the
results, while the issue of the computational effort required as a function of M will be investigated in the
next section. One result of importance in a range of applications is the location of the yield lines, which
are approximated in the present method by τ = Bn, as previously stated. Figure 7 shows that the use of
the different values of 100, 200 and 400 for M does not affect the location of the yield lines significantly.
The difference is especially small between M = 400 and M = 200. Figure 8 shows iso-stress lines which
deviate slightly from the yield stress value. Comparing Figures 7 and 8 shows that the lines τ = τy +
( > 0) are less sensitive to the choice of M than the lines τ = Bn. This verifies the result of Alexandrou
11
(a) Vortex centre
(b) Vortex strength
Figure 4: The y coordinate of the centre of the vortex, and vortex strength as a function of the Bingham number.
12
(a) p at the lid
(b) τyx at the lid
Figure 5: Pressure and shear stress at the left half of the lid for Bn = 2 and 50. Results are shown for grids 64 × 64
(chained lines), 128 × 128 (dashed lines), and 256 × 256 (solid lines).
and co-workers [33, 40] that the location of iso-stress lines τ = τy + ( > 0) is predicted almost equally
well for a range of M values, whereas to accurately predict the location of the yield line τ = τy a high
value of M is required. The iso-stress lines τ = τy − ( > 0) nearly coincide with the yield stress line
except near the side walls and the lower corners of the upper unyielded region. Therefore, there is a
sharp decrease in stress as one moves into the unyielded zone. On the contrary, this is not observed
with the τ = τy + lines which are located at a distance from the yield line, meaning that the stress
increases more gradually as one moves into the yielded zone. It is interesting to note that for Bn = 200
the difference between the actual stress and the yield stress is less than 1% throughout the fluid region
that separates the two solid regions, since the τ = 1.01Bn contours do not cross into this region. So,
the deformation rate is quite small there, and most of the shear takes place close to the lid.
(a) Bn = 0
(b) Bn = 2
(c) Bn = 20
Figure 6: Pressure contours for various Bn numbers. For Bn 6= 0 the thick lines outline the unyielded regions. Note that
the pressure scale of the Bn = 20 case is different.
13
(a) Bn = 2
(b) Bn = 20
(c) Bn = 200
Figure 7: Yield lines (τ = Bn) calculated with M = 100 (dotted), M = 200 (dashed) and M = 400 (solid).
(a) Bn = 2, τ = (1 + 0.01)Bn
(b) Bn = 20, τ = (1 ± 0.01)Bn
(c) Bn = 200, τ = (1 ± 0.01)Bn
Figure 8: Iso-stress lines calculated with M = 100 (dotted), M = 200 (dashed) and M = 400 (solid). Unyielded regions
(τ ≤ Bn) are shown shaded.
14
Figure 9: The x component of velocity along the vertical centreline (x = 0.5), for Bn = 0, 2, 5, 20, 50, 200 and 500.
In closing this section we provide some detailed results at the vertical centreline. The x velocity
component (u) is plotted along the vertical centreline in Figure 9. The limits of the yielded / unyielded
zones can be clearly seen on that graph. On each curve (except for Bn = 0) two straight line segments
can be identified. One is completely vertical with u = 0 and stretches from y = 0 up to a certain
height; this segment corresponds to the lower unyielded zone which is motionless. The other segment
corresponds to the upper unyielded zone; there the velocity is non-zero but decreases linearly with
height, which shows that the upper unyielded zone rotates as a solid body. The centre of rotation can
be estimated by extending the straight line segment until it intersects the u = 0 line.
More detailed results are shown in Tables 1 (Bn = 2) and 2 (Bn = 50), where the velocity values
have been obtained at selected points using linear interpolation from the values at adjacent CVs. To
study grid convergence, results of various grids are also included. The exponent given in the tables is
the order of grid convergence, which should be q = 2 for our present second-order accurate scheme. It
is calculated by the following formula (see [34]):
128 −u64
log uu256
−u128
(31)
q =
log(2)
where the subscripts denote the grid where u has been calculated.
Tables 1 and 2 show that q ≈ 1.5 for Bn = 2, and q ≈ 1 for Bn = 50. So, second-order convergence is
not exhibited, which could be a sign that an even finer grid would be useful. However, the discretisation
error is already relatively small as can be seen from the difference between the solutions at various grids.
Besides, the use of a finer grid would significantly increase the computational cost as will be described
in the next section. For Bn = 50 the value of q is especially low at the upper parts of the centreline,
which is an indication that at higher Bn numbers (when most of the flow occurs at the upper part of
15
the domain) it would be of benefit to use non-uniform grids with increased resolution near the top, or
adaptive grids.
The last three columns of the tables are defined as follows:
128
δ256
400
u400
256 − u128
%,
= 100·
u400
256
200
δ400
200
u400
256 − u256
= 100·
%,
u400
256
100
δ400
100
u400
256 − u256
= 100·
%
u400
256
(32)
where um
n has been calculated on grid n × n with M = m. These values must be interpreted with
128
caution, as they may appear large if u400
256 is close to zero. δ256 is a measure of the discretisation error,
and it can be noticed that for Bn = 2 it is quite small, of the order of 0.1–1%, whereas for Bn = 50
200
100
it is markedly larger, of the order of 5%. For Bn = 2, δ400
is of the order of 0.1%, while δ400
is about
200
3 times higher at each point. δ400 shows greater variability for Bn = 50, and is a little higher than for
100
200
Bn = 2. δ400
, for Bn = 50, has about twice the value of δ400
in the upper part of the centreline, and
200
three times the value of δ400 in the lower part. In general, it appears that, with the present choices of
grid density and M , grid coarseness is a larger source of error than the smallness of M .
5. Convergence of the algebraic solver
When using the SIMPLE algorithm to solve Bingham flows, either as a single-grid solver or in
a multigrid context, one realises that there is a severe deterioration of the convergence rates as the
Bingham number increases. In Figure 10 we plot against the number of iterations the L∞ -norm of the
residual vector of the x−momentum equations,
krk∞ =
max {|rP |} ,
P =1,...,N
(33)
where rP is the residual, expressed per unit volume, of the x−momentum equation of control volume P
and N is the total number of control volumes in the grid. The residual norm is scaled by 1000 because
in the actual numerical experiments we solved the dimensional version of the equations, with L = 1 m,
U = 1 m/s, and µ = 1000 Pa·s. Therefore, the residuals of the dimensional equations are 1000 times
larger than those of the dimensionless equations.
Figure 10 shows that the performance of SIMPLE, as a single-grid solver, deteriorates as either Bn
or M increases. The choices au = 0.7 and ap = 0.3, used to obtain these results, are reasonable for
Newtonian flows [34]. In Figure 11, the effect of varying ap is illustrated. As ap is increased, convergence
becomes faster, especially at the initial stages of iteration; however, it also becomes more oscillatory
with large spikes. Beyond a certain value of ap (ap = 0.3 in Figure 11) convergence stalls. On the other
hand, using a very small ap results in smooth but slow convergence. Due to the very large number of
combinations of Bn, M , au , ap and grid density, it is impossible to investigate fully the effect of all these
parameters. We have observed (results not shown) that the performance of SIMPLE is similar also for
other values of au in the range 0.8 - 0.2, but beyond these values it is difficult to obtain convergence.
The performance of SIMPLE as a smoother in a multigrid context is tested next. In applying
multigrid, the coarsest grid used in the cycles was the 8×8 grid. According to our numerical experiments,
the convergence deterioration of the SIMPLE algorithm with increasing Bn number also reflects on the
multigrid performance. In fact, as Figure 12 shows (solid lines), the multigrid method does not converge
beyond a relatively small value of Bn, around 0.5. As a remedy, we applied the suggestion of Ferziger
and Peric [34], that if a fluid property, such as the viscosity when RANS turbulence models are used,
varies by orders of magnitude within the computational domain, then it may be useful to update
that property only on the finest grid and keep it constant within a multigrid cycle. So, we tried an
implementation where the viscosity at coarse grids is not calculated afresh from (12) according to the
16
Table 1: Values of the x-component of velocity along the vertical centreline for Bn = 2.
grid
y
64 × 64
M = 400
128 × 128
M = 400
256 × 256
M = 400
256 × 256
M = 200
256 × 256
M = 100
q
128
δ256
200
δ400
100
δ400
1.00
0.975
0.950
0.900
0.850
0.800
0.750
0.700
0.650
0.600
0.550
0.500
0.450
0.400
0.350
0.300
0.250
0.200
0.150
0.100
0.050
0.000
1.00000
0.81421
0.63974
0.33677
0.10671
-0.04182
-0.10310
-0.13840
-0.17334
-0.20322
-0.20660
-0.18918
-0.16059
-0.12699
-0.09272
-0.06101
-0.03421
-0.01443
-0.00365
-0.00078
-0.00030
0.00000
1.00000
0.81544
0.64222
0.34016
0.11033
-0.03945
-0.10602
-0.14159
-0.17689
-0.20575
-0.20681
-0.18905
-0.16039
-0.12678
-0.09260
-0.06112
-0.03464
-0.01493
-0.00344
-0.00063
-0.00028
0.00000
1.00000
0.81581
0.64279
0.34121
0.11160
-0.03834
-0.10703
-0.14267
-0.17810
-0.20606
-0.20679
-0.18898
-0.16033
-0.12674
-0.09261
-0.06120
-0.03485
-0.01523
-0.00356
-0.00058
-0.00027
0.00000
1.00000
0.81581
0.64280
0.34126
0.11172
-0.03811
-0.10688
-0.14260
-0.17793
-0.20574
-0.20654
-0.18878
-0.16018
-0.12665
-0.09259
-0.06126
-0.03502
-0.01554
-0.00408
-0.00111
-0.00053
0.00000
1.00000
0.81581
0.64282
0.34136
0.11193
-0.03774
-0.10653
-0.14242
-0.17757
-0.20516
-0.20610
-0.18841
-0.15990
-0.12647
-0.09255
-0.06138
-0.03534
-0.01613
-0.00508
-0.00208
-0.00101
0.00000
1.74
2.13
1.69
1.51
1.09
1.53
1.56
1.56
3.05
0.82
1.89
2.45
0.23
1.07
0.78
1.76
1.64
-
0.00%
0.05%
0.09%
0.31%
1.14%
2.90%
0.95%
0.76%
0.68%
0.15%
0.01%
0.04%
0.03%
0.03%
0.02%
0.14%
0.59%
1.92%
3.21%
7.88%
2.42%
0.00%
0.00%
0.00%
0.00%
0.02%
0.11%
0.59%
0.14%
0.05%
0.09%
0.16%
0.12%
0.11%
0.09%
0.07%
0.03%
0.10%
0.48%
2.05%
14.68%
90.21%
94.50%
0.00%
0.00%
0.00%
0.01%
0.04%
0.29%
1.56%
0.47%
0.18%
0.29%
0.44%
0.34%
0.30%
0.27%
0.21%
0.08%
0.28%
1.40%
5.94%
42.93%
257.00%
272.53%
0.00%
Table 2: Values of the x-component of velocity along the vertical centreline for Bn = 50.
grid
y
64 × 64
M = 400
128 × 128
M = 400
256 × 256
M = 400
256 × 256
M = 200
256 × 256
M = 100
q
128
δ256
200
δ400
100
δ400
1.0000
0.9875
0.9750
0.9500
0.9250
0.9000
0.8500
0.8000
0.7500
0.7000
0.6500
0.6000
0.5750
0.5500
0.5250
0.5000
0.4500
0.4000
0.3000
0.2000
0.1000
0.0000
1.00000
0.71205
0.45957
0.10907
-0.01230
-0.02462
-0.03500
-0.04469
-0.05431
-0.06386
-0.07328
-0.08172
-0.08318
-0.07734
-0.06148
-0.03959
-0.00874
-0.00153
-0.00048
-0.00026
-0.00013
0.00000
1.00000
0.72144
0.47518
0.11660
-0.01713
-0.02952
-0.03941
-0.04914
-0.05880
-0.06840
-0.07788
-0.08678
-0.08778
-0.07753
-0.05345
-0.02641
-0.00255
-0.00076
-0.00040
-0.00022
-0.00011
0.00000
1.00000
0.72838
0.49123
0.13617
-0.01946
-0.03123
-0.04142
-0.05148
-0.06148
-0.07142
-0.08125
-0.09080
-0.09275
-0.08027
-0.05286
-0.02406
-0.00137
-0.00069
-0.00038
-0.00021
-0.00010
0.00000
1.00000
0.72886
0.49225
0.13835
-0.01812
-0.03106
-0.04143
-0.05156
-0.06157
-0.07145
-0.08113
-0.09033
-0.09180
-0.07921
-0.05252
-0.02464
-0.00233
-0.00135
-0.00075
-0.00042
-0.00020
0.00000
1.00000
0.72931
0.49324
0.14067
-0.01641
-0.03073
-0.04142
-0.05165
-0.06162
-0.07135
-0.08069
-0.08917
-0.08990
-0.07706
-0.05126
-0.02484
-0.00408
-0.00263
-0.00146
-0.00083
-0.00040
0.00000
0.43
-0.04
-1.38
1.05
1.52
1.14
0.93
0.75
0.59
0.45
0.33
-0.11
-3.91
3.76
2.49
2.38
3.46
1.95
1.99
2.08
-
0.00%
0.95%
3.27%
14.38%
11.97%
5.49%
4.84%
4.55%
4.36%
4.23%
4.15%
4.43%
5.36%
3.42%
1.12%
9.75%
86.69%
10.19%
5.70%
4.82%
4.40%
0.00%
0.00%
0.07%
0.21%
1.60%
6.90%
0.56%
0.03%
0.16%
0.14%
0.04%
0.15%
0.52%
1.03%
1.32%
0.63%
2.41%
70.45%
96.74%
97.59%
97.74%
97.74%
0.00%
0.00%
0.13%
0.41%
3.30%
15.70%
1.60%
0.01%
0.33%
0.23%
0.09%
0.69%
1.80%
3.08%
3.99%
3.01%
3.23%
198.24%
283.34%
287.10%
287.60%
287.34%
0.00%
17
Figure 10: The L∞ norm of the x-momentum residual plotted against the number nS of SIMPLE iterations, for single
grid solution; au = 0.7, ap = 0.3, 256 × 256 grid.
restricted velocity field, but it is directly restricted (interpolated) from the immediately finer grid. The
convergence of this modified multigrid method is also shown in Figure 12 (dashed lines). The method
converges more slowly than the standard multigrid method, but it is more robust and can converge over
a wider range of Bingham numbers. Both methods converge equally fast up to a point, beyond which
the convergence of the modified method suddenly slows down. It appears that both methods are equally
capable of reducing certain components of the residual, which dominate the residual at the initial stages
of iteration. However, the modified method is less capable of reducing certain other components, which
dominate the error beyond a certain point.
The modified method is not strictly “multigrid” since part of the solution, namely the updating
of the viscosity, only takes place on the finest grid. Therefore the method exhibits also some singlegrid convergence characteristics. In particular, as Figure 13 shows for Bn = 0.05, the convergence of
the modified method slows down as the grid is refined (this is true only for those slowly converging
components of the residual). On the contrary, the standard method converges equally fast on all grids,
which is normal multigrid behaviour.
For higher Bingham numbers it is necessary to use the modified multigrid method, and even in that
case convergence difficulties are encountered. However, the gains compared to the single-grid method
are still quite impressive. Figure 14 shows the convergence rates for various Bingham numbers, using
both single-grid (SG) and multigrid (MG) procedures. In each case the solution on the 128 × 128 grid
was used as the initial guess and the coarsest grid used by the multigrid cycles was the 8 × 8 grid. The
computational effort (x–axis) is measured in terms of equivalent fine-grid SIMPLE iterations. For the
single-grid cases, this is just the number of SIMPLE iterations performed. For the multigrid cases, the
number of cycles is multiplied by the number of fine-grid SIMPLE iterations that cost computationally
the same as a single cycle. For example, nC W(ν1 , ν2 )–ν3 cycles cost approximately the same as nS =
18
Figure 11: The L∞ norm of the x-momentum residual plotted against the number nS of SIMPLE iterations, for single
grid solution; Bn = 200, M = 200, 256 × 256 grid.
nC · [2(ν1 + ν2 ) + ν3 ] SIMPLE iterations on the finest grid, as mentioned in section 3.2. It should be
noted that the cost of restriction and prolongation is omitted in this calculation, since the cost of these
operations is very small compared to the cost of the SIMPLE iterations, especially if one considers that
the numbers of pre- and post- smoothing iterations are large, and fine-grid iterations are also carried
out between cycles. Therefore, MG and SG convergence rates are directly comparable in Fig. 14.
One may also observe that as the Bn number increases, the choice of multigrid parameters becomes
rather unusual compared to the usual multigrid practice: the number of pre- and post-smoothing sweeps
is quite large, and a large number of SIMPLE iterations are required between cycles. These choices of
parameters have been found necessary to obtain convergence. It may also be seen that very small
values of ap were used in the multigrid cases. This was necessary, otherwise the procedure did not
converge. This may be associated with the fact that, as ap increases, SIMPLE converges faster but in
a very oscillatory manner, which may cause problems to the multigrid procedure. Since the single-grid
procedure converges faster when ap is as large as possible, the SG results have been obtained with large
values of ap , compared with the MG cases. It can be observed that multigrid is extremely efficient at
low Bn numbers, but has difficulty when Bn is large. Yet, in every case the multigrid convergence
rates are much faster than the single-grid rates, except for the first few iterations. Therefore multigrid
is preferable in any case. Moreover, we note that multigrid (with the particular choices of parameters)
converges faster for Bn = 200 with M = 200 than for Bn = 20 with M = 400. Indeed we observed
in every case that convergence deteriorates significantly not only with increasing Bn but also with
increasing M (for every Bingham number we solved the problem using M = 100, 200, and 400, except
for Bn = 500 and 1000 where only M = 100 was used due to convergence difficulties).
It is worth mentioning that the number of inner iterations seems to play an important role. In Figure
19
Figure 12: The L∞ norm of the x-momentum residual plotted against the number of multigrid cycles nC , for Bn = 0.05,
0.2, and 0.5 (M = 400, grid 256×256). Solid lines depict convergence of the standard multigrid method, while dashed lines
depict convergence of the modified multigrid method where viscosity is not updated at the coarse grids, but interpolated
from the immediately finer grid.
Figure 13: The L∞ norm of the x-momentum residual plotted against the number of multigrid cycles, nC , for Bn = 0.05,
M = 400, on various grids: 64 × 64 (chained lines), 128 × 128 (dashed lines), and 256 × 256 (solid lines). In the modified
multigrid method, viscosity is not updated at the coarse grids, but simply interpolated from the immediately finer grid.
20
(a)
(b)
Figure 14: (a) The L∞ norm of the x-momentum residual on the 256 × 256 grid plotted against the number of equivalent
fine-grid SIMPLE iterations, nS . In all cases M = 400, except M = 200 for Bn = 200. SG and MG denote respectively
single-grid and multigrid solution procedures, the initial guess being the solution of the immediately finer (128 × 128) grid.
(b) Zoom–in of (a) so that the curves 1m and 2m (which are too close to the vertical axis to be visible in (a)) are visible.
Also, to improve the readability, the results for Bn = 200 have been omitted from graph (b).
14 it can be seen that for Bn = 200, using 4 GMRES iterations and 8 CG iterations for the velocity
and pressure correction systems (labelled “ii(4,8)” in the figure) significantly improves the convergence
rate of the single-grid procedure compared to the case that 15 and 7 iterations are used instead (labelled
“ii(15,7)”). It seems that due to the nonlinearity of the algebraic system it is better not to perform
many iterations on the linearised velocity systems within each SIMPLE outer iteration. This was not
investigated in detail, due to the fact that there are already a large number of parameters involved in
the solution procedure.
6. Conclusions
We have solved the creeping lid-driven cavity flow of a Bingham plastic using the Papanastasiou
regularization and the finite volume method combined with a multigrid algorithm. Results have been
obtained for Bingham numbers in the range 0–1000. These compare favorably with the results of other
methods, such as the finite-element and the finite-difference method, and show that the proposed method
21
provides a useful tool in solving viscoplastic flows for a wide range of Bingham numbers. It should be
noted that the convergence of the method becomes slow at high values of the Bingham number and
the regularization parameter. With the use of a modified multigrid method convergence is accelerated
considerably compared to the single-grid SIMPLE method.
Acknowledgements
This work was co-funded by the European Regional Development fund and the Republic of Cyprus
through the Research Promotion Foundation (research project AEIΦOPIA/ΦYΣH/0609(BIE)/15).
REFERENCES
References
[1] H. A. Barnes, The yield stress – a review or ‘παντ α ρι’ – everything flows?, Journal of NonNewtonian Fluid Mechanics 81 (1999) 133 – 178.
[2] E. C. Bingham, Fluidity and plasticity, McGraw-Hill, New York, 1922.
[3] T. C. Papanastasiou, Flows of materials with yield, Journal of Rheology 31 (1987) 385–404.
[4] I. Frigaard, C. Nouar, On the usage of viscosity regularisation methods for visco-plastic fluid flow
computation, Journal of Non-Newtonian Fluid Mechanics 127 (2005) 1 – 26.
[5] E. O’Donovan, R. Tanner, Numerical study of the Bingham squeeze film problem, Journal of
Non-Newtonian Fluid Mechanics 15 (1984) 75 – 83.
[6] M. Fortin, R. Glowinski, Augmented Lagrangian Methods: applications to the numerical solution
of boundary-value problems, North-Holland, Amsterdam, 1983.
[7] R. Glowinski, Numerical methods for nonlinear variational problems, Springer, New York, 1984.
[8] E. J. Dean, R. Glowinski, G. Guidoboni, On the numerical simulation of Bingham visco-plastic
flow: Old and new results, Journal of Non-Newtonian Fluid Mechanics 142 (2007) 36 – 62.
[9] P. Neofytou, A 3rd order upwind finite volume method for generalised Newtonian fluid flows,
Advances in Engineering Software 36 (2005) 664–680.
[10] S. V. Patankar, D. B. Spalding, A calculation procedure for heat, mass and momentum transfer
in three-dimensional parabolic flows, International Journal of Heat and Mass Transfer 15 (1972)
1787–1806.
[11] O. Turan, N. Chakraborty, R. J. Poole, Laminar natural convection of Bingham fluids in a square
enclosure with differentially heated side walls, Journal of Non-Newtonian Fluid Mechanics 165
(2010) 901 – 913.
[12] O. Turan, N. Chakraborty, R. J. Poole, Laminar Rayleigh-Benard convection of yield stress fluids
in a square enclosure, Journal of Non-Newtonian Fluid Mechanics 171-172 (2012) 83 – 96.
[13] P. Neofytou, D. Drikakis, Effects of blood models on flows through a stenosis, International Journal
for Numerical Methods in Fluids 43 (2003) 597–635.
22
[14] P. Neofytou, D. Drikakis, Non-Newtonian flow instability in a channel with a sudden expansion,
Journal of Non-Newtonian Fluid Mechanics 111 (2003) 127 – 150.
[15] P. R. de Souza Mendes, M. F. Naccache, P. R. Varges, F. H. Marchesini, Flow of viscoplastic
liquids through axisymmetric expansions-contractions, Journal of Non-Newtonian Fluid Mechanics
142 (2007) 207 – 217.
[16] M. F. Naccache, R. S. Barbosa, Creeping flow of viscoplastic materials through a planar expansion
followed by a contraction, Mechanics Research Communications 34 (2007) 423 – 431.
[17] O. Botella, R. Peyret, Benchmark spectral results on the lid-driven cavity flow, Computers &
Fluids 27 (1998) 421 – 433.
[18] A. Syrakos, A. Goulas, Finite volume adaptive solutions using SIMPLE as smoother, International
Journal for Numerical Methods in Fluids 52 (2006) 1215–1245.
[19] C.-H. Bruneau, M. Saad, The 2D lid-driven cavity problem revisited, Computers & Fluids 35
(2006) 326 – 348.
[20] F. Sanchez, Application of a first-order operator splitting method to Bingham fluid flow simulation,
Computers & Mathematics with Applications 36 (1998) 71 – 86.
[21] E. Mitsoulis, T. Zisis, Flow of Bingham plastics in a lid-driven square cavity, Journal of NonNewtonian Fluid Mechanics 101 (2001) 173–180.
[22] D. Vola, L. Boscardin, J. Latch, Laminar unsteady flows of Bingham fluids: a numerical strategy
and some benchmark results, Journal of Computational Physics 187 (2003) 441 – 456.
[23] R. Elias, M. Martins, A. Coutinho, Parallel edge-based solution of viscoplastic flows with the
SUPG/PSPG formulation, Computational Mechanics 38 (2006) 365–381.
[24] Z. Yu, A. Wachs, A fictitious domain method for dynamic simulation of particle sedimentation in
Bingham fluids, Journal of Non-Newtonian Fluid Mechanics 145 (2007) 78–91.
[25] M. A. Olshanskii, Analysis of semi-staggered finite-difference method with application to Bingham
flows, Computer Methods in Applied Mechanics and Engineering 198 (2009) 975 – 985.
[26] J. Zhang, An augmented Lagrangian approach to Bingham fluid flows in a lid-driven square cavity
with piecewise linear equal-order finite elements, Computer Methods in Applied Mechanics and
Engineering 199 (2010) 3051 – 3057.
[27] D. D. dos Santos, S. Frey, M. F. Naccache, P. de Souza Mendes, Numerical approximations for flow
of viscoplastic fluids in a lid-driven cavity, Journal of Non-Newtonian Fluid Mechanics 166 (2011)
667 – 679.
[28] R. P. Fedorenko, A relaxation method for solving elliptic difference equations, USSR Computational
Mathematics and Mathematical Physics 1 (1962) 1092–1096.
[29] A. Brandt, Multi-level adaptive solutions to boundary-value problems, Mathematics of Computation 31 (1977) 333–390.
23
[30] S. Sivaloganathan, G. J. Shaw, A multigrid method for recirculating flows, International Journal
for Numerical Methods in Fluids 8 (1988) 417–440.
[31] M. Hortmann, M. Peric, S. G., Finite volume multigrid prediction of laminar natural convection:
benchmark solutions, International Journal for Numerical Methods in Fluids 11 (1990) 189–207.
[32] J. A. Tsamopoulos, M. E. Chen, A. V. Borkar, On the spin coating of viscoplastic fluids, Rheologica
Acta 35 (1996) 597–615.
[33] G. R. Burgos, A. N. Alexandrou, V. Entov, On the determination of yield surfaces in HerschelBulkley fluids, Journal of Rheology 43 (1999) 463–483.
[34] J. H. Ferziger, M. Peric, Computational methods for fluid dynamics, Springer, 3rd edition, 2002.
[35] A. Syrakos, A. Goulas, Estimate of the truncation error of finite volume discretization of the
Navier-Stokes equations on colocated grids, International Journal for Numerical Methods in Fluids
50 (2006) 103–130.
[36] C. M. Rhie, W. L. Chow, Numerical study of the turbulent flow past an airfoil with trailing edge
separation, AIAA Journal 21 (1983) 1525–1532.
[37] S. V. Patankar, Numerical heat transfer and fluid flow, Hemisphere, 1980.
[38] Y. Saad, Iterative Methods for Sparse Linear Systems, 2nd edition, SIAM, 2003.
[39] G. J. Shaw, S. Sivaloganathan, On the smoothing properties of the SIMPLE pressure-correction
algorithm, International Journal for Numerical Methods in Fluids 8 (1988) 441–461.
[40] G. R. Burgos, A. N. Alexandrou, Flow development of Herschel-Bulkley fluids in a sudden threedimensional square expansion, Journal of Rheology 43 (1999) 485–498.
24
| 5cs.CE
|
WRPN: Wide Reduced-Precision Networks
arXiv:1709.01134v1 [cs.CV] 4 Sep 2017
Asit Mishra Eriko Nurvitadhi Jeffrey J Cook Debbie Marr
Accelerator Architecture Lab, Intel
Abstract
For computer vision applications, prior works have shown the efficacy of reducing
numeric precision of model parameters (network weights) in deep neural networks.
Activation maps, however, occupy a large memory footprint during both the training and inference step when using mini-batches of inputs. One way to reduce this
large memory footprint is to reduce the precision of activations. However, past
works have shown that reducing the precision of activations hurts model accuracy.
We study schemes to train networks from scratch using reduced-precision activations without hurting accuracy. We reduce the precision of activation maps (along
with model parameters) and increase the number of filter maps in a layer, and find
that this scheme matches or surpasses the accuracy of the baseline full-precision
network. As a result, one can significantly improve the execution efficiency (e.g.
reduce dynamic memory footprint, memory bandwidth and computational energy)
and speed up the training and inference process with appropriate hardware support. We call our scheme WRPN - wide reduced-precision networks. We report
results and show that WRPN scheme is better than previously reported accuracies
on ILSVRC-12 dataset while being computationally less expensive compared to
previously reported reduced-precision networks.
1 Introduction
A promising approach to lower the compute and memory requirements of convolutional deeplearning workloads is through the use of low numeric precision algorithms. Operating in lower
precision mode reduces computation as well as data movement and storage requirements. Due to
such efficiency benefits, there are many existing works which propose low-precision deep neural
networks (DNNs) [25, 13, 15, 7, 22], even down to 2-bit ternary mode [27, 12, 23] and 1-bit binary
mode [26, 4, 17, 5, 21]. However, the majority of existing works in low-precision DNNs sacrifice
accuracy over the baseline full-precision networks. Further, most prior works target reducing the
precision of the model parameters (network weights). This primarily benefits the inference step only
when batch sizes are small.
To improve both execution efficiency and accuracy of low-precision networks, we reduce both the
precision of activation maps and model parameters and increase the number of filter maps in a layer.
We call networks using this scheme wide reduced-precision networks (WRPN) and find that this
scheme compensates or surpasses the accuracy of the baseline full-precision network. Although the
number of raw compute operations increases as we increase the number of filter maps in a layer, the
compute bits required per operation is now a fraction of what is required when using full-precision
operations (e.g. going from FP32 AlexNet to 4-bits precision and doubling the number of filters
increases the number of compute operations by 4x, but each operation is 8x more efficient than
FP32).
WRPN offers better accuracies, while being computationally less expensive compared to previously
reported reduced-precision networks. We report results on AlexNet [11], batch-normalized Inception [9], and ResNet-34 [8] on ILSVRC-12 [11] dataset. We find 4-bits to be sufficient for training
deep and wide models while achieving similar or better accuracy than baseline network. With 4-bit
activation and 2-bit weights, we find the accuracy to be at-par with baseline full-precision. Making
the networks wider and operating with 1-bit precision, we close the accuracy gap between previously
report binary networks and show state-of-the art results for ResNet-34 (69.85% top-1 with 2x wide)
and AlexNet (48.04% top-1 with 1.3x wide). To the best of our knowledge, our reported accuracies
with binary networks (and even 4-bit precision) are highest to date.
Our reduced-precision quantization scheme is hardware friendly allowing for efficient hardware
implementations. To this end, we evaluate efficiency benefits of low-precision operations (4-bits
to 1-bits) on Titan X GPU, Arria-10 FPGA and ASIC. We see that FPGA and ASIC can deliver
significant efficiency gain over FP32 operations (6.5x to 100x), while GPU cannot take advantage
of very low-precision operations.
2 Motivation for reduced-precision activation maps
!"#$%$"&$
!"#$%$%&
)'#!%
!"#$%
)!#)%
$+#"%
$,#,%
'$#+%
%8>?
%8-@2?
')#$%
'$#(%
',#,%
!)#*%
&'#"%
&(#&%
%89/9:4;8<::2=4312
%89/9:4;8<::2=4312
%8>?
%8-@2?
&#$%
$#'%
+)#*%
+,#$%
$&#(%
((#,%
,'#"%
'+#!%
'(#$%
'*#"%
!'#(%
!"#$%
*(#*%
&&#+%
&#'%
+
$)
-./01/2
+
$)
345)
!#!%
&#(%
(#&%
+
$)
+
4/61/27("
")#'%
!#&%
$)
"
&+
"
-./01/2
4/61/27+"+
&+
345+
"
&+
4/61/27$)
"
&+
4/61/27")"
Figure 1: Memory footprint of activations (ACTs) and weights (W) during training and inference for minibatch sizes 1 and 32.
While most prior works proposing reduced-precision networks work with low precision weights
(e.g. [4, 27, 26, 23, 12, 5, 21]), we find that activation maps occupy a larger memory footprint when
using mini-batches of inputs. Using mini-batches of inputs is typical in training of DNNs and cloudbased batched inference [10]. Figure 1 shows memory footprint of activation maps and filter maps
as batch size changes for 4 different networks (AlexNet, Inception-Resnet-v2 [19], ResNet-50 and
ResNet-101) during the training and inference steps.
W
W
OFM
/IFM
!
"
ACT
OFM
/IFM
!
"
ACT
Layer !"#
$!
Grad
W
OFM
/IFM
!
"
ACT
Layer !
$!
$"
OFM
/IFM
$!
$"
Grad
ACT
Layer !%#
Grad
$"
Grad
Figure 2: Memory requirements of a feed forward convolutional deep neural network. Orange boxes denote
weights (W), blue boxes are activations (ACT) and green boxes are gradient-maps (Grad).
As batch-size increases, because of filter reuse across batches of inputs, activation maps occupy
significantly larger fraction of memory compared to the filter weights. This aspect is illustrated in
Figure 2 which shows the memory requirements of a canonical feed-forward DNN for a hardware
accelerator based system (e.g. GPU, FPGA, PCIe connected ASIC device, etc.). During training,
the sum of all the activation maps (ACT) and weight tensors (W) are allocated in device memory for
forward pass along with memory for gradient maps during backward propagation. The total memory
requirements for training phase is the sum of memory required for the activation maps, weights and
the maximum of input gradient maps (δZ) and maximum of back-propagated gradients (δX). During
inference, memory is allocated for input (IFM) and output feature maps (OFM) required by a single
layer, and these memory allocations are reused for other layers. The total memory allocation during
inference is then the maximum of IFM and maximum of OFM required across all the layers plus the
sum of all W-tensors. At batch sizes 128 and more, activations start to occupy more than 98% of
total memory footprint during training.
2
Overall, reducing precision of activations and weights reduces memory footprint, bandwidth and
storage while also simplifying the requirements for hardware to efficiently support these operations.
3 WRPN scheme and studies on AlexNet
Based on the observation that activations occupy more memory footprint compared to weights, we
reduce the precision of activations to speed up training and inference steps as well as cut down on
memory requirements. However, a straightforward reduction in precision of activation maps leads
to significant reduction in model accuracy [26, 17].
We conduct a sensitivity study where we reduce precision of activation maps and model weights
for AlexNet running ILSVRC-12 dataset and train the network from scratch. Table 1 reports our
findings. Top-1 single-precision (32-bits weights and activations) accuracy is 57.2%. The accuracy
with binary weights and activations is 44.2%. This is similar to what is reported in [17]. 32bA and
2bW data-point in this table is using TTQ technique [27]. All other data points are collected using
our quantization scheme (described later in Section 5), all the runs have same hyper-parameters and
training is carried out for the same number of epochs as baseline network. To be consistent with
results reported in prior works, we do not quantize weights and activations of the first and last layer.
We find that, in general, reducing the precision of activation maps and weights hurts model accuracy.
Further, reducing precision of activations hurts model accuracy much more than reducing precision
of the filter parameters. We find TTQ to be quite effective on AlexNet in that one can lower the
precision of weights to 2b (while activations are still FP32) and not lose accuracy. However, we did
not find this scheme to be effective for other networks like ResNet or Inception.
Table 1: AlexNet top-1 validation set accuracy
% as precision of activations (A) and weight(W)
changes. All results are with end-to-end training
of the network from scratch. − is a data-point
we did not experiment for.
32b W
8b W
4b W
2b W
1b W
32b A
8b A
4b A
2b A
1b A
57.2
–
–
57.5
56.8
54.3
54.5
54.2
50.2
–
54.4
53.2
54.4
50.5
–
52.7
51.5
52.4
51.3
–
–
–
–
–
44.2
Table 2: AlexNet 2x-wide top-1 validation set
accuracy % as precision of activations (A) and
weights (W) changes.
32b W
8b W
4b W
2b W
1b W
32b A
8b A
4b A
2b A
1b A
60.5
–
–
–
–
58.9
59.0
58.8
57.6
–
58.6
58.8
58.6
57.2
–
57.5
57.1
57.3
55.8
–
52.0
50.8
–
–
48.3
To re-gain the model accuracy while working with reduced-precision operands, we increase the
number of filter maps in a layer. Although the number of raw compute operations increase with
widening the filter maps in a layer, the bits required per compute operation is now a fraction of what
is required when using full-precision operations. As a result, with appropriate hardware support,
one can significantly reduce the dynamic memory requirements, memory bandwidth, computational
energy and speed up the training and inference process.
Our widening of filter maps is inspired from Wide ResNet [24] work where the depth of the network
is reduced and width of each layer is increased (the operand precision is still FP32). Wide ResNet requires a re-design of the network architecture. In our work, we maintain the depth parameter same as
baseline network but widen the filter maps. We call our approach WRPN - wide reduced-precision
networks. In practice, we find this scheme to be very simple and effective - starting with a baseline network architecture, one can change the width of each filter map without changing any other
network design parameter or hyper-parameters. Carefully reducing precision and simultaneously
widening filters keeps the total compute cost of the network under or at-par with baseline cost.1
Table 2 reports the accuracy of AlexNet when we double the number of filter maps in a layer. With
doubling of filter maps, AlexNet with 4-bits weights and 2-bits activations exhibits accuracy at-par
with full-precision networks. Operating with 4-bits weights and 4-bits activations surpasses the
baseline accuracy by 1.44%. With binary weights and activations we better the accuracy of XNORNET [17] by 4%.
1
Compute cost is the product of the number of FMA operations and the sum of width of the activation and
weight operands.
3
When doubling the number of filter maps, AlexNet’s raw compute operations grow by 3.9x compared to the baseline full-precision network, however by using reduced-precision operands the overall compute complexity is a fraction of the baseline. For example, with 4b operands for weights and
activations and 2x the number of filters, reduced-precision AlexNet is just 49% of the total compute
cost of the full-precision baseline (compute cost comparison is shown in Table 3).
Table 3: Compute cost of AlexNet 2x-wide vs. 1x-wide as precision of activations (A) and weights (W) changes.
32b W
8b W
4b W
2b W
1b W
32b A
8b A
4b A
2b A
1b A
3.9x
2.4x
2.2x
2.1x
2.0x
2.4x
1.0x
0.7x
0.6x
0.6x
2.2x
0.7x
0.5x
0.4x
0.3x
2.1x
0.6x
0.4x
0.2x
0.2x
2.0x
0.6x
0.3x
0.2x
0.1x
We also experiment with other widening factors. With 1.3x widening of filters and with 4-bits of
activation precision one can go as low as 8-bits of weight precision while still being at-par with
baseline accuracy. With 1.1x wide filters, at least 8-bits weight and 16-bits activation precision
is required for accuracy to match baseline full-precision 1x wide accuracy. Further, as Table 3
shows, when widening filters by 2x, one needs to lower precision to at least 8-bits so that the total
compute cost is not more than baseline compute cost. Thus, there is a trade-off between widening
and reducing the precision of network parameters.
In our work, we trade-off higher number of raw compute operations with aggressively reducing the
precision of the operands involved in these operations (activation maps and filter weights) while
not sacrificing the model accuracy. Apart from other benefits of reduced precision activations as
mentioned earlier, widening filter maps also improves the efficiency of underlying GEMM calls for
convolution operations since compute accelerators are typically more efficient on a single kernel consisting of parallel computation on large data-structures as opposed to many small sized kernels [24].
4 Studies on deeper networks
We study how our scheme applies to deeper networks. For this, we study ResNet-34 [8] and batchnormalized Inception [9] and find similar trends, particularly that 2-bits weight and 4-bits activations
continue to provide at-par accuracy as baseline. We use TensorFlow [2] and tensorpack [1] for all
our evaluations and use ILSVRC-12 train and val dataset for analysis.2
4.1 ResNet
ResNet-34 has 3x3 filters in each of its modular layers with shortcut connections being 1x1. The
filter bank width changes from 64 to 512 as depth increases. We use the pre-activation variant of
ResNet and the baseline top-1 accuracy of our ResNet-34 implementation using single-precision
32-bits data format is 73.59%. Binarizing weights and activations for all layers except the first and
the last layer in this network gives top-1 accuracy of 60.5%. For binarizing ResNet we did not reorder any layer (as is done in XNOR-NET). We used the same hyper-parameters and learning rate
schedule as the baseline network. As a reference, for ResNet-18, the gap between XNOR-NET (1b
weights and activations) and full-precision network is 18% [17]. It is also interesting to note that
top-1 accuracy of single-precision AlexNet (57.20%) is lower than the top-1 accuracy of binarized
ResNet-34 (60.5%).
We experimented with doubling number of filters in each layer and reduce the precision of activations and weights. Table 4 shows the results of our analysis. Doubling the number of filters and
4-bits precision for both weights and activations beats the baseline accuracy by 0.9%. 4-bits activations and 2-bits (ternary) weights has top-1 accuracy at-par with baseline. Reducing precision to
2-bits for both weights and activations degrades accuracy by only 0.2% compared to baseline.
2
We will open-source our implementation of reduced-precision AlexNet, ResNet and batch-normalized
Inception networks.
4
Table 4: ResNet-34 top-1 validation accuracy % and compute cost as
precision of activations (A) and weights (W) varies.
Width
Precision
Top-1 Acc. %
Compute cost
1x wide
32b A, 32b W
1b A, 1b W
73.59
60.54
1x
0.03x
2x wide
4b A, 8b W
4b A, 4b W
4b A, 2b W
2b A, 4b W
2b A, 2b W
1b A, 1b W
74.48
74.52
73.58
73.50
73.32
69.85
0.74x
0.50x
0.39x
0.39x
0.27x
0.15x
3x wide
1b A, 1b W
72.38
0.30x
Binarizing the weights and activations with 2x wide filters has a top-1 accuracy of 69.85%. This
is just 3.7% worse than baseline full-precision network while being only 15% of the cost of the
baseline network. Widening the filters by 3x and binarizing the weights and activations reduces this
gap to 1.2% while the 3x wide network is 30% the cost of the full-precision baseline network.
Although 4-bits precision seems to be enough for wide networks, we advocate for 4-bits activation precision and 2-bits weight precision. This is because with ternary weights one can get rid
of the multipliers and use adders instead. Additionally, with this configuration there is no loss of
accuracy. Further, if some accuracy degradation is tolerable, one can even go to binary circuits for
efficient hardware implementation while saving 32x in bandwidth for each of weights and activations compared to full-precision networks. All these gains can be realized with simpler hardware
implementation and lower compute cost compared to baseline networks.
To the best of our knowledge, our ResNet binary and ternary (with 2-bits or 4-bits activation) top-1
accuracies are state-of-the-art results in the literature including unpublished technical reports (with
similar data augmentation [14]).
4.2 Batch-normalized Inception
We applied WRPN scheme to batch-normalized Inception network [9]. This network includes batch
normalization of all layers and is a variant of GoogleNet [20] where the 5x5 convolutional filters
are replaced by two 3x3 convolutions with up to 128 wide filters. Table 5 shows the results of
our analysis. Using 4-bits activations and 2-bits weight and doubling the number of filter banks in
the network produces a model that is almost at-par in accuracy with the baseline single-precision
network (0.02% loss in accuracy). Wide network with binary weights and activations is within 6.6%
of the full-precision baseline network.
Table 5: Batch-normalized Inception top-1 validation accuracy % and
compute cost as precision of activations (A) and weights (W) varies.
Width
Precision
Top-1 Acc. %
Compute cost
1x wide
32b A, 32b W
71.64
1x
2x wide
4b A, 4b W
4b A, 2b W
2b A, 2b W
1b A, 1b W
71.63
71.61
70.75
65.02
0.50x
0.38x
0.25x
0.13x
5 Hardware friendly quantization scheme
We adopt the straight-through estimator (STE) approach in our work [3]. When quantizing a real
number to k-bits, the ordinality of the set of quantized numbers is 2k . Mathematically, this small
and finite set would have zero gradients with respect to its inputs. STE method circumvents this
problem by defining an operator that has arbitrary forward and backward operations.
5
Prior works using the STE approach define operators that quantize the weights based on the expectation of the weight tensors. For instance, TWN [12] uses a threshold and a scaling factor for each
layer to quantize weights to ternary domain. In TTQ [27], the scaling factors are learned parameters.
XNOR-NET binarizes the weight tensor by computing the sign of the tensor values and then scaling
by the mean of the absolute value of each output channel of weights. DoReFa uses a single scaling
factor across the entire layer. For quantizing weights to k-bits, where k > 1, DoReFa uses:
wk = 2 ∗ quantizek (
tanh(wi )
1
+ ) − 1)
2 ∗ max(| tanh(wi ) |) 2
(1)
Here wk is the k-bit quantized version of inputs wi and quantizek is a quantization function that
quantizes a floating-point number wi in the range [0, 1] to a k-bit number in the same range. The
transcendental tanh operation constrains the weight value to lie in between −1 and +1. The affine
transformation post quantization brings the range to [−1, 1].
We build on these approaches and propose a much simpler scheme. For quantizing weight tensors we first hard constrain the values to lie within the range [−1, 1] using min-max operation (e.g.
tf.clip_by_val when using Tensorflow [2]). For quantizing activation tensor values, we constrain the
values to lie within the range [0, 1]. This step is followed by a quantization step where a real number
is quantized into a k-bit number. This is given as, for k > 1:
wk =
1
2k−1
−1
round((2k−1 − 1) ∗ wi )
and
ak =
2k
1
round((2k − 1) ∗ ai )
−1
(2)
Here wi and ai are input real-valued weights and activation tensor and wk and ak are their quantized versions. One bit is reserved for sign-bit in case of weight values, hence the use of 2k−1 for
these quantized values. Thus, weights can be stored and interpreted using signed data-types and
activations using un-signed data-types. With appropriate affine transformations, the convolution operations (the bulk of the compute operations in the network during forward pass) can be done using
quantized values (integer operations in hardware) followed by scaling with floating-point constants
(this scaling operation can be done in parallel with the convolution operation in hardware). When
k = 1, for binary weights we use the BWN approach [5] where the binarized weight value is computed based on the sign of input value followed by scaling with the mean of absolute values. For
binarized activations we use the formulation in Eq. 2. We do not quantize the gradients and maintain
the weights in reduced precision format.
For convolution operation when using WRPN, the forward pass during training (and the inference
step) involves matrix multiplication of k-bits signed and k-bits unsigned operands. Since gradient values are in 32-bits floating-point format, the backward pass involves a matrix multiplication
operation using 32-bits and k-bits operand for gradient and weight update.
When k > 1, the hard clipping of tensors to a range maps efficiently to min-max comparator units
in hardware as opposed to using transcendental operations which are long latency operations. TTQ
and DoRefa schemes involve division operation and computing a maximum value in the input tensor.
Floating-point division operation is expensive in hardware and computing the maximum in a tensor
is an O(n) operation. Additionally, our quantization parameters are static and do not require any
learning or involve back-propagation like TTQ approach. We avoid each of these costly operations
and propose a simpler quantization scheme (clipping followed by rounding).
5.1 Efficiency improvements of reduced-precision operations on GPU, FPGA and ASIC
In practice, the effective performance and energy efficiency one could achieve on a low-precision
compute operation highly depends on the hardware that runs these operations. We study the efficiency of low-precision operations on various hardware targets – GPU, FPGA, and ASIC.
For GPU, we evaluate WRPN on Nvidia Titan X Pascal and for FPGA we use Intel Arria-10. We
collect performance numbers from both previously reported analysis [16] as well as our own experiments. For FPGA, we implement a DNN accelerator architecture shown in Figure 3(a). This
is a prototypical accelerator design used in various works (e.g., on FPGA [16] and ASIC such as
TPU [10]). The core of the accelerator consists of a systolic array of processing elements (PEs)
6
to perform matrix and vector operations, along with on-chip buffers, as well as off-chip memory
management unit. The PEs can be configured to support different precision – (FP32, FP32), (INT4,
INT4), (INT4, TER2), and (BIN1, BIN1). The (INT4, TER2) PE operates on ternary (+1,0,-1) values and is optimized to include only an adder since there is no need for a multiplier in this case.
The binary (BIN1, BIN1) PE is implemented using XNOR and bitcount. Our RTL design targets
Arria-10 1150 FPGA. For our ASIC study, we synthesize the PE design using Intel 14 nm process
technology to obtain area and energy estimates.
/
45
45
/
!"#$%&'( )*++,-.
<=>$9'+0$
%7<=$)+$
?@AB
!"##$%"&'()#*'+,-.
45
!"##$%"&'()#*'+,-.
45
%76;$(.--,/.($1'-$)'15H&2I$B() +',-'$
-()&01)-(C$(&25-$&)($91"'&5$&($1$I++,$9&)$
9+'$5/()+0$:+3*.'-5&(&+2$+.-'1)&+2(
!"##$%"&'()#*'+,-.
@2$.'15)&5-C$+2:D$/.$)+$EF>$
(.--,/.($&2$678C$(&25-$2+$
(/..+')$9+'$(/"$G*"&)$.'-5&(&+2(
0--12(3+(45.
/
/
/
6,7(89-:
!"#$%&'()*+',-'$
(.--,/.$-()&01)-($
"1(-,$+2$"&)*3&,)4
!-#$678$12,$%76;$.-'9+'0125-$12,$-2-'ID$-99&5&-25D$9+'$K1'&+/($
.'-5&(&+2(L$%76;$,+-($3-::$+2$K-'D$:+3$.'-5&(&+2(L
=0"*()#0#2>&'()#*'+,-.
BF<F
!,#$%76;$(.--,/.($
9+'$:+3*.'-5&(&+2$
+.-'1)&+2(
=0"*()#0#2>&'()#*'+,-.
!5#$ 678$(.--,/.($
9+'$:+3*.'-5&(&+2$
+.-'1)&+2(
,#*/(*0123#452#*67'
89:,4&4;<
,#*/(*0123#'8?:,4&<
!1#$JAA$ 41',31'-$
/2,-'$()/,D
!9#$;M@N$5+0./)-$
/2&)$.-'9+'0125-
!I#$;M@N$5+0./)-$
/2&)$-2-'ID
Figure 3: Efficiency improvements from low-precision operations on GPU, FPGA and ASIC.
Figure 3(b) - (g) summarize our analysis. Figure 3(b) shows the efficiency improvements using
first-order estimates where the efficiency is computed based on number of bits used in the operation.
With this method we would expect (INT4, INT4) and (BIN1, BIN1) to be 8x and 32x more efficient,
respectively, than (FP32, FP32). However, in practice the efficiency gains from reducing precision
depend on whether the underlying hardware can take advantage of such low-precisions.
Figure 3(c) shows performance improvement on Titan X GPU for various low-precision operations
relative to FP32. In this case, GPU can only achieve up to ∼4x improvements in performance over
FP32 baseline. This is because GPU only provides first-class support for INT8 operations, and is not
able to take advantage of the lower INT4, TER2, and BIN1 precisions. On the contrary, FPGA can
take advantage of such low precisions, since they are amenable for implementations on the FPGA’s
reconfigurable fabric.
Figure 3(d) shows that the performance improvements from (INT4, INT4), (INT4, TER2), and
(BIN1, BIN1) track well with the first-order estimates from Figure 3(b). In fact, for (BIN1, BIN1),
FPGA improvements exceed the first-order estimate. Reducing the precision simplifies the design
of compute units and lower buffering requirements on FPGA board. Compute-precision reduction
leads to significant improvement in throughput due to smaller hardware designs (allowing more parallelism) and shorter circuit delay (allowing higher frequency). Figure 3(e) shows the performance
and performance/Watt of the reduced-precision operations on GPU and FPGA. FPGA performs
quite well on very low precision operations. In terms of performance/watt, FPGA does better than
GPU on (INT4, INT4) and lower precisions.
7
ASIC allows for a truly customized hardware implementation. Our ASIC study provides insights to
the upper bound of the efficiency benefits possible from low-precision operations. Figure 3(f) and
3(g) show improvement in performance and energy efficiency of the various low-precision ASIC
PEs relative to baseline FP32 PE. As the figures show, going to lower precision offers 2 to 3 orders
of magnitude efficiency improvements.
In summary, FPGA and ASIC are well suited for our WRPN approach. At 2x wide, our WRPN
approach requires 4x more total operations than the original network. However, for INT4 or lower
precision, each operation is 6.5x or better in efficiency than FP32 for FPGA and ASIC. Hence,
WRPN delivers an overall efficiency win.
6 Related work
Reduced-precision DNNs is an active research area. Reducing precision of weights for efficient
inference pipeline has been very well studied. Works like Binary connect (BC) [5], Ternary-weight
networks (TWN) [12], fine-grained ternary quantization [14] and INQ [25] target reducing the precision of network weights while still using full-precision activations. Accuracy is almost always
degraded when quantizing the weights. For AlexNet on Imagenet, TWN loses 5% top-1 accuracy.
Schemes like INQ, [18] and [14] do fine-tuning to quantize the network weights and do not sacrifice
accuracy as much but are not applicable for training networks from scratch. INQ shows promising
results with 5-bits of precision.
XNOR-NET [17], BNN [4], DoReFa [26] and TTQ [27] target training as well. While TTQ targets
weight quantization only, most works targeting activation quantization hurt accuracy. XNOR-NET
approach reduces top-1 accuracy by 12% and DoReFa by 8% when quantizing both weights and
activations to 1-bit (for AlexNet on ImageNet). Further, XNOR-NET requires re-ordering of layers
for its scheme to work. Recent work in [6] targets low-precision activations
√ and reports accuracy
within 1% of baseline with 5-bits precision and logarithmic (with base 2) quantization. With
fine-tuning this gap can be narrowed to be within 0.6% but not all layers are quantized.
Non-multiples of two for operand values introduces hardware inefficiency in that memory accesses
are no longer DRAM or cache-boundary aligned and end-to-end run-time performance aspect is unclear when using complicated quantization schemes. We target end-to-end training and inference,
using very simple quantization method and aim for reducing precision without any loss in accuracy.
To the best of our knowledge, our work is the first to study reduced-precision deep and wide networks, and show accuracy at-par with baseline for as low a precision as 4-bits activations and 2-bits
weights. We report state of the art accuracy for wide binarized AlexNet and ResNet while still being
lower in compute cost.
7 Conclusions
We present the Wide Reduced-Precision Networks (WRPN) scheme for DNNs. In this scheme, the
numeric precision of both weights and activations are significantly reduced without loss of network
accuracy. This result is in contrast to many previous works that find reduced-precision activations to
detrimentally impact accuracy; specifically, we find that 2-bit weights and 4-bit activations are sufficient to match baseline accuracy across many networks including AlexNet, ResNet-34 and batchnormalized Inception. We achieve this result with a new quantization scheme and by increasing
the number of filter maps in each reduced-precision layer to compensate for the loss of information
capacity induced by reducing the precision.
We motivate this work with our observation that full-precision activations contribute significantly
more to the memory footprint than full-precision weight parameters when using mini-batch sizes
common during training and cloud-based inference; furthermore, by reducing the precision of both
activations and weights the compute complexity is greatly reduced (40% of baseline for 2-bit weights
and 4-bit activations).
The WRPN quantization scheme and computation on low precision activations and weights is hardware friendly making it viable for deeply-embedded system deployments as well as in cloud-based
training and inference servers with compute fabrics for low-precision. We compare Titan X GPU,
Arria-10 FPGA and ASIC implementations using WRPN and show our scheme increases perfor8
mance and energy-efficiency for iso-accuracy across each. Overall, reducing the precision allows
custom-designed compute units and lower buffering requirements to provide significant improvement in throughput.
9
References
[1] https://github.com/ppwwyyxx/tensorpack.
[2] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S. Corrado, A. Davis, J. Dean,
M. Devin, S. Ghemawat, I. Goodfellow, A. Harp, G. Irving, M. Isard, Y. Jia, R. Jozefowicz, L. Kaiser,
M. Kudlur, J. Levenberg, D. Mané, R. Monga, S. Moore, D. Murray, C. Olah, M. Schuster, J. Shlens,
B. Steiner, I. Sutskever, K. Talwar, P. Tucker, V. Vanhoucke, V. Vasudevan, F. Viégas, O. Vinyals, P. Warden, M. Wattenberg, M. Wicke, Y. Yu, and X. Zheng. TensorFlow: Large-scale machine learning on
heterogeneous systems, 2015. Software available from tensorflow.org.
[3] Y. Bengio, N. Léonard, and A. C. Courville. Estimating or propagating gradients through stochastic
neurons for conditional computation. CoRR, abs/1308.3432, 2013.
[4] M. Courbariaux and Y. Bengio. Binarynet: Training deep neural networks with weights and activations
constrained to +1 or -1. CoRR, abs/1602.02830, 2016.
[5] M. Courbariaux, Y. Bengio, and J. David. Binaryconnect: Training deep neural networks with binary
weights during propagations. CoRR, abs/1511.00363, 2015.
[6] B. Graham. Low-precision batch-normalized activations. CoRR, abs/1702.08231, 2017.
[7] S. Gupta, A. Agrawal, K. Gopalakrishnan, and P. Narayanan. Deep learning with limited numerical
precision. CoRR, abs/1502.02551, 2015.
[8] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. CoRR,
abs/1512.03385, 2015.
[9] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal
covariate shift. CoRR, abs/1502.03167, 2015.
[10] N. P. Jouppi, C. Young, N. Patil, D. Patterson, G. Agrawal, R. Bajwa, S. Bates, S. Bhatia, N. Boden,
A. Borchers, R. Boyle, P.-l. Cantin, C. Chao, C. Clark, J. Coriell, M. Daley, M. Dau, J. Dean, B. Gelb,
T. Vazir Ghaemmaghami, R. Gottipati, W. Gulland, R. Hagmann, C. R. Ho, D. Hogberg, J. Hu, R. Hundt,
D. Hurt, J. Ibarz, A. Jaffey, A. Jaworski, A. Kaplan, H. Khaitan, A. Koch, N. Kumar, S. Lacy, J. Laudon,
J. Law, D. Le, C. Leary, Z. Liu, K. Lucke, A. Lundin, G. MacKean, A. Maggiore, M. Mahony, K. Miller,
R. Nagarajan, R. Narayanaswami, R. Ni, K. Nix, T. Norrie, M. Omernick, N. Penukonda, A. Phelps,
J. Ross, M. Ross, A. Salek, E. Samadiani, C. Severn, G. Sizikov, M. Snelham, J. Souter, D. Steinberg,
A. Swing, M. Tan, G. Thorson, B. Tian, H. Toma, E. Tuttle, V. Vasudevan, R. Walter, W. Wang, E. Wilcox,
and D. H. Yoon. In-Datacenter Performance Analysis of a Tensor Processing Unit. ArXiv e-prints, Apr.
2017.
[11] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural
networks. In F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, editors, Advances in Neural
Information Processing Systems 25, pages 1097–1105. Curran Associates, Inc., 2012.
[12] F. Li and B. Liu. Ternary weight networks. CoRR, abs/1605.04711, 2016.
[13] Z. Lin, M. Courbariaux, R. Memisevic, and Y. Bengio. Neural networks with few multiplications. CoRR,
abs/1510.03009, 2015.
[14] N. Mellempudi, A. Kundu, D. Mudigere, D. Das, B. Kaul, and P. Dubey. Ternary Neural Networks with
Fine-Grained Quantization. ArXiv e-prints, May 2017.
[15] D. Miyashita, E. H. Lee, and B. Murmann. Convolutional neural networks using logarithmic data representation. CoRR, abs/1603.01025, 2016.
[16] E. Nurvitadhi, G. Venkatesh, J. Sim, D. Marr, R. Huang, J. Ong Gee Hock, Y. T. Liew, K. Srivatsan,
D. Moss, S. Subhaschandra, and G. Boudoukh. Can fpgas beat gpus in accelerating next-generation
deep neural networks? In Proceedings of the 2017 ACM/SIGDA International Symposium on FieldProgrammable Gate Arrays, FPGA ’17, pages 5–14, New York, NY, USA, 2017. ACM.
[17] M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi. Xnor-net: Imagenet classification using binary
convolutional neural networks. CoRR, abs/1603.05279, 2016.
[18] W. Sung, S. Shin, and K. Hwang. Resiliency of deep neural networks under quantization. CoRR,
abs/1511.06488, 2015.
[19] C. Szegedy, S. Ioffe, and V. Vanhoucke. Inception-v4, inception-resnet and the impact of residual connections on learning. CoRR, abs/1602.07261, 2016.
[20] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. E. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. Going deeper with convolutions. CoRR, abs/1409.4842, 2014.
[21] Y. Umuroglu, N. J. Fraser, G. Gambardella, M. Blott, P. H. W. Leong, M. Jahre, and K. A. Vissers. FINN:
A framework for fast, scalable binarized neural network inference. CoRR, abs/1612.07119, 2016.
[22] V. Vanhoucke, A. Senior, and M. Z. Mao. Improving the speed of neural networks on cpus. In Deep
Learning and Unsupervised Feature Learning Workshop, NIPS 2011, 2011.
[23] G. Venkatesh, E. Nurvitadhi, and D. Marr. Accelerating deep convolutional networks using low-precision
and sparsity. CoRR, abs/1610.00324, 2016.
[24] S. Zagoruyko and N. Komodakis. Wide residual networks. CoRR, abs/1605.07146, 2016.
[25] A. Zhou, A. Yao, Y. Guo, L. Xu, and Y. Chen. Incremental network quantization: Towards lossless cnns
with low-precision weights. CoRR, abs/1702.03044, 2017.
10
[26] S. Zhou, Z. Ni, X. Zhou, H. Wen, Y. Wu, and Y. Zou. Dorefa-net: Training low bitwidth convolutional
neural networks with low bitwidth gradients. CoRR, abs/1606.06160, 2016.
[27] C. Zhu, S. Han, H. Mao, and W. J. Dally. Trained ternary quantization. CoRR, abs/1612.01064, 2016.
11
| 9cs.NE
|
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
arXiv:1110.0383v3 [math.AC] 1 Jul 2013
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
Abstract. Let G be an abelian group and S be a G-graded a Noetherian algebra over a
commutative ring A ⊆ S0 . Let I1 , . . . , Is be G-homogeneous ideals in S, and let M be a
finitely generated G-graded S-module. We show that the shape of nonzero G-graded Betti
numbers of M I1t1 . . . Ists exhibit an eventual linear behavior as the ti s get large.
1. Introduction
It is a celebrated result (cf. [5, 12, 15]) that if I ⊆ S is a homogeneous ideal in a
Noetherian standard N-graded algebra and M is a finitely generated Z-graded S-module
then the regularity reg(I t M) is asymptotically a linear function for t ≫ 0. This asymptotic
linear function and the stabilization index have also been studied in [1, 4, 7, 8, 9].
In the case S is a polynomial ring over a field, a more precise result is proved in [5]: the
maximal degree of an i-th syzygy of I t M is eventually a linear function of t. Our interest
here is to understand the eventual behavior of the degrees of all the minimal generators of
the i-th syzygy module. This is of particular interest when the grading is given by some
finitely generated abelian group G that is not Z, as in this case the result for the regularity
of powers do not have an evident analogue. One can in particular consider the Cox ring of
a toric variety, graded by the divisor class group.
We shall actually show, in the G-graded setting, that the collection of nonzero G-graded
Betti numbers of MI1t1 . . . Ists exhibits an asymptotic linear behavior as the ti s get large.
Let us also point out that, even when an explicit minimal free resolution of these powers is
known, for instance when I is a complete intersection ideal, the degrees of i-th syzygies of
I t do not exhibit trivially a linear behavior.
Throughout the paper, let G be a finitely generated abelian group and let S = A[x1 , . . . , xn ]
be a G-graded algebra over a commutative ring A ⊆ S0 . Hence A = S/(x1 , . . . , xn ) is a Ggraded S-module concentrated in degree 0.
Our work hinges on the relationship between multigraded Betti numbers and the graded
pieces of TorSi (MI1t1 . . . Ists , A); we, thus, examine the support of TorSi (MI1t1 · · · Ists , A) as the
ti s get large. Our main result, in the case of a single ideal, gives the following:
2000 Mathematics Subject Classification. 13D45, 13D02.
Key words and phrases. Betti numbers, asymptotic linearity, multigraded.
1
2
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
Theorem 1.1 (see Theorem 4.6). Let I = (f1 , . . . , fr ) be a G-homogeneous S-ideal, and let
M be a finitely generated G-graded S-module. Set Γ := {degG (fi )}ri=1 .
Let ℓ ≥ 0, and assume that ℓ = 0 or A is Noetherian.
There exist a finite collection of elements δi ∈ G, a finite collection of integers ti , and
a finite collection of non-empty tuples Ei = (γi,1 , . . . , γi,si ) of elements in Γ, such that the
elements (γi,j+1 − γi,j , 1 ≤ j ≤ si − 1) are linearly independent, satisfying
SuppG (TorSℓ (MI t , A)) =
m
[
i=1
[
c1 +···+csi =t−ti ,
c1 ,...,csi ∈N
c1 γi,1 + · · · + csi γi,si + δi ,
∀t ≥ max{ti }.
i
The condition of linear independence stated for Ei implies that c1 γi,1 + · · · + csi γi,si 6=
c′1 γi,1 + · · · + c′si γi,si if c1 + · · · + csi = c′1 + · · · + c′si and (c1 , . . . , csi ) 6= (c′1 , . . . , c′si ). Notice
the important fact that the elements in Ei are all in Γ, the set of degrees of generators of I.
Theorem 4.6 is proved in the last section of the paper. Our proof is based on the two
following observations. Firstly,
module (sometimes also referred to as the
L the multi-Rees
t1
ts
Rees modification) MR =
MI
.
.
.
I
is
a G × Zs -graded module over the multi1
s
ti ≥0
L
Rees algebra R = ti ≥0 I1t1 . . . Ists . Secondly, if G′ is a finitely generated abelian group and
R = S[T1 , . . . , Tr ] is a G × G′ -graded polynomial extension of S, such that degG×G′ (a) =
(degG (a), 0) for any a ∈ S, then for a graded complex G• of free R-modules,
Hi (G• )G×{δ} ⊗S A = Hi G• ⊗S A G×{δ} ,
where (•)G×{δ} denotes the degree G × {δ}-strand of the corresponding complex. In particular, if G• is a G × G′ -graded free resolution of an R-module N, as (G• )G×{δ} is a G-graded
free resolution of the S-module NG×{δ} , it follows that
TorSi (NG×{δ} , A) = Hi (G• ⊗S A)G×{δ} ,
in which G• ⊗S A is viewed as a G × G′ -graded complex of free A[T1 , . . . , Tr ]-modules. These
observations allow us to bring the problem to studying the support of graded A[T1 , . . . , Tr ]modules. We proceed by making use of the notion of initial submodules to reduce to the case
when the module is a quotient ring obtained by a monomial ideal. The result then follows
by considering the Stanley decomposition of such a quotient ring.
In its full generality, our proof of Theorem 4.6 is quite technical, so we start in Section
3 by considering first the case when each Ii is equi-generated. In fact, in this case, with
the additional assumption that A is a Noetherian ring, our results are much stronger; the
asymptotic linearity appears clearer and the proofs are simpler. We can also examine the
support of local cohomology modules of MI1t1 . . . Ists . Our results, in the case when each Ii
is finitely generated in a single degree γi , are stated as follows.
Theorem 1.2 (Theorem 3.3). Assume that i = 0 or A is Noetherian. Then there exists a
finite set ∆i ⊆ G such that
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
3
(1) For all t = (t1 , . . . , ts ) ∈ Ns , TorSi (MI1t1 · · · Ists , A)η = 0 if η 6∈ ∆i + t1 γ1 + · · · + ts γs .
(2) There exists a subset ∆′i ⊆ ∆i such that TorSi (MI1t1 · · · Ists , A)η+t1 γ1 +···+ts γs 6= 0 for
t ≫ 0 and η ∈ ∆′i , and TorSi (MI1t1 · · · Ists , A)η+t1 γ1 +···+ts γs = 0 for t ≫ 0 and η 6∈ ∆′i .
(3) Let A → k be a ring homomorphism to a field k. Then for any δ and any j, the
function
t1
S
ts
dimk TorA
j (Tori (MI1 · · · Is , A)δ+t1 γ1 +···+ts γs , k)
is polynomial in the ti s for t ≫ 0, and the function
dimk TorSi (MI1t1 · · · Ists , k)δ+t1 γ1 +···+ts γs
is polynomial in the ti s for t ≫ 0.
Theorem 1.3 (Theorem 3.4). Let b be a G-homogeneous ideal in S such that for any i ≥ 0
and δ ∈ G, Hbi (S)δ is a finitely generated A-module. Then, if A is Noetherian, for i ≥ 0,
there exists a subset Λi ⊆ G such that
(1) Hbi (MI1t1 · · · Ists )η+t1 γ1 +···+ts γs 6= 0 for t = (t1 , . . . , ts ) ≫ 0 if only if η ∈ Λi .
(2) Let A → k be a ring homomorphism to a field k. Then for any δ and any j, the
function
t1
i
ts
dimk TorA
j (Hb (MI1 · · · Is )δ+t1 γ1 +···+ts γs , k)
is a polynomial in the ti s for t ≫ 0.
In the simplest scenario, when S is a standard graded polynomial ring over a field k, m ⊆ S
the homogeneous maximal S-ideal, s = 1, and I ⊆ S is a homogeneous ideal generated in
degree d, Theorems 1.2 and 1.3 give the following result.
Corollary 1.4. For i ≥ 0, there exist ti and finite sets ∆′i ⊆ ∆i ⊆ Z such that
(1)
(2)
(3)
(4)
for
for
for
for
all t ∈ N, TorSi (MI t , k)η+td = 0 if η 6∈ ∆i ;
t ≥ ti , TorSi (MI t , k)η+td 6= 0 if and only if η ∈ ∆′i ;
any η ∈ Z, the function dimk TorSi (MI t , k)η+td is a polynomial in t for t ≥ ti ;
any θ ∈ Z, the function dimk Hmi (MI t )θ+td is a polynomial in t, for t ≫ 0.
While writing this paper, we were informed by Whieldon that in her recent work [16],
a similar result to Corollary 1.4 (1)–(3) is proved. We later learned that Pooja Singla also
proved these results, in the second chapter of her thesis [14], independently. She also shows in
[14] that if I is graded ideal, then for any a, b ∈ Z, dimk TorSi (I t , k)a+bt is a quasi-polynomial
in t for t ≫ 0, and give results describing the regularity of I1t1 · · · Ists for t ≫ 0.
In the general setting, when A is not necessarily a field and S is not necessarily standard
graded, the problem is more subtle, and requires more work and a different approach.
We choose not to restrict to a Noetherian base ring in all our results as it seemed to
us that it makes the presentation more clear to put this hypothesis only in the statements
where it is of use in the proof.
4
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
Acknowledgement. Our work was done when the third named author visited the other
authors at the Institut de Mathématiques de Jussieu, UPMC. The authors would like to
thank the Institut for its support and hospitality. The third named author is partially
supported by NSA grant H98230-11-1-0165.
2. Preliminaries
In this section, we collect necessary notations and terminology used in the paper, and
prove a few auxiliary results. For basic facts in commutative algebra, we refer the reader to
[6, 13].
From now on, G denotes a finitely generated abelian group, S = A[x1 , . . . , xn ] is a Ggraded algebra over a commutative ring with identity, A ⊆ S0 and M is a G-graded Smodule. By abusing notation, we shall use 0 to denote the identity of all abelian groups
considered in the paper; the particular group will be understood from the context of its use.
Definition 2.1. Let E ⊆ G be a collection of elements in G. We say that E is a linearly
independent subset of G if E forms a basis for a free submonoid of G.
Definition 2.2. The support of M in G is defined to be
SuppG (M) = {γ ∈ G Mγ 6= 0}.
Remark 2.3. When A is a field, let F• be a minimal G-graded free resolution of M over S,
where
M
i
Fi =
S(−η)βη (M ) .
η∈G
The numbers βηi (M) are called the multigraded (or G-graded) Betti numbers of M and
βηi (M) = dimA TorSi (M, A)η
as, by definition, the maps in F• ⊗S A are zero maps.
More generally, we shall prove the following lemma relating the multigraded Betti numbers
of M and the support of TorS∗ (M, A).
Lemma 2.4. Let F• be a G-graded free resolution of a G-graded S-module M. Then
(1) Fi has a summand S(−γ) for any γ ∈ SuppG (TorSi (M, A)).
(2) Assume that there exists φ ∈ HomZ (G, R) such that φ(deg(xi )) > 0 for all i and M is
finitely generated. Then there exists a G-graded free resolution F′• of M such that
[
M
S(−γi,ℓ ) with γi,ℓ ∈
SuppG (TorSj (M, A)), ∀ℓ.
F′i =
ℓ∈Ei′
j≤i
Notice that, without further restrictions on A and/or M one cannot in general choose F′i
so that γi,ℓ ∈ SuppG (TorSi (M, A)), ∀ℓ.
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
5
Proof. For (1), let K be defined by the exact sequence
0 → K → F0 → M → 0
and notice that F0 ⊗S A → M ⊗S A is onto. As (F0 ⊗S A)γ 6= 0 if and only if S(−γ) is a direct
summand of F0 , the result holds for i = 0. Furthermore, · · · → F1 → K → 0 is a resolution
of K, TorS1 (M, A) is a graded submodule of K ⊗S A and TorSi (M, A) ≃ TorSi−1 (K, A) for
i ≥ 2, which implies the result by induction on i.
To prove the second statement, we relax the finite generation of M by the following
condition, which will enable us to make induction : ∃q ∈ R, φ(deg a) > q, ∀a ∈ M. Notice
that if a module satisfies this condition, any of its submodules satisfies the same condition.
L
Set Tj := SuppG (TorSj (M, A)). Let ψ : F0 = ℓ∈E0 S(−γ0,ℓ ) → M be the
L augmentation
and E0′ := {ℓ ∈ E0 | γ0,ℓ ∈ T0 }. Denote by ψ ′ the restriction of ψ to F′0 := ℓ∈E ′ S(−γ0,ℓ ).
0
We now prove that ψ ′ is onto. First notice that ψ ′ ⊗S A is surjective. Assume that ψ ′ is
not surjective, let M ′ be the image of ψ ′ and
h := inf{φ(γ), Mγ 6= Mγ′ } ≥ inf{φ(deg(a)), a ∈ M} ∈ R.
Set ǫ := min{φ(deg(xi )), i = 1, . . . , n} > 0 and choose m ∈ Mν \ Mν′ for some ν with
h ≤ φ(ν) <
h + ǫ. As ψ ′ ⊗S A is onto, there exists m′ ∈ M ′ such that m is of the
P
n
form m′ + i=1 mi xi . Now, for some value i we have mi 6∈ M ′ . It then follows that
φ(deg(mi )) = φ(ν) − φ(deg(xi )) < h, contradicting the definition of h.
We will now prove (2) by induction on i. To end this, assume that there exists a graded
complex
0 → F′i → · · · → F′0 → M → 0
L
with at most non zero homology in homological degree i ≥ 0, and such that F′i = ℓ∈E ′ S(−γi,ℓ )
i
S
with γi,ℓ ∈ j≤i Tj .
If the complex is exact, our claim is proved; otherwise, by setting Ki ⊂ F′i for the i-th
homology module of the complex and Qi := ker(F′i ⊗S A → F′i−1 ⊗S A), one has
SuppG (Ki ⊗S A) = SuppG (TorSi+1 (M, A)) ∪ SuppG (ker(Qi → TorSi (M, A))).
Applying the argument above to a graded onto map F → Ki , and using that by induction
SuppG (Ki ⊗S A) ⊆ Ti+1 ∪ SuppG (F′i ⊗S A) ⊆ ∪j≤i+1 Tj
one obtains a graded free S-module F′i+1 as claimed mapping onto Ki .
Let t = (t1 , . . . , ts ) ∈ Zs . We shall write t ≥ 0 (respectively, t > 0, t ≤ 0 and t 6= 0)
if ti ≥ 0 (respectively, ti > 0, ti ≤ 0 and ti 6= 0) for all i = 1, . . . , s. For a property that
depends on a parameter t ∈ Zs , one says that the property holds for t ≫ 0 if there exists
t0 ∈ Zs such that it holds for t ∈ t0 + Ns . The following semi-classical lemma will be of use.
6
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
Lemma 2.5. Let R be a finitely generated Ns -graded algebra over a commutative ring A.
Let M be a finitely generated Zs -graded R-module. Then either Mt = 0 for t ≫ 0 or Mt 6= 0
for t ≫ 0.
L
Proof. Let b = ti ≥1 R(t1 ,...,ts ) be the ideal generated by elements of strictly positive degrees.
If M 6= Hb0 (M) one has Mt 6= 0 for any t ∈ t0 + Ns , where t0 is the degree of a non zero
element in M/Hb0 (M).
If M = Hb0 (M) then any generator a of M spans a submodule of M that is zero in degrees
deg(a) + ba (1, . . . , 1) + Ns , where ba is such that for any product p of ba elements among the
finitely many generators of the R-ideal b, one has pa = 0. As M is finitely generated, the
result follows.
We shall make use of the notion of initial modules with respect to a monomial order. This
is a natural extension of the familiarL
notion of initial ideals in a polynomial ring. Let F be
a free S-module. We can write F = i∈I Sei . A monomial in F is of the form xα ei , where
xα is a monomial in S and i ∈ I. A monomial order in F is a total order, say ≺, on the
monomials of F satisfying the following condition:
if u ≺ v and w 6= 1 is a monomial in S then u ≺ uw ≺ vw.
It can be seen that ≺ is a well ordering, i.e., every non-empty subset of the monomials
in F has a minimal element. We refer the reader to [6, 15.2] for more details on monomial
orders on free modules.
Definition 2.6. Let F be a free S-module, and let K be an S-submodule of F . Let ≺ be
a monomial order in F . The initial module of K, denoted by in≺ (K), is defined to be the
S-submodule of F generated by
{xα ei
∃f = xα ei + smaller terms ∈ K}.
Proposition 2.7. Let F be a free G-graded S-module, and let K be a G-graded S-submodule
of F . Let ≺ be a monomial order in F . Then in≺ (K) is a G-graded S-module of F , and
SuppG (F/K) = SuppG (F/ in≺ (K)).
Proof. It is clear from the definition that in≺ (K) is a G-graded S-module. To prove the
proposition, we need to show that for any µ ∈ G, Kµ = Fµ if and only if in≺ (K)µ = Fµ .
Clearly, if Kµ = Fµ then all monomials of degree µ in F are elements of K, and thus, are
elements of in≺ (K). Therefore, in this case, in≺ (K)µ = Fµ .
Suppose now that in≺ (K)µ = Fµ . Let xα ei be the smallest monomial of degree µ in F
but not in K, if it exists. Then xα ei ∈ in≺ (K)µ . Thus, there exists an element f ∈ K of the
form
f = xα ei + g,
where g consists of monomials that are smaller than xα ei with respect to ≺. Since K is
a G-graded S-module, we can choose f to be G-homogeneous of degree µ. That is, all its
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
7
monomials are of degree µ. This implies that all monomials, and thus, all terms in g are
elements in K. In particular, g ∈ K. Therefore, xα ei = f − g ∈ K, a contradiction. Hence,
Fµ = Kµ . The proposition is proved.
One of our techniques is to take the collection of elements of certain degree from a complex.
This construction gives what we shall call strands of the complex.
Definition 2.8. Let F• be a G-graded complex of S-modules and let Γ ⊆ G. The Γ-strand
of F• , often denoted by (F• )Γ , is obtained by taking elements of degrees belonging to Γ
in F• and the boundary maps between these elements L
(since the complex is graded, the
boundary maps are of degree 0). In particular, if F = γ∈G Fγ is a G-graded S-module,
L
then FΓ := γ∈Γ Fγ . Note that the degree Γ-strand of a complex/module is not necessarily
a complex/module over S.
3. Forms of the same degree
In this section, we consider the case when every ideal Ii is generated in a single degree.
That is, when degG (fi,j ) = γi for all j. We keep the notations of Section 2.
Let G′ denote a finitely generated abelian group. The following result, with G′ = Zs , will
be a key ingredient of our proof.
Theorem 3.1. Let R = S[T1 , . . . , Tr ] be a G × G′ -graded polynomial extension of S with
degG×G′ (a) ∈ G × 0 for all a ∈ S and degG×G′ (Tj ) ∈ 0 × G′ for all j. Let M be a finitely
generated G × G′ -graded R-module and let i be an integer. Assume that i = 0 or A is a
Noetherian ring. Then
(1) There exists a finite subset ∆i ⊆ G such that, for any t, TorSi (M(∗,t) , A)δ = 0 for all
δ 6∈ ∆i .
(2) Assume that G′ = Zs . For δ ∈ ∆i , TorSi (M(∗,t) , A)δ = 0 for t ≫ 0 or TorSi (M(∗,t) , A)δ 6=
0 for t ≫ 0. If, furthermore, A → k is a ring homomorphism to a field k, then for
any j, the function
S
dimk TorA
j (Tori (M(∗,t) , A)δ , k)
is polynomial in the ti s for t ≫ 0, and the function
dimk TorSi (M(∗,t) , k)δ
is polynomial in the ti s for t ≫ 0.
L
i
Proof. Let F• be a graded free resolution of M over R, where Fi = η,j R(−η, −j)βη,j is of
finite rank for i = 0, and for any i when A is Noetherian. For t ∈ G′ , the (∗, t)-strand of F• ,
denoted by Ft• , is a G-graded free resolution of M(∗,t) over S = R(∗,0) , that is not necessarily
minimal. Its i-th term is
M
i
S(−η)βη,j ⊗A Bt−j ,
Fti =
η,j
8
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
where B = A[T1 , . . . , Tr ].
i
Let ∆i = {η ∃j : βη,j
6= 0}. The module TorSi (M(∗,t) , A) = Hi (Ft• ⊗S A) is a subquotient
L
i
of the module η,j A(−η)βη,j ⊗A Bt−j , and (1) is proved.
To prove (2), observe first that TorSi (M(∗,t) , A)δ = Hi (Ft• ⊗S A)δ and A(−η) ⊗A Bt−j δ =
[δ]
[δ]
Aδ−η ⊗A Bt−j is zero if η 6= δ. Thus, Hi (Ft• ⊗S A)δ is equal to Hi (F• ⊗S A)t , where F• is
the subcomplex of F• given by
M
M
i
i
[δ]
[S(−δ) ⊗A B(−j)]βδ,j .
Fi =
R(−δ, −j)βδ,j =
j
j
[δ]
[δ]
As F• ⊗S A is a graded complex of finitely generated B-modules, Hi (F• ⊗S A) is a
finitely generated B-module for any i when A is Noetherian. Similarly, TorSi (M(∗,t) , k)δ =
[δ]
Hi (Ft• ⊗S k)δ = Hi (F• ⊗S k) is a finitely generated k[T1 , . . . , Tr ]-module for any i when A is
Noetherian.
This proves (2) in view of Lemma 2.5 and [11, Theorem 1].
Remark 3.2. In the context of point (2) above, there is a graded spectral sequence of
S
2
graded B-modules with second term Ej,i
(t) = TorA
j (Tori (M(∗,t) , A)δ , k) that converges to
p
TorSi+j (M(∗,t) , k)δ . It follows that all terms Ej,i
(t) for p ≥ 2 are finitely generated k[T1 , . . . , Tr ]modules. In particular, one can write :
X
X
p
∞
dimk TorSℓ (M(∗,t) , k)δ =
dimk Ej,i
(t) ≤
dimk Ej,i
(t), ∀p ≥ 2,
i+j=ℓ
i+j=ℓ
which provides a control on the Hilbert function (and polynomial) of TorSℓ (M, k)δ in terms
S
of the ones of TorA
j (Tori (M, A)δ , k) for i + j = ℓ.
We are now ready to examine the asymptotic linear behavior of nonzero G-graded Betti
numbers and non-vanishing degrees of local cohomology modules of MI1t1 · · · Ists .
In the next two theorems, let R = S[Ti,j | 1 ≤ i ≤ s, 1 ≤ j ≤ ri ]. Then R is equipped with
a G × Zs -graded structure in which degG×Zs (xi ) = (degG (xi ), 0) and degG×Zs (Ti,j ) = (0, ei ),
where ei is the i-th element in the canonical basis of Zs . Recall that γi = degG (fi,j ) and let
γ := (γ1 , . . . , γs ). For t = (t1 , . . . , ts ) ∈ Zs , let I t := I1t1 . . . Ists , T t := T1t1 . . . Tsts , I t T t (γ.t) :=
I1t1 (t1 γ1 )T1t1 . . . Ists (ts γs )Tsts and MI t T t (γ.t) := MI1t1 (t1 γ1 )T1t1 . . . Ists (ts γs )Tsts .
Theorem 3.3. Assume that i = 0 or A is Noetherian. Then there exists a finite set ∆i ⊆ G
such that
(1) For all t ∈ Ns , TorSi (MI1t1 · · · Ists , A)η = 0 if η 6∈ ∆i + t1 γ1 + · · · + ts γs .
(2) There exists a subset ∆′i ⊆ ∆i such that TorSi (MI1t1 · · · Ists , A)η+t1 γ1 +···+ts γs 6= 0 for
t ≫ 0 and η ∈ ∆′i and TorSi (MI1t1 · · · Ists , A)η+t1 γ1 +···+ts γs = 0 for t ≫ 0 and η 6∈ ∆′i .
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
9
(3) If, furthermore, A → k is a ring homomorphism to a field k, then for any δ and any
j, the function
t1
S
ts
dimk TorA
j (Tori (MI1 · · · Is , A)δ+t1 γ1 +···+ts γs , k)
is polynomial in the ti s for t ≫ 0, and the function
dimk TorSi (MI1t1 · · · Ists , k)δ+t1 γ1 +···+ts γs
is polynomial in the ti s for t ≫ 0.
L
L
t t
t t
Proof. Let R :=
t≥0 I T (γ.t) and MR :=
t≥0 MI T (γ.t) denote the (shifted) multiRees algebra and the multi-Rees module with respect to I1 , . . . , Is , and M. The natural
surjective map φ : R ։ R that sends xi to xi and Ti,j to fi,j Ti makes MR a finitely
generated G × Zs -graded module over R.
Observe that, for any δ ∈ G and t ∈ Zs , MR(δ,t) ≃ [MI t (γ.t)]δ = [MI t ]δ+γ.t , where in the
last term δ + γ.t := δ + t1 γ1 + · · · + ts γs . Thus, the assertion follows by applying Theorem
3.1 to the R-module M := MR.
Theorem 3.4. Let b be a G-homogeneous ideal in S such that for any i ≥ 0 and δ ∈ G,
Hbi (S)δ is a finitely generated A-module. Then, if A is Noetherian, for i ≥ 0, there exists a
subset Λi ⊆ G such that
(1) Hbi (MI1t1 · · · Ists )η+t1 γ1 +···+ts γs 6= 0 for t = (t1 , . . . , ts ) ≫ 0 if only if η ∈ Λi .
(2) If, furthermore, A → k is a ring homomorphism to a field k, then for any δ and any
j, the function
t1
i
ts
dimk TorA
j (Hb (MI1 · · · Is )δ+t1 γ1 +···+ts γs , k)
is a polynomial in the ti s for t ≫ 0.
Proof. Since taking local cohomology respects the G-homogeneous degree, we have
i
i
Hbi (MI t )δ+γ.t = HbR
(MR)(δ,t) = HbR
(MR)(δ,∗) t .
i
Let B = A[Ti,j , 1 ≤ i ≤ s, 1 ≤ j ≤ ri ]. Since B is a flat extension of A, HbR
(R)(δ,∗) =
i
s
HbR (B ⊗A S)(δ,∗) is a finitely generated B-module. Let F• be the minimal G × Z -graded free
resolution of MR over R. Since A is Noetherian, each term Fj of F• is of finite rank. This
i
implies that for all δ ∈ G, i ≥ 0 and j ≥ 0, HbR
(Fj )(δ,∗) is a finitely generated B-module. The
i−j
i
i
spectral sequence HbR (Fj ) ⇒ HbR (MR) implies that HbR
(MR)(δ,∗) is a finitely generated
multigraded B-module. This proves (2) in view of [11, Theorem 1].
i
i
Notice that HbR
(MR)(δ,t) =
Ts0 for all t ≫ 0 if and only if Kδ = HbR (MR)(δ,∗) is annihilated
by a power of the ideal a := i=1 (Ti,1 , . . . , Ti,ri ). Hence (1) holds with
Λi := {δ ∈ G Kδ 6= Ha0 (Kδ )}.
10
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
4. Forms of arbitrary degrees
This section is devoted to proving our main result in its full generality, when the ideals
Ii s are generated in arbitrary degrees. We start by recalling the notion of a Stanley decomposition of multigraded modules.
Definition 4.1. Let G be a finitely generated abelian group and let B = A[T1 , . . . , Tr ] be
a G-graded polynomial ring over a commutative ring A. Let M be a finitely generated
G-graded B-module. A Stanley decomposition of M is a finite decomposition of the form
m
M
M=
ui A[Zi ],
i=1
where the direct sum is as A-modules, ui s are G-homogeneous elements in M, Zi s are subsets
(could be empty) of the variables {T1 , . . . , Tr }, and ui A[Zi ] denotes the A-submodule of M
generated by elements of the form ui m where m is a monomial in the polynomial ring A[Zi ].
The following lemma is well known in N-graded or standard Nn -graded situations (cf.
[2, 3, 10]).
Lemma 4.2. Let G be a finitely generated abelian group and let B = A[T1 , . . . , Tr ] be a
G-graded polynomial ring. Let I be a monomial ideal in B. Then a Stanley decomposition
of B/I exists.
Proof. The proof follows along the same lines as in the proof of [10, Corollary 6.4] or [2,
Theorem 2.1], as one notices that any monomial is a homogeneous element.
Theorem 4.3. Let G be a finitely generated abelian group, B = A[T1 , . . . , Tr ] be a G-graded
polynomial ring over a commutative ring A and M be a finitely generated G-graded B-module.
Let Γ denote the set of subsets of {degG (Ti )}ri=1 whose elements are linearly independent over
Z. Then there exist a collection of pairs (δp , Ep ) ∈ G × Γ, for p = 1, . . . , m, such that
m
[
SuppG (M) =
δp + hEp i ,
p=1
where hEp i represents the free submonoid of G generated by elements in Ep .
Proof. Since M is a finitely generated G-graded B-module, there exists a homogeneous
surLm
jective map φ : F ։ M from a free B-module F to M. We can write F = i=1 Bei , where
degG (ei ) represents the degree of the i-th generator of M. Let K = ker φ. Then M ≃ F/K.
In particular, SuppG (M) = SuppG (F/K).
Lm
Extend any monomial order on B to a monomial order on F =
i=1 Bei , by ordering
the ei ’s. Since M is G-graded, so is K. Thus, by Proposition 2.7, we have SuppG (F/K) =
SuppG (F/ in≺ (K)). Therefore,
SuppG (M) = SuppG (F/ in≺ (K)).
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
11
Observe that in≺ (K) is generated by monomials of the form Tα ei (where Tα = T1α1 · · · Trαr
for α = (α1 , . . . , αr ) ∈ Nr ). Let Ii be the monomial ideal in B generated by all monomials
L B
ei .
Tα for which Tα ei ∈ in≺ (K). Clearly, F/ in≺ (K) ≃ m
i=1
Ii
B
By Lemma 4.2, for each i = 1, . . . , m, there exists a Stanley decomposition of ei
Ii
m
i
M
B
ei ≃
uij A[Tij ],
Ii
j=1
where uij are homogeneous elements of
variables {T1 , . . . , Tr } in B. This gives
B
ei and Tij are subsets (could be empty) of the
Ii
F/ in≺ (K) ≃
mi
m M
M
uij A[Tij ].
i=1 j=1
Thus, SuppG (F/ in≺ (K)) can be written as a finite union of the form
[
SuppG (F/ in≺ (K)) =
SuppG uij A[Tij ] .
i,j
Let δij = degG (uij ). Then
SuppG (F/ in≺ (K)) =
[
i,j
δij + SuppG (A[Tij ]) .
To prove the theorem, it now suffices to show that SuppG (A[Tij ]) can be decomposed into a
union of free submonoids of G of the form hEi, where E is a linearly independent subset in
Γ.
Since A[Tij ] is a polynomial ring whose variables are variables of B, without loss of
generality, we may assume that Tij = {T1 , . . . , Tr }, i.e., A[Tij ] = B. Let H be the binomial
ideal in B generated by {Tα − Tβ degG (Tα ) = degG (Tβ )}. Then taking the quotient B/H
is the same as identifying monomials of the same degree in B. Thus, we have
SuppG (B) = SuppG (B/H) = SuppG (B/ in≺ (H))
and
(4.1)
B
H
γ
B
=
=
in≺ (H) γ
A if γ ∈ SuppG (B/H)
0 otherwise.
By Lemma 4.2, a Stanley decomposition of B/ in≺ (H) exists. That is, we can write
B/ in≺ (H) =
s
M
j=1
uj A[Zj ]
12
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
where uj are G-homogeneous elements of B/ in≺ (H) and Zj are subsets (could be empty) of
the variables {T1 , . . . , Tr }. Let Ej be the set of degrees of variables in Zj . It further follows
from (4.1) that B/ in≺ (H) has at most one monomial in each degree. This implies that the
support of uj A[Zj ] are all disjoint and each set Ej is linearly independent. Hence, by letting
σj = degG (uj ), we have
SuppG (B) =
s
a
j=1
The theorem is proved.
σj + hEj i .
Remark 4.4. It would be nice if the union in Theorem 4.3 is a disjoint union. However,
this is not true. Let B = A[x, y] be a Z-graded polynomial ring with deg(x) = 4 and
deg(y) = 7 (hence, Γ = {4, 7}). Let M = B/(x) ⊕ B/(y) ≃ A[y] ⊕ A[x]. Then SuppZ (M) =
{4a + 7b a, b ∈ Z≥0 }. Moreover, linearly independent subsets of Γ are {4} and {7}. It can
be easily seen that SuppZ (M) cannot be written as disjoint union of shifted free submonoids
of Z generated by 4 and/or by 7.
For a vector c = (c1 , . . . , cs ) ∈ Zs and a tuple E = (ν1 , . . . , νs ) of elements in G, we shall
denote ∆E the empty
(s − 1)-tuple (ν2 − ν1 , . . . , νs − νs−1 ) else, and by
Ps tuple if s ≤ 1 and the
′
c.E the G-degree j=1 cj νj . If E and E are tuples, we denote by E|E ′ the concatenation
of E and E ′ .
Remark 4.5. With some simple linear algebra arguments, it can be seen that for tuples
E1 , . . . , Es of elements of G, the tuple of elements of G × Zs , E1 × {e1 }| · · · |Es × {es }, where
ei is the i-th basis element of Zs , is linearly independent if and only if ∆E1 | · · · |∆Es is
linearly independent. These equivalent conditions imply that for (c1 , . . . , cs ) 6= (c′1 , . . . , c′s ),
|E |
with ci , c′i ∈ Z≥0i and |ci | = |c′i | for all i, one has c1 .E1 + · · · + cs .Es 6= c′1 .E1 + · · · + c′s .Es .
This last fact is a direct corollary of the linear independence of E1 × {e1 }| · · · |Es × {es }, as
c1 .(E1 × {e1 }) + · · · + cs .(Es × {es }) = (c1 .E1 + · · · + cs .Es ) × (|c1 |e1 + · · · + |cs |es ).
We shall now prove our main result. Recall that Ii = (fi,1 , . . . , fi,ri ) and let γi,j =
degG (fi,j ).
Theorem 4.6. Let G be a finitely generated abelian group and let S = A[x1 , . . . , xn ] be a
G-graded algebra over a commutative ring A ⊆ S0 . Let Ii = (fi,1 , . . . , fi,ri ) for i = 1, . . . s
be G-homogeneous ideals in S, and let M be a finitely generated G-graded S-module. Set
i
Γi = {degG (fi,j )}rj=1
. Let ℓ ≥ 0 and assume that ℓ = 0 or A is Noetherian.
There exist a finite collection of elements δpℓ ∈ G, a finite collection of integers tℓp,i ,
ℓ
ℓ
ℓ
and a finite collection of non-empty tuples Ep,i
⊆ Γi , such that ∆Ep,1
| · · · |∆Ep,s
is linearly
independent for all p, satisfying :
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
SuppG (TorSℓ (MI1t1
· · · Ists , A))
=
m
[
[
δpℓ +
p=1
|E ℓ |
ci ∈Z≥0p,i ,|ci |=ti −tℓp,i
13
ℓ
ℓ
c1 .Ep,1
+ · · · + cs .Ep,s
,
if ti ≥ maxp {tℓp,i } for all i.
L
Proof. As before, we use t to denote (t1 , . . . , ts ) ∈ Zs , and let R := t≥0 I t T t and MR :=
L
t t
s
t≥0 MI T . Consider R = A[x1 , . . . , xn ][Ti,j , 1 ≤ i ≤ s, 1 ≤ j ≤ ri ], the G × Z -graded
polynomial ring over A[x1 , . . . , xn ] with degG×Zs (xi ) = (degG (xi ), 0) and degG×Zs (Ti,j ) =
(degG (fi,j ), ei ), where ei denotes the i-th canonical generator of Zs . The natural surjective
map φ : R ։ R that sends xi to xi and Ti,j to fi,j Ti makes MR a finitely generated
G × Zs -graded module over R.
Let F• be a G × Zs -graded free resolution of MR over R. If A is Noetherian, then each Fi
can be chosen of finite rank, and we make such a choice. For t ∈ Zs , the degree (∗, t)-strand
Ft• of F• provides a G-graded free resolution of MI t over S = R(∗,0) . Thus,
TorSi (MI t , A) = Hi (Ft• ⊗S A).
Moreover, taking homology respects the graded structure, and therefore,
Hi (Ft• ⊗S A) = Hi (F• ⊗R R/mR)(∗,t) ,
where m = (x1 , . . . , xn ) is the homogeneous irrelevant ideal in S.
`
Let Γ′ = {(γi,j , ei ) ∈ G × Zs } = i Γi × {ei } be the set of degrees of the variables Ti,j .
Observe that Hi (F• ⊗R R/mR) is a finitely generated G ×Zs -graded module over R/mR ≃ B
for any i if A is Noetherian, and for i = 0 in any case. Applying Theorem 4.3 to the G × Zs graded module Hi (F• ⊗R R/mR) we obtain a finite collection of elements θpℓ ∈ G × Zs and a
finite collection of linearly independent subsets Epℓ ⊆ Γ′ (which we view in a fixed order as
tuples), for p = 1, . . . , m, such that
SuppG×Zs Hi (F• ⊗R R/mR) =
m
[
p=1
θpℓ + hEpℓ i .
`
ℓ
× {ei }.
Let θpℓ = (δpℓ , tℓ1,p , . . . , tℓs,p ), where δpℓ ∈ G and tℓi,p ∈ Z. One has Epℓ = si=1 Ep,i
ℓ
The linear independence of the elements in Ep is equivalent to the fact that the elements of
ℓ
ℓ
∆Ep,1
| · · · |∆Ep,s
are linearly independent.
Taking the degree (∗, t)-strand of Hi (F• ⊗R R/mR), we get
SuppG (TorSℓ (MI1t1 · · · Ists , A)) =
m
[
p=1
δpℓ +
[
|E ℓ |
ci ∈Z≥0p,i ,|ci |=ti −tℓp,i
ℓ
ℓ
c1 .Ep,1
+ · · · + cs .Ep,s
.
14
AMIR BAGHERI, MARC CHARDIN, AND HUY TÀI HÀ
Example 4.7. Let I ⊆ S be a complete intersection ideal of three forms f1 , f2 , f3 of degrees
a, b, c. On easily sees, for instance by the Hilbert Burch theorem, that
0
/
T T2
1
R(−a −L
b − c, −2) f1 f2
R(−a − b − c, −1)
f2 T3 − f3 T2
− c, −1)
f T − f T
T3 R(−b L
1 3
3 1
f3
f1 T2 − f2 T1
/R
/ R(−a − c, −1)
L
/
RI
/
0
R(−a − b, −1)
is a graded free R-resolution of RI .
It follows that TorS0 (I t , A)µ = Bµ,t , TorS2 (I t , A)µ = Bµ−a−b−c,t−1 , and
Bµ−b−c,t−1
L
T
T
T
1
2
3
/ Bµ−a−c,t−1
TorS1 (I t , A)µ = coker
Bµ−a−b−c,t−2
L
Bµ−a−b,t−1
.
Now, TorS1 (RI , A) has the following Stanley decomposition:
M
M
A[T1 , T2 , T3 ](−b − c, −1)
A[T1 , T3 ](−a − c, −1)
A[T1 , T2 , T3 ](−a − b, −1).
The ideal H generated by the binomials T α − T β with deg(T α ) = deg(T β ) is the kernel of
the map
/ A[u, v]
A[T1 , T2 , T3 ]
T1
T2
uv a
/
/
uv b
/ uv c
T3
and is therefore generated by a single irreducible and homogeneous binomial.
If, for example, (a, b, c) = (2, 5, 8) then this relation is T22 − T1 T3 , and a Stanley decomposition of, for instance, A[T1 , T2 , T3 ]/(T22 ) is A[T1 , T3 ] ⊕ T2 A[T1 , T3 ](−5, −1). It finally gives
the following decomposition for TorS1 (RI , A) : A[T1 , T3 ](−13, −1) ⊕ T2 A[T1 , T3 ](−18, −2) ⊕
A[T1 , T3 ](−10, −1) ⊕ A[T1 , T3 ](−7, −1) ⊕ T2 A[T1 , T3 ](−12, −2).
Setting Et := {2α + 8β | α, β ∈ Z+ , α + β = t} = 2t + 6{0, · · · , t}, one gets that for t ≥ 2,
– SuppZ (TorS0 (I t , A)) = Et ∪ (5 + Et−1 ),
– SuppZ (TorS1 (I t , A)) = (13 + Et−1 ) ∪ (18 + Et−2 ) ∪ (10 + Et−1 ) ∪ (7 + Et−1 ) ∪ (12 + Et−2 ),
– SuppZ (TorS2 (I t , A)) = (15 + Et−1 ) ∪ (20 + Et−2 ).
Notice that one has the simplified expression :
– SuppZ (TorS1 (I t , A)) = (5 + Et ) ∪ (10 + Et−1 ).
THE EVENTUAL SHAPE OF BETTI TABLES OF POWERS OF IDEALS
15
References
[1] D. Berlekamp. Regularity defect stabilization of powers of an ideal. Preprint. arXiv:1105.2260.
[2] K. Baclawski and A.M. Garsia. Combinatorial decompositions of a class of rings. Adv. in Math. 39
(1981), 155-184.
[3] W. Bruns, C. Krattenthaler, and J. Uliczka. Stanley decompositions and Hilbert depth in the Koszul
complex. J. Commutative Algebra, 2 (2010), no. 3, 327-357.
[4] M. Chardin. Powers of ideals and the cohomology of stalks and fibers of morphisms. Preprint.
arXiv:1009.1271.
[5] S.D. Cutkosky, J. Herzog, and N.V. Trung. Asymptotic behaviour of the Castelnuovo-Mumford regularity. Composito Mathematica, 118 (1999), 243-261.
[6] D. Eisenbud. Commutative Algebra: with a View Toward Algebraic Geometry. Springer-Verlag, New
York, 1995.
[7] D. Eisenbud and J. Harris. Powers of ideals and fibers of morphisms. Math. Res. Lett. 17 (2010), no.
2, 267-273.
[8] D. Eisenbud and B. Ulrich. Stabilization of the regularity of powers of an ideal. Preprint.
arXiv:1012.0951.
[9] H.T. Hà. Asymptotic linearity of regularity and a∗ -invariant of powers of ideals. Math. Res. Lett. 18
(2011), no. 1, 1-9.
[10] J. Herzog and D. Popescu. Finite filtrations of modules and shellable multicomplexes. Manuscripta
Math., 121 (2006), no. 3, 385-410.
[11] V. Kodiyalam. Homological invariants of powers of an ideal. Proceedings of the American Mathematical
Society, 118, no. 3, (1993), 757-764.
[12] V. Kodiyalam. Asymptotic behaviour of Castelnuovo-Mumford regularity. Proceedings of the American
Mathematical Society, 128, no. 2, (1999), 407-411.
[13] H. Matsumura. Commutative Ring Theory. Cambridge, 1986.
[14] P. Singla. Convex-geometric, homological and combinatorial properties of graded ideals. genehmitge
Dissertation. Universität Duisburg-Essen, December 2007.
[15] N.V. Trung and H. Wang. On the asymptotic behavior of Castelnuovo-Mumford regularity. J. Pure
Appl. Algebra, 201 (2005), no. 1-3, 42-48.
[16] G. Whieldon. Stabilization of Betti tables. Preprint. arXiv:1106.2355.
Institut de Mathématiques de Jussieu, UPMC, Boite 247, 4, place Jussieu, F-75252 Paris
Cedex, France
E-mail address: [email protected]
Institut de Mathématiques de Jussieu, UPMC, Boite 247, 4, place Jussieu, F-75252 Paris
Cedex, France, http://people.math.jussieu.fr/~chardin
E-mail address: [email protected]
Department of Mathematics, Tulane University, 6823 St. Charles Ave., New Orleans,
LA 70118, USA, www.math.tulane.edu/~tai/
E-mail address: [email protected]
| 0math.AC
|
arXiv:1304.0063v1 [math.AC] 30 Mar 2013
ON THE GRAPH OF DIVISIBILITY OF AN INTEGRAL
DOMAIN
JASON GREENE BOYNTON AND JIM COYKENDALL
Abstract. It is well-known that the factorization properties of a domain are
reflected in the structure of its group of divisibility. The main theme of this
paper is to introduce a topological/graph-theoretic point of view to the current understanding of factorization in integral domains. We also show that
connectedness properties in the graph and topological space give rise to a
generalization of atomicity.
1. Introduction
Let D be an integral domain with field of fractions K. Then, the group of
divisibility G(D) is defined to be the partially ordered additive group of principal
fractional ideals with aD 6 bD if and only if aD ⊇ bD. If K × is the multiplicative
group of K and if U (D) is the group of units of D, then G(D) is order isomorphic
to the quotient group K × /U (D) with the ordering aU (D) 6 bU (D) if and only if
b
a ∈ D.
It is well-known that the factorization properties of a domain are reflected in the
structure of its group of divisibility. For example, an integral domain is a unique
factorization domain if and only if its group of divisibility is a direct sum of copies
of Z equipped with the usual product order. It is also true that the group of
divisibility reflects more than just factorization properties of a domain. Indeed, it
is not hard to check that a domain is a valuation domain if and only if its group of
divisibility is totally ordered. We refer the interested reader to [6] for an excellent
survey of material regarding the group of divisibility.
In 1968, Cohn introduced the notion of an atomic integral domain in [4]. These
are the domains in which every nonzero nonunit admits a finite factorization into
irreducible elements. For several years, it was believed to be the case that atomicity
in an integral domain was equivalent to the ascending chain condition on principal
ideals (ACCP). However, in 1974, Anne Grams demonstrated that an atomic
domain need not satisfy ACCP in [5]. Grams was able to understand the subtle
difference between atomicity and ACCP using the group of divisibility. Ten years
later, Zaks added two more examples of an atomic domain without ACCP in [7].
However, examples of atomic domains without ACCP are still relatively scarce.
The main theme of this work is to introduce a topological/graph-theoretic point
of view to the current understanding of factorization in integral domains. That
is, we find a graphical representation of the group of divisibility in order to detect
various well-studied factorization properties of an integral domain. The contents
of this paper is organized as follows. In Section 2, we recall a topological structure
2010 Mathematics Subject Classification. Primary 13F15; Secondary 13A05.
Key words and phrases. atomic, factorization, divisibility.
1
2
J. G. BOYNTON AND J. COYKENDALL
that is naturally associated to a partially ordered set. In addition, we make the
relevant graph-theoretic definitions needed in the sequel. In Section 3, we introduce
the graph of divisibility of an integral domain and show that this graph detects
the standard factorization properties studied in [1]. In Section 4, we examine the
connectedness properties of the graph of divisibility using some elementary topology
to do so. In Section 5, we will see that a connected graph of divisibility gives rise
to a generalized atomicity. We also provide some examples in order to illustrate
these notions.
2. Some Definitions and Background
In this section, we make some relevant definitions from graph theory and topology
that will be used throughout. We refer the reader to [2] for a survey of known
results about the Alexandrov topology.
Definition 2.1. Let (X, τ ) be a topological space with neighborhood base U(x) =
{U ∈ τ : x ∈ U }.
(1) (X, τ ) is called an Alexandrov space if arbitrary intersections of open sets
remain open.
(2) For every x in an Alexandrov space X, we set M (x) = ∩U∈U (x) U. The set
M (x) is called the minimal open set containing x.
Theorem 2.2. Let (X, τ ) be an Alexandrov space.
(1) The collection of minimal open sets N = {M (x) : x ∈ X} is a basis for the
space (X, τ ).
(2) (X, τ ) is a T0 space if and only if M (x) = M (y) ⇒ x = y.
(3) (X, τ ) is (path and chain) connected if and only if for any pair of points
a, b ∈ X, there exists a finite set of points {a = x0 , x1 , ..., xn = b} such that
N (xi−1 ) ∩ N (xi ) 6= ∅, i 6 n.
In some sense, a T0 Alexandrov space is the most natural topological structure
induced by a partially ordered set. Indeed, if (X, 6) is any partially ordered set,
then the sets of the form M (a) = {x ∈ X : x 6 a} constitute a basis for a T0
Alexandrov space (X, τ ). Conversely, if (X, τ ) is a T0 Alexandrov space, we can
define a relation 6 on X given by a 6 b if and only if a ∈ M (b). More precisely,
we have the following result found in [2]
Theorem 2.3. There is an isomorphism between the category of T0 Alexandrov
spaces with continuous maps and the category of partially ordered sets with order
preserving set maps.
Now, let (X, τ ) be any T0 Alexandrov space with minimal neighborhood base
M = {M (a) : a ∈ X}. One can construct a directed acyclic graph G(V, E)
determined by the space (X, τ ). The set V of vertices is taken to be the underlying
set X. Define an edge a → b if and only if M (a) ( M (b) and there is no minimal
base element M (c) properly between M (a) and M (b). The resulting construction
is a simple (no parallel edges) directed acyclic graph (SDAG). We now make the
graphical representation of the previous constructions precise.
Definition 2.4. Let (X, 6) be any partially ordered set and define intervals (−∞, b] =
{x ∈ X : x 6 b} and [a, b] = {x ∈ X : a 6 x 6 b}
GRAPH OF DIVISIBILITY
3
(1) We write (X, τ (6)) to denote the the Alexandrov topology generated by the
minimal neighborhood base M = {M (a) : a ∈ X} where M (a) = (−∞, a].
(2) We write G(X, E(6)) to denote the directed acyclic graph whose vertices are
the elements of X and edges a → b if and only if a < b and [a, b] = {a, b}.
Definition 2.5. Let V be a nonempty set.
(1) A finite directed path is a sequence of edges {e1 , e2 , ..., en } ⊂ E where ei =
(vi−1 , vi ) for each i ∈ {1, 2, ..., n}. A finite directed path in G(V, E) is also
denoted by
v0 → v1 → v2 → ... → vn .
A directed graph is said to be acyclic if there does not exist a path {e1 , e2 , ..., en } ⊂
E such that v0 = vn .
(2) A finite weak path is a sequence of ordered pairs {e1 , e2 , ..., en } ⊂ V × V
where ei = (vi−1 , vi ) and either (vi−1 , vi ) or (vi , vi−1 ) ∈ E. A finite directed
path in G(V, E) is also denoted by
v0 ↔ v1 ↔ ... ↔ vn .
(3) A directed graph G(V, E) is said to be weakly connected if for every pair of
vertices v, w ∈ V there exists a finite weak path {e1 , e2 , ..., en } such that
v0 = v and vn = w.
3. The Graph of Divisibility
In this section, we introduce the graph of divisibility of an integral domain. We
will see that this graph gives a picture of the group of divisibility and can be used
to detect certain factorization properties of a domain. Although this graph does
not detect all divisibility relations, it does detect enough of the divisibility relation
to clearly differentiate atomicity and ACCP (for example). For the remainder of
this article, we denote the set of irreducible elements (atoms) of D by Irr(D) and
the set of atomic elements (expressible as a finite product of atoms) is denoted by
F (D).
Definition 3.1. Let D be any integral domain with field of fractions K and let
K × denote its multiplicative group.
(1) We write G(D) to denote the group of divisibility K × /U (D) written additively. We write G(D)+ to denote the positive elements of G(D).
(2) We write P(D) to denote the group of nonzero principal fractional ideals of
D partially ordered by inclusion. We write P(D)+ to denote the nonzero
nonunit principal integral ideals of D.
Recall that the ordering in (G(D), 6) is given by a 6 b if and only if ab ∈ D.
It readily follows that 0 6 a if and only if a ∈ D. It is easy to check that there
exists a reverse order group isomorphism G(D) → P(D) given by a 7→ aD. With
Definition 2.1 in hand, we define a partial ordering on the set P(D) and consider
the structure of the associated topological space and directed acyclic graph. The
following lemma is the basis for the remainder of our investigations.
Lemma 3.2. Define a relation ≺ on P given by a ≺ b if and only if ab ∈ F (D).
(1) (P(D), ) is a partially ordered set.
(2) (P(D), τ ()) is a T0 Alexandrov space with neighborhood base given by
the collection M(a) = {x ∈ P : xa ∈ F (D)}.
4
J. G. BOYNTON AND J. COYKENDALL
(3) G(P(D), E()) is a directed acyclic graph with directed edges a → b if and
only if ab ∈ Irr(D).
Proof. (1) It is never the case that a ≺ a since aa is a unit, and hence is not a
product of atoms. Similarly, it is impossible that both a ≺ b and a b can occur.
Finally, if a ≺ b and b ≺ c, then ab ∈ F (D) and bc ∈ F (D). Since the set F (D) is
multiplicatively closed, we have that ab · cb = ac ∈ F (D) so that a ≺ c.
(2) Follows immediately from (1) and the definition of ≺ .
(3) If a → b, then a ≺ b and [a, b] = {a, b}. It follows that ab = π1 · · · πn where each
πi ∈ Irr(D). In other words, [a, b] = {a, π1 · · · πn−1 a, ..., π1 a, b} and the condition
[a, b] = {a, b} forces b = π1 a. Therefore, ab ∈ Irr(D) as needed. Conversely, if
a
b = π ∈ Irr(D), then it is certainly true that a ≺ b and it suffices to check that
[a, b] = {a, b}. But if a ≺ x ≺ b, then xa = π1 · · · πn and xb = ς1 · · · ςm where each
πi , ςi ∈ A(D). But then π = π1 · · · πn ς1 · · · ςm forcing (without loss of generality)
π = π1 with the remaining factors units. It follows that x = b as needed.
With Lemma 3.2 in hand, we make the definition central to our study.
Definition 3.3. We call G(P(D), E()) the graph of divisibility of D. We might
also refer to the subgraph G(P(D)+ , E()) the graph of divisibility.
We illustrate this definition with a few easy examples.
Example 3.4.
(1) Let D be a one-dimensional Noetherian valuation domain.
It is well-known that D is a PID with a unique nonzero prime ideal. So the
the elements of P(D)+ can be enumerated by the positive integers. We
write P(D)+ = {π, π 2 , π 3 , ...} where π is a chosen generator of the unique
maximal ideal. The graph of divisibility G(P(D), E()) is the (branchless)
tree that looks like
1
1
... → π 2 → π → 1 → → 2 → ....
π
π
Similarly, the subgraph G(P(D)+ , E()) looks like
... → π 3 → π 2 → π
(2) Let D be a one-dimensional nondiscrete valuation domain. For the sake
of concreteness, we will say that the corresponding value group is Q. In
this example, there are no irreducible elements and hence no two elements
of P(D) are adjacent. It follows that G(P(D), E()) is just the collection
of vertices corresponding to P(D) with no edges whatsoever. In fact, the
graph of divisibility of any antimatter domain (no irreducible elements)
consists of vertices only. Topologically speaking, (P(D), τ ()) is totally
disconnected. That is, given any a ∈ P(D) we have that M (a) = {a}. The
same is certainly true for the subspace (P(D)+ , τ ()) and the subgraph
G(P(D)+ , E()).
Recall that a sink in a directed graph is a vertex with arrows in but no arrows
out. We have the following lemma.
Lemma 3.5. Let D be an integral domain and let G(P (D)+ , E()) be the associated graph of divisibility. Then,an element π ∈ D• is irreducible in D if and only
if the node π is a sink in G(P (D)+ , E()).
GRAPH OF DIVISIBILITY
5
It is well known that D is atomic if and only if every element of G(D)+ can be
written as a sum of minimal positive elements. Similarly, D is satisfies ACCP if
and only if every descending sequence of elements in G(D)+ stabilizes. As with
the group of divisibility, the graph of divisibility can be used to characterize the
well-studied factorization domains. We close this section with the following result.
Theorem 3.6. Let D be an integral domain and let G(P(D)+ , E()) be the associated graph of divisibility.
(1) D is atomic if and only if for every non unit element a ∈ P(D)+ , there
exists a (finite) path originating from a that terminates at an atom.
(2) D satisfies ACCP if and only if for every a ∈ P(D)+ , every path originating
from a terminates at an atom.
(3) D is a BFD if and only if for every a ∈ P(D)+ , every path originating from
a terminates at an atom and there is an upper bound on the lengths of all
such paths.
(4) D is an FFD if and only if for every a ∈ P(D)+ , every path originating
from a terminates at an atom and there are finitely many such paths.
(5) D is an HFD if and only if for every a ∈ P(D)+ , every path originating
from a terminates at an atom and all such paths are of the same length.
4. Some Connectedness Properties
In this section, we consider the connectedness of the graph of divisibility. To
do this, we will examine the connectedness of the associated Alexandrov topology.
We conclude the section with a few examples.
Theorem 4.1. Let D be an integral domain. The following statements for a, b ∈
K × are equivalent.
···πn
.
(1) There exist atoms πi , ξi ∈ Irr(D) such that ab = πξ11···ξ
m
(2) The points a, b belong to the same connected component in the Alexandrov
topology (P(D), τ ()).
(3) There is a finite weak path connecting a to b in the graph of divisibility
G(P(D), E()).
···πn
Proof. (1)⇒(2) Suppose there exist atoms πi , ξi ∈ Irr(D) such that ab = πξ11···ξ
.
m
To show that a, b belong to the same connected component, it suffices to show that
M (a) ∩ M (b) is nonempty. To this end, note that
aξ1 · · · ξm = c = bπ1 · · · πn
implies that c ≺ a because ac = ξ1 · · · ξm . Similarly, we have that c ≺ b, from which
it follows that c ∈ M (a) ∩ M (b) as needed.
(2)⇒(3) If a, b belong to the same connected component, then there exists
a finite set of points {a = x0 , x1 , ..., xn = b} such that M (xi−1 ) ∩ M (xi ) 6= ∅
for all i ∈ {1, 2..., n}. Hence, we can choose a ci ∈ M (xi−1 ) ∩ M (xi ) so that
ci
ci
ci
ci
xi−1 , xi ∈ F (D), say xi−1 = ξ1 · · · ξm and , xi = π1 · · · πn where πi , ξi ∈ Irr(D). It
follows that there are directed paths
ci → (xi−1 ξ1 · · · ξm−1 ) → ... → (xi−1 ξ1 ) → xi−1
and
ci → (xi π1 · · · πn ) → ... → (xi π1 ) → xi .
6
J. G. BOYNTON AND J. COYKENDALL
Hence, there is a weak path
xi−1 ← ... ← ci → ... → xi
for all i ∈ {1, 2..., n}, and so there is a weak path connecting a to b.
(3)⇒(1) Suppose that a, b are distinct points in the T0 Alexandrov space (P(D), τ (
)). Then there exists a finite weak path connecting a to b say
a = x0 ↔ x1 ↔ ... ↔ xn = b.
Using induction on n, we suppose that the result is true for all k < n. It follows from
···πn
a
the existence of the weak path a = x0 ↔ x1 ↔ ... ↔ xn−1 that xn−1
= πξ11···ξ
where
m
πi , ξi ∈ Irr(D). Now observe that either xn−1 → b or b → xn−1 . If xn−1 → b then
a
1 ···πn
= π ∈ Irr(D). It follows that ab = xn−1
= ππ
· xn−1
by definition, we have xn−1
b
b
ξ1 ···ξm ,
and a similar argument handles the case.
If F is the subgroup of K × generated by Irr(D), then we can relate the number
of connected components of G(P, E()) with the order of the quotient group K × /F
(a homomorphic image of the group of divisibility K × /U (D)). We immediately
get the following result.
Corollary 4.2. There are 1-1 correspondences between the elements of K × /F,
the connected components of G(P(D), E()), and the connected components of
(P(D), τ ()).
Example 4.3. Consider the classical construction D = Z + xQ[x]. It is wellknown that the irreducible elements of D are the primes p ∈ Z and Q[x]-irreducible
polynomials of the form ±1 + xq(x) where q(x) ∈ Q[x] (see [3]). For each a ∈ D
let us write a(x) = (a0 , a1 , a2 , ...) where a0 ∈ Z and ai ∈ Q for all i > 1. As with
power series representations, we define the order of a to be the natural number
ord(a) = min{i ∈ N : ai 6= 0}. It follows from [3] that a(x) ∈ F (D) if and only if
ord(a) = 0. We will now show that two polynomials a, b ∈ D belong to the same
connected component of (P(D)+ , τ ()) if and only if ord(a) = ord(b). Indeed,
write a(x) = xe0 a(x) and b(x) = xf0 b(x) where ord(a) = 0 = ord(b) (allowing
e0 = 0 = f0 ). If a(x) is connected to b(x), then by there exist atoms πi , ξi ∈ Irr(D)
such that
π1 (x) · · · πn (x)
a(x)
=
.
b(x)
ξ1 (x) · · · ξm (x)
We now have the equation
xe0 a(x)ξ1 (x) · · · ξm (x) = xf0 b(x)π1 (x) · · · πn (x)
and one easily checks that
e0 = ord(xe0 ) = ord(xe0 aξ1 · · · ξm ) = ord(xf0 bπ1 · · · πn ) = ord(xf0 ) = f0
For the converse, suppose that e0 = f0 . Again, using the fact that ord(a) = 0 =
ord(b) is equivalent to a, b ∈ F (D), we have the existence of atoms πi , ξi ∈ Irr(D)
such that
a(x)
π1 (x) · · · πn (x)
.
=
ξ1 (x) · · · ξm (x)
b(x)
On the other hand, e0 = f0 implies
xe0 a(x)
a(x)
a(x)
.
= f
=
b(x)
b(x)
x 0 b(x)
GRAPH OF DIVISIBILITY
7
It follows that the distinct connected components of (P(D)+ , τ ()) are given by the
set {Irr(D) = [2], [x], [x2 ], ...}. In other words, there is no weak path xm ↔ ... ↔ xn
in G(P + , E()) whenever m 6= n.
Example 4.4. Let x, y be indeterminates over the field F2 .
k
(1) Now let X = {xα : α ∈ Q+ } and Z1 = { xyα : α ∈ Q+ , k ∈ Z+ , and
k > 2}. We determine the number of connected components in the graph
of divisibility of the domain D1 = F2 [X, y, Z1 ](X,y,Z1 ) . To do this, we
first observe that the integral closure of D1 is the rank 2 valuation domain
V = F2 [X, Z](X,Z) where Z = { xyα : α ∈ Q+ }. The value group of V is
Z ⊕ Q ordered lexicographically and it is easy to check that every element
of V • is a unit multiple of y k or xr y k where (k, r) ∈ Z+ ⊕ Q. It is not
hard to check that every element of Irr(D1 ) has value (1, 0). It is now an
easy matter to check that the connected components of G(P(D1 )+ , E())
are given in terms of their values by
{[(0, α)]}α∈Q+ ∪ {[(k, 0)]}k∈Z+ ∪ {[(k, α)]} k>2 .
α<0
1
2
For example, consider the elements f = x and g =
y3
1
x3
. Then v(f ) = (0, 21 )
and v(g) = (3, 13 ). Then v( fg ) = v(g) − v(f ) = (3, − 61 ) cannot be written
in the form m(1, 0) where m ∈ Z. In other words, fg cannot be expressed
as the quotient of atomic elements.
k
(2) If Z2 = { yxj : j ∈ Z+ , k ∈ Z+ , and k > 2} and D2 = F2 [x, y, Z2 ](x,y,Z2 ) ,
then (P(D2 )+ , τ ()) is a connected Alexandrov space. Equivalently, the
graph of divisibility G(P(D2 )+ , E()) is weakly connected. One need only
check that the integral closure of D2 has the discrete value group Z ⊕ Z
ordered lexicographically. Again, it is not hard to check that every element
of Irr(D2 ) has value (0, 1) or (1, 0) and given any f, g ∈ D2 , we have that
v( fg ) = m(1, 0) + n(0, 1) where m, n ∈ Z.
5. Some Generalizations of Atomicity
In this section, we show that a connected graph of divisibility gives rise to a
generalization of atomicity.
Definition 5.1. Let D be any integral domain.
(1) D is called almost atomic if for every a ∈ D• , there exist atoms {πi } ⊂
Irr(D) such that aπ1 · · · πn ∈ F (D).
(2) D is called quasi atomic if for every a ∈ D• , there exists an element b ∈ D
such that ab ∈ F (D).
It is easy to see that almost atomic implies quasi atomic. Also, if D is quasi
atomic, it is not hard to show that every nonzero prime ideal of D contains an
irreducible element. We have the following lemma.
Lemma 5.2. Given an integral domain D, each condition below implies the next:
(1) D is atomic
(2) D is almost atomic
(3) D is quasi atomic
(4) Every nonzero prime ideal of D contains an irreducible element.
8
J. G. BOYNTON AND J. COYKENDALL
Proof. It suffices to show that (3) implies (4). Suppose that D is quasi atomic. If a
is a nonzero element of a prime ideal P , then there is b ∈ D such that ab = π1 · · · πn
where each πi ∈ Irr(D). But then π1 · · · πn ∈ P so that πi ∈ P for some i 6 n.
These observations give an example of an integral domain that is not quasi
atomic.
Example 5.3. As in Example 4.3, let D = Z + xQ[x]. Then xQ[x] is a prime
ideal of D that contains no irreducible element. To see this, recall from 4.3 that if
f ∈ Irr(D), then ord(f ) = 0. But f ∈ xQ[x] if and only if ord(f ) > 1. It follows
from Lemma 5.2 that D is not quasi atomic.
We now show the connection between almost atomicity and a connected graph
of divisibility.
Theorem 5.4. The following statements are equivalent for a domain D.
(1) D is almost atomic.
(2) (P, τ ()) is connected.
(3) G(P, E()) is weakly connected.
Proof. (1)⇒(2) Choose any two points a, b ∈ (P, τ ()). If D is almost atomic,
there exist atoms πi , ξi ∈ Irr(D) such that aπ1 · · · πn and bξ1 · · · ξm ∈ F (D). In
π ···πn σi ···σj
other words, there exist atoms σi , ςi ∈ A(D) such that ab = ξ11 ···ξm
ςi ···ςk . It follows
from Theorem 4.1 that any pair of points in (P, τ ()) belong to the same connected
component.
(2)⇒(3) Follows immediately from Theorem 4.1.
(3)⇒(1) Since G(P, E()) is weakly connected, there is a weak path connecting
any a1 ∈ P (where a ∈ D) to an element of the form π1 where π ∈ Irr(D). Theorem
···πn
4.1 implies that there exist atoms πi , ξi ∈ Irr(D) such that πa = πξ11···ξ
. In other
m
words, there exist atoms ξi ∈ Irr(D) such that aξ1 · · · ξm ∈ F (D).
Using the Theorem 5.4 and the results from the previous section, we are led to
an example of an almost atomic domain that is not atomic.
(1) As in Example 4.4(1), let D1 = F2 [X, y, Z1 ](X,y,Z1 ) where
Example 5.5.
k
X = {x : α ∈ Q+ } and Z1 = { xyα : α ∈ Q+ , k ∈ Z+ , and k > 2}. Since the
connected components are in a 1-1 correspondence with Q, it is certainly
not the case that D1 is almost atomic (Theorem 5.4). However, it is the
case that D1 is quasi atomic. Indeed, given any f ∈ D1• , we can write
v(f ) = (k, α). There is a g ∈ D1 such that v(g) = (2, −α) and so
α
v(f g) = v(f ) + v(g) = (k + 2, 0) = (1, 0) + ... + (1, 0).
Translating this information back to D1 , we get that f g = y k+2 u for some
unit u ∈ V. Note that if y n+1 u ∈ D1 for some unit u ∈ V , then y n+1 u =
l
v1 xα + v2 xyβ + v3 y where either vi ∈ U (D1 ) or vi = 0. If n > 0, then
l−1
v1 = 0 = v3 . It follows that l > n + 1 so that y n u = v2 yxβ . Therefore,
l−n
yu = v2 yxβ ∈ D1 as l − n > 1. It follows from all of this that f g ∈ F (D)
as needed.
k
(2) As in Example 4.4(2), let D2 = F2 [x, y, Z2 ](x,y,Z2 ) where Z2 = { yxj : j ∈
Z+ , k ∈ Z+ , and k > 2}. Since G(P(D2 )+ , E()) is weakly connected, it
must be the case that D2 is almost atomic. However, it is not atomic since,
GRAPH OF DIVISIBILITY
9
2
for example, v( y 1 ) = (2, 12 ) cannot be written as an N-linear combination
x2
m(1, 0) + n(0, 1).
Acknowledgements. The authors would like to thank the North Dakota State
University Department of Mathematics for their continued support.
References
[1] D.D. Anderson, D.F. Anderson, and M. Zafrullah. Factorization in integral domains. J. Pure
Appl. Algebra, 69:1–19, 1990.
[2] F. G. Arenas. Alexandroff spaces. Acta Math. Univ. Comenianae, 68:17–25, 1999.
[3] S. T. Chapman and W. W. Smith. Restricted elasticity in rings of integer-valued polynomials
determined by finite subsets. Monatsh. Math., 148:195–203, 2006.
[4] P. M. Cohn. Bézout rings and their subrings. Proc. Cambridge Philos. Soc., 75:321–329, 1974.
[5] Anne Grams. Atomic rings and the ascending chain condition for principal ideals. Proc. Cambridge Philos. Soc., 75:321–329, 1974.
[6] Joe L. Mott. The group of divisibility and its applications. In Conference on Commutative
Algebra (Univ. Kansas, Lawrence, Kan., 1972), pages 194–208. Lecture Notes in Math., Vol.
311. Springer, Berlin, 1973.
[7] Abraham Zaks. Atomic rings without a.c.c. on principal ideals. J. Algebra, 74(1):223–231,
1982.
Department of Mathematics, North Dakota State University, Fargo, ND 58108
E-mail address, J. G. Coykendall: [email protected]
Department of Mathematics, North Dakota State University, Fargo, ND 58108
E-mail address, J. Coykendall: [email protected]
| 0math.AC
|
1
Statistical Mechanics of MAP Estimation:
General Replica Ansatz
arXiv:1612.01980v2 [cs.IT] 23 Oct 2017
Ali Bereyhi, Ralf R. Müller, and Hermann Schulz-Baldes
Abstract
The large-system performance of maximum-a-posterior estimation is studied considering a general distortion
function when the observation vector is received through a linear system with additive white Gaussian noise. The
analysis considers the system matrix to be chosen from the large class of rotationally invariant random matrices. We
take a statistical mechanical approach by introducing a spin glass corresponding to the estimator, and employing the
replica method for the large-system analysis. In contrast to earlier replica based studies, our analysis evaluates the
general replica ansatz of the corresponding spin glass and determines the asymptotic distortion of the estimator for
any structure of the replica correlation matrix. Consequently, the replica symmetric as well as the replica symmetry
breaking ansatz with b steps of breaking is deduced from the given general replica ansatz. The generality of our
distortion function lets us derive a more general form of the maximum-a-posterior decoupling principle. Based on
the general replica ansatz, we show that for any structure of the replica correlation matrix, the vector-valued system
decouples into a bank of equivalent decoupled linear systems followed by maximum-a-posterior estimators. The
structure of the decoupled linear system is further studied under both the replica symmetry and the replica symmetry
breaking assumptions. For b steps of symmetry breaking, the decoupled system is found to be an additive system
with a noise term given as the sum of an independent Gaussian random variable with b correlated impairment
terms. The general decoupling property of the maximum-a-posterior estimator leads to the idea of a replica simulator
which represents the replica ansatz through the state evolution of a transition system described by its corresponding
decoupled system. As an application of our study, we investigate large compressive sensing systems by considering
the ℓp norm minimization recovery schemes. Our numerical investigations show that the replica symmetric ansatz for
ℓ0 norm recovery fails to give an accurate approximation of the mean square error as the compression rate grows,
and therefore, the replica symmetry breaking ansätze are needed in order to assess the performance precisely.
Index Terms
Maximum-a-posterior estimation, linear vector channel, decoupling principle, equivalent single-user system, compressive sensing, zero norm, replica method, statistical physics, replica symmetry breaking, replica simulator
The results of this manuscript were presented in parts at 2016 IEEE Information Theory Workshop (ITW) [78] and 2017 IEEE Information
Theory and Applications Workshop (ITA) [79].
This work was supported by the German Research Foundation, Deutsche Forschungsgemeinschaft (DFG), under Grant No. MU 3735/2-1.
Ali Bereyhi and Ralf R. Müller are with the Institute for Digital Communications (IDC), Friedrich Alexander University of Erlangen-Nürnberg
(FAU), Konrad-Zuse-Straße 5, 91052, Erlangen, Bavaria, Germany (e-mails: [email protected], [email protected]).
Hermann Schulz-Baldes is with the Department of Mathematics, FAU, Cauerstraße 11, 91058, Erlangen, Bavaria, Germany (e-mail: schuba@
mi.uni-erlangen.de).
2
I. I NTRODUCTION
Consider a vector-valued Additive White Gaussian Noise (AWGN) system specified by
y = Ax + z
(1)
where the independent and identically distributed (i.i.d.) source vector xn×1 , with components in a support set
X ⊂ R, is measured by the random system matrix Ak×n ∈ Ak×n , with A ⊂ R, and corrupted by the i.i.d. zero-mean
Gaussian noise vector z k×1 , with variance λ0 , i.e., z ∼ N (0, λ0 I). The source vector can be estimated from the
observation vector y k×1 using a Maximum-A-Posterior (MAP) estimator. For a given system matrix A, the estimator
maps the observation vector to the estimated vector x̂n×1 ∈ Xn via the estimation function g(·|A) defined as
1
2
g(y|A) = arg minn
ky − Avk + u(v)
(2)
v∈X
2λ
for some “utility function” u(·) : Rn 7→
R+ and estimation parameter λ ∈ R+ . In (2), k·k2 denotes the Euclidean
norm, and it is assumed that the minimum is not degenerate so that g(·|A) is well-defined, at least for almost all y
and A. In order to analyze the performance of the system in the large-system limit, i.e., k, n ↑ ∞, one considers a
general distortion function d(·; ·) : X × X 7→ R. For some choices of d(·; ·), the distortion function determines the
distance between the source and estimated vector, e.g. d(x̂; x) = |x̂ − x|2 ; however, in general, it takes different
choices. The asymptotic distortion
n
1X
d(x̂i ; xi ),
n↑∞ n
i=1
D = lim
(3)
then, expresses the large-system performance regarding the distortion function d(·; ·). The performance analysis of
the estimator requires (2) to be explicitly computed, and then, x̂ = g(y|A) substituted in the distortion function.
This task, however, is not trivial for many choices of the utility function and the source support
X, and becomes
unfeasible as n grows large. As basic analytic tools fail, we take a statistical mechanical approach and investigate
the large-system performance by studying the macroscopic parameters of a corresponding spin glass. This approach
enables us to use the replica method which has been developed in the context of statistical mechanics.
A. Corresponding Spin Glass
Consider a thermodynamic system which consists of n particles with each having a microscopic parameter vi ∈ V.
T
The vector v n×1 = [v1 , . . . , vn ] , collecting the microscopic parameters, presents then the microscopic state of the
system and is called the “microstate”. The main goal of statistical mechanics is to excavate the “macroscopic
parameters” of the system, such as energy and entropy through the analysis of the microstate in the thermodynamic
limit, i.e., n ↑ ∞. Due to the large dimension of the system, statistical mechanics proposes a stochastic approach in
which the microstate is supposed to be randomly distributed over the support
this system, the Hamiltonian E(·) :
Vn due to some distribution pv . For
Rn 7→ R+ assigns to each realization of the microstate a non-negative energy
level, and H := −E pv log pv denotes the system’s entropy. The “free energy” of the thermodynamic system at the
3
inverse temperature β is then defined as
F(β) := E pv E(v) − β−1 H.
(4)
The second law of thermodynamics states that the microstate at thermal equilibrium takes its distribution such that
the free energy meets its minimum. Thus, the microstate’s distribution at thermal equilibrium reads
pβ
v (v) = [Z(β)]
−1 −βE(v)
e
(5)
where Z(β) is a normalization factor referred to as the “partition function”, and the superscript β indicates the
distribution’s dependence on the inverse temperature. The distribution in (5) is known as the “Boltzmann-Gibbs
distribution” and covers many distributions on
Vn
by specifying E(·) and β correspondingly. Substituting the
Boltzmann-Gibbs distribution in (4), the free energy at thermal equilibrium and inverse temperature β reads
F(β) = −β−1 log Z(β).
(6)
The average energy and entropy of the system at thermal equilibrium are then determined by taking expectation
over the distribution in (5), i.e.,
E(β) := E pβv E(v)
(7a)
H(β) := −E pβv log pβ
v (v),
(7b)
which can be calculated in terms of the free energy via
d
[βF(β)]
dβ
d
[F(β)] .
H(β) = β2
dβ
E(β) =
(8a)
(8b)
In spin glasses [1], the Hamiltonian assigns the energy levels randomly using some randomizer Q resulting
from random interaction coefficients. In fact, each realization of Q specifies a thermodynamic system represented
by the deterministic Hamiltonian E(·|Q). In statistical mechanics, Q is known to have “quenched” randomness
while the microstate is an “annealed” random variable. The analysis of spin glasses takes similar steps as above
considering a given realization of the randomizer, and therefore, as the system converges to its thermal equilibrium
at the inverse temperature β, the microstate’s conditional distribution given Q, i.e., pβ
v|Q , is a Boltzmann-Gibbs
distribution specified by E(·|Q). Consequently, the free energy reads
F(β|Q) = −β−1 log Z(β|Q).
(9)
where Z(β|Q) is the partition function with respect to the Hamiltonian E(·|Q). Here, the free energy, as well
as other macroscopic parameters of the system, is random; however, the physical intuition behind the analyses
suggests that these random macroscopic parameters converge to deterministic values in the thermodynamic limit.
This property is known as the “self averaging property” and has been rigorously justified for some particular classes
4
of Hamiltonians, e.g., [2]–[5]. Nevertheless, in cases where a mathematical proof is still lacking, the property is
supposed to hold during the analysis. According to the self averaging property, the free energy of spin glasses
converges to its expectation in the thermodynamic limit.
As mentioned earlier, the MAP estimator in (2) can be investigated using a corresponding spin glass. To see that,
consider a spin glass whose microstate is taken from
E(v|y, A) =
Xn , and whose Hamiltonian is defined as
1
ky − Avk2 + u(v).
2λ
(10)
Here, the system matrix A and the observation vector y are considered to be the randomizers of the spin glass. In
this case, given A and y, the conditional distribution of the microstate is given by
pβ
v|y,A (v|y, A) = [Z(β|y, A)]
−1 −βE(v|y,A)
e
.
(11)
Taking the limit when β ↑ ∞ and using Laplace method of integration [6], the zero temperature distribution, under
this assumption that the minimizer is unique, reduces to
p∞
v|y,A (v|y, A) = 1{v = arg minn E(v|y, A)}
v∈X
= 1{v = g(y|A)},
(12a)
(12b)
where 1{·} denotes the indicator function, and g(·|A) is defined as in (2). (12b) indicates that the microstate of the
spin glass converges to the estimated vector of the MAP estimator, i.e., x̂ = g(y|A), in the zero temperature limit.
Invoking this connection, we study the corresponding spin glass instead of the MAP estimator. We represent the
input-output distortion of the system regarding a general distortion function d(·; ·) as a macroscopic parameter of the
spin glass. Consequently, the replica method developed in statistical mechanics is employed to determine the defined
macroscopic parameter of the corresponding spin glass. The replica method is a generally nonrigorous but effective
method developed in the physics literature to study spin glasses. Although the method lacks rigorous mathematical
proof in some particular parts, it has been widely accepted as an analysis tool and utilized to investigate a variety
of problems in applied mathematics, information processing, and coding [7]–[10].
The use of the replica method for studying multiuser estimators goes back to [11] where Tanaka determined
the asymptotic spectral efficiency of Marginal-Posterior-Mode (MPM) estimators by employing the replica method.
The study demonstrated interesting large-system properties of multiuser estimators, and consequently, the statistical
mechanical approach received more attention in the context of multiuser systems. This approach was then employed
in the literature to study multiple estimation problems in large vector-valued linear systems, e.g. [12]–[14]. The
method was also utilized to analyze the asymptotic properties of Multiple-Input Multiple-Output (MIMO) systems in
[15] considering an approach similar to [11]. Regarding multiuser estimators, the earlier studies mainly considered
the cases in which the entries of the source vector are binary or Gaussian random variables. The results were
later extended to a general source distribution in [14]. The statistical mechanical approach was further employed
to address mathematically similar problems in vector precoding, compressive sensing and analysis of superposition
codes [16]–[18], to name just a few examples. Despite the fact that the replica method lacks mathematical rigor, a
5
body of work, such as [5], [19]–[25], has shown the validity of several replica-based results in the literature, e.g.,
Tanaka’s formula in [11], using some alternative rigorous approaches. We later discuss these rigorous results with
more details by invoking the literature of compressive sensing.
B. Decoupling Principle
Considering the MAP estimator defined in (2), the entries of the estimated vector x̂ are correlated in general,
since the system matrix couples the entries of x linearly, and g(·|A) performs several nonlinear operations on y.
In the large-system performance analysis, the marginal joint distribution of two corresponding input-output entries
xj and x̂j , 1 ≤ j ≤ n, is of interest. To clarify our point, consider the case in which a linear estimator is employed
instead of (2), i.e., x̂ = GT y. Denote the matrices A and G as A = [a1 · · · an ] and G = [g1 · · · gn ], respectively,
with ai and gi being k × 1 vectors for 1 ≤ i ≤ n. Therefore, x̂j is written as
x̂j = gjT y
#
" n
X
T
xi ai + z
= gj
(13a)
(13b)
i=1
= (gjT aj ) xj +
n
X
(gjT ai ) xi + gjT z.
(13c)
i=1,i6=j
Here, the right hand side of (13c) can be interpreted as the linear estimation of a single-user system indexed by j in
which the symbol xj is corrupted by an additive impairment given by the last two summands in the right hand side
of (13c). The impairment term is not necessarily independent and Gaussian. For some classes of matrix ensembles,
and under a set of assumptions, it is shown that the dependency of the derived single-user systems on the index
j vanishes, and the distribution of the impairment terms converges to a Gaussian distribution in the large-system
limit [26]. As a result, one can assume the vector-valued system described by (1) followed by the linear estimator
G to be a set on n additive scalar systems with Gaussian noise which have been employed in parallel. In other
words, the vector system can be considered to “decouple” into a set of similar scalar systems. Each of them relates
an input entry xj to its corresponding estimated one x̂j . This asymptotic property of the estimator is referred to as
the “decoupling property” and can be investigated through the large-system performance analysis.
The decoupling property was first studied for linear estimators. Tse and Hanly noticed this property while they
were determining the multiuser efficiency of several linear multiuser estimators in the large-system limit [27]. They
showed that for an i.i.d. system matrix, the effect of impairment is similar to the effect of some modified Gaussian
noise when the dimension tends to infinity. This asymptotic property was then investigated further by studying the
asymptotics of different linear receivers and their large-system distributions [28], [29]. In an independent work,
Verdú and Shamai also studied the linear Minimum Mean Square Error (MMSE) estimator and showed that the
conditional output distribution is asymptotically Gaussian [30]. In [31], the authors studied the asymptotics of the
impairment term when a family of linear estimators is employed and proved that it converges in distribution to a
Gaussian random variable. The latter result was further extended to a larger class of linear estimators in [26].
6
Regarding linear estimators, the main analytical tool is random matrix theory [32], [33]. In fact, invoking properties
of large random matrices and the central limit theorem, the decoupling property is rigorously proved, e.g. [34],
[35]. These tools, however, fail for nonlinear estimators as the source symbol and impairment term do not decouple
linearly due to nonlinear operations at the estimators. In [36], Müller and Gerstacker employed the replica method
and studied the capacity loss due to the separation of detection and decoding. The authors showed that the additive
decoupling of the spectral efficiency, reported in [35] for Gaussian inputs, also holds for binary inputs. As a result, it
was conjectured that regardless of input distribution and linearity, the spectral efficiency always decouples in an
additive form [37]. In [14], Guo and Verdú justified this conjecture for a family of nonlinear MMSE estimators,
and showed that for an i.i.d. system matrix, the estimator decouples into a bank of single-user MMSE estimators
under the Replica Symmetry (RS) ansatz. In [38], Rangan et al. studied the asymptotic performance of a class of
MAP estimators. Using standard large deviation arguments, the authors represented the MAP estimator as the limit
of an indexed MMSE estimators’ sequence. Consequently, they determined the estimator’s asymptotics employing
the results from [14] and justified the decoupling property of MAP estimators under the RS ansatz for an i.i.d. A.
Regarding the decoupling property of MAP estimators, there are still two main issues which need further investigations: 1) cases in which the system matrix A is not i.i.d., and 2) the analysis of the estimator under the Replica
Symmetry Breaking (RSB) ansätze. The first issue was partially addressed in [39] where, under the RS assumption,
the authors studied the asymptotics of a MAP estimator employed to recover the support of a source vector from
observations received through noisy sparse random measurements. They considered a model in which a sparse
Gaussian source vector1 is first randomly measured by a square matrix V, and then, the measurements are sparsely
sampled by a diagonal matrix B whose non-zero entries are i.i.d. Bernoulli random variables. For this setup, the
input-output information rate and support recovery error rate were investigated by considering the measuring matrix
V to belong to a larger set of matrix ensembles. These results, moreover, could address the decoupling property
of the considered setting. Although the class of system matrices is broadened in [39], it cannot be considered as
a complete generalization of the property presented in [14] and [38], since it is restricted to cases with a sparse
Gaussian source and loading factors less than one, i.e., kn−1 < 1 in (1). Vehkaperä et al. also tried to investigate
the first issue for a similar formulation in compressive sensing [40]. In fact, the authors considered a linear sensing
model as in (1) for the class of rotationally invariant random matrices2 and under the RS ansatz determined the
asymptotic Mean Square Error (MSE) for the least-square recovery schemes which can be equivalently represented
by the formulation in (2). The large-system results in [40], however, did not address the asymptotic marginal joint
input-output distribution, and the emphasis was on the MSE. Regarding the second issue, the MAP estimator has
not yet been investigated under RSB ansätze in the literature. Nevertheless, the necessity of such investigations was
mentioned for various similar settings in the literature; see for example [41]–[43]. In [41], the performances of Code
Division Multiple Access (CDMA) detectors were investigated by studying both the RS and one-step RSB ansätze
and the impact of symmetry breaking onto the results for low noise scenarios were discussed. The authors in [43]
1 It
means that the entries of the source vector are of the form xi bi where xi and bi are Gaussian and Bernoulli random variables, respectively.
2 The
class of rotationally invariant random matrices is precisely defined later throughout the problem formulation.
7
further studied the performance of vector precoding under both RS and RSB and showed that the analysis under
RS yields a significantly loose bound on the true performance. The replica ansatz with one-step of RSB, however,
was shown to lead to a tighter bound consistent with rigorous performance bound available in the literature. A
similar observation was recently reported for the problem of least-square-error precoding in [44], [45]. The replica
analyses of compressive sensing in [42], [46], moreover, discussed the necessity of investigating the performance
of ℓp minimization recovery schemes under RSB ansätze for some choices of p.
C. Compressive Sensing
The MAP estimation of a source vector from a set of noisy linear observations arises in several applications,
such as MIMO and sampling systems. To address one, we consider large compressive sensing systems and employ
our asymptotic results to analyze the large-system performance [47]–[49]. In context of compressive sensing, (1)
represents a noisy sampling system in which the source vector x is being sampled linearly via A and corrupted by
additive noise z. In the “noise-free” case, i.e. λ0 = 0, the source vector x is exactly recovered from the observation
vector y, if the number of observations k is as large as the source length n and the sampling matrix A is full rank.
As the number of observations reduces, the possible answers to the exact reconstruction problem may increase
regarding the source support
X,
and therefore, the recovered source vector from the observation vector is not
necessarily unique. In this case, one needs to enforce some extra constraints on the properties of the source vector
in order to recover it uniquely among all possible solutions. In compressive sensing, the source vector is supposed
to be sparse, i.e., a certain fraction of entries are zero. This property of the source imposes an extra constraint on
the solution which allows for exact recovery in cases with k < n. In fact, in this case, one should find a solution
to y = Av over
S = {vn×1 ∈ Xn :
kvk0 < αn}
where k·k0 denotes the “ℓ0 norm” and is defined as kvk0 :=
Pn
i=1
(14)
1{vi 6= 0}, and α ≤ 1 is the source’s sparsity
X, the latter problem can have a unique
solution even for k < n [50]–[52]. Searching for this solution optimally over S, however, is an NP-hard problem and
factor defined as the fraction of non-zero entries. Depending on A and
therefore intractable. The main goal in noise-free compressive sensing is to study feasible reconstruction schemes
and derive tight bounds on the sufficient compression rate, i.e., k/n, for exact source recovery via these schemes.
In noisy sampling systems, exact recovery is only possible for some particular choices of
considering either cases in which exact recovery is not possible or choices of
X.
Nevertheless,
X for which the source vector can
be exactly recovered from noisy observations, the recovery approaches in these sensing systems need to take the
impact of noise into account. The classical strategy in this case is to find a vector in
S such that the recovery
distortion is small. Consequently, a recovery scheme for noisy sensing system based on the ℓ0 norm is given by
1
(15)
ky − Avk2 + kvk0
x̂ = arg minn
v∈X
2λ
which is the MAP estimator defined in (2) with u(v) = kvk0 . It is straightforward to show that for λ0 = 0, i.e.,
zero noise variance, (15) reduces to the optimal noise-free recovery scheme as λ ↓ 0. Similar to the noise-free
8
case, the scheme in (15) results in a non-convex optimization problem, and therefore, is computationally infeasible.
Alternatively, a computationally feasible schemes is introduced by replacing the ℓ0 norm in the cost function with
the ℓ1 norm. The resulting recovery scheme is known as LASSO [53] or basis pursuit denoising [54]. Based on
these formulations, several iterative and greedy algorithms have been introduced for recovery taking into account
the sparsity pattern and properties of the sampling matrix [55]–[57]. The main body of work in noisy compressive
sensing then investigates the trade-off between the compression rate and recovery distortion.
For large compressive sensing systems, it is common to consider a random sensing matrix, since for these matrices,
properties such as restricted isometry property are shown to hold with high probability [58]. In this case, the
performance of a reconstruction schemes is analyzed by determining the considered performance metric, e.g., MSE
and probability of exact recovery in the noisy and noise-free case, respectively, for a given realization of the sensing
matrix. The average performance is then calculated by taking the expectation over the matrix distribution. Comparing
(15) with (2), one can utilize the MAP formulation, illustrated at the beginning of this section, to study the largesystem performance of several reconstruction schemes. This similarity was considered in a series of papers, e.g.,
[17], [38], and therefore, earlier replica results were employed to study compressive sensing systems. The extension
of analyses from the context of multiuser estimation had the disadvantage that the assumed sampling settings were
limited to those setups which are consistent with the estimation problems in the literature. Compressive sensing
systems, however, might require a wider set of assumptions, and thus, a large class of settings could not be addressed
by earlier investigations. As the result, a body of work deviated from this approach and applied the replica method
directly to the compressive sensing problem; see for example [39], [40], [42], [59]–[61].
Although in general the replica method is considered to be mathematically non-rigorous, several recent studies
have justified the validity of the replica results in the context of compressive sensing by using some alternative tools
for analysis. A widely investigated approach is based on the asymptotic analysis of Approximate Message Passing
(AMP) algorithms. In the context of compressive sensing, the AMP algorithms were initially introduced to address
iteratively the convex reconstruction schemes based on ℓ1 norm minimization, such as LASSO and basis pursuit,
with low computational complexity [62], [63]. The proposed approach was later employed to extend the algorithm
to a large variety of estimation problems including MAP and MMSE estimation; see for example [64], [65]. The
primary numerical investigations of AMP demonstrated that for large sensing systems the sparsity-compression rate
tradeoff of these iterative algorithms, as well as the compression rate-distortion tradeoff in noisy cases, is derived
by the fixed-points of “state evolution” and recovers the asymptotics of convex reconstruction schemes [63]. This
observation was then rigorously justified for i.i.d. sub-Gaussian sensing matrices in [66] by using the conditioning
technique developed in [67]. The study was recently extended to cases with rotationally invariant system matrices
in [68], [69]. The investigations in [70], [71] moreover showed that using AMP algorithms for spatially coupled
measurements, the fundamental limits on the required compression rate [72], [73] can be achieved in the asymptotic
regime. The methodology proposed by AMP algorithms and their state evolution also provided a justification for
validity of several earlier studies based on the replica method. In fact, the results given by the replica method were
recovered through state evolution of the corresponding AMP algorithms. Invoking this approach along with other
analytical tools, the recent study in [23] further approved the validity of the replica prediction for the asymptotic
9
MMSE and mutual information of the linear system in (1) with i.i.d. Gaussian measurements. Similar results were
demonstrated in [21] using a different approach.
D. Contribution and Outline
In this paper, we determine the asymptotic distortion for a general distortion function for cases where the MAP
estimator is employed to estimate the source vector from the observation given in (1). We represent the asymptotic
distortion in (3) as a macroscopic parameter of a corresponding spin glass and study the spin glass via the replica
method. The general replica ansatz is then given for an arbitrary replica correlation matrix, and its special cases are
studied considering the RS and RSB assumptions. The asymptotic distortion is determined for rotationally invariant
random system matrices invoking results for asymptotics of spherical integrals [74], [75]. Using our asymptotic
results, we derive a more general form of the decoupling principle by restricting the distortion function to be of a
special form and employing the moment method [76], [77]. We show that the vector-valued system in (1) estimated
by (2) decouples into a bank of similar noisy single-user systems followed by single-user MAP estimators. This
result holds for any replica correlation matrix; however, the structure of the decoupled single-user system depends
on the supposed structure of the correlation matrix. Under the RSB assumption with b steps of breaking (bRSB), the
noisy single-user system is given in the form of an input term added by an impairment term. The impairment term,
moreover, is expressed as the sum of an independent Gaussian random variable and b correlated interference terms.
By reducing the assumption to RS, the result reduces to the formerly studied RS decoupling principle of the MAP
estimators [38] for rotationally invariant system matrix ensembles. In fact, our investigations collect the previous
results regarding the decoupling principle in addition to a new set of setups under a single umbrella given by a
more general form of the decoupling principle. More precisely, we extend the scope of the decoupling principle to
•
the systems whose measuring matrix belongs to the class of rotationally invariant random matrices, and
•
the replica ansatz with general replica correlations which include the RS and RSB ansätze.
To address a particular application, we study the large-system performance of a compressive sensing system under
the ℓp minimization recovery schemes. We address the linear reconstruction, as well as the LASSO and the ℓ0 norm
scheme considering both the sparse Gaussian and finite alphabet sources. Our general setting allows to investigate
the asymptotic performance with respect to different metrics and for multiple sensing matrices such as random i.i.d.
and projector. The numerical investigations show that the RS ansatz becomes unstable for some regimes of system
parameters and predicts the performance of ℓ0 minimization recovery loosely within a large range of compression
rates. This observation agrees with the earlier discussions on the necessity of RSB investigations reported in [42],
[46]. We therefore study the performance under RSB and discuss the impact of the symmetry breaking. Throughout
the numerical investigations, it is demonstrated that the performance enhancement obtained via random orthogonal
measurements, reported in [40], also holds for sparse finite alphabet sources in which sensing via random projector
matrices results in phase transitions at higher rates.
The rest of the manuscript is organized as follows. In Section II, the problem is formulated. We illustrate our
statistical mechanical approach in Section III and explain briefly the replica method. The general replica ansatz, as
well as the general decoupling principle is given in Section IV. The ansatz under the RS and RSB assumptions are
10
expressed in Sections V and VI. Based on bRSB decoupled system, we propose the idea of a replica simulator in VII
and describe the given ansätze in terms of the corresponding decoupled systems. To address an application of our
study, we consider large compressive sensing systems in Section VIII and discuss several examples. The numerical
investigations of the examples are then given in Section IX. Finally, we conclude the manuscript in Section X.
E. Notations
Throughout the manuscript, we represent scalars, vectors and matrices with lower, bold lower, and bold upper
case letters, respectively. The set of real numbers is denoted by
R, and AT and AH indicate the transposed and
Hermitian of A. Im is the m × m identity matrix and 1m is an m × m matrix with all entries equal to 1. For
a random variable x, px represents either the Probability Mass Function (PMF) or Probability Density Function
(PDF), and Fx represents the Cumulative Distribution Function (CDF). We denote the expectation over x by Ex , and
an expectation over all random variables involved in a given expression by E.
and real numbers and the superscript +, e.g.
R
+
Z and R represent the set of integer
, indicates the corresponding subset of all non-negative numbers.
For sake of compactness, the set of integers {1, . . . , n} is abbreviated as [1 : n], the zero-mean and unit-variance
Gaussian PDF is denoted by φ(·), and the Gaussian averaging is expressed as
Z
Z +∞
(·) φ(t)dt.
(·) Dt :=
(16)
−∞
Moreover, in many cases, we drop the set on which a sum, minimization or an integral is taken. Whenever needed,
we consider the entries of x to be discrete random variables, namely the support
X to be discrete. The results of
this paper, however, are in full generality and hold also for continuous distributions.
F. Announcements
Some of the results of this manuscript were presented at the IEEE Information Theory Workshop [78] and the
Information Theory and Applications Workshop [79]. Even though the results have a mathematical flavor, the stress
is not on investigating the rigor of the available tools such as the replica method, but rather to employ them for
deriving formulas which can be used in different problems.
II. P ROBLEM F ORMULATION
Consider the vector-valued linear system described by (1). Let the system satisfy the following properties.
(a) xn×1 is an i.i.d. random vector with each entry being distributed with px over
(b) Ak×n is randomly generated over A
k×n
X ⊆ R.
with A ⊆ R from rotationally invariant random ensembles. The random
matrix A is said to be rotationally invariant when its Gramian, i.e., J = AT A, has the eigendecomposition
J = UDUT
(17)
11
with Un×n being an orthogonal Haar distributed matrix and Dn×n being a diagonal matrix. For a given n,
we denote the empirical CDF of J’s eigenvalues (cumulative density of states) with FnJ and define it as
n
FnJ (λ) =
1X
1{λJi < λ}.
n i=1
(18)
where λJi for i ∈ [1 : n] denotes the ith diagonal entry of D. We assume that FnJ converges, as n ↑ ∞, to a
deterministic CDF FJ .
(c) z k×1 is a real i.i.d. zero-mean Gaussian random vector in which the variance of each entry is λ0 .
(d) The number of observations k is a deterministic function of the transmission length n, such that
lim
n↑∞
k(n)
1
= < ∞.
n
r
(19)
For sake of compactness, we drop the explicit dependence of k on n.
(e) x, A and z are independent.
The source vector x is reconstructed from the observation vector y with a system matrix A that is known at
the estimator. Thus, for a given A, the source vector is recovered by x̂ = g(y|A) where g(·|A) is given in (2).
Here, the non-negative scalar λ is the estimation parameter and the non-negative cost function u(·) is referred to
the “utility function”. The utility function u(·) is supposed to decouple which means that it takes arguments with
different lengths, i.e., u(·) : Rℓ 7→ R+ for any positive integer ℓ, and
u(x) =
n
X
u(xi ).
(20)
i=1
In order to use the estimator in (2), one needs to guarantee the uniqueness of the estimation output. Therefore, we
impose the following constraint on our problem.
(f) For a given observation vector y, the objective function in (2) has a unique minimizer over the support
Xn .
A. MAP Estimator
The MAP estimator in (2) can be considered as the optimal estimator in the sense that it minimizes the
reconstruction’s error probability postulating a source prior distribution proportional to e−u(x) and a noise variance λ.
To clarify the argument, assume X is a finite set1 . In this case, we can define the reconstruction’s error probability as
Pe = Pr{x 6= g̃(y|A)}
1 i.e.,
the entries of x are discrete random variables.
(21)
12
for some estimator g̃(·|A). In order to minimize Pe , g̃(·|A) is chosen such that the posterior distribution over the
input support
Xn is maximized, i.e.,
g̃(y|A) = arg max px|y,A (v|y, A)
(22a)
v
= arg max py|x,A (y|v, A)px|A (v|A)
(22b)
⋆
= arg min − log py|x,A (y|v, A) − log px (v) .
(22c)
v
v
where ⋆ comes from the independency of x and A. Here, py|x,A (y|v, A) = pz (y − Av), and px is the prior
distribution of the source vector. Now, let the estimator postulate the noise variance to be λ and the prior to be
e−u(v)
px (v) = P −u(v)
ve
(23)
for some non-negative function u(·). Substituting into (22c), the estimator g̃(·|A) reduces to g(·|A) defined in (2).
The estimator in (2) models several particular reconstruction schemes in compressive sensing. We address some of
these schemes later on in Section VIII.
Remark II.1. In the case that the entries of x are continuous random variables, the above argument needs some
modifications. In fact, in this case the reconstruction’s error probability as defined in (21) is always one, and
therefore, it cannot be taken as the measure of error. In this case, the MAP estimator is considered to maximize
the posterior PDF postulating px (v) ∝ e−u(v) and noise variance λ.
B. Asymptotic Distortion and Conditional Distribution
In many applications, the distortion is given in terms of the average MSE, while in some others the average
symbol error rate is considered. In fact, the former takes the ℓ2 norm as the distortion function, and the latter
considers the ℓ0 norm. The distortion function, however, can be of some other form in general. Here, we study the
asymptotic performance by considering a general distortion function which determines the imperfection level of the
estimation. Thus, we consider a distortion function d(·; ·) which
d(·; ·) : X × X → R.
(24)
The term “average distortion” usually refers to the case when the averaging weights are uniform. It means that
each tuple of source-estimated entries (xi , x̂i ) is weighted equally when the distortion is averaged over all the
entries’ tuples. It is however possible to average the distortion by a non-uniform set of weights. In the following,
we define the average distortion for a class of binary weights which includes the case of uniform averaging, as well.
Xn , and let d(·; ·) be a
distortion function defined in (24). Define the index set W(n) as a subset of [1 : n], and let |W(n)| grow with n
Definition II.1 (Asymptotic distortion). Consider the vectors xn×1 and x̂n×1 defined over
such that
|W(n)|
=η
n↑∞
n
lim
(25)
13
for some η ∈ [0, 1]. Then, the average distortion of x̂ and x over the index set
W(n) regarding the distortion
function d(·; ·) is defined as
DW(n) (x̂; x) :=
1
|W(n)|
X
w∈W(n)
d(x̂w ; xw ).
(26)
Assuming the limit of (26) when n ↑ ∞ exists, we denote
DW (x̂; x) := lim DW(n) (x̂; x)
(27)
n↑∞
and refer to it as the “asymptotic distortion” over the limit of the index set
W(n).
Definition II.1 is moreover utilized to investigate the asymptotic conditional distribution of the estimator which
plays a key role in studying the decoupling principle. For further convenience, we define the asymptotic conditional
distribution of the MAP estimator as follows.
Definition II.2 (Asymptotic conditional distribution). Consider the source vector xn×1 passed through the linear
system in (1), and let x̂n×1 be its MAP estimation as given in (2). For a given n, we take an index j ∈ [1 : n] and
denote the conditional distribution of x̂j given xj by px̂|x which at the mass point (v̂, v) ∈ X × X reads
j(n)
−1
j(n)
px̂j ,xj (v̂, v)
px̂|x (v̂|v) := pxj (v)
(28)
with px̂j ,xj (v̂, v) being the marginal joint distribution of xj and x̂j at the mass point (v̂, v). Then, in the large-system
limit, we define the asymptotic conditional distribution of x̂j given xj at (v̂, v) as
j(n)
pjx̂|x (v̂|v) := lim px̂|x (v̂|v).
(29)
n↑∞
We study the asymptotic distortion over the limit of a desired index set
W(n) and distortion function d(·; ·)
by defining it as a macroscopic parameter of the corresponding spin glass and employing the replica method to
evaluate it. Using the result for the asymptotic distortion, we determine then the asymptotic conditional distribution
and investigate the decoupling property of the estimator.
III. S TATISTICAL M ECHANICAL A PPROACH
The Hamiltonian in (10) introduces a spin glass which corresponds to the MAP estimator. The spin glass at
zero temperature describes the asymptotics of the MAP estimator. For further convenience, we formally define the
“corresponding spin glass” as follows.
Definition III.1 (Corresponding spin glass). Consider the integer n ∈
Z+ . The corresponding spin glass with the
microstate v n×1 ∈ Xn and the quenched randomizers y n×1 and Ak×n is given by
•
A is a rotationally invariant random matrix, and y is constructed as in (1) from the source vector x.
14
•
For any realization of A and y, the Hamiltonian reads
E(v|y, A) =
1
ky − Avk2 + u(v).
2λ
(30)
for v ∈ Xn .
For the corresponding spin glass, at the inverse temperature β, the following properties are directly concluded.
•
The conditional distribution of the microstate reads
e−βE(v|y,A)
Z(β|y, A)
(31)
e−βE(v|y,A) .
(32)
1
E log Z(β|y, A),
βn
(33)
pβ
v|y,A (v|y, A) =
with Z(β|y, A) being the partition function
Z(β|y, A) =
•
X
v
The normalized free energy is given by
F(β) = −
where the expectation is taken over the quenched randomizers.
•
The entropy of the spin glass is determined as
H(β) = β2
d
[F(β)] .
dβ
(34)
Regarding the MAP estimator, one can represent the asymptotic distortion as a macroscopic parameter of the
corresponding spin glass. More precisely, using Definition II.2, the asymptotic distortion reads
W(n) (v; x)
DW (x̂; x) = lim lim Eβ
vD
(35)
β↑∞ n↑∞
where Eβ
v indicates the expectation over v ∈
Xn
with respect to the conditional Boltzmann-Gibbs distribution
W 1
−1
as
pβ
v|y,A defined in (31). In fact, by introducing the macroscopic parameter D (β) at the temperature β
W(n) (v; x),
DW (β) := lim Eβ
vD
(36)
n↑∞
the asymptotic distortion can be interpreted as the macroscopic parameter at zero temperature. Here, we take a
well-known strategy in statistical mechanics which modifies the partition function to
Z(β, h) =
1 In
W
X
e−βE(v|y,A)+hnD
W(n) (v;x)
.
v
general, D (β) is a function of β, y, x and A. However, we drop the other arguments for sake of compactness.
(37)
15
In this case, the expectation in (36) is taken as
DW (β) = lim lim
n↑∞ h↓0
1 ∂
log Z(β, h).
n ∂h
(38)
The macroscopic parameter defined in (36) is random, namely depending on the quenched randomizer {y, A}. As
discussed in Section I-A, under the self averaging property, the macroscopic parameter is supposed to converge
in the large-system limit to its expected value over the quenched random variables. For the corresponding spin
glass defined in Definition III.1, the self averaging property has not been rigorously justified, and the proof requires
further mathematical investigations as in [4]. However, as it is widely accepted in the literature, we assume that
the property holds at least for the setting specified here. Therefore, we state the following assumption.
Assumption 1 (Self Averaging Property). Consider the corresponding spin glass defined in Definition III.1. For
almost all realizations of the quenched randomizers A and y,
DW (β) = Ey,A DW (β).
(39)
Using the self averaging property of the system, the asymptotic distortion is written as
DW (x̂; x) = lim lim lim
β↑∞ n↑∞ h↓0
1 ∂
E log Z(β, h).
n ∂h
(40)
Evaluation of (40), as well as the normalized free energy defined in (33), confronts the nontrivial problem of
determining the logarithmic expectation. The task can be bypassed by using the Riesz equality [80] which for a
given random variable t states that
E log t = lim
m↓0
1
log E tm .
m
(41)
Using the Riesz equality, the asymptotic distortion can be finally written as
DW (x̂; x) = lim lim lim lim
β↑∞ n↑∞ h↓0 m↓0
1 1 ∂
log E[Z(β, h)]m .
m n ∂h
(42)
(42) expresses the asymptotic distortion in terms of the moments of the modified partition function; however, it
does not yet simplify the problem. In fact, one faces two main difficulties when calculating the right hand side of
(42): 1) the moment needs to be evaluated for real values of m (at least within a right neighborhood of 0), and
2) the limits need to be taken in the order stated. Here is where the replica method plays its role. The replica
method suggests to determine the moment for an arbitrary non-negative integer m as an analytic function in m and
then assume the two following statements:
1) The moment function analytically continues from the set of integer numbers onto the real axis (at least for
some m at a right neighborhood of 0) which means that an analytic expression found for integer moments
directly extends to all (or some) real moments. Under this assumption, the expression determined for integer
moments can be replaced in (42), and the limit with respect to m taken when m ↓ 0. This assumption is the
16
main part where the replica method lacks rigor and is known as the “replica continuity”.
2) In (42), the limits with respect to m and n exchange. We refer to this assumption as the “limit exchange”.
In order to employ the replica method, we need to suppose the validity of the above two statements; therefore,
we state the following assumption.
Assumption 2 (Replica Continuity and Limit Exchange). For the spin glass defined in Definition III.1, the replica
continuity and limit exchange assumptions hold.
By means of Assumption 2, the calculation of asymptotic distortion reduces to the evaluation of integer moments
of the modified partition function which is written as
Z(m) := E[Z(β, h)]m
=E
m
Y
a=1
X
(43a)
e−βE(va |y,A)+hnD
W(n)(va ;x)
(43b)
va
= Ex EA Ez
X
{v a }
e−β
Pm
a=1
E(va |y,A)+hn
Pm
a=1
DW(n) (v a ;x)
.
(43c)
Here, we refer to v a ∈ Xn for a ∈ [1 : m] as the replicas, and define {v a } := {v1 , . . . , v m } ∈ Xn × · · · × Xn as the
set of replicas. After taking the expectation with respect to z and A, it is further observed that, in the large limit,
the expectation with respect to x can be dropped due to the law of large numbers. By inserting the final expression
for Z(m) in (42) and taking the limits, the asymptotic distortion is determined as in Proposition IV.1 given below.
IV. M AIN R ESULTS
Proposition IV.1 states the general replica ansatz. The term “general” is emphasized here, in order to indicate
that no further assumption needs to be considered for derivation. Using Proposition IV.1 along with results in the
classical moment problem [77], a general form of the decoupling principle is justified for the MAP estimator.
Before stating the general replica ansatz, let us define the R-transform of a probability distribution. Considering
a random variable t, the corresponding Stieltjes transform over the upper complex half plane is defined as
Gt (s) = E (t − s)−1 .
(44)
Denoting the inverse with respect to composition by G−1
t (·), the R-transform is given by
Rt (ω) = Gt−1 (−ω) − ω −1
(45)
such that limω↓0 Rt (ω) = E t.
The definition can also be extended to matrix arguments. Assume the matrix Mn×n to have the decomposition
M = UΛU−1 where Λn×n is a diagonal matrix whose nonzero entries represent the eigenvalues of M, i.e.,
Λ = diag[λ1 , . . . , λn ], and Un×n is the matrix of eigenvectors. Rt (M) is then an n × n matrix defined as
Rt (M) = U diag[Rt (λ1 ), . . . , Rt (λn )] U−1 .
(46)
17
A. General Replica Ansatz
Proposition IV.1 expresses the macroscopic parameters of the corresponding spin glass, including the asymptotic
distortion, in terms of the parameters of a new spin glass of finite dimension. It is important to note that the new
spin glass, referred to as “spin glass of replicas”, is different from the corresponding spin glass defined in Definition
III.1. In fact, the spin glass of replicas is the projection of the corresponding spin glass on the reduced support Xm
with m indicating the number of replicas. The macroscopic parameters of the spin glass of replicas can therefore
readily be determined.
Definition IV.1 (Spin glass of replicas). For the finite integer m, the spin glass of replicas with the microstate
vm×1 ∈ Xm and quenched randomizer xm×1 is defined as follows.
•
All the entries of x equal to x where x is a random variable distributed with the source distribution px .
•
For a given realization of x, the Hamiltonian reads
E R (v|x) = (x − v)T TRJ (−2βTQ)(x − v) + u(v)
where RJ (·) is the R-transform corresponding to FJ , Tm×m is defined as
1
βλ0
T :=
Im −
1m ,
2λ
λ + mβλ0
(47)
(48)
and Qm×m is the so-called replica correlation matrix defined as
Q = E (x − v)(x − v)T .
(49)
with the expectation taken over x and v at thermal equilibrium.
•
At thermal equilibrium, the microstate is distributed according to the Boltzmann-Gibbs distribution pβ
v|x
R
e−βE (v|x)
=
Z R (β|x)
pβ
v|x (v|x)
(50)
where Z R (β|x) denotes the partition function of the system defined as
Z R (β|x) :=
•
X
e−βE
R
(v|x)
.
(51)
v
The normalized free energy of the system at the inverse temperature β is given by
FR (β, m) = −
1
E log Z R (β|x),
βm
(52)
where the expectation is taken over x with respect to px . The average energy and entropy at the inverse
temperature β are further found using (8a) and (8b).
•
For the system at thermal equilibrium, the replicas’ average distortion regarding the distortion function d(·, ·)
at the inverse temperature β is
m
1 X
d(va , x),
D (β, m) = E
m a=1
R
(53)
18
with expectation being taken over x and v with respect to px pv|x .
Considering Definition IV.1, the evaluation of the system parameters such as the replicas’ average distortion
DR (β, m) or the normalized free energy FR (β, m) needs the replica correlation matrix Q to be explicitly calculated
first. In fact, (49) describes a fixed point equation in terms of Q when one writes out the expectation using the
conditional distribution in (50). The solution can then be substituted in the distribution and the parameters of the
system can be calculated via (51)-(53). The fixed point equation, however, may have several solutions and thus
result in multiple outputs for the system. Nevertheless, we express the asymptotic distortion of the MAP estimator
in terms of a single output of the spin glass of replicas for which the limits exist and the free energy is minimized.
Proposition IV.1. Let the linear system (1) fulfill the constraints of Section II. Suppose Assumptions 1 and 2 hold,
and consider the spin glass of replicas as defined in Definition IV.1 for a finite integer m. Then, the free energy of
the corresponding spin glass defined in Definition III.1 is given by
Z 1
1
T
Tr{TQRJ (−2βωTQ)}dω − Tr{Q TRJ (−2βTQ)} + FR (β, m)
F(β) = lim
m↓0 m
0
(54)
where Q is the replica correlation matrix satisfying (49). The asymptotic distortion of the MAP estimator regarding
the distortion function d(·; ·) is then determined as
DW (x̂; x) = lim lim DR (β, m).
β↑∞ m↓0
(55)
In case that multiple solutions are available for the replica correlation matrix, the replica’s average distortion in
(55) is evaluated via a correlation matrix which minimizes the free energy at zero temperature, i.e., β ↑ ∞.
Proof. The proof is given in Appendix A. However, we explain briefly the strategy in the following.
Starting from (43c), the expectation with respect to the noise term is straightforwardly taken. Using the results
from [75], the expectation with respect to the system matrix is further taken as discussed in Appendix D. Then, by
considering the following variable exchange,
[Q]ab =
1
(x − v a )T (x − v b ).
n
(56)
Z(m) is determined in terms of the replica correlation matrix Q. Finally, by employing the law of large numbers,
the mth moment of the partition function is given as
Z
Z(m) = Ex e−n[G(TQ)−I(Q)]+ǫn dQ
where dQ :=
Qm
a,b=1
d[Q]ab with the integral being taken over
(57)
Rm×m , ǫn tends to zero as n ↑ ∞ and T is given
by (48). Moreover, enI(Q) denotes the non-normalized probability weight of the vectors of replicas with a same
19
correlation matrix and is explicitly determined in (198b) in Appendix A, and G(·) reads
Z β
G(M) =
Tr{MRJ (−2ωM)}dω
(58)
0
for some diagonal matrix M with Tr{·} denoting the trace operator, and RJ (·) being the R-transform with respect
to FJ . In (57), the term enI(Q) dQ is a probability measure which satisfies the large deviations property. Using
results from large deviations [81], the integral in (57) for large values of n can be written as the integrand at the
saddle point Q̃ multiplied by some bounded coefficient Kn which results in
.
Z(m) = Kn e−n[G(TQ̃)−I(Q̃)]
(59)
.
with = denoting the asymptotic equivalence in exponential scale1 . Consequently, by substituting Z(m) in (42), and
exchanging the limits with respect to n and m, as suggested in Assumption 2, the asymptotic distortion is found
as in Proposition IV.1 where (49) determines the saddle point of the integrand function in (57). The free energy is
further determined as in (54) by substituting (59) in (33). Finally by noting the fact that the free energy is minimized
at the equilibrium, the proof is concluded.
N
Proposition IV.1 introduces a feasible way to determine the asymptotics of the MAP estimator; its validity depends
only on Assumptions 1 and 2 and has no further restriction. To pursue the analysis, one needs to solve the fixed
point equation (49) for the replica correlation matrix Q and calculate the parameters of the spin glass of replicas
explicitly. The direct approach to find Q, however, raises both complexity and analyticity issues. In fact, finding
the saddle point by searching over the set of all possible choices of Q is a hard task to do; moreover, several
solutions may not be of use since they do not lead to analytic FR (β, m) and DR (β, m) in m, and thus, they cannot
be continued analytically to the real axis via Assumption 2.
To overcome both the issues, the approach is to restrict our search into a parameterized set of replica correlation
matrices and find the solution within this set. Clearly, the asymptotics found via this approach may fail as several
other solutions are missed by restriction. The result, in this case, becomes more trustable by extending the restricted
set of replica correlation matrices. Several procedures of restrictions can be considered. The procedures introduced
in the literature are roughly divided into RS and RSB schemes. The former considers the m replicas to interact
symmetrically while the latter recursively breaks this symmetry in a systematic manner. In fact, the RS scheme was
first introduced due to some symmetric properties observed in the analysis of the spin glasses [82]. The properties,
however, do not force the correlation matrix to have a symmetric structure, and later several examples were found
showing that RS leads to wrong conclusions. For these examples, the RSB scheme was further considered as an
extension of the symmetric structure of the correlation matrix to a larger set. We consider both the RS and RSB
schemes in this manuscript; however, before pursuing our study, let us first investigate the general decoupling
property of the estimator which can be concluded from Proposition IV.1.
1 a(·)
and b(·) are asymptotically equivalent in exponential scale over a non-bounded set
a(x)
| = 0.
X, if for x ∈ X we have x↑∞
lim log |
b(x)
20
B. General Decoupling Property of MAP Estimator
Regardless of any restriction on Q, the general ansatz leads to the decoupling property of the MAP estimator.
In fact by using Proposition IV.1, it can be shown that for almost any tuple of input-output entries, the marginal
joint distribution converges to a deterministic joint distribution which does not depend on the entries’ index. The
explicit term for the joint distribution, however, depends on the assumptions imposed on the correlation matrix.
Proposition IV.2 (General Decoupling Principle). Let the linear system (1) fulfill the constraints of Section II.
Suppose Assumptions 1 and 2 hold, and consider the spin glass of replicas as defined in Definition IV.1 with the
replica correlation matrix Q. Then, for j ∈ [1 : n], the asymptotic conditional distribution of the MAP estimator
pjx̂|x defined in Definition II.2 is, almost sure in A, independent of j, namely
pjx̂|x (v̂|v) = px̂|x (v̂|v)
(60)
for some conditional distribution px̂|x at the mass point (v̂, v) ∈ X × X. Consequently, the marginal joint distribution
of the entries xj and x̂j is described by the input-output joint distribution of the single-user system specified by
the conditional distribution px̂|x and the input x ∼ px . The explicit form of px̂|x depends on Q.
Proof. The proof follows from Proposition IV.1 and the moment method [76], [77]. From the classical moment
problem, we know that the joint probability of the tuple of random variables (t1 , t2 ) are uniquely specified with
the sequence of integer joint moments, if the joint moments are uniformly bounded. More precisely, by defining
the (k, ℓ)-joint moment of the tuple (t1 , t2 ) as
Mk,ℓ := E tk1 tℓ2 ,
(61)
the sequence of {Mk,ℓ } for (k, ℓ) ∈ Z+ × Z+ is uniquely mapped to the probability distribution pt1 ,t2 , if Mk,ℓ is
uniformly bounded for all integers k and ℓ. Consequently, one can infer that any two tuples of the random variables
(t1 , t2 ) and (t̂1 , t̂2 ) with the same sequences of the joint moments are identical in distribution.
To determine the joint moment of input and output entries, consider the distortion function
d(x̂, x) = x̂k xℓ
in Proposition IV.1, and evaluate the asymptotic distortion over the limit of
(62)
W(n) = [j : j + ηn] for some η in a
right neighborhood of zero. The (k, ℓ)-joint moment of (x̂j , xj ) is then determined by taking the limit η ↓ 0.
Substituting the distortion function and the index set in Proposition IV.1, it is clear that the asymptotic distortion
is independent of η and j, and therefore, the limit with respect to η exists and is independent of j as well. Noting
that the evaluated moments are uniformly bounded, it is inferred that the asymptotic joint distribution of (x̂j , xj ) is
uniquely specified and does not depend on the index j. Finally, by using the fact that the source vector is i.i.d. and
the distribution of the entry j is independent of the index, we conclude that the asymptotic conditional distribution
j
pjx̂|x is independent of j. The exact expression for px̂|x
is then found by determining the solution Q to the fixed
point equation and determining the joint moments.
N
21
Proposition IV.2 is a generalized form of the RS decoupling principle for the MAP estimators studied in [38].
In fact, Proposition IV.2 indicates that a vector system followed by a MAP estimator always decouples into a bank
of identical single-user systems regardless of any restriction on the replica correlation matrix.
C. Consistency Test
If one restricts the replica correlation matrix Q to be of a special form, the asymptotics determined under the
assumed structure do not necessarily approximate true asymptotics accurately. Several methods were introduced in
the literature to check the consistency of the solution. A primary method is based on calculating the entropy of the
corresponding spin glass at zero temperature. As the temperature tends to zero, the distribution of the microstate
tends to an indicator function at the point of the estimated vector, and consequently, the entropy of the corresponding
spin glass converges to zero1 . One consistency check is therefore the zero temperature entropy of a given solution.
Several works invoked this consistency test and showed that for the settings in which the RS ansatz fails to give a
tight bound on the exact solution, the zero temperature entropy determined from the RS ansatz does not converge to
zero; see for example [43]. This observation illustrates the invalidity of the RS assumption and hints at RSB ansätz
giving better bounds on the true solution. Inspired by the aforementioned results, we evaluate the zero temperature
entropy of the corresponding spin glass as a measure of consistency.
In order to determine the zero temperature entropy, we invoke (34) which determines the entropy in terms of
the free energy at inverse temperature β. Considering the free energy of the corresponding spin glass as given in
Proposition IV.1, the entropy H(β) reads
Z 1
β2 ∂
Tr{TQRJ (−2βωTQ)}dω − Tr{QT TRJ (−2βTQ)} + HR (β, m)
H(β) = lim
m↓0 m ∂β
0
(63)
where HR (β, m) denotes the normalized entropy of the spin glass of replicas. As HR (β, m) determines the entropy
of a thermodynamic system, for any m ∈ R+ we have
lim HR (β, m) = 0,
β↑∞
and therefore, the zero temperature entropy is given by
Z 1
β2 ∂
0
T
H = lim lim
Tr{TQRJ (−2βωTQ)}dω − Tr{Q TRJ (−2βTQ)} ,
β↑∞ m↓0 m ∂β
0
(64)
(65)
which obviously depends on the structure of the replica correlation matrix. In [43], the authors determined the zero
temperature entropy for the spin glass which corresponds to the vector precoding problem considering the RS and
1RSB assumptions, and observed that it takes the same form under both assumptions. They then conjectured that
the zero temperature entropy is of a similar form for the general RSB structure regardless of the number of breaking
steps2 . Using (65), we later show that the conjecture in [43] is true.
1 Note that the entropy of the spin glass at temperature β−1 denotes either the conditional entropy (for discrete supports) or the conditional
differential entropy (for continuous supports) of a random vector v distributed conditioned to y and A with Boltzmann-Gibbs distribution pβ
.
v|y,A
2 In fact in this case, the dependence of the zero temperature entropy on the correlation matrix is completely described via the scalar χ which
corresponds to the diagonal entries of the correlation matrix. See Assumption 3-5 for more illustrations.
22
V. RS A NSATZ AND RS D ECOUPLING P RINCIPLE
The most elementary structure which can be imposed on the replica correlation matrix is RS. Here, one assumes
the correlation matrix to be of a symmetric form which means that the replicas of the spin glass defined in
Definition IV.1 are invariant under any permutation of indices. Using the definition of the replica correlation matrix
as given in (49), it consequently reads that
(x − va )(x − vb ) =
q0
q1
if a 6= b
(66)
if a = b.
Assumption 3 (RS Structure). Considering the spin glass of replicas as defined in Definition IV.1, the replica
correlation matrix is of the form
Q=
χ
Im + q1m
β
where χ and q are some non-negative real scalars.
(67)
Considering (66), Assumption 3 supposes q0 = q and q1 = χβ−1 +q. Substituting (67) in Definition IV.1, the spin
glass of replicas is then specified by the scalars χ and q. The scalars are moreover related via a set of saddle point
equations which are obtained from (49). Finally, using Proposition IV.1, the asymptotics of the system are found.
Proposition V.1 (RS Ansatz). Let the linear system (1) fulfill the constraints of Section II. Suppose Assumptions 1
and 2, as well as Assumption 3 hold. Let x ∼ px , and
p
1
2
s
(x + λ0 z − v) + u(v)
g = arg min
v
2λs
(68)
with v ∈ X, and λs0 and λs being defined as
h
χ o
χ i−2 ∂ n
[λ0 χ − λq] RJ (− )
λs0 := RJ (− )
λ
∂χ
λ
h
i
−1
χ
λs := RJ (− )
λ
λ
(69a)
(69b)
for some non-negative real χ and q and the real variable z. Then, the asymptotic distortion defined in (27) reads
Z
(70)
DW = E d(g, x)Dz,
for χ and q which satisfy
Z
p
λs0 χ = λs E (g − x)z Dz
Z
q = E (g − x)2 Dz
and minimize the zero temperature free energy F0rs which is given by
Z 1
Z
i
p
1 h
1
0
s z − g)2 − λs z 2 + u(g) Dz
λ
(x
+
F(ω)dω − F(1) + E
Frs =
0
0
2λ 0
2λs
(71a)
(71b)
(72)
23
z p
x
λs0
×
y
+
gmap [(·); λs , u]
x̂
Fig. 1: The decoupled single-user system under the RS ansatz.
with F(·) being defined as
χ i
λ0
d h
ωRJ (− ω) .
F(ω) = q − χ
λ
dω
λ
(73)
Proof. See Appendix B.
N
The asymptotic distortion under the RS ansatz is equivalent to the average distortion of a scalar AWGN channel
followed by a single-user estimator as shown in Fig. 1. In this block diagram, the single-user estimator gmap [(·); λs , u]
maximizes the posterior probability over a postulated scalar AWGN channel. We refer to this estimator as the
“decoupled MAP estimator” and define it as follows.
Definition V.1 (Decoupled MAP estimator). The decoupled MAP estimator gmap [(·); λs , u] with the estimation
parameter λs and the utility function u(·) is defined as
gmap [(y); λs , u] := arg max qλs (v|y)
v
1
2
(y
−
v)
+
u(v)
,
= arg min
v
2λs
(74a)
(74b)
where qλs (v|y) denotes the “decoupled posterior distribution” postulated by the estimator which reads
qλs (v|y) = K e
h
i
1
− 2λs (y−v)2 +u(v)
for some real constant K.
(75)
Using the definition of the decoupled MAP estimator, the RS decoupled system is defined next.
Definition V.2 (RS decoupled system). Define the RS decoupled system to be consistent with the block diagram
in Fig. 1 in which
X,
•
the source symbol x is distributed with px over the support
•
z is a zero-mean and unit-variance Gaussian random variable,
•
x and z are independent,
•
x̂ is estimated from the observation y := x +
p s
λ0 z as
x̂ = gmap [(y); λs , u].
(76)
24
•
gmap [(·); λs , u] is the decoupled MAP estimator with the estimation parameter λs and the utility function u(·)
as defined in Definition V.1.
•
λs0 and λs are defined as in Proposition V.1.
Using Proposition IV.2, the equivalency in the asymptotic distortion can be extended to the asymptotic conditional
distribution as well. In fact, by considering the decoupling principle, Definition V.2 describes the structure of the
decoupled single-user system under the RS assumption.
Proposition V.2 (RS Decoupling Principle). Let the linear system (1) fulfill the constraints of Section II and be
estimated via the MAP estimator in (2). Consider the RS decoupled system as defined in Definition V.2, and suppose
Assumptions 1, 2 and 3 hold. Then, for any j ∈ [1 : n], the tuple (x̂j , xj ) converges in distribution to (x̂, x) if
px = px , almost sure in A.
Proof. Using Proposition IV.2, for any two different indices j, q ∈ [1 : n] we have
pjx̂|x (v̂|v) = pqx̂|x (v̂|v)
(77)
at the mass point (v̂, v). Therefore for any index j, we have
n
1 X k ℓ
x̂i xi .
E
n↑∞ n
i=1
E x̂kj xℓj = lim
(78)
Consequently, the asymptotic (k, ℓ)-joint moment of (x̂j , xj ) under the RS assumption is determined by letting
W(n) = [1 : n] and the distortion function in the RS ansatz
d(x̂; x) = x̂k xℓ
(79)
and determining the asymptotic distortion. Substituting in Proposition V.1, the asymptotic joint moment reads
Z
Mjk,ℓ = E gk xℓ Dz
(80)
where g is defined in (68). Considering Definition V.2 and assuming px = px , (80) describes the (k, ℓ)-joint moment
of (x̂, x) as well. Noting that Mjk,ℓ is uniformly bounded for any pair of integers k and ℓ, it is concluded that the
asymptotic joint distribution of (x̂j , xj ) and the joint distribution of (x̂, x) are equivalent.
N
Proposition V.2 gives a more general form of the RS decoupling principles investigated in [38] and [39]. In fact,
by restricting the system matrix and source distribution as in [38] and [39], one can recover the formerly studied
RS decoupling principles.
RS Zero Temperature
To have a basic measure of RS ansatz’s consistency, we evaluate the zero temperature entropy under the RS
assumption following the discussion in Section IV-C. Substituting (67) in (65) and taking the same steps as in
25
Appendix B, the RS zero temperature entropy is determined as
Z 1
β2 ∂
Fβ (ω)dω − Fβ (1)
H0rs = lim
β↑∞ 2λ ∂β
0
(81)
where the function Fβ (·) is defined as
Fβ (ω) =
χ
χ i
χ
λ0
d h
ωRJ (− ω) .
RJ (− ω) + q − χ
β
λ
λ
dω
λ
(82)
Taking the derivative first and then the limit, it finally reads
Z 1
χ
χ
χ
H0rs =
RJ (− ) −
RJ (− ω)dω .
2λ
λ
λ
0
(83)
We later on see that the zero temperature entropy takes the same form under the RSB assumptions.
VI. RSB A NS ÄTZE AND RSB D ECOUPLING P RINCIPLE
In [83], Parisi introduced a breaking scheme to broaden the restricted set of correlation matrices. The scheme
recursively extends the set of matrices to larger sets. The breaking scheme was then employed to broaden the RS
structure of the correlation matrices, and therefore, the obtained structure was identified as the broken RS or, RSB
structure. The key feature of Parisi’s breaking scheme is that, by starting from the RS structure, the new structure
after breaking can be reduced to the structure before breaking. Thus, the set of fixed point solutions found by
assuming the broken structure includes the solutions of the previous structure as well.
Definition VI.1 (Parisi’s breaking scheme). Let m be a multiple of the integer ξ, and Q[ℓ] represent an
correlation matrix. Parisi’s breaking scheme then constructs a new m × m correlation matrix Q[ℓ+1] as
Q[ℓ+1] = Iξ ⊗ Q[ℓ] + κ1m
for some real scalar κ.
m
ξ
×
m
ξ
(84)
By choosing Q[0] to be an RS correlation matrix in Definition VI.1, the matrix Q[1] finds the RSB structure with
one step of breaking (1RSB). The steps of breaking can be further increased recursively by inserting Q[1] in the
next breaking scheme, determining the new correlation matrix Q[2] , and repeating the procedure. We start by the
1RSB correlation matrix, and then, extend the result to higher RSB ansätze with more steps of breaking.
Assumption 4 (1RSB Structure). Considering the spin glass of replicas as defined in Definition IV.1, the replica
correlation matrix is of the form
Q=
χ
Im + pI mβ ⊗ 1 βµ + q1m
µ
β
where χ, p, q and µ are some non-negative real scalars.
(85)
Regarding Parisi’s breaking scheme, Assumption 4 considers Q = Q[1] by letting Q[0] have the RS structure
with parameters χβ−1 and p, ξ = µβ−1 and κ = q. Here, the 1RSB structure reduces to RS by setting p = 0.
26
Therefore, the set of 1RSB correlation matrices contains the one considered in Assumption 3.
Proposition VI.1 (1RSB Ansatz). Let the linear system (1) fulfill the constraints of Section II. Suppose Assumptions
1 and 2, as well as Assumption 4 hold. Let x ∼ px and
p
p
1
2
s
s
(x + λ0 z0 + λ1 z1 − v) + u(v)
g = arg min
v
2λs
(86)
with v ∈ X and λs0 , λs1 and λs being defined by
χ + µp
χ i−2 ∂
[λ0 (χ + µp) − λq] RJ (−
) ,
= RJ (− )
λ
∂χ
λ
h
χ i−2
χ
χ + µp
λs1 = RJ (− )
RJ (− ) − RJ (−
) λµ−1 ,
λ
λ
λ
h
χ i−1
λ
λs = RJ (− )
λ
h
λs0
(87a)
(87b)
(87c)
for some non-negative real χ, p, q and µ and real variables z0 and z1 . Then, the asymptotic distortion in (27) reads
Z
W
(88)
D = E d(g, x) Λ̃(z1 |z0 , x)Dz1 Dz0 ,
with Λ̃(z1 |z0 , x) :=
R
Λ(z1 , z0 , x)Dz1
Λ(z1 , z0 , x) = e
−1
Λ(z1 , z0 , x) and Λ(z1 , z0 , x) being defined by
i
h
√
√
√
1 √
1
−µ 2λs (x+ λs0 z0 + λs1 z1 −g)2 − 2λs ( λs0 z0 + λs1 z1 )2 +u(g)
.
(89)
The scalars χ, p and q satisfy
Z
p
s
s
λ0 [χ + µp] = λ E (g − x)z0 Λ̃(z1 |z0 , x)Dz1 Dz0
Z
p
s
s
λ1 [χ + µq + µp] = λ E (g − x)z1 Λ̃(z1 |z0 , x)Dz1 Dz0
Z
q + p = E (g − x)2 Λ̃(z1 |z0 , x)Dz1 Dz0
and µ is a solution of the fixed point equation
s
Z
Z µp
µ
λ1
1
χ+ω
µ
q
+
p
−
)dω
=
E
log Λ̃(z1 |z0 , x) Λ̃(z1 |z0 , x)Dz1 Dz0 .
R
(−
J
2λs
λs
2λ 0
λ
(90a)
(90b)
(90c)
(91)
0[1]
Moreover, χ, p, q and µ minimize the zero temperature free energy Frsb which reads
Z 1
Z
Z
1
1
0[1]
F(ω)dω − F(1) − E log
Λ(z1 , z0 , x)Dz1 Dz0
Frsb =
2λ 0
µ
(92)
with F(·) being defined as
1 d
F(ω) =
µ dω
"Z
[χ+µp]ω
χω
#
χ + µp
χ + µp d
t
ωRJ (−
ω) .
RJ (− )dt + q − λ0
λ
λ
dω
λ
(93)
Proof. See Appendix C.
N
27
pz1 |z0 ,x
z1 p
x
×
z0
λs1
+
×
+
p
λs0
y
gmap [(·); λs , u]
x̂
Fig. 2: The decoupled scalar system under the 1RSB ansatz.
Similar to our approach under the RS ansatz, we employ Proposition VI.1 to introduce the decoupled 1RSB
single-user system which describes the statistical behavior of the MAP estimator’s input-output entries under 1RSB
assumption. The decoupled system under 1RSB differs from RS within a new impairment term which is correlated
with the source and noise symbols through a joint distribution. The impairment term intuitively plays the role of
a correction factor which compensates the possible inaccuracy of the RS ansatz. The decoupled MAP estimator,
however, follows the same structure as for RS.
Definition VI.2 (1RSB decoupled system). Fig. 2 defines the 1RSB decoupled system in which
X,
•
the source symbol x is distributed with px over the support
•
z0 is a zero-mean and unit-variance Gaussian random variable,
•
z1 is a random variable correlated with x and z0 ,
•
x and z0 are independent, and
pz1 |x,z0 = Λ̃(z1 |z0 , x)φ(z1 )
(94)
with Λ̃ defined in Proposition VI.1.
•
x̂ is estimated from the observation y := x +
p
p s
λ0 z0 + λs1 z1 as
x̂ = gmap [(y); λs , u].
•
(95)
gmap [(·); λs , u] is the decoupled MAP estimator with the estimation parameter λs and the utility function u(·)
as defined in Definition V.1.
•
λs0 , λs1 and λs are defined as in Proposition VI.1.
Proposition VI.2 (1RSB Decoupling Principle). Let the linear system (1) fulfill the constraints of Section II and
be estimated via the MAP estimator in (2). Consider the 1RSB decoupled system as defined in Definition VI.2, and
suppose Assumptions 1, 2 and 4 hold. Then, for all j ∈ [1 : n], the tuple (x̂j , xj ) converges in distribution to (x̂, x)
if px = px .
Proof. The proof takes exactly same steps as for the RS decoupling principle using Proposition VI.1.
N
28
The 1RSB decoupled system, in general, provides a more accurate approximation of the estimator’s asymptotics
by searching over a larger set of solutions which include the RS ansatz. To investigate the latter statement, consider
the case of p = 0. In this case, the 1RSB structure reduces to RS. Setting p = 0 in Proposition VI.1, λ1 becomes
zero, and consequently Λ̃(z1 |z0 , x) = 1. Moreover, the fixed point equations in (91) hold for any choice of µ, and
the scalars χ and q couple through the same set of equations as in the RS ansatz. The zero temperature free energy
of the system, furthermore, reduces to its RS form under the assumption of p = 0. Denoting the parameters of the
RS ansatz by [χrs , qrs ], it is then concluded that [χ, p, q, µ] = [χrs , 0, qrs , 0] is a solution to the 1RSB fixed point
equations, when an stable solution to the RS fixed point exists. The solution, however, does not give necessarily
the 1RSB ansatz, the stable solution to the 1RSB fixed point equations with minimum free energy may occur at
some other point. We investigate the impact of replica breaking for some examples later through numerical results.
Parisi’s breaking scheme can be employed to extend the structure of the correlation matrix to the RSB structure
with more steps of breaking by recursively repeating the scheme. In fact, one can start from an RS structured
Q[0] and employ the breaking scheme for b steps to determine the correlation matrix Q[b] . In this case, the replica
correlation matrix is referred to as the bRSB correlation matrix.
Assumption 5 (bRSB Structure). Considering the spin glass of replicas as defined in Definition IV.1, the replica
correlation matrix is of the form
Q=
b
X
χ
Im +
pκ I mβ ⊗ 1 µβκ + q1m
µκ
β
κ=1
(96)
where scalars χ and q, and the sequences {pκ } and {µκ } with κ ∈ [1 : b] are non-negative reals, and {µκ } satisfies
the following constraint
µκ+1
∈ Z+
µκ
for κ ∈ [1 : b − 1].
(97)
Considering the correlation matrix in Proposition IV.1 to be of the form indicated in Assumption 5 the previous
ansätze are extended to a more general ansatz which can reduce to the 1RSB as well as RS ansatz. Proposition VI.3
expresses the replica ansatz under the bRSB assumption.
Proposition VI.3 (bRSB Ansatz). Let the linear system (1) fulfill the constraints of Section II. Suppose Assumptions
1 and 2, as well as Assumption 5 hold. For κ ∈ [0 : b], define the sequence {χ̃κ }, such that χ̃0 = χ and
χ̃κ := χ +
κ
X
µς p ς
(98)
ς=1
for κ ∈ [1 : b]. Let x ∼ px , and
#
b
X
p
1
g = arg min
λsκ zκ − v)2 + u(v)
(x +
v
2λs
κ=0
"
(99)
29
with v ∈ X and λs0 , {λsκ } and λs being defined as
−2
χ̃b
χ̃0
∂
[λ0 χ̃b − λq] RJ (− ) ,
= RJ (− )
λ
∂ χ̃b
λ
−2
χ̃0
χ̃κ−1
χ̃κ
λsκ = RJ (− )
RJ (−
) − RJ (− ) λµ−1
κ ,
λ
λ
λ
−1
χ̃0
s
λ
λ = RJ (− )
λ
λs0
(100a)
(100b)
(100c)
for some non-negative real scalar q, sequences {χ̃κ } and {µκ } and sequence of real variables {zκ }. Then, the
asymptotic distortion defined in (27) reads
DW = E
Z
d(g; x)
b
Y
κ=1
Λ̃κ (zκ |{zς }bκ+1 , z0 , x) Dzκ Dz0 ,
where {zς }bκ := {zκ , . . . , zb } and Λ̃κ (zκ |{zς }bκ+1 , z0 , x) =
Λ1 ({zς }b1 , z0 , x) := e
R
Λκ ({zς }bκ , z0 , x)Dzκ
−1
(101)
Λκ ({zς }bκ , z0 , x) with
"
#
b √
b √
P
1
1 P
−µ1 2λs (x+
λsκ zκ −g)2 − 2λs (
λsκ zκ )2 +u(g)
κ=0
κ=0
(102)
and {Λκ ({zς }bκ , z0 , x)} for κ ∈ [2 : b] being recursively determined by
Λκ ({zς }bκ , z0 , x)
:=
Z
Λκ−1 ({zς }bκ−1 , z0 , x)
Dzκ−1
µκ
µκ−1
.
(103)
The scalar q and sequences {χ̃κ } and {pκ } satisfy
b
X
pκ + q = E
κ=1
χ̃κ−1 + µκ
b
X
ς=κ
pς + q
!
Z
(g − x)2
λs
= p E
λsκ
λs
χ̃b = p s E
λ0
b
Y
κ=1
Λ̃κ (zκ |{zς }bκ+1 , z0 , x) Dzκ Dz0 ,
Z
(g − x)zκ
Z
(g − x)z0
b
Y
κ=1
b
Y
κ=1
(104a)
Λ̃κ (zκ |{zς }bκ+1 , z0 , x) Dzκ Dz0 ,
(104b)
Λ̃κ (zκ |{zς }bκ+1 , z0 , x) Dzκ Dz0 ,
(104c)
and the sequence {µκ } is given by
Z 1
Z
Z
1
1
1
{µκ } = arg min
F(ω; {µ̃κ })dω − E log
Λb (zb , z0 , x)Dzb Dz0 − s ∆({µ̃κ })
µ̃b
2λ
{µ̃κ } 2λ 0
(105)
where the function F(·; {µκ }) is defined as
Z χ̃κ ω
b
X
1 d
χ̃b
d
λ0
t
F(ω; {µκ }) :=
ωRJ (− ω) ,
RJ (− )dt + q − χ̃b
µ dω χ̃κ−1 ω
λ
λ
dω
λ
κ=1 κ
(106)
∆(·) is defined as
∆({µκ }) =
b
X
1
λs
[ζκ χ̃κ − ζκ−1 χ̃κ−1 ] + ζb q − 0s χ̃b
µ
λ
κ=1 κ
(107)
30
pz1 |z2 ,...,zb ,z0 ,x
z1 p
×
x
λs1
+
pzb |z0 ,x
z0
zb p
×
λsb
×
+
p s
λ0
+
y
gmap [(·); λs , u]
x̂
Fig. 3: The decoupled scalar system under the bRSB ansatz.
with ζ0 = 1, and ζκ for κ ∈ [1 : b] denoting
ζκ := 1 −
and {µ̃κ } ∈ Sµ in which
Sµ :=
{µ1 , . . . , µb } ∋ µκ ∈ R
+
κ
X
ς=1
µς
λsς
,
λs
µκ+1
+
∧
∈ Z ∀κ ∈ [1 : b − 1] .
µκ
(108)
(109)
In the case of multiple solutions for χ, q, {pκ } and {µκ }, the ansatz is chosen such that the free energy at zero
temperature
0[b]
Frsb =
1
2λ
Z
0
1
Z
Z
1
F(ω; {µκ })dω − F(1; {µκ }) − E log
Λb (zb , z0 , x)Dzb Dz0
µb
(110)
is minimized.
Proof. See Appendix D.
N
One can simply observe that Proposition VI.3 reduces to Propositions VI.1 and V.1 by letting b = 1 and pκ = 0
for κ ∈ [1 : b], respectively. The ansatz, moreover, extends the corresponding decoupled single-user system of the
estimator considering the general decoupling principle investigated in Proposition IV.2. By taking the same steps as
in Proposition VI.2, the decoupled bRSB single-user system is found which represents the extended version of the
1RSB system with b additive impairment taps. In fact, considering the impairment terms to intuitively play the role
of correction factors, the bRSB ansatz takes more steps of correction into account. The decoupled MAP estimator,
moreover, remains unchanged.
Definition VI.3 (bRSB decoupled system). Define the bRSB decoupled system as a single-user system illustrated
in Fig. 3 in which
X,
•
the source symbol x is distributed with px over the support
•
z0 is a zero-mean and unit-variance Gaussian random variable,
•
zκ is a random variable correlated with x, z0 and {zκ+1 , . . . , zb }
•
x and z0 are independent, and
pzκ |zκ+1 ,...,zb ,z0 ,x = Λ̃κ (zκ |{zς }bκ+1 , z0 , x)φ(zκ )
(111)
31
with Λ̃ defined in Proposition VI.3.
•
x̂ is estimated from the observation y := x +
b p
P
λsκ zκ as
κ=0
x̂ = gmap [(y); λs , u].
•
(112)
gmap [(·); λs , u] is the decoupled MAP estimator with the estimation parameter λs and the utility function u(·)
as defined in Definition V.1, and
•
λs0 , {λsκ } and λs for κ ∈ [1 : b] are as in Proposition VI.3.
Proposition VI.4 (bRSB Decoupling Principle). Let the linear system (1) fulfill the constraints of Section II and
be estimated via the MAP estimator in (2). Consider the bRSB decoupled system as defined in Definition VI.3, and
suppose Assumptions 1, 2 and 5 hold. Then, for all j ∈ [1 : n], the tuple (x̂j , xj ) converges in distribution to (x̂, x)
if px = px .
Proof. Using Proposition VI.1, it takes same steps as for Proposition V.2.
N
RSB Zero Temperature
In Appendix D, it is shown that under the bRSB assumption on the replica correlation matrix the free energy of
the corresponding spin glass at the inverse temperature β reads
Z 1
1
Fβ (ω)dω − Fβ (1) + FR (β).
F(β) =
2λ 0
(113)
Here, FR (β) denotes the normalized free energy of the spin glass of replicas defined in (52) in the limit m ↓ 0,
and the function Fβ (·) is defined as
Z χ̃κ ω
b
X
d
χ
χ
λ0
t
χ̃b
1 d
RJ (− )dt + RJ (− ω) + q − χ̃b
ωRJ (− ω) .
F (ω) =
µ dω χ̃κ−1 ω
λ
β
λ
λ
dω
λ
κ=1 κ
β
Following the discussion in Section IV-C, the entropy at the zero temperature reads
Z 1
β2 ∂
0[b]
β
β
F (ω)dω − F (1)
Hrsb = lim
β↑∞ 2λ ∂β
0
(114)
(115)
which reduces to
0[b]
Hrsb
Z 1
χ
χ
χ
=
RJ (− ) −
RJ (− ω)dω .
2λ
λ
λ
0
(116)
(116) justifies the conjecture in [43] and states that the zero temperature entropy under any number of breaking
steps, including the RS case, is of the similar form and only depends on the scalar χ. In fact, the Hamiltonian in
(10) reduces to the one considered in vector precoding by considering x to be the deterministic vector of zeros,
λ0 = 0, λ = 1 and u(v) = 0. Substituting in (116), the zero temperature entropy reduces to the one determined in
32
[43] within a factor of 2. The factor comes from the difference in the prior assumption on the support of microstate1 .
VII. R EPLICA S IMULATOR : C HARACTERIZATION
VIA THE
S INGLE -U SER R EPRESENTATION
The general bRSB decoupling principle determines an equivalent single-user system which describes the inputoutput statistics of the MAP estimator under the bRSB ansatz. In order to specify the exact parameters of the
decoupled single-user system, the set of fixed point equations needs to be solved explicitly. In this section, we
propose an alternative approach which describes an ansatz in terms of the corresponding decoupled system’s inputoutput statistics. We define the exact form of the decoupled system as the “steady state” of a transition system
named “replica simulator”. The proposed approach enables us to investigate the properties of the RS and RSB
ansätze by studying the replica simulator. In order to clarify the idea of the replica simulator, let us define a set of
input-output statistics regarding the bRSB decoupled system.
Definition VII.1. Consider the single-user system consistent with the block diagram in Fig. 3. Denote the joint
distribution of the source and impairment terms with px,z0 ,...,zb . For this system,
•
the κth noise-error correlation is defined as
for κ ∈ [0 : b], and
•
1
Cκ = p E (x̂ − x)zκ
λsκ
(117)
the MSE is denoted by
MSE = E (x̂ − x)2 .
(118)
Invoking Definition VII.1, the bRSB ansatz can be completely represented in terms of the input-output statistics
of the decoupled system. In fact, by means of Definition VII.1, the fixed point equations in (104a)-(104c) can be
expressed as
b
X
pκ + q = MSE,
(119a)
κ=1
χ̃κ−1 + µκ
b
X
ς=κ
!
= λs Cκ ,
(119b)
χ̃b = λs C0 ,
(119c)
pς + q
for κ ∈ [1 : b]; moreover, the factor Λ1 is given as
Λ1 ({zς }b1 , z0 , x) = e
1 In
[43], the authors considered v to be a complex vector.
i
h
1
1
−µ1 2λs (y−x̂)2 − 2λs (y−x)2 +u(x̂)
,
(120)
33
which reduces to
Λ1 ({zς }b1 , z0 , x) = px (x)µ1
qλs (x̂|y)
qλs (x|y)
µ1
(121)
with qλs (·|y) indicating the decoupled posterior distribution defined in Definition V.1. The second term on the right
hand side of (121) is an extended form of the likelihood ratio. By defining
µ
qλs (x̂|y) 1
b
Γ1 ({zς }1 , z0 , x) =
,
qλs (x|y)
(122)
(121) reads
Λ1 ({zς }b1 , z0 , x) = px (x)µ1 Γ1 ({zς }b1 , z0 , x),
(123)
and Λκ ({zς }bκ , z0 , x) for κ ∈ [2 : b] are determined by
Λκ ({zς }bκ , z0 , x) = px (x)µκ Γκ ({zς }bκ , z0 , x)
(124)
where Γκ ({zς }bκ , z0 , x) are recursively defined as
Γκ ({zς }bκ , z0 , x)
=
Z
Γκ−1 ({zς }bκ−1 , z0 , x)
Dzκ−1
µκ
µκ−1
.
(125)
The fixed point in (105) is therefore rewritten accordingly.
The above alternative representation of the bRSB ansatz leads us to a new interpretation. In fact, one can define a
transition system in which the vector of replica parameters denotes the state, and the decoupled single-user system
defines the transition rule [84], [85]. We refer to this transition system as the “replica simulator”, and define it
formally as the following.
Definition VII.2 (Replica simulator). Let b be a non-negative integer. Consider the vector s as
s := [χ, µ1 , . . . , µb , p1 , . . . , pb , q]
(126)
with entries satisfying the corresponding constraints in Proposition VI.3, and denote its support by Sb . The transition
rule TRb : Sb 7→ Sb maps the prior state si ∈ Sb to the posterior state sf ∈ Sb in the following way:
TRb realizes the bRSB decoupled system considering the entries of si as the replica parameters. It then constructs
the entries of sf by determining a new set of replica parameters from the statistics of the decoupled system using
the equivalent representation of the fixed point equations given in (119a)-(125).
The replica simulator of breaking order b is then defined as the transition system SimR [b] :=
Sb, TRb
.
The structure of the replica simulator is illustrated in Fig. 4. For the replica simulator of breaking order b, a
sequence of states {st } is considered to be a “process”, if for t ∈ [1 : ∞]
TR
b
st+1 .
st −→
(127)
The state s⋆ is then called the “steady state”, if setting st = s⋆ results in st+1 = s⋆ . Regarding Proposition VI.3,
34
si
TRb
bRSB decoupling
px̂|x
{Cκ }, MSE, · · ·
sf
Fig. 4: Replica Simulator of breaking order b
the bRSB ansatz is in fact the steady state of the replica simulator which minimizes the free energy function. Our
conclusion also extends to the RS case, if we set b = 0.
Considering Definition VII.2, as well as the above discussions, the bRSB ansatz can be numerically investigated
using the methods developed in the literature of transition systems. This approach may reduce the complexity of
numerical analysis; however, it does not impact the computational complexity1. In fact, assuming that one realizes
the bRSB decoupled system for any desired state vector denoted in (126) via some methods of realization, e.g.,
Monte Carlo simulation, the bRSB ansatz can be found by means of an iterative algorithm which has been designed
to find the steady state of a transition system. The latter statement can be clarified as in Scheme 1.
Scheme 1 Analysis via Replica Simulator
begin
set replica simulator of breaking order b, SimR [b]
if b = 0 then
TRb corresponds to the RS decoupled system
else
TRb corresponds to the bRSB decoupled system
end if
initiate initial state s0 ∈ Sb
TR
b
evaluate s0 −→
s
0
if s = s then
s⋆ ← s
break
else
consider mapping rule IM(·, ·) : Sb × Sb 7→ Sb
s0 ← IM(s, s0 )
return A
end if
output s⋆
end
⊲A
⊲B
In Scheme 1, TRb in step A can be realized via different methods. One may determine the input-output distribution of the single-user system analytically or simulate the system by generating impairment and source samples
numerically via Monte Carlo technique. Another degree of freedom is in step B where different mapping rules with
1 We conjecture that in some cases, our bRSB decoupled system represents the asymptotic of a decision-feedback system. The validity of this
conjecture can further reduce the computation complexity.
35
different convergence speeds can be employed. For algorithms designed based on Scheme 1, the computational
complexity depends on the realization method while the convergence speed is mainly restricted with some given
mapping rule IM(·, ·).
The replica simulator introduces a systematic approach for investigating the replica anätze based on the decoupling
principle. Moreover, it gives an intuition about the impact of symmetry breaking. To clarify the latter statement, let
us consider an example.
Example. (RS vs. 1RSB ansatz) Let b = 0; thus, the RS fixed point equations read
q = MSE,
(128a)
χ = λs C0 .
(128b)
The equations under the 1RSB assumption are moreover given by
q + p = MSE,
(129a)
χ + µp = λs C0 ,
(129b)
χ + µp + µq = λs C1 ,
(129c)
and µ is determined through the fixed point equation
s
Z µp
λ1
1
χ+ω
µ
µ
q
+
p
−
)dω = I(z1 ; z0 , x) + DKL (pz1 kφ)
RJ (−
s
s
2λ
λ
2λ 0
λ
(130)
where I(·; ·) and DKL (· k ·) denote the mutual information and Kullback-Leibler divergence, respectively. Assuming
the system matrix to be i.i.d. and setting z1 to be independent of z0 and x, the right hand side of (130) tends to
zero, and therefore, the solutions µ = 0 and p = 0 are concluded. Consequently, (129c) becomes ineffective, and
the fixed point equations reduce to RS. The latter observation can be interpreted in terms of the “state evolution” of
the replica simulator. More precisely, assume that the initial state of the replica simulator with breaking order one
is chosen such that in the corresponding decoupled system, z1 is sufficiently correlated with the source and noise
symbols. In this case, by assuming the mapping rule IM(·, ·) to be converging, the correlation in each iteration of
Scheme 1 reduces, and thus, at the steady state, z1 becomes independent of z0 and x.
The above discussion can be extended to replica simulators with larger breaking orders. Moreover, further
properties of the RSB ansätze could be studied using methods developed in the literature of transition systems1 .
We leave the further investigations as a possible future work.
1 The concept of replica simulator may further clarify the connection between RSB ansätze and message passing based algorithms. Such
investigations however are skipped here and can be considered as a possible future work.
36
VIII. L ARGE C OMPRESSIVE S ENSING S YSTEMS
Considering the setting represented in Section II, a large compressive sensing system can be studied through our
results by restricting the source’s CDF to be of the form
Fx (x) = (1 − α)1 {x ≥ 0} + αF̆x (x).
(131)
In the large limit, the source vector distributed as (131) has (1 − α)n entries equal to zero while the remaining αn
entries are distributed with F̆x . In this case, x is an αn-sparse vector, and thus, (1) is considered to represent a
large compressive sensing system with the sensing matrix A.
Considering the prior as in (131), different recovery schemes are then investigated by restricting the prior setup
of the system, correspondingly. In this section, we study the asymptotics of several recovery schemes using our
bRSB decoupling principle for both the cases of continuous and finite alphabet sources.
A. Continuous Sources
Assuming
X = R, (131) describes a continuous random variable multiplied by an α-Bernoulli random variable.
In this case, by varying the utility function u(·), different reconstruction schemes are considered. Here, we address
the linear, LASSO and ℓ0 norm recovery schemes. The results can however be employed to investigate a general
ℓp norm recovery scheme [61].
Example 1. (linear recovery scheme) The MAP estimation is reduced to the linear recovery scheme when the
utility function is set to be
u(v) =
v2
.
2
(132)
In fact, in this case, the MAP estimator postulates the prior distribution to be a zero-mean and unit-variance Gaussian
and performs considerably inefficient when the source is sparse. Using the bRSB decoupling principle, we conclude
that in the large-system limit the source entry xj and the estimated entry x̂j , for any j ∈ [1 : n], converge in
probability to a sparse random variable x distributed as in (131) and the estimated symbol x̂ := gmap [(y); λs , u]
where the decoupled system reduces to
gmap [(y); λs , u] =
y
,
1 + λs
(133)
with y being given by
y =x+
b
X
p
λsκ zκ ,
(134)
κ=0
and the scalars λs and {λsκ } for κ ∈ [0 : b] are defined as in Proposition VI.3. By letting b = 0, the result reduces
to the RS decoupling principle reported in the literature, see [38], [39]; however, the result here holds for a wider
set of sensing matrices and source distributions.
37
Example 2. (LASSO recovery scheme) To study the LASSO recovery scheme, we set
u(v) = |v|.
(135)
Regarding the bRSB decoupling principle, the prior distribution of the decoupled system’s input x is postulated to
be “Laplacian” or “double exponential” with unit variance. This postulation results in a better performance of the
recovery scheme in many cases, since the Laplacian PDF could be a more realistic approximation of the sparse
source distribution. Consequently, the decoupled system’s output is found as x̂ = gmap [(y); λs , u] with
gmap [(y); λs , u] = [y − λs sgn(y)] wλs (y)
(136)
where y is denoted as in (134), wλs (·) is the null window function with window width λs defined as
1 |y| > λs
,
wλs (y) =
0 |y| ≤ λs
(137)
and sgn(y) is the sign indicator. The decoupled single-user estimator in (137) which is often referred to as the
soft-thresholding operator recovers the earlier RS results by setting b = 0 and the sensing matrix to be i.i.d. [38].
Example 3. (ℓ0 norm recovery scheme) The ℓ0 norm recovery scheme which considers
u(v) = 1 {v 6= 0}
(138)
can perform significantly better that the latter schemes when the sparsity increases. In this case, the prior distribution
of the bRSB decoupled system’s input x is found as the limit of
e
1
pθ,δ
x (x) =
2θ + 2δ (e − 1) 1
|x| ≤ δ
δ < |x| ≤ θ
,
(139)
when θ ↑ ∞ and δ ↓ 0. For finite values of θ and δ, pθ,δ
can be considered as a sparse distribution in which
x
non-zero symbols occur uniformly. The prior explains the better performance of the ℓ0 norm recovery scheme
compared to the linear and LASSO schemes. For this case, the output of the decoupled single-user system reads
x̂ = gmap [(y); λs , u], such that
gmap [(y); λs , u] = ywϑ (y)
where y is denoted as in (134), and wϑ (·) is the null window function with ϑ =
(140)
√
2λs . Here, gmap [(·); λs , u] is the
hard-thresholding operator and recovers the analysis in [38] for a wider class of settings.
The above examples have been also studied in earlier replica based studies, e.g., [38], [40]. The given results
can be analytically derived from the above expressions by considering the RS ansatz and properly substituting the
corresponding R-transforms. We address the results of two important cases reported in the literature in following.
Special Case 1: In [38], the authors addressed the case of which an i.i.d. sparse source is sampled by an i.i.d.
sensing matrix where the matrix entries are zero-mean random variables with the variance vanishing proportional
38
to k −1 . The asymptotic performance of the estimator was then addressed when the linear, LASSO, and ℓ0 norm
recovery schemes are employed using the RS MAP decoupling principle. The results reported in [38] can be derived
directly by setting the R-transform in Proposition V.2 to be
RJ (ω) =
1
.
1 − rω
(141)
Special Case 2: The results of [38] extended in [40] to a larger set of sensing matrices, and the RS prediction of
the asymptotic MSE was determined for sparse Gaussian sources. The given results can be recovered by considering
the distortion function
d(x̂; x) = kx̂ − xk2 ,
(142)
and the source distribution to be (131) with F̆x representing the zero-mean and unit-variance Gaussian CDF.
B. Finite Alphabet Sources
Our result can be further employed to study the sampling problem of finite alphabet sources. Considering
X = {0, t1, . . . , tℓ−1 } ,
(143)
in which the symbol 0 occurs with probability 1−α, and other ℓ−1 outcomes are distributed due to pt . Consequently,
the source distribution reads
px (x) = (1 − α) 1{x = 0} + α1{x 6= 0}pt (x)
(144)
which can be interpreted as the multiplication of the non-zero discrete random variable t distributed with pt and
an α-Bernoulli random variable. For sake of brevity, we denote the sorted version of the symbols in the support
X
by c1 , . . . , cℓ in which
−∞ < c1 < c2 < . . . < cℓ < +∞.
(145)
For notational compactness, we further define c0 and cℓ+1 to be −∞ and +∞, respectively. Similar to the continuous
case, different choices of the utility function u(·) address different types of reconstruction schemes which we
investigate in the sequel.
Example 4. (linear recovery scheme) We consider the case in which the finite alphabet source is reconstructed
via the linear recovery scheme as introduced in Example 1. Using the bRSB decoupling principle, the source and
estimated symbols (xj , x̂j ) converge to the random variables x and x̂ for all j ∈ [1 : n] where x is distributed with
px defined in (144), and x̂ is found as x̂ = gmap [(y); λs , u] with
gmap [(y); λs , u] = ck
if
i
ℓ2
y ∈ vkℓ2 , vk+1
(146)
39
for k ∈ [1 : ℓ]. The scalar y indicates the observation symbol in the equivalent decoupled system, and the boundary
point vkℓ2 is defined as
vkℓ2 :=
1 + λs
(ck−1 + ck ) .
2
(147)
Example 5. (LASSO recovery scheme) Replacing the reconstruction scheme in Example 4 with LASSO, the
single-user estimator of the bRSB decoupled system is of the form
gmap [(y); λs , u] = ck
if
for k ∈ [1 : ℓ] where the boundary point vkℓl reads
vkℓ1 :=
i
ℓ1
y ∈ vkℓ1 , vk+1
1
|ck | − |ck−1 |
.
(ck−1 + ck ) + λs
2
ck − ck−1
(148)
(149)
Example 6. (ℓ0 norm recovery scheme) For finite alphabet sources, the ℓ0 norm recovery scheme is optimal
in terms of symbol error rate, since it realizes the sparse uniform distribution. In fact, for the case of which the
non-zero symbols of the source are uniformly distributed, the ℓ0 norm utility function exactly models the source’s
true prior, and therefore, can be considered as the optimal scheme. Under the ℓ0 norm recovery scheme, the bRSB
decoupled system reduces to
gmap [(y); λs , u] = ck
with the boundary point vkℓ0 being defined as
vkℓ0 :=
if
i
ℓ0
y ∈ vkℓ0 , vk+1
1{ck 6= 0} − 1{ck−1 6= 0}
1
.
(ck−1 + ck ) + λs
2
ck − ck−1
(150)
(151)
for k ∈ [1 : ℓ].
IX. N UMERICAL R ESULTS
FOR
L ARGE C OMPRESSIVE S ENSING S YSTEMS
In this section, we numerically investigate the examples of large compressive sensing systems for some known
setups. For this purpose, we simulate the decoupled systems by setting the source distribution and sensing matrix to
a specific form and determine the expected distortion of the equivalent scalar system. We, then, discuss the validity
of RS and RSB assumptions for these examples.
A. Simulation Setups
The settings and distortion functions being considered in the numerical investigations are as follows.
1) Sensing Matrices: Throughout the numerical investigations, we consider the two important cases of random
“i.i.d.” and “projector” matrices.
40
•
i.i.d. Random Matrix: In this case, the entries of Ak×n are supposed to be generated i.i.d. from an arbitrary
distribution pa . Without loss of generality, we assume that the entries are zero-mean random variables with
variance k −1 . This structure is the most primary and also the most discussed case in random matrix theory. For
this matrix, regardless of pa , it is well known that the asymptotic empirical eigenvalue CDF of the Gramian
J follows the Marcenko-Pastur law which states
FJ (λ) = 1 − r
−1 +
1{λ > 0} +
Z
λ
−∞
p
r − (1 − u)2
du
2πru
(152)
where [x]+ returns x when x is non-negative and is zero otherwise [32], [33], [86]. Using the definition of
R-transform, it is straightforward to show that RJ (·) reads
RJ (ω) =
•
1
.
1 − rω
(153)
Projector Matrix: Here, the only constraint on the sensing matrix is that the row vectors are orthogonal. The
matrices are also referred to as the “row orthogonal” matrices. For the sensing matrix Ak×n , we assume the
case that the row vectors are normalized by the number of rows and k ≤ n; thus, the outer product AAT reads
AAT =
n
Ik .
k
(154)
Consequently, the Gram matrix J takes two different eigenvalues: λ = 0 with multiplicity n−k, and λ = nk −1
with multiplicity k. Considering the definition of the factor r in (19), the asymptotic empirical CDF of the
eigenvalues read
FJ (λ) = 1 − r−1 1{λ > 0} + r−1 1{λ > r}
(155)
which results in the R-transform of the form
RJ (ω) =
ω−1+
p
(rω − 1)2 + 4ω
.
2ω
(156)
2) Source Model: We consider the continuous and finite alphabet sources to be distributed with “sparse Gaussian”
and “sparse uniform” distributions, respectively. More precisely, we assume the entries of the continuous and finite
alphabet sources to be generated from a Gaussian and uniform distribution, respectively, and multiplied by a
Bernoulli random variable with probability α to take 1 and 1 − α to take 0. Moreover, we assume the nonzero
outcomes of the finite alphabet source to be of the symmetric form
{±a, . . . , ±κa}
(157)
for some positive real a and integer κ.
3) Distortion Function: Regarding the continuous sources, we determine the performance of different estimators
by considering the MSE as the distortion function, i.e.,
d(x̂; x) = kx̂ − xk2 .
(158)
−18
−20
41
−2
−4
MSE0 in [dB]
−6
−8
−10
Linear-i.i.d.
Linear-Projector
LASSO-i.i.d.
LASSO-Projector
ℓ0 norm-i.i.d.
ℓ0 norm-Projector
−12
−14
−16
0.05
0.1
0.2
0.15
0.25
0.3
0.35
0.4
0.45
0.5
λ
Fig. 5: RS predicted normalized MSE versus the estimation parameter λ for the linear, LASSO and ℓ0 norm recovery schemes
considering the compression rate r = 2. The sparsity factor is set to be α = 0.1 and the noise variance λ0 is set such that
the source power to noise power ratio becomes 10 dB. The dashed and solid lines respectively indicate the cases with random
projector and i.i.d. measurements. The curves match the numerical results reported in [38], [40].
For the finite alphabet sources, moreover, we determine the probability of the error as the measure for which
d(x̂; x) =
n
X
i=1
1 {x̂i 6= xi }
(159)
as well as the MSE. Considering either case, it is clear that the MSE obtained by any ℓp norm recovery scheme is
bounded from below by the MMSE bound reported in the literature [21], [23].
B. Numerical Results for Continuous Sources
Considering Examples 1-3, we consider the case in which a sparse Gaussian source with sparsity factor α = 0.1
is sampled via a random sensing matrix. Fig. 5 shows the RS prediction of normalized MSE, defined as
MSE0 =
MSE
= α−1 MSE,
E |x|2
(160)
as a function of the estimation parameter λ. The compression rate is set to be r = 2, and both the i.i.d. random
and projector sensing matrices are considered. The curves match the results reported in [40] and [38]. As it is seen,
the ℓ0 -norm recovery scheme with the optimal choice of estimation parameter outperforms the LASSO scheme;
42
r = 11
0
−2
r=5
MSE0 in [dB]
−4
−6
−8
r=3
−10
r=1
−12
−14
i.i.d.
Projector
−16
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
λ
Fig. 6: RS predicted normalized MSE versus the estimation parameter λ for different compression rates considering LASSO
recovery. The sparsity factor is set to be α = 0.1 and the true noise variance λ0 is set to be 0.01. The dashed and solid lines
respectively indicate the random projector and i.i.d. matrices. As the compression rate increases, MSE0 converges to 0 dB.
however, the non-optimal choice of the estimation parameter can make the ℓ0 norm’s performance even worse than
the LASSO. Moreover, in contrast to the noiseless case, the projector matrix is always outperforming the i.i.d.
matrix in the noisy case; this fact has been also reported in [40].
In [42], the authors showed that in the noiseless sampling case with an i.i.d. Gaussian matrix, the RS ansatz
for linear and LASSO recovery schemes is locally stable against perturbations that break the symmetry of the
replica correlation matrix. This result in fact agrees with the general belief that convex optimization problems do
not exhibit RSB [87]. The result in [42], however, indicated that for the ℓ0 norm reconstruction, the RS ansatz
becomes unstable, and therefore the RSB ansätze are needed for accurately assessing the performance.
In order to investigate the observation of [42], we have plotted the normalized MSE of the LASSO recovery
scheme predicted by the RS ansatz in terms of the estimation parameter λ in Fig. 6 considering different compression
rates. It is observed that for a given estimation parameter λ, the normalized MSE increases as the compression
rate grows. For large compression rates, the normalized MSE converges to 0 dB which agrees with the fact that
for asymptotically large compression rates, the source and observation vectors are independent, and thus, the MSE
converges to the source power. To investigate the ℓ0 norm recovery scheme, we plot the corresponding curves for
the ℓ0 norm scheme considering Fig. 6 as the reference.
For ℓ0 norm recovery, Fig. 7 shows the normalized MSE predicted by the RS ansatz as a function of the estimation
0.75
43
0.85
0
r=4
0.95
MSE0 in [dB]
−5
r = 11
invalid ansätze
−10
i.i.d.
Projector
r=1
−15
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
λ
Fig. 7: The normalized MSE as a function of the estimation parameter λ determined via the RS ansatz for different compression
rates considering the ℓ0 norm recovery scheme. The sparsity factor and the noise variance are considered to be α = 0.1
and λ0 = 0.01, respectively. The dashed and solid lines respectively indicate the random projector and i.i.d. matrices. As the
compression rate increases, the RS ansatz starts to give invalid solutions at low estimation parameters. In fact, as r grows, the
RS fixed point equations have no valid solutions as λ reduces. The interval in which the solution is invalid becomes larger as
the compression rate increases.
parameter for two different compression rates. The system setup has been set to be similar to the one considered in
Fig. 6, and the curves have been plotted for both the i.i.d. and projector measurements. In contrast to the LASSO
recovery scheme, the RS ansatz starts to give invalid predictions for the ℓ0 norm scheme as the compression
rate increases. As it is observed, the normalized MSE drops unexpectedly down for an interval of the estimation
parameters when the compression rate grows.
In fact, in this interval, the RS fixed point equations have either an unstable solution or no solution. To illustrate
this result further, let us consider Examples 2 and 3 under the RS ansatz when an i.i.d. sensing matrix is employed.
In this case, the equivalent noise power and estimation parameter λs0 and λs read
λs = λ + rχ
(161a)
λs0 = λ0 + rq.
(161b)
By increasing the compression rate, the interference increases, and thus, the MSE takes larger values. Therefore,
44
for small λ and λ0 , one can consider rχ ≫ λ and rq ≫ λ0 as r takes large values and write
λs ≈ rχ
(162a)
λs0 ≈ rq.
(162b)
Considering Example 2, by substituting (162a) and (162b) in the RS ansatz, the fixed point equations, as r grows
large, is written in the following form
√
√
u r φ(u r) ≈
Z
∞
√
u r
q ≈ 2α
Z
z 2 Dz + ǫr
(163a)
√
u r
Dz + ǫr .
(163b)
0
for some ǫr tending to zero as r ↑ ∞, and the bounded real scalar u defined as
χ
u := √ .
q
(164)
Taking the limit r ↑ ∞, (163a) is valid for any bounded real value of u and (163b) reduces to q ≈ α for large
compression rates. Noting that for this setup q = MSE, one concludes that MSE0 ≈ 1 which agrees with the results
given in Fig. 6. A similar approach for the ℓ0 norm recovery scheme in Example 3, however, results in the following
contradicting equations
Z
∞
z 2 Dz ≈ ǫr
u
Z
0
(165a)
u
Dz ≈ ǫr .
(165b)
for the scalar u defined as
r
χ
u := 2 .
q
(166)
Clearly, the set of equations in (165a) and (165b) have no solution as r ↑ ∞. The approximated fixed point equations
explain the invalidity of the RS predicted performance of the ℓ0 norm recovery scheme for large compression rates.
In order to further investigate the RS ansatz, we plot the optimal normalized MSE as a function of the compression
rate in Fig. 8. Here, we consider the case with i.i.d. sensing matrix when the sparsity factor is set to be α = 0.1
and source to noise power ratio to be 10 dB. The normalized MSE is minimized numerically over the estimation
parameter λ. As the figure illustrates, the MSE of the RS ansatz starts to drop in moderate compression rates.
The observation confirms the discussion on the stability of the RS saddle point given in [41], [42]. In fact, the
unexpected drop of the RS ansatz is caused by the limited stability region of the RS fixed point solutions. More
precisely, for a given source to noise power ratio and estimation parameter, the RS fixed point equations have stable
solutions within a certain interval of compression rates. The interval widens as λ grows.
Fig. 9 compares the RS and 1RSB ansätze for ℓ0 norm recovery. In this figure, the optimal normalized MSE
is plotted for the case with i.i.d. sensing matrix. The sparsity factor is considered to be α = 0.1 and the noise
45
0
−2
Linear
LASSO
ℓ0 norm
−4
4.5
5
5.5
6
MSE0 in [dB]
−6
−8
−10
−12
invalid ansätze
−14
−16
−18
1
1.5
2
2.5
3
3.5
4
compression rate r
Fig. 8: Optimal normalized MSE versus the compression rate r under RS assumption considering the linear, LASSO and ℓ0 -norm
recovery schemes. The sparsity factor and the source to noise power ratio are considered to be α = 0.1 and 10 dB, respectively.
MSE0 has been minimized numerically over the estimation parameter λ. The solid and dashed lines show the results for random
i.i.d. and orthogonal measurements, respectively. As r grows, the RS ansatz for ℓ0 norm recovery starts to give invalid solutions.
variance is set to be λ0 = 0.01. For the RS ansatz, we have considered two cases, namely when MSE0 is minimized
over 1) all possible estimation parameters and 2) the interval of λ’s in which the RS ansatz is valid within1 . The
latter case is referred to as the “RS restricted” curve. As the figure depicts, the difference between the RS and the
1RSB ansatz is quite small for low compression rates. The 1RSB prediction however deviates from RS at larger
compression rates. This observation indicates that the performance analysis of the ℓ0 norm recovery exhibits RSB.
For sake of comparison, we also plot the curve for the LASSO recovery scheme as well as the MMSE bound. As
it is observed, the normalized MSE for LASSO bounds the 1RSB curve from above. The 1RSB ansatz is moreover
consistent with the MMSE bound which is rigorously justified in the literature [21], [23]. The RS restricted ℓ0
norm’s curve, moreover, crosses the LASSO curve. This deviation indicates that, at large compression rates, the
optimal estimation parameter λ, which minimizes the MSE, lies somewhere out of the interval in which the RS
ansatz returns a valid approximation for the MSE.
To check the consistency of the solutions under the RS and 1RSB ansätze, we also sketch the zero temperature
entropy of the corresponding spin glass as a function of the compression rate in Fig. 10, considering the same setup
1 In
fact, we consider λ > λd , where λd is the point in Fig. 7 in which the normalized MSE curve is not differentiable.
46
0
LASSO-RS
ℓ0 norm-RS
−2
ℓ0 norm-RS restricted
ℓ0 norm-1RSB
MMSE Bound
−4
4.5
5
5.5
6
MSE0 in [dB]
−6
−8
−10
−12
−14
−16
1
1.5
2
2.5
3
3.5
4
compression rate r
Fig. 9: RS versus 1RSB prediction of the optimal normalized MSE considering the ℓ0 norm recovery scheme and random i.i.d.
measurements. The sparsity factor and the source to noise power ratio are considered to be α = 0.1 and 10 dB respectively. The
green dashed line shows the RS prediction of optimal MSE0 when it is numerically minimized over λ; however, the green solid
line indicates the restricted RS predicted MSE0 minimized numerically over the intervals of λ in which the RS ansatz is stable.
The black solid line denotes the 1RSB ansatz which deviates both the RS and restricted RS curves. For sake of comparison,
the normalized MSE for LASSO recovery as well as the MMSE bound have been plotted.
as in Fig. 8 and Fig. 9. The zero temperature entropy also confirms the better accuracy of the 1RSB ansatz.
Based on the above investigations, the exact performance of the ℓ0 norm recovery scheme needs the RSB ansätze
to be accurately studied. It is however useful to see the validity region of the system parameters in which the
prediction given by the RS ansatz lies approximately on the 1RSB curve. For this purpose, we define for the ℓ0
RS
norm recovery, the “RS break compression rate” rbr
(·) as a function of system parameters to be the compression
rate that the prediction via the RS ansatz starts to deviate from 1RSB. More precisely, for a given setting with
parameters in the set
P, the “RS ǫ-validity region” for a given ǫ ∈ R+ is defined as
VbrRS (P; ǫ) :=
r : |MSE0RS (r, P) − MSE01RSB (r, P)| < ǫ .
(167)
where MSE0RS (r, P) and MSE01RSB (r, P) indicate, respectively, the normalized MSE at the compression rate r for
the setup specified by the set P calculated from the RS and 1RSB ansatz, respectively. Consequently, the “RS break
47
−10 −3
zero temperature entropy H0
−10 −2
5
6
−10−1
−10 0
H0rs
0[1]
Hrsb
1
1.5
2
2.5
3
3.5
4
compression rate r
0[1]
Fig. 10: H0rs and Hrsb as functions of the compression rate considering the spin glass which corresponds to the ℓ0 norm recovery
scheme. The setting is considered to be the same as in the setup investigated in Fig. 8 and Fig. 9. The better approximation of
the performance via the 1RSB ansatz is demonstrated in this figure.
RS
compression rate” rbr
(·) for maximum deviation ǫ is given by
RS
rbr
(P; ǫ) := max r.
VbrRS (P;ǫ)
In general, the set
(168)
P includes several setup parameters such as sensing matrix and source’s distribution, the sparsity
factor, noise variance and estimation parameter. Considering a case with i.i.d. sensing matrix and sparse Gaussian
source with a given sparsity factor α, the RS break compression rate is a function of snr and the estimation parameter
RS
λ, i.e., rbr
(snr, λ; ǫ), where we define the source to noise power ratio snr as
snr :=
In this case, the RS ǫ-validity region
E x2
= αλ−1
0 .
λ0
(169)
VbrRS (snr, λ; ǫ) is the area enclosed by both the λ and snr axes as well as the
RS
rbr
(snr, λ; ǫ) surface.
Fig. 11 illustrates the intersection of the RS ǫ-validity region and the planes snr = 9 and snr = 12 for ǫ = 10−3 .
The break compression rate increases with respect to both λ and snr which agrees with the intuition. Moreover,
48
4
snr = 12 dB
3.5
snr = 9 dB
RS
rbr
(snr, λ; ǫ)
3
2.5
2
VbrRS(9, λ; ǫ)
1.5
1
0.01
0.02
0.03
0.04
0.06
0.05
0.07
0.08
0.09
0.10
λ
RS
Fig. 11: rbr
(snr, λ; ǫ) in terms of the estimation parameter λ for ǫ = 10−3 , and snr = 9 dB and snr = 12 dB considering an
i.i.d. matrix employed for sensing. The break compression rate starts to saturate as the estimation parameter grows. As λ ↓ 0,
the break compression rate takes values close to one. This observation agrees with RS instability reported in [42].
RS
rbr
(snr, λ; ǫ) starts to saturate as λ grows. Another extreme case is when the estimation parameter tends to zero in
which the MAP estimator reduces to
g(y) = arg
min
ky−Avk≤ǫ0
kvk0 .
(170)
with ǫ0 = O( √1snr ). For this case, the break compression rate converges to the minimum compression rate r = 1.
This observation in the large snr limit agrees with the instability of the RS ansatz reported in [42].
0.06
0.07
0.08
0.09
0.10
49
10
0
10 −2
Error Probability
10 −4
10 −8
κ=4
10
−8
Single-user bound
i.i.d. matrix
Projector matrix
10−10
κ=2
5
15
10
20
snr
Fig. 12: The error probability versus snr when the ℓ0 norm recovery scheme is employed and the compression rate is set to
be r = 1. By i.i.d. measurements, the error probability deviates from the single-user bound within an interval of snr while
random orthogonal measurements meets the single-user bound for almost every snr and alphabet size. Here, the sparsity factor
and estimation parameter are considered to be α = 0.1 and λ = 0.1, respectively.
C. Numerical Results for Finite Alphabet Sources
Considering the finite alphabet source given in (157), the boundary points for linear recovery read
2k − 1
ℓ2
s
vk = ±
a(1 + λ )
2
for k ∈ [1 : κ]. In the case of LASSO reconstruction, the boundary points are given by
2k − 1
ℓ1
s
a+λ
vk = ±
2
s
for k ∈ [1 : κ]. Finally, by employing ℓ0 norm recovery, we have v1ℓ0 = ± 21 a + λa and
vkℓ0 = ±
2k − 1
a
2
(171)
(172)
(173)
for k ∈ [2 : κ]. The source to noise power ratio snr is then defined as
snr :=
αa2 (κ + 1)(2κ + 1)
E x2
=
.
λ0
6λ0
(174)
5
10
50
0
−4
MSE0 in [dB]
satz-i.i.d.
projector
projector
d. Matrix
r Matrix
−8
−12
−16
obability
MMSE bound
ℓ0 norm
1
1.5
2
2.5
3
3.5
4
compression rate r
Fig. 13: Normalized MSE versus the compression rate r when snr = 5 dB and a = 1. Here, κ = 1 and the sparsity factor is
considered to be α = 0.1. The ℓ0 norm recovery scheme is employed for estimation and the MSE is numerically minimized
over λ considering an i.i.d. sensing matrix. The red curve indicates the MMSE bound on the normalized MSE. The figure
demonstrates a phase transition in the normalized MSE.
Fig. 12 shows the RS predicted error probability of the finite alphabet system as a function of snr for the unit
compression rate when the ℓ0 norm recovery scheme is employed. The cases with κ = 2 and κ = 4 are considered
for both random i.i.d. and orthogonal measurements. Here, the sparsity factor is set to be α = 0.1 and λ = 0.1.
As the figure illustrates, for either sensing matrix, the error probability meets the single-user bound in a relatively
large snr regime. The deviation from the single-user bound in the i.i.d. case, moreover, occurs in a larger interval
of snr as κ grows. In contrast to i.i.d. measurements, the coincidence occurs for almost every snr and κ when a
projector sensing matrix is employed. This observation is intuitively justified due to the orthogonality of the rows
in the latter case.
For the MSE, similar behavior as in Fig. 12 is observed in Fig. 13. As the compression rate increases, considering
either the MSE or error probability, a deviation from the single-user bound is observed for both random i.i.d. and
orthogonal measurements. Considering a fixed snr, it is observed that the MSE-compression rate has a discontinuity
point in which the MSE suddenly jumps from a lower value to an upper value at a certain compression rate. This
phenomenon is known as the “phase transition” in which the macroscopic parameters suddenly change the phase
within a minor variation of the setting. The compression rate in which the phase transition occurs is referred to as
“transition rate” which increases as snr grows. Phase transitions were reported in the literature of communications
51
and information theory for several problems such as turbo coding and CDMA systems [11], [11], [88].
Fig. 13 illustrates the phase transition under the RS assumption for the case of sparse binary source, i.e., κ = 1,
when the source vector is sensed via a random i.i.d. matrix and snr = 5 dB with a = 1. For estimation, the ℓ0 norm
recovery scheme is employed which is equivalent to LASSO in this particular example. The estimation parameter λ
is moreover optimized numerically such that the MSE is minimized. To determine each point on the curve, the RS
fixed point equations have been solved for the specific compression rate and all possible solutions have been found.
Within this set of solutions, those which are physically stable have been considered and the stable solution with
minimum free energy has been taken for the RS ansatz. The normalized MSE at each compression rate has then
been plotted using the RS ansatz. As the figure shows, the normalized MSE suddenly jumps to an upper bound
which converges to MSE0 = 0 dB. For sake of comparison, we have plotted the MMSE bound as well which
shows a samilar behavior at higher rates. In Fig. 14, we have further plotted the normalized MSE in terms of the
compression rate for the same setting with the sensing matrix replaced by a random projector matrix. The figure
shows a phase transition for orthogonal measurements at a higher transition rate compared to the case with random
i.i.d. sensing. Moreover, the improvement in terms of MSE observed in Fig. 14 by employing a projector matrix
extends the conclusion given for the sparse Gaussian sources in [40] to the sparse finite alphabet sources as well.
In order to obtain a more accurate approximation of the performance and transition point, one may investigate the
free energy and entropy of the corresponding spin glass by also considering RSB ansätze [41]. The RS ansatz,
however, gives an accurate approximation of the MSE for the specific setup considered here.
X. C ONCLUSION
This manuscript considered the performance of the MAP estimator in the large-system limit with respect to a
general distortion function. Taking a statistical mechanical approach, the replica method was employed to determine
the asymptotic distortion of the system. We deviated from the earlier approaches, e.g., [38]–[40], by evaluating the
general replica ansatz of the corresponding spin glass. The general ansatz let us derive the RS, as well as the bRSB
ansatz considering the class of rotationally invariant random matrices. The results recover the previous studies
[38]–[40] in special cases and justifies the uniqueness of the zero temperature entropy’s expression under the bRSB
assumption conjectured in [43]. The replica ansatz evaluated here led us to a more general form of the decoupling
principle. In fact, invoking the general replica ansatz, it was shown that for any tuple of input-output entries, the
marginal joint distribution converges to the input-output empirical distribution asymptotically. This means that in
the large-system limit, the marginal joint distribution of the entries determined by any replica ansatz decouples
into a set of identical joint distributions. The form of the asymptotic decoupled distribution, however, depends on
the structure imposed on the ansatz. For the bRSB ansatz, the vector-valued AWGN system estimated by a MAP
estimator decouples into single-user MAP-estimated AWGN channels followed by some correlated impairment terms
which intuitively model the interference of the system and vanish by reducing the bRSB assumption to RS. The
general decoupling principle justified here confirms the conjecture that decoupling is a generic property of MAP
estimators, since its validity relies only on the replica continuity assumption. Recent results in statistical mechanics
have shown that failures in finding the exact solution via the replica method are mainly caused by the structure
5
10
52
0
−4
MSE0 in [dB]
satz-i.i.d.
projector
projector
d. Matrix
r Matrix
−8
−12
−16
obability
Projector
i.i.d.
1
1.5
2
2.5
3
3.5
4
compression rate r
Fig. 14: MSE0 in terms of the compression rate r for snr = 5 dB and a = 1 considering i.i.d. and projector sensing matrices.
Here, α = 0.1 and κ = 1, and the MSE is numerically minimized with respect to the estimation parameter. As the figure shows,
the projector matrix enhances the reconstruction performance with respect to the both MSE and transition rate.
imposed on the ansatz, and not replica continuity [3], [89]–[91]. The decoupling property enabled us to represent
the equivalent “replica simulator” interpretation of the replica ansatz. In fact, the bRSB fixed point equations
are completely described by the statistics of the corresponding decoupled system. The bRSB ansatz is therefore
represented through the state evolution of a transition system which takes an initial set of ansatz parameters as the
input and determines a new set of parameters via simulating the bRSB decoupled system as the output.
As an example of vector-valued MAP-estimated systems, we considered the noisy compressive sensing system
and studied different sparse recovery schemes, including the linear, LASSO, and ℓ0 norm recovery schemes. The
numerical investigations showed that for sparse Gaussian sources, the performance of the linear and LASSO recovery
schemes are accurately approximated by the RS ansatz within a large interval of compression rates. The RS prediction
of the ℓ0 norm scheme’s performance, however, was observed to lack the stability within the moderate and high
compression rates. As a result, the 1RSB ansatz for this scheme was considered which deviates from the RS ansatz
significantly as the rate grows. For sparse finite alphabet sources, the RS prediction of the error probability and
MSE reported phase transitions with respect to the compression rate. The numerical results, moreover, showed a
better performance of the random orthogonal measurements compared to the random i.i.d. sensing in both the cases
which were previously reported for sparse Gaussian sources in [40].
The current work can be pursued in several directions. As an example, the “replica simulator” introduced in
53
Section VII can be studied further by methods developed in the context of transition systems. The analysis may
result in proposing a new framework which simplifies the evaluation of fixed point equations. Another direction is
the analysis of the conditional distribution of the correlated impairment terms in the bRSB decoupled system. The
study can lead us to understand the necessary or sufficient conditions in which the RS ansatz gives an accurate
approximation of the system’s performance. Inspired by the Sherrington-Kirkpatrick model of spin glasses, for
which the full RSB ansatz, i.e., b ↑ ∞, has been proved to give a stable solution for all system parameters [82],
our conjecture is that the exact solution at all large compression rates, for the cases exhibiting RSB, is given by
a large number of breaking steps. Nevertheless, as our numerical investigations depicted, even in those cases, the
RS ansatz, or the bRSB ansatz with small b, can give good approximations of the solution up to some moderate
compression rates. The latter study, furthermore, gives us some insights about the accuracy of the approximation
given by a finite number of RSB steps. Investigating the connection between the replica simulator and message
passing based algorithms is another interesting topic for future work.
XI. ACKNOWLEDGMENT
The authors would like to acknowledge German Research Foundation, Deutsche Forschungsgemeinschaft (DFG),
for support of this work under the Grant No. MU 3735/2-1.
54
A PPENDIX A
P ROOF
P ROPOSITION IV.1
OF
Starting from (42), we define the moment function Z(m) as in (43a). Therefore,
DW (x̂; x) = lim lim lim lim
1 1 ∂
log Z(m).
β↑∞ n↑∞ h↓0 m↓0 m n ∂h
(175)
Taking the expectation with respect to the noise term first, the moment function is extended as
Z(m) = Ex EA Ez
e−β
Pm
E(va |y,A)+hn
X
e−β
Pm
1
1 T
1
(x−v a )T J(x−va )+ λ
z A(x−v a )+ 2λ
kzk2 +u(v a )}+hn
{ 2λ
{v a }
= Ex EA Ez
{v a }
⋆
=
λ
λ + mβλ0
k2
a=1
a=1
Ex EA
X
e−β{
Pm
DW(n) (v a ;x)
X
a=1
Pm
{v a }
a,b=1
ṽ T
a Jṽ b ζab +
(176a)
Pm
a=1
u(v a )}+hn
Pm
a=1
Pm
a=1
DW(n) (va ;x)
DW(n) (v a ;x)
(176b)
(176c)
where ṽ a = x − v a for a ∈ [1 : m] is the unbiased1 replica vector, J is the Gramian of the system matrix defined
as J := AT A and satisfies the properties stated in Section II, ⋆ comes from taking expectation over z, and the
factor ζab is defined as
ζab
λ0
1
:=
1{a = b} −
β
2λ
λ + mβλ0
(177)
with λ0 being the true noise variance as specified in Section II.
Remark A.1. Considering (176b), one could drop the term
1
2
2λ kzk ,
since it plays no rule in the optimization
problem (2). More precisely, one could redefine the Hamiltonian in (10) to be
Enew (v|y, A) = E(v|y, A) −
1
kzk2
2λ
(178)
without loss of generality. In this case, the coefficient at the right hand side of (176c) reduces to 1, and ζab reads
1
λ0
new
:=
ζab
1{a = b} − β .
(179)
2λ
λ
It is, however, clear from (176c) and (177) that as m tends to zero, both the approaches result in a same result.
Considering the expression in (176c), we define the random variable Z(m; x) as
Z(m; x) := EJ
X
{v a }
e−β{
Pm
a,b=1
ṽ T
a Jṽb ζab +
Pm
a=1
u(v a )}+hn
Pm
a=1
DW(n) (v a ;x)
.
(180)
Consequently, the moment function is given by taking the expectation over Z(m; x) with respect to x and multiplying
k2
λ
. However, we later on show that for almost all realizations of the source vector, Z(m; x)
with the scalar λ+mβλ
0
converges to a deterministic value, and therefore, the expectation with respect to x can be dropped. For Z(m; x),
1 We
call it unbiased since it expresses the deviation of the replicas from the source vector.
55
we have
Z(m; x) = E J
X
{v a }
=
e−β
Pm
a,b=1
ṽ T
a Jṽ b ζab
× e−β
Pm
a=1
u(v a )+hn
Pm
a=1
DW(n) (va ;x)
i
Xh
Pm
Pm
W(n)(va ;x)
E J e−nβTr{JG} × e−β a=1 u(va )+hn a=1 D
(181a)
(181b)
{v a }
where Gn×n is defined as
G :=
m
1 X
ṽ b ṽ T
a ζa,b .
n
(182)
a,b=1
Considering the eigendecomposition of the Gramian J = UDUT , the expectation in (181b) can be expressed in
terms of a spherical integral where the integral measure is the probability measure of U. Regarding the system setup
specified in Section II, the matrix U is distributed over the orthogonal group On with Haar probability distribution.
Therefore, the corresponding spherical integral is the so-called “Harish-Chandra” or “Itzykson & Zuber” integral.
This integral has been extensively studied in the physics and mathematics literature, see for example [92], [93]
and [74]. A brief discussion on the spherical integral and its closed form solution has been given in Appendix F.
√
Invoking Theorem 1.2 and 1.7 in [75], as long as rank(G) = O( n)1 , the expectation in (181b) can be written as
E Je
−nβTr{JG}
=e
Pn R βλG
i R (−2ω)dω +ǫ
−n
J
n
i=1 0
(183)
with G being defined in (182), and ǫn ↓ 0 as n ↑ ∞. In order to employ the above result and substitute it in (181b),
we need to check the rank condition.
Lemma A.1. Considering G to be defined as in (182), the following argument holds.
√
rank(G) = O( n).
(184)
Proof. First, we rewrite G as
#
"m
m
m
X
X
1 X
λ0
T
G=
(
ṽ a )(
ṽ b )T
ṽ a ṽ a − β
2λn a=1
λ + mβλ0 a=1
(185a)
b=1
=
λ0
1
Ṽ(Im − β
1m )ṼT
2λn
λ + mβλ0
(185b)
where Ṽ = [ṽ 1 , . . . , ṽ m ] is an n × m matrix with the columns being the unbiased replicas. Then, by considering
(185b), it is obvious that G could be, at most, of rank m. As Assumption 2 indicates, Z(m) analytically continues
to the real axis, and the limit with respect to m is taken in a right neighborhood of 0. Therefore, for all values of
1 O(·)
indicates the growth order with respect to composition, i.e., lim [f (n)]−1 O(f (n)) = K < ∞.
n↑∞
56
n there exists a constant K ∈ R+ , such that m ≤ K. Consequently, one can write
lim
n↑∞
rank(G)
m
K
√
≤ lim √ ≤ lim √ = 0
n↑∞
n
n n↑∞ n
(186)
√
which concludes that rank(G) = O( n).
N
Lemma A.1 ensures that (183) always holds; therefore, noting the fact that G has only m non-zero eigenvalues,
the expectation in the right hand side of (181b) reduces to
v
E J e−nβTr{JG} = e−nG(TQ
)+ǫn
(187)
where the function G(·) is defined as
G(M) :=
Z
β
Tr{MRJ (−2ωM)}dω
(188)
0
for some square matrix M, T is an m × m deterministic matrix given by
λ0
1
Im −
β1m ,
T :=
2λ
λ + mβλ0
(189)
and Qv is the m × m “correlation matrix” defined as
Qv =
1 T
Ṽ Ṽ.
n
(190)
Remark A.2. Note that although Qv is symmetric, TQv is not a symmetric matrix, in general; however, due to
the symmetry of G, the eigenvalues of TQv are real, and therefore, the sequence of integrals over the real axis in
(183) exists for all indices.
By substituting (187) in (181b), Z(m; x) is given as
Z(m; x) =
X
{v a }
v
e−nG(TQ
)−β
Pm
a=1
u(v a )+hn
Pm
a=1
DW(n) (v a ;x)+ǫn
.
(191)
In order to determine the sum in (191), we follow the technique which has been employed in [16] and [43]. We
split the space of all replicas into subshells defined by the correlation matrices in which all the vectors of replicas
in each subshell have a same correlation matrix. More precisely, for a given source vector x, the subshell of the
matrix Qm×m is defined as
S(Q) = {v1 , . . . , vm |(x − v a )T (x − vb ) = nqab }
(192)
with qab = [Q]ab denoting the entry (a, b) of Q. The sum in (191) is determined first over each subshell, and then,
57
over all the subshells as the following.
X Z
Pm
Pm
W(n) (va ;x)+ǫn
e−nG(TQ) δ(Qv − Q)dQ e−β a=1 u(va )+hn a=1 D
Z(m; x) =
(193a)
{v a }
=
=
where dQ :=
Qm
a,b=1
Z
Z
e−nG(TQ)+ǫn
X
{v a }
δ(Qv − Q)e−β
Pm
a=1
u(v a )+hn
Pm
a=1
e−n[G(TQ)−I(Q)]+ǫn dQ
DW(n) (v a ;x)
dQ
(193b)
(193c)
Rm×m ,
dqab , the integral is taken over
δ(Qv − Q) :=
m
Y
a,b=1
δ(ṽ T
a ṽ b − nqab ),
(194)
and the term enI(Q) which determines the probability weight of the subshell S(Q) is defined as
enI(Q) :=
X
{v a }
δ(Qv − Q)e−β
Pm
a=1
u(v a )+hn
Pm
a=1
DW(n) (v a ;x)
.
(195)
Remark A.3. One may define the subshells over the transferred correlation matrix TQ instead of correlation matrix
Q. In this case the subshells over Q defined in (192) only rotate in the m-dimensional space with respect to T.
The rotation, however, does not have any impact on the analysis.
The last step is to determine enI(Q) . To do so, we represent the Dirac impulse function using its inverse Laplace
transform. By defining sab as the complex frequency corresponding to δ(ṽ T
a ṽ b − nqab ),
Z
T
dsab
δ(ṽ T
esab (ṽa ṽb −nqab )
a ṽ b − nqab ) =
2πj
(196)
where the integral is taken over the imaginary axis J = (t − j∞, t + j∞), for some t ∈ R. Consequently, by defining
the frequency domain correlation matrix S to be
Z
δ(Qv − Q) =
Z
=
with dS being defined as dS :=
an m × m matrix with [S]ab = sab , (194) reads
e
Pm
a,b=1
sab (ṽ T
a ṽ b −nqab )
dS
(197a)
i Pm
h
T
T
e−nTr{S Q} e a,b=1 sab ṽa ṽb dS
(197b)
m
Y
dsab
, and the integral being taken over Jm×m . Substituting in (195), enI(Q)
2πj
a,b=1
reduces to
enI(Q) =
=
Z
e−nTr{S
Z
e−nTr{S
T
Q}
X
{v a }
T
Q}
e
Pm
a,b=1
enM(S) dS
sab ṽ T
a ṽ b −β
Pm
a=1
u(v a )+hn
Pm
a=1
DW(n) (v a ;x)
dS
(198a)
(198b)
58
with M(S) being defined as
M(S) =
Pm
Pm
X Pm
T
W(n) (va ;x)
1
e a,b=1 sab ṽa ṽb −β a=1 u(va )+hn a=1 D
log
.
n
(199)
{v a }
Thus, Z(m; x) finally reads
Z(m; x) =
Z Z
e−n{G(TQ)+Tr{S
T
Q}−M(S)}+ǫn
dSdQ.
(200)
Consequently, one needs to evaluate the expectation of Z(m; x) with respect to x, in order to determine the
moment function Z(m). However, Z(m; x) for almost all realizations of x converges to a deterministic asymptotic
as n ↑ ∞, and thus, the expectation with respect to x can be dropped. To show the latter statement, we note that
the only term in (200) which depends on x is M(S). Therefore, it is sufficient to study the convergence of M(S).
Lemma A.2 justifies this property of M(S) using the law of large numbers, and the decoupling property of the
functions u(·) and d(·; ·).
Lemma A.2. Consider the system specified in Section II, and let Assumption 2 hold. Then, as n ↑ ∞, M(S)
defined in (199) is given by
(
"
M(S) = E
(1 − η) log
X
e(x−v)
T
S(x−v)−βu(v)
v
#
"
+ η log
X
e(x−v)
T
S(x−v)−βu(v)+hη
−1
d(v;x)
v
#)
(201)
where vm×1 ∈ Xm , xm×1 is a vector with all the elements being the random variable x which is distributed with the
Pm
source distribution px , the expectation is taken over px , and d(v; x) is defined as d(v; x) := a=1 d(va ; xa ).
Proof. Consider the decoupling property of the functions u(·) and d(·; ·). Define the vector vm×1 over the
support
Xm , and the coefficients {wi} for i ∈ [1 : n] as
wi =
Then, M(S) reads
M(S) =
0
|W(n)|−1
if i ∈
/ W(n)
if i ∈ W(n).
n P
Pm
Pm
XY
m
1
e a,b=1 sab (xi −vai )(xi −vbi )−β a=1 u(vai )+hn a=1 wi d(vai ;xi )
log
n
i=1
(202)
(203a)
{v a }
n X P
Pm
Pm
Y
m
1
log
e a,b=1 sab (xi −va )(xi −vb )−β a=1 u(va )+hn a=1 wi d(va ;xi )
n
i=1 v
"
#
X
X
1
=
M0 (S; xi ) +
M1 (S; xi )
n
=
i∈
/W
i∈W
(203b)
(203c)
59
where the functions M0 (·; ·) and M1 (·; ·) are defined as
M0 (S; xi ) = log
X
e(x−v)
M1 (S; xi ) = log
X
e
T
S(x−v)−βu(v)
(204a)
v
n
(x−v)T S(x−v)−βu(v)+h |W(n)| d(v;x)
(204b)
v
where xm×1 is a vector with all the elements being xi , and we define d(v; x) :=
Pm
a=1
d(va ; xa ) for compactness.
As Assumption 2 suggests the limits with respect to m and n can be exchanged in (175); thus, one can consider
the asymptotics of M(S) for a given m when n tends to its large limit. Regarding the fact that x is collected from
an i.i.d. distribution, the term in the right hand side of (203c) converges to the expectation over the distribution px
due to the law of large numbers; more precisely, as n ↑ ∞
X
|W(n)|
1 X
1
M0 (S; xi ) = 1 −
M0 (S; xi ) −→ (1 − η) Ex M0 (S; x)
n
n
n − |W(n)|
i∈
/W
i∈
/W
X
1 X
1
|W(n)|
M1 (S; xi ) =
M1 (S; xi ) −→ η Ex M1 (S; x)
n
n
|W(n)|
i∈W
i∈W
with η being defined as in (25). Substituting (205a) and (205b) in (203c), Lemma A.2 is concluded.
(205a)
(205b)
N
Remark A.4. Considering Lemma A.2, it eventually says that the probability weight enI(Q) for a given correlation
matrix Q converges to a deterministic weight as n tends to infinity. This statement equivalently states that for almost
any given realization of the source vector, the correlation matrix converges to its expectation. In fact, considering
the correlation matrix Qv , as defined in (190), the entries are functions of x, and therefore, variate randomly due
to the source distribution for a given n. Lemma A.2, however, indicates that, as n ↑ ∞, the entries converge to
some deterministic asymptotics for almost any realization of x. As an alternative approach, one could study the
convergence property of the correlation matrix Qv by means of the law of large numbers first, and then, conclude
Lemma A.2 by rewriting M(S) in proper way, and replacing it with the expectation using the fact that the probability
weight enI(Q) needs to converge deterministically as n ↑ ∞. Nevertheless, the approach taken here seems to be
more straightforward.
Using Lemma A.2, we drop the expectation with respect to x in (176c). Replacing in (175), the asymptotic
distortion is found by taking the limits. As Assumption 2 suggests, we exchange the order of the limits and take
the limit with respect to n at first. Denoting that the probability measure defined with enI(Q) dQ satisfy the large
deviation properties [81], we can use the saddle point approximation to evaluate the integral in (200) which says
that as n ↑ ∞
Z(m) =
λ
λ + mβλ0
k2 Z Z
e−n{G(TQ)+Tr{S
T
Q}−M(S)}
T
.
dSdQ = Kn e−n{G(TQ̃)+Tr{S̃ Q̃}−M(S̃)} ,
(206)
where we drop ǫn given in (200) regarding the fact that it vanishes in the large limit. Here, (Q̃, S̃) is the saddle
.
point of the integrand function’s exponent, Kn is a bounded coefficient, and = indicates the asymptotic equivalency
in exponential scale defined as the following.
60
Definition A.1. The functions a(·) and b(·) defined over the non-bounded set
X are said to be asymptotically
equivalent in exponential scale, if
lim log |
n↑∞
a(xn )
| = 0.
b(xn )
for an unbounded sequence {xn ∈ X}.
(207)
As n ↑ ∞, the mth moment can be replaced with its asymptotic equivalent in (175). Consequently, by substituting
the equivalent term and exchanging the limits’ order, we have
log Kn
1 ∂
−G(TQ̃) − Tr{S̃T Q̃} + M(S̃) +
DW (x̂; x) = lim lim lim lim
β↑∞ m↓0 h↓0 n↑∞ m ∂h
n
∂
1
⋆
= lim lim lim
M(S̃)
β↑∞ m↓0 h↓0 m ∂h
P
(x−v)T S̃(x−v)−βu(v)
v d(v; x)e
= lim lim E
P
β↑∞ m↓0
m v e(x−v)T S̃(x−v)−βu(v)
(208a)
(208b)
(208c)
where ⋆ comes from the fact that Kn is bounded, and G(TQ̃) and Tr{S̃T Q̃} are not functions of h.
Thesaddle point (Q̃, S̃) is found by letting the derivatives of the exponent zero. Using the standard definition
∂
∂
:=
, the saddle point is given by the following fixed point equations.
∂M ab
∂[M]ab
∂
[G(TQ) + Tr{SQ} − M(S)] |(Q̃,S̃) = 0
∂Q
∂
[G(TQ) + Tr{SQ} − M(S)] |(Q̃,S̃) = 0.
∂S
(209a)
(209b)
(209a) reduces to
S̃ = −βTRJ (−2βTQ̃),
(210)
and (209b) results in
Q̃ = E
P
v (x
T
− v)(x − v)T e(x−v) S̃(x−v)−βu(v)
.
P (x−v)T S̃(x−v)−βu(v)
ve
(211)
By replacing (210) in (208c) and (211), the expression for the asymptotic distortion and the saddle point correlation
matrix can be considered as expectations over a conditional Boltzmann-Gibbs distribution pβ
v|x defined as
e−β[(x−v) TRJ (−2βTQ̃)(x−v)+u(v)]
:= P
pβ
v|x (v|x)
−β[(x−v)T TRJ (−2βTQ̃)(x−v)+u(v)]
ve
T
(212)
which simplifies the expressions in (208c) and (211) to those given in Proposition IV.1.
In general the fixed point equation (211) can be satisfied with several saddle points, and therefore, multiple
asymptotic distortions might be found. In this case, one should note that the valid solution is the one which
minimizes the free energy of the spin glasses at the zero temperature, i.e., β ↑ ∞. Using the mth moment, the free
61
energy of the system reads
F(β) = − lim lim lim
n↑∞ h↓0 m↓0
1 11
log Z(m)
mβn
(213a)
i
1 h
⋆
= lim lim
G(TQ̃) + Tr{S̃T Q̃} − M(S̃)
(213b)
m↓0 h↓0 βm
"
#
X
T
1 1
1
†
= lim
G(TQ̃) − Tr{Q̃T TRJ (−2βTQ̃)} − E log
e−β(x−v) TRJ (−2βTQ̃)(x−v)−βu(v) (213c)
m↓0 m β
β
v
where ⋆ comes from the facts that Kn is bounded and the limits with respect to m and n are supposed to exchange,
and † is deduced from (210) and Lemma A.2. Finally by considering the definition of G(·), Proposition IV.1 is
concluded.
62
A PPENDIX B
P ROOF
OF
P ROPOSITION V.1
Starting from Assumption 3, the replica correlation matrix is
Q=
χ
Im + q1m
β
(214)
for some non-negative real χ and q. Considering Definition IV.1, the Hamiltonian of the spin glass of replicas is
given by
E R (v|x) = (x − v)T TRJ (−2βTQ)(x − v) + u(v)
(215)
with T being defined in (48). Denoting R := TRJ (−2βTQ), it is shown in Appendix E that R has the same
structure as the correlation matrix; thus, one can write
R = eIm − β
f2
1m ,
2
(216)
for some real f and e which are functions of χ and q. Denoting the eigendecomposition of Q as Q = VDQ VT ,
we have1
T = VDT VT
(217a)
R = VDR VT
(217b)
where DQ , DT and DR are the diagonal matrices of eigenvalues. Therefore, we have
DR = DT RJ (−2βDT DQ )
(218)
which equivalently states that for a ∈ [1 : m]
T
T Q
λR
a = λa RJ (−2βλa λa )
(219)
Q
T
with λR
to the ath column of V. The matrices
a , λa and λa being the eigenvalue of R, Q and T corresponding
mβλ0
1
f2 χ
1−
R, Q and T have two different corresponding eigenvalues, namely e − βm , + mq,
2 β
2λ
λ + mβλ0
χ 1
which occur with multiplicity m − 1. Substituting in (219) and
which occur with multiplicity 1 and e, ,
β 2λ
taking the limit when m ↓ 0, e and f are found as
χ
1
RJ (− ),
2λ
λ
1 ∂ n
χ o
2
f = 2
[λ0 χ − λq] RJ (− ) .
λ ∂χ
λ
e=
1 Note
that Q is full-rank and symmetric.
(220a)
(220b)
63
To pursue the analysis, we rewrite the Hamiltonian using (216)
E R (v|x) = ekx − vk2 − β
f2
Tr{(x − v)(x − v)T 1m } + u(v),
2
(221)
and therefore, the partition function Z R (β|x) is given by
Z R (β|x) =
X
e−βekx−vk
2
2
+β2 f2 Tr{(x−v)(x−v)T 1m }−βu(v)
.
(222)
{va }
Using the Gaussian integral, we have
2
eβ
f2
T
2 Tr{(x−v)(x−v) 1m }
=
Z
e−βf [
Pm
a=1 (x−va )
]z Dz,
(223)
and thus, the partition function reduces to
R
Z (β|x) =
Z "X
e
−β[e(x−v)2 +f (x−v)z+u(v)]
v
#m
Dz
(224)
with v ∈ X. The parameters of the spin glass of replicas are then determined using the partition function. Starting
with the normalized free energy, it reads
1
F (β, m) = −
Ex log
βm
R
Noting that
R
Z "X
e
−β[e(x−v)2 +f (x−v)z+u(v)]
v
#m
Dz.
(225)
Dz takes expectation over the Gaussian distribution, one can use the Riesz equality in (41) to show
that when m varies in a vicinity of 0
1
FR (β, m) = − E
β
Z
log
X
e−β[e(x−v)
2
+f (x−v)z+u(v)]
Dz + ǫm
(226)
v
where ǫm tends to 0 as m ↓ 0 and the expectation is taken over x ∼ px . Consequently, as m ↓ 0 the normalized
free energy reads
1
FR (β) = lim FR (β, m) = − E
m↓0
β
Z
log
X
e−β[e(x−v)
2
+f (x−v)z+u(v)]
Dz
(227)
v
The next parameters to be specified are χ and q. By determining the conditional distribution pβ
v|x and substituting
in (49), the following fixed point equations are deduced
X
χ
+ q m = Ex
kx − vk2 pβ
v|x (v|x),
β
v
X
χ
+ mq m = Ex
Tr{(x − v)(x − v)T 1m } pβ
v|x (v|x).
β
v
(228a)
(228b)
where (228a) and (228b) are found by taking the trace and sum over all the entries of the both sides of (49),
respectively. One can directly evaluate the right hand sides of (228a) and (228b); however, considering (222), it is
64
straightforward to show that
Ex
kx − vk2 pβ
v|x (v|x) = m
X
Tr{(x − v)(x − v)T 1m } pβ
v|x (v|x) = −
v
Ex
∂ R
F (β, m),
∂e
X
v
(229a)
m ∂ R
F (β, m).
βf ∂f
(229b)
After substituting and taking the limit m ↓ 0, the fixed point equations finally read
χ
+q =E
β
Z P
1
χ= E
f
2
x)2 e−β[e(x−v) +f (x−v)z+u(v)]
Dz
−β[e(x−v)2 +f (x−v)z+u(v)]
ve
−
v (v
P
Z P
x)ze−β[e(x−v) +f (x−v)z+u(v)]
Dz.
−β[e(x−v)2 +f (x−v)z+u(v)]
ve
2
−
v (v
P
with f and e defined in (220a) and (220b).
(230a)
(230b)
In order to determine the replicas’ average distortion defined in (53) regarding the distortion function d(·; ·), we
replace the Hamiltonian by
EhR (v|x) = E R (v|x) + h
m
X
d(va ; x)
(231)
a=1
with E R (v|x) given in (221), and take the steps as in (222)-(225) to find the modified form of the normalized free
energy, i.e. FR (β, h, m). The replicas’ average distortion is then evaluated as
∂ R
F (β, h, m)|h=0
∂h
2
Z P
d(v; x)e−β[e(x−v) +f (x−v)z+u(v)]
vP
Dz.
=E
−β[e(x−v)2 +f (x−v)z+u(v)]
ve
DR (β, m) =
(232a)
(232b)
which does not depend on m, and thus, taking the limit m ↓ 0 is not needed.
The last step is to take the zero temperature limit. Using the Laplace method of summation, as β ↑ ∞ the fixed
point equations reduce to
Z
(g − x)2 Dz,
Z
1
χ = E (g − x)z Dz.
f
q=E
(233a)
(233b)
with g being defined as
g := arg min e(x − v)2 + f (x − v)z + u(v) .
v
Taking the same approach, the replicas’ average distortion at zero temperature reads
Z
DW = E d(g; x) Dz.
(234)
(235)
In order to avoid multiple solutions, we need to find the normalized free energy of the corresponding spin glass
as given in Proposition IV.1. In fact, the fixed point equations in (233a) and (233b) may have different solutions,
and therefore, the several asymptotics for the distortion can be obtained. In this case, the fixed point solution which
65
minimizes the zero temperature free energy of the system and its corresponding asymptotic distortion are taken.
Substituting in Proposition IV.1, the free energy of the corresponding spin glass at the inverse temperature β is
found as
F(β) =
1
2λ
Z
0
1
Fβ (ω)dω − Fβ (1) + FR (β)
(236)
where the function Fβ (·) is defined as
Fβ (ω) =
χ
χ i
χ
λ0
d h
ωRJ (− ω) .
RJ (− ω) + q − χ
β
λ
λ
dω
λ
By taking the limit as β ↑ ∞, the zero temperature free energy reads
Z 1
Z
1
F0 =
F∞ (ω)dω − F∞ (1) + E e(x − g)2 + f (x − g)z + u(g) Dz
2λ 0
(237)
(238)
−1 2
−1
f
with g being defined as in (234) and F∞ (ω) := limβ↑∞ Fβ (ω). By defining λs := [2e] and λs0 := 4e2
Proposition V.1 is concluded.
66
A PPENDIX C
P ROOF
OF
P ROPOSITION VI.1
We take the same approach as in Appendix B. Considering the replica correlation matrix to be of the form
Q=
χ
Im + pI mβ ⊗ 1 βµ + q1m ,
µ
β
(239)
for some non-negative real χ, p, q, and µ, we need to evaluate the parameters of the spin glass of replicas defined
in Definition IV.1. Starting with the Hamiltonian,
E R (v|x) = (x − v)T TRJ (−2βTQ)(x − v) + u(v)
(240)
where T is given in (48). As discussed in Appendix E, for a given µ the matrix R := TRJ (−2βTQ) is of the
following form
R = eIm − β
g2
f2
I mβ ⊗ 1 βµ − β 1m
2 µ
2
(241)
where e, g and f can be found in terms of χ, p and q. Using the eigendecomposition of R, Q and T, it is then
straightforward to show that for a ∈ [1 : m]
T
T Q
λR
a = λa RJ (−2βλa λa )
(242)
Q
T
where λR
a , λa and λa denote the ath eigenvalues of R, Q and T, respectively. Regarding the structure of Q and
R, there are three different sets of corresponding eigenvalues for R, Q and T, namely
•
•
•
mβλ0
f 2 χ + µp
1
g2
1−
with multiplicity 1,
+ mq,
e − µ − mβ ,
2
2
2λ
λ + mβλ0
β
2
g χ + µp 1
with multiplicity mβµ−1 − 1, and
,
e−µ ,
2 β
2λ
χ 1
with multiplicity m − mβµ−1 .
e, ,
β 2λ
Thus, by substituting in (242) and taking the limit when m ↓ 0, e, g and f are given as
1
χ
RJ (− ),
2λ
λ
χ
1
χ + µp
2
RJ (− ) − RJ (−
g =
) ,
λµ
λ
λ
χ + µp
1 ∂
2
[λ0 (χ + µp) − λq] RJ (−
) .
f = 2
λ ∂χ
λ
e=
(243a)
(243b)
(243c)
The next step is to evaluate the partition function. Substituting (241) in (240), the Hamiltonian reads
E R (v|x) = ekx − vk2 − β
g2
f2
Tr{(x − v)(x − v)T I mβ ⊗ 1 βµ } − β Tr{(x − v)(x − v)T 1m } + u(v).
µ
2
2
(244)
67
The partition function is then determined as in (51). Substituting in (51) and using the equalities
1 2 2
T
e 2 β f Tr{(x−v)(x−v) 1m }
e
1 2 2
T
⊗1 µ }
2 β g Tr{(x−v)(x−v) I mβ
β
µ
=
=
Z
e
−βf
Ξ Z
Y
e
m
P
(x−va ) z0
a=1
−βg
"
̺
˘k
P
Dz0 ,
#
(245a)
(x−va ) z1
a=̺k
Dz1 ,
(245b)
k=0
where ̺k = kµβ−1 + 1, ̺˘k = (k + 1)µβ−1 , and Ξ = mβµ−1 − 1, the partition function is found as
Z R (β; µ|x) =
Z
Z "X
e−β[e(x−v)
2
+(f z0 +gz1 )(x−v)+u(v)]
v
# βµ
mβ
µ
Dz1
Dz0
(246)
with v ∈ X where we denoted µ in the argument of the partition function to indicate that the expression is determined
for a given µ. The normalized free energy of the spin glass of replicas then reads
FR (β, m; µ) = −
1
Ex log
βm
Z
"
mβ
# βµ
µ
Z X
−β[e(x−v)2 +(f z0 +gz1 )(x−v)+u(v)]
e
Dz1
Dz0 .
(247)
v
Using the Riesz equality and taking the limit m ↓ 0, the normalized free energy reduces to
"
# βµ
Z
Z X
2
1
Dz1 Dz0 .
FR (β; µ) = lim FR (β, m; µ) = − E log
e−β[e(x−v) +(f z0 +gz1 )(x−v)+u(v)]
m↓0
µ
(248)
v
In order to find the fixed point equations, we use (49); therefore,
X
χ
+ q + p m = Ex
kx − vk2 pβ
v|x (v|x),
β
v
X
χ µp µq
m = Ex
Tr{(x − v)(x − v)T I mβ ⊗ 1 βµ } pβ
+
+
v|x (v|x),
µ
β
β
β
v
X
χ µp
+
+ mq m = Ex
Tr{(x − v)(x − v)T 1m } pβ
v|x (v|x)
β
β
v
(249a)
(249b)
(249c)
where (249a), (249b) and (249c) are concluded by taking the trace, sum over the diagonal blocks and sum over all
the entries of the both sides of (49), respectively. To evaluate the right hand sides of (249a)-(249c), we take the
alternative approach and express the expectations as
Ex
kx − vk2 pβ
v|x (v|x) = m
X
Tr{(x − v)(x − v)T I mβ ⊗ 1 βµ } pβ
v|x (v|x) = −
X
Tr{(x − v)(x − v)T 1m } pβ
v|x (v|x) = −
v
Ex
v
Ex
∂ R
F (β, m; µ),
∂e
X
v
µ
(250a)
m ∂ R
F (β, m; µ),
βg ∂g
m ∂ R
F (β, m; µ).
βf ∂f
(250b)
(250c)
68
Taking the derivatives and limit m ↓ 0, the fixed point equations finally reduce to
2
x)2 e−β[e(x−v) +(f z0 +gz1 )(x−v)+u(v)] β
Λ̃ Dz1 Dz0
−β[e(x−v)2 +(f z0 +gz1 )(x−v)+u(v)]
ve
2
Z P
− x)z1 e−β[e(x−v) +(f z0 +gz1 )(x−v)+u(v)] β
1
v (v
P −β[e(x−v)2 +(f z +gz )(x−v)+u(v)]
χ + µp + µq = E
Λ̃ Dz1 Dz0 ,
0
1
g
ve
2
Z P
− x)z0 e−β[e(x−v) +(f z0 +gz1 )(x−v)+u(v)] β
1
v (v
P −β[e(x−v)
χ + µp = E
Λ̃ Dz1 Dz0
2 +(f z +gz )(x−v)+u(v)]
0
1
f
ve
χ
+q+p=E
β
with Λ̃β :=
R
Λβ Dz1
−1
Z P
−
v (v
P
(251a)
(251b)
(251c)
Λβ and Λβ being defined as
β
Λ :=
"
X
e
−β[e(x−v)2 +(f z0 +gz1 )(x−v)+u(v)]
v
# βµ
.
(252)
The replicas’ average distortion regarding the distortion function d(·; ·) is further determined by modifying the
Hamiltonian as
EhR (v|x) = E R (v|x) + h
m
X
d(va ; x)
(253)
a=1
with E R (v|x) given in (244), and taking the steps as in (244)-(247) to find the modified form of the normalized
free energy, i.e. FR (β, h, m; µ). The replicas’ average distortion then reads
∂ R
F (β, h, m; µ)|h=0
∂h
2
Z P
d(v; x)e−β[e(x−v) +(f z0 +gz1 )(x−v)+u(v)] β
vP
Λ̃ Dz1 Dz0 .
=E
−β[e(x−v)2 +(f z0 +gz1 )(x−v)+u(v)]
ve
DR (β; µ) = lim
m↓0
The analysis is concluded by taking the zero temperature limit. As β ↑ ∞, (251a)-(251c) read
Z
q + p = E (g − x)2 Λ̃Dz1 Dz0 ,
Z
1
χ + µq + µp = E (g − x)z1 Λ̃Dz1 Dz0 ,
g
Z
1
χ + µp = E (g − x)z0 Λ̃Dz1 Dz0 ,
f
(254a)
(254b)
(255a)
(255b)
(255c)
where g is defined as
g := arg min e(x − v)2 + (f z0 + gz1 )(x − v) + u(v)
v
and Λ̃ :=
R
ΛDz1
−1
(256)
Λ with Λ denoting
Λ := lim Λβ
(257a)
β↑∞
= e−µ[e(x−g)
2
+(f z0 +gz1 )(x−g)+u(g)]
.
(257b)
69
Moreover, the asymptotic distortion for a given µ reads
Z
DW = E d(g; x)Λ̃Dz1 Dz0 .
(258)
(248) as well as (255a)-(258) are determined in terms of µ. Moreover, for a given µ, multiple solution to the fixed
point equations can be found. Proposition IV.1 suggests us to choose the solution which minimizes the free energy.
Therefore, one needs to find the optimal µ, and its corresponding χ, p and q, such that the free energy meets its
minimum value. As the second law of thermodynamics is satisfied at any inverse temperature, we should initially
search for the optimal µ considering a given β. We, then, find the corresponding χ, p, and q which minimize the
zero temperature free energy. Using Proposition IV.1, the free energy at the inverse temperature β for a given µ is
written as
F(β; µ) =
1
2λ
Z
0
1
Fβ (ω; µ)dω − Fβ (1; µ) + FR (β; µ)
(259)
where the function Fβ (·; µ) is defined as
1 d
F (ω; µ) =
µ dω
β
Z
[χ+µp]ω
χω
χ + µp
χ + µp d
χ
χ
t
ωRJ (−
ω) .
RJ (− )dt + RJ (− ω) + q − λ0
λ
β
λ
λ
dω
λ
(260)
To find µ at the thermal equilibrium, we let
∂
F(β; µ) = 0
∂µ
Using the equalities (243a)-(243c), (261) concludes that µ satisfies
Z χ+µp
1
χ
χ
χ + µp
1
t
R
pRJ (− ) + qRJ (− ) − qRJ (−
) = F (β; µ) +
RJ (− )dt
2λ
λ
λ
λ
2λµ χ
λ
"
#
Z
X
2
1
+E
log
e−β[e(x−v) +(f z0 +gz1 )(x−v)+u(v)] Λ̃β Dz1 Dz0
β
v
which as β ↑ ∞ reduces to
Z χ+µp
Z
χ
χ
χ + µp
1
1
t
1
pRJ (− ) + qRJ (− ) − qRJ (−
) =
RJ (− )dt + E
log Λ̃ Λ̃Dz1 Dz0 .
2λ
λ
λ
λ
2λµ χ
λ
µ
(261)
(262)
(263)
Denoting the solution to (263) by µ⋆ , the free energy of the corresponding spin glass is then given as F(β) =
F(β; µ⋆ ) which at the zero temperature reads
Z 1
Z
Z
1
1
0
∞
∞
F =
F (ω)dω − F (1) − E log
ΛDz1 Dz0
2λ 0
µ
(264)
with
F∞ (ω) := lim Fβ (ω; µ⋆ ).
β↑∞
−1 2
−1 2
−1
g1 , Proposition VI.1 is concluded.
f and λs1 := 4e2
Finally by defining λs := [2e] , λs0 := 4e2
(265)
70
A PPENDIX D
P ROOF
OF
P ROPOSITION VI.3
The strategy here is to extend the approach in Appendix C to a general number of breaking steps. Following
Appendix E and considering Q as
Q=
b
X
χ
Im +
pκ I mβ ⊗ 1 µβκ + q1m ,
µκ
β
κ=1
(266)
the frequency domain correlation matrix R := TRJ (−2βTQ) is written as
b
X
gκ2
f2
I mβ ⊗ 1 µβκ − β 1m
R = eIm − β
2 µκ
2
κ=1
(267)
T
considering a given vector µ = [µ1 , . . . , µb ] , such that
µκ+1 = ϑκ+1 µκ ,
(268)
with {ϑκ } being non-negative integers, e, f and {gκ } are then found in terms of χ, q and {pκ } by letting
T
T Q
λR
a = λa RJ (−2βλa λa )
(269)
Q
T
for a ∈ [1 : m] where λR
a , λa and λa denote the ath corresponding eigenvalues of R, Q and T. As long as the
constraint in (268) holds, Q, T and R have b + 2 different sets of corresponding eigenvalues specified by
•
•
•
•
b
X
)
b
gκ2
mβλ0
f 2 χ X µκ
1
e−
µκ
1−
with multiplicity Θb+1 (m) = 1,
− mβ , +
pκ
+ mq,
2
2 β κ=1
β
2λ
λ + mβλ0
κ=1
)
(
b
b
X
g 2 χ X µκ 1
with multiplicity Θb (m) = mβµ−1
pκ ,
e−
µκ κ , +
b − 1,
2
β
β
2λ
κ=1
κ=1
)
(
κ
κ
X
gς2 χ X µς 1
−1
with multiplicity Θκ (m) = mβ µ−1
pς ,
e−
µς , +
κ − µκ+1 for κ ∈ [1 : b − 1], and
2 β ς=1 β 2λ
ς=1
χ 1
e, ,
with multiplicity Θ0 (m) = m − mβµ−1
1 .
β 2λ
(
Substituting in (269) e, f and {gκ } for κ ∈ [1 : b] are determined in terms of χ, q and {pκ } as
χ
1
RJ (− ),
2λ λ
χ̃κ−1
1
χ̃κ
2
RJ (−
gκ =
) − RJ (− ) ,
λµκ
λ
λ
1
χ̃
∂
b
2
f = 2
[λ0 χ̃b − λq] RJ (− ) .
λ ∂ χ̃b
λ
e=
(270a)
(270b)
(270c)
where we define χ̃0 := χ and
χ̃κ := χ +
κ
X
ς=1
µς p ς
(271)
71
for κ ∈ [1 : b]. The Hamiltonian of the spin glass of replicas is then determined as in (47). Substituting the
Hamiltonian in (51) and using the equalities
1 2 2
T
e 2 β f Tr{(x−v)(x−v) 1m }
e
1 2 2
T
⊗1 µκ }
2 β gκ Tr{(x−v)(x−v) I mβ
β
µ
κ
=
=
Z
e−βf [
Ξκ Z
Y
e
k=0
Pm
a=1 (x−va )
−βgκ
]z0 Dz ,
0
κ
̺
˘k
P
a=̺κ
k
(272a)
(x−va )zκ
Dzκ ,
(272b)
with ̺κk = kµκ β−1 + 1, ̺˘κk = (k + 1)µκ β−1 , and Ξκ = mβµ−1
κ − 1, the partition function finally reads
Z R (β; µ|x) =
Z
b
^
ς=2
Z
Z
X
e
"
−β e(x−v)2 +(f z0 +
b
P
β
gκ zκ )(x−v)+u(v)
κ=1
v
with v ∈ X where for the sequences {ξς } and {zς } we define
b Z
^
ς=1
# µ1
µς
µς−1
Dz1
mβ
µb
Dzς
#ξb
ξ2
Z " Z Z
ξ1
Dz2 · · ·
Dzb .
···
F Dz1
F Dzς :=
ξς
Dz0
(273)
(274)
Consequently, one evaluates the free energy as in (52) which by using the Riesz equality when m ↓ 0 reduces to
"
# µς
µς−1
b
P
Z
2
b Z
−β
e(x−v)
+(f
z
+
g
z
)(x−v)+u(v)
^
X
0
κ κ
1
R
κ=1
(275)
F (β; µ) = − E log
Dzς Dz0
e
µb
ς=1
v
where we have defined µ0 = β for sake of compactness. The fixed point equations are, moreover, found via (49)
where we have
#
b
X
χ X
+
pκ + q m = E x
kx − vk2 pβ
v|x (v|x),
β κ=1
v
!#
b
X
µκ X
+
pς + q
m = Ex
Tr{(x − v)(x − v)T I mβ ⊗ 1 µβκ } pβ
v|x (v|x),
µκ
β ς=κ
v
X
χ̃b
+ mq m = Ex
Tr{(x − v)(x − v)T 1m } pβ
v|x (v|x)
β
v
"
"
χ̃κ−1
β
(276a)
(276b)
(276c)
for κ ∈ [1 : b]. (276a) and (276c) are found by taking trace and sum over all the entries from both sides of (49),
respectively. (276b) is moreover concluded by adding up the entries over the diagonal blocks of size µκ β−1 . The
right hand sides of (276a)-(276c) can then be evaluated using the equalities
Ex
kx − vk2 pβ
v|x (v|x) = m
X
Tr{(x − v)(x − v)T I mβ ⊗ 1 µβκ } pβ
v|x (v|x) = −
X
Tr{(x − v)(x − v)T 1m } pβ
v|x (v|x) = −
v
Ex
v
Ex
∂ R
F (β, m; µ),
∂e
X
v
µκ
(277a)
m ∂ R
F (β, m; µ),
βgκ ∂gκ
m ∂ R
F (β, m; µ).
βf ∂f
(277b)
(277c)
72
Thus, the fixed point equations are finally concluded as
b
χ X
+
pκ + q = E
β κ=1
χ̃κ−1 + µκ
b
X
Z P
1
E
f
Z P
− x)2 e
P
v
pς + q
ς=κ
χ̃b =
v (v
!
=
e
1
E
gκ
"
−β e(x−v)2 +(f z0 +
"
−β e(x−v)2 +(f z0 +
Z P
v (v
P
− x)z0 e
P
v
e
"
e(x−v)2 +(f z
b
P
0+
κ=1
gκ zκ )(x−v)+u(v)
"
−β e(x−v)2 +(f z0 +
"
−β e(x−v)2 +(f z0 +
b
P
gκ zκ )(x−v)+u(v)
κ=1
gκ zκ )(x−v)+u(v)
κ=1
for κ ∈ [1 : b] in which we denote Λ̃β
κ :=
Λβ
κ Dzκ
R
b
P
#
#
b
P
b
Y
Λ̃β
κ Dzκ Dz0
gκ zκ )(x−v)+u(v)
κ=1
gκ zκ )(x−v)+u(v)
κ=1
−1
#
#
b
Y
(278a)
κ=1
#
×
#
×
−β e(x−v)2 +(f z0 +
"
−β
e
gκ zκ )(x−v)+u(v)
κ=1
− x)zκ e
v
v (v
b
P
b
P
b
Y
Λ̃β
κ Dzκ Dz0
(278b)
κ=1
Λ̃β
κ Dzκ Dz0 .
(278c)
κ=1
β
Λβ
κ with Λ1
"
# µ1
b
β
P
2
X −β e(x−v) +(f z0 + gκ zκ )(x−v)+u(v)
β
κ=1
Λ1 :=
e
(279)
v
and {Λβ
κ } for κ ∈ [2 : b] being recursively defined as
Λβ
κ
:=
Z
Λβ
κ−1
Dzκ−1
µκ
µκ−1
.
(280)
The replicas’ average distortion regarding the distortion function d(·; ·) is further determined using the Hamiltonian
modification technique employed in Appendix B and C. After modifying the Hamiltonian and taking the derivatives,
the average distortion at the inverse temperature β is given by
DR (β; µ) = E
Z P
v
d(v; x)e
P
v
e
"
−β e(x−v)2 +(f z0 +
"
−β
e(x−v)2 +(f z
0+
b
P
b
P
gκ zκ )(x−v)+u(v)
κ=1
gκ zκ )(x−v)+u(v)
κ=1
#
#
b
Y
Λ̃β
κ Dzκ Dz0 .
(281)
κ=1
Finally, by taking the limit β ↑ ∞, we find the asymptotic distortion as
DW = E
Z
d(g; x)
b
Y
Λ̃κ Dzκ Dz0
(282)
κ=1
where g is defined as
"
2
g := arg min e(x − v) + (f z0 +
v
b
X
κ=1
#
gκ zκ )(x − v) + u(v) ,
(283)
73
β
and Λ̃κ denotes the limiting factor Λ̃∞
κ . Considering the definition of Λ̃κ , Λ̃κ reads Λ̃κ =
Λ1 := e
"
−µ1 e(x−g)2 +(f z0 +
b
P
gκ zκ )(x−g)+u(g)
κ=1
#
R
Λκ Dzκ
−1
Λκ with
(284)
and {Λκ } for κ ∈ [2 : b]
Λκ :=
Z
Λκ−1 Dzκ−1
µκ
µκ−1
.
(285)
Moreover, the fixed point equations reduce to
b
X
pκ + q = E
κ=1
b
X
χ̃κ−1 + µκ
pς + q
ς=κ
!
Z
(g − x)2
1
=
E
gκ
1
χ̃b = E
f
Z
Z
b
Y
Λ̃κ Dzκ Dz0 ,
(286a)
κ=1
(g − x)zκ
(g − x)z0
b
Y
Λ̃κ Dzκ Dz0 ,
(286b)
κ=1
b
Y
Λ̃κ Dzκ Dz0 ,
(286c)
κ=1
for κ ∈ [1 : b].
As in the 1RSB ansatz, we set µ to be the extreme point of the free energy at a given inverse temperature β,
in order to satisfy the second law of thermodynamics. The solution needs to be found over the set of non-negative
real vectors which satisfy the constraint in (268). The parameters of the ansatz, however, are finally taken such that
the zero temperature free energy is minimized.
Using Proposition IV.1, the free energy of the corresponding spin glass for a given vector µ is written as
Z 1
1
β
β
F(β; µ) =
F (ω; µ)dω − F (1; µ) + FR (β; µ)
(287)
2λ 0
where the function Fβ (·; µ) is defined as
Fβ (ω; µ) =
Z χ̃κ ω
b
X
1 d
χ̃b
d
χ
χ
λ0
t
ωRJ (− ω) .
RJ (− )dt + RJ (− ω) + q − χ̃b
µ dω χ̃κ−1 ω
λ
β
λ
λ
dω
λ
κ=1 κ
(288)
Therefore, the vector µ⋆ , for a given β, is set as
µ⋆ = arg min F(β; µ)
(289)
µ
with µ ∈
Sµ where Sµ is the set of non-negative real vectors satisfying the constraint in (268). By substituting
(270a)-(270c) in (288), µ⋆ reduces to
µ⋆ = arg min
µ
with µ ∈ Sµ where ∆(·) reads
1
∆(µ) :=
e
(
1
2λ
Z
0
1
Fβ (ω; µ)dω + FR (β; µ) − e∆(µ)
b
X
1
f2
ẽ0 χ̃0
[ẽκ χ̃κ − ẽκ−1 χ̃κ−1 ] +
+ ẽb q −
χ̃b
µ
β
2
κ=1 κ
(290)
)
(291)
74
with ẽ0 := e and
ẽκ := e −
κ
X
µς
ς=1
gς2
2
(292)
for κ ∈ [1 : b]. The vector µ⋆ is then determined such that it minimizes the free energy . Finally by taking the
limit β ↑ ∞, the zero temperature free energy is evaluated as
Z 1
Z
Z
1
1
0
∞
∞
F =
F (ω)dω − F (1) − E log
Λb Dzb Dz0
2λ 0
µb
(293)
where we define
F∞ (ω) := lim Fβ (ω; µ⋆ ).
β↑∞
(294)
−1 2
−1 2
−1
gκ for κ ∈ [1 : b], and defining the sequence {ζκ }
f and λsκ := 4e2
Denoting λs := [2e] , λs0 := 4e2
such that ζ0 = 1 and
ζκ := 1 −
for κ ∈ [1 : b], Proposition VI.3 is concluded.
κ
X
ς=1
µς
λsς
λs
(295)
75
A PPENDIX E
G ENERAL RSB F REQUENCY D OMAIN C ORRELATION M ATRIX
Consider the spin glass of replicas defined in Definition IV.1, the Hamiltonian reads
E R (v|x) = (x − v)T R(x − v) + u(v).
(296)
where R := TRJ (−2βTQ) is referred to as the “frequency domain correlation matrix”. In this appendix, we show
that under the general RSB assumption on Q, including the RS case, the frequency domain correlation matrix has
the same structure with different scalar coefficients. To show that, let the correlation matrix be of the form
Q = q0 Im +
b
X
i=1
qi I ξm ⊗ 1ξi + qb+1 1m
i
(297)
for some integer b where q0 , qb+1 6= 0. (297) represents the bRSB as well as RS structures by setting the coefficients
correspondingly. Considering T as defined in (48), TQ is then written as
βλ0
1
Q−
1m Q .
TQ =
2λ
λ + mβλ0
(298)
Defining the vector um×1 as a vector with all entries equal to 1, it is clear that u is an eigenvector of Q, and
therefore, by denoting the eigendecomposition of Q as VDQ VT , 1m reads
1m = uuT = VD1 VT
(299)
where D1 is a diagonal matrix in which all the diagonal entries expect the entry corresponding to the eigenvector
u are zero. Consequently, (298) reduces to
TQ =
βλ0
1
D1 DQ VT
V DQ −
2λ
λ + mβλ0
(300)
which states that TQ and Q span the same eigenspace. The eigenvalues of TQ and Q are also distributed with
the same frequencies. In fact, as the eigenvalue corresponding to u occurs with multiplicity 1, the second term
on the right hand side of (298) does not change the distribution of eigenvalues and only modifies the eigenvalue
corresponding to u. Therefore, TQ can be also represented as in (297) with different scalar coefficient.
To extend the scope of the analysis to R, we note that the function RJ (·) is strictly increasing for any FJ different
from the single mass point CDF1 [43]. Consequently, the eigenvalues’ distribution remains unchanged, and thus,
R = r0 Im +
b
X
i=1
ri I ξm ⊗ 1ξi + rb+1 1m .
i
(301)
for some real {ri }. In the case that FJ is the single mass point CDF, the R-transform becomes a constant function
which results in RJ (−2βTQ) = KIm for some constant K. Therefore, R = KT which is again represented as in
(301) by setting ri = 0 for i ∈ [1 : b]. This concludes that R has the same structure as Q for any FJ .
1 In
the single mass point CDF, we have FJ (λ) = 1{λ ≥ K} for some real constant K.
76
A PPENDIX F
A SYMPTOTICS
OF
S PHERICAL I NTEGRAL
Consider µζn to be the Haar measure on the orthogonal group
On for ζ = 1, and on the unitary group Un for
ζ = 2. Let Gn and Dn be n × n matrices; then, the integral of the form
Z
†
ζ
In (Gn , Dn ) := enTr{UGn U Dn } dµζn (U),
(302)
is known as the “spherical integral”. This integral has been extensively studied in the mathematics literature, as well
as physics where it is often called “Harish-Chandra” or “Itzykson & Zuber” integral. In a variety of problems, such
as ours, the evaluation of spherical integrals in asymptotic regime is interesting, and therefore, several investigations
have been done on this asymptotics. In [74], the asymptotics of the integral has been investigated when the matrices
Gn and Dn have n distinct eigenvalues with converging spectrums, and under some assumptions, a closed form
formula has been given; however, the final formula in [74] is too complicated and hard to employ. In [75], the
authors showed that, for a low-rank Gn , the asymptotics of the integral can be written directly in terms of the
R-transform corresponding to the asymptotic eigenvalue distribution of Dn . As long as the replica analysis is being
considered, we can utilize the result from [75], since the number of replicas can be considered to be small enough.
In [75], Theorem 1.2, it is shown that when Gn is a rank-one matrix, under the assumption that the spectrum of
Dn asymptotically converges to a deterministic CDF FD with compact and finite length support, the asymptotics
of the integral can be written in terms of the R-transform RD (·) as
1
log Iζn (Gn , Dn ) =
n↑∞ n
lim
Z
θ
RD (
0
2ω
)dω,
ζ
(303)
in which θ denotes the single nonzero eigenvalue of Gn . The authors further showed in Theorem 1.7 that in the
√
case of rank(Gn ) = O( n), under the same assumption as in Theorem 1.2, the spherical integral asymptotically
factorizes into product of rank-one integrals, and therefore,
m
X
1
log Iζn (Gn , Dn ) =
n↑∞ n
i=1
lim
Z
0
θi
RD (
2ω
)dω,
ζ
(304)
with {θi } denoting the nonzero eigenvalues of Gn for i ∈ [1 : m], and m = rank(Gn ).
In Appendix A, one can employ (304) in order to evaluate the asymptotics over the system matrix consistent to
the system setup illustrated in Section II. Moreover, by using the above discussion, the investigations in Appendix
A can be extended to the case of complex variables. More about the spherical integral and its asymptotics can be
found in [75], and the references therein.
77
R EFERENCES
[1] S. F. Edwards and P. W. Anderson, “Theory of spin glasses,” Journal of Physics F: Metal Physics, vol. 5, no. 5, p. 965, 1975.
[2] L. Pastur and M. Shcherbina, “Absence of self-averaging of the order parameter in the Sherrington-Kirkpatrick model,” Journal of Statistical
Physics, vol. 62, no. 1-2, pp. 1–19, 1991.
[3] F. Guerra and F. L. Toninelli, “The thermodynamic limit in mean field spin glass models,” Communications in Mathematical Physics, vol.
230, no. 1, pp. 71–79, 2002.
[4] ——, “The infinite volume limit in generalized mean field disordered models,” arXiv preprint cond-mat/0208579, 2002.
[5] S. B. Korada and N. Macris, “Tight bounds on the capacity of binary input random CDMA systems,” Information Theory, IEEE Transactions
on, vol. 56, no. 11, pp. 5590–5613, 2010.
[6] N. Merhav, Statistical physics and information theory.
Now Publishers Inc, 2010.
[7] M. Mézard and G. Parisi, “A replica analysis of the travelling salesman problem,” Journal de Physique, vol. 47, no. 8, pp. 1285–1296,
1986.
[8] Y. Fu and P. W. Anderson, “Application of statistical mechanics to NP-complete problems in combinatorial optimisation,” Journal of
Physics A: Mathematical and General, vol. 19, no. 9, p. 1605, 1986.
[9] H. Nishimori, Statistical physics of spin glasses and information processing: an introduction.
Clarendon Press, 2001, no. 111.
[10] A. Montanari, “Turbo codes: The phase transition,” The European Physical Journal B-Condensed Matter and Complex Systems, vol. 18,
no. 1, pp. 121–136, 2000.
[11] T. Tanaka, “A statistical-mechanics approach to large-system analysis of CDMA multiuser detectors,” Information Theory, IEEE
Transactions on, vol. 48, no. 11, pp. 2888–2910, 2002.
[12] ——, “Average-case analysis of multiuser detectors,” 2001.
[13] D. Guo and S. Verdú, “Multiuser detection and statistical mechanics,” in Communications, Information and Network Security.
Springer,
2003, pp. 229–277.
[14] ——, “Randomly spread CDMA: Asymptotics via statistical physics,” Information Theory, IEEE Transactions on, vol. 51, no. 6, pp.
1983–2010, 2005.
[15] R. R. Müller, “Channel capacity and minimum probability of error in large dual antenna array systems with binary modulation,” IEEE
Transactions on Signal Processing, vol. 51, no. 11, pp. 2821–2828, 2003.
[16] R. Müller, D. Guo, and A. L. Moustakas, “Vector precoding for wireless MIMO systems and its replica analysis,” Selected Areas in
Communications, IEEE Journal on, vol. 26, no. 3, pp. 530–540, 2008.
[17] D. Guo, D. Baron, and S. Shamai, “A single-letter characterization of optimal noisy compressed sensing,” in Communication, Control, and
Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on.
IEEE, 2009, pp. 52–59.
[18] J. Barbier and F. Krzakala, “Replica analysis and approximate message passing decoder for superposition codes,” in Information Theory
(ISIT), 2014 IEEE International Symposium on.
IEEE, 2014, pp. 1494–1498.
[19] A. Montanari and D. Tse, “Analysis of belief propagation for non-linear problems: The example of CDMA (or: How to prove Tanaka’s
formula),” in Information Theory Workshop, 2006. ITW’06 Punta del Este. IEEE. IEEE, 2006, pp. 160–164.
[20] W. Huleihel and N. Merhav, “Asymptotic MMSE analysis under sparse representation modeling,” Signal Processing, vol. 131, pp. 320–332,
2017.
[21] G. Reeves and H. D. Pfister, “The replica-symmetric prediction for compressed sensing with Gaussian matrices is exact,” in Information
Theory (ISIT), 2016 IEEE International Symposium on. IEEE, 2016, pp. 665–669.
[22] J. Barbier, M. Dia, N. Macris, and F. Krzakala, “The mutual information in random linear estimation,” in Communication, Control, and
Computing (Allerton), 2016 54th Annual Allerton Conference on. IEEE, 2016, pp. 625–632.
[23] J. Barbier, N. Macris, M. Dia, and F. Krzakala, “Mutual information and optimality of approximate message-passing in random linear
estimation,” arXiv preprint arXiv:1701.05823, 2017.
[24] J. Barbier, M. Dia, and N. Macris, “Threshold saturation of spatially coupled sparse superposition codes for all memoryless channels,” in
Information Theory Workshop (ITW), 2016 IEEE. IEEE, 2016, pp. 76–80.
[25] ——, “Universal sparse superposition codes with spatial coupling and GAMP decoding,” arXiv preprint arXiv:1707.04203, 2017.
[26] D. Guo, S. Verdú, and L. K. Rasmussen, “Asymptotic normality of linear multiuser receiver outputs,” Information Theory, IEEE Transactions
on, vol. 48, no. 12, pp. 3080–3095, 2002.
78
[27] D. N. Tse and S. V. Hanly, “Linear multiuser receivers: Effective interference, effective bandwidth and user capacity,” Information Theory,
IEEE Transactions on, vol. 45, no. 2, pp. 641–657, 1999.
[28] D. N. Tse and O. Zeitouni, “Linear multiuser receivers in random environments,” Information Theory, IEEE Transactions on, vol. 46,
no. 1, pp. 171–188, 2000.
[29] Y. C. Eldar and A. M. Chan, “On the asymptotic performance of the decorrelator,” Information Theory, IEEE Transactions on, vol. 49,
no. 9, pp. 2309–2313, 2003.
[30] S. Verdú and S. Shamai, “Spectral efficiency of CDMA with random spreading,” Information Theory, IEEE Transactions on, vol. 45, no. 2,
pp. 622–640, 1999.
[31] J. Zhang, E. K. Chong, and D. N. Tse, “Output MAI distributions of linear MMSE multiuser receivers in DC-CDMA systems,” Information
Theory, IEEE Transactions on, vol. 47, no. 3, pp. 1128–1144, 2001.
[32] A. M. Tulino and S. Verdú, “Random matrix theory and wireless communications,” Communications and Information theory, vol. 1, no. 1,
pp. 1–182, 2004.
[33] R. R. Müller, G. Alfano, B. M. Zaidel, and R. de Miguel, “Applications of large random matrices in communications engineering,” arXiv
preprint arXiv:1310.5479, 2013.
[34] D. Guo, L. K. Rasmussen, and T. J. Lim, “Linear parallel interference cancellation in long-code CDMA multiuser detection,” Selected
Areas in Communications, IEEE Journal on, vol. 17, no. 12, pp. 2074–2081, 1999.
[35] S. Shamai and S. Verdú, “The impact of frequency-flat fading on the spectral efficiency of CDMA,” Information Theory, IEEE Transactions
on, vol. 47, no. 4, pp. 1302–1327, 2001.
[36] R. R. Müller and W. H. Gerstacker, “On the capacity loss due to separation of detection and decoding,” Information Theory, IEEE
Transactions on, vol. 50, no. 8, pp. 1769–1778, 2004.
[37] R. R. Müller, “On channel capacity, uncoded error probability, ML-detection, and spin glasses,” in Proc. Workshop on Concepts in
Information Theory.
Citeseer, 2002, pp. 79–81.
[38] S. Rangan, A. K. Fletcher, and V. Goyal, “Asymptotic analysis of MAP estimation via the replica method and applications to compressed
sensing,” in IEEE Transactions on Information Theory, 2012, pp. 1902–1923.
[39] A. M. Tulino, G. Caire, S. Verdu, and S. Shamai, “Support recovery with sparsely sampled free random matrices,” Information Theory,
IEEE Transactions on, vol. 59, no. 7, pp. 4243–4271, 2013.
[40] M. Vehkaperä, Y. Kabashima, and S. Chatterjee, “Analysis of regularized LS reconstruction and random matrix ensembles in compressed
sensing,” IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 2100–2124, 2016.
[41] M. Yoshida, T. Uezu, T. Tanaka, and M. Okada, “Statistical mechanical study of code-division multiple-access multiuser detectorsanalysis
of replica symmetric and one-step replica symmetry breaking solutions,” Journal of the Physical Society of Japan, vol. 76, no. 5, pp.
054 003–054 003, 2007.
[42] Y. Kabashima, T. Wadayama, and T. Tanaka, “A typical reconstruction limit for compressed sensing based on ℓp -norm minimization,”
Journal of Statistical Mechanics: Theory and Experiment, vol. 2009, no. 09, p. L09003, 2009.
[43] B. M. Zaidel, R. Müller, A. L. Moustakas, and R. de Miguel, “Vector precoding for Gaussian MIMO broadcast channels: Impact of replica
symmetry breaking,” Information Theory, IEEE Transactions on, vol. 58, no. 3, pp. 1413–1440, 2012.
[44] M. A. Sedaghat, A. Bereyhi, and R. Mueller, “LSE precoders for massive MIMO with hardware constraints: Fundamental limits,” arXiv
preprint arXiv:1612.07902, 2016.
[45] A. Bereyhi, M. A. Sedaghat, and R. R. Müller, “Asymptotics of nonlinear LSE precoders with applications to transmit antenna selection,”
in Information Theory (ISIT), 2017 IEEE International Symposium on.
IEEE, 2017, pp. 81–85.
[46] K. Takeda and Y. Kabashima, “Statistical mechanical assessment of a reconstruction limit of compressed sensing: Toward theoretical
analysis of correlated signals,” EPL (Europhysics Letters), vol. 95, no. 1, p. 18006, 2011.
[47] D. L. Donoho, “Compressed sensing,” Information Theory, IEEE Transactions on, vol. 52, no. 4, pp. 1289–1306, 2006.
[48] E. J. Candès, J. Romberg, and T. Tao, “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency
information,” Information Theory, IEEE Transactions on, vol. 52, no. 2, pp. 489–509, 2006.
[49] E. J. Candes and T. Tao, “Near-optimal signal recovery from random projections: Universal encoding strategies?” Information Theory,
IEEE Transactions on, vol. 52, no. 12, pp. 5406–5425, 2006.
[50] D. L. Donoho and X. Huo, “Uncertainty principles and ideal atomic decomposition,” Information Theory, IEEE Transactions on, vol. 47,
no. 7, pp. 2845–2862, 2001.
79
[51] M. Elad and A. M. Bruckstein, “A generalized uncertainty principle and sparse representation in pairs of bases,” Information Theory, IEEE
Transactions on, vol. 48, no. 9, pp. 2558–2567, 2002.
[52] D. L. Donoho and M. Elad, “Optimally sparse representation in general (nonorthogonal) dictionaries via ℓ1 minimization,” Proceedings
of the National Academy of Sciences, vol. 100, no. 5, pp. 2197–2202, 2003.
[53] R. Tibshirani, “Regression shrinkage and selection via the LASSO,” Journal of the Royal Statistical Society. Series B (Methodological),
pp. 267–288, 1996.
[54] S. S. Chen, D. L. Donoho, and M. A. Saunders, “Atomic decomposition by basis pursuit,” SIAM review, vol. 43, no. 1, pp. 129–159, 2001.
[55] D. Needell and J. A. Tropp, “Cosamp: Iterative signal recovery from incomplete and inaccurate samples,” Applied and Computational
Harmonic Analysis, vol. 26, no. 3, pp. 301–321, 2009.
[56] W. Dai and O. Milenkovic, “Subspace pursuit for compressive sensing signal reconstruction,” Information Theory, IEEE Transactions on,
vol. 55, no. 5, pp. 2230–2249, 2009.
[57] T. T. Cai and L. Wang, “Orthogonal matching pursuit for sparse signal recovery with noise,” Information Theory, IEEE Transactions on,
vol. 57, no. 7, pp. 4680–4688, 2011.
[58] S. Foucart and H. Rauhut, A mathematical introduction to compressive sensing.
Birkhäuser Basel, 2013, vol. 1, no. 3.
[59] Y. Kabashima, T. Wadayama, and T. Tanaka, “Statistical mechanical analysis of a typical reconstruction limit of compressed sensing,”
arXiv preprint arXiv:1001.4298, 2010.
[60] C.-K. Wen, J. Zhang, K.-K. Wong, J.-C. Chen, and C. Yuen, “On sparse vector recovery performance in structurally orthogonal matrices
via LASSO,” IEEE Transactions on Signal Processing, vol. 64, no. 17, pp. 4519–4533, 2016.
[61] L. Zheng, A. Maleki, H. Weng, X. Wang, and T. Long, “Does ℓp -minimization outperform ℓ1 -minimization?” IEEE Transactions on
Information Theory, 2017.
[62] D. L. Donoho, A. Maleki, and A. Montanari, “Message-passing algorithms for compressed sensing,” Proceedings of the National Academy
of Sciences, vol. 106, no. 45, pp. 18 914–18 919, 2009.
[63] ——, “Message passing algorithms for compressed sensing: I. Motivation and construction,” in Information Theory (ITW 2010, Cairo),
2010 IEEE Information Theory Workshop on. IEEE, 2010, pp. 1–5.
[64] S. Rangan, “Generalized approximate message passing for estimation with random linear mixing,” in Information Theory Proceedings
(ISIT), 2011 IEEE International Symposium on.
IEEE, 2011, pp. 2168–2172.
[65] A. Montanari, “Graphical models concepts in compressed sensing,” Compressed Sensing: Theory and Applications, pp. 394–438, 2012.
[66] M. Bayati and A. Montanari, “The dynamics of message passing on dense graphs, with applications to compressed sensing,” IEEE
Transactions on Information Theory, vol. 57, no. 2, pp. 764–785, 2011.
[67] E. Bolthausen, “On the high-temperature phase of the Sherrington-Kirkpatrick model,” in Seminar at EURANDOM, Eindhoven, 2009.
[68] S. Rangan, P. Schniter, and A. K. Fletcher, “Vector approximate message passing,” in Information Theory (ISIT), 2017 IEEE International
Symposium on. IEEE, 2017, pp. 1588–1592.
[69] K. Takeuchi, “Rigorous dynamics of expectation-propagation-based signal recovery from unitarily invariant measurements,” arXiv preprint
arXiv:1701.05284, 2017.
[70] D. L. Donoho, A. Javanmard, and A. Montanari, “Information-theoretically optimal compressed sensing via spatial coupling and
approximate message passing,” IEEE transactions on information theory, vol. 59, no. 11, pp. 7434–7464, 2013.
[71] F. Krzakala, M. Mézard, F. Sausset, Y. Sun, and L. Zdeborová, “Statistical-physics-based reconstruction in compressed sensing,” Physical
Review X, vol. 2, no. 2, p. 021005, 2012.
[72] Y. Wu and S. Verdú, “Optimal phase transitions in compressed sensing,” Information Theory, IEEE Transactions on, vol. 58, no. 10, pp.
6241–6263, 2012.
[73] ——, “MMSE dimension,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 4857–4879, 2011.
[74] A. Guionnet and O. Zeitouni, “Large deviations asymptotics for spherical integrals,” Journal of functional analysis, vol. 188, no. 2, pp.
461–515, 2002.
[75] A. Guionnet, M. Maı et al., “A fourier view on the R-transform and related asymptotics of spherical integrals,” Journal of functional
analysis, vol. 222, no. 2, pp. 435–490, 2005.
[76] N. I. Akhiezer, The classical moment problem: and some related questions in analysis.
Oliver & Boyd, 1965, vol. 5.
[77] B. Simon, “The classical moment problem as a self-adjoint finite difference operator,” Advances in Mathematics, vol. 137, no. 1, pp.
82–203, 1998.
80
[78] A. Bereyhi, R. Müller, and H. Schulz-Baldes, “RSB decoupling property of MAP estimators,” in Information Theory Workshop (ITW),
2016 IEEE. IEEE, 2016, pp. 379–383.
[79] A. Bereyhi, R. R. Müller, and H. Schulz-Baldes, “Replica symmetry breaking in compressive sensing,” in Information Theory and
Applications Workshop (ITA), 2017 IEEE. IEEE, 2017, pp. 1–7.
[80] F. Riesz, “Sur les valeurs moyennes des fonctions,” Journal of the London Mathematical Society, vol. 1, no. 2, pp. 120–121, 1930.
[81] A. Dembo and O. Zeitouni, Large deviations techniques and applications.
[82] M. Mezard and A. Montanari, Information, physics, and computation.
Springer Science & Business Media, 2009, vol. 38.
Oxford University Press, 2009.
[83] G. Parisi, “A sequence of approximated solutions to the SK model for spin glasses,” Journal of Physics A: Mathematical and General,
vol. 13, no. 4, p. L115, 1980.
[84] M. N. Hansen and E. M. Schmidt, Algorithms and data structures: transition systems.
Datalogisk Institut, Aarhus Universitet, 2003.
[85] A. Finkel and P. Schnoebelen, “Fundamental structures in well-structured infinite transition systems,” in LATIN’98: Theoretical Informatics.
Springer, 1998, pp. 102–118.
[86] R. Couillet and M. Debbah, Random matrix methods for wireless communications.
Cambridge University Press, 2011.
[87] A. L. Moustakas and S. H. Simon, “On the outage capacity of correlated multiple-path MIMO channels,” Information Theory, IEEE
Transactions on, vol. 53, no. 11, pp. 3887–3903, 2007.
[88] D. Agrawal and A. Vardy, “The turbo decoding algorithm and its phase trajectories,” IEEE Transactions on Information Theory, vol. 47,
no. 2, pp. 699–722, 2001.
[89] M. Talagrand, Spin glasses: a challenge for mathematicians: cavity and mean field models.
Springer Science & Business Media, 2003,
vol. 46.
[90] F. Guerra and F. L. Toninelli, “Quadratic replica coupling in the Sherrington–Kirkpatrick mean field spin glass model,” Journal of
Mathematical Physics, vol. 43, no. 7, pp. 3704–3716, 2002.
[91] F. Guerra, “Broken replica symmetry bounds in the mean field spin glass model,” Communications in mathematical physics, vol. 233,
no. 1, pp. 1–12, 2003.
[92] H. Chandra, “Differential operators on a semisimple Lie algebra,” American Journal of Mathematics, pp. 87–120, 1957.
[93] C. Itzykson and J.-B. Zuber, “The planar approximation. II,” Journal of Mathematical Physics, vol. 21, no. 3, pp. 411–421, 1980.
| 7cs.IT
|
Asking the Difficult Questions: Goal-Oriented Visual Question Generation
via Intermediate Rewards
Junjie Zhang∗2,3 , Qi Wu†1 , Chunhua Shen1 , Jian Zhang2 , Jianfeng Lu3 , and Anton van den Hengel1
arXiv:1711.07614v1 [cs.CV] 21 Nov 2017
1
Australian Centre for Robotic Vision, The University of Adelaide, Australia
Faculty of Engineering and Information Technology, University of Technology Sydney, Australia
3
School of Computer Science and Technology, Nanjing University of Science and Technology, China
2
Abstract
Hi, Robby, can you get my cup
from the cupboard?
Despite significant progress in a variety of vision-andlanguage problems, developing a method capable of asking
intelligent, goal-oriented questions about images is proven
to be an inscrutable challenge. Towards this end, we
propose a Deep Reinforcement Learning framework based
on three new intermediate rewards, namely goal-achieved,
progressive and informativeness that encourage the generation of succinct questions, which in turn uncover valuable
information towards the overall goal. By directly optimizing
for questions that work quickly towards fulfilling the overall
goal, we avoid the tendency of existing methods to generate
long series of insane queries that add little value. We evaluate our model on the GuessWhat?! dataset and show that
the resulting questions can help a standard Guesser identify
a specific object in an image at a much higher success rate.
Is it tall one?
No
Is it from IKEA?
Does it have Elsa on it?
Is it pink?
No
Yes
Does it have a handle?
I’ll get it myself ….
Brilliant!
Figure 1: Two illustrative examples of potential conversations between a
human and a robot. The left conversation clearly makes people frustrated
while the right one makes people happy because the robot achieves the
goal in a quicker way via less but informative questions.
A well-posed question extracts the most informative answer towards achieving a particular goal, and thus reflects
the knowledge of the asker, and their estimate of the capabilities of the answerer. Although the information would
be beneficial in identifying a particular object in an image,
there is little value in an agent asking a human about the
exact values of particular pixels, the statistics of their gradients, or the aspect ratio of the corresponding bounding box.
The fact that the answerer is incapable of providing the requested information makes such questions pointless. Selecting a question that has a significant probability of generating an answer that helps achieve a particular goal is a
complex problem.
Asking questions is an essential part of the way humans
communicate and learn. Any intelligent agent that seeks to
interact flexibly and effectively with humans thus needs to
be able to ask questions. The ability to ask intelligent questions is even more important than receiving intelligent, ac-
Judge a man by his questions rather than by his answers.
-Voltaire
Although Visual Question Answering (VQA) [3, 30, 31]
has attracted more attention, Visual Question Generation
(VQG) is a much more difficult task. Obviously, generating facile, repetitive questions represents no challenge at all,
but generating a series of questions that draw out useful information towards an overarching goal, however, demands
consideration of the image content, the goal, and the conversation thus far. It could, generally, also be seen as requiring consideration of the abilities and motivation of the
other participant in the conversation.
† The
Yes
No
1. Introduction
∗ The
Is it pink?
Is it short one?
Yes
work was done while visiting The University of Adelaide.
first two authors contributed to this work equally.
1
tionable answers. A robot, for example in Fig. 1, has been
given a task and realized that it is missing critical information required to carry it out, needs to ask a question. It will
have a limited number of attempts before the human gets
frustrated and carries out the task themselves. This scenario
applies equally to any intelligent agent that seeks to interact with humans, as we have surprisingly little tolerance for
agents that are unable to learn by asking questions, and for
those that ask too many.
As a result of the above, Visual Question Generation
(VQG) has started to receive research attention, but primarily as a vision-to-language problem [16, 20, 32]. Methods
that approach the problem in this manner tend to generate
arbitrary sequences of questions that are somewhat related
to the image [21], but which bare no relationship to the goal.
This reflects the fact that these methods have no means of
measuring whether the answers generated to assist in making progress towards the goal. Instead, in this paper, we
ground the VQG problem as a goal-oriented version of the
game - GuessWhat?!, introduced in [10]. The method presented in [10] to play the GuessWhat game is made up of
three components: the Questioner asks questions to the
Oracle, and the Guesser tries to identify the object that
the Oracle is referring to, based on its answers. The quality of the generated questions is thus directly related to the
success rate of the final task.
Goal-oriented training that uses a game setting has been
used in visual dialog generation previously [7, 8]. However, these work focus on generating more human-like dialogs, not on helping the agent achieve the goal through
better question generation. Moreover, previous work [26]
only uses the final goal as the reward to train the dialog generator, which might be suitable for dialog generation but is
a rather weak and undirected signal by which to control the
quality, effectiveness, and informativeness of the generated
question in a goal-oriented task. In other words, in some
cases, we want to talk to a robot because we want it to finish a specific task but not to hold the meaningless boring
chat. Therefore, in this paper, we use intermediate rewards
to encourage the agent to ask short but informative questions to achieve the goal. Moreover, in contrast to previous
works that only consider the overall goal as the reward, we
assign different intermediate rewards for each posed question to control the quality.
This is achieved through fitting the goal-oriented VQG
into a reinforcement learning (RL) paradigm and devising
three different intermediate rewards, which are our main
contributions in this paper, to explicitly optimize the question generation. The first goal-achieved reward is designed
to encourage the agent to achieve the final goal (pick out
the object that the Oracle is ‘thinking’) via asking multiple questions. However, different from only considering whether the goal is achieved, additional rewards are
awarded if the agent can use fewer questions to achieve it.
This is a reasonable setting because you do not need a robot
that can finish a task but has to ask you hundreds of questions. The second reward we proposed is the progressive
reward, which is established to encourage questions that
generated by the agent can progressively increase the probability of the right answer. This is an intermediate reward
for the individual question, and the reward is decided by
the change of the ground-truth answer probability. A negative reward will be given if the probability decreases. The
last reward is the informativeness reward, which is used to
restrict the agent not to ask ‘useless’ questions, for example, a question that leads to the identical answer for all the
candidate objects (this question cannot eliminate any ambiguous). We show the whole framework in Fig. 2.
We evaluate our model on the GuessWhat?! dataset [10],
with the pre-trained standard Oracle and Guesser, we
show that our novel Questioner model outperforms the
baseline and state-of-the-art model by a large margin. We
also evaluate each reward respectively, to measure the individual contribution. Qualitative results show that we can
produce more informative questions.
2. Related Works
Visual Question Generation Recently, the visual question generation problem has been brought to the computer
vision community, aims at generating visual-related questions. Most of the works treat the VQG as a standalone
problem and follow an image captioning style framework,
i.e., translate an image to a sentence, in this case, a question. For example, in [20], Mora et al. use a CNN-LSTM
model to generate questions and answers directly from the
image visual content. Zhang et al. [32] focus on generating questions of grounded images. They use Densecap [13]
as region captioning generator to guide the question generation. In [21], Mostafazadeh et al. propose a dataset to
generate natural questions about images, which are beyond
the literal description of image content. Li et al. [16] view
the VQA and VQG as a dual learning process by jointly
training them in an end-to-end framework. Although these
works can generate meaningful questions that are related
to the image, the motivation of asking these questions are
rather weak because they are not related to any goals. Moreover, it is hard to conduct the quality measurement on this
type of questions. Instead, in our work, we aim to develop
an agent that can learn to ask realistic questions, which can
contribute to achieving a specific goal.
Goal-oriented Visual Dialogue generation has attracted
many attentions at most recently. In [8], Das et al. introduce
a reinforcement learning mechanism for visual dialogue
generation. They establish two RL agents corresponding to
question and answer generation respectively, to finally locate an unseen image from a set of images. The question
Rounds of Dialogue
…
…
Oracle
𝑞1 : Is it a person?
< S𝑡𝑎𝑟𝑡 >
CNN
Image Feature
Guesser
𝑎1𝑜1 : Yes
…
𝑎1𝑜∗ : No
……
…
Oracle
𝑎𝑗𝑜1 : No
…
𝑎𝑗𝑜∗ : No
𝑞𝑗 : Is it a funiture?
(𝑞1:𝑗−1 , 𝑎1:𝑗−1,𝑜∗ )
[𝑝1𝑜1 , … , 𝑝1𝑜∗ ]
Guesser
Oracle
……
𝑞𝐽 : Is it a drink?
(𝑞1:𝐽 , 𝑎1:𝐽,𝑜∗ )
[𝑝𝑗𝑜1 , … , 𝑝𝑗𝑜∗ ]
Image Feature
VQG
𝒓𝒊𝒏𝒇𝒐𝒓𝒎𝒂𝒕𝒊𝒗𝒆𝒏𝒆𝒔𝒔
Question
Generator
Guesser
[𝑝𝐽𝑜1 , … , 𝑝𝐽𝑜∗ ]
𝒓𝒑𝒓𝒐𝒈𝒓𝒆𝒔𝒔𝒊𝒗𝒆
VQG
𝑎2𝑜1 : No
…
𝑎𝐽𝑜∗ : Yes
Intermediate
Rewards
𝒓𝒈𝒐𝒂𝒍−𝒂𝒄𝒉𝒊𝒆𝒗𝒆𝒅
Success
VQG
Figure 2: The framework of proposed VQG agent plays in the whole game environment. A target object o∗ is assigned to the Oracle, but it is unknown to
VQG and Guesser. Then VQG generates a series of questions, which are answered by Oracle. During training, we let Oracle answer the question based on
all the objects at each round, and measure the informativeness reward, and we also let Guesser generate probability distribution to measure the progressive
reward. Finally, we consider the number of rounds J and set the goal-achieved reward based on the status of success. These intermediate rewards are
adopted for optimizing the VQG agent by the REINFORCE.
agent predicts the feature representation of the image and
the reward function is given by measuring how close the
representation is compared to the true feature. However,
we focus on encouraging the agent to generate questions
that directed towards the final goal, and we adopt different
kinds of intermediate rewards to achieve that in the question generation process. Moreover, the question generation
agent in their model only asks questions based on the dialogue history, which does not involve visual information. In
[26], Florian et al. propose to employ reinforcement learning to solve question generation of the GuessWhat game
by introducing the final status of success as the sole reward. We share the similar backbone idea, but there are
several technical differences. One of the most significant
differences is that the previous work only considers using
whether achieving the final goal as the reward but we assign different intermediate rewards for each posed question
to push VQG agent to ask short but informative questions
to achieve the goal. The experimental results and analysis
in Section 4 show that our model not only outperforms the
state-of-art but also achieves higher intelligence, i.e., using
as few questions as possible to finish the task.
Question Generation in NLP There is a long history
of works on grammar question generation from text domain in natural language processing (NLP) [6, 9, 25, 29].
In [1, 4], authors focus on automatically generating gapfill questions, while crowdsourcing templates and manually
built templates are used for question generation in [15] and
[19] respectively. These works focus on constructing formatted questions from the text corpus.
Reinforcement Learning for V2L Reinforcement learning [14, 27] has been adopted in several vision to language
(V2L) problems, including image captioning [17, 23, 24],
VQA [2, 12, 33], and aforementioned visual dialogue system [8, 18] etc. In [23], Ren et al. use a policy network
and a value network to collaboratively generate image captions, while different optimization methods for RL in image captioning are explored in [17] and [24], called SPIDEr
and self-critical sequence training. Zhu et al. [33] introduce
knowledge source into the iterative VQA and employ RL
to learn the query policy. In [2], authors use RL to learn
the parameters of QA model for both images and structured
knowledge bases. These works solve V2L related problems
by employing RL as an optimization method, while we focus on using RL with carefully designed intermediate rewards to train the VQG agent for goal-oriented tasks.
3. Goal-Oriented VQG
We ground our goal-oriented VQG problem on a Guess
What game, specifically, on the GuessWhat?! dataset [10].
GuessWhat?! is a three-role interactive game, where all
roles observe the same image of a rich visual scene that contains multiple objects. We view this game as three parts:
Oracle, Questioner and Guesser. In each game,
a random object in the scene is assigned to the Oracle,
where this process is hidden to the Questioner. Then
the Questioner can ask a series of yes/no questions to
locate this object. The list of objects is also hidden to the
Questioner during the question-answer rounds. Once
the Questioner has gathered enough information, the
Guesser can start to guess. The game is considered as
successful if the Guesser selects the right object.
The Questioner part of the game is a goal-oriented
VQG problem; each question is generated based on the visual information of the image and the previous rounds of
question-answer pairs. The goal of VQG is to successfully
finish the game, in this case, to locate the right object. In this
paper, we fit the goal-oriented VQG into a reinforcement
learning paradigm and propose three different intermediate rewards, namely the goal-achieved reward, progressive
reward, and informativeness reward, to explicitly optimize
the question generation. The goal-achieved reward is established to lead the dialogue to achieve the final goal, the
progressive reward is used to push the intermediate generation process towards the optimal direction, while the informativeness reward is used to ensure the quality of generated questions. To better express the generation process, we
first introduce the notations of GuessWhat?! game, which
is used throughout the rest of sections.
Each game is defined as a tuple (I, D, O, o∗ ), where I
is the observed image, D is the dialogue with J rounds
of question-answer pairs (qj ,aj )Jj=1 , O = (on )N
n=1 is the
list of N objects in the image I, where o∗ is the target obj Mj
ject. Each question qj = (wm
)m=1 is a sequence of Mj
tokens, which are sampled from the pre-defined vocabulary
V . The V is composed of word tokens, a question stop
token <?> and a dialogue stop token <End>. The answer aj ∈ {<Yes>,<No>,<NA>} is set to be yes, no or
not applicable. For each object o, it has an object category
co ∈ {1 . . . C} and a segment mask.
3.1. Learning Environment
We build the learning environment to generate visual dialogues based on the GuessWhat?! dataset. Since we focus on the goal-oriented VQG, for a fair comparison, the
Oracle and Guesser are produced by referring to the
original baseline models in GuessWhat?! [10]. We also
introduce the VQG supervised learning model, which is referred as the baseline for the rest of the paper.
Oracle The Oracle requires generating answers for all
kinds of questions about any objects within the image scene.
We build the neural network architecture for Oracle by
referring to [10]. The bounding box (obtained from the
segment mask) of the object o are encoded into an eight
dimensional vector to represent the spatial feature, where
ospa = [xmin ,ymin ,xmax ,ymax ,xcenter ,ycenter ,wbox ,hbox ]
indicates the box coordinates, width and height. The category co is embedded using a learned look-up table, while
the current question is encoded by an LSTM [11]. All three
features are concatenated into a single vector and fed into a
one hidden layer MLP followed by a softmax layer to produce the answer probability p(a|ospa ,co ,q).
Guesser Given an image I and a series of questionanswer pairs, the Guesser requires predicting right object
o∗ from a list of objects. By referring to [10], we consider
the generated dialogue as one flat sequence of tokens and
encode it with an LSTM. The last hidden state is extracted
as the feature to represent the dialogue. We also embed all
the objects’ spatial features and categories by an MLP. We
perform a dot-product between dialogue and object features
with a softmax operation to produce the final prediction.
VQG Baseline Given an image I and a history of the
question-answer pairs (q,a)1:j−1 , the VQG requires generating a new question qj . We build the VQG baseline
based on an RNN generator. The RNN recurrently produces a series of state vectors sj1:m by transitioning from
j
.
the previous state sjm−1 and the current input token wm
We use an LSTM as the transition function f , that is,
j
sjm = f (sjm−1 ,wm
). In our case, the state vector s is conditioned on the whole image and all the previous questionanswer tokens. We add a softmax operation to produce
the probability distribution over the vocabulary V , where
j
j
). This baseline is conducted by
p(wm
|I,(q,a)1:j−1 ,w1:m−1
employing the supervised training. We train the VQG by
minimizing the following negative log loss function:
L = − log p(q1:J |I,a1:J )
=−
M
J X
X
j
j
log p(wm
|I,w1:m−1
,(q,a)1:j−1 )
(1)
j=1 m=1
During the test stage, the question can be sampled from the
j
model by starting from state sj1 ; a new token wm
is sampled
from the probability distribution, then embedded and fed
back to the LSTM. We repeat this operation until the end of
question token is encountered.
3.2. Reinforcement Learning of VQG
We use our established Oracle, Guesser and VQG
baseline model to simulate a complete GuessWhat?! game.
Given an image I, an initial question q1 is generated by
sampling from the VQG baseline until the stop question token is encountered. Then the Oracle receives the question
q1 along with the assigned object category o∗ and its spatial
information o∗spa , and output the answer a1 , the questionanswer pair (q1 ,a1 ) is appended to the dialogue history. We
repeat this loop until the end of dialogue token is sampled,
or the number of questions reaches the maximum. Finally,
the Guesser takes the whole dialogue D and the object
list O as inputs to predict the object. We consider the goal
reached if o∗ is selected. Otherwise, it failed.
To more efficiently optimize the VQG towards the final
goal and generate informative questions, we adopt three intermediate rewards (which will be introduced in the following sections) into the RL framework.
3.2.1
State, Action & Policy
We view the VQG as a Markov Decision Process (MDP),
the VQG is noted as the agent. For the dialogue generated based on the image I at time step t, the state of agent
is defined as the image visual content with the history of
question-answer pairs and the tokens of current question
j
generated so far: St = (I,(q,a)1:j−1 ,(w1j , . . . ,wm
)), where
Pk=j−1
t = k=1 Mk + m. The action At of agent is to select
j
the next output token wm+1
from the vocabulary V . Depends on the actions that agent takes, the transition between
two states falls into one of the following cases:
j
=<?>: The current question is finished, the
1) wm+1
Oracle from the environment will answer aj , which is
appended to the dialogue history. The next state St+1 =
(I,(q,a)1:j ).
j
2) wm+1
=<End>: The dialogue is finished, the
Guesser from the environment will select the object from
the list O.
j
keeps ap3) Otherwise, the new generated token wm+1
pending to the current question qj , the next state St+1 =
j
j
)).
,wm+1
(I,(q,a)1:j−1 ,(w1j , . . . ,wm
The maximum length of question qj is Mmax , and the
maximum rounds of the dialogue is Jmax . Therefore, the
number of time steps T of any dialogue are T ≤ Mmax ∗
Jmax . We model the VQG under the stochastic policy
πθ (A|S), where θ represents the parameters of the deep
neural network we used in the VQG baseline that produces
the probability distributions for each state. The goal of the
policy learning is to estimate the parameter θ.
After we set up the components of MDP, the most significant aspect of the RL is to define the appropriate reward
function for each state-action pair (St ,At ). As we emphasized before, the goal-oriented VQG aims to generate the
questions that lead to achieving the final goal. Therefore,
we build three kinds of intermediate rewards to push the
VQG agent to be optimized towards the optimal direction.
The whole framework is shown in Fig. 2.
3.2.2 Goal-Achieved Reward
One basic rule of the appropriate reward function is that
it cannot conflict with the final optimal policy [22]. The
primary purpose of the VQG agent is to gather enough information as soon as possible to help Guesser to locate
the object. Therefore, we define the first reward to reflect
whether the final goal is achieved. Moreover, we take the
number of rounds into consideration to accelerate the questioning part and let the reward nonzero when the game is
successful.
Given the state St , where the <End> token is sampled
or the maximum number of rounds Jmax is reached, the
reward of the state-action pair is defined as:
(
1+λ · Jmax /J, If Guesser(St ) = o∗
rg (St ,At ) =
0,
Otherwise
(2)
We set the reward as one plus the weighted maximum number of rounds Jmax against the actual rounds J of the current dialogue if the dialogue is successful, and zero other-
wise. This is based on that we want the final goal to motivate the VQG to generate useful questions. Moreover, the
intermediate process is considered into the reward function
as the rounds of the question-answer pairs J, which guarantees the efficiency of the generation process; the fewer
questions are generated, the more reward VQG agent can
get at the end of the game (if and only if the game succeed).
This is a quite useful setting in the realistic because we do
want to use fewer orders to guide the robot to finish more
tasks. λ is a weight to balance between the contribution of
the successful reward and the dialogue round reward.
3.2.3 Progressive Reward
Based on the intuition and the observation of the human interactive dialogues, we find that the questions of a successful game, are ones that progressively achieve the final goal,
i.e., as long as the questions being asked and answered, the
confidence of referring to the target object becomes higher
and higher. Therefore, at each round, we define an intermediate reward for state-action pair as the improvement of
target probability that Guesser outputs. More specific,
we interact with the Guesser at each round to obtain the
probability of predicting target object. If the probability increases, it means that the generated question qj is a positive
question that leads the dialogue towards the right direction.
We set an intermediate reward called progressive reward
to encourage VQG agent progressively generate these positive questions. At each round j, we record the probability
pj (o∗ |I,(q,a)1:j ) returned by Guesser, and compare it with
the last round j − 1. The difference between two probabilities is used as the intermediate reward. That is:
rp (St ,At ) = pj (o∗ |I,(q,a)1:j ) − pj−1 (o∗ |I,(q,a)1:j−1 )
(3)
In this way, the question is considered high-quality and has
a positive reward, if it leads to a higher probability to guess
the right object. Otherwise, the reward is negative.
3.2.4
Informativeness Reward
When we human ask questions (especially in a guess what
game), we expect an answer that can help us to eliminate
the confusion and distinguish the candidate objects. Hence,
imagine that if a posed question that leads to the same answer for all the candidate object, this question will be useless. For example, all the candidate objects are ‘red’ and if
we posed a question that ‘Is it red?’, we will get the answer
‘Yes.’ However, this question-answer pair cannot help us
to identify the target. We want to avoid this kind of questions because they are non-informative. In this case, we
need to evaluate the question based on the answer from the
Oracle.
Given generated question qj , we interact with the
Oracle to answer the question. Since the Oracle takes
Algorithm 1 Training procedure of the VQG agent.
the image I, the current question qj , and the target object
o∗ as inputs, and outputs the answer aj , we let the Oracle
answer question qj for all objects in the image. If the answers are different from each other, we consider qj is useful
for locating the right object. Otherwise, it does not contribute to the final goal. Therefore, we set the reward positive, which we called informativeness reward, for these useful questions.
Formally, during each round, the Oracle receives the
image I, the current question qj and the list of objects O,
and then outputs the answer set ajO = {ajo1 , . . . ,ajoN },
where each element corresponds to each object. Then the
informativeness reward is defined as:
(
η, If all ajon are not identical
ri (St ,At ) =
(4)
0,
Otherwise
Input: Oracle(Ora), Guesser(Gus), V QG, batch size H
1: for Each update do
2:
# Generate episodes τ
3:
for h = 1 to H do
4:
select image Ih and one target object o∗h ∈ Oh
5:
# Generate question-answer pairs (q,a)h1:j
6:
for j = 1 to Jmax do
7:
qjh = V QG(Ih ,(q,a)h1:j−1 )
8:
# N is the number of total objects
9:
for n = 1 to N do
10:
ahjohn = Ora(Ih ,qjh ,ohn )
11:
12:
13:
By giving a positive reward to the state-action pair, we improve the quality of the dialogue by encouraging agent to
generate more informative questions.
14:
15:
16:
17:
18:
3.2.5
19:
20:
Training with Policy Gradient
21:
22:
23:
24:
Now we have three different kinds of rewards that take
the intermediate process into consideration, for each stateaction pair (St ,At ), we add three rewards together as the
final reward function:
r(St ,At ) = rg (St ,At ) + rp (St ,At ) + ri (St ,At )
(5)
25:
26:
27:
28:
Considering the large action space in the game setting,
we adopt the policy gradient method [28] to train the VQG
agent with proposed intermediate rewards. The goal of policy gradient is to update policy parameters with respect to
the expected return by gradient descent. Since we are in the
episodic environment, given policy πθ , which is the generative network of the VQG agent, in this case, the policy
objective function takes the form:
T
X
J(θ) = Eπθ [
r(St ,At )]
(6)
if all ahjohn are not identical then
ri (St ,At ) = η
else ri (St ,At ) = 0
r(St ,At ) = ri (St ,At )
pj (o∗h |·) = Gus(Ih ,(q,a)h1:j ,Oh )
if j > 1 then
rp (St ,At ) = pj (o∗h |·) − pj−1 (o∗h |·)
r(St ,At ) = r(St ,At ) + rp (St ,At )
if <End>∈ qjh then
break;
p(oh |·) = Gus(Ih ,(q,a)h1:j ,Oh )
if argmaxoh p(oh |·) = o∗h then
rg (St ,At ) = 1 + λ · Jmax /j
else rg (St ,At ) = 0
r(St ,At ) = r(St ,At ) + rg (St ,At )
Define τ = (Ih ,(q,a)h1:jh ,rh )1:H
Evaluate OJ(θ) as Eq. 9 and update VQG agent
Evaluate OL(ϕ) as Eq. 10 and update bϕ baseline
OJ(θ) ≈
X
Mj
J X
j=1 m=1
πθ
(Q
ϕ
τ
t0 =t
by substituting the notations with VQG agent, we have the
following policy gradient:
− bϕ )
τ
The parameters θ then can be optimized by following the
gradient update rule. In REINFORCE algorithm [14], the
gradient of J(θ) can be estimated from a batch of episodes
τ that are sampled from the policy πθ :
X
T X
πθ
OJ(θ) ≈
Oθ log πθ (St ,At )(Q (St ,At )−bϕ )
(7)
where Qπθ (St ,At ) is the state-action value function that returns the expectation of cumulative reward at (St ,At ):
T
X
Qπθ (St ,At ) = Eπθ [
r(St0 ,At0 )]
(8)
j
j
(I,(q,a)1:j−1 ,w1:m−1
,wm
)
(9)
bϕ is a baseline function to help reduce the gradient variance, which can be chosen arbitrarily. We use a one-layer
MLP that takes state St as input in VQG agent and outputs
the expected reward. The baseline bϕ is trained with mean
squared error as:
T
X
min L(ϕ) = [bϕ (St ) −
r(St0 ,At0 )]2
(10)
t=1
t=1 At ∈V
j
j
Oθ log πθ (wm
|I,(q,a)1:j−1 ,w1:m−1
)
t0 =t
τ
The whole training procedure is shown in Alg.1.
4. Experiment
In this section, we present our VQG results and conduct
comprehensive ablation analysis about each intermediate
reward. As mentioned above, the proposed method is evaluated on the GuessWhat?! game dataset [10] with pre-trained
standard Oracle and Guesser. By comparing with the
baseline and the state-of-the-art model, we show that proposed model can efficiently generate informative questions,
which serve the final goal.
4.1. Dataset & Evaluation Metric
The GuessWhat?! Dataset [10] is composed of 155,281
dialogues grounded on the 66,537 images with 134,074
unique objects. There are 821,955 question-answer pairs
in the dialogues with vocabulary size 4,900. We use the
standard split of training, validation and test in [10, 26].
Following [26], we report the accuracies of the games as
the evaluation metric. Given a J-round dialogue, if the target object o∗ is located by Guesser, the game is noted as
successful, which indicates that the VQG agent has generated the qualified questions to serve the final goal. There are
two kinds of test runs on the training set and test set respectively, named as NewObject and NewImage. NewObject
is randomly sampling target objects from the training images (but we restrict only to use new objects that are not
seen before), while NewImage is sampling objects from the
test images (unseen). We report three inference methods
namely sampling, greedy and beam-search (beam size is 5)
for these two test runs.
4.2. Implementation Details
The standard Oracle, Guesser and VQG baseline
are reproduced by referring to [26]. The error of trained
Oracle, Guesser on test set are 21.1% and 35.8% respectively. The VQG baseline is referred as Baseline in
Tab.1 and 2 1 .
We initialize the training environment with the standard
Oracle, Guesser and VQG baseline, then start to train
the VQG agent with proposed reward functions. We train
our models for 100 epochs with stochastic gradient descent
(SGD) [5]. The learning rate and batch size are 0.001 and
64, respectively. The baseline function bϕ is trained with
SGD at the same time. During each epoch, each training
image is sampled once, and one of the objects inside it is
randomly assigned as the target. We set the maximum round
Jmax = 5 and maximum length of question Mmax = 12.
The weight of the dialog round reward is set to λ = 0.1.
The progressive reward is set as η = 0.12 .
4.3. Results & Ablation Analysis
In this section, we give the overall analysis on proposed
intermediate reward functions. To better show the effectiveness of each reward, we conduct comprehensive ablation studies. Moreover, we also carry out a human interpretability study to evaluate whether human subjects can
1 These results are reported on https://github.com/GuessWhatGame by
original authors.
2 We use a grid search to select the hyper-parameters λ and η, we find
0.1 produces the best results.
Table 1: Results on training images (NewObject).
NewObject
Baseline [10]
Sole-r [26]
VQG-rg
VQG-rg +rp
VQG-rg +ri
VQG-rg +rp +ri
Sampling
41.6
58.5
60.6
62.1
61.3
63.2
Greedy
43.5
60.3
61.7
62.9
62.4
63.6
Beam-Search
47.1
60.2
61.4
63.1
62.7
63.9
Table 2: Results on test images (NewImage).
NewImage
Baseline [10]
Sole-r [26]
VQG-rg
VQG-rg +rp
VQG-rg +ri
VQG-rg +rp +ri
Sampling
39.2
56.5
58.2
59.3
58.5
59.8
Greedy
40.8
58.4
59.3
60.6
59.7
60.7
Beam-Search
44.6
58.4
59.4
60.5
60.1
60.8
understand the generated questions and how well the human can use these question-answer pairs to achieve the final goal. We note VQG agent trained with goal-achieved
reward as VQG-rg , trained with goal-achieved and progressive rewards as VQG-rg +rp , trained with goal-achieved and
informativeness rewards as VQG-rg +ri . The final agent
trained with all three rewards is noted as VQG-rg +rp +ri .
Overall Analysis Tab. 1 and 2 show the comparisons between VQG agent optimized by proposed intermediate rewards and the state-of-the-art model proposed in [26] noted
as Sole-r, which uses indicator of whether reaching the final goal as the sole reward function. As we can see, with
proposed intermediate rewards and their combinations, our
VQG agents outperform both compared models on all evaluation metrics. More specifically, our final VQG-rg +rp +ri
agent surpasses the Sole-r 4.7%, 3.3% and 3.7% accuracy
on NewObject sampling, greedy and beam-search respectively, while obtains 3.3%, 2.3% and 2.4% higher accuracy
on NewImage sampling, greedy and beam-search respectively. Moreover, all of our agents outperform the supervised baseline by a significant margin.
To fully show the effectiveness of our proposed intermediate rewards, we train three VQG agents using rg , rg +rp ,
and rg +ri rewards respectively, and conduct ablation analysis. As we can see, the VQG-rg already outperforms both
baseline and the state-of-the-art model, which means that
controlling dialogue round can push the agent to ask more
wise questions. With the combination of rp and ri reward
respectively, the performance of VQG agent further improved. We find that the improvement gained from rp reward is higher than ri reward, which suggests that the intermediate progressive reward contributes more in our experiment. Our final agent combines all rewards and achieves the
best results. Fig. 3 shows some qualitative results. More results can be found in the supplementary material, including
Baseline
Sole-r
Our VQG
Baseline
Sole-r
Our VQG
Is it a person ? No
Is it food ? No
Is it a plate ? No
Is it a table ? No
Is it a person ? No
Is it a food ? No
Is it in left ? No
Is it in front ? Yes
Is it a person ? No
Is it a food ? No
Is it a drink ? Yes
Is it in front ? Yes
Is it a donut ? Yes
Is it on the left ? No
Is it a person ? No
Is it a food ? Yes
Is it in left ? No
Is it in middle? No
Is it a food ? Yes
Is it on right ? Yes
Is it front one? Yes
[0.08, 0.12, 0.12, 0.03]
[0.09, 0.11, 0.02, 0.02]
[0.09, 0.11, 0.92, 0.98]
[0.19, 0.28]
[0.13, 0.13, 0.26, 0.22]
[0.11, 0.56, 0.72]
Failure (Table)
Failure (Table)
Success (Cup)
Failure (Donut)
Failure (Donut)
Success (Donut)
Is it a phone? No
Is it a book ? No
Is it a remote ? No
Is it in left ? No
Is it in middle? No
Is it a remote? No
Is it a laptop? Yes
Is it on right? Yes
Is it in front? Yes
Is it food ? No
Is it a plate ? No
Is it a spoon ? No
Is it food ? No
Is it a bow ? Yes
Is it in left ? Yes
Is it in front? Yes
Is it food ? No
Is it a drink ? Yes
Is it on right ? No
Is it in front ? Yes
[0.10, 0.20]
[0.07, 0.03, 0.02]
[0.20, 0.48, 0.99, 1.00]
[0.09, 0.08, 0.08, 0.07]
[0.09, 0.09, 0.05, 0.01]
[0.08, 0.67, 0.86, 0.89]
Failure (Table)
Failure (Keyboard)
Success (Laptop)
Failure (Knife)
Failure (Fork)
Success (Glass)
Figure 3: Some qualitative results of our VQG agent (green), and the comparisons with baseline (blue) and Sole-r model (brown). The elements in the
middle array indicate the probabilities of successfully locating the target object after each round. Better viewed in color.
15500
15500
13500
13500
0.7
0.7
Ours
Sole-r
Baseline
Ours
Sole-r
Baseline
0.6
0.6
11500
11500
0.5
0.5
9500
9500
0.4
0.4
7500
7500
0.3
0.3
5500
5500
11
22
33
44
55
Question Informativeness We also investigate the informativeness of the questions generated by different models.
We let Oracle answer questions for all the objects at each
round, and count the percentage of high-quality questions in
the successful game. We define that a high-quality question
is a one does not lead to the same answer for all the candidate objects. The experimental results show that our VQG
agent has 87.7% high-quality questions, which is higher
than the baseline (84.7%) and Sole-r (86.3%). This confirms the contribution of the ri reward.
0.2
0.2
4.4. Human Study
Figure 4: The comparisons of success ratio between our agent and Soler, as well the baseline model, at different dialogue round. The left y-axis
indicates the number of successful dialogues, which corresponds to the bar
chart. The right y-axis indicates the success ratio, which corresponds to
the line chart. Better viewed in color.
some fail cases.
Dialogue Round We conduct an experiment to investigate the relationship between the dialogue round and the
game success ratio. More specifically, we let Guesser to
select the object at each round and calculate the success ratio at the given round, the comparisons of different models
are shown in Fig. 4. As we can see, our agent can achieve
the goal at fewer rounds compared to the other models, especially at the round three.
Progressive Trend To prove our VQG agent can learn a
progressive trend on generated questions, we count the percentage of the successful game that has a progressive (ascending) trend on the target object, by observing the probability distributions generated by Guesser at each round.
Our agent achieves 60.7%, while baseline and Sole-r are
50.8% and 57.3% respectively, which indicates that our
agent is better at generating questions in a progressive trend
considering we introduce the progressive reward, rp . Some
qualitative results of the ‘progressive trend’ are shown in
the Fig. 3, i.e., the probability of the right answer is progressively increasing.
We conduct a human study to see how well human can
guess the target object based on the questions generated by
these models. We show human subjects 50 images with
generated question-answer pairs from baseline, Sole-r, and
our final VQG agent, and let them guess the objects, i.e.,
replacing the AI guesser to a real human. We ask three
human subjects to play on the same split, and the game is
recognized as successful if at least two of them give the
right answer. Based on our experiments, averagely, subjects achieve the highest accuracy 76% based on our agent,
which achieves 52% and 70% accuracies on the baseline
and Sole-r questions respectively. These results indicate
that our agent can generate higher qualitative questions that
can benefit the human to achieve the final goal.
5. Conclusion
The ability to devise concise questions that lead to two
parties to a dialog satisfying a shared goal as effectively as
possible has important practical applications and theoretical
implications. By introducing suitably crafted intermediate
rewards into a deep reinforcement learning framework, we
have shown that it is possible to achieve this result, at least
for a particular class of goal.
The method we have devised not only achieves the Guess
What goal reliably and succinctly but also outperforms the
state-of-art. However, since the Oracle and Guesser are
fixed, they are inaccurate to a certain extent. Consider the
main objective of this paper is to show the effectiveness of
our proposed intermediate rewards on the VQG problem,
we leave it as the further work to train the three components
jointly, with a reinforcement learning framework.
References
[1] M. Agarwal and P. Mannem. Automatic gap-fill question
generation from text books. In Proc. Workshop Inno. Use
of NLP for Buil. Educ. Appl., pages 56–64. Association for
Computational Linguistics, 2011. 3
[2] J. Andreas, M. Rohrbach, T. Darrell, and D. Klein. Learning
to compose neural networks for question answering. arXiv
preprint arXiv:1601.01705, 2016. 3
[3] S. Antol, A. Agrawal, J. Lu, M. Mitchell, D. Batra,
C. Lawrence Zitnick, and D. Parikh. Vqa: Visual question
answering. In Proceedings of the IEEE International Conference on Computer Vision, pages 2425–2433, 2015. 1
[4] L. Becker, S. Basu, and L. Vanderwende. Mind the gap:
learning to choose gaps for question generation. In Proc.
Conf. North Amer. Chap. Asso. for Comp. Ling.: Human
Lang. Tech., pages 742–751. Association for Computational
Linguistics, 2012. 3
[5] L. Bottou. Large-scale machine learning with stochastic gradient descent. In Proceedings of COMPSTAT’2010, pages
177–186. Springer, 2010. 7
[6] J. C. Brown, G. A. Frishkoff, and M. Eskenazi. Automatic
question generation for vocabulary assessment. In Proc.
Conf. Human Lang. Tech. and Empi. Meth. in Natu. Lang.
Process, pages 819–826. Association for Computational Linguistics, 2005. 3
[7] A. Das, S. Kottur, K. Gupta, A. Singh, D. Yadav, J. M.
Moura, D. Parikh, and D. Batra. Visual dialog. arXiv
preprint arXiv:1611.08669, 2016. 2
[8] A. Das, S. Kottur, J. M. Moura, S. Lee, and D. Batra. Learning cooperative visual dialog agents with deep reinforcement
learning. arXiv preprint arXiv:1703.06585, 2017. 2, 3
[9] B. Davey and S. McBride. Effects of question-generation
training on reading comprehension. Journal of Educational
Psychology, 78(4):256, 1986. 3
[10] H. de Vries, F. Strub, S. Chandar, O. Pietquin, H. Larochelle,
and A. C. Courville. Guesswhat?! visual object discovery
through multi-modal dialogue. In Proc. IEEE Conf. Comp.
Vis. Patt. Recogn., 2017. 2, 3, 4, 6, 7
[11] F. A. Gers, J. Schmidhuber, and F. Cummins. Learning to
forget: Continual prediction with lstm. 1999. 4
[12] R. Hu, J. Andreas, M. Rohrbach, T. Darrell, and K. Saenko.
Learning to reason: End-to-end module networks for visual
question answering. arXiv preprint arXiv:1704.05526, 2017.
3
[13] J. Johnson, A. Karpathy, and L. Fei-Fei. Densecap: Fully
convolutional localization networks for dense captioning. In
Proc. IEEE Conf. Comp. Vis. Patt. Recogn., pages 4565–
4574, 2016. 2
[14] L. P. Kaelbling, M. L. Littman, and A. W. Moore. Reinforcement learning: A survey. J. Arti. Intell. Research, 4:237–285,
1996. 3, 6
[15] I. Labutov, S. Basu, and L. Vanderwende. Deep questions
without deep understanding. In ACL (1), pages 889–898,
2015. 3
[16] Y. Li, N. Duan, B. Zhou, X. Chu, W. Ouyang, and X. Wang.
Visual question generation as dual task of visual question
answering. arXiv preprint arXiv:1709.07192, 2017. 2
[17] S. Liu, Z. Zhu, N. Ye, S. Guadarrama, and K. Murphy. Optimization of image description metrics using policy gradient
methods. arXiv preprint arXiv:1612.00370, 2016. 3
[18] J. Lu, A. Kannan, J. Yang, D. Parikh, and D. Batra. Best
of both worlds: Transferring knowledge from discriminative
learning to a generative visual dialog model. arXiv preprint
arXiv:1706.01554, 2017. 3
[19] K. Mazidi and R. D. Nielsen. Linguistic considerations in
automatic question generation. In ACL (2), pages 321–326,
2014. 3
[20] I. M. Mora, S. P. de la Puente, and X. Giro-i Nieto. Towards
automatic generation of question answer pairs from images,
2016. 2
[21] N. Mostafazadeh, I. Misra, J. Devlin, M. Mitchell, X. He,
and L. Vanderwende. Generating natural questions about an
image. arXiv preprint arXiv:1603.06059, 2016. 2
[22] A. Y. Ng, D. Harada, and S. Russell. Policy invariance under
reward transformations: Theory and application to reward
shaping. In Proc. Int. Conf. Mach. Learn., volume 99, pages
278–287, 1999. 5
[23] Z. Ren, X. Wang, N. Zhang, X. Lv, and L.-J. Li. Deep reinforcement learning-based image captioning with embedding
reward. Proc. IEEE Conf. Comp. Vis. Patt. Recogn., 2017. 3
[24] S. J. Rennie, E. Marcheret, Y. Mroueh, J. Ross, and V. Goel.
Self-critical sequence training for image captioning. arXiv
preprint arXiv:1612.00563, 2016. 3
[25] H. Singer and D. Donlan. Active comprehension: Problemsolving schema with question generation for comprehension
of complex short stories. Reading Research Quarterly, pages
166–186, 1982. 3
[26] F. Strub, H. de Vries, J. Mary, B. Piot, A. C. Courville, and
O. Pietquin. End-to-end optimization of goal-driven and visually grounded dialogue systems. In Proc. Int. Joint Conf.
Artificial Intell., 2017. 2, 3, 7
[27] R. S. Sutton and A. G. Barto. Reinforcement learning: An
introduction, volume 1. MIT press Cambridge, 1998. 3
[28] R. S. Sutton, D. A. McAllester, S. P. Singh, and Y. Mansour. Policy gradient methods for reinforcement learning
with function approximation. In Advances in neural information processing systems, pages 1057–1063, 2000. 6
[29] W. J. Therrien, K. Wickstrom, and K. Jones. Effect of a combined repeated reading and question generation intervention
on reading achievement. Learning Disabilities Research &
Practice, 21(2):89–97, 2006. 3
[30] Q. Wu, P. Wang, C. Shen, A. Dick, and A. van den Hengel. Ask me anything: Free-form visual question answering
based on knowledge from external sources. In Proc. IEEE
Conf. Comp. Vis. Patt. Recogn., June 2016. 1
[31] H. Xu and K. Saenko. Ask, attend and answer: Exploring
question-guided spatial attention for visual question answering. In Proc. Eur. Conf. Comp. Vis., pages 451–466. Springer,
2016. 1
[32] S. Zhang, L. Qu, S. You, Z. Yang, and J. Zhang. Automatic
generation of grounded visual questions. arXiv preprint
arXiv:1612.06530, 2016. 2
[33] Y. Zhu, J. J. Lim, and L. Fei-Fei. Knowledge acquisition for
visual question answering via iterative querying. Proc. IEEE
Conf. Comp. Vis. Patt. Recogn., 2017. 3
| 1cs.CV
|
arXiv:1603.02864v1 [math.SG] 9 Mar 2016
THE AUTONOMOUS NORM ON Ham (R2n ) IS
BOUNDED
MICHAEL BRANDENBURSKY AND JAREK KĘDRA
Abstract. We prove that the autonomous norm on the group of
compactly supported Hamiltonian diffeomorphisms of the standard
R2n is bounded.
Let (M, ω) be a symplectic manifold and let Ham(M, ω) be the group
of compactly supported Hamiltonian diffeomorphisms of (M, ω). Recall that a Hamiltonian diffeomorphism f is a time-one map of the
flow generated by the vector field XFt defined by ω(XFt , −) = dFt .
Here F : M × S 1 → R is a smooth compactly supported function and
F (x, t) = Ft (x) (see [9, Section 5.1] for details). The function F is
called a Hamiltonian of f . If F does not depend on the second variable
or is time independent then f is called autonomous. It is known that
every Hamiltonian diffeomorphism is a product of autonomous ones [3].
The autonomous norm on Ham(M, ω) is defined by:
kf k = min{k ∈ N | f = a1 · · · an , where ai is autonomous}.
It is a conjugation invariant norm and is known to be unbounded on
the group of compactly supported Hamiltonian diffeomorphisms of an
oriented surface of finite area [2, 4, 3, 6].
This paper is concerned with the group Ham(R2n ) of compactly supported Hamiltonian diffeomorphism of the Euclidean space equipped
with the standard symplectic form. We prove the following result.
Theorem. The diameter of the autonomous norm on Ham (R2n ) is
bounded above by 3.
Proof. Let f ∈ Ham (R2n ). Let f = a1 · · · am , where ai ∈ Ham (R2n )
are autonomous diffeomorphisms with compactly supported Hamiltonian functions Fi : R2n → R. Let B(r) ⊂ R2n be an Euclidean ball of
radius r > 0, centered at the origin and containing the union of the
supports of the functions Fi .
Lemma. There exists an autonomous diffeomorphism h ∈ Ham (R2n )
displacing the ball B(r) m times.
1
2
MICHAEL BRANDENBURSKY AND JAREK KĘDRA
The statement of the lemma means that hi (B(r)) ∩ hj (B(r)) = ∅ for
0 ≤ i 6= j ≤ m. It follows from [5, Lemma 2.6] that there exists
g ∈ Ham (R2n ) such that the following equality holds:
2
m
f = a1 · · · am = [h, g]ah1 ah2 · · · ahm ,
i
where ahi = hi ai h−i and h is the diffeomorphism from the Lemma.
Observe that, since the supports of Fi ◦ hi are pairwise disjoint for i ∈
2
m
{1, . . . , m}, we obtain that the composition ah1 ah2 · · · ahm is autonomous
with the Hamiltonian function equal to
F1 ◦ h + F2 ◦ h2 + · · · + Fm ◦ hm .
Since the commutator [h, g] = h · hg is a product of two autonomous
diffeomorphisms we obtain that f is a product of three autonomous
diffeomorphisms.
Proof of the Lemma. Let H1 : R → R be a smooth function satisfying
the following conditions:
(1) H1 (y) = 0 for |y| > r + 1
(2) H1′ (y) = r for |y| ≤ r.
Let H(x1 , y1 , . . . , xn , yn ) = H1 (y1 ). We have that dH = rdx1 and that
the induced Hamiltonian vector field X is equal to r ∂x∂ 1 . Thus the
induced Hamiltonian diffeomorphism displaces the ball B(r) as many
times as we like. Taking an appropriate cut off function we obtain the
required compactly supported diffeomorphism h.
Remarks. If f in Theorem is contained in the kernel of the Calabi
homomorphism (see Section 8.B of [1] for a definition) then the same
argument shows that it is a product of up to three autonomous diffeomorphisms with trivial Calabi invariant.
It is known that the Hofer norm on Ham (R2n ) is unbounded and stably
bounded [7]. The kernel of the Calabi homomorphism does not admit
nontrivial quasimorphisms, however, it is stably unbounded [8].
It is not difficult to see that the diameter of the autonomous norm on
Ham (R2n ) is at least 2. To the best of our knowledge it is an open
question whether there exists a Hamiltonian diffeomorphism of R2n of
autonomous norm equal to 3.
THE AUTONOMOUS NORM ON Ham R2n IS BOUNDED
3
Acknowledgements. We thank the Center for Advanced Studies in
Mathematics at Ben Gurion University for supporting the visit of the
second author at BGU.
References
[1] Vladimir I. Arnold and Boris A. Khesin. Topological methods in hydrodynamics,
volume 125 of Applied Mathematical Sciences. Springer-Verlag, New York, 1998.
[2] Michael Brandenbursky and Jarek Kedra. On the autonomous metric on the
‘
group of area-preserving diffeomorphisms of the 2-disc. Algebr. Geom. Topol.,
13(2):795–816, 2013.
[3] Michael Brandenbursky, Jarek Kedra, and Egor Shelukhin. On the autonomous
norm on the group of Hamiltonian diffeomorphisms of the torus. Available at
http://arxiv.org/abs/1602.03287v2.
[4] Michael Brandenbursky and Egor Shelukhin. On the Lp -geometry of autonomous Hamiltonian diffeomorphisms of surfaces. Math. Res. Lett. to appear.
Available at http://arxiv.org/abs/1405.7931v2.
[5] Dmitri Burago, Sergei Ivanov, and Leonid Polterovich. Conjugation-invariant
norms on groups of geometric origin. In Groups of diffeomorphisms, volume 52
of Adv. Stud. Pure Math., pages 221–250. Math. Soc. Japan, Tokyo, 2008.
[6] Jean-Marc Gambaudo and Étienne Ghys. Commutators and diffeomorphisms
of surfaces. Ergodic Theory Dynam. Systems, 24(5):1591–1617, 2004.
[7] Helmut Hofer and Eduard Zehnder. Symplectic invariants and Hamiltonian dynamics. Birkhäuser Advanced Texts: Basler Lehrbücher. [Birkhäuser Advanced
Texts: Basel Textbooks]. Birkhäuser Verlag, Basel, 1994.
[8] Morimichi Kawasaki. Relative quasimorphisms and stably unbounded norms on
the group of symplectomorphisms of the euclidean spaces. Journal of Symplectic
Geometry, 2014.
[9] Leonid Polterovich. The geometry of the group of symplectic diffeomorphisms.
Lectures in Mathematics ETH Zürich. Birkhäuser Verlag, Basel, 2001.
Ben Gurion University, Israel
E-mail address: [email protected]
University of Aberdeen and University of Szczecin
E-mail address: [email protected]
| 4math.GR
|
Macroscopic Modeling and Simulation of Managed Lane-Freeway
Networks
arXiv:1609.09470v2 [cs.SY] 21 Dec 2016
Matthew A. Wright, Roberto Horowitz, Alex A. Kurzhanskiy
March 29, 2018
Abstract
To help mitigate road congestion caused by the unrelenting growth of traffic demand, many transit
authorities have implemented managed lane policies. Managed lanes typically run parallel to a freeway’s
standard, general-purpose (GP) lanes, but are restricted to certain types of vehicles. It was originally
thought that managed lanes would improve the use of existing infrastructure through incentivization of
demand-management behaviors like carpooling, but implementations have often been characterized by
unpredicted phenomena that is often to detrimental system performance. Development of traffic models
that can capture these sorts of behaviors is a key step for helping managed lanes deliver on their promised
gains.
Towards this goal, this paper presents several macroscopic traffic modeling tools we have used for
study of freeways equipped with managed lanes, or “managed lane-freeway networks.” The proposed
framework is based on the widely-used first-order kinematic wave theory. In this model, the GP and
the managed lanes are modeled as parallel links connected by nodes, where certain type of traffic may
switch between GP and managed lane links. Two types of managed lane configuration are considered:
full-access, where vehicles can switch between the GP and the managed lanes anywhere; and separated,
where such switching is allowed only at certain locations called gates.
We incorporate two phenomena into our model that are particular to managed lane-freeway networks:
the inertia effect and the friction effect. The inertia effect reflects drivers’ inclination to stay in their lane
as long as possible and switch only if this would obviously improve their travel condition. The friction
effect reflects the empirically-observed driver fear of moving fast in a managed lane while traffic in the
adjacent GP links moves slowly due to congestion.
Calibration of models of large road networks is difficult, as the dynamics depend on many parameters whose numbers grow with the network’s size. We present an iterative learning-based approach
to calibrating our model’s physical and driver-behavioral parameters. Finally, we validate our model
and calibration methodology with case studies of simulations of two managed lane-equipped California
freeways.
Keywords: macroscopic first order traffic model, first order node model, multi-commodity traffic, managed
lanes, HOV lanes, dynamic traffic assignment, dynamic network loading, inertia effect, friction effect
1
Introduction
Traffic demand in the developed and developing worlds shows no sign of decreasing, and the resulting
congestion remains a costly source of inefficiency in the built environment. One study (Lomax et al., 2015)
estimated that, in 2014, delays due to congestion cost drivers 7 billion hours and $160B in the United States
alone, leading to the burning of 3 billion extra gallons of fuel. The historical strategy for accommodating more
demand has been construction of additional infrastructure, but in recent years planners have also developed
1
strategies to improve the performance of existing infrastructure, both through improved road operations and
demand management, which seeks to lower the number of vehicles on the road (Kurzhanskiy and Varaiya,
2015). One such strategy that has been widely adopted in the United States and other developed countries
is the creation of so-called managed lanes (Obenberger, 2004). Managed lanes are implemented on freeways
by restricting the use of one or more lanes to certain vehicles. As an example, high-occupancy-vehicle (HOV)
lanes are intended to incentivize carpooling, which reduces the total number of cars on the road as a demand
management outcome (Chang et al., 2008).
In addition to demand management, managed lanes provide an opportunity for improved road operations
through real-time, responsive traffic control. For example, tolled express lanes give drivers the opportunity
to pay a toll to drive parallel to the general-purpose lanes on a (presumably less-congested) express lane.
Traffic management authorities here have an opportunity to adjust the toll amount in response to the
real-time state of traffic on the network. The potential for managed lanes as instruments for reactive, realtime traffic operations–in addition to their demand-management purpose–has made them popular among
transportation authorities (Kurzhanskiy and Varaiya, 2015).
However, the traffic-operational effects of managed lanes are not always straightforward or as rehabilitative
as expected, as their presence can create complex traffic dynamics (Jang and Cassidy, 2012). Even in a
freeway with simple geometry, the dynamics of traffic flow are complex and not fully understood, and adding
managed lanes alongside the non-managed, general-purpose (GP) lanes only exacerbates this. In effect,
adding a managed lane creates two parallel and distinct, but coupled, traffic flows on the same physical
structure. When used as intended, managed lanes carry flows with different density-velocity characteristics
and vehicle-type (e.g., strictly HOVs) compositions than the freeway. When vehicles move between the two
lane flows, complex phenomena that are unobserved in GP-only freeways can emerge (see e.g. Daganzo and
Cassidy (2008); Liu et al. (2011); Jang and Cassidy (2012); Cassidy et al. (2015), and others).
Making better use of managed lanes requires an understanding of the macroscopic behavior they induce. One
widely-used tool for understanding macroscopic traffic flow behavior is the macroscopic traffic flow model.
A rich literature exists on macroscopic models for flows on long roads, and at junctions where those roads
meet, but an extension to the parallel-flows situation created by placing a managed lane in parallel with
a freeway (a “managed lane-freeway network”) is not straightforward. Such a model should describe when
vehicles enter or exit the managed lane, and capture the interactions caused by the two flows’ proximity,
such as the so-called “friction effect” (Liu et al., 2011; Jang and Cassidy, 2012).
This paper presents macroscopic flow modeling tools we have used for simulation of managed lane-freeway
networks. We begin in Section 2 with a discussion of relevant modeling tools from the literature, and
how we make use of them. Section 3 describes network structures for the two common managed lane
configurations: gated-access and full-access (ungated) lanes. This Section also describes models for friction
and inertia effects that arise in managed lanes. Section 4 outlines how one may take these managed lanespecific constructions and add them to a general macroscopic traffic simulation process. Section 5 describes
calibration methodologies for both network configurations. Section 6 presents case studies of two networks,
one each of gated- and full-access, and typical macroscopic simulation results.
2
Managed Lane Modeling
The modeling techniques presented in this paper are based on the first-order “kinematic wave” macroscopic
traffic flow model. These models describe aggregate traffic flows as fluids following a one-dimensional conservation law. We briefly introduce our notation here, but do not discuss the basics of this class of models.
Detailed reviews are available in many references.
2
2.1
Modeling basics
In this simulation framework, a road is divided into discrete cells, which we refer to as links. Links are drawn
between nodes: a link begins at one node and ends at another. Many links may begin and end at each node.
Each link l is characterized by density nl , the number of cars in the link. In a first-order model, the traffic
flows are fully prescribed by the density. From timestep t to t + 1, link l’s density updates according to the
equation
M
N
X
1 X
fil (t) −
flj (t) ,
(2.1)
nl (t + 1) = nl (t) +
Ll i=1
j=1
where Ll is the length of link l, fil (t) is the flow (number of vehicles) leaving link i and entering link l at
time t, flj (t) is the flow leaving link l and entering link j at time t, M is the number of links that end at
link l’s beginning node, and N is the number of links that begin at link l’s ending node.
Computing the inter-link flows requires the use of two intermediate quantities for each link. These are the
link demand Sl (t), which is the number of vehicles that wish to exit link l at timestep t; and the link supply,
Rl (t), which is the number of vehicles link l can accept at time t. Both Sl and Rl are functions of the density
nl . The model that computes Sl and Rl from nl is often called the “fundamental diagram” or “link model,”
and the model that computes the flows from all links’ supplies and demands is often called the “node model.”
A brief outline of how first-order macroscopic simulation of a road network (sometimes called a dynamic
network loading simulation) is performed could be:
1. At time t, use the link model for each link l to compute the link’s demand Sl (t) and supply Rl (t) as a
function of its density nl (t).
2. Use the node model for each node to compute the inter-link flows fij for all incoming links i and
outgoing links j as functions of Si (t), Rj (t), and information about vehicles’ desired movements ij.
3. Update the state of each link using (2.1).
4. Increment t and repeat until the desired simulation end time is reached.
The tools described in this paper are compatible with any such link model. We make use of a particular
node model that we have studied in Wright et al. (2016a,b). An aspect of this node model of particular
relevance to managed lane modeling is our “relaxed first-in-first-out (FIFO) rule” construction (Wright et al.,
2016a). This is necessary for modeling the flows between the GP and managed lanes. Without a FIFO
relaxation, congestion in one of the two lane groups could block traffic in the other when that may be
unrealistic (see Wright et al. (2016a, Section 2.2) for a detailed discussion).
So far, we have presented ingredients for a model that, while able to express many simple network topologies
by joining links and nodes, does not capture several important behaviors in managed lane-freeway networks.
The next three Sections briefly overview the additions to the standard model that will be explained in greater
detail in the remainder of the paper.
2.2
Multiple classes of vehicles and drivers
In (2.1), we describe the number of vehicles in a link as a single number, nl . In this formulation, all vehicles
are treated the same. However, for simulation in a managed lane-freeway network, it makes sense to break
3
nl into different classes of vehicles and/or drivers. For example, for a freeway with an HOV lane facility, we
might consider two classes: HOVs and non-HOVs. To this end, (2.1) can be rewritten as
M
N
X
X
1
ncl (t + 1) = ncl (t) +
f c (t) −
fljc (t) ,
(2.2)
Ll i=1 il
j=1
where c ∈ {1, . . . , C} indexes vehicle classes (often called “commodities” in the traffic literature).
Extending the density update equation to multiple classes means that the link and node models must also
c
be extended to produce per-class flows fij
. In this paper, we will not specify a particular link model, but
assume use of one that produces per-class demands Sic and overall supplies Rj (the node model, in computing
c
the fij
, is responsible for splitting the available supply Rj among the different demanding vehicle classes).
Examples of this type of link model include those considered in Wong and Wong (2002), Daganzo (2002),
and van Lint et al. (2008) (examples of multi-class link models of second- or higher-order include those of
Hoogendoorn and Bovy (2000). These types of models have higher-order analogs of supply and demand).
2.3
Toplogical expression of managed lane-freeway networks
In both (2.1) and (2.2), we describe a link in terms of its total density nl and its breakdown into percommodity portions, ncl . By discretizing the road into these one-dimensional links, we lose information
about differences between vehicle proportions across lanes, as well as inter-lane and lane-changing behavior.
This becomes a problem if such unmodeled behavior is of interest. In our setting, this means that modeling
a freeway with a managed lane should not be done with a single link following (2.1) or (2.2), as it would be
impossible to study the managed lane-freeway network behavior of interest.
Modeling differences in vehicle density across lanes is natural in microscopic and mesoscopic (see, for example,
Treiber et al. (1999); Hoogendoorn and Bovy (1999); Ngoduy (2006), and others) models, but macroscopic
models, in their simplicity, have less readily-accessible avenues for including these differences. One straightforward method is to model each lane as a separate link, as in, e.g. Bliemer (2007) or Shiomi et al. (2015).
However, this method has a few drawbacks. First, it requires the addition of some lane-assignment method
to prescribe the proportions of each vehicle class c for each lane (such as a logit model as used in Farhi
et al. (2013) and Shiomi et al. (2015)), which requires not-always-accessible data for calibration. Second,
drastically increasing the number of links in a macroscopic model will necessarily increase the size of the
state space and model complexity, which is, in a sense, incompatible with the overall goal of selecting a
macroscopic model over a micro- or mesoscopic model: some of the “macro” in the macroscopic model is lost.
Instead, in this paper we choose to model the GP lanes (or “GP lane group”) as one link and the parallel
managed lanes (or “managed lane group”) as another link. Applied to an entire length of road, this creates
a network topology of two “parallel chains” of links - one GP and one managed. The two chains will share
nodes, but cross-flows between the chains are permitted only in locations where there is physical access
(i.e., no physical barriers) and policy access (i.e., no double solid lines under U.S. traffic markings). Where
cross-flows are possible, we do not use a logit model, but instead a driver behavior model first introduced in
Wright et al. (2016a). This two-chain model is similar to the one described in Liu et al. (2012), though in
this reference, GP-managed lane crossflows were not considered.
2.4
Observed phenomena in managed lane-freeway networks
The above-mentioned friction effect is one of several emergent behaviors thought to be important for understanding traffic phenomena present on managed lane-freeway networks, and has been blamed for some of the
“underperformance” of managed lanes (Jang and Cassidy, 2012). To expand on our earlier description, the
4
friction effect describes a tendency of vehicles in an HOV lane to reduce their speed when the vehicles in the
adjacent GP lane(s) congest to the point where they slow down. It has been hypothesized that this occurs
due to HOV drivers being uncomfortable when traveling at a drastically higher speed than the adjacent GP
vehicles, and slowing down to reduce the speed differential (Jang and Cassidy, 2012).
In Liu et al. (2012), the authors created a macroscopic model of a managed lane-freeway network with a
friction effect model. They proposed modeling the friction effect by having two separate link models for the
managed lanes – one each for when the GP lane is above or below some threshold density value.
In Section 3, we propose a more expressive model of the friction effect by replacing this piecewise implementation with a linear implementation, where the reduction in demands Slc in the managed lane is proportional
to the speed differential between the managed lane(s) and GP lane(s). A linear relationship like this was
hypothesized in, e.g., Jang and Cassidy (2012, Fig. 5(c)). The magnitude of the friction effect (i.e., the degree to which managed lane drivers slow down to match GP lane drivers’ speed) is thought to be dependent
on the type of separation between the managed lane(s) and GP lane(s) (e.g., painted lines vs. a concrete
barrier) (Jang et al., 2012), which can be encoded by selecting the linear coefficient to this speed differential.
3
Full- and Gated-Access Managed Lane-Freeway Network Topologies
We will consider two types of managed lane-freeway network configurations: full access and separated with
gated access. In a a full-access configuration, the managed lane(s) are not physically separated from the
GP lane(s), and eligible vehicles may switch between the two lane groups at any location. Often, full-access
managed lane(s) are special-use only during certain periods of the day, and at other times they serve as GP
lane(s) (e.g., HOV lanes are often accessible to non-HOVs outside of rush hour). On the other hand, in a
gated-access configuration, traffic may switch between the managed lane(s) and GP lane(s) only at certain
locations, called gates; at non-gate locations, the two lane groups are separated by road markings (i.e., a
double solid line in the U.S.) or a physical barrier. Usually, gated-access managed lanes are special-use at
all times. The implemented managed lane access scheme depends on jurisdiction. For example, full-access
lanes are common in Northern California, and separated lanes are common in Southern California.
The differences in physical geometry and access points between the two access types requires two different
types of topology in constructing a network for a macroscopic model.
3.1
Note on link and node models used in this section
As discussed in the previous Section, we attempt to be agnostic with regards to the particular link model
(e.g., first-order fundamental diagram) used in our implementations. However, in our model of the friction
effect in Section 3.3, we parameterize friction being in effect on a particular link l for a particular vehicle
class c at time t by adjusting that link’s demand Sl (t). For that discussion only, we specify a particular link
model. This link model is reviewed in Appendix A. This link model is also the one used in the simulations
presented in Section 6.
The node model used here and for the remainder of this paper, when a particular form is necessary, is the
one discussed in Wright et al. (2016a) and Wright et al. (2016b). We use this node model because it handles
multi-commodity traffic, optimizes the utilization of downstream supply, makes use of input link priorities
and has a relaxation of the “conservation of turning ratios” or “first-in-first-out” (FIFO) constraint of most
node models. This last feature allows us to describe a set of GP lanes just upstream of an offramp with
one link, and handle a condition of a congested offramp by having the congestion spill back onto only the
offramp-serving lanes of the GP link (as opposed to the entirety of the GP link). See Wright et al. (2016a,
Section 3) and Wright et al. (2016b) for more discussion.
5
Figure 1: Freeway with full-access managed lane. ML = Managed Lane.
3.2
Full-access managed lanes
A full-access managed lane configuration is presented in Figure 1: GP and managed links (recall, as discussed
above, all GP lanes and all managed lanes are collapsed into one link each) are parallel with the same geometry
and share the same beginning and ending node pairs; traffic flow exchange between GP and managed lanes
can happen at every node. Note that in Figure 1, we use a slightly irregular numbering scheme so that it is
clear whether a link is a GP link, managed lane link, or ramp link. Parallel links in the graph have numbers
made up of the digit of their terminating node, with GP links having one digit (i.e., link 1), managed lane
links having two (i.e., link 11), and ramp links having three (i.e., link 111). Note also that we use a U.S.-style,
driving-on-the-right convention here, with the managed lane(s) on the left of the GP lanes and the ramps
on the far right.
Links that are too long for modeling purposes (i.e., that create too low-resolution a model) may be broken
up into smaller ones by creating more nodes, such as nodes 2 and 3 in Figure 1. Fundamental diagrams for
parallel GP and managed lane links may be different (Liu et al., 2011).
We introduce two vehicle classes (C = 2): c = 1 corresponds to the GP-only traffic and c = 2 corresponds
to the special traffic. When the managed lane(s) is (are) active, c = 1-traffic is confined to the GP link,
whereas c = 2-traffic can use both the GP and managed lane links. We denote the portion of vehicles of
c
class c in link i that will attempt to enter link j as βi,j
. This quantity is called the split ratio.
3.2.1
Split ratios for full-access managed lanes
We make an assumption that both vehicle classes take offramps at the same rate. For example, for node 1 in
1
2
Figure 1, we might say that βi,222
= βi,222
, βi,222 . Strictly speaking, it is not necessary to assume that the
c
βi,222 are equal for all c. However, in practice the offramp split ratios are typically estimated from flow count
data taken from detectors on the offramp and freeway. Generally speaking, these detectors cannot identify
c
vehicle type, so the only quantity estimable is a flow-weighted average of the quantities βi,222
. To estimate
the class-specific split ratios, one needs some extra knowledge of the tendency of each class to take each
offramp (for example, that GP-only vehicles are half as likely as special traffic to take a certain offramp).
Assuming that each class exits the freeway at the same rate is a simple and reasonable-seeming assumption.
This same problem of unidentifiability from typical data appears in several other split ratios. First, it may
not be possible to tell how many vehicles taking an offramp link come from the upstream GP, managed lane,
or (if present) onramp link. In this case, some assumptions must then be made. For example, three different
assumptions that may be reasonable are (1) that vehicles in each link i take the offramp at the same rate;
or (2) that no vehicles from the managed lane(s) are able to cross the GP lanes to take the offramp at this
node, and that no vehicles entering via the onramp, if one is present, exit via the offramp at the same node;
or (3) that vehicles in GP and managed links take the offramp at the same rate, while no vehicles coming
from the onramp are directed to the offramp. Looking back at node 1 in Figure 1 again, assumption (1)
would say the βi,222 are equal for all i; assumption (2) would say β11,222 = β111,222 = 0; and assumption (3)
6
would say β1,222 = β11,222 and β111,222 = 0. The best assumption for each node will depend on the road
geometry for that particular part of the road (how near the offramp is to any onramps, how many GP lanes
a vehicle in a managed lane would have to cross, etc.).
Second, the crossflows between the GP and managed lane links are not observable. Even if there exist
detectors immediately upstream and downstream of the node where traffic can switch between GP and
managed lanes, it is impossible to uniquely identify the crossflows. In a simulation, these crossflows must be
governed by some driver choice model.
Putting together these assumptions and the special-traffic-only policy for the managed lane, we can summarize most of the necessary split ratios needed for computing flows in a node model. For example, for node 1
in Figure 1,
j=2
j = 22 j = 222
i
=
1
1
−
β
0
β1,222
1,222
1
βi,j
=
i
=
11
n/a
n/a
n/a
i = 111 1 − β111,222 0
β111,222
j = 2 j = 22 j = 222
i
=
1
−
−
β1,222
2
βi,j
=
i
=
11
−
−
β
11,222
i = 111 −
−
β111,222
1
where “n/a” means that the split ratios β11,j
are not applicable, as there should be no vehicles of class
c = 1 in the managed lane. The split ratios marked with a dash are those above-mentioned flows that are
unobservable and come from some driver choice model. Of course, whatever method is chosen to compute
2
2
2
these unknown split ratios, we must have βi,2
+ βi,22
= 1 − βi,222
.
Similarly, for node 2, which does not have an onramp or an offramp,
j = 3 j = 33
1
i=2
1
0
βi,j
=
i = 22 n/a
n/a
j = 3 j = 33
2
i=2
−
−
βi,j
=
i = 22 −
−
with “n/a” and the dash meaning the same as above.
As previously mentioned, full-access managed lanes often have certain time periods during which nonspecial
(c = 1) traffic is allowed into the managed lane. We can model this change in policy simply by changing the
split ratios at the nodes. For node 1, for example, the nonrestrictive policy is encoded as
j = 2 j = 22 j = 222
i=1
−
−
β1,222
c
for c = {1, 2},
βi,j =
i
=
11
−
−
β
11,222
i = 111 −
−
β111,222
and for node 2 as
j = 3 j = 33
c
i=2
−
−
βi,j
=
i = 22 −
−
for c = {1, 2}.
In other words, the managed lane link is treated as additional GP lane(s), and the split ratios governing the
crossflows between the two links should be found from the driver choice model for both vehicle classes.
7
3.2.2
Node model for full-access managed lane-freeway networks
As mentioned in Section 3.1, we make use of the node model discussed in Wright et al. (2016a) and Wright
et al. (2016b) to describe a freeway network with managed lanes. This node model differentiates itself from
others in that it deals with multi-commodity traffic flow, optimally utilizes the available supply, makes use
of input link priorities, and has a relaxation of the common FIFO constraint. By default, link priorities can
be taken proportional to link capacities. To explain relaxed FIFO, say that some link i has vehicles that
wish to enter both links j and j 0 . If link j 0 is jammed and cannot accept any more vehicles, a strict FIFO
constraint would say that the vehicles in i that wish to enter j 0 will queue at i’s exit, and block the vehicles
that wish to enter j. In a multi-lane road, however, only certain lanes may queue, and traffic to j may still
pass through other lanes. The relaxation is encoded in so-called “mutual restriction intervals” ηji 0 j ⊆ [0, 1].
This interval partly describes the overlapping regions of link i’s exit that serve both links j and j 0 . For
ηji 0 j = [y, z], a z − y portion of i’s lanes that serve j also serve j 0 , and will be blocked by the cars queueing
to enter j 0 when j 0 is congested. For example, if j is served by three lanes of i, and of those three lanes, the
leftmost also serves j 0 , we would have ηji 0 j = [0, 1/3].
As an example, we consider again node 1 in Figure 1. Say that the GP links (1 and 2) have four lanes, that
the managed lane links (11 and 22) have two lanes, and that the onramp merges into and the offramp diverges
from the rightmost GP lane. Further, we say that when the managed lane link is congested, vehicles in the
GP lanes that wish to enter the managed lanes will queue only in the leftmost GP lane. On the other hand,
when the GP link is congested, vehicles in the managed lanes that wish to enter the GP lanes will queue only
in the rightmost managed lane. Finally, we suppose that jammed offramp (222) will cause vehicles to queue
only in the rightmost GP lane. Taking together all of these statements, our mutual restriction intervals for
this example are:
j = 2 j = 22 j = 222
0
j =2
[0, 1]
[0, 1]
[0, 1]
1
ηj 0 j =
0
1/4]
j
=
22
[0,
[0,
1]
∅
0
j = 222 [3/4, 1]
∅
[0, 1]
j = 2 j = 22 j = 222
0
j =2
[0, 1]
[0, 1/2]
∅
11
ηj 0 j =
0
j = 22
[0, 1]
[0, 1]
∅
0
j = 222
∅
∅
[0, 1]
j = 2 j = 22 j = 222
0
j =2
[0, 1]
[0, 1]
[0, 1]
111
ηj 0 j =
.
∅
[0, 1]
∅
j 0 = 22
0
j = 222 [0, 1]
[0, 1]
[0, 1]
To read the above tables, recall that as written, j 0 is the congested, restricting link, and j is the restricted
link. These chosen restriction intervals allow for expected behavior in this network, such as a congested GP
link causing possible queueing in the right managed lane (if some drivers are trying to enter the GP link),
but no spillback into the left managed lane.1
For a detailed discussion on how mutual restriction intervals are included in the node model’s flow calculations
and solution algorithms, see Wright et al. (2016a) and Wright et al. (2016b).
3.3
Friction effect
The friction effect is an empirically-observed phenomenon in situations where managed lanes are relatively
uncongested, but the managed-lane traffic will still slow down when the adjacent GP lanes congest and
1 In
this example, we assume that the managed lane has two sublanes — left and right.
8
slow down (see Daganzo and Cassidy (2008), Liu et al. (2011), Cassidy et al. (2015), etc.). It has been
hypothesized (Jang and Cassidy, 2012) that this phenomenon arises from the managed-lane drivers’ fear
that slower-moving vehicles will suddenly and dangerously change into the managed lane ahead of them.
We suggest modeling the friction effect based on a feedback mechanism that uses the difference of speeds in
the parallel GP and managed lane links to scale down the flow (and therefore the speed) out of the managed
lane link if necessary.
To explain the concept, we again refer to Figure 1 and consider parallel links 1 (GP) and 11 (managed lane).
Recall that, under a first-order model (2.2), the speed of traffic in link l at time t is
( PC PN f c (t)
Pc
lj
c=1
c
P j=1
if
c
c=1 nl (t) > 0,
c=1 nl (t)
(3.1)
vl (t) =
f
vl (t)
otherwise,
where vlf (t) is the theoretical free flow speed of link l at time t.
We say that the friction effect is present in managed lane link 11 (following the notation of Figure 1) at time
t if
n
o
v1 (t − 1) < min v1f , v11 (t − 1) ,
(3.2)
which means that (1) the GP link is in congestion (its speed is below its current free flow speed), and (2)
the speed in the GP link is less than the speed in the managed lane link. We denote this speed differential
as:
f
∆11 (t) = v11
− v1 (t − 1).
(3.3)
It has been observed (Jang et al., 2012) that the magnitude of the friction effect — the degree to which
managed-lane drivers slow down towards the GP lane’s traffic speed — depends on the physical configuration
of the road. For example, less of a friction effect will be present on managed lanes that are separated from
the GP lanes by a buffer zone than those that are contiguous with the GP lanes (Jang et al., 2012), and the
presence of a concrete barrier would practically eliminate the friction effect. Other factors that may affect
this magnitude include, for example, whether there is more than one managed lane, or whether there is a
shoulder lane to the left of the managed lane that drivers could swerve into if necessary.
To encode this variability in the magnitude of the friction effect in managed lane link 11, we introduce
σ11 ∈ [0, 1] the friction coefficient of this link. The friction coefficient reflects the strength of the friction.
Its value depends on the particular managed configuration and is chosen by the modeler. A value of σ11 = 0
means there is no friction (which may be appropriate if, perhaps, the managed lane(s) are separated from
the GP lanes by a concrete barrier), and σ11 = 1 means that the managed lane link speed tracks the GP
link speed exactly.
When the friction effect is active (i.e., when (3.2) is true), we adjust the fundamental diagram of the managed
lane link by scaling down its theoretical free flow speed vlf (t), and propagate that change through the rest of
the fundamental diagram parameters. The exact mathematical changes will of course be different for every
different form of fundamental diagram. For the particular fundamental diagram discussed in Appendix A,
this means adjusting the free flow speed and capacity as follows:
f
v̂11 (t) = v11
(t) − σ11 ∆11 (t);
(3.4)
F̂11 (t) = v̂11 (t)n+
11 ,
(3.5)
where n+
11 is the high critical density (see Appendix A for its definition), and using these adjusted values in
the calculation of the sending function (A.1),
(
)
F̂
(t)
11
c
S11
(t) = v̂11 (t)nc11 (t) min 1,
.
(3.6)
PC
v̂11 (t) c=1 nc11 (t)
9
For the fundamental diagram of Appendix A, we must also check whether
C
X
c=1
nc11 (t) <
F̂11 (t)
f
v11
− ∆11 (t)
=
v̂11 (t)n+
11 (t)
f
v11
− ∆11 (t)
(3.7)
.
If not, then applying friction will lead to the managed lane link speed falling below the GP link speed, and
the unadjusted sending function should be used (the possibility of this happening is due to the use of two
critical densities to create Appendix A’s fundamental diagram’s “backwards lambda” shape).
Evidence of a friction effect reducing managed lane speed in a form that is linear in the speed differential
(i.e., (3.4)) can be found in e.g., Jang et al. (2012). Again, the exact form of (3.6), the sending function with
friction, will depend on the link’s original fundamental diagram model.
3.4
Separated managed lanes with gated access
A separated, gated-access managed lane configuration is presented in Figure 2. Unlike the full-access configuration, the GP and managed lane link chains do not necessarily meet at every node. Instead, they need
only meet at a few locations, where vehicles can move into and out of the managed lane(s). Note that, unlike
the full-access configuration, there is no need for GP and managed lane links to be aligned.
As labeled in Figure 2, the nodes where the two link chains meet are called gates (as an aside, one way
to describe the full-access managed lane configuration would be that every node is a gate). Similar to our
construction of excluding GP-only traffic from the managed lane in the full-access case, we can disable flow
exchange at a given gate by fixing split ratios so that they keep traffic in their lanes. For example, to disable
c
c
the gate (the flow exchange between the two lanes) at node 2 in Figure 1, we set β2,3
= 1 and β22,33
= 1 (this
c
c
means that β2,33 = 0 and β22,3 = 0), c = 1, 2. Thus, the full-access managed lane can be easily converted into
the separated managed lane by setting non-exchanging split ratios everywhere but designated gate-nodes.
In practice, a gate is stretch of freeway that may be a few hundreds of meters long (Cassidy et al., 2015),
and, potentially, we can designate two or three sequential nodes as gates. In this paper, however, we model
a gate as a single node.
Figure 2: Freeway with separated managed lane and gates. ML = Managed Lane.
For the gated-access configuration, we suggest setting mutual restriction coefficients in the same manner as
full-access managed lanes, in Section 3.2.2.
Compared to the full-access managed lane configuration, the gated-access configuration has a smaller friction
effect (Jang et al., 2012): drivers in the separated managed lane feel somewhat protected by the buffer,
whether it is virtual (double solid line) or real (concrete), from vehicles changing abruptly from the slow
moving GP lane and, therefore, do not drop speed as dramatically. The degree to which the friction effect is
mitigated is disputed (e.g., see Footnote 3 in Cassidy et al. (2015)), but overall the bottlenecks created by
the gates are much greater instigators of congestion (Cassidy et al., 2015). Inclusion of the friction effect in
modeling separated managed lane configurations is thus not as essential as in modeling the full-access case.
10
3.4.1
Modeling a flow of vehicles from the managed lanes to the offramps
Recall from Section 3.2.1 that, in the full-access managed lane model, we can model vehicles moving from
the managed lane link to offramps in a straightforward manner, by setting corresponding split ratios (for
c
example, β11,222
, c = 1, 2, for node 1 in configuration from Figure 1). For the gated-access configuration,
however, modeling traffic as moving from the managed lanes to offramps is more complicated: generally,
gates do not coincide with offramp locations. In fact, there are typically between two and five offramps
between two gate locations. We denote the offramps in the GP road segment connecting two gates as exits
e1 , e2 , . . . , eK (see Figure 2). These offramps cannot be accessed directly from the managed lane. Instead,
vehicles traveling in the managed lane link that intend to take one of the exits e1 , . . . , eK , must switch from
the managed lane link to the GP link at gate-node 1 and then be directed to the correct offramp. Creating
a simulation where vehicles behave like this requires a more involved modeling construction.
To resolve this challenge, our gated-access model introduces new vehicle classes in addition to the c = 1
(GP-only) and c = 2 (special) traffic used in the full-access model of Section 3.2. These additional classes
will be used to distinguish subsets of the special traffic population by its destination offramp. If K is the
largest number of offramps between two adjacent gates, then altogether we have C = K + 2 vehicle classes:
c = 1, 2, e1 , . . . , eK , where ek indicates the class of vehicles that will exit through the k-th offramp after
leaving the managed lane through the gate. By definition, traffic of type c = ek may exist in the GP lane
segment between gate 1 and offramp ek , but there is no traffic of this type either in the GP link segment
between offramp ek and gate 2 or in the managed lane link. This movement pattern is ensured by setting
constant split ratios:
βiekx1 = 1, i = 1, 11, 111,
βxekk ek = 1,
βxekk0 ek0 = 0, k 0 6= k,
direct all ek -type traffic to the GP link at gate 1;
direct all ek -type traffic to offramp ek ;
do not send any ek -type traffic to other offramps,
(3.8)
where k = 1, . . . , K, and xk denotes the input GP link for the node that has the output link ek (see Figure 2).
Vehicles of class c = ek do not enter the network via onramps or the upstream boundary, but instead
are converted from special c = 2 traffic as it leaves the managed lane(s) through the gate. We perform
this
as part of the link model computation, such that the total demand for the switching link,
PC conversion
c
c=1 Sl remains the same before and after the switch. The exact link on which this switching takes place
is the managed lane link immediately upstream of the gate (e.g., link 11 in Figure 2).
We say that the amount of traffic that should change from vehicle class c = 2 to vehicle class ek at time
t is (using link 11 as an example) n211 (t)βx2k ek (t)v11 (t), where v11 (t) is in units of vehicles per simulation
timestep (this factor is included so that the switching done is proportional to link 11’s outflow, rather than
its density), and βx2k ek (t) is the split ratio from xk , the GP link immediately upstream of exit ek , and the
exit ek at time t. This statement is based on the assumption that the vehicles in the managed lane link will
exit the freeway through exit ek at the same rate as special (c = 2) vehicles that happened to stay in the GP
lanes. That is, if a βx2k ek portion of c = 2 vehicles intend to leave the GP lanes through exit ek , then a βx2k ek
portion of the c = 2 vehicles in the managed lane(s) will leave the managed lane link at the closest upstream
gate and leave the network at exit ek when they reach it. Note that if there are K 0 < K offramps between
two particular gates, then no vehicles should switch to type c = ek , k ∈ {K 0 + 1, . . . , K} at the upstream
gate, as they would have no ramp to exit through.
Using Figure 2 as a reference, we can now formally describe the procedure for destination assignment to
traffic in the managed lane link.
1. Given are vehicle counts per commodity nc11 , c = 1, 2, e1 , . . . , eK ; free flow speed v11 ; and offramp split
ratios βx1k ,ek and βx2k ,ek , k = 1, . . . , K.2
a given GP segment connecting two adjacent gates has K 0 offramps, where K 0 < K, then assume βx1k ,ek = βx2k ,ek = 0
for k ∈ (K 0 , K].
2 If
11
2. Initialize:
ñc11 (0)
k
:= nc11 ,
:=
c = 1, 2, e1 , . . . eK ;
1.
3. Assign ek -type traffic:
ñe11k (k)
ñ111 (k)
ñ211 (k)
=
ñe11k (k − 1) + βx1k ,ek v11 ñ111 (k − 1) + βx2k ,ek v11 ñ211 (k − 1);
=
ñ111 (k
ñ211 (k
=
− 1) −
− 1) −
βx1k ,ek v11 ñ111 (k
βx2k ,ek v11 ñ211 (k
(3.9)
− 1);
(3.10)
− 1).
(3.11)
4. If k < K, then set k := k + 1 and return to step 3.
5. Update the state:
nc11 = ñc11 (K),
c = 1, 2, e1 , . . . , eK .
After the switches to c = ek class traffic have been done, there may be unresolved split ratios for both
classes c = 1 and c = 2 at the gates (similar to the dashed split ratios in the tables in Section 3.2.1). These
split ratios should be filled in with the same tools as those in Section 3.2.1: some sort of driver lane choice
behavior.
3.5
Inertia effect
At the end of the previous Section, we mentioned that some split ratios will likely be undefined after switching
c = 2 class vehicles to the c = ek classes. In particular, c = 2 class vehicles in the upstream GP link (e.g.,
link 1 in Figure 2) and remaining c = 2 vehicles in the upstream managed lane link (e.g. link 11 in Figure
2) will need to decide whether to pass through the gate or remain in their current lane. Sample tools for
modeling driver lane choices such as these include the class of “logit” logistic regression models (McFadden,
1973), or dynamic split ratio solvers such as the one presented in Wright et al. (2016a) and reviewed in
Appendix B.
When applied to lane choice (e.g., as in Farhi et al. (2013)), logit models produce a set of portions in [0, 1],
one for each lane, that sum to one. Each lane’s value is the equilibrium portion of vehicles that will travel
on that lane. In a dynamic simulation context, such as considered in this article, the differences between
the logit model’s equilibrium portions and the current distribution of vehicles across lanes at time t are used
to select split ratios at time t such that the actual distribution approaches the logit equilibrium. We argue,
though, that use of this sort of split ratio solver in unmodified form might be inappropriate for computing
gate split ratios in the gated-access managed lane configuration. Unmodified, a value function for either the
GP or managed lane link might include terms such as the link’s speed of traffic, density, etc. However, often
a gated-access managed lane is separated from the GP lanes by some buffer zone or visibility-obstructing
barrier that makes switching between the two links more hazardous than switching between two contiguous
lanes. Therefore, if one uses a logit-based model, it would be appropriate to modify the logit model’s value
function such that staying in the current link (e.g., the movements (1,2) and (11,22) in Figure 3) has some
positive value for drivers, and the gains (e.g., in travel time) for ingress/egress movements (e.g., (1,22) and
(11,2) in Figure 3) must be of more value than the staying-in-the-lane value. We refer to this model as the
inertia effect.
We may also incorporate the inertia effect into dynamic split ratio solvers, such as the one introduced in
Wright et al. (2016a) and reviewed in Appendix B. At time t, this particular
algorithm selects split ratios
P
in an attempt to balance the density ratio at the next timestep t + 1, c ncl (t + 1)/nJl , where nJl is the jam
12
Figure 3: A node where some of the input links form travel facilities with some of the output links. ML =
Managed Lane.
density, or the maximum number of vehicles that
P link l can hold. For
P example, if applied to the node in
Figure 3, this algorithm would attempt to make c nc2 (t + 1)/nJl and c nc22 (t + 1)/nJl as equal as possible.
For more details, see Appendix B and Wright et al. (2016a).
Here, we modify several steps of the solver so that this equality-seeking goal is balanced with a goal towards
enforcing the inertia effect. We illustrate these changes with the particular example of the node in Figure 3.
Ensuring that the split ratio assignment algorithm gives preferences to movements (1,2) and (11,22) over
(1,22) and (11,2) can be done in step 5 of the original algorithm, setting of oriented priorities. Specifically,
we modify (B.4). For this particular example, the original formula gives us:
c
c
γ1,2
(k) = β̃1,2
(k) +
c
c
γ11,2
(k) = β̃11,2
(k)
c
β 1 (k)
2c
β (k)
+ 112
c
c
γ1,22
(k) = β̃1,22
(k) +
c
c
γ11,22
(k) = β̃11,22
(k)
c
β 1 (k)
2c ;
β (k)
+ 112 .
c
c
c
Since for k = 0 β̃i,j
(0) = 0, i = 1, 11, j = 2, 22, we get γ1,2
(0) = γ1,22
(0) =
c
β 11 (k)
2
c
β 1 (k)
2
c
c
and γ11,2
(0) = γ11,22
(0) =
, which, according to (B.3), yields p̃1,2 (0) = p̃1,22 (0) and p̃11,2 (0) = p̃11,22 (0).
For each input link i that forms one lane with an output link ̂ and class c, such that ̂ ∈ Vic , (B.4) can be
modified as follows:
c
if split ratio is defined a priori: {i, j, c} ∈ B,
βij ,
c
c
c
c
β̃
(k)
+
β
(k)λ
,
i
and j form one lane: j = ̂,
γij (k) =
(3.12)
i
ij
i
c
β̃ c (k) + β c (k) 1−λ
i
,
i
and
j
are
in
different
lanes:
j
=
6
̂,
c
i
ij
|V |−1
i
where the parameter λci ∈
h
1
|Vic | , 1
i
is called the inertia coefficient, and indicates how strong the inertia effect
is. With
=
(3.12) reduces to the original formula, (B.4). With λci = 1, all the a priori unassigned
traffic from link i must stay in its lane — be directed to output link ̂. The choice of λi lies with the modeler.
In the case of example from Figure 3, the modified formula (3.12) yields:
λci
1
|Vic | ,
c
c
c
c
c
c
(k) = β̃1,22
(k) + β 1 (k)(1 − λc1 );
γ1,2
(k) = β̃1,2
(k) + β 1 (k)λc1
γ1,22
(3.13)
c
c
c
c
c
c
γ11,2
(k) = β̃11,2
(k) + β 11 (k)(1 − λc11 ) γ11,22
(k) = β̃11,22
(k) + β 11 (k)λc11 ,
where λ1 , λ11 ∈ 12 , 1 , and picking λ1 > 12 (λ11 > 12 ) would give preference to movement (1,2) over (1,22)
(and (11,22) over (11,2)).
The way of choosing λci for multiple input links is not obvious and an arbitrary choice may result in an
unbalanced flow distribution among output links. Therefore, we suggest picking just one input-output pair
(ı̂, ̂), and for that input link setting λcı̂ = 1, while for other input links i setting λci = |V1c | , c = 1, . . . , C.
i
The input link ı̂ must be from the lane that is expected to have a positive net inflow of vehicles as a result
of the split ratio assignment and flows computed by the node model. So,
P
P
P
c
c c
i:{i,j,c}∈B
c:{i,j,c}∈B βij Si
c:{i,j,c}∈B S i +
ı̂ = arg min =
,
(3.14)
Rj
i∈Û
13
where
Û = {input links i : ∃j, c, s.t. j ∈ Vic and the pair of links (i, j) belongs to the same lane} ,
(3.15)
and j denotes the output link that is in the same lane as input link i.
For the particular example node in Figure 3, we need to determine whether flow from link 1 will proceed to
link 2 or flow from link 11 to link 22, while other a priori undefined split ratios will be computed according
to the split ratio assignment algorithm. If ı̂ = 11, then λ11 = 1, λ1 = 21 , and a priori unassigned traffic in
c
the managed lane will stay in the managed lane (β11,2
= 0), while the a priori unassigned traffic coming
from links 1 and 111, will be distributed between links 2 and 22 according to the dynamic split ratio solver.
On the other hand, if ı̂ = 1, then λ1 = 1, λ11 = 12 , and the a priori unassigned traffic in the GP lane will
c
stay in the GP lane (β1,22
= 0), while the a priori unassigned traffic coming from links 11 and 111, will be
distributed between links 2 and 22 according to the dynamic split ratio solver.
4
Putting Together the Pieces: A Managed Lane-Freeway Network
Simulation Model
In this Section, we present a unified simulation algorithm for managed lane-freeway networks. This can
be considered a fleshing-out of the simplified first-order macroscopic simulation method briefly outlined in
Section 2.1, with extensions made by incorporating the additional items we have described in the sections
between that and this one.
4.1
Definitions
• We have a network consisting of set of links L and a set of nodes N .
– A node always has at least one incoming link and one outgoing link.
– A link may have an upstream node, a downstream node, or both.
• We have C different vehicle classes traveling in the network, with classes indexed by c ∈ {1, . . . , C}.
• Let t ∈ {0, . . . , T } denote the simulation timestep.
• In addition, while we have not covered them here, the modeler may optionally choose to define control
inputs to the simulated system that modify system parameters or the system state. Such control
inputs may represent operational traffic control schemes such as ramp metering, changeable message
signs, a variable managed-lane policy, etc. In the context of this paper, we suggest including the
parameterization of the friction effect and the class-switching construction of the separated-access
managed lane model as control actions.
4.1.1
Link model definitions
• For each link l ∈ L, let there be a time-varying C-dimensional state vector ~nl (t), which denotes the
density of the link of each of the C vehicle classes at time t.
– Each element of this vector, ncl (t), updates between timestep t and timestep t + 1 according to
(4.1).
– Also define ncl,0 for all l, c, the initial condition of the system.
14
• We define three types of links:
– Ordinary links are those links that have both beginning and ending nodes.
– Origin links are those links that have only an ending node. These links represent the roads that
vehicles use to enter the network.
– Destination links are those links that have only a beginning node. These links represent the roads
that vehicles use to exit the network.
• For each link l ∈ L, define a “link model” that computes the per-class demands Slc (t) and link supply
Rl (t) as a function of t and ~nl (t). Appendix A describes a particular example link model that will be
used in the example simulations in Section 6.
• For each origin link l ∈ L, define a C-dimensional time-varying vector, d~l (t), where the c-th element
dcl (t) denotes the exogenous demand of class c into the network at link l.
4.1.2
Node model definitions
• For each node ν ∈ N , let i ∈ {1, . . . , Mν } denote the incoming links and j ∈ {1, . . . , Nν } denote the
outgoing links.
P c
c
• For each node, define {βij
(t) :
j βij (t) = 1 ∀i, c} the time-varying split ratios for each triplet {i, j, c}.
Each split ratio may be fully defined, partially defined, or fully undefined. If some split ratios for a
node are undefined, then also define for that node some split ratio solver (e.g., logit or dynamic) to fill
c
in undefined split ratios βij
(t) at time t.
• For each node, define a “node model” that, at each time t, takes its incoming links’ demands Sic (t)
c
and split ratios βij
(t), its outgoing links’ supplies Rj (t), and other nodal parameters, and computes
c
the flows fij (t). In this paper, we refer to a specific node model with a relaxed first-in-first-out
(FIFO) construction that has additional parameters ηji 0 j (t) (mutual restriction intervals) and pi (t)
(the incoming links’ priorities).
4.1.3
State update equation definitions
• All links l ∈ L update their states according to the equation
ncl (t + 1) = ncl (t) +
1
c
f c (t) − fl,out
(t)
Ll l,in
∀c ∈ {1, . . . , C},
(4.1)
which is a slightly generalized form of (2.2).
• For all ordinary and destination links,
c
fl,in
(t) =
Mν
X
(4.2)
filc (t),
i=1
where ν is the beginning node of link l.
• For all origin links,
(4.3)
c
fl,in
(t) = dcl (t).
• For all ordinary and origin links,
c
fl,out
(t) =
Nν
X
(4.4)
fljc (t),
j=1
where ν is the ending node of link l.
15
• For all destination links,
(4.5)
c
fl,out
(t) = Slc (t).
4.2
Simulation algorithm
1. Initialization:
ncl (0)
:=
ncl,0
t
:=
0,
for all l ∈ L, c ∈ {1, . . . , C}.
2. Perform all control inputs that have been (optionally) specified by the modeler. For our purposes, this
includes:
(a) For each managed lane link, modify the sending function of the link model in accordance with the
friction effect model. Recall that, for the particular link model of Appendix A, we use (3.1)-(3.7).
(b) For each managed lane link whose downstream node is a gate node in a gated-access managed
lane configuration, perform class switching as detailed in Section 3.4.1
3. For each link l ∈ L and commodity c ∈ {1, . . . , C}, compute the demand, Slc (t) using the link’s link
model.
4. For each ordinary and destination link l ∈ L, compute the supply Rl (t) using the link model. For
origin links, the supply is not used.
c
5. For each node ν ∈ N that has one or more undefined split ratios βij
(t), use the node’s split ratio solver
to complete a fully-defined set of split ratios. Note that if an inertia effect model is being used, the
modified split ratio solver, e.g. the one described in Section 3.5, should be used where appropriate.
c
6. For each node ν ∈ N , use the node model to compute throughflows fij
(t) for all i, j, c.
7. For every link l ∈ L, compute the updated state ~nl (t + 1):
• If l is an ordinary link, use (4.1), (4.2), and (4.4).
• If l is an origin link, use (4.1), (4.3), and (4.4)
• If l is a destination link, use (4.1), (4.2), and (4.5).
8. If t = T , then stop. Otherwise, increment t := t + 1 and return to step 2.
5
Calibrating the Managed Lane-Freeway Network Model
Typically, a traffic modeler will have some set of data collected from traffic detectors (e.g., velocity and flow
readings), and will create a network topology with parameter values that allow the model to reproduce these
values in simulation. Then, the parameters can be tweaked to perform prediction and analysis. For our
managed lane-freeway networks, the parameters of interest are:
1. Fundamental diagram parameters for each link. Calibration of a fundamental diagram is typically
agnostic to the node model and network topology, and there exists an abundant literature on this
topic. For the purposes of the simulations in the following Section, we used the method of Dervisoglu
et al. (2009), but any other method is appropriate.
16
2. Percentage of special (that is, able to access the managed lane) vehicles in the traffic flow entering
the system. This parameter depends on, e.g., the time of day and location as well as on the type of
managed lane. It could be roughly estimated as a ratio of the managed lane vehicle count to the total
freeway vehicle count during periods of congestion at any given location.
3. Inertia coefficients. These parameters affect only how traffic of different classes mixes in different links,
but they have no effect on the total vehicle counts produced by the simulation.
4. Friction coefficients. How to tune these parameters is an open question. In Jang and Cassidy (2012)
the dependency of a managed lane’s speed on the GP lane speed was investigated under different
densities of the managed lane, and the presented data suggests that although the correlation between
the two speeds exists, it is not overwhelmingly strong, below 0.4. Therefore, we suggest setting friction
coefficients to values not exceeding 0.4.
5. Mutual restriction intervals. It is also an open question how to estimate mutual restriction intervals
from the measurement data. See the discussion in Section 3.2.2 for some guidelines.
6. Offramp split ratios.
Calibrating a traffic model, or identifying the best values of its parameters to match real-world data, is
typically an involved process for all but the simplest network topologies. In particular, once we consider
more than a single, unbroken stretch of freeway, the nonlinear nature and network effects of these systems
means that estimating each parameter in isolation might lead to unpredictable behavior. Instead, nonlinear
and/or non-convex optimization techniques such as genetic algorithms (Poole and Kotsialos, 2012), particle
swarm methods (Poole and Kotsialos, 2016), and others (Ngoduy and Maher (2012); Fransson and Sandin
(2012), etc.) are employed.
In the managed lane-freeway networks we have discussed, the key unknown parameters we have introduced
are the offramp split ratios, item 6, which may be particularly hard to estimate as they are typically timevarying and explicitly represent driver behavior, rather than physical parameters of the road. The other
items are not too difficult to identify using methods from the literature. The remainder of this section
describes iterative methods for identification of the offramp split ratios for both the full-access and gatedaccess configurations.
5.1
Split ratios for a full-access managed lane
Consider a node, one of whose output links is an offramp, as depicted in Figure 3. We shall make the
following assumptions.
in
1. The total flow entering the offramp, fˆ222
, at any given time is known (from measurements) and is not
in
ˆ
restricted by the offramp supply: f222 < R222 .
2. The portions of traffic sent to the offramp from the managed lane and from the GP lane at any given
c
c
= β11,222
, β, c = 1, . . . , C.
time are equal: β1,222
3. None of the flow coming from the onramp (link 111), if such flow exists, is directed toward the offramp.
c
In other words, β111,222
= 0, c = 1, . . . , C.
4. The distribution of flow portions not directed to the offramp between the managed lane and the GP
c
c
c
output links is known. This can be written as: βij
= (1 − β)δij
, where δij
∈ [0, 1], as well as β111,j ,
i = 1, 11, j = 2, 22, c = 1, . . . , C, are known.
5. The demand Sic , i = 1, 11, 111, c = 1, . . . , C, and supply Rj , j = 2, 22, are given.
17
At any given time, β is unknown and is to be found.
If β were known, the node model would compute the input-output flows, in particular, fi,222 =
i = 1, 11. Define
PC
c=1
in
ψ(β) = f1,222 + f11,222 − fˆ222
.
c
fi,222
,
(5.1)
Our goal is to find β from the equation
ψ(β) = 0,
(5.2)
i
h ˆin
PC
f222
in
,
1
, where Si = c=1 Sic . Obviously, if S1 + S11 < fˆ222
, the solution does not exist,
such that β ∈ S1 +S
11
in
ˆ
and the best we can do in this case to match f222 is to set β = 1, directing all traffic from links 1 and 11 to
the offramp.
in
in
Suppose now that S1 + S11 ≥ fˆ222
. For any given fˆ222
, we assume ψ(β) is a monotonically increasing
function
of
β
(this
assumption
is
true
for
the
particular
node
model of Wright et al. (2016a)). Moreover,
ˆin
f222
ψ S1 +S11 ≤ 0, while ψ(1) ≥ 0. Thus, the solution of (5.2) within the given interval exists and can be
obtained using the bisection method.
The algorithm for finding β follows.
1. Initialize:
b(0)
:=
b(0)
:=
in
fˆ222
;
S1 + S11
1;
k
:=
0.
in
2. If S1 + S11 ≤ fˆ222
, then are not enough vehicles to satisfy the offramp demand. Set β = 1 and stop.
3. Use the node model with β = b(0) and evaluate ψ(β). If ψ(b(0)) ≥ 0, then set β = b(0) and stop.
4. Use the node model with β = b(k)+b(k)
and evaluate ψ(β). If ψ b(k)+b(k)
= 0, then set β = b(k)+b(k)
2
2
2
and stop.
5. If ψ b(k)+b(k)
< 0, then update:
2
b(k + 1)
=
b(k + 1)
=
b(k) + b(k)
;
2
b(k).
b(k + 1)
=
b(k);
b(k + 1)
=
b(k) + b(k)
.
2
Else, update:
6. Set k := k + 1 and return to step 4.
Here, b(k) represents the lower bound of the search interval at iteration k and b(k) the upper bound.
18
5.2
Split ratios for the separated managed lane with gated access
The configuration of a node with an offramp as one of the output links is simpler in the case of a separated
HOV lane, as shown in Figure 4. Here, traffic cannot directly go from the HOV lane to link 222, and, thus, we
have to deal only with the 2-input-2-output node. There is a caveat, however. Recall from Section 3.4 that
in the separated managed lane case we have destination-based traffic classes, and split ratios for destinationbased traffic are fixed.
Figure 4: A node with a GP link and an onramp as inputs, and a GP link and an offramp as outputs.
We shall make the following assumptions:
in
1. The total flow entering the offramp, fˆ222
, at any given time is known (from measurements) and is not
in
restricted by the offramp supply: fˆ222 < R222 .
2. All the flow coming from the onramp (link 111), if such flow exists, is directed toward the GP link 2.
c
c
In other words, β111,2
= 1 and β111,222
= 0, c = 1, . . . , C.
3. The demand Sic , i = 1, 111, c = 1, . . . , C, and supply R2 are given.
c
4. We denote the set of destination-based classes as D. The split ratios β1j
for c ∈ D are known. Let
c
the split ratios β1j = β for c ∈ {1, . . . , C} \ D, where β is to be determined (i.e., we assume all
non-destination-based classes exit at the same rate).
The first three assumptions here reproduce assumptions 1, 3 and 5 made for the full-access managed lane
case. Assumption 4 is a reminder that there is a portion of traffic flow that we cannot direct to or away from
the offramp, but we have to account for it.
Similarly to the full-access managed lane case, we define the function ψ(β):
X
X
c
c
in
f1,222
+
f1,222
− fˆ222
,
ψ(β) =
c∈D
(5.3)
c∈D
c
where f1,222
, c = 1, . . . , C are determined by the node model. The first term of the right-hand side of (5.3)
depends on β. As before, we assume ψ(β) is a monotonically increasing function. We look for the solution
of equation (5.2) on the interval [0, 1]. This solution exists iff ψ(0) ≤ 0 and ψ(1) ≥ 0. The algorithm for
finding β is the same as the one presented in the previous section, except that b(0) should be initialized to
0, and S11 is to be assumed 0.
5.3
An iterative full calibration process
For the purposes of the simulations presented in the following Section, we placed the iterative split ratio
identification methods of Sections 5.1 and 5.2 within a larger iterative loop for the remaining parameters.
The model calibration follows the flowchart shown in Figure 5.
19
Initial Input Data
•
•
•
•
•
Link fundamental
diagrams
Input demand
Special traffic
portion of input
demand
Initially guessed
off-ramp split ratios
Off-ramp demand 1
Run simulation in
normal mode to
compute split ratios
that distribute traffic
between GP and
managed lane links 2
Start
Run simulation in
off-ramp split ratio
solver mode to
compute off-ramp
split ratios
3
No
Off-ramp
flows match
off-ramp
demand?
Run simulation in
normal mode to
produce density,
flow, speed, VMT
and VHT
4
5
Yes
Tune Input Data
• Off-ramp demand
• Input demand
• Special traffic
portion of input
demand
7
No
Simulation
results
match
benchmark?
6
Yes
Stop
Figure 5: Calibration workflow.
1. We start by assembling the available measurement data. Fundamental diagrams are assumed to be
given. Mainline and onramp demand are specified per 5-minute periods together with the special vehicle
portion parameter indicating the fraction of the input demand that is able to access the managed lane.
Initially, we do not know offramp split ratios as they cannot be measured directly. Instead, we use
some arbitrary values to represent them and call these values “initially guessed offramp split ratios”.
Instead of the offramp split ratios, we have the flows directed to offramps, to which we refer to as
offramp demand.
2. We run our network simulation outlined in Section 4.2 for the entire simulation period. At this point,
in step 5 of the simulation, the a priori undefined split ratios between traffic in the GP and in the
managed lanes are assigned using a split ratio solver.
3. Using these newly-assigned split ratios, we run our network simulation again, only this time, instead
of using the initially guessed offramp split ratios, we compute them from the given offramp demand as
described in Sections 5.1 and 5.2. As a result of this step, we obtain new offramp split ratios.
4. Now we run the network simulation as we did originally, in step 2, only this time with new offramp
split ratios, and record the simulation results — density, flow, speed, as well as performance measures
such as vehicle miles traveled (VMT) and vehicle hours traveled (VHT).
5. Check if the resulting offramp flows match the offramp demand. If yes, proceed to step 6, otherwise,
repeat steps 2-5. In our experience (i.e., the case studies in the following Section), it takes the process
described in steps 2-5 no more than two iterations to converge.
20
6. Evaluate the simulation results:
• correctness of bottleneck locations and activation times;
• correctness of congestion extension at each bottleneck;
• correctness of VMT and VHT.
If the simulation results are satisfactory, stop. Otherwise, proceed to step 7.
7. Tune/correct input data in the order shown in block 7 of Figure 5.
6
6.1
Simulation Results
Full-access managed lane case study: Interstate 680 North
We consider a 26.8-mile stretch of I-680 North freeway in Contra Costa County, California, from postmile
30 to postmile 56.8, shown in Figure 6, as a test case for the full-access managed lane configuration. This
freeway’s managed lane is a high-occupancy-vehicle (HOV) lane, which allows entry to vehicles with two
or more passengers. This stretch contains two HOV lane segments whose beginning and ending points are
marked on the map. The first HOV segment is 12.3 miles long and will be converted to HOT in spring
2017 (Metropolitan Transportation Commission), and the second HOV segment is 4.5 miles long. There are
26 onramps and 24 offramps. The HOV lane is active from 5 to 9 AM and from 3 to 7 PM. The rest of the
time, the HOV lane is open to all traffic, and behaves as a GP lane.
Figure 6: Map of I-680 North in Contra Costa County.
To build the model, we used data collected for the I-680 Corridor System Management Plan (CSMP)
study (System Metrics Group, Inc., 2015). The bottleneck locations as well as their activation times and
congestion extension were identified in that study using video monitoring and tachometer vehicle runs. Onand offramp flows were given in 5-minute increments. Here, we assume that the HOV portion of the input
demand is 15%. The model was calibrated to a typical weekday, as suggested in the I-680 CSMP study.
For this simulation, we used the fundamental diagram described in Appendix A, with parameters as follows:
21
• The capacity of the ordinary GP lane is 1,900 vehicles per hour per lane (vphl);
• The capacity of the auxiliary GP lane is 1,900 vphl;
• The capacity of HOV lane is 1,800 vphl while active and 1,900 vphl when it behaves as a GP lane;
• The free flow speed varies between 63 and 70 mph — these measurements came partially from the
California Performance Measurement System (PeMS) (California Department of Tranportation, 2016)
and partially from tachometer vehicle runs.
• The congestion wave speed for each link was taken as 1/5 of the free flow speed.
The modeling results are presented in Figures 7, 8 and 9 showing density, flow and speed contours, respectively, in the GP and the HOV lanes. In each plot, the top contour corresponds to the HOV lanes, and the
bottom to the GP lanes. In all the plots traffic moves from left to right along the “Absolute Postmile” axis,
while the vertical axis represents time. Bottleneck locations and congestion areas identified by the I-680
CSMP study are marked by blue boxes in GP lane contours. The HOV lane does not get congested, but
there is a speed drop due to the friction effect. The friction effect, when vehicles in the HOV lane slow down
because of the slow moving GP lane traffic, can be seen in the HOV lane speed contour in Figure 9.
Figure 10 shows an example of how well the offramp flow computed by the simulation matches the target,
referred to as offramp demand, as recorded by the detector on the offramp at Crow Canyon Road. We can
see that in the beginning and in the end of the day, the computed flow falls below the target (corresponding
areas are marked with red circles). This is due to the shortage of the mainline traffic in the simulation —
the offramp demand cannot be satisfied.
Finally, Table 1 summarizes the performance measurements — vehicle miles traveled (VMT), vehicle hours
traveled (VHT) and delay in vehicle-hours — computed by simulation versus those collected in the course
of the I-680 CSMP study. Delay is computed for vehicles with speed below 45 mph.
GP Lane VMT
HOV Lane VMT
Total VMT
GP Lane VHT
HOV Lane VHT
Total VHT
GP Lane Delay
HOV Lane Delay
Total Delay
Simulation result
1,687,618
206,532
1,894,150
27,732
3,051
30,783
2,785
6
2,791
Collected data
1,888,885
31,008
2,904
Table 1: Performance measures for I-680 North.
22
Figure 7: I-680 North density contours for GP and HOV lanes produced by simulation. Density values are
given in vehicles per mile per lane. Blue boxes on the GP lane speed contour indicate congested areas as
identified by the I-680 CSMP study.
23
Figure 8: I-680 North flow contours for GP and HOV lanes produced by simulation. Flow values are give in
vehicles per hour per lane. Blue boxes on the GP lane speed contour indicate congested areas as identified
by the I-680 CSMP study.
24
Figure 9: I-680 North speed contours for GP and HOV lanes produced by simulation. Speed values are given
in miles per hour. Blue boxes on the GP lane speed contour indicate congested areas as identified by the
I-680 CSMP study.
25
Figure 10: Flow at the Crow Canyon Road offramp over 24 hours — collected (offramp demand) vs. computed
by simulation (offramp flow).
26
6.2
Gated-access managed lane case study: Interstate 210 East
We consider a 20.6-mile stretch of SR-134 East/ I-210 East in Los Angeles County, California, shown in
Figure 11, as a test case for the separated managed lane configuration. This freeway’s managed lane is also
an HOV lane. This freeway stretch consists of 3.9 miles of SR-134 East from postmile 9.46 to postmile 13.36,
which merges into 16.7 miles of I-210 East from postmile 25 to postmile 41.7. Gate locations where traffic
can switch between the GP and the HOV lanes are marked on the map. At this site, the HOV lane is always
active. There are 28 onramps and 25 offramps. The largest number of offramps between two gates is 5.
Thus, our freeway model has 7 vehicle classes - LOV, HOV and 5 destination-based.
Figure 11: Map of SR-134 East/ I-210 East freeway in Los Angeles County.
To build the model, we used PeMS data for the corresponding segments of the SR-134 East and I-210 East
for Monday, October 13, 2014 (California Department of Tranportation, 2016). Fundamental diagrams were
calibrated using PeMS data following the methodology of Dervisoglu et al. (2009). As in the I-680 North
example, we assume that HOV portion of the input demand is 15%.
The modeling results are presented in Figures 12, 13 and 14 showing density, flow and speed contours,
respectively, in the GP and the HOV lanes. In each plot, the top contour corresponds to the HOV lanes, and
the bottom to the GP lanes. As before, in all the plots traffic moves from left to right along the “Absolute
Postmile” axis, while the vertical axis represents time. The HOV lane does not get congested. Dashed blue
lines on the contour plots indicate HOV gate locations.
Figure 15 shows the PeMS speed contours for the SR-134 East/ I-210 East GP and HOV lanes that were
used as a target for our simulation model. In these plots, traffic also travels from left to right, with the
horizontal axis representing postmiles, while the vertical axis represents time.
Figure 16 shows an example of how well the offramp flow computed by the simulation matches the target,
referred to as offramp demand, as recorded by the detector on the offramp at North Hill Avenue. The
simulated offramp flow matches the offramp demand fairly closely. Similar results were found for the other
offramps.
Finally, Table 2 summarizes the performance measurements — VMT, VHT and delay — computed by
simulation versus those values obtained from PeMS. The PeMS data come from both SR-134 East and I-210
East, and VMT, VHT and delay values are computed as sums of the corresponding values from these two
freeway sections. Delay values are computed in vehicle-hours for those vehicles traveling slower than 45 mph.
27
GP Lane VMT
HOV Lane VMT
Total VMT
GP Lane VHT
HOV Lane VHT
Total VHT
GP Lane Delay
HOV Lane Delay
Total Delay
Simulation result
2,017,322
378,485
2,395,807
33,533
6,064
39,597
3,078
584
3,662
PeMS data
414,941 + 2,006,457 = 2,421,398
6,416 + 36,773 = 43,189
1 + 3,802 = 3,803
Table 2: Performance measures for SR-134 East/ I-210 East.
28
Figure 12: SR-134 East/ I-210 East density contours for GP and HOV lanes produced by simulation. Density
values are given in vehicles per mile per lane.
29
Figure 13: SR-134 East/ I-210 East flow contours for GP and HOV lanes produced by simulation. Flow
values are give in vehicles per hour per lane.
30
Figure 14: SR-134 East/ I-210 East speed contours for GP and HOV lanes produced by simulation. Speed
values are given in miles per hour.
31
Figure 15: SR-134 East/ I-210 East speed contours for GP and HOV lanes obtained from (California Department of Tranportation, 2016) for Monday, October 13, 2014. The horizontal axis represents absolute
postmile, and the vertical axis represents time in hours. The four contours share the same color scale.
32
Figure 16: Flow at the North Hill Avenue offramp over 24 hours — PeMS data (offramp demand) vs.
computed by simulation (offramp flow).
33
7
Conclusion
In this paper we discussed modeling procedures for two managed lane configurations: (1) full access, where
special traffic can switch between the GP and the managed lanes at any node; and (2) separated, where
special traffic can switch between the two lanes only at specific nodes, called gates. We have introduced the
friction effect (Section 3.3) and the inertia effect (Section 3.5). The friction effect reflects the empiricallyobserved drivers’ fear of moving fast in the managed lane while traffic in the adjacent GP links moves slowly
due to congestion. The inertia effect reflects drivers’ inclination to stay in their lane as long as possible and
switch only if this would obviously improve their travel condition.
The presence of interchanges in freeways with managed lanes produces modeling complications beyond what
one would see in a generic freeway model. For example, the separated managed lane requires a special
modeling trick for sending vehicles traveling in the managed lane to offramps, as locations of gates and
offramps generally do not coincide. In this paper we proposed such a mechanism. It employs destinationbased traffic classes, which are populated at modeling links approaching gates using offramp split ratios
(Section 3.4). This approach is a natural use of the multi-class feature of many traffic models.
Freeways with managed lanes feature many parameters, and calibrating them can be difficult. We presented
an iterative learning approach for estimating some of the harder-to-estimate parameters. Our simulation
results comparing our model and calibration results showed good agreement in two case studies, validating
both our full-access and gated-access modeling techniques. In the sequel to this paper, we will further extend
these results to include traffic control, with simulation of a reactive tolling controller on the managed lane.
Acknowledgement
We would like to express great appreciation to several of our colleagues. To Elena Dorogush and Ajith
Muralidharan for sharing ideas, and to Gabriel Gomes and Pravin Varaiya for their critical reading and their
help in clarifying some theoretical issues.
This research was funded by the California Department of Transportation.
A
Link Model
Figure 17: The “backwards lambda” fundamental diagram.
For the majority of this paper, we remain agnostic as to the particular functional relationship between density
nl , demand Sl (per commodity, ncl , Slc ) and supply Rl , and flow fl (also called the fundamental diagram)
34
used in our first-order macroscopic model (2.1). Where a particular fundamental diagram is required, i.e.
for the simulation results presented in Section 6 and the example implementation of the friction effect in
(3.4), (3.5), (3.6), and (3.7), we use a fundamental diagram from Horowitz et al. (2016), shown in Figure 17.
This fundamental diagram captures the traffic hysteresis behavior with the “backwards lambda” shape often
observed in detector data (Koshi et al., 1983):
)
(
C
X
Fl (t)
f
c
c
, Sl (t) =
Slc (t),
(A.1)
Sl (t) =vl (t)nl (t) min 1, f PC
c
vl (t) c=1 nl (t)
c=1
!
C
X
J
c
Rl (t) = (1 − θl (t)) Fl (t) + θl (t)wl (t) nl (t) −
nl (t) ,
(A.2)
c=1
where, for link l, Fl is the capacity, vlf is the free flow speed, wl is the congestion wave speed, nJl is the
jam density, and n−
l =
w l nJ
l
vlf +wl
and n+
l =
Fl
vlf
Fl , vlf ,
are called the low and high critical densities, respectively. As
written here and used in this paper,
and wl are in units per simulation timestep. The variable θl (t)
is a congestion metastate of l, which encodes the hysteresis:
nl (t) ≤ n−
0
l ,
(A.3)
θl (t) = 1
nl (t) > n+
l ,
−
+
θl (t − 1) nl < nl (t) ≤ nl ,
where nl (t) =
PC
c=1
ncl (t).
Examining (A.3) and (A.2), we see that when a link’s density goes above n+
l (i.e., when it becomes congested),
its ability to receive flow is reduced until the density falls below n−
.
l
An image of (A.1) and (A.2) overlaid on each other, giving a schematic image of the fundamental diagram,
+
is shown in Figure 17. Unless n−
shape, the fundamental diagram is not
l = nl , when it assumes triangular
+
a function of density alone (i.e., without θl (t)): nl (t) ∈ n−
,
n
admits
two possible flow values.
l
l
B
Dynamic Split Ratio Solver
Throughout this article, we have made reference to a dynamic-system-based method for solving for partiallyor fully-undefined split ratios from Wright et al. (2016a). This split ratio solver is designed to implicitly
solve the logit-based split ratio problem
P P
M
C
c
i=1
c=1 Sij
exp
Rj
c
PM PC c ,
βij
=
(B.1)
PN
i=1
c=1 Sij 0
exp
0
j =1
R 0
j
c
c
which cannot be solved explicitly, as the Sij
’s are also functions of the βij
’s. The problem (B.1) is chosen
to be a node-local problem that does not rely on information from the link model (beyond supplies and
demands), and is thus independent of the choice of link model (Wright et al., 2016a).
The solution algorithm is as follows, reproduced from Wright et al. (2016a). More discussion is available in
the reference.
c
• Define the set of commodity movements for which split ratios are known as B = {i, j, c} : βij
∈ [0, 1] ,
and the set of commodity movements for which split ratios are to be computed as B =
c
{i, j, c} : βij
are unknown .
35
• For a given input link i and commodity c such that Sic = 0, assume that all split ratios are known:
{i, j, c} ∈ B.3
• Define the set of output links for which there exist unknown split ratios as V = j : ∃ {i, j, c} ∈ B .
• Assuming that for a given input link i and
c, the split ratios must sum up to 1, define the
P commodity
c
c
unassigned portion of flow by β i = 1 − j:{i,j,c}∈B βij
.
• For a given input link i and commodity c such that there exists at least one commodity movement
c
{i, j, c} ∈ B, assume β i > 0, otherwise the undefined split ratios can be trivially set to 0.
• For every output link j ∈ V , define the set
of input links that have an unassigned demand portion
directed toward this output link by Uj = i : ∃ {i, j, c} ∈ B .
• For a given input link i and commodity c, define the set of output links for which split ratios for which
are to be computed as Vic = {j : ∃i ∈ Uj }, and assume that if nonempty, this set contains at least two
c
elements, otherwise a single split ratio can be trivially set equal to β i .
PM
• Assume that input link priorities are nonnegative, pi ≥ 0, i = 1, . . . , M , and i=1 pi = 1.
• Define the set of input links with zero priority: Uzp = {i : pi = 0}. To enable split ratio assignment
for inputs with zero priorities, perform regularization:
|Uzp |
1 |Uzp |
M − |Uzp | |Uzp |
p̃i = pi 1 −
+
= pi
+
,
(B.2)
M
M M
M
M2
where |Uzp | denotes the number of elements in set Uzp . Expression (B.2) implies that the regularized
input priority p̃i consists of two parts: (1) the original input priority pi normalized to the portion of
1
input links with positive priorities; and (2) uniform distribution among M input links, M
, normalized
to the portion of input links with zero priorities.
PM
Note that the regularized priorities p̃i > 0, i = 1, . . . , M , and i=1 p̃i = 1.
c
The algorithm for distributing β i among the commodity movements in B (that is, assigning values to the a
priori unknown split ratios) aims at maintaining output links as uniform in their demand-supply ratios as
possible. At each iteration k, two quantities are identified: µ+ (k), which is the largest oriented demandsupply ratio produced by the split ratios that have been assigned so far, and µ− (k), which is the smallest
oriented demand-supply ratio whose input link, denoted i− , still has some unclaimed split ratio. Once these
two quantities are found, the commodity c− in i− with the smallest unallocated demand has some of its
demand directed to the j corresponding to µ− (k) to bring µ− (k) up to µ+ (k) (or, if this is not possible due
to insufficient demand, all such demand is directed).
To summarize, in each iteration k, the algorithm attempts to bring the smallest oriented demand-supply
thatPall such oriented
ratio µ+ (k) up to the largest oriented demand-supply ratio µ− (k). If it turns out P
c
demand-supply ratios become perfectly balanced, then the demand-supply ratios ( i c Sij
)/Rj are as
well.
The algorithm is:
1. Initialize:
c
β̃ij
(0)
c
3 If
:=
c
βij
,
0,
if {i, j, c} ∈ B,
otherwise;
c
β i (0)
:= β i ;
Ũj (0)
=
Uj ;
Ṽ (0)
=
V;
k
:=
0,
split ratios were undefined in this case, they could be assigned arbitrarily.
36
Here Ũj (k) is the remaining set of input links with some unassigned demand, which may be directed
to output link j; and Ṽ (k) is the remaining set of output links, to which the still-unassigned demand
may be directed.
n
o
c
2. If Ṽ (k) = ∅, stop. The sought-for split ratios are β̃ij
(k) , i = 1, . . . , M , j = 1, . . . , N , c = 1, . . . , C.
3. Calculate the remaining unallocated demand:
c
c
S i (k) = β i (k)Sic ,
i = 1, . . . , M, c = 1, . . . , C.
4. For all input-output link pairs, calculate oriented demand:
c
c
S̃ij
(k) = β̃ij
(k)Sic .
5. For all input-output link pairs, calculate oriented priorities:
PC
p̃ij (k)
c=1
p̃i P
C
=
c c
Si
γij
c=1
(B.3)
Sic
with
(
c
γij
(k)
c
βij
,
=
c
β̃ij
(k)
if split ratio is defined a priori: {i, j, c} ∈ B,
c
β i (k)
|Vic | ,
+
otherwise,
(B.4)
where |Vic | denotes the number of elements in the set Vic . Examining the expression (B.3)-(B.4), one
c
can see that the split ratios β̃ij
(k), which are not fully defined yet, are complemented with a fraction
c
of β i (k) inversely proportional to the number of output links among which the flow of commodity c
from input link i can be distributed.
Note that in this step we are using regularized priorities p̃i as opposed to the original pi , i = 1, . . . , M .
This is done to ensure that inputs with pi = 0 are not ignored in the split ratio assignment.
6. Find the largest oriented demand-supply ratio:
PC
c
S̃ij
(k) X
p̃ij (k).
p̃ij (k)Rj
c=1
+
µ (k) = max max
j
i
i∈Uj
7. Define the set of all output links in Ṽ (k), where the minimum of the oriented demand-supply ratio is
achieved:
PC
c
X
c=1 S̃ij (k)
Y (k) = arg min min
p̃ij (k),
p̃ij (k)Rj
j∈Ṽ (k) i∈Ũj (k)
i∈Uj
and from this set pick the output link j − with the smallest output demand-supply ratio (when there
are multiple minimizing output links, any of the minimizing output links may be chosen as j − ):
j
−
PM PC
= arg min
i=1
c=1
c
S̃ij
(k)
Rj
j∈Y (k)
.
8. Define the set of all input links, where the minimum of the oriented demand-supply ratio for the output
link j − is achieved:
PC
W
j−
(k) = arg
min
i∈Ũj − (k)
c=1
c
S̃ij
− (k) X
p̃ij − (k)Rj −
p̃ij − (k),
i∈Uj −
37
and from this set pick the input link i− and commodity c− with the smallest remaining unallocated
demand:
{i− , c− } = arg
c
S i (k).
min
i ∈ Wj − (k),
c
c : β i− (k) > 0
9. Define the smallest oriented demand-supply ratio:
PC
c
X
c=1 S̃i− j − (k)
−
p̃ij− (k).
µ (k) =
p̃i− j − (k)Rj −
i∈Uj −
• If µ− (k) = µ+ (k), the oriented demands created by the split ratios that have been assigned as
c
of iteration k, β̃ij
(k), are perfectly balanced among the output links, and to maintain this, all
remaining unassigned split ratios should be distributed proportionally to the allocated supply:
c
β̃ij
(k + 1)
c
β i (k
=
Rj
c
β̃ij
(k) + P
j 0 ∈Vic (k)
c
β i (k) > 0,
+ 1)
=
0,
c:
Ũj (k + 1)
=
∅,
j ∈ Ṽ (k);
Ṽ (k + 1)
=
∅.
c
Rj 0
β i (k),
c
c : β i (k) > 0, i ∈ Ũj (k), j ∈ Ṽ (k); (B.5)
i ∈ Ũj (k), j ∈ Ṽ (k);
If the algorithm ends up at this point, we have emptied Ṽ (k + 1) and are done.
• Else, assign:
−
∆β̃ic− j − (k)
=
PC
c
−
S̃
(k)
−
−
µ+ (k)p̃i− j − (k)Rj −
c
c=1 i j
min β i− (k), c−
−
;
P
c−
S i− (k) i∈U − p̃ij − (k)
S i− (k)
(B.6)
=
−
β̃ic− j − (k)
(B.7)
=
c−
β i− (k)
j
−
β̃ic− j − (k
c−
β i− (k
+ 1)
+ 1)
+
−
∆β̃ic− j − (k);
−
+ 1)
=
+ 1)
=
Ũj (k + 1)
=
c
β̃ij
(k) for {i, j, c} =
6 {i− , j − , c− };
c
β i (k) for {i, c} =
6 {i− , c− };
n
o
c
Ũj (k) \ i : β i (k + 1) = 0, c = 1, . . . , C ,
=
n
o
Ṽ (k) \ j : Ũj (k + 1) = ∅ .
c
β̃ij
(k
c
β i (k
Ṽ (k + 1)
(B.8)
− ∆β̃ic− j − (k);
j ∈ Ṽ (k);
c−
In (B.6), we take the minimum of the remaining unassigned split ratio portion β i− (k) and the
split ratio portion needed to equalize µ− (k) and µ+ (k). To better understand the latter, the
second term in min{·, ·} can be rewritten as:
!
PC
+
X
C
c
µ+ (k)p̃i− j − (k)Rj −
µ (k)
1
c=1 S̃i− j − (k)
c
−
=
.
−1
S̃i− j − (k)
−
P
−
c−
c−
c
µ (k)
S i− (k) i∈U − p̃ij − (k)
S i− (k)
S i− (k)
c=1
j
The right hand side of the last equality can be interpreted as: flow that must be assigned for
input i− , output j − and commodity c− to equalize µ− (k) and µ+ (k) minus flow that is already
assigned for {i− , j − , c− }, divided by the remaining unassigned portion of demand of commodity
c− coming from input link i− .
In (B.7) and (B.8), the assigned split ratio portion is incremented and the unassigned split ratio
−
portion is decremented by the computed ∆β̃ic− j − (k).
10. Set k := k + 1 and return to step 2.
38
References
M. Bliemer. Dynamic queueing and spillback in an analytical multiclass dynamic network loading model.
Transportation Research Record, 2029:14–21, 2007.
California Department of Tranportation. PeMS homepage, 2016. http://pems.dot.ca.gov.
M. J. Cassidy, K. Kim, W. Ni, and W. Gu. A problem of limited-access special lanes. Part I: Spatiotemporal
studies of real freeway traffic. Transportation Research Part A: Policy and Practice, 80:307 – 319, 2015.
ISSN 0965-8564. doi: http://dx.doi.org/10.1016/j.tra.2015.07.001. URL http://www.sciencedirect.
com/science/article/pii/S0965856415001834.
M. Chang, J. Wiegmann, A. Smith, and C. Bilotto. A Review of HOV Lane Performance and Policy Options
in the United States. Report FHWA-HOP-09-029, Federal Highway Administration, 2008.
C. F. Daganzo. A behavioral theory of multi-lane traffic flow. Part i: Long homogeneous freeway sections.
Transportation Research Part B: Methodological, 36(2):131 – 158, 2002. ISSN 0191-2615. doi: http://
dx.doi.org/10.1016/S0191-2615(00)00042-4. URL http://www.sciencedirect.com/science/article/
pii/S0191261500000424.
C. F. Daganzo and M. J. Cassidy. Effects of high occupancy vehicle lanes on freeway congestion. Transportation Research Part B: Methodological, 42(10):861–872, Dec. 2008. ISSN 01912615. doi: 10.1016/j.
trb.2008.03.002. URL http://linkinghub.elsevier.com/retrieve/pii/S0191261508000325.
G. Dervisoglu, G. Gomes, J. Kwon, A. Muralidharan, P. Varaiya, and R. Horowitz. Automatic calibration of
the fundamental diagram and empirical obsevations on capacity. 88th Annual Meeting of the Transportation
Research Board, Washington, D.C., USA, 2009.
N. Farhi, H. Haj-Salem, M. Khoshyaran, J.-P. Lebacque, F. Salvarani, B. Schnetzler, and F. De Vuyst. The
Logit lane assignment model: first results. In TRB 92nd Annual Meeting Compendium of Papers, 2013.
M. Fransson and M. Sandin. Framework for Calibration of a Traffic State Space Model. Masters Thesis,
Linkoping University, Norrkoping, Sweden, Oct. 2012.
S. Hoogendoorn and P. Bovy. Gas-Kinetic Model for Multilane Heterogeneous Traffic Flow. Transportation Research Record: Journal of the Transportation Research Board, 1678:150–159, 1999. doi:
10.3141/1678-19.
S. P. Hoogendoorn and P. H. Bovy. Continuum modeling of multiclass traffic flow. Transportation Research Part B: Methodological, 34(2):123 – 146, 2000. ISSN 0191-2615. doi: http://dx.doi.
org/10.1016/S0191-2615(99)00017-X. URL http://www.sciencedirect.com/science/article/pii/
S019126159900017X.
R. Horowitz, A. A. Kurzhanskiy, A. Siddiqui, and M. A. Wright. Modeling and control of hot lanes. Technical
report, Partners for Advanced Transportation Technologies, University of California, Berkeley, Berkeley,
CA, 2016.
K. Jang and M. Cassidy. Dual influences on vehicle speed in special-use lanes and critique of US regulation.
Transportation Research, Part A, 46(2012):1108–1123, 2012.
K. Jang, S. Oum, and C.-Y. Chan. Traffic Characteristics of High-Occupancy Vehicle Facilities: Comparison
of Contiguous and Buffer-Separated Lanes. Transportation Research Record: Journal of the Transportation
Research Board, 2278:180–193, 2012. doi: 10.3141/2278-20.
M. Koshi, M. Iwasaki, and I. Ohkura. Some findings and an overview on vehicular flow characteristics. In
Proceedings of the 8th International Symposium on Transportation and Traffic Flow Theory, volume 198,
pages 403–426, 1983.
A. A. Kurzhanskiy and P. Varaiya. Traffic management: An outlook. Economics of Transportation, 4(3):
135–146, Sept. 2015. ISSN 22120122. doi: 10.1016/j.ecotra.2015.03.002.
39
X. Liu, B. Schroeder, T. Thomson, Y. Wang, N. Rouphail, and Y. Yin. Analysis of operational interactions
between freeway managed lanes and parallel, general purpose lanes. Transportation Research Record:
Journal of the Transportation Research Board, 2262:62–73, 2011.
X. Liu, G. Zhang, Y. Lao, and Y. Wang. Modeling Traffic Flow Dynamics on Managed Lane Facility: Approach Based on Cell Transmission Model. Transportation Research Record: Journal of the Transportation
Research Board, 2278:163–170, 2012.
T. Lomax, D. Schrank, and B. Eisele. The 2015 Annual Urban Mobility Scorecard. Technical report, Texas
Transportation Institute, 2015. http://mobility.tamu.edu.
D. McFadden. Conditional Logit Analysis of Qualitative Choice Behavior. In P. Zarembka, editor, Frontiers
in Econometrics, pages 105–142. Academic Press, New York, 1973.
Metropolitan Transportation Commission. Bay Area Express Lanes. http://bayareaexpresslanes.org.
D. Ngoduy. Macroscopic discontinuity modeling for multiclass multilane traffic flow operations. PhD thesis,
Delft University of Technology, 2006.
D. Ngoduy and M. Maher. Calibration of second order traffic models using continuous cross entropy method.
Transportation Research Part C: Emerging Technologies, 24:102–121, Oct. 2012. ISSN 0968090X. doi:
10.1016/j.trc.2012.02.007.
J. Obenberger. Managed lanes: Combining access control, vehicle eligibility, and pricing strategies can help
mitigate congestion and improve mobility on the nationâĂŹs busiest roadways. Public Roads, 68(3):48–55,
2004. URL http://www.fhwa.dot.gov/publications/publicroads/04nov/08.cfm.
A. Poole and A. Kotsialos. METANET Model Validation using a Genetic Algorithm. IFAC Proceedings
Volumes, 45(24):7–12, Sept. 2012. ISSN 14746670. doi: 10.3182/20120912-3-BG-2031.00002.
A. Poole and A. Kotsialos. Second order macroscopic traffic flow model validation using automatic differentiation with resilient backpropagation and particle swarm optimisation algorithms. Transportation Research
Part C: Emerging Technologies, 71:356–381, Oct. 2016. ISSN 0968090X. doi: 10.1016/j.trc.2016.07.008.
URL http://linkinghub.elsevier.com/retrieve/pii/S0968090X16301152.
Y. Shiomi, T. Taniguchi, N. Uno, H. Shimamoto, and T. Nakamura. Multilane first-order traffic flow
model with endogenous representation of lane-flow equilibrium. Transportation Research Part C: Emerging
Technologies, 59:198–215, Oct. 2015. ISSN 0968090X. doi: 10.1016/j.trc.2015.07.002. URL http://
linkinghub.elsevier.com/retrieve/pii/S0968090X15002429.
System Metrics Group, Inc. Contra Costa County I-680 Corridor System Management Plan Final Report.
Technical report, Caltrans District 4, 2015. http://dot.ca.gov/hq/tpp/corridor-mobility/CSMPs/
d4_CSMPs/D04_I680_CSMP_Final_Revised_Report_2015-05-29.pdf.
M. Treiber, A. Hennecke, and D. Helbing. Derivation, properties, and simulation of a gas-kinetic-based,
nonlocal traffic model. Phys. Rev. E, 59:239–253, Jan 1999. doi: 10.1103/PhysRevE.59.239. URL http:
//link.aps.org/doi/10.1103/PhysRevE.59.239.
J. van Lint, S. Hoogendoorn, and M. Schreuder. Fastlane: New Multiclass First-Order Traffic Flow Model.
Transportation Research Record: Journal of the Transportation Research Board, 2088:177–187, 2008. doi:
10.3141/2088-19.
G. Wong and S. Wong. A multi-class traffic flow model - an extension of LWR model with heterogeneous drivers. Transportation Research Part A: Policy and Practice, 36(9):827 – 841, 2002. ISSN 09658564. doi: http://dx.doi.org/10.1016/S0965-8564(01)00042-8. URL http://www.sciencedirect.com/
science/article/pii/S0965856401000428.
M. A. Wright, G. Gomes, R. Horowitz, and A. A. Kurzhanskiy. On node and route choice models for
high-dimensional road networks. Submitted to Transportation Research Part B, 2016a. Online: http:
//arxiv.org/abs/1601.01054.
40
M. A. Wright, R. Horowitz, and A. A. Kurzhanskiy. A dynamic system characterization of road network
node models. In Proceedings of the 10th IFAC Symposium on Nonlinear Control Systems, pages 1053–1058,
August 2016b. Online: http://arxiv.org/abs/1608.07623.
41
| 3cs.SY
|
A Verified Compiler for
Probability Density Functions
Manuel Eberl, Johannes Hölzl, and Tobias Nipkow
arXiv:1707.06901v1 [cs.PL] 21 Jul 2017
Technische Universität München
Bhat et al. [4] developed an inductive compiler that computes density
functions for probability spaces described by programs in a simple probabilistic functional language. In this work, we implement such a compiler for
a modified version of this language within the theorem prover Isabelle and
give a formal proof of its soundness w. r. t. the semantics of the source and
target language. Together with Isabelle’s code generation for inductive predicates, this yields a fully verified, executable density compiler. The proof is
done in two steps, using a standard refinement approach: first, an abstract
compiler working with abstract functions modelled directly in the theorem
prover’s logic is defined and proven sound. Then, this compiler is refined
to a concrete version that returns a target-language expression.
1. Introduction
1.1. Motivation
Random distributions of practical significance can often be expressed as probabilistic
functional programs. When studying a random distribution, it is often desirable to
determine its probability density function (PDF). This can be used to e. g. determine the
expectation or sample the distribution with a sampling method such as Markov-chain
Monte Carlo (MCMC).
In 2013, Bhat et al. presented a compiler that computes the probability distribution
function of a program in the probabilistic functional language Fun [4]. They evaluated the compiler on a number of practical problems and concluded that it reduces the
amount of time and effort required to model them in an MCMC system significantly
compared to hand-written models.
Bhat et al. also stated that their eventual goal is the formal verification of such a compiler in a theorem prover [3]. This has the advantage of providing guaranteed correctness,
i. e. the result of the compilation is provably a PDF for the source expression, according
to the formal semantics. This greatly increases the confidence one has in the compiler.
The final publication is available at Springer via https://doi.org/10.1007/978-3-662-46669-8_4.
1
In this Master’s thesis, we implemented such a compiler for a similar probabilistic
functional language in the interactive theorem prover Isabelle/HOL and formally proved
its correctness.
1.2. Related work
This work is based on the work of Bhat et al. [3, 4], which presents a density compiler for probability spaces described by expressions in the language Fun. This is a
small functional language with basic arithmetic, Boolean logic, product and sum types,
conditionals, and a number of built-in discrete and continuous distributions. It does,
however, not support lists or recursion. The correctness proof is purely pen and paper,
but the authors stated that formalisation in a proof assistant such as Coq is the ultimate
goal [3].
Park et al. [13] developed a probabilistic extension to Objective CAML called λ .
Their work focuses on sample generation, i. e. using an infinite stream of random numbers to compute samples of the distribution described by a probabilistic program. While
Bhat et al. generate density functions of functional programs, Park et al. generate
sampling functions. These are functions that map [0; 1]∞ to the sample space. The
sampling function effectively uses a finite number of uniformly-distributed random
numbers from the interval [0; 1] and returns a sample of the desired random variable. This approach allows them to handle much more general distributions, even
recursively-defined ones and distributions that do not have a density function, but it
does not allow precise reasoning about these distributions (such as determining the
exact expectation). No attempt at formal verification is made.
pGCL, another probabilistic language, has been formalised with a proof assistant –
first in HOL by Hurd et al. [12], then in Isabelle/HOL by David Cock [6, 7]. pGCL
contains a rich set of language features, such as recursion and probabilistic and nondeterministic choice. David Cock formally proved a large number of results about
the semantics of the language and developed mechanisms for refinement and program
verification; however, the focus of this work was verification of probabilistic programs,
not compiling them to density functions. Bhat et al. mention that reconciling recursion with probability density functions is difficult [3], so a feature-rich language such
as pGCL is probably not suited for developing a density compiler.
Audebaud and Paulin-Mohring [1] also implemented a probabilistic functional language with recursion in a theorem prover (namely Coq). Their focus was also on verification of probabilistic programs. While Cock uses a shallow embedding in which any
type and operation of the surrounding logic of the theorem prover (i. e. HOL) can be
used, Audebaud and Paulin-Mohring use a deep embedding with a restricted type system, expression structure, predefined primitive functions, etc. Like Bhat et al. and we,
they also explicitly reference the Giry monad as a basis for their work.
2
1.3. Utilised tools
As stated before, we work with the interactive theorem prover Isabelle/HOL. Isabelle
is a generic proof assistant that supports a number of logical frameworks (object logics)
such as Higher-Order Logic (HOL) or Zermelo-Fraenkel set theory (ZF). The most widely
used instance is Isabelle/HOL, which is what we use.
We heavily rely on Johannes Hölzl’s Isabelle formalisation of measure theory [11],
which is already part of the Isabelle/HOL library. We also use Sudeep Kanav’s formalisation of the Gaussian distribution and a number of libraries from the proof of the
Central Limit Theorem by Avigad et al. [2], namely the notion of interval and set integrals and the Fundamental Theorem of Calculus for these integrals. All of these have
been or will be moved to the Isabelle/HOL library by their respective maintainers as
well.
1.4. Outline
In Sect. 2.1, we will explain the notation we will use and then give a brief overview of
the mathematical basics we require – in particular the Giry Monad – in Sect. 2.2.
Section 3 contains the definition and the semantics of the source and target language.
Section 4 defines the abstract compiler and gives a high-level outline of the soundness
proof. Section 5 then explains the refinement of the abstract compiler to the concrete
compiler and the final correctness result and evaluates the compiler on a simple example.
Section 6 gives an overview of how much work went into the different parts of the
project and what difficulties we encountered. It also lists possible improvements and
other future work before summarising the results we obtained. Finally, the appendix
contains a table of all notation and auxiliary functions used in this work for reference.
2. Preliminaries
2.1. Notation
In the following, we will explain the conventions and the notation we will use.
2.1.1. Typographical notes
We will use the following typographical conventions in mathematical formulæ:
• Constants, functions, datatype constructors, and types will be typeset in regular
roman font: max, return, π, etc.0
• Free and bound variables (including type variables) are in italics: x, A, dst, etc.
0 In formulæ embedded in regular text, we will often set types and constants
from the surrounding text.
3
in italics to distinguish them
• Isabelle keywords are in bold print: lemma, datatype, primrec, etc.
• σ-algebras are typeset in calligraphic font: A, B , M, etc.
• Categories are typeset in Fraktur: Set, Grp, Meas, etc.
• File names of Isabelle theories are set in a monospaced font: PDF_Compiler.thy.
2.1.2. Deviations from standard mathematical notation
In order to maintain coherence with the notation used in Isabelle, we will deviate from
standard mathematical notation in the following ways:
• As is convention in functional programming (and therefore in Isabelle), function
application is often written as f x instead of f ( x) . It is the operation that binds
strongest and it associates to the left, i. e. f x + 1 is ( f x) + 1 and f x y is ( f x) y .
• The integral over integrand f with variable x and the measure µ is written as
Z
x. f x ∂µ
instead of
Z
f ( x) dµ( x) .
• The special notion of a non-negative integral1 is used; this integral ‘ignores’ the
negative part of the integrand. Effectively:
Z +
x. f x ∂µ
Z
=
ˆ
max(0, f ( x)) dµ( x)
• Lambda abstractions, such as λx. x2 , are used to specify functions. The corresponding standard mathematical notation would be x 7→ x2 .
Table 1 lists a number of additional mathematical notation.
2.1.3. Semantics notation
We will always use Γ to denote a type environment, i. e. a function from variable names
to types, and σ to denote a state, i. e. a function from variable names to values. Note
that variable names are always natural numbers as we use de Bruijn indices. The letter
Υ (Upsilon) will be used to denote density contexts, which are used in the compiler.
We also employ the notation t • Γ resp. v • σ to denote the insertion of a new variable
with the type t (resp. value v) into a typing environment (resp. state). This is used when
entering the scope of a bound variable; the newly inserted variable then has index 0 and
all other variables are incremented by 1. The precise definition is as follows:2
1 This
is a very central concept in the measure theory library in Isabelle. We will mostly use it with
non-negative functions anyway, so the distinction is purely formal.
2 Note the analogy to the notation x # xs for prepending an element to a list. This is because contexts with
de Bruijn indices are generally represented by lists, where the n-th element is the entry for the variable
n, and inserting a value for a newly bound variable is then simply the prepending operation.
4
Table 1: General notation
N OTATION
D ESCRIPTION
D EFINITION
f ‘X
undefined
image set
arbitrary value
f ( X ) or { f ( x ) | x ∈ X }
merge V V ′ (ρ, σ )
merging disjoint states
h Pi
density M f
distr M N f
indicator function
measure with density
push-forward/image measure
(y • f )( x) =
(
y
f ( x − 1)
if x ∈ V
ρ x
σy
if x ∈ V ′
undefined otherwise
1 if P is true, 0 otherwise
result of applying density f to M
( B, B , λX. µ( f −1 ( X ))) for
M = ( A, A, µ), N = ( B, B , µ′ )
if x = 0
otherwise
We use the same notation for inserting a new variable into a set of variables, shifting
all other variables, i. e.:
x • V = { x } ∪ {y + 1 | y ∈ V }
In general, the notation Γ ⊢ e : t and variations thereof will always mean ‘The
expression e has type t in the type environment Γ’, whereas Υ ⊢ e ⇒ f and variations
thereof mean ‘The expression e compiles to f under the context Υ’.
2.2. Mathematical basics
The category theory part of this section is based mainly on a presentation by ErnstErich Doberkat [9]. For a more detailed introduction, see his textbook [8] or the original
paper by Michèle Giry [10].
2.2.1. Basic measure spaces.
There are two basic measure spaces we will use:
Counting space. The counting space on a countable set A has
• the carrier set A
• the measurable sets P ( A), i. e. all subsets of A
• the measure λX. | X |, i. e. the measure of a subset of A is simply the number of
elements in that set (which can be ∞)
5
Borel space. The Borel space is a measure space on the real numbers which has
• the carrier set R
• the Borel σ-algebra as measurable sets, i. e. the smallest σ-algebra containing all
open subsets of R
• the Borel measure as a measure, i. e. the uniquely defined measure that maps real
intervals to their lengths
2.2.2. Sub-probability spaces.
A sub-probability space is a measurable space ( A, A) with a measure µ such that every
set X ∈ A has a measure ≤ 1, or, equivalently, µ( A) ≤ 1 .
For technical reasons, we also assume A 6= ∅ . This is required later in order to define
the bind operation in the Giry monad in a convenient way within Isabelle. This nonemptiness condition will always be trivially satisfied by all the measure spaces used in
this work.
2.2.3. The category Meas.
Note that:
• For any measurable space ( A, A), the identity function is A-A-measurable.
• For any measurable spaces ( A, A), ( B, B), (C, C), an A-B -measurable function f ,
and a B -C -measurable function g, the function g ◦ f is A-C -measurable.
Therefore, measurable spaces form a category Meas where:
• the objects of the category are measurable spaces
• the morphisms of the category are measurable functions
• the identity morphism 1( A,A) is the identity function id A : A → A, λx. x
• morphism composition is function composition
2.2.4. Kernel space.
The kernel space S ( A, A) of a measurable space ( A, A) is the natural measurable space
over the measures over ( A, A) with a certain property. For our purposes, this property
will be that they are sub-probability measures (as defined in Sect. 2.2.2).
Additionally, a natural property the kernel space should satisfy is that measuring a
fixed set X ∈ A while varying the measure within S ( A, A) should be a Borel-measurable
function; formally:
For all X ∈ A, f : S ( A, A) → R, λµ. µ( X ) is S ( A, A)-Borel-measurable
6
We can now simply define S ( A, A) as the smallest measurable space with the carrier
set
M := {µ | µ is a measure on ( A, A), µ( A) ≤ 1}
that fulfils this property, i. e. we let S ( A, A) := ( M, M) with
M := {(λµ. µ( X ))−1 (Y ) | X ∈ A, Y ∈ B}
where B is the Borel σ-algebra on R.
Additionally, for a measurable function f , we define S ( f ) = λµ. f (µ), where f (µ)
denotes the push-forward measure (or image measure)3 . Then S maps objects of Meas
to objects of Meas and morphisms of Meas to morphisms of Meas. We can thus see that
S is an endofunctor in the category Meas, as (id( A,A) )(µ) = µ and ( f ◦ g)(µ) = f ( g(µ)) .
2.2.5. Giry monad.
The Giry monad naturally captures the notion of choosing a value according to a (sub-)probability distribution, using it as a parameter for another distribution, and observing the
result.
Consequently, return (or η) yields a Dirac measure, i. e. a probability measure in
which all the ‘probability’ lies in a single element, and bind (or ≫=) integrates over
all the input values to compute one single output measure. Formally, for measurable
spaces ( A, A) and ( B, B), a measure µ on ( A, A), a value x ∈ A, and an A-S ( B, B)measurable function f :
(
Z
1 if x ∈ X
µ ≫= f := λX. x. f ( x)( X ) ∂µ
return( A,A) x := λX.
0 otherwise
Unfortunately, restrictions due to Isabelle’s type system require us to determine the
σ-algebra of the resulting measurable space for bind M f since this information cannot
be provided by the type of f . This can be done with an additional parameter, but it is
more convenient to define bind in such a way that it chooses an arbitrary value x ∈ M
and takes the σ-algebra of f x (or the count space on ∅ if M is empty)4 .
This choice is somewhat non-standard, but the difference is of no practical significance as we will not use bind on empty measure spaces.
To simplify the proofs for bind, we instead define the join operation (also known as
µ in category theory) first and use it to then define bind. The join operation ‘flattens’
objects, i. e. it maps an element of S (S ( A, A)) to one of S ( A, A) . Such an operation can
be naturally defined as:
Z
µ′ . µ′ ( X ) ∂µ
join µ = λX.
Note that in Isabelle, join has an additional explicit parameter for the measurable
space of the result to avoid the problem we had with bind. This makes expressions
= λX. µ ( f −1 ( X )) .
that for any A − S ( B, B)-measurable function f , the σ-algebra thus obtained is independent of
which value is chosen, by definition of the kernel space.
3 f (µ )
4 Note
7
containing join more complicated; this is, however, justified by the easier proofs and
will be unproblematic later since we will never use join directly, only bind.
Now, bind can be defined using join in the following way, modulo handling of empty
measure spaces5 :
µ ≫= f = join (S ( f )(µ)) = join ( f (µ))
2.2.6. The ‘do’ syntax.
For better readability, we employ a Haskell-style ‘do notation’ for operations in the
Giry monad. The syntax of this notation is defined recursively, where M stands for a
monadic expression and h patterni stands for arbitrary ‘raw’ text:
do { M } =
ˆ M
do { x ← M; h patterni} =
ˆ M ≫= (λx. do {h pattern i})
3. Language Syntax and Semantics
The source language used in the formalisation was modelled after the language Fun
described by Bhat et al. [4]; similarly, the target language is almost identical to the
target language used by Bhat et al. However, we have made the following changes in
our languages:
• Variables are represented by de Bruijn indices to avoid handling freshness, captureavoiding substitution, and related problems.
• No sum types are supported. Consequently, the match . . . with . . . command is
replaced with an IF . . . THEN . . . ELSE . . . command. Furthermore, booleans are
a primitive type rather than represented as unit + unit .
• The type double is called real and it represents a real number with absolute precision as opposed to an IEEE 754 floating point number.
• Beta and Gamma distributions are not included.
In the following sections, we give the precise syntax, typing rules, and semantics of
both our source language and our target language.
3.1. Types, values, and operators
The source language and the target language share the same type system and the same
operators. Figure 1 shows the types and values that exist in our languages.6 Additionally, standard arithmetical and logical operators exist.
5 S ( f ),
i. e. lifting a function on values to a function on measure spaces, is done by the distr function
in Isabelle. This function was already defined in the library, which simplifies our proofs about bind,
seeing as some of the proof work has already been done in the proofs about distr.
6 Note that bool, int, and real stand for the respective Isabelle types, whereas B, Z, and R stand for the
source-/target-language types.
8
datatype pdf_type =
UNIT | B | Z | R | pdf_type × pdf_type
datatype val =
UnitVal | BoolVal bool | IntVal int | RealVal real | <| val, val |>
datatype pdf_operator =
Fst | Snd | Add | Mult | Minus | Less | Equals | And | Or | Not | Pow |
Fact | Sqrt | Exp | Ln | Inverse | Pi | Cast pdf_type
Figure 1: The types and values in the source and target language
All operators are total, meaning that for every input value of their parameter type,
they return a single value of their result type. This requires some non-standard definitions for non-total operations such as division, the logarithm, and the square root – we
define them to be 0 outside their domain. Non-totality could also be handled by implementing operators in the Giry monad by letting them return either a Dirac distribution
with a single result or, when evaluated for a parameter on which they are not defined,
the null measure. This, however, would probably complicate many proofs significantly.
To increase readability, we will use the following abbreviations:
• TRUE and FALSE stand for BoolVal True and BoolVal False, respectively.
• RealVal, IntVal, etc. will be omitted in expressions when their presence is implicitly
clear from the context.
• a − b stands for a + (−b) and a/b for a · b−1 .
3.2. Auxiliary definitions
A number of auxiliary definitions are used in the definition of the semantics; for a full
list of auxiliary functions see table 2. The following two notions require a detailed
explanation:
3.2.1. Measure embeddings.
A measure embedding is the measure space obtained by ‘tagging’ values in a measure
space M with some injective function f (in fact, f will always be a datatype constructor).
For instance, a set of values of type R can naturally be measured by stripping away the
RealVal constructor and using a measure on real numbers (e. g. the Lebesgue-Borel
measure) on the resulting set of reals. Formally:
embed_measure ( A, A, µ) f = f ( A), { f ( X ) | X ∈ A}, λX. µ( f −1 ( X ) ∩ A)
9
3.2.2. Stock measures.
The stock measure for a type t is the ‘natural’ measure on values of that type. This is
defined as follows:
• For the countable types UNIT, B, Z: the count measure over the corresponding
type universes
• For type R: the embedding of the Lebesgue-Borel measure on R with RealVal
• For t1 × t2 : the embedding of the product measure
stock_measure t1
with λ(v, w). <| v, w |>
N
stock_measure t2
R
Note that
R in order to save space and increase readability, we will often write x. f x ∂t
instead of x. f x ∂stock_measure t in integrals.
3.2.3. The state measure.
Using the stock measure, we can also construct a measure on states in the context of a
typing environment Γ. A state on the variables V is a function that maps a variable in
V to a value. A state σ is well-formed w. r. t. to V and Γ if it maps every variable x ∈ V to
a value of type Γ x and every variable ∈
/ V to undefined.
We now fix Γ and a finite V and consider the set of well-formed states w. r. t. V and
Γ. Another representation of these states are tuples in which the i-th component is the
value of the i-th variable in V. The natural measure that can be given to such tuples is
then the finite product measure of the stock measures of the types of the variables:
state_measure Γ V :=
3.3. Source language
O
stock_measure (Γ x)
x ∈V
Figures 2 and 3 show the syntax resp. the typing rules of the source language. Figure
4 defines the source language semantics as a primitively recursive function. Similarly
to the abbreviations mentioned in Sect. 3.1, we will omit Val when its presence is implicitly obvious from the context; e. g. if in some context, e is an expression and c is a
constant real number, we will write e + Val (RealVal c) as e + c .
3.3.1. Built-in distributions.
Our language contains the built-in distributions Bernoulli, UniformInt, UniformReal, Gaussian, and Poisson. The uniform distributions are parametrised with a pair of numbers
( a, b) and return a uniform distribution over the interval [a; b]. The Gaussian distribution is parametrised with a pair of real numbers (µ, σ), i. e. mean and standard deviation.
10
Table 2: Auxiliary functions
F UNCTION
D ESCRIPTION
op_sem op v
op_type op t
dist_param_type dst
dist_result_type dst
dist_measure dst x
dist_dens dst x y
type_of Γ e
val_type v
type_universe t
countable_type t
free_vars e
e det
extract_real x
return_val v
null_measure M
semantics of operator op applied to v
result type of operator op for input type t
parameter type of the built-in distribution dst
result type of the built-in distribution dst
built-in distribution dst with parameter x
density of the built-in distribution dst w. parameter x at value y
the unique t such that Γ ⊢ e : t
the type of value v, e. g. val_type (IntVal 42) = INTEG
the set of values of type t
true iff type_universe t is a countable set
the free (i. e. non-bound) variables in the expression e
true iff e does not contain Random or Fail
returns y for x = RealVal y (analogous for int, pair, etc.)
return (stock_measure (val_type v)) v
measure with same measurable space as M, but 0 for all sets
datatype expr =
Var nat | Val val | LET expr IN expr | pdf_operator $ expr | < expr, expr> |
Random pdf_dist | IF expr THEN expr ELSE expr | Fail pdf_type
Figure 2: The source language syntax
For invalid parameters, i. e. Bernoulli 2 or UniformReal 3 2, the built-in distributions
return the null measure.
3.4. Deterministic expressions
We call an expression e deterministic (written as ‘e det’) if it contains no occurrence of
Random or Fail. Such expressions are of particular interest: if all their free variables have
a fixed value, they return precisely one value, so we can define a function expr_sem_rf 7
that, when given a state σ and a deterministic expression e, returns this single value.
7 In Isabelle, the expression randomfree is used instead of deterministic, hence
the ‘rf’ suffix. This is in order
to emphasise the syntactical nature of the property. Additionally, it is worth noting that a syntactically
deterministic expression is not truly deterministic if the variables it contains are randomised over,
which is the case sometimes.
11
ET _ VAL
ET _ VAR
ET _ FAIL
Γ ⊢ Val v : val_type v
Γ ⊢ Var x : Γ x
Γ ⊢ Fail t : t
ET _ OP
Γ⊢e : t
ET _ IF
Γ⊢b : B
op_type op t = Some t
Γ ⊢ op $ e : t
Γ ⊢ e1 : t
′
′
ET _ PAIR
Γ ⊢ e1 : t1
Γ ⊢ e2 : t2
Γ ⊢ < e1 , e2> : t1 × t2
ET _ LET
Γ ⊢ e2 : t
Γ ⊢ IF b THEN e1 ELSE e2 : t
ET _ RAND
Γ ⊢ e1 : t1
t1 • Γ ⊢ e2 : t2
Γ ⊢ LET e1 IN e2 : t2
Γ ⊢ e : dist_param_type dst
Γ ⊢ Random dst e : dist_result_type dst
Figure 3: The typing rules for source-language expressions
The definition is obvious and leads to the following equality (assuming that e is deterministic and well-typed and σ is a valid state):
expr_sem σ e = return (expr_sem_rf σ e)
This property will later enable us to also convert deterministic source-language expressions into ‘equivalent’ target-language expressions.
3.5. Target language
The target language is again modelled very closely after the one used by Bhat et al. [4].
The type system and the operators are the same as in the source language, but the key
difference is that while expressions in the source language return a measure space on
their result type, the expressions in the target language always return a single value.
Since our source language lacks sum types, so does our target language. Additionally, our target language differs from that used by Bhat et al. in the following respects:
• Our language has no function types; since functions only occur as integrands and
as final results (as the compilation result is a density function), we can simply
define integration to introduce the integration variable as a bound variable and
let the final result contain a single free variable with de Bruijn index 0, i. e. there
is an implicit λ abstraction around the compilation result.
• Evaluation of expressions in our target language can never fail. In the language
by Bhat et al., failure is used to handle undefined integrals; we, on the other hand,
use the convention of Isabelle’s measure theory library, which returns 0 for integrals of non-integrable functions. This has the advantage of keeping the semantics
simple, which makes proofs considerably easier.
12
• Our target language does not have Let bindings, since, in contrast to the source
language, they would be semantically superfluous here. However, they are still
useful in practice since they yield shorter expressions and can avoid multiple
evaluation of the same term; they could be added with little effort.
Figures 5, 6, and 7 show the syntax, typing rules, and semantics of the target language.
primrec expr_sem :: state ⇒ expr ⇒ val measure where
expr_sem σ (Val v) = return_val v
| expr_sem σ (Var x) = return_val (σ x)
| expr_sem σ (LET e1 IN e2 ) =
do {
v ← expr_sem σ e1 ;
expr_sem (v • σ) e2
}
| expr_sem σ (op $ e) =
do {
v ← expr_sem σ e;
return_val (op_sem op v)
}
| expr_sem σ < e1 , e2> =
do {
v ← expr_sem σ e1 ;
w ← expr_sem σ e2 ;
return_val <| v, w |>
}
| expr_sem σ (IF b THEN e1 ELSE e2 ) =
do {
b′ ← expr_sem σ b;
if b′ = TRUE then expr_sem σ e1 else expr_sem σ e2
}
| expr_sem σ (Random dst e) =
do {
p ← expr_sem σ e;
dist_measure dst p
}
| expr_sem σ (Fail t) = null_measure (stock_measure t)
Figure 4: The semantics of source-language expressions
13
datatype cexpr =
CVar nat | CVal val | pdf_operator $c cexpr | < cexpr, cexpr>c |
R
IFc cexpr THEN cexpr ELSE cexpr | c cexpr ∂pdf_type
Figure 5: The expressions of the target language
CET _ VAL
CET _ VAR
Γ ⊢c CVal v : val_type v
Γ ⊢c CVar x : Γ x
CET _ OP
Γ ⊢c e : t
op_type op t = Some t
Γ ⊢c op $c e : t
′
′
CET _ PAIR
Γ ⊢ c e1 : t1
Γ ⊢c < e1 , e2>c : t1 × t2
CET _ IF
Γ ⊢c b : B
Γ ⊢ c e2 : t2
CET _ INT
Γ ⊢ c e1 : t
Γ ⊢ c e2 : t
Γ ⊢c IFc b THEN e1 ELSE e2 : t
t • Γ ⊢c e : R
R
Γ ⊢c c e ∂t : R
Figure 6: The typing rules for the target language
primrec cexpr_sem :: state ⇒ cexpr ⇒ val where
cexpr_sem σ (CVal v) = v
| cexpr_sem σ (CVar x) = σ x
| cexpr_sem σ < e1 , e2>c = <| cexpr_sem σ e1 , cexpr_sem σ e2 |>
| cexpr_sem σ op $c e = op_sem op (cexpr_sem σ e)
| cexpr_sem σ (IFc b THEN e1 ELSE e2 ) =
(if cexpr_sem σ b = TRUE then cexpr_sem σ e1 else cexpr_sem σ e2 )
R
| cexpr_sem σ ( c e ∂t) =
R
RealVal ( x. extract_real (cexpr_sem ( x • σ) e) ∂stock_measure t)
Figure 7: The semantics of the target language
14
Converting deterministic expressions. The auxiliary function expr_rf _to_cexpr, which
will be used in some rules of the compiler that handle deterministic expressions, is of
particular interest. We mentioned earlier that deterministic source-language expressions can be converted to equivalent target-language expressions.8 This function does
precisely that. Its definition is obvious.
expr_rf _to_cexpr satisfies the following equality for any deterministic source-language
expression e:
cexpr_sem σ (expr_rf_to_cexpr e) = expr_sem_rf σ e
4. Abstract compiler
4.1. Density contexts
First, we define the notion of a density context, which holds the acquired context data
the compiler will require to compute the density of an expression. A density context is
a tuple Υ = (V, V ′ , Γ, δ) that contains the following information:
• The set V of random variables in the current context. These are the variables that
are randomised over.
• The set V ′ of parameter variables in the current context. These are variables that
may occur in the expression, but are not randomised over but treated as constants.
• The type environment Γ
• A density function δ that returns the common density of the variables V under
the parameters V ′ . Here, δ is a function from space (state_measure (V ∪ V ′ ) Γ) to
the extended real numbers.
A density context (V, V ′ , Γ, δ) describes a parametrised measure on the states on
V ∪ V ′ . Let ρ ∈ space (state_measure V ′ Γ) be a set of parameters. Then we write
dens_ctxt_measure (V, V ′ , Γ, δ) ρ for the measure that we obtain by taking state_measure V Γ,
transforming it by merging a given state σ with the parameter state ρ and finally applying the density δ on the resulting image measure. The Isabelle definition of this
is:
definition dens_ctxt_measure :: dens_ctxt ⇒ state ⇒ state_measure where
dens_ctxt_measure (V, V ′ , Γ, δ) ρ = density (distr (state_measure V Γ)
(state_measure (V ∪ V ′ ) Γ) (λσ. merge V V ′ (σ, ρ))) δ
8 Bhat
et al. say that a deterministic expression ‘is also an expression in the target language syntax, and
we silently treat it as such’ [4]
15
Informally, dens_ctxt_measure describes the measure obtained by integrating over the
variables v1 , . . . , vm ∈ V while treating the variables v1′ , . . . , v′n ∈ V ′ as parameters. The
evaluation of an expression e with variables from V ∪ V ′ in this context is effectively a
function
λv1′ . . . v′n .
Z +
v1 . . . .
Z +
vm . expr_sem (v1 , . . . , vm , v1′ , . . . , v′n ) e ·
δ (v1 , . . . , vm , v1′ , . . . , v′n ) ∂Γ v1 . . . ∂Γ vm .
A density context is well-formed (implemented in Isabelle as the locale density_context)
if:
• V and V ′ are finite and disjoint
• δ σ ≥ 0 for any σ ∈ space (state_measure (V ∪ V ′ ) Γ)
• δ is Borel-measurable w. r. t. state_measure (V ∪ V ′ ) Γ
• for any ρ ∈ space (state_measure V ′ Γ), the dens_ctxt_measure (V, V ′ , Γ, δ) ρ is a
sub-probability measure
4.2. Definition
As a first step, we have implemented an abstract density compiler as an inductive predicate Υ ⊢d e ⇒ f , where Υ is a density context, e is a source-language expression and
f is a function of type val state ⇒ val ⇒ ereal . Its first parameter is a state that assigns
values to the free variables in e and its second parameter is the value for which the
density is to be computed. The compiler therefore computes a density function that is
parametrised with the values of the non-random free variables in the source expression.
The compilation rules are virtually identical to those by Bhat et al. [4], except for the
following adaptations:
• Bhat et al. handle the IF . . . THEN . . . ELSE case with the ‘match’ rule for sum
types. As we do not support sum types, we have a dedicated rule for IF . . . THEN
. . . ELSE . . . .
• The use of de Bruijn indices requires shifting of variable sets and states whenever
the scope of a new bound variable is entered; unfortunately, this makes some
rules somewhat technical.
• We do not provide any compiler support for deterministic ‘let’ bindings. They are
semantically redundant, as they can always be expanded without changing the
semantics of the expression. In fact, they have to be unfolded for compilation, so
they can be regarded as a feature that adds convenience, but no expressivity.
16
The following list shows the standard compilation rules adapted from Bhat et al.,
plus a rule for multiplication with a constant.9 Note that the functions marg_dens and
marg_dens2 compute the marginal density of one (resp. two) variables by ‘integrating
away’ all the other variables from the common density δ. The function branch_prob
computes the probability of being in the current branch of execution by integrating
over all the variables in the common density δ.
HD _ VAL
countable_type (val_type v)
(V, V , Γ, δ) ⊢d Val v ⇒ λρ x. branch_prob (V, V ′ Γ, δ) ρ · h x = vi
′
HD _ VAR
x∈V
(V, V , Γ, δ) ⊢d Var x ⇒ marg_dens (V, V ′ , Γ, δ) x
′
HD _ PAIR
x∈V
y∈V
x 6= y
(V, V ′ , Γ, δ) ⊢d <Var x, Var y> ⇒ marg_dens2 (V, V ′ , Γ, δ) x y
HD _ FAIL
(V, V ′ , Γ, δ) ⊢d Fail t ⇒ λρ x. 0
HD _ LET
(∅, V ∪ V ′ , Γ, λx. 1) ⊢d e1 ⇒ f
(0 • V, { x + 1 | x ∈ V }, type_of Γ e1 • Γ, ( f · δ)(ρ ◦ (λx. x + 1)) ⊢d e2 ⇒ g
(V, V ′ , Γ, δ) ⊢d LET e1 IN e2 ⇒ λρ. g (undefined • ρ)
′
HD _ RAND
(V, V ′ , Γ, δ) ⊢d e ⇒ f
(V, V ′ , Γ, δ) ⊢d Random dst e ⇒
R+
λρ y. x. f ρ x · dist_dens dst x y ∂dist_param_type dst
HD _ RAND _ DET
e det
free_vars e ⊆ V ′
(V, V ′ , Γ, δ) ⊢d Random dst e ⇒
λρ x. branch_prob (V, V ′ , Γ, δ) ρ · dist_dens dst (expr_sem_rf ρ e) x
HD _ IF
(∅, V ∪ V ′ , Γ, λρ. 1) ⊢d b ⇒ f
(V, V , Γ, λρ. δ ρ · f TRUE) ⊢d e1 ⇒ g1
(V, V ′ , Γ, λρ. δ ρ · f FALSE) ⊢d e2 ⇒ g2
(V, V ′ , Γ, δ) ⊢d IF b THEN e1 ELSE e2 ⇒ λρ x. g1 ρ x + g2 ρ x
′
HD _ IF _ DET
9 Additionally, three congruence rules are required for technical reasons.
These rules are required because
the abstract and the concrete result may differ on a null set and outside their domain.
17
b det
(V, V ′ , Γ, λρ. δ ρ · hexpr_sem_rf ρ b = TRUEi) ⊢d e1 ⇒ g1
(V, V ′ , Γ, λρ. δ ρ · hexpr_sem_rf ρ b = FALSEi) ⊢d e2 ⇒ g2
(V, V ′ , Γ, δ) ⊢d IF b THEN e1 ELSE e2 ⇒ λρ x. g1 ρ x + g2 ρ x
HD _ FST
(V, V ′ , Γ, δ) ⊢d e ⇒ f
R+
(V, V ′ , Γ, δ) ⊢d fst e ⇒ λρ x. y. f ρ <| x, y |> ∂type_of Γ (snd e)
HD _ SND
(V, V ′ , Γ, δ) ⊢d e ⇒ f
R+
(V, V ′ , Γ, δ) ⊢d snd e ⇒ λρ y. x. f ρ <| x, y |> ∂type_of Γ (fst e)
HD _ OP _ DISCR
HD _ NEG
countable_type (type_of (op $ e))
(V, V ′ , Γ, δ) ⊢d e ⇒ f
R
+
(V, V ′ , Γ, δ) ⊢d op $ e ⇒ λρ y. x. hop_sem op x = yi · f ρ x ∂type_of Γ e
HD _ ADDC
HD _ MULTC
(V, V ′ , Γ, δ) ⊢d e ⇒ f
(V, V ′ , Γ, δ) ⊢d −e ⇒ λρ x. f ρ (− x )
e′ det
free_vars e′ ⊆ V ′
(V, V ′ , Γ, δ) ⊢d e ⇒ f
(V, V ′ , Γ, δ) ⊢d e + e′ ⇒ λρ x. f ρ ( x − expr_sem_rf ρ e′ )
c 6= 0
(V, V ′ , Γ, δ) ⊢d e ⇒ f
(V, V , Γ, δ) ⊢d e · Val (RealVal c) ⇒ λρ x. f ρ ( x/c) / |c|
′
HD _ ADD
HD _ INV
(V, V ′ , Γ, δ) ⊢d <e1 , e2> ⇒ f
R+
(V, V ′ , Γ, δ) ⊢d e1 + e2 ⇒ λρ z. x. f ρ <| x, z − x |> ∂type_of Γ e1
(V, V ′ , Γ, δ) ⊢d e ⇒ f
(V, V ′ , Γ, δ) ⊢d e−1 ⇒ λρ x. f ρ ( x −1 ) / x2
HD _ EXP
(V, V ′ , Γ, δ) ⊢d e ⇒ f
(V, V ′ , Γ, δ) ⊢d exp e ⇒ λρ x. if x > 0 then f ρ (ln x ) / x else 0
Figure 8: The abstract compilation rules
18
4.3. Soundness proof
We show the following soundness result for the abstract compiler:
10
lemma expr_has_density_sound :
assumes (∅, ∅, Γ, λρ. 1) ⊢d e ⇒ f and Γ ⊢ e : t and free_vars e = ∅
shows has_subprob_density (expr_sem σ e) (stock_measure t) ( f (λx. undefined))
Here, has_subprob_density M N f is an abbreviation for the following four facts:
• applying the density f to N yields M
• M is a sub-probability measure
• f is N-Borel-measurable
• f is non-negative on its domain
We prove this with the following generalised auxiliary lemma:
lemma expr_has_density_sound_aux :
assumes (V, V ′ , Γ, δ) ⊢d e ⇒ f and Γ ⊢ e : t and free_vars e = ∅
and density_context V V ′ Γ δ and free_vars e ⊆ V ∪ V ′
shows
has_parametrized_subprob_density (state_measure V ′ Γ)
(λρ. do {σ ← dens_ctxt_measure (V, V ′ , Γ, δ) ρ; expr_sem σ e})
(stock_measure t) f
The predicate has_parametrized_subprob_density R M N f simply means that f is Borelmeasurable w. r. t. R ⊗ N and that for any parameter state ρ from R, the predicate
has_subprob_density M N f holds.
The proof is by straightforward induction following the inductive definition of the
abstract compiler. In many cases, the monad laws for the Giry monad allow restructuring the induction goal in such a way that the induction hypothesis can be applied
directly; in the other cases, the definitions of the monadic operations need to be unfolded and the goal is essentially to show that two integrals are equal and that the output
produced is well-formed.
The proof given by Bhat et al. [5] is analogous to ours, but much more concise due to
the fact that side conditions such as measurability, integrability, non-negativity, and so
on are not proven explicitly and many important (but uninteresting) steps are skipped
or only hinted at.
10 Note
that since the abstract compiler returns parametrised density functions, we need to parametrise
the result with the state λx. undefined, even if the expression contains no free variables.
19
5. Concrete compiler
5.1. Approach
The concrete compiler is another inductive predicate, modelled directly after the abstract compiler, but returning a target-language expression as the compilation result
instead of a HOL function. We will use a standard refinement approach to relate the
concrete compiler to the abstract compiler. We thus lift the soundness result on the abstract compiler to an analogous one on the concrete one. This effectively shows that the
concrete compiler always returns a well-formed target-language expression that represents a density for the sub-probability space described by the source language.
The concrete compilation predicate is written as
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
Here, vs and vs′ are lists of variables, Γ is a typing environment, and δ is a targetlanguage expression describing the common density of the random variables vs in the
context. It may be parametrised with the variables from vs′ .
5.2. Definition
The concrete compilation rules are, of course, a direct copy of the abstract ones, but
with all the abstract HOL operations replaced with operations on target-language expressions. Due to the de Bruijn indices and the lack of functions as explicit objects in
the target language, some of the rules are somewhat complicated – inserting an expression into the scope of one or more bound variables (such as under an integral) requires
shifting the variable indices of the inserted expression correctly. For this reason, we will
not print the rules here; they can be found in the Isabelle theory file PDF_Compiler.thy.
5.3. Refinement
The refinement relates the concrete compilation (vs, vs′ , Γ, δ) ⊢c e ⇒ f to the abstract
compilation
(set vs, set vs′ , Γ, λσ. cexpr_sem σ δ) ⊢c e ⇒ λρ x. cexpr_sem ( x • ρ) f
In words: we take the abstract compilation predicate and
• variable sets are refined to variable lists
• the typing context and the source-language expression remain unchanged
• the common density in the context and the compilation result are refined from
HOL functions to target-language expressions (by applying the target language
semantics)
20
The main refinement lemma states that the concrete compiler yields a result that is
equivalent to that of the abstract compiler, modulo refinement. Informally, the statement is the following: if e is ground and well-typed under some well-formed concrete
density context Υ and Υ ⊢c e ⇒ f , then Υ′ ⊢d e ⇒ f ′ , where Υ′ and f ′ are the abstract
versions of Υ and f .
The proof for this is conceptually simple – induction over the definition of the concrete compiler; in practice, however, it is quite involved. In every single induction step,
the well-formedness of the intermediary expressions needs to be shown, congruence
lemmas for the abstract compiler need to be applied, and, when integration is involved,
non-negativity and integrability have to be shown in order to convert non-negative integrals to Lebesgue integrals and integrals on product spaces to iterated integrals.
Combining this main refinement lemma and the abstract soundness lemma, we can
now easily show the concrete soundness lemma:
lemma expr_has_density_cexpr_sound :
assumes ([], [], Γ, 1) ⊢c e ⇒ f and Γ ⊢ e : t and free_vars e = ∅
shows
has_subprob_density (expr_sem σ e) (stock_measure t)
(λx. cexpr_sem ( x • σ) f )
′
′
Γ 0 = t =⇒ Γ ⊢c f : REAL
free_vars f ⊆ {0}
Informally, the lemma states that if e is a well-typed, ground source-language expression, compiling it with an empty context will yield a well-typed, well-formed targetlanguage expression representing a density function on the measure space described
by e.
5.4. Final result
We will now summarise the soundness lemma we have just proven in a more concise
manner. For convenience, we define the symbol e : t ⇒c f (read ‘e with type t compiles
to f ’), which includes the well-typedness and groundness requirements on e as well as
the compilation result:11
e : t ⇒c f ←→ (λx. UNIT ⊢ e : t ∧ free_vars e = ∅ ∧ ([], [], λx. UNIT, 1) ⊢c e ⇒ f )
The final soundness theorem for the compiler, stated in Isabelle syntax, is then:12
11 In
this definition, the choice of the typing environment is, of course, completely arbitrary since the
expression contains no free variables.
12 To be precise, the lemma statement in Isabelle is slightly different; for better readability, we unfolded
one auxiliary definition here and omitted the type cast from real to ereal.
21
lemma expr_compiles_to_sound :
assumes e : t ⇒c f
fixes Γ Γ′ σ σ′
shows expr_sem σ e = density (stock_measure t) (λx. cexpr_sem ( x • σ′ ) f )
∀ x ∈ type_universe t. cexpr_sem ( x • σ′ ) f ≥ 0
Γ⊢e : t
t • Γ′ ⊢c f : REAL
free_vars f ⊆ {0}
In words, this result means the following:
Theorem
Let e be a source-language expression. If the compiler determines that e is
well-formed and well-typed with type t and returns the target-language
expression f , then:
• the measure obtained by taking the stock measure of t and using the
evaluation of f as a density is the measure obtained by evaluating e
• f is non-negative on all input values of type t
• e has no free variables and indeed has type t (in any type context Γ)
• f has no free variable except the parameter (i. e. the variable 0) and is a
function from t to REAL13
Isabelle’s code generator now allows us to execute our inductively-defined verified
compiler using the values command14 or generate code in one of the target languages
such as Standard ML or Haskell.
5.5. Evaluation
As an example on which to test the compiler, we choose the same expression that was
chosen by Bhat et al. [4]:15
LET x = Random UniformReal < 0, 1> IN
LET y = Random Bernoulli x IN
IF y THEN x + 1 ELSE x
14 Our
compiler is inherently non-deterministic since it may return zero, one, or many density functions,
seeing as an expression may have no matching compilation rules or more than one. Therefore, we must
use the values command instead of the value command and receive a set of compilation results.
15 Val and RealVal were omitted for better readability and symbolic variable names were used instead of
de Bruijn indices.
22
We abbreviate this expression with e. We can then display the result of the compilation using the Isabelle command values ”{(t, f ) | t f . e : t ⇒c f }” .
The result is a singleton set which contains the pair (REAL, f ), where f is a very long
and complicated expression. Simplifying constant subexpressions and expressions of
the form fst < e1 , e2 > and again replacing de Bruijn indices with symbolic identifiers,
we obtain:
R
b. (IF 0 ≤ x − 1 ∧ x − 1 ≤ 1 THEN 1 ELSE 0) · (IF 0 ≤ x − 1 ∧ x − 1 ≤ 1 THEN
IF b THEN x − 1 ELSE 1 − ( x − 1) ELSE 0) · hbi +
R
b. (IF 0 ≤ x ∧ x ≤ 1 THEN 1 ELSE 0) · (IF 0 ≤ x ∧ x ≤ 1 THEN
IF b THEN x ELSE 1 − x ELSE 0) · h¬ bi
Further simplification yields the following result:
h 1 ≤ x ≤ 2i · ( x − 1) + h 0 ≤ x ≤ 1i · ( 1 − x )
While this result is the same as that which Bhat et al. have reached, our compiler generates a much larger expression than the one they printed. The reason for this is that
they printed a β-reduced version of the compiler output; in particular, constant subexpressions were evaluated. While such simplification is, of course, very useful when
using the compiler in practice, we have not implemented it since it is not conceptually
interesting and outside the scope of this work.
6. Conclusion
6.1. Breakdown
All in all, the formalisation of the compiler took about three months. It contains a
total of roughly 10000 lines of Isabelle code (definitions, lemma statements, proofs, and
examples). Table 3 shows a detailed breakdown of this.
Table 3: Breakdown of the Isabelle code
Type system and semantics
Abstract compiler
Concrete compiler
General Measure Theory / auxiliary lemmas
2900 lines
2600 lines
1400 lines
3400 lines
As can be seen from this table, a sizeable portion of the work was the formalisation
of results from general measure theory, such as the substitution lemmas for Lebesgue
integrals, and auxiliary notions and lemmas, such as measure embeddings. Since the
utility of these formalisations is not restricted to this particular project, they will be
moved to Isabelle’s Measure Theory library.
23
6.2. Difficulties
The main problems we encountered during the formalisation were:
Missing background theory. As mentioned in the previous section, a sizeable amount
of Measure Theory and auxiliary notions had to be formalised. Most notably, the existing Measure Theory library did not contain integration by substitution. As a side
product of their formalisation of the Central Limit Theorem [2], Avigad et al. proved
the Fundamental Theorem of Calculus and, building thereupon, integration by substitution. However, their integration-by-substitution lemma only supported continuous
functions, whereas we required the theorem for general Borel-measurable functions.
Using their proof of the Fundamental Theorem of Calculus, we proved such a lemma,
which initially comprised almost 1000 lines of proof, but has been shortened significantly thereafter.
Proving side conditions. Many lemmas from the Measure Theory library require
measurability, integrability, non-negativity, etc. In hand-written proofs, this is often
‘hand-waved’ or implicitly dismissed as trivial; in a formal proof, proving these can
blow up proofs and render them very complicated and technical. The measurability
proofs in particular are ubiquitous in our formalisation. The Measure Theory library
provides some tools for proving measurability automatically, but while they were quite
helpful in many cases, they are still work in progress and require more tuning.
Lambda calculus. Bhat et al. use a simply-typed Lambda-calculus-like language
with symbolic identifiers as a target language. For a paper proof, this is the obvious
choice, since it leads to concise and familiar definitions, but in a formal setting, it always comes with the typical problems of having to deal with variable capture and
related issues. For that reason, we chose to use de Bruijn indices instead; however, this
makes handling target-language terms less intuitive, since variable indices need to be
shifted whenever several target-language terms are combined.
Another issue was the lack of a function type in our target language; allowing firstorder functions, as Bhat et al. did, would have made many definitions easier and more
natural, but would have complicated others significantly due to measurability issues.
Furthermore, we effectively needed to formalise a number of properties of Lambda
calculus that can be used implicitly in a paper proof.
6.3. Future work
The following improvements to the Isabelle formalisation could probably be realised
with little effort:
• sum types and a match . . . with . . . statement
• a compiler rule for deterministic ‘let’ bindings
24
• ‘let’ bindings for the target language
• a preprocessing stage to allow ‘normal’ variables instead of de Bruijn indices
• a postprocessing stage to automatically simplify the density expression as far as
possible
The first of these is interesting because it is the only substantial weakness of our
formalisation as opposed to that by Bhat et al.; the remaining four merely make using
the compiler more convenient or more efficient.
Additionally, in the long term, a Markov-chain Monte Carlo (MCMC) sampling method
such as the Metropolis–Hastings algorithm could also be formalised in Isabelle and integrated with the density compiler. However, this would be a more involved project as it
will require the formalisation of additional probability theory in Isabelle.
6.4. Summary
Using Isabelle/HOL, we formalised the semantics of a simple probabilistic functional
programming language with predefined probability distributions and a compiler that
returns the probability distribution that a program in this language describes. These
are modelled very closely after those given by Bhat et al. [4]. We then used the existing
formalisations of measure theory in Isabelle/HOL to formally prove the correctness of
this compiler w. r. t. the semantics of the source and target languages.
This shows not only that the compiler given by Bhat et al. is correct, but also that
a formal correctness proof for such a compiler can be done with reasonable effort and
that Isabelle/HOL in general and its Measure Theory library in particular are suitable
for it.
References
[1] Audebaud, P., Paulin-Mohring, C.: Proofs of randomized algorithms in Coq. In:
Mathematics of Program Construction, Lecture Notes in Computer Science, vol.
4014, pp. 49–68. Springer Berlin Heidelberg (2006),
http://dx.doi.org/10.1007/11783596_6
[2] Avigad, J., Hölzl, J., Serafin, L.: A formally verified proof of the Central Limit
Theorem. CoRR abs/1405.7012 (2014)
[3] Bhat, S., Agarwal, A., Vuduc, R., Gray, A.: A type theory for probability density
functions. In: Proceedings of the 39th Annual ACM SIGPLAN-SIGACT
Symposium on Principles of Programming Languages. pp. 545–556. POPL ’12,
ACM, New York, NY, USA (2012),
http://doi.acm.org/10.1145/2103656.2103721
[4] Bhat, S., Borgström, J., Gordon, A.D., Russo, C.: Deriving probability density
functions from probabilistic functional programs. In: Tools and Algorithms for
25
the Construction and Analysis of Systems, Lecture Notes in Computer Science,
vol. 7795, pp. 508–522. Springer Berlin Heidelberg (2013),
http://dx.doi.org/10.1007/978-3-642-36742-7_35, (best paper award)
[5] Bhat, S., Borgström, J., Gordon, A.D., Russo, C.: Deriving probability density
functions from probabilistic functional programs. In: TODO. Springer Berlin
Heidelberg (2014)
[6] Cock, D.: Verifying probabilistic correctness in Isabelle with pGCL. In:
Proceedings of the 7th Systems Software Verification. pp. 1–10 (November 2012)
[7] Cock, D.: pGCL for Isabelle. Archive of Formal Proofs (Jul 2014),
http://afp.sf.net/entries/pGCL.shtml, Formal proof development
[8] Doberkat, E.E.: Stochastic relations: foundations for Markov transition systems.
Studies in Informatics, Chapman & Hall/CRC (2007)
[9] Doberkat, E.E.: Basing Markov transition systems on the Giry monad.
http://www.informatics.sussex.ac.uk/events/domains9/Slides/Doberkat_GiryMonad.pdf
(2008)
[10] Giry, M.: A categorical approach to probability theory. In: Categorical Aspects of
Topology and Analysis, Lecture Notes in Mathematics, vol. 915, pp. 68–85.
Springer Berlin Heidelberg (1982), http://dx.doi.org/10.1007/BFb0092872
[11] Hölzl, J.: Construction and stochastic applications of measure spaces in
Higher-Order Logic. PhD thesis, Technische Universität München, Institut für
Informatik (2012)
[12] Hurd, J., McIver, A., Morgan, C.: Probabilistic guarded commands mechanized in
HOL. Electron. Notes Theor. Comput. Sci. 112, 95–111 (Jan 2005),
http://dx.doi.org/10.1016/j.entcs.2004.01.021
[13] Park, S., Pfenning, F., Thrun, S.: A probabilistic language based upon sampling
functions. In: Proceedings of the 32Nd ACM SIGPLAN-SIGACT Symposium on
Principles of Programming Languages. pp. 171–182. POPL ’05, ACM, New York,
NY, USA (2005), http://doi.acm.org/10.1145/1040305.1040320
26
Appendix
A. Operator semantics
O PERATOR
Add
Minus
Mult
Inverse
I NPUT
TYPE
O UTPUT
Z×Z
Z
R×R
R
Z
Z
R
R
Z×Z
Z
R×R
S EMANTICS
TYPE
a+b
−a
a·b
R
R
(
R
Sqrt
R
R
Exp
R
R
Ln
R
R
Pi
UNIT
R
1
a
for a 6= 0
otherwise
0
(√
a
0
for a ≥ 0
otherwise
ea
(
ln a
0
for a > 0
otherwise
π
(
ab
0
Z×Z
Z
R×Z
R
Fact
Z
Z
a!
And
B×B
B
a∧b
Or
B×B
B
a∨b
Not
B
B
¬a
Equals
t×t
B
a=b
Z×Z
B
Less
Pow
R×R
B
27
for a 6= 0, b ≥ 0
otherwise
a<b
Fst
t1 × t2
t1
a for z = ( a, b)
Snd
t1 × t2
t2
b for z = ( a, b)
B
R
Z
R
h a = TRUEi
a as a real number
B
Z
R
Z
h a = TRUEi
Cast REAL
Cast INT
⌊a⌋
B. Built-in distributions
D ISTRIBUTION
PARAM .
D OMAIN
T YPE
D ENSITY FUNCTION
(
p
1− p
for x = TRUE
for x = FALSE
Bernoulli
R
p ∈ [0; 1]
B
UniformInt
Z×Z
p1 ≤ p2
Z
h x ∈ [ p1 ; p2 ]i
p2 − p1 + 1
UniformReal
R×R
p1 < p2
R
h x ∈ [ p1 ; p2 ]i
p2 − p1
Gaussian
R×R
p2 > 0
R
Poisson
R
p≥0
Z
( x − p1 )2
q
exp −
2p22
2πp22
1
(
exp(− p) · p x /x!
0
!
for x ≥ 0
otherwise
Figure 9: The built-in distributions of the source language.
The density functions are given in terms of the parameter p, which is of the type given in the
column ‘parameter type’. If p is of a product type, p1 and p2 stand for the two components of
p. x is the function variable, e. g. the point at which the density function is to be evaluated.
28
C. Target language auxiliary functions
For the definitions of the following functions, see the corresponding Isabelle theory file
PDF_Target_Semantics.thy. We will not print them here since they are rather technical.
In this section, x will always be a variable, v will always be a value, and e and e′
will always be target language expressions. f and g will always be target language
expressions interpreted as functions, i. e. with an implicit λ abstraction around them.
All functions in the table take de Bruijn indices into account, i. e. they will shift variables when they enter the scope of an integral.
F UNCTION
D ESCRIPTION
case_nat y f x
if x = 0 then y else f ( x − 1)
map_vars h e
transforms all variables in e with the function h
ins_var0 e
map_vars Suc e
(prepares expression e for insertion into scope of new
variable)
ins_var1 f
map_vars (case_nat 0 (λx. x + 2)) f
(prepares function f for insertion into scope of new variable)
del_var0 e
map_vars (λx. x − 1) e
(shifts all variables down, deleting the variable 0)
cexpr_subst x e e′
substitutes e for x in e′
cexpr_subst_val e v
substitutes v for CVar 0 in e, effectively applying e interpreted as a function to the argument v.
cexpr_comp f g
function composition, i. e. λx. f ( g x )
f ◦c g
alias for cexpr_comp
expr_rf_to_cexpr e
converts a deterministic source language expression
into a target language expression, see Sect. 3.5
integrate_var Γ x e
integrates e over the free variable x
integrate_vars Γ xs e
integrates e over the free variables in the list xs
branch_prob_cexpr (vs, vs′ , Γ, δ)
returns an expression that computes branch_prob
marg_dens_cexpr Γ vs x δ
returns an expression that computes the marg_dens
marg_dens2_cexpr Γ vs x y δ
returns an expression that computes the marg_dens2
dist_dens_cexpr dst e
e′
returns an expression that computes the density of the
built-in distribution dst, parametrised with e and evaluated at e′
29
D. Concrete compiler rules
EDC _ VAL
countable_type (val_type v)
(vs, vs′ , Γ, δ) ⊢c Val v ⇒
ins_var0 (branch_prob_cexpr (vs, vs′ , Γ, δ)) · hCVar 0 = CVal vi
EDC _ VAR
x ∈ set vs
(vs, vs′ , Γ, δ) ⊢c Var x ⇒ marg_dens_cexpr Γ vs x δ
EDC _ PAIR
′
x ∈ set vs
y ∈ set vs
(vs, vs , Γ, δ) ⊢c <x, y> ⇒ marg_dens2_cexpr Γ vs x y δ
EDC _ FAIL
(vs, vs′ , Γ, δ) ⊢c Fail t ⇒ CVal (RealVal 0)
EDC _ LET
([], vs @ vs′ , Γ, 1) ⊢c e ⇒ f
(0 # map Suc vs, map Suc vs′ , type_of Γ e • Γ, ins_var0 δ · f ) ⊢c e′ ⇒ g
(vs, vs′ , Γ, δ) ⊢c LET e IN e′ ⇒ del_var0 g
EDC _ RAND
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
(vs, vs ,RΓ, δ) ⊢c Random dst e ⇒
c ins_var1 f · dist_dens_cexpr dst (CVar 0) (CVar 1)
∂ dist_param_type dst
′
EDC _ RAND _ DET
free_vars e ⊆ set vs′
e det
′
(vs, vs , Γ, δ) ⊢c Random dst e ⇒
ins_var0 (branch_prob_cexpr (vs, vs′ , Γ, δ)) ·
dist_dens_cexpr dst (ins_var0 (expr_rf_to_cexpr e)) (CVar 0)
EDC _ IF
([], vs @ vs′ , Γ, 1) ⊢c b ⇒ f
(vs, vs′ , Γ, δ · hcexpr_subst_val f TRUEi) ⊢c e1 ⇒ f 1
(vs, vs′ , Γ, δ · hcexpr_subst_val f FALSEi) ⊢c e2 ⇒ f 2
(vs, vs′ , Γ, δ) ⊢c IF b THEN e1 ELSE e2 ⇒ f 1 + f 2
EDC _ IF _ DET
b det
(vs, vs′ , Γ, δ · hexpr_rf_to_cexpr b i) ⊢c e1 ⇒ f 1
(vs, vs′ , Γ, δ · h¬ expr_rf_to_cexpr b i) ⊢c e2 ⇒ f 2
(vs, vs′ , Γ, δ) ⊢c IF b THEN e1 ELSE e2 ⇒ f 1 + f 2
EDC _ OP _ DISCR
Γ⊢e : t
op_type oper t = Some t′
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
(vs, vs , Γ, δ) ⊢c oper $ e ⇒ c hoper $c CVar 0 = CVar 1i · ins_var1 f ∂t
′
EDC _ FST
countable_type t′
R
Γ ⊢ e : t × t′
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
R
(vs, vs′ , Γ, δ) ⊢c fst e ⇒ c ins_var1 f ◦c <CVar 1, CVar 0>c ∂t′
30
EDC _ SND
Γ ⊢ e : t × t′
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
(vs, vs , Γ, δ) ⊢c snd e ⇒ c ins_var1 f ◦c <CVar 0, CVar 1>c ∂t
′
EDC _ NEG
EDC _ ADDC
R
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
(vs, vs′ , Γ, δ) ⊢c − e ⇒ f ◦c (−CVar 0)
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
e′ det
free_vars e′ ⊆ set vs′
′
(vs, vs , Γ, δ) ⊢c e + e ⇒ f ◦c (CVar 0 − ins_var0 (expr_rf_to_cexpr e′ ))
′
EDC _ MULTC
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
c 6= 0
(vs, vs , Γ, δ) ⊢c e · Val (RealVal c) ⇒ ( f ◦c (CVar 0 / c))/| c|
′
EDC _ ADD
Γ ⊢<e, e′> : t × t
(vs, vs′ , Γ, δ) ⊢c <e, e′> ⇒ f
R
′
(vs, vs , Γ, δ) ⊢c e + e ⇒ c ins_var1 f ◦c <CVar 0, CVar 1 − CVar 0 > ∂t
′
EDC _ INV
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
(vs, vs′ , Γ, δ) ⊢c e−1 ⇒ ( f ◦c (1/CVar 0)) / (CVar 0)2
EDC _ EXP
(vs, vs′ , Γ, δ) ⊢c e ⇒ f
(vs, vs , Γ, δ) ⊢c exp e ⇒
IF CVar 0 > 0 THEN ( f ◦c ln (CVar 0)) / CVar 0 ELSE 0
′
31
| 6cs.PL
|
Flare: Native Compilation for Heterogeneous Workloads
in Apache Spark
Grégory M. Essertel1 , Ruby Y. Tahboub1 , James M. Decker1 ,
Kevin J. Brown2 , Kunle Olukotun2 , Tiark Rompf1
1
Purdue University, 2 Stanford University
arXiv:1703.08219v1 [cs.DB] 23 Mar 2017
{gesserte,rtahboub,decker31,tiark}@purdue.edu, {kjbrown,kunle}@stanford.edu
ABSTRACT
SQL still performs at least an order of magnitude worse
than best-of-breed relational query engines like HyPer [35].
This is, in part, due to the fact that these relational query
engines not only optimize query plans aggressively on the
relational operator level, but also compile queries into native
code, thus operating closer to the metal than Spark’s current
Java-based techniques.
While one might argue that this is not a fair comparison
due to the added expressiveness of Spark and the different
nature of these systems, we show that it is actually possible
to bring the performance of Spark much closer to such
highly-optimized relational engines without sacrificing this
added expressiveness. We present Flare, a new back-end for
Spark that yields significant speedups by compiling entire
query plans obtained from Spark’s query optimizer to native
code, bypassing inefficient abstraction layers of the Spark
runtime system.
The need for modern data analytics to combine relational,
procedural, and map-reduce-style functional processing is
widely recognized. State-of-the-art systems like Spark have
added SQL front-ends and relational query optimization,
which promise an increase in expressiveness and performance. But how good are these extensions at extracting high
performance from modern hardware platforms?
While Spark has made impressive progress, we show that
for relational workloads, there is still a significant gap compared with best-of-breed query engines. And when stepping
outside of the relational world, query optimization techniques are ineffective if large parts of a computation have
to be treated as user-defined functions (UDFs).
We present Flare: a new back-end for Spark that brings
performance closer to the best SQL engines, without giving
up the added expressiveness of Spark. We demonstrate order
of magnitude speedups both for relational workloads such as
TPC-H, as well as for a range of machine learning kernels
that combine relational and iterative functional processing.
Flare achieves these results through (1) compilation to
native code, (2) replacing parts of the Spark runtime system, and (3) extending the scope of optimization and code
generation to large classes of UDFs.
1.
Heterogeneous Workloads. While Flare’s native code
translation alone already provides excellent performance
for SQL queries and DataFrame operations, performance
still suffers for heterogeneous workloads, e.g., when executing many small queries interleaved with user code, or when
combining relational with iterative functional processing,
as is common in machine learning pipelines. While the extract, transfer, and load part (ETL) of such pipelines can
often be implemented as DataFrames, the compute kernels
often have to be supplied as user-defined functions (UDFs),
which appear as black boxes to the query optimizer, and
thus remain as unoptimized library code.
For such workloads, Flare takes advantage of Delite [13,
14, 44], an existing compiler framework for high-performance
domain-specific languages (DSLs). As an alternative to generating target code in a single step, Flare can map Spark’s
query plans to Delite’s intermediate language, DMLL. This
enables Spark to interface with UDFs written in any of the
existing Delite DSLs, which cover domains such as machine
learning (OptiML [45]), graph processing (OptiGraph [46]),
or mesh-based PDE solvers (OptiMesh [46]). All of these
DSLs are embedded in Scala and provide APIs comparable
to those built on top of Spark. But unlike Scala code that
uses normal Spark APIs, Delite DSL code is amenable to optimization and native code generation, including GPU code
for computational kernels [28, 29]. We show that combining
Spark SQL queries and DataFrames with machine learning
kernels written in OptiML, in particular, results in order of
magnitude speedups compared to a standard Spark implementation.
INTRODUCTION
Modern data analytics applications require a combination of different programming paradigms, spanning relational, procedural, and map-reduce-style functional processing. Shortcomings in both expressiveness and performance
are key reasons why the excitement around early MapReduce tools, heralded as the solution to all big data problems, has tapered off. Instead, state-of-the-art systems like
Spark have added SQL front-ends and APIs which enable
relational query optimization [7].
But how good are these extensions? We demonstrate that
on standard relational benchmarks such as TPC-H, Spark
[Preprint, March 2017. Copyright by the authors.]
1
Front-end
User Programs
Front-end
SQL
OptiQL
(Java, Scala, Python, R) (JDBC, Console)
OptiML
OptiGraph
Spark SQL DataFrame API Export query plan
Delite’s Back-end
Catalyst Optimizer
DMLL
Code
Generation
JNI
Flare’s
Code Generation
Flare’s
Code Generation
LMS Code Generation
Optimized Scala, C
Flare’s Runtime
Spark
native code
Delite’s Runtime
Resilient Distributed Dataset
(a) Spark SQL
(b) Flare Level 1
(c) Flare Level 2
(d) Flare Level 3
Figure 1: Flare system overview: (a) architecture of Spark and Spark SQL, adapted from [7]; (b) Flare Level 1 replaces Spark’s
JVM code generation with native code generation, at the granularity of Spark’s query stages; (c) Flare Level 2 generates code
for entire queries, eliminating the RDD layer, and orchestrating parallel execution optimized for shared memory architectures;
(d) Flare Level 3 translates Spark query plans to Delite, an established framework for high-performance domain-specific
languages, which enables optimization of relational queries together with UDFs implemented in one of the front-end DSLs.
Scale-Up over Scale-Out. With the implementation of
Flare, we revisit some design decisions of Spark SQL rooted
in the legacy of Spark and earlier systems. We show that
alternative implementations, which start from different assumptions, can provide better performance with the same
expressive user-facing API.
One key assumption of MapReduce, Hadoop, and Spark is
that of a Google-scale, distributed, shared-nothing architecture, focusing primarily on scale-out vs scale-up. This makes
it easy to scale computation by adding more machines, but
it also means that each individual machine may not be used
efficiently [31]. An immediate consequence is an increase in
datacenter bills, but on a global scale, the effects of scaleout-first approaches (a.k.a “nobody ever got fired for running
a Hadoop cluster”) and their inefficient use of energy may
be as far-reaching as accelerating global warming.
Today, machines with dozens of cores and memory in
the TB range are readily available, both for rent and for
purchase. At the time of writing, Amazon EC2 instances
offer up to 2 TB main memory, with 64 cores and 128
hardware threads. Built-to-order machines at Dell can be
configured with up to 12 TB, 96 cores and 192 hardware
threads. NVIDIA advertises their latest 8-GPU system as
a “supercomputer in a box,” with compute power equal to
hundreds of conventional servers [36]. With such powerful
machines becoming increasingly commonplace, large clusters
are less and less frequently needed. Many times, “big data” is
not that big, and often computation is the bottleneck [37].
As such, a small cluster or even a single large machine is
sufficient, if it is used to its full potential.
With this scenario as the primary target – heterogeneous workloads and small clusters of powerful machines,
potentially with accelerators such as GPUs – Flare prioritizes bare-metal performance on all levels of scaling, with
the option of bypassing mechanisms such as fault-tolerance
for shared-memory-only execution. Thus, Flare strengthens
Spark’s role as a unified, efficient, big data platform, as opposed to a mere cluster computing fabric.
The overall architecture of Flare, with three possible levels
of integration, is shown in Figure 1. The paper first reviews
the design of Spark and Spark SQL (Section 2) and continues
with our main contributions:
• We present Flare: a new accelerator back-end for
Spark. We identify key impediments to performance
in Spark SQL, particularly related to Spark’s Java execution environment. As an immediate remedy, Flare
Level 1 generates native code instead of Java for improved performance (Section 3).
• We identify further performance issues in Spark SQL,
specifically related to joins in shared-memory environments. Flare Level 2 drastically reduces these overheads by making different starting assumptions than
Spark, focusing on scale-up instead of scale-out, and
reducing constant factors throughout. In particular,
Flare Level 2 compiles whole queries at once, as opposed to individual query stages, which results in an
end-to-end optimized data path (Section 4).
• We extend Flare further to accelerate heterogeneous
workloads, consisting of relational queries combined
with iterative machine learning kernels written as userdefined functions. Flare Level 3 uses the Delite compiler framework to optimize relational queries together
with such UDFs, by means of an intermediate language
(Section 5).
• We evaluate Flare in comparison to Spark both on
TPC-H, reducing the gap to best-of-breed relational
query engines, and on benchmarks involving heterogeneous machine learning workloads. In both settings,
Flare exhibits order-of-magnitude speedups. Our evaluation spans single-core, multi-core, NUMA, cluster,
and GPU targets (Section 6).
2.
BACKGROUND ON SPARK
Apache Spark [51, 52] is today’s most popular and most
widely-used big data framework. The core programming
abstraction is an immutable, implicitly distributed, collection data type called RDD (Resilient Distributed Dataset).
RDDs serve as high-level programming interfaces and also
transparently manage fault-tolerance.
2
Here is a quick example (from [7]) that counts the number
of errors in a (potentially distributed) log file:
== Physical Plan ==
*Filter StartsWith(value#894, ERROR)
+- *Scan text [value#894]
Format: ...TextFileFormat@18edbdbb,
InputPaths: ...,
ReadSchema: struct<value:string>
val lines = spark.sparkContext.textFile("...")
val errors = lines.filter(s => s.startsWith("ERROR"))
println("Total errors: " + errors.count())
Spark’s RDDs provide a deferred API: in the above example, the calls to textFile and filter merely construct a
computation graph. Actual computation only takes place at
the point where errors.count is invoked. Sometimes, RDDs
are described as lazily evaluated. This is somewhat misleading, as a second call to errors.count will re-execute the entire computation.1 However, RDDs support memoization via
explicit calls to errors.persist(), which will mark the data
set to be kept in memory for future operations.
2.1
From the high-level DataFrame operations, Spark SQL
internally computes a query plan, much like a relational
DBMS. Spark SQL optimizes query plans using its relational query optimizer called Catalyst, and may even generate Java code at runtime to accelerate parts of the query
plan using a component named Tungsten (see Section 2.3).
It is hard to overstate the benefits of this kind of API,
which generates a complete program (i.e. query) representation at runtime. First, it enables various kinds of optimizations, including classic relational query optimizations. Second, one can use this API from multiple front-ends, which
exposes Spark to non-JVM languages such as Python and
R, and the API can also serve as a translation target from
literal SQL:
Spark SQL and the DataFrame API
The directed acyclic computation graph represented by
an RDD describes the distributed operations in a coarsegrained way, at the granularity of map, filter, and so on.
This level of detail is enough to enable demand-driven computation, scheduling, and fault-tolerance via selective recomputation along the “lineage” of a result [51], but it does
not provide a full view of the computation applied to each element of a data set. For example, in the code snippet above,
the argument to lines.filter is a normal Scala closure. This
makes it easy to integrate RDD code with arbitrary external
libraries, but it also means that the given closure needs to
be invoked as-is for every element in the data set.
Thus, the performance of RDDs suffers from two limitations: first, limited visibility for analysis and optimizations,
especially standard optimizations like join re-ordering for
relational workloads expressed as RDDs; and second, interpretive overhead, i.e. function calls for each processed tuple.
Recent Spark versions aim to ameliorate both of these issues
with the introduction of the Spark SQL subsystem [7].
2.2
lines.createOrReplaceTempView("lines")
val errors = spark.sql("select * from lines
where value like ’ERROR%’")
println("Total errors: " + errors.count())
Third, one can use the full host language to structure code,
and use small functions that pass DataFrames between them
to build up a logical plan that is then optimized as a whole.
Of course, this is only true as long as one stays in the relational world, and does not use UDFs. As part of our contribution, we will show in Section 5 how the DataFrame model
extends to UDFs in Flare. Flare uses existing generative programming frameworks [42] to make larger classes of expressions available for DataFrame-like multi-stage programming
patterns, where a general piece of program code builds up an
intermediate representation (IR) of a more specific computation at runtime, like DataFrames with query plans. We argue
that such multi-stage APIs, including Spark’s DataFrames,
are the real key to success for unified and efficient big data
platforms, completely independent of RDDs. We will show
in Section 3.1 that the underlying RDD layer can actually be
an impediment to performance in Spark. Flare demonstrates
that Spark’s DataFrame API can successfully be supported
by a generic, high-performance DSL compiler framework.
This removes the confinement to relational query optimizations, and enables optimization of entire data processing
pipelines that combine relational processing with iterative
machine learning kernels that would require unoptimized
UDFs in plain Spark.
The Power of Multi-Stage APIs and DSLs
The core addition of Spark SQL is an alternative API
based on DataFrames.2 A DataFrame is conceptually equivalent to a table in a relational database, i.e., a collection
of rows with named columns. However, like RDDs, the
DataFrame API only records operations, but does not compute the result right away. We can write the same example
as before:
val lines = spark.read.textFile("...")
val errors = lines.filter($"value".startsWith("ERROR"))
println("Total errors: " + errors.count())
This is just like the RDD API, in that the call to errors.count
will trigger execution. Unlike RDDs, however, DataFrames
capture the full computation/query to be executed. We can
obtain the internal representation using
2.3
Catalyst and Tungsten
Spark SQL queries are optimized using the Catalyst optimizer that supports both rule-based and cost-based optimizations [7]. Starting with a logical query plan tree, Catalyst performs optimizations as tree transformations in order
to realize an optimized plan. It is important to note that at
the time of writing, Catalyst does not yet perform any kind
of join reordering. Instead, it simply joins tables in the order
they appear in the where clause. Hence, users need to manually encode a good join in order to avoid big intermediate
tables or other bad surprises.
Tungsten is the execution back-end that aims to improve
Spark performance by reducing the allocation of objects on
the JVM (Java Virtual Machine) heap, controlling off-heap
memory management, employing cache-aware data struc-
errors.explain()
which produces the following output:
1
In its original definition, the term “lazy evaluation” means
that each term is evaluated only when needed, and not more
than once [22].
2
Internally, Spark distinguishes the type Dataset[T], which
provides a typesafe collection API for elements of type T,
from the type DataFrame = Dataset[Row], which provides an
untyped API for rows with arbitrary arity and column
names. For the purpose of this paper, this difference is
immaterial; hence, we use the terms Dataset and DataFrame
interchangeably.
3
val tpchq6 = spark.sql("""
select
sum(l_extendedprice*l_discount) as revenue
from
lineitem
where
l_shipdate >= to_date(’1994-01-01’)
and l_shipdate < to_date(’1995-01-01’)
and l_discount between 0.05 and 0.07
and l_quantity < 24
""")
// data loading elided ...
for (i = 0; i < size; i++) {
double l_quantity = l_quantity_col[i];
double l_extendedprice = l_extendedprice_col[i];
double l_discount = l_discount_col[i];
long l_shipdate = l_shipdate_col[i];
if (l_shipdate >= 19940101L && l_shipdate < 19950101L &&
l_discount >= 0.05 && l_discount <= 0.07 &&
l_quantity < 24.0) {
revenue += l_extendedprice * l_discount;
}
} ...
Figure 2: Query 6 from the TPC-H benchmark in Spark.
Figure 3: Q6 hand-written C code
tures, and generating Java code that is compiled to JVM
bytecode at runtime [26]. These optimizations simultaneously improve the performance of all Spark SQL libraries
and DataFrame operations [52].
Spark SQL
Preload ms
Direct CSV
Preload CSV
118,062
Hand-Written C / Flare
Preload CSV
2,847
3.
Figure 4: Running times for Q6 in Spark, with and without
pre-loading, and compared to hand-written code and Flare.
FLARE: ADDING FUEL TO THE FIRE
We present Flare: a new back-end for Spark SQL that
achieves better performance without changing Spark’s userfacing front-end. Flare efficiently compiles Spark SQL
queries into native code, reduces internal overhead, and
brings performance closer to both hand-written C and the
best-of-breed SQL engines.
Flare can integrate with Spark at three levels, illustrated
in Figure 1. Level 1 enables native compilation within Tungsten, at the same level of granularity. Level 2 goes further
by compiling whole queries instead of only query stages, effectively bypassing Spark’s RDD layer and runtime for operations like hash joins in shared-memory environments. Finally, Level 3 goes beyond purely relational workloads by
adding another intermediate layer between query plans and
generated code. Flare Level 3 employs the Delite compiler
framework [28] to efficiently compile query pipelines with
heterogeneous workloads consisting of user-defined code in
multiple DSLs (e.g., SQL and ML). We will motivate and
describe each of these three levels in the following sections.
3.1
Query ms
24,400
1,418
45
As our benchmark, we pick the simplest query from the
industry-standard TPC-H benchmark: Query 6 (shown in
Figure 2). We define the schema of table lineitem, provide
the source file, and finally register it as a temporary table
for Spark SQL (steps not shown). For our experiments, we
use scale factor 2 (SF2) of the TPC-H data set, which means
that table lineitem is stored in a CSV file of about 1.4 GB.
Following the setup by McSherry et al., we run our tests on
a fairly standard laptop.3 We run our query, Q6, straight
from the CSV file as input, and record the running time:
scala> val q = spark.sql(tpchq6)
q: org.apache.spark.sql.DataFrame = [revenue: double]
scala> time(q.show)
Completed in 24,400 ms
Clearly, this result of 24 seconds is not the best we can do
(see Figure 4). We could convert our data to the columnar
Apache Parquet format [6] for increased performance, or
we can just preload the data so that subsequent runs are
purely in-memory. Since we are mainly interested in the
computational part, we opt to preload. We note in passing
that preloading is quite slow (almost 2 min), which may be
due to a variety of factors. Now we can execute our query
in-memory, and we get a much better result. Running the
query a few more times yields further speedups, but timings
stagnate at around 1s. The key question now is: how good
is this result?
How Fast is Spark?
Spark performance studies primarily focus on the scaleout performance, e.g., running big data benchmarks [51]
on high-end clusters, performing Terabyte sorting [52], etc.
However, as McSherry, Isard, and Murray have eloquently
argued in their 2015 HotOS paper [31] and accompanying
blog post [30], big data systems such as Spark tend to
scale well, but often just because there is a lot of internal
overhead. In particular, McSherry et al. demonstrate that
a straightforward native implementation of the PageRank
algorithm [38] running on a single laptop can outperform a
Spark cluster with 128 cores, using the then-current version.
Hand-Written C. Since Query 6 is very simple, it is perfectly feasible to write a program in C that performs exactly
the same computation: map the input file into memory using the mmap system call, load the data into an in-memory
columnar representation, and then execute the main query
loop, shown in Figure 3. If we compile this C program with
gcc -O3 Q6.c and run it, it will take 2.8s in total (including
data loading), and just 45ms for the actual query computation. So compared to Spark 2.0, the C program runs 20×
faster!
Is there any good reason why the C code needs to be faster
than Spark? We believe not, and in fact, running the same
Laptop vs Cluster. Inspired by this setup, we are interested
in gauging the inherent overheads of Spark and Spark SQL
in absolute terms.
“You can have a second computer once you’ve
shown you know how to use the first one.”
– Paul Barham, via [31]
We focus on a simple relational query, which will profit
from query optimization and code generation, and should
thus be a best-case scenario for Spark. We launch a Spark
shell configured to use a single worker thread:
3
MacBook Pro Retina 2012, 2.6 GHz Intel Core i7, 16 GB
1600 MHz DDR3, 500 GB SSD, Spark 2.0, Java HotSpot
VM 1.8.0_112-b16
./bin/spark-shell --master local[1]
4
java.lang.Double.isNaN(double) (148 samples, 14.52%)
2/7/17 7:28 PM
2.0.0
(/)
Jobs (/jobs/)
Stages (/stages/)
Storage (/storage/)
Details
for
Query
10
Submitted
Time:
2017/02/22 01:25:19
Duration:
5 s
Succeeded
Jobs:
13 (/jobs/job?id=13) 14 (/jobs/job?id=14)
Reset Zoom
java.lang.Double.isNaN..
java.n.. ja..
org.apache.spark.sql.c..
org.apache.spark.sql.catalyst.expressions.codegen.UnsafeRowWri..
org.apache.spark.sql.execution.colum..
org.apache.spark.sql.executio..
org.apache.spark.sql.execution.columnar.MutableUnsafeRow.setIn..
org.apache.spark.sql.execution.columnar.DOUBLE$.extract(ByteBuffer,..
org.apache.spark.sql.execution.columnar.compression.IntDelta$D..
org.apache.spark.sql.execution.columnar.compression.PassThrough$Dec..
org.apache.spark.sql.execution.columnar.compression.CompressibleColumnAccessor$class.extractSingle(NativeColumnAccessor,MutableRow,..
org.apache.spark.sql.execution.columnar.NativeColumnAccessor.extractSingle(MutableRow,int)
org.apache.spark.sql.execution.columnar.BasicColumnAccessor.extractTo(MutableRow,int)
org.apache.spark.sql.execution.columnar.NativeColumnAccessor.org$apache$spark$sql$execution$columnar$NullableColumnAccessor$$super$..
org.apache.spark.sql.execution.columnar.NullableColumnAccessor$class.extractTo(NullableColumnAccessor,MutableRow,int)
org.apache.spark.sql.execution.columnar.NativeColumnAccessor.extractTo(MutableRow,int)
org.apache.spark.sql.catalyst.expressions.GeneratedClass$SpecificColumnarIterator.next()
org.apache.spark.sql.catalyst.expressions.GeneratedClass$SpecificColumnarIterator.next()
org.apache.spark.sql.catalyst.expressions.GeneratedClass$GeneratedIterator.agg_doAggregateWithoutKey$(GeneratedClass$GeneratedIterator)
org.apache.spark.sql.catalyst.expressions.GeneratedClass$GeneratedIterator.processNext()
org.apache.spark.sql.execution.BufferedRowIterator.hasNext()
org.apache.spark.sql.execution.WholeStageCodegenExec$$anonfun$8$$anon$1.hasNext()
InMemoryTableScan
Spark
Sort-merge join
14,937 ms
Broadcast-hash join
4,775 ms
of which in exchange 2,232 ms
Flare
In-memory hash join
136 ms
number of output rows: 3000000
WholeStageCodegen
1.2 s (110 ms, 405 ms, 654 ms)
InMemoryTableScan
Filter
number of output rows: 11997996
number of output rows: 3000000
WholeStageCodegen
381 ms (10 ms, 32 ms, 43 ms)
BroadcastExchange
Filter
number of output rows: 11997996
data size (bytes): 48000000
time to collect (ms): 2885
time to build (ms): 1587
time to broadcast (ms): 239
BroadcastHashJoin
number of output rows: 11997996
Project
Figure 6: Join lineitem ./ orders: cost
of different operators (left); Spark’s hash
join plan (right) shows three separate code
generation regions, which communicate
through Spark’s runtime system.
Figure 5: CPU profile of TPC-H Q6 in Spark SQL, after
pre-loading the lineitem table. 80% of time (the large hump
middle to right) is spent accessing and decoding the inmemory data representation.
HashAggregate
number of output rows: 12
aggregate time total (min, med, max):
352 ms (10 ms, 30 ms, 35 ms)
Exchange
data size total (min, med, max):
180.0 B (15.0 B, 15.0 B, 15.0 B)
WholeStageCodegen
0 ms (0 ms, 0 ms, 0 ms)
HashAggregate
number of output rows: 1
aggregate time total (min, med, max):
0 ms (0 ms, 0 ms, 0 ms)
CollectLimit
Details
emitted in the generated code. LMS can be compared to
other systems like LLVM [27], but operates on a higher level
of abstraction. In the context of query compilation, LMS has
been used as part of the LegoBase engine [23].
query, Q6, accelerated with Flare yields exactly the same
performance as the hand-written C code. The same holds
for other best-of-breed, main-memory RDBMSs like HyPer
[35], which takes 46.58ms on a comparable machine.
Identifying the Bottlenecks. To understand these perfor-
4.
mance gains, we need to investigate where Spark SQL spends
its time. There are two reasons for the performance difference, both of which are particularly visible in the case of Q6,
which has low computational content and uses only trivial
query operators. First, we observe that Spark’s Tungsten
layer generates Java code for this query. In fact, two pieces
of code are generated: one piece for the main query loop, the
other an iterator to traverse the in-memory data structure.
When looking at the CPU profile (Figure 5), we can see
that 80% of the execution time is spent in accessing and decoding the in-memory data representation, and going back
and forth between the two pieces of generated code through
code paths that are part of the pre-compiled Spark runtime.
Second, even if we remove this indirection and replace it
with a unified piece of Java code, the performance remains
about 30% lower than C, a difference that gets more pronounced for other queries where tight low-level control over
data structures and memory management is required.
While Flare Level 1 can already provide significant
speedups for a number of queries, it is also constrained by
the architecture of the Spark runtime. Flare Level 2 takes
more liberties and revisits key design assumptions of Spark
SQL. Spark SQL operates on the legacy of Spark where
workloads are assumed to be Google-scale big, and the only
reasonable way of processing these humongous amounts of
data is to scale-out on a large number of distributed, unreliable, shared-nothing machines. Furthermore, Spark SQL
inherits Spark’s RDD abstraction which encodes lineage to
support fault tolerance, which is a necessity in distributed
environments of 100s or 1000s of machines. However, many
realistic workloads are not Google-scale, and, in fact, can
be scaled-up on modern big-memory hardware, where faults
are statistically highly improbable and fault tolerance can
often be supported in hardware, e.g., through RAID arrays,
redundant power supplies, or similar facilities. Accelerating
Spark SQL’s performance all the way to the level of bestof-breed modern query engines such as HyPer [35] requires
a fully compiled back-end that removes the remaining inefficiencies of legacy Spark.
file:///Users/me/Desktop/tryout/javaFlameGraph/FlameGraph/test.html
3.2
Page 1 of 1
Flare Level 1 Architecture
Flare Level 1 (Figure 1b) adds native compilation within
Tungsten. At startup, Flare installs a number of rules into
the Catalyst optimization logic. After a query is optimized
by Catalyst, these rules will trigger Tungsten to invoke Flare
to generate C code for supported operators or combinations
of operators. Flare then invokes a C compiler, loads the generated native code into the running JVM through the Java
Native Interface (JNI), and Spark’s runtime will then execute the generated code as part of the query evaluation.
Flare Level 1 does not modify any of Spark’s other internals, e.g., memory management, data format, RDD layer,
etc. Hence, Flare Level 1 can serve as a lightweight accelerator that increases performance for certain queries, but
not necessarily all, and that does not interfere with Sparks
execution model, i.e., transparently supports the standard
cluster execution and faul tolerance behavior. Like Tungsten itself, Flare’s query compiler implements Neumann’s
[35] data-centric model, which fuses pipelines of operators
that do not need to materialize intermediate results. Code
generation in Flare is realized using Lightweight Modular
Staging (LMS) [42], a generative programming and compiler
framework that uses the Scala type system to distinguish
normal code from expressions that generate code. In LMS,
a special type constructor Rep[T] is used to denote a staged
expression, which will cause an expression of type T to be
FLARE LEVEL 2
More Bottlenecks. For complex queries, concerns about
granularity of code generation and interfacing with the runtime system become more pronounced than in our previous
example, TPC-H Query 6. In fact, queries with joins exhibit some unfortunate consequences for main-memory execution due to Spark’s design as primarily a cluster computing framework. Figure 6 shows timings for a simple join
query that joins the lineitem and orders tables of the TPCH benchmark. Spark’s query optimizer picks an expensive
sort-merge join by default, which may be the right choice
for distributed or out-of-core execution, but is suboptimal
for main-memory. With the right flags, it is possible to tune
Spark’s Catalyst query planner to prefer a hash join instead,
which is more efficient. But even the hash join operator follows a broadcast model, with high overhead for the internal exchange operator (2.2s of 4.7s), which is present in the
physical plan even when running on a single core. Looking
at Spark’s query plan for this hash join query reveals that
Tungsten has split the query into three code generation regions (dark blue areas, right side in Figure 6), which need to
communicate through Spark’s runtime system. It is therefore no surprise that Flare can achieve much faster query
execution by generating tight code for the entire query.
5
Environment (/environment/)
Executors (/executors/)
SQL (/SQ
1
2
3
4
val tol = 0.001
val k = 4
def findNearestCluster(x_i: Rep[DenseVector[Double]],
mu: Rep[DenseMatrix[Double]]): Rep[Int] = {
(mu mapRowsToVector {
row => dist(x_i, row, SQUARE) }).minIndex}
5 /* Relational ETL */
6 val data = spark.read.csv[Data]("input")
7 val q = data.select(...)
8 val mat = flare(q).toMatrix
9 /* ML DSL with user code (k-Means training loop) */
10 val x = DenseTrainingSet(mat, DenseVector[Double]())
11 val m = x.numSamples
12 val n = x.numFeatures
13 val mu = (0::k, *) { i => x(randomInt(m)) }
14 val newMu = untilconverged_withdiff(mu, tol){ (mu, iter) =>
15
val c = (0::m) { e => findNearestCluster(x(e), mu) }
16
val allWP = (0::m).groupByReduce(...)
17
...
18 }((x, y) => dist(x, y, SQUARE))
19 /* Relational and ML DSLs */
20 val r = spark.sql("""select ... from data
where class = findNearestCluster(...)
group by class""")
21 flare(r).show
Memory
Columnar data
C
O
R
E
0
C
O
R
E
1
C
O
R
E
2
C
O
R
E
3
C
O
R
E
4
C
O
R
E
5
C
O
R
E
6
C
O
R
E
7
C
O
R
E
8
C C C
O O O
R R R
E E E
9 10 11
C
O
R
E
12
C C C
O OO
R R R
E E E
13 1415
Figure 7: Thread pinning to specific cores in NUMA.
4.1
Flare Level 2 Architecture
The architecture of Flare Level 2 is illustrated in Figure
1c. Spark SQL’s front-end, DataFrame API, and Catalyst
optimizer remain the same. The optimized query plan is
exported wholesale from Catalyst to Flare. Flare’s compiler
iterates recursively over each operator node in the query
plan tree and maps it to Flare’s internal optimized data
structures and query execution logic, represented in LMS.
After that, LMS performs some light optimizations like
common subexpression and dead code elimination, generates
C, invokes a C compiler, and Flare launches the resulting
binary either inside the JVM, like in Level 1, or as a separate
process. This cuts out the rest of Spark and relies solely on
Flare’s runtime to trigger execution of the generated code.
In contrast to Flare Level 1, which operates transparently to
the user, Flare Level 2 exposes a dedicated API to let users
pick which DataFrames to evaluate through Flare:
Figure 8: k-means clustering in Flare, combining SQL, Spark
DataFrames, and OptiML
4.3
val df = spark.sql("...") // create DataFrame (SQL or direct)
val fd = flare(df)
// turn it into a FlareDataFrame
fd.show()
// execute query plan with Flare
Flare Level 2 does not currently support cluster execution,
but it would be possible to extend the Spark runtime with a
set of hooks that would delegate to Flare within a single
machine, and coordinate multiple cluster nodes and the
necessary data exchanges through the existing Spark fabric.
Such a setup would be similar to HadoopDB [3], which
combines MapReduce processing between cluster nodes with
fast DBMS instances on each node that are able to handle
the per-node computation more efficiently than Hadoop.
4.2
Parallel and NUMA Execution
Query engines realize parallelism either explicitly by implementing special split and merge operators, or internally
by modifying the operator’s internal logic to orchestrate
parallel execution. Flare Level 2 uses the latter, and realizes parallelism using OpenMP [1]. On the architectural
level, Flare’s operators’ implementations take care of splitting their work internally across multiple threads, accumulating final results, etc. For instance, the parallel scan operator starts a parallel section in its produce method, which sets
the number of threads, and invokes consume on the downstream operators in parallel. Join and aggregate operators,
in turn, which implement materialization points, implement
their consume method in such a way that parallel invocations are possible without conflict, either through per-thread
data structures that are merged after the parallel section or
through lock-free data structures.
Flare also contains specific optimizations for environments
with non-uniform memory access (NUMA), including pinning threads to specific cores and optimizing the memory
layout of various data structures to reduce the need for
accessing non-local memory. For instance, memory-bound
workloads (e.g., TPC-H Q6) perform small amounts of computation, and do not scale-up given a large number of
threads on a single CPU socket. Flare’s code generation
supports such workloads through various data partitioning
strategies, in order to maximize local processing and to reduce the need for threads to access non-local memory as
illustrated in Figure 7 and Section 6.1.
Optimizing Data Loading
Data loading is an often overlooked factor data processing,
and is seldom reported in benchmarks. However, we recognize that data loading from CSV can often be the dominant
performance factor for Spark SQL queries. The Apache Parquet [6] format is an attractive alternative, modeled after
Dremel [32]. As a binary columnar format, it offers opportunities for compression, and queries can load only required
columns instead of all data.
In keeping with our running theme, can we do better?
While Parquet allows for irrelevant data to be ignored almost entirely, Spark’s code to read Parquet files is very
generic, resulting in undue overhead. This generality is primarily due to supporting multiple compression and encoding techniques, but there also exists overhead in determining
which column iterators are needed. While these sources of
overhead seem somewhat unavoidable, in reality they can
be resolved by generating specialized code. In Flare, we implement compiled CSV and Parquet readers that generate
native code specialized to a given schema. As a result, Flare
Level 2 can compile data paths end-to-end.
5.
FLARE LEVEL 3
Many data analytics applications require a combination
of different programming paradigms, i.e., relational, procedural, and map-reduce-style functional processing. For
example, a machine learning (ML) application might use
relational APIs for ETL, and dedicated ML libraries for
computations. Spark provides specialized libraries, e.g., ML
6
pipelines, and supports user-defined functions to support
domain-specific applications. Unfortunately, Spark’s performance falls off a proverbial cliff once DataFrame operations
are interleaved with user code. Currently, Spark SQL optimization and code generation treats user code as a black
box. Hence, Flare Level 3 focuses on generating efficient code
for heterogeneous workloads.
5.1
where each data point is assigned to the partition with the
nearest mean [10]. The k-means application mixes multiple
DSLs, i.e., SQL and OptiML [45], with user code. In lines
6-8, Spark SQL reads data from a file and preprocesses input. Lines 5-16 show the k-means processing code using OptiML. Delite provides optimized data types (e.g., Vectors)
and expressive libraries to assist ML computations. For instance, mapRowsToVector, dist, and untilconverged_withdiff
are ML-specific optimized methods. The final result can be
post-processed using SQL as illustrated in lines 20-21.
User Defined Functions (UDF)
Spark SQL uses Scala functions which appear as a black
box to the optimizer. As mentioned in Section 3, Flare’s internal code generation logic is based on a technique called
Lightweight Modular Staging (LMS) [42], which uses a special type constructor Rep[T] to denote staged expressions
of type T, that should become part of the generated code.
Extending UDF support to Flare is achieved by injecting
Rep[A] => Rep[B] functions into DataFrames in the same
way as normal A => B functions in plain Spark. As an example, here is a UDF sqr that squares a given number:
6.
// define and register UDF
def sqr(fc: FlareUDFContext) = { import fc._;
(y: Rep[Int]) => y * y }
flare.udf.register("sqr", sqr)
// use UDF in query
val df = spark.sql("select ps_availqty from partsupp where
sqr(ps_availqty) > 100")
flare(df).show()
6.1
Bare-Metal Relational Query Execution
The first set of experiments focuses on a standard relational workload, and demonstrates that the inherent overheads of Spark SQL cause a slowdown of at least 10× compared to the best available query engines for in-memory execution on a single core. Our experiments show that Flare
Level 2 is able to bridge this gap, accelerating Spark SQL
to the same level of performance as state-of-the-art query
compiler systems, while retaining the flexibility of Spark’s
DataFrame API. We also compare parallel speedups, the
effect of NUMA-aware optimization, and evaluate the performance benefits of optimized data loading.
Environment. We conducted our experiments on a single
NUMA machine with 4 sockets, 12 Xeon E5-4657L cores
per socket, and 256GB RAM per socket (1 TB total). The
operating system is Ubuntu 14.04.1 LTS. We use Spark
2.0, Scala 2.11, Postgres 9.4, HyPer v0.5-222-g04766a1, and
GCC 6.3 with optimization flags -O3.
Dataset. We use the standard TPC-H [47] benchmark
with scale factor SF10 for sequential execution, and SF20
and SF100 for parallel execution.
Notice that the definition of sqr uses an additional argument
of type FlareUDFContext, from which we import overloaded
operators such as +, -, *, etc., to work on Rep[Int] and other
Rep[T] types. The staged function will become part of the
code as well, and will be optimized along with the relational
operations. This provides benefits for UDFs (general purpose code embedded in queries) and enables queries to be
be optimized with respect to their surrounding code (e.g.,
queries run within a loop).
5.2
EXPERIMENTAL EVALUATION
To assess the performance and acceleration potential of
Flare in comparison to Spark, we present two sets of experiments. The first set focuses on a standard relational benchmark; the second set evaluates heterogeneous workloads,
consisting of relational processing combined with machine
learning kernels as UDFs. Our experiments span single-core,
multi-core, NUMA, cluster, and GPU targets.
Heterogeneous Workloads and DSLs
Flare Level 3 (Figure 1d) goes even further and leverages
an existing compiler framework called Delite [14], which is
built on top of LMS, to efficiently compile applications that
mix multiple DSLs or “query languages.” Delite has a particular focus on parallel and distributed applications, as well as
heterogeneous hardware such as GPUs [28]. Delite’s frontend provides several Scala DSLs, covering various domains,
e.g., databases, machine learning, linear algebra, etc. Since
these DSLs are embedded in Scala, they provide user-facing
APIs similar to libraries built on top of Spark.
On the front-end, Flare Level 3 exports a Spark SQL optimized query plan and maps it to Delite’s OptiQL (similar to
the process explained in Section 4). The core of Delite is built
around a first-order functional intermediate language called
Distributed Multi-Loop Language (DMLL) that models parallel patterns. As the name suggests, DMLL represents parallel patterns as a highly flexible loop abstraction that fuses
multiple loops to maximize pipeline and horizontal fusion
[13]. Furthermore, DMLL provides implicitly parallel and
nested collection operations, e.g., Collect, Group by-Reduce,
as well as optimizations like loop fusion, loop nesting optimizations, and so on. Finally, DMLL performs analysis and
optimizations for multiple hardware targets (e.g. NUMA,
clusters, GPU, etc.).
Figure 8 shows code highlights from the popular k-means
application, which partitions n data points into k clusters
Single-Core Running Time. In this experiment, we compare the single-core, absolute running time of Flare Level 2
with Postgres, HyPer, and Spark using the TPC-H benchmark with scale factor SF10. In the case of Spark, we use a
single executor thread, though the JVM may spawn auxiliary threads to handle GC or the just-in-time compilation.
Postgres and HyPer implement cost-based optimizers that
can avoid inefficient query plans, in particular by reordering
joins. While Spark’s Catalyst optimizer [7] is also cost-based,
it does not perform any kind of join re-ordering. Hence, we
match the join ordering of the query plan in Spark SQL and
Flare with HyPer’s, with a small number of exceptions: in
Spark SQL, the original join ordering given in the TPC-H
reference outperformed the HyPer plans for Q5, Q9, Q10,
and Q11 in Spark SQL, and for Q10 in Flare. For these
queries, we kept the original join ordering as is. For Spark
SQL, this difference is mainly due to Catalyst picking sortmerge joins over hash joins. It is worth pointing out that
HyPer and Postgres plans can use indexes on primary keys,
which may give an additional advantage.
Figure 9 gives the absolute execution time of Postgres,
HyPer, Spark SQL, and Flare for all TPC-H queries. For all
7
PostgreSQL
Running Time (ms)
1x106
Spark
HyPer
Flare
100000
10000
1000
100
10
1
Q1
SF10
Postgres
Spark SQL
HyPer
Flare
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Q9
Q10
Q11
Q12
Q13
Q14
Q15
Q16
Q17
Q18
Q19
Q20
Q21
Q22
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Q9
Q10 Q11
Q12
Q13
Q14
Q15
Q16
Q17
Q18
Q19
Q20
Q21
Q22
241404 6649 33721 7936 30043 23358 32501 29759 64224 33145 7093 37880 31242 22058 23133 13232 155449 90949 29452 65541 299178 11703
18219 23741 47816 22630 51731 3383 31770 63823 88861 42216 3857 17233 28489 7403 14542 23371 70944 53932 13085 31226 128910 10030
603
59 1126
842
941
232
943
616 1984
967 131
501 3625
330
253 1399
563 3703 1980
434
1626
180
530
139
532
521
748
198
830 1525 3124 1436
56
656 3727
278
302
620
2343
823
909
870
1962
177
Figure 9: Performance comparison of Postgres, HyPer, Spark SQL, Flare Level 2 in SF10
systems, data loading time is excluded, i.e., only execution
time is reported. In Spark and Flare, we use persist to
ensure that the data is loaded from memory. At first glance,
the performance of Flare and HyPer lie within the same
range, and notably outperform Postgres and Spark in all
queries. Similarly, Spark’s performance is comparable to
Postgres’s in most of the queries. Unlike the other systems,
Postgres does not compile queries at runtime, and relies on
the Volcano model [20] for query evaluation, which incurs
significant overhead. Hence, we can see that Spark’s query
compilation does not provide a significant advantage over a
standard interpreted query engines on most queries.
At a closer look, Flare outperforms Spark SQL in aggregate queries Q1 and Q6 by 34× and 17× respectively. We
observe that Spark is an order of magnitude slower than
Flare in nested queries like those found in Q2. After examining the execution plans of Q2, we found that Catalyst’s plan does not detect all patterns that help with avoiding re-computations, e.g., a table which has been previously
scanned or sorted. In join queries, e.g., Q5, Q10, Q14, etc.,
Flare is faster than Spark SQL by 20×-60×. Likewise, in join
variants outer join Q13, semi-join Q21, and anti-join Q22,
Flare is faster by 8×, 89× and 57× respectively.
The single-core performance gap between Spark SQL and
Flare is attributed to the bottlenecks identified in Sections 3
and 4. First, overhead associated with low-level data access
on the JVM. Second, Spark SQL’s distributed-first strategy that employs costly distributed operators, e.g., sortmerge join and broadcast hash join, even when running on
a single core. Third, internal bottlenecks in in-memory processing, the overhead of RDD operations, and communication through Spark’s runtime system. By compiling entire
queries, instead of isolated query stages, Flare effectively
avoids these bottlenecks.
HyPer [35] is a state-of-the-art compiled relational query
engine. A precursory look shows that Flare is faster than
HyPer by 10%-70% in Q1, Q4-Q6, Q7, and Q14. Moreover,
Flare is faster by 2×-4.5× in Q3, Q11, Q16, Q18, and Q19.
On the other hand, HyPer is faster than Flare by 20%-60%
in Q9, Q10, Q12, Q15, and Q21. Moreover, HyPer is faster
by 2×-4.1× in Q2, Q8, Q17, and Q20. This performance gap
is, in part, attributed to (1) HyPer’s use of specialized operators like GroupJoin [2], and (2) employing indexes on primary keys as seen in Q2, Q8, etc., whereas Flare (and Spark
SQL) currently does not support indexes. In order to understand the performance gained by using indexes, we disabled
indexing in HyPer and re-ran the benchmarks (detailed re-
sults omitted). We observed that Flare outperformed HyPer
by 80% in Q13 and matched the performance of Q12 and
Q21. For Q2, Q8-Q10, and Q17, where HyPer outperformed
Flare, the performance gap was shrunk by 20% to 1.2×. Finally, in Q4, Q7, Q11, and Q18 where Flare outperformed
HyPer, the performance gap had increased by 10% to 1.2×.
In summary, while both Flare and HyPer generate native query code at runtime, subtle implementation differences in query evaluation and code generation can result in
faster code. For instance. HyPer uses proper decimal precision numbers, whereas Flare follows Spark in using double
precision floating point values. which are native to the architecture. Furthermore, HyPer generates LLVM code, whereas
Flare generates C code which is then compiled with GCC.
Compilation Time. We compared the compilation time for
each TPCH-H query on Spark and Flare (detailed results
not shown). For Spark, we measured the time to generate
the physical plan, which includes Java code generation and
compilation. We do not quantify JVM-internal JIT compilation, as this is hard to measure, and code may be recompiled
multiple times. For Flare, we measured C code generation
and compilation with GCC. Both systems spend a similar
amount of time on code generation and compilation, on average 20% more in Flare. Compilation time depends on the
complexity of the query but is less than 1.5s for all queries,
i.e., well in line with interactive, exploratory, usage.
Parallel Scaling. In this experiment, we compare the scalability of Spark SQL and Flare Level 2. The experiment
focuses on the absolute performance and the Configuration
that Outperforms a Single Thread (COST) metric proposed
by McSherry et al. [31]. We pick four queries that represent
aggregate and join variants.
Figure 11 presents speedup numbers for Q6, Q13, Q14,
and Q22 when scaled up to 32 cores. At first glance, Spark
appears to have good speedups in Q6 and Q13 whereas
Flare’s Q6 speedup drops for high core counts. However,
examining the absolute running times, Flare is faster than
Spark SQL by 9×. Furthermore, it takes Spark SQL estimated 12 cores in Q6 to match the performance of Flare’s
single core. In scaling-up Q13, Flare is consistently faster
by 8× on all cores. Similarly, Flare continues to outperform
Spark by a steady 25× in Q14 and by 20×-80× in Q22 as
the number of cores reaches 32. Notice the COST metric in
the last two queries is infinity, i.e., there is no Spark configuration that matches Flare’s single-core performance.
8
Spark CSV
Speedup
1000
Spark Parquet
Flare CSV
Flare Parquet
100
10
1
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Q9
Q10
Q11
Q12
Q13
Q14
Q15
Q16
Q17
Q18
Q19
Q20
Q21
Figure 10: Speedup for TPC-H SF1 when streaming data from SSD on a single thread.
#Tuples Postgres HyPer
CSV
CSV
Spark
Spark Flare
Flare
CSV Parquet
CSV Parquet
CUSTOMER
1500000
11664
LINEITEM
NATION
59986052
25
ORDERS
PART
15000000
2000000
7067
1102
377765 49408 471207
1
8
106
60214 33195
8807 1393
85985
11154
329
266
257898 11167
110
< 1
9730
10668
< 1
54124
7601
2028
351
16
8000000
37408
5265
28748
17731
1164
1010
REGION
SUPPLIER
5
100000
1
478
8
66
102
616
90
522
< 1
28
< 1
16
14
Spark
20
Q6 aggregate
Q13 outer-join
Q14 join
Q22 semi/anti-join
18
1786
340
PARTSUPP
Flare
20
Speedup
Table
18
16
14
12
12
10
10
8
8
6
6
4
4
2
2
1
2
4
8
16
32
1
2
4
8
Q6
7000
Spark SQL
Flare Level 2
6000
Running Time (ms)
Table 1: Loading time in ms for TPC-H SF10 in Postgres,
HyPer, and SparkSQL.
The seemingly good scaling for Spark reveals that the
runtime incurs significant overhead. In particular, we would
expect Q6 to become memory-bound as we increase the level
of parallelism. In Flare we can directly observe this effect as
a sharp drop from 16 to 32 cores. Since our machine has 18
cores per socket, for 32 cores, we start accessing non-local
memory (NUMA). The reason Spark scales better is because
the internal overhead, which does not contribute anything
to query evaluation, is trivially parallelizable and hides the
memory bandwidth effects. In summary, Flare scales as
expected for both of memory and CPU-bound workloads,
and reflects the hardware characteristics of the workload,
which means that query execution takes good advantage of
the available resources – with the exception of multiple CPU
sockets, a problem we address next.
As a next step, we evaluate NUMA optimizations in Flare
and show that these enable us to scale queries like Q6 to
higher core numbers. In particular, we pin threads to individual cores and lay out memory such that most accesses
are to the local memory region attached to each socket (Figure 12). Q6 performs better when the threads are dispatched
on different sockets. This is due to the computation being
bounded by the memory bandwidth. As such, when dividing
the threads on multiple sockets, we multiply the available
bandwidth proportionally. However, as Q1 is more computation bound, dispatching the threads on different sockets
has little effect. For both Q1 and Q6, we see scaling up to
the capacity of the machine (in our tests, up to 72 cores).
This is seen in a maximum speedup of 46× and 58× for Q1
and Q6, respectively.
32
60000
50000
5000
40000
4000
30000
3000
20000
2000
10000
1000
0
1
2
4
8
16
0
32
1
2
4
Q14
Running Time (ms)
16
Q13
8
16
32
8
16
32
Q22
14000
16000
12000
14000
12000
10000
10000
8000
8000
6000
6000
4000
4000
2000
0
2000
1
2
4
8
16
0
32
1
2
4
# Cores
# Cores
Figure 11: Scaling-up Flare and Spark SQL in SF20, without
NUMA optimizations: Spark has good nominal speedups
(top), but Flare has better absolute running time in all
configurations (bottom). For both systems, NUMA effects
for 32 cores are clearly visible.
Q1
Running Time (ms)
5500
Q6
3700
1
5400
3600
5300
600
500
400
300
200
100
0
3500
300
one socket
two sockets
four sockets
1
14
12 12 12
200
23 24
46
1
18
36
# Cores
72
22 23
29
100
0
44
1
18
36
# Cores
58
72
Figure 12: Scaling-up Flare for SF100 with NUMA optimizations on different configurations: threads pinned to one,
two, or four sockets. The speedups relative to a single thread
are shown on top of the bars.
faster in only one case: reading nation, a table with only 25
rows. In all other cases, Spark’s Parquet reader was 1.33×1.81× faster. However, Flare’s highly optimized CSV reader
operates at a closer level of performance to the Parquet
reader, with all tables except supplier having a benefit of
less than a 1.25× speedup by using Parquet.
Performing queries. Figure 10 shows speedups gained
from executing queries without preloading data for both systems. Whereas reading an entire table gives Spark and Flare
marginal speedups, reading just the required data gives
speedups in the range of 1.22×-22.96× for Spark (excluding Q2 and Q16, which performed 9% and 41% slower, re-
Optimized Data Loading. An often overlooked part of
data processing is data loading. Flare contains an optimized
implementation for both CSV files and the columnar Apache
Parquet format.4 We show loading times for each of the
TPC-H tables in Table 1.
Full table read. From the data in Table 1, we see that in
both Spark and Flare, the Parquet file readers outperform
the CSV file readers in most scenarios, despite this being
a worst-case scenario for Parquet. Spark’s CSV reader was
4
All Parquet files tested were uncompressed and encoded
using Parquet’s PLAIN encoding.
9
LogReg
50
6.2
Speedup
45
45
40
40
35
30
30
25
25
20
20
15
15
10
10
5
5
1
12
Speedup
24
48
1
Gene
50
12
45
40
40
35
35
30
30
25
25
20
20
15
15
24
48
24
48
GDA
50
45
10
10
5
5
1
12
# Cores
24
48
1
12
# Cores
Figure 13: Level 3: Machine learning kernels, scaling on
shared memory NUMA with thread pinning and data partitioning
Heterogeneous Workloads and UDFs
LogReg
Speedup over Spark
We now turn our attention to heterogeneous workloads
that combine relational processing with iterative functional
computation. We study a range of machine learning kernels,
where the input data is loaded via DataFrames. The kernel
computation is expressed as a UDF written in the OptiML
DSL, which is used as part of a SQL query.
k-means
GPU Cluster
8
8
7
7
6
6
5
5
5
4
4
4
3
3
3
2
2
2
1
1
0
Shared-Memory NUMA. In a recent study, Brown et
3.4 GB
17 GB
0
Spark
Delite-CPU
Delite-GPU
8
7
6
1
1.7 GB
17 GB
0
k-means
LogReg
Figure 14: Level 3: Machine learning kernels running on a
20 node Amazon cluster (left, center) and on a 4 node GPU
cluster connected within a single rack.
al. [13] compared Spark with Delite with regards to NUMA
scalability on a single shared-memory machine with 4 CPU
sockets and a total of 48 cores. Specifically, Gaussian Discriminant Analysis (GDA), logistic regression (LogReg), kmeans clustering, and a gene barcoding application (Gene)
were chosen as machine learning benchmarks. As shown in
Figure 13, Delite gains significant speedups over Spark in
every application studied, with thread pinning and NUMAaware data partitioning contributing in different ways for
each application. As stated previously, Flare Level 3 generates code in Delite’s intermediate language DMLL, and we
have verified that the generated code matches perfectly the
code in [13], thus guaranteeing the same performance.
data between iterations. Likewise, Spark [51, 52] tackles
the issue of data reuse among MapReduce jobs or applications by explicitly persisting intermediate results in memory. Along the same lines, the need for an expressive programming model to perform analytics on structured and
semistructured data motivated Hive [48], Dremel [32], Impala [24], Shark [49] and Spark SQL [7] and many others.
SnappyData [41] integrates Spark with a transactional mainmemory database to realize a unified engine that supports
streaming, analytics and transactions. Moreover, Asterix [9],
Stratosphere [4], and Tupleware [16] provide data flow-based
programming models and support user defined functions
(UDFs). Flare distinguishes itself by maintainng expressiveness while achieving performance close to highly optimized
systems like HyPer [35]. Flare keeps Spark SQL’s front-end
intact, and integrates its own code generation and runtime
(in Level 2) replacing Spark’s RDDs and distributed-bydefault runtime system. Furthermore, Flare Level 3 integrates with Delite as its execution back-end in order to support multi-DSL applications. By design, Flare’s main target
is scaled-up in-memory clusters where faults are improbable.
Query Compilation Recently, code generation for SQL
queries has regained momentum. Historic efforts go back all
the way to System R [8]. Query compilation can be realized
using code templates. e.g., Daytona [21] or HIQUE [25], general purpose compilers, e.g., HyPer [35] and Hekaton [18], or
DSL compiler frameworks, e.g., Legobase [23], DryadLINQ
[50], and DBLAB [43].
Embedded DSL frameworks and intermediate languages address the compromise between productivity and
performance in writing programs that can run under diverse programming models. Voodoo [40] addresses compiling portable query plans that can run on CPUs and GPUs.
Voodoo’s intermediate algebra is expressive and captures
hardware optimizations, e.g., multicores, SIMD, etc. Fur-
Clusters and GPU. Brown et al. [13] also showcase
speedups over Spark when running on a small cluster of
machines, and when employing GPU accelerators on the kmeans and LogReg applications. Despite running on Spark’s
intended architecture, when run on Amazon EC2 using 20
nodes, the code generated by Delite demonstrated a 2×-3.5×
speedup over Spark for k-means, and approximately a 2.5×3× speedup for LogReg (see Figure 14, adapted from [13]).
When these applications were moved to a cluster of higherend machines with more CPU cores as well as GPUs, this
performance gap widened even further. The study shows
that when running on a GPU cluster of 4 nodes, each with
12 cores, performance jumped to above a 7× speedup for
each application. Again, for completeness, Flare Level 3 generates DMLL, and we verified that all generated code was
identical to that used in [13].
7.
k-means
50
Spark
C++(nopin)
C++(pin)
35 C++(numa)
spectively) and 2×-14× for Flare. Across systems, however,
Flare’s Parquet reader demonstrated between a 5×-795×
speedup over Spark’s, and between 35×-720× over Spark’s
CSV reader. While the speedup over Spark lessens slightly
in higher scale factors, we found that Flare’s Parquet reader
consistently performed on average at least one order of magnitude faster across each query, regardless of scale factor.
In nearly every case, reading from a Parquet file in Flare is
approximately 2×-4× slower than in-memory processing (as
expected). However, reading from a Parquet file in Spark is
rarely significantly slower than in-memory processing. These
results show that while reading from Parquet certainly provides performance gains for Spark when compared to reading from CSV, the overall performance bottleneck of Spark
surely does not lie in the cost of reading from SSD compared
to in-memory processing.
RELATED WORK
Numerous cluster computing frameworks implement
a combination of parallel, distributed, relational, procedural, and MapReduce computations. The MapReduce model
[17] realized in Hadoop [5] performs big data analysis under shared-nothing, unreliable machines. Twister [19] and
Haloop [15] support iterative MapReduce workloads by
avoiding reading unnecessary data and keeping invariant
10
thermore, Voodoo is used as an alternative back-end for
MonetDB [12]. Delite [44], a general purpose compiler framework, implements high-performance DSLs (e.g., SQL, Machine Learning, graphs and matrices), provides parallel patterns and generates code for heterogeneous targets. The
Distributed Multiloop Language (DMLL) [13] provide rich
collections and parallel patterns and supports big-memory
NUMA machines. Weld [39] is another recent system that
aims to provide a common runtime for diverse libraries e.g.,
SQL and machine learning. Steno [33] performs optimizations similar to DMLL to compile LINQ queries. Furthermore, Steno uses DryadLINQ [50] runtime for distributed
execution. Nagel et. al. [34] generates efficient code for LINQ
queries. Weld is similar to DMLL in supporting nested parallel structures. However, Weld focuses on a larger set of
data science frameworks (Spark, TensorFlow, NumPy and
Pandas) and does not, e.g, support a large enough set of
joins and other operators to run all TPC-H queries. Query
compilation inside Flare Level 3 is based on Delite’s OptiQL
DSL and DMLL intermediate language.
Performance evaluation in data analytics frameworks
aims to identify performance bottlenecks and study the parameters that impact performance the most, e.g., workload,
scaling-up/scaling-out resources, probability of faults, etc.
A recent study [37] on a single Spark cluster revealed that
CPU, not I/O, is the source of bottlenecks. McSherry et
al. [31] proposed the COST (Configuration that Outperforms a Single Thread) metric, and showed that in many
cases, single-threaded programs can outperform big data
processing frameworks running on large clusters. TPC-H [47]
is a decision support benchmark that consists of 22 analytical queries that address several “choke points,” e.g., aggregates, large joins, arithmetic computations, etc. [11]. Flare
Level 2’s performance evaluation is done using TPC-H.
8.
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
CONCLUSION
Modern data analytics need to combine multiple programming models and make efficient use of modern hardware with
large memory, many cores, and accelerators such as GPUs.
We introduce Flare: a new back-end for Spark that brings
relational performance on par with the best SQL engines,
and also enables highly optimized of heterogeneous workloads. Most importantly, all of this comes without giving up
the expressiveness of Spark’s high-level APIs.
We believe that multi-stage APIs, in the spirit of
DataFrames, and compiler systems like Flare and Delite,
will play an increasingly important role in the future to satisfy the increasing demand for flexible and unified analytics
with high efficiency.
[14]
9.
[18]
[15]
[16]
[17]
REFERENCES
[1] OpenMP. http://openmp.org/.
[2] Accelerating queries with group-by and join by
groupjoin. PVLDB, 4(11), 2011.
[3] A. Abouzeid, K. Bajda-Pawlikowski, D. Abadi,
A. Silberschatz, and A. Rasin. Hadoopdb: an
architectural hybrid of mapreduce and dbms
technologies for analytical workloads. PVLDB,
2(1):922–933, 2009.
[4] A. Alexandrov, R. Bergmann, S. Ewen, J.-C. Freytag,
F. Hueske, A. Heise, O. Kao, M. Leich, U. Leser,
[19]
[20]
11
V. Markl, et al. The stratosphere platform for big data
analytics. The VLDB Journal, 23(6):939–964, 2014.
Apache. Hadoop. http://hadoop.apache.org/.
Apache. Parquet. https://parquet.apache.org/.
M. Armbrust, R. S. Xin, C. Lian, Y. Huai, D. Liu,
J. K. Bradley, X. Meng, T. Kaftan, M. J. Franklin,
A. Ghodsi, and M. Zaharia. Spark SQL: relational
data processing in spark. In SIGMOD, pages
1383–1394. ACM, 2015.
M. M. Astrahan, M. W. Blasgen, D. D. Chamberlin,
K. P. Eswaran, J. N. Gray, P. P. Griffiths, W. F. King,
R. A. Lorie, P. R. McJones, J. W. Mehl, et al. System
r: relational approach to database management.
TODS, 1(2):97–137, 1976.
A. Behm, V. R. Borkar, M. J. Carey, R. Grover, C. Li,
N. Onose, R. Vernica, A. Deutsch,
Y. Papakonstantinou, and V. J. Tsotras. Asterix:
towards a scalable, semistructured data platform for
evolving-world models. Distributed and Parallel
Databases, 29(3):185–216, 2011.
P. Berkhin. A survey of clustering data mining
techniques. In Grouping multidimensional data, pages
25–71. Springer, 2006.
P. Boncz, T. Neumann, and O. Erling. TPC-H
analyzed: Hidden messages and lessons learned from
an influential benchmark. In Technology Conference
on Performance Evaluation and Benchmarking, pages
61–76. Springer, 2013.
P. A. Boncz, M. Zukowski, and N. Nes.
Monetdb/x100: Hyper-pipelining query execution. In
CIDR, 2005.
K. J. Brown, H. Lee, T. Rompf, A. K. Sujeeth,
C. De Sa, C. Aberger, and K. Olukotun. Have
abstraction and eat performance, too: Optimized
heterogeneous computing with parallel patterns. CGO
2016, pages 194–205. ACM, 2016.
K. J. Brown, A. K. Sujeeth, H. Lee, T. Rompf,
H. Chafi, M. Odersky, and K. Olukotun. A
heterogeneous parallel framework for domain-specific
languages. In PACT, 2011.
Y. Bu, B. Howe, M. Balazinska, and M. D. Ernst.
Haloop: efficient iterative data processing on large
clusters. PVLDB, 3(1-2):285–296, 2010.
A. Crotty, A. Galakatos, K. Dursun, T. Kraska,
C. Binnig, U. Çetintemel, and S. Zdonik. An
architecture for compiling udf-centric workflows.
PVLDB, 8(12):1466–1477, 2015.
J. Dean and S. Ghemawat. MapReduce: Simplified
Data Processing on Large Clusters. In OSDI, pages
137–150, 2004.
C. Diaconu, C. Freedman, E. Ismert, P.-A. Larson,
P. Mittal, R. Stonecipher, N. Verma, and M. Zwilling.
Hekaton: Sql server’s memory-optimized oltp engine.
In SIGMOD, pages 1243–1254. ACM, 2013.
J. Ekanayake, H. Li, B. Zhang, T. Gunarathne, S.-H.
Bae, J. Qiu, and G. Fox. Twister: a runtime for
iterative mapreduce. In ACM HPCD, pages 810–818.
ACM, 2010.
G. Graefe. Volcano-an extensible and parallel query
evaluation system. TKDE, 6(1):120–135, 1994.
[21] R. Greer. Daytona and the fourth-generation language
cymbal. In ACM SIGMOD Record, volume 28, pages
525–526. ACM, 1999.
[22] P. Henderson and J. H. M. Jr. A lazy evaluator. In
POPL, pages 95–103. ACM Press, 1976.
[23] Y. Klonatos, C. Koch, T. Rompf, and H. Chafi.
Building efficient query engines in a high-level
language. PVLDB, 7(10):853–864, 2014.
[24] M. Kornacker, A. Behm, V. Bittorf, T. Bobrovytsky,
C. Ching, A. Choi, J. Erickson, M. Grund, D. Hecht,
M. Jacobs, I. Joshi, L. Kuff, D. Kumar, A. Leblang,
N. Li, I. Pandis, H. Robinson, D. Rorke, S. Rus,
J. Russell, D. Tsirogiannis, S. Wanderman-Milne, and
M. a. Yoder. Impala: A modern, open-source sql
engine for hadoop. In CIDR, 2015.
[25] K. Krikellas, S. D. Viglas, and M. Cintra. Generating
code for holistic query evaluation. In ICDE, pages
613–624. IEEE, 2010.
[26] J. Laskowski. Mastering Apache Spark 2.
Technical Report 1999-66, Stanford InfoLab,
November 1999.
[39] S. Palkar, J. J. Thomas, A. Shanbhag, D. Narayanan,
H. Pirk, M. Schwarzkopf, S. Amarasinghe, M. Zaharia,
and S. InfoLab. Weld: A common runtime for high
performance data analytics. In CIDR, 2017.
[40] H. Pirk, O. Moll, M. Zaharia, and S. Madden. Voodoo
- a vector algebra for portable database performance
on modern hardware. VLDB, 9(14):1707–1718, 2016.
[41] J. Ramnarayan, B. Mozafari, S. Wale, S. Menon,
N. Kumar, H. Bhanawat, S. Chakraborty,
Y. Mahajan, R. Mishra, and K. Bachhav. Snappydata:
A hybrid transactional analytical store built on spark.
In SIGMOD, pages 2153–2156, 2016.
[42] T. Rompf and M. Odersky. Lightweight modular
staging: a pragmatic approach to runtime code
generation and compiled dsls. Commun. ACM,
55(6):121–130, 2012.
[43] A. Shaikhha, Y. Klonatos, L. Parreaux, L. Brown,
M. Dashti, and C. Koch. How to architect a query
compiler. In SIGMOD, pages 1907–1922. ACM, 2016.
[44] A. K. Sujeeth, K. J. Brown, H. Lee, T. Rompf,
H. Chafi, M. Odersky, and K. Olukotun. Delite: A
compiler architecture for performance-oriented
embedded domain-specific languages. TECS,
13(4s):134, 2014.
[45] A. K. Sujeeth, H. Lee, K. J. Brown, T. Rompf,
M. Wu, A. R. Atreya, M. Odersky, and K. Olukotun.
OptiML: an implicitly parallel domain-specific
language for machine learning. In ICML, 2011.
[46] A. K. Sujeeth, T. Rompf, K. J. Brown, H. Lee,
H. Chafi, V. Popic, M. Wu, A. Prokopec,
V. Jovanovic, M. Odersky, and K. Olukotun.
Composition and reuse with compiled domain-specific
languages. In ECOOP, 2013.
[47] The Transaction Processing Council. TPC-H Version
2.15.0.
[48] A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka,
S. Anthony, H. Liu, P. Wyckoff, and R. Murthy. Hive:
a warehousing solution over a map-reduce framework.
PVLDB, 2(2):1626–1629, 2009.
[49] R. S. Xin, J. Rosen, M. Zaharia, M. J. Franklin,
S. Shenker, and I. Stoica. Shark: Sql and rich analytics
at scale. In ACM SIGMOD, pages 13–24, 2013.
[50] Y. Yu, M. Isard, D. Fetterly, M. Budiu, Ú. Erlingsson,
P. K. Gunda, and J. Currey. Dryadlinq: A system for
general-purpose distributed data-parallel computing
using a high-level language. OSDI, 8, 2008.
[51] M. Zaharia, M. Chowdhury, M. J. Franklin,
S. Shenker, and I. Stoica. Spark: cluster computing
with working sets. In USENIX, HotCloud’10, 2010.
[52] M. Zaharia, R. S. Xin, P. Wendell, T. Das,
M. Armbrust, A. Dave, X. Meng, J. Rosen,
S. Venkataraman, M. J. Franklin, A. Ghodsi,
J. Gonzalez, S. Shenker, and I. Stoica. Apache spark:
a unified engine for big data processing. Commun.
ACM, 59(11):56–65, 2016.
https://www.gitbook.com/book/jaceklaskowski/
mastering-apache-spark/details, 2016.
[27] C. Lattner and V. Adve. LLVM: A compilation
framework for lifelong program analysis and
transformation. In CGO, 2004.
[28] H. Lee, K. J. Brown, A. K. Sujeeth, H. Chafi,
T. Rompf, M. Odersky, and K. Olukotun.
Implementing domain-specific languages for
heterogeneous parallel computing. IEEE Micro,
31(5):42–53, 2011.
[29] H. Lee, K. J. Brown, A. K. Sujeeth, T. Rompf, and
K. Olukotun. Locality-aware mapping of nested
parallel patterns on gpus. In MICRO, 2014.
[30] F. McSherry. Scalability! but at what cost.
http://www.frankmcsherry.org/graph/scalability/
cost/2015/01/15/COST.html, 2015.
[31] F. McSherry, M. Isard, and D. G. Murray. Scalability!
but at what cost? In HotOS, 2015.
[32] S. Melnik, A. Gubarev, J. J. Long, G. Romer,
S. Shivakumar, M. Tolton, and T. Vassilakis. Dremel:
interactive analysis of web-scale datasets. Proceedings
of the VLDB Endowment, 3(1-2):330–339, 2010.
[33] D. G. Murray, M. Isard, and Y. Yu. Steno: automatic
optimization of declarative queries. In ACM
SIGPLAN Notices, volume 46, pages 121–131, 2011.
[34] F. Nagel, G. Bierman, and S. D. Viglas. Code
generation for efficient query processing in managed
runtimes. VLDB, 7(12):1095–1106, 2014.
[35] T. Neumann. Efficiently compiling efficient query
plans for modern hardware. PVLDB, 4(9):539–550,
2011.
[36] NVIDIA. The world’s first AI supercomputer in a box.
http://www.nvidia.com/object/
deep-learning-system.html, 2016.
[37] K. Ousterhout, R. Rasti, S. Ratnasamy, S. Shenker,
and B. Chun. Making sense of performance in data
analytics frameworks. In NSDI, pages 293–307, 2015.
[38] L. Page, S. Brin, R. Motwani, and T. Winograd. The
pagerank citation ranking: Bringing order to the web.
12
| 6cs.PL
|
1
A High-Level Rule-based Language for Software
Defined Network Programming based on OpenFlow
arXiv:1712.04706v2 [cs.NI] 14 Dec 2017
Mehdi Mohammadi, Ala Al-Fuqaha, Zijiang James Yang
Computer Science Department
Western Michigan University
{mehdi.mohammadi, ala.al-fuqaha, zijiang.yang}@wmich.edu
Abstract—This paper proposes XML-Defined Network policies
(XDNP), a new high-level language based on XML notation,
to describe network control rules in Software Defined Network
environments. We rely on existing OpenFlow controllers specifically Floodlight but the novelty of this project is to separate
complicated language- and framework-specific APIs from policy
descriptions. This separation makes it possible to extend the
current work as a northbound higher level abstraction that
can support a wide range of controllers who are based on
different programming languages. By this approach, we believe
that network administrators can develop and deploy network
control policies easier and faster.
Index Terms—Software Defined Networks; OpenFlow; Floodlight; SDN compiler; SDN programming languages; SDN abstraction.
I. I NTRODUCTION
By Software-Defined Network (SDN) technology, network
engineers and administrators can control and manage network
services through abstraction of lower level functionality. This
end can be achieved by splitting the system that makes
decisions where to send the packets (control plane) from the
underlying systems known as data plane that is in charge of
forwarding packets to the selected destinations. In order to be
practical, SDN needs some mechanism for the control plane to
interact with the data plane. OpenFlow [1] is such a protocol
that has been used in network research community in recent
years. There are couples of OpenFlow controller frameworks
such as POX1 , NOX2 , Beacon3 , Floodlight4 , Trema5 , NodeFlow6 and Ryu7 .
The emerge of OpenFlow simplified network management
by providing high-level abstractions to control a set of switches
remotely. An OpenFlow framework requires network engineers or administrators to write programs to control and
manage data traffic in their network and control network
devices. However, one potential problem that network engineers face is that the programming languages that support
OpenFlow are complex and administrators are required to
1 http://www.noxrepo.org/pox/about-pox/
2 http://www.noxrepo.org/
3 https://openflow.stanford.edu/display/Beacon/Home
4 http://www.projectfloodlight.org/
5 http://trema.github.io/trema/
6 http://garyberger.net/?p=537
7 http://osrg.github.io/ryu/
know much irrelevant information to develop and deploy a
control policy. The problem will be more prohibitive for
a beginner network engineer who does not have a good
background in the programming language of the controller.
There are other challenges for programmers including [2]: the
interaction between concurrent modules, low-level interface
to switch hardware, and multi-tiered programming model. A
simple and unified language in a higher abstraction level that
does not depend on a specific language can fill this gap.
We have developed a text-based format based on XML by
which a human-friendly semantic of operations is developed
for policy description. XML has been used widely in network
management and configuration protocols like NETCONF. This
work can be annexed to the current OpenFlow controller as a
top layer service.
Two contributions of this paper are:
• proposing an XML-based script language for describing
network control policies; and
• implementing a translator that converts the XML file to
a Java source code containing the controller program for
Floodlight.
The emulation experiments affirms the applicability of this
XML notation as a policy describer in SDNs.
II. R ELATED W ORK
XML documents are widely used to describe systems, to
configure or control them. One attractive usage is code generation. There are several works that try to use XML notation as
a representation of source codes. JavaML [3] is such a work
that represents Java source code in XML notation. The source
code representation in JavaML is in a way that constructs like
superclasses, methods, message sends, and literal numbers are
all directly represented in the elements and attributes of the
document content. XML notation is also used in another work
named srcML [4] by which structural information is added to
unstructured source code files. srcML aims to enhance source
code representation by adding syntactic information obtained
from parse tree.
In [5], Liang et al. proposed a proof of concept to use
XML as a description scheme for OpenFlow Networking
experiments. They defined networking experiments in a hierarchical model in which the experiment is at the highest
level, and each experiment contains information, topology,
deployment, control, and output components. However, they
This paper has been presented in the poster section of GENI Engineering Conference 22 (GEC 22), Washington D.C., March 23-26, 2015.
2
just provided the format description, but not mentioned by
which way they generated their XML parser. Furthermore,
they have not provided a full evaluation of their system in
the real environments. Our work differs from their work in
the way we design a platform by which network engineers
can describe their network control rules by XML notations
regardless of the underlying topology or network elements. In
other words, Liang’s work focuses on description of network
environment not the control of network traffic and behavior.
There are several works and projects aim to propose a
higher level abstraction above the OpenFlow APIs in their
development frameworks [2], [6]–[8]. Frenetic [2] which has
been implemented in python emerged with some simple
rules including predicate-action pairs, in which actions support filtering, forwarding, duplicating, and modifying packets. Later it included other more complicated operators like
packet processing functionalities [6]. Pyretic [7] as a modern
SDN programming language based on Frenetic and beyond
the current parallel composition operator, presents two more
complex abstractions: sequential composition operator and
applying control policies over abstract topologies. By these
abstractions the development of modular control programs
becomes simpler. NetKat [8] is another language for SDN with
a solid mathematical foundation that supports primitives like
filtering, modifying, and transmitting packets as well as union
and sequential composition operators.
There are other works that have more concentration to
provide a high-level language for policy description. Procera
[9] and FML [10] are designed based on this aim. The
declarative policy language in Procera is based on functional
reactive programming. This domain-specific language relies
on Haskell and is able to use the constructs and data types
defined in Haskell. FML has been built on Datalog language
to support a declarative logic-based programming interface.
In [11], as part of their resilient network management system,
authors have proposed a policy description language based on
management patterns. The management patterns describe the
handling and controlling of individual OpenFlow resilience
services.
III. S OFTWARE D EFINED N ETWORKING
Software-Define Networking defines two separate layers
as the new architecture of network environments. A data
plane that is supposed to do operations like buffering packets,
forwarding, dropping, tagging and collecting packet statistics.
Control plane, on the other hand, may have the algorithms
to track the dynamic topology of the network and has route
processing capability. The control plane usually consists of
a separate powerful machine called controller. The control
plane uses its computed data and the data plane’s statistics to
manage and govern a set of dependent switches by installing
or removing packet forwarding rules over them.
OpenFlow as a realization of SDN follows this two-layer
architecture. In a typical OpenFlow network, if a switch can
find a rule match to the received packet in its flow table, then
it proceeds with that rule. Otherwise, the packet is sent to the
controller for more processing. The controller examines packet
Fig. 1. The overall architecture of the system.
header and establishes a rule based on that packet. The next
similar packets arrived in the switches then are not required to
go to the controller since the switches have appropriate rule to
process them. Although forwarding packets to the controller
increases their latency but it occurs not very much.
IV. T HE P ROPOSED S YSTEM
Our XML translator consists of a lexical analyzer (lexer)
and a syntax analyzer (parser). The lexer tokenizes the input
file and matches the tags, attributes, identifiers, constant values
and so on based on regular grammars. Syntax analyzer, on the
other hand, performs syntactic analysis of the input file and if it
does not find any problem in this step, generates appropriate
Java source code. The overall architecture of the system is
depicted in Figure 1.
A. Language Specification
The overall design of an XML file to be used as control
program should follow the format of figure 2. Rule description
is defined in a hierarchical structure in which at the top level,
we define the class name in the SDN element. Then a list of
rules contacting zero or more rule elements should be declared.
Inside each rule, one or more conditions are expressed. To have
compositional conditions, condition elements support logical
operators which are stated by attribute “connector”. For example, if a condition element has an “or” connector, it will be
joined to the previous condition by logical “or” operator in java
source code. The conditions themselves comply with a simple
pattern “variable op value”. Variables can be chosen from
src_ip (source IP), dest_ip (destination IP), src_prt
(source port) and dest_prt (destination port). The current
supported operator is equal sign. Value can be a port number
or IP address. An example of XML file is shown in Figure 3.
3
construct the lexer. For example, to define the pattern for IP
address, we define these regular expressions in the lexer file:
oct10 [1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]
start_oct [1-9]|oct10
octet [0-9]|oct10
ipv4 start_octȯctetȯctetȯctet
Tag names are considered as keywords in the script and are
required to comply exactly with the XML specification.
C. Syntax Analyzer
Fig. 2. The format of a policy description file.
The grammar section of translator is defined in syntax
analyzer. We used YACC tool to generate the translator. In
its input file, we define all the tokens that are introduced in
the lexer, grammar production rules that examine the syntax of
the XML file and the output associated with each production
rule leading to code generation for the XML file. The syntax
analyzer description follows the Backus–Naur Form (BNF)
notation for context-free grammars. For example, the following production rules show the nesting and iteration nature of
XML script for control policies:
ruleslist :
r u l e s l i s t rule
| rule
| /∗ nothing ∗/
;
rule :
RULE_S { f p r i n t f ( fp , " \ t \ t i f
conditionCounter = 0;}
c o n d i t i o n L i s t a c t i o n RULE_E
;
Fig. 3. A sample XML policy description.
The XML sample contains two rules. The first one says
that all the packets who are going to IP address 10.0.0.2
or who they are coming from IP address 192.168.0.1 should
be forwarded to port 1 of the switches (which assigned to
IP address 10.0.0.1). The second rule indicates that each
packet originated from Telnet service (port 23) should be
dropped (specified by port 0). This example shows that it is
possible to implement all network policy management schemes
and services like firewalls or load balancing with this XML
notation.
");
conditionList :
conditionList condition
| condition
;
condition :
COND_S GT { c o n d i t i o n C o u n t e r ++; }
c o n d T e x t COND_E
| ...
condText :
SD_IP EQ I P v 4 {
f p r i n t f ( fp , "(% s . e q u a l s ( \ " % s \ " ) ) " ,
$1 , $3 ) ; }
| SD_PRT EQ NUMBER{
f p r i n t f ( fp , "(% s == %d ) " , $1 , $3 ) ; } ;
Each string in the input XML file that is not matched to the
designed tokens and rules will cause an error to the program
and termination of the program with an error message.
B. Lexical Analyzer
We designed our lexer with LEX format by which we
defined the matching patterns for XML elements, attributes
and literals that are needed in a typical network controller. The
source of lexer file has to be fed to Flex to generate a source
code in C language. We used regular expression notations to
V. E XPERIMENTS
When our LEX and YACC input files are ready, we can
generate the final translator by calling the following commands. We have used equivalent versions of LEX and YACC
called FLEX and bison respectively. In the following command
4
xmlparser.l and xmlparser.y are the lexer and parser grammar
respectively:
flex xmlparser.l
bison -dy xmlparser.y
gcc lex.yy.c y.tab.c -o xmlparser.exe
The translator file is named xmlparser.exe. In order to
generate the Java source code for a desired XML file we
can use the following command in a console command line:
xmlparser.exe Demo.xml
The output of this command is a file named Demo.java
containing a Java class for the control policies of the network.
This file can be pushed to the controller machine and compiled
to be used for network management.
We used Mininet which is a network emulator to examine
the behavior of the proposed translator. Mininet supports
OpenFlow, so we can register the generated Java source
code with a Floodlight controller and attach the new
controller to a mininet topology. Here we explain how
to setup the experiments: After generating Java source
code form XML file, it should be added to the Floodlight
controller. We use Floodlight source code and add the
generated class to its main package. It is needed to set
Floodlight to load this class at startup. To do that, we
first tell the loader that this module exists by adding the
fully qualified module name on a configuration file named
net.floodlight.core.module.IFloodlightModule in the path
src/main/resources/META-INF/services. Then
we tell the module to be loaded. So we need to modify the
Floodlight module configuration file to append the Demo
file. The full name of this class should be added to the
file src/main/resources/floodlightdefault.properties. Now we
can compile the Floodlight project and have an OpenFlow
controller with our designed services running over it.
The next step is running Mininet. We setup a simple network
topology containing one switch (s0) and three hosts (h1, h2,
h3) connected to the switch. We also set the controller to be
remote. This configuration can be obtained by this command:
sudo mn -controller remote -topo
single,3.
We can test our module by calling ping command. Since
our first rule was forwarding those packets going to 10.0.0.2
to port 1, so a ping from h3 to h2 or h1 to h2 will install that
rule on switches and we will not receive reply from h2 while
other hosts can ping each other like p1 and p3. By this simple
rule we can block the traffic to h2. Running command pingall
we get 33% packet loss that means h2 is not responding to
none of ping requests.
Table I below shows the comparison of the XML file versus
generated Java file in terms of number of code lines and size of
code (Kilo Byte). Using this system, we reduce coding efforts
to about 1/8 of the original Java source code while the size of
rule description is about 1/5 of the generated source code.
VI. C ONCLUSION
This paper describes a new approach of software-defined
networks and presents a higher level of abstraction compared
to current software-defined network programming languages.
TABLE I
C OMPARISON OF XML AND JAVA SOURCE CODES .
XML file
Java file
# Line of Code
18
147
Size (Kilo Byte)
1
5
We defined a scripting language based on XML notation
by which network administrators can define control policies
without concerning the complexities of underlying controller
framework. Indeed, this will make software-defined networking easier and more attractive for network administrators.
This work opens up the opportunity for using service
oriented architecture and web services as a model of collaboration between SDN controllers (e.g., a controller offers load
balancing or firewalling).
Extending this work to support more APIs and more
complicated scenarios is intended to be done in the future
works. Technically, examining and manipulating other OpenFlow headers is possible by this approach. Supporting more
controller frameworks with different languages is also another
direction for future works.
R EFERENCES
[1] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in
campus networks,” ACM SIGCOMM Computer Communication Review,
vol. 38, no. 2, pp. 69–74, 2008.
[2] N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford,
A. Story, and D. Walker, “Frenetic: A network programming language,”
in ACM Sigplan Notices, vol. 46, no. 9. ACM, 2011, pp. 279–291.
[3] G. J. Badros, “Javaml: a markup language for java source code,”
Computer Networks, vol. 33, no. 1, pp. 159–177, 2000.
[4] J. I. Maletic, M. L. Collard, and A. Marcus, “Source code files as
structured documents,” in Program comprehension, 2002. proceedings.
10th international workshop on. IEEE, 2002, pp. 289–292.
[5] J. Liang, Z. Lin, and Y. Ma, “Of-nedl: an openflow networking experiment description language based on xml,” Web Information Systems and
Mining, pp. 686–697, 2012.
[6] C. Monsanto, N. Foster, R. Harrison, and D. Walker, “A compiler
and run-time system for network programming languages,” in ACM
SIGPLAN Notices, vol. 47, no. 1. ACM, 2012, pp. 217–230.
[7] C. Monsanto, J. Reich, N. Foster, J. Rexford, D. Walker et al., “Composing software defined networks.” in NSDI, vol. 13, 2013, pp. 1–13.
[8] C. J. Anderson, N. Foster, A. Guha, J.-B. Jeannin, D. Kozen,
C. Schlesinger, and D. Walker, “Netkat: Semantic foundations for
networks,” in ACM SIGPLAN Notices, vol. 49, no. 1. ACM, 2014,
pp. 113–126.
[9] A. Voellmy, H. Kim, and N. Feamster, “Procera: a language for highlevel reactive network control,” in Proceedings of the first workshop on
Hot topics in software defined networks. ACM, 2012, pp. 43–48.
[10] T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker,
“Practical declarative network management,” in Proceedings of the 1st
ACM workshop on Research on enterprise networking. ACM, 2009,
pp. 1–10.
[11] P. Smith, A. Schaeffer-Filho, D. Hutchison, and A. Mauthe, “Management patterns: Sdn-enabled network resilience management,” in Network
Operations and Management Symposium (NOMS), 2014 IEEE. IEEE,
2014, pp. 1–9.
| 6cs.PL
|
Approximate Generalized Matching:
f -Factors and f -Edge Covers
arXiv:1706.05761v2 [cs.DS] 27 Jul 2017
Dawei Huang
University of Michigan
Seth Pettie∗
University of Michigan
Abstract
In this paper we present linear time approximation schemes for several generalized matching problems on nonbipartite graphs. Our results include O (m)-time algorithms for (1 − )maximum weight f -factor and (1 + )-approximate minimum weight f -edge cover. As a byproduct, we p
also obtain direct algorithms for the exact cardinality versions of these problems running
in O(m f (V )) time.
The technical contributions of this work include an efficient method for maintaining relaxed complementary slackness in generalized matching problems and approximation-preserving
reductions between the f -factor and f -edge cover problems.
∗
Supported by NSF grants CCF-1217338, CNS-1318294, CCF-1514383, and CCF-1637546.
1
Introduction
Many combinatorial optimization problems are known to be reducible to computing optimal matchings in non-bipartite graphs [8, 7]. These problems include computing b-matchings, f -factors, f edge covers, T -joins, undirected shortest paths (with no negative cycles), and bidirected flows,
see [17, 12, 21, 9]. These problems have been investigated heavily since Tutte’s work in the 1950s
[22, 20]. However, the existing reductions to graph matching are often inadequate: they blow up the
size of the input [17], use auxiliary space [10], or piggyback on specific matching algorithms [10] like
the Micali-Vazirani algorithm [18]. Moreover, most existing reductions destroy the dual structure
of optimal solutions and are therefore not approximation preserving.
In this paper we design algorithms for computing f -factors and f -edge covers in a direct fashion,
or through efficient, approximation-preserving reductions. Because our algorithms are based on the
LP formulations of these problems (in contrast to approaches using shortest augmenting walks [10,
18]), they easily adapt to weighted and approximate variants of the problems. Let us define these
problems formally. We assume graphs may have multiple parallel edges and loops.
f -factor An f -factor is a subset F ⊂ E such that degF (v) ≤ f (v). F is perfect if the degree
constraints hold with equality.1
f -edge cover An f -edge cover is a subset F ⊂ E such that degF (v) ≥ f (v). It is perfect if all
degree constraints hold with equality.
On unweighted graphs the f -factor objective is to maximize |F |, and for f -edge cover it is
to minimize |F |. On weighted graphs it is to maximize/minimize w(F ), possibly subject to the
additional constraint that F is perfect.
Classic Reductions. The classical reduction from f -factor to standard graph matching uses the
b-matching problem as a stepping stone. A b-matching is a function
x : E → Z≥0 (where x(e)
P
indicates how many copies of e are in the matching) such that e3v x(e) ≤ b(v), i.e., the number
of matches edges incident to v, counting multiplicity, is at most b(v). The f -factor problem on
G = (V, E, w) is reduced to b-matching by subdividing each edge e = (u, v) ∈ E into a path
(u, ue , ve , v). Here ue , ve are new vertices, w(u, ue ) = w(ve , v) = w(u, v) while w(ue , ve ) = 0, and
b(ue ) = b(ve ) = 1. The original vertices have b(u) = f (u). This reduction blows up the number of
vertices to O(m) and is not approximation preserving. The b-matching problem is easily reduced to
standard matching by replicating each vertex u b(u) times, and replacing each edge (u, v) with a
bipartite b(u) × b(v) clique on its endpoints’ replicas. This step of the reduction is approximation
preserving, but blows up the number of vertices and edges. Both reductions together reduce f factor to a graph matching problempon O(m) vertices and O(fmax m) edges. Gabow [10] gave a
method for solving f -factor in O(m f (V )) time using black-box calls to single iterations of the
Micali-Vazirani [18] algorithm.
Observe that f -factor and f -edge cover are complementary problems: if C is an fC -edge cover,
the complementary edge set F = E\C is necessarily an fF -factor, where fF (v) = deg(v) − fC (v).
Complementarity implies that any polynomial-time algorithm for one problem solves the other
in polynomial time, but it says nothing about the precise complexity of solving them exactly or
approximately. Indeed, this phenomenon is very well known in the realm of NP-complete problems.
1
In the literature the term f -factor often refers to our definition of a perfect f -factor.
1
For example, Maximum Independent Set and Minimum Vertex Coverpare complementary problems,
but have completely different approximation profiles. Gabow’s O(m
p fF (V )) cardinality fF -factor
algorithm [10] implies that fC -edge cover is computed in O(m m − fC (V )) = O(m3/2 ) time,
and says nothing about the approximability of fC -edge cover. As far as we are aware, the fastest
approximation algorithms for fC -edge cover (see [2]) treat it as a general weighted Set Cover problem
on 2-element sets. Chvátal’s analysis [3] shows the greedy algorithm is an H(2)-approximation,
where H(2) = 3/2 is the 2nd harmonic number.
Our interest in the approximate f -edge cover problem is inspired by a new application to
anonymizing data in environments where users have different privacy demands; see [2, 1, 16]. Here
the data records correspond to edges and the privacy demand of v is measured by f (v); the goal is
to anonymize as few records to satisfy everyone’s privacy demands.
New Results. We give new algorithms for computing f -factors and f -edge covers approximately
and exactly.
• We show that a folklore reduction from minimum weight 1-edge cover to maximum weight
1-factor (matching) is approximation-preserving, in the sense that any (1 − )-approximation
for matching gives a (1 + )-approximation for edge cover. This implies that 1-edge cover can
be (1 + )-approximated in O (m) time [5], and that one can apply any number of simple and
practical algorithms [4, 19, 5] to approximate 1-edge cover. This simple reduction does not
extend to f -factors/f -edge covers.
• We give an O (m)-time (1 + )-approximation algorithm for weighted fC -edge cover, for any
fC . Our algorithm follows from two results, both of which are somewhat surprising. First,
any approximate weighted fF -factor algorithm that reports a (1 ± )-optimal dual solution
can be transformed into a (1 + O())-approximate weighted fC -edge cover algorithm. Second,
such an fF -factor algorithm exists, and its running time is O (m). The first claim is clearly
false if we drop the approximate dual solution requirement (for the same reason that an O(1)approximate vertex cover does not translate into an O(1)-approximate maximum independent
set), and the second is surprising because the running time is independent of the demand
function fF and the magnitude of the edge weights.
• As corollaries of these reductions,
p we obtain a new exact algorithm for minimum cardinality
fC -edge cover running in O(m fC (V )) time, ratherpthan O(m3/2 ) time ([10]), and a direct
algorithm for cardinality fF -factor that runs in O(m fF (V )) time, without reduction [10] to
the Micali-Vazirani algorithm [18].
The blossom structure and LP characterization of b-matching is considerably simpler than the
corresponding blossoms/LPs for f -factor and f -edge cover. In the interest of simplicity, one might
want efficient code that solves (approximate) b-matching directly, without viewing it as an f -factor
problem on a multigraph in which there is implicitly an infinite supply of each edge. We do not
know of such a direct algorithm. Indeed, the structure of b-matching blossoms seems to rely on strict
complementary slackness, and is incompatible with our main technical tool, relaxed complementary
slackness.2
2
Using relaxed complementary slackness, matched and unmatched edges have different eligibility criteria (to be
included in augmenting paths and blossoms) whereas b-matching blossoms require that all copies of an edge—matched
and unmatched alike—are all eligible or all ineligible.
2
Structure of the Paper. In Section 2 we give an introduction to the LP-formulation of generalized matching problems and the structure of their blossoms and augmenting walks. In Section 3.1
we show that a folklore reduction from 1-edge cover to 1-factor is approximation-preserving and in
Section 3.2 we reduce approximate f -edge cover to approximate f -factor. In Section 4 we give an
O(W m−1 )-time algorithm for (1 − )-approximate f -factor in graphs with weights in [1, W ] and
then speed it up to O(m−1 log −1 ), independent of weight. Section 5 gives a linear time algorithm
to compute a maximal set of augmenting walks; cf. [15, §8].
2
Basis of f -factor and f -edge cover
This section reviews basic algorithmic concepts from matching theory and their generalizations to
the f -factor and f -edge cover problems, e.g., LPs, blossoms, and augmenting walks. These tools
will let us generalize the Duan-Pettie algorithm [5] for Approximate Maximum Weight Matching to
Approximate Maximum Weight f -factor and Approximate Minimum Weight f -edge cover.
Notation. The input is a multigraph G = (V, E). For S ⊆ V , let δ(S) and γ(S) be the sets of
edges with exactly one endpoint and both endpoints in S, respectively. For T ⊆ E, δT (S) denotes
the intersection of δ(S) and T . By definition, degT (S) = |δT (S)|.
2.1
LP formulation
The maximum weight f -factor problem can be expressed as maximizing
the following constraints:
X
x(e) ≤ f (v), for all v ∈ V
P
e∈E
w(e)x(e), subject to
e∈δ(v)
X
e∈γ(B)∪I
f (B) + |I|
x(e) ≤
, for all B ⊆ V, I ⊆ δ(B)
2
(1)
0 ≤ x(e) ≤ 1, for all e ∈ E
j
P
f (B)+|I|
2
k
Here, the blossom constraint e∈γ(B)∪I x(e) ≤
is a generalization of blossom conj k
P
|B|
straint e∈γB x(e) ≤ 2 in ordinary matching. The reason that we have a subset I of incident
edges in the sum is that the subset allow us to distinguish between matched edges that have both
endpoints inside B with those with exactly one endpoints. Any basic feasible solution x of this LP
is integral [21, §33], and can therefore be interpreted as membership vector of an f -factor F . To
ensure optimality of the solution, the algorithm works with the dual LP, which is:
X
X
X
f (B) + |I|
minimize
f (v)y(v) +
z(B, I) +
u(e)
2
e
v∈V
B⊆V,I⊆δ(B)
(2)
subject to yzF (e) + u(e) ≥ w(e), for all e ∈ E
y(v) ≥ 0, z(B, I) ≥ 0, u(e) ≥ 0
3
Here the aggregated dual yzF : E 7→ R≥0 is defined as:
X
yzF (u, v) = y(u) + y(v) +
z(B, I).
B,I:(u,v)∈γ(B)∪I,
I⊆δ(B))
Unlike matching, each z-value here is associated with the combination of a vertex set B and a
subset I of its incident edges.
P
The minimum weight f -edge cover problem can be expressed as minimizing
e∈E w(e)x(e),
subject to:
X
x(e) ≥ f (v), for all v ∈ V
e∈δ(v)
X
e∈γ(B)∪(δ(B)\I)
f (B) − |I|
x(e) ≥
, for all B ⊆ V and I ⊆ δ(B)
2
(3)
0 ≤ x(e) ≤ 1, for all e ∈ E
With the dual program being:
maximize
X
v∈V
X
f (v)y(v) +
B⊆V,I⊆δ(B)
X
f (B) − |I|
z(B, I) −
u(e)
2
e∈E
subject to yzC (e) − u(e) ≤ w(e), for all e ∈ E
(4)
y(v) ≥ 0, z(B, I) ≥ 0, u(e) ≥ 0
where
X
yzC (u, v) = y(u) + y(v) +
z(B, I).3
B,I:(u,v)∈γ(B)∪(δ(B)\I),I⊆δ(B))
Both of our f -factor and f -edge cover algorithms maintain a dynamic feasible solution F ⊆ E
that satisfies the primal constraints. We call edges in F matched and all other edges unmatched,
which is referred to as the type of an edge. A vertex v is saturated if degF (v) = f (v). It is unsaturated/oversaturated if degF (v) is smaller/greater than f (v). Given an f -factor F , the deficiency
def(v) of a vertex v is defined as def(v) = f (v) − degF (v). Similarly, for an f -edge cover F , the
surplus of a vertex is defined as surp(v) = degF (v) − f (v).
2.2
Blossoms
We follow Gabow’s [11] definitions and terminology for f -factor blossoms, augmenting walks, etc.
A blossom is a tuple (B, EB , β(B), η(B)) where B is the vertex set, EB the edge set, β(B) ∈ B the
base vertex and η(B) ⊂ δ(β(B)) ∩ δ(B), |η(B)| ≤ 1 the base edge set, which may be empty. We
often refer to the blossom by referring to its vertex set B. Blossoms can be defined inductively as
follows.
Definition 1. A single vertex v forms a trivial blossom, or a singleton. Here B = {v}, EB = ∅,
β(B) = v, and η(B) = ∅.
3
We use yzF and yzC to denote the aggregated dual yz for f -factor and f -edge cover respectively. We will omit
the subscript if it is clear from the context.
4
Inductively, let B0 , B1 , ... , Bl−1 be a sequence of disjoint singletons or nontrivial blossoms. Suppose there exists a closed walk CB = {e0 , e1 , ...S, el−1 } ⊆ E starting and ending with B0 such that
ei ∈ Bi × Bi+1 (mod l). The vertex set B = l−1
i=0 Bi is identified with a blossom if the following
are satisfied:
1. Base Requirement: If B0 is a singleton, the two edges incident to B0 on CB , i.e., e0 and el−1 ,
must both be matched or both be unmatched.
2. Alternation Requirement: Fix a Bi , i 6= 0. If Bi is a singleton, exactly one of ei−1 and ei is
matched. If Bi is a nontrivial blossom, η(Bi ) 6= ∅ and must be either {ei−1 } or {ei }.
S
The edge set of the blososm B is EB = CB ∪ ( l−1
i=1 EBi ) and its base is β(B) = β(B0 ). If B0
is not a singleton, η(B) = η(B0 ). Otherwise, η(B) may either be empty or contain one edge in
δ(B) ∩ δ(B0 ) that is the opposite type of e0 and el−1 .
Blossoms are classified as light/heavy. If B0 is a singleton, B is light/heavy if e0 and el−1 are
both unmatched/matched. Otherwise, B is light/heavy if B0 is light/heavy. Note that blossoms in
the usual matching problem (1-factor) are always light.
The purpose of blossoms is to identify the part of graph that behaves as a unit when searching
for an augmenting walk. This property can be formally stated as follows:
Lemma 2. Let v be an arbitrary vertex in B. There exists an even length alternating walk P0 (v)
and an odd length alternating walk P1 (v) from β(B) to v using edges in EB . Moreover, The terminal
edge incident to β(B) must have a different type than η(B), if η(B) exists.
Proof. We prove this by induction. The base case is a blossom B consisting of singletons hv1 , v2 , ... , v2k+1 i,
where v = vi . Then one of the two walks hv1 , v2 , ... , vi i and hv1 , v2k+1 , v2k ... , vi i must be odd and
the other must be even.
Consider the cycle CB = hB0 , e0 , B1 , ... , el−2 , Bl−1 el−1 , B0 i. Suppose the claim holds inductively
for all nontrivial blossoms in B0 , B1 , ... , Bl−1 . Let v be an arbitrary vertex in B. We use PBi ,j
(0 ≤ i < l, j ∈ {0, 1}) to denote the walk P0 and P1 guaranteed in blossom Bi . There are two cases:
Case 1: When v is contained in a singleton Bk . We examine the two walks Pb = he0 , e1 , ... ek−1 i
and Pb0 = hel−1 , el−2 , ... ek i. Notice that Pb and Pb0 are walks in the graph obtained by contracting all
subblossoms B0 , B1 , ... Bl−1 of B. By the inductive hypothesis, we can extend Pb and Pb0 to P and
P 0 in G by replacing each Bi on the walk with PBi ,j for suitable j connecting the endpoints of ei−1
and ei . In particular, if ei−1 and ei are of different types, we replace Bi with the even length walk
PBi ,0 . Otherwise, we replace with PBi ,1 . By the alternation requirement, one of P and P 0 must be
odd and the other must be even.
Case 2: When v is contained in a non-trivial blossom Bk . Without loss of generality, ek−1
η(Bk ). Consider the contracted walk Pb = he0 , e1 , ... , ek−1 i. We extend Pb to an alternating walk
in EB terminating at ek−1 similar to Case 1. Then P0 (v) or P1 (v) is obtained by concatenating
with the alternating walk PBk ,0 (v) or PBk ,1 (v) of the right parity.
Notice that in both cases, the base requirement in Definition 1 guarantees the starting edge
the alternating walk P1 (v) and P0 (v) alternates with the base edge η(B).
=
P
P
of
The main difference between blossoms in generalized matching problems and blossoms in ordinary matching problem is that P0 and P1 are both meaningful for finding augmenting walks or
blossoms. In ordinary matching, since each vertex has at most 1 matched edge incident to it, an
5
alternating walk enters the blossom at the base vertex via a matched edge and must leave with
an unmatched edge. As a result the subwalk inside the blossom is always even. In generalized
matching problems, this subwalk can be either even or odd, and may contain a cycle. In general,
an alternating walk enters the blossom at the base edge and can leave the blossom at any nonbase
edge.
We also define the notion of maturity for blossoms, for both f -factor and f -edge cover. For
simplicity let us focus on f -factor first. By complementary slackness, we can only assign a positive
z(B, I) for the pair (B, I) if it satisfies the constraint |F ∩ (γ(B) ∪ I)| ≤ b(f (B) + |I|)/2c with
equality. This requirement can be captured in the following definition:
Definition 3 (Mature Blossom). A blossom is mature w.r.t an f -factor F if it satisfies the following:
1. Every vertex v ∈ B \ {β(B)} is saturated: degF (v) = f (v).
2. def(β(B)) = 0 or 1. If def(β(B)) = 1, B must be a light blossom and η(B) = ∅; If def(β(B)) =
0, η(B) 6= ∅.
This is motivated by two observations:
1. Complementary slackness: dual variables can be positive only if its primal constraint is satisfied
with kequality, i.e. a blossom can have a positive z-value only if |F ∩ (γ(B) ∪ I(B))| =
j
f (B)+I(B)
.
2
2. Topology of Augmenting Walks: Unsaturated heavy blossoms cannot start or end an augmenting walk since we cannot extend it to an augmenting walk in G that starts with an unmatched
edge.
Several remarks can be made here:
• A blossom that is not mature may contain an augmenting walk. Specifically, suppose B is light
and unsaturated. If any nonbase vertex v 6= β(B) in B is also unsaturated, the odd length
alternating walk from β(B) to v satisfies the definition of an augmenting walk. Moreover,
if β(B) has deficiency of 2 or more, the odd length alternating walk from β(B) to β(B) is
augmenting. For these reasons we never contract immature blossoms.
j
k
• The maturity of an f -factor blossom B will imply |F ∩ (γ(B) ∪ I)| = f (B)+I
, for some set
2
Il ⊆ δ(B).
m Similarly, a mature f -edge cover blossom B satisfies |F ∩ (γ(B) ∪ (δ(B) \ I))| =
f (B)−I
for some I ⊆ δ(B).
2
• Augmentation never destroys maturity. In particular, it never creates an unsaturated heavy
blossom.
Maturity for f -edge cover blossoms can be defined similarly and has similar properties.
Definition 4 (Mature Blossom for f -edge cover). A blossom is mature w.r.t an f -edge cover F if
it satisfies the following:
1. Every vertex v ∈ B \ {β(B)} is saturated: degF (v) = f (v).
2. surp(β(B)) = 0 or 1. If surp(β(B)) = 1, B must be a heavy blossom and η(B) = ∅; If
surp(β(B)) = 0, η(B) 6= ∅.
6
v0
v0
v1
v1
v2
v2
v3
v4
v12
v3
v4
v12
v5
v6
v13
v5
v6
v13
v7
v8
v10
v9
v7
v14
v8
v9
v10
v11
v15
v16
v11
v14
v15
v16
Figure 1: Two example of contractable blossoms: Bold edges are matched and thin ones are unmatched. Blossoms are circled with border. Base edges are represented with arrow pointing away
from the blossom.
The algorithm keeps track of a laminar set Ω ⊂ 2V of mature blossoms and maintains a nonnegative z value for each B ∈ Ω with one subset of I(B) ⊆ δ(B) of its neighborhood, defined as
follows.
I(B) = δF (B) ⊕ η(B),
where ⊕ is the symmetric difference operator (XOR). All other subsets
I of δ(B)
j
k will have z(B, I) =
f (B)+|I(B)|
0. If B is a mature blossom, then we have |F ∩ (γ(B) ∪ I(B))| =
(or in f -edge cover:
2
l
m
|F ∩ (γ(B) ∪ (δ(B) \ I(B)))| = f (B)−|I(B)|
).
2
2.3
Augmenting/Reducing Walk
Augmenting walks are the analogy for augmenting paths from ordinary matching. Complications
arise from the fact that an f -factor blossom cannot be treated identically to a single vertex after
it is contracted. For example, in Figure 2, the two edges (v0 , v1 ) and (v4 , v6 ) incident to blossom
{v1 , v2 , v4 , v5 , v3 } are of the same type, both before and after augmenting along hv0 , v1 , v3 , v5 , v4 , v6 i.
This can never happen in ordinary matching! Moreover, augmenting walks can begin and end at the
same vertex and can visit the same vertex multiple times. Hence a naive contraction of a blossom
into a single vertex loses key information about the internal structure of blossoms. Definition 5
characterizes when a walk in the contracted graph can be extended to an augmenting walk.
b be the graph obtained from G by contracting a laminar set Ω of blossoms. Let
Definition 5. Let G
b
b Here {ei } are edges and {Bi } are blossoms or
P = hB0 , e0 , B1 , e1 , ... Bl−1 , el−1 , Bl i be a walk in G.
singletons, with ei ∈ Bi × Bi+1 for all 0 ≤ i < l. We say Pb is an augmenting walk with respect to
the f -factor F if the following requirements are satisfied:
7
v0
v0
v1
v1
v2
v3
v2
v3
v4
v5
v4
v5
v6
v6
Figure 2: An example for how a blossom changes with an augmentation: here the augmenting walk
is hv0 , v1 , v3 , v5 , v4 , v6 i. Notice after rematching, the base edge of the blossom changes from (v0 , v1 )
to (v4 , u6 ), and the blossom turns from a heavy blossom to a light one.
1. Terminal Vertices Requirement: The terminals B0 and Bl must be unsaturated singletons
or unsaturated light blossoms. If P is a closed walk (B0 = Bl ), B0 must be a singleton and
def(β(B0 )) ≥ 2. Otherwise B0 and Bl can be either singletons or blossoms and their deficiency
must be positive.
2. Terminal Edges Requirement: If the terminal vertex B0 (Bl ) is a singleton, the incident terminal edges e0 (el−1 ) must be unmatched. Otherwise they can be either matched or unmatched.
3. Alternation Requirement: Let Bi , 0 < i < l, be an internal singleton or blossom. If Bi is a
singleton, the exactly one of ei−1 and ei is matched. If Bi is a nontrivial blossom, η(Bi ) 6= ∅
and must be one of {ei−1 } or {ei }.
b can be extended
A natural consequence of the above definition is that an augmenting walk in G
to an augmenting walk in G. This is proved exactly as in Lemma 2. Rematching F along an
augmenting walk P means updating F to the symmetric difference F ⊕ P . This will decrease the
total deficiency by 2. Moreover, after rematching along P , every blossom B ∈ Ω still satisfies the
definition for blossoms (with different base vertices and edges).
In f -edge cover, the corresponding notion is called reducing walk. The definition of reducing
walk can be naturally obtained from Definition 5 while replacing “unsaturated”, “deficiency” and
“light” with “oversaturated”, “surplus” and “heavy”. It is also worth pointing out that if an f -factor
F and an f 0 -edge cover F 0 are complement to each other, i.e. F 0 = E \ F and f (v) + f 0 (v) = deg(v),
and they have the same blossom set Ω, then an augmenting walk Pb for F is also a reducing walk
for F 0 .
8
2.4
Complementary Slackness
To characterize an (approximately) optimal solution, we maintain dual functions: y : V 7→ R≥0 and
z : 2V 7→ R≥0 . Here z(B) is short for z(B, I(B)). We do not explicitly maintain the edge dual
u : E 7→ R≥0 since its maximizing value can be explicitly given by u(e) = max{w(e) − yz(e), 0}.
For f -factor F , the following property characterizes an approximate maximum weight f -factor:
Property 1 (Approximate Complementary Slackness for f -factor). Let δ1 , δ2 ≥ 0 be nonnegative
parameters. We say an f -factor F , duals y, z, and the set of blossoms Ω satisfies (δ1 , δ2 )-approximate
complementary slackness if the following hold:
1. Approximate Domination. For each unmatched edge e ∈ E \ F , yz(e) ≥ w(e) − δ1 .
2. Approximate Tightness. For each matched edge e ∈ F , yz(e) ≤ w(e) + δ2 .
j
k
3. Blossom Maturity. For each blossom B ∈ Ω, |F ∩ (γ(B) ∪ I(B))| = f (B)+|I(B)|
.
2
4. Unsaturated Vertices’ Duals. For each unsaturated vertex v, y(v) = 0.
The following lemma states Property 1 characterizes an approximately optimal solution.
Lemma 6. Let F be an f -factor in G along with duals y, z and let F ∗ be the maximum weight
f -factor. If F, Ω, y, z satisfy Property 1 with parameters δ1 and δ2 , we have
w(F ) ≥ w(F ∗ ) − δ1 |F ∗ | − δ2 |F |.
Proof. We first define u : E 7→ R as
(
w(e) − yz(e) + δ2 ,
u(e) =
0,
if e ∈ F .
otherwise.
From Approximate Tightness, we have u(e) ≥ 0 for all e ∈ E. Moreover, yz(e) + u(e) ≥ w(e) − δ1
for all e ∈ E and yz(e) + u(e) = w(e) + δ2 for all e ∈ F . This gives the following:
X
X
w(F ) =
w(e) =
(yz(e) + u(e) − δ2 )
e∈F
=
X
e∈F
degF (v)y(v) +
v∈V
X
|F ∩ (γ(B) ∪ I(B))|z(B) +
B∈Ω
X
u(e) − |F |δ2
e∈F
By Property 1 (Unsaturated Vertices’ Duals, Blossom Maturity, and the definition of u), this is
equal to
X
X
X f (B) + |I(B)|
z(B) +
u(e) − |F |δ2
=
f (v)y(v) +
2
e∈E
v∈V
B∈Ω
X
X
X
∗
≥
degF ∗ (v)y(v) +
|F ∩ (γ(B) ∪ I(B))|z(B) +
u(e) − |F |δ2
v∈V
=
X
e∈F ∗
B∈Ω
(yz(e) + u(e)) − |F |δ2
e∈F ∗
≥
X
(w(e) − δ1 ) − |F |δ2 = w(F ∗ ) − |F ∗ |δ1 − |F |δ2 .
e∈F ∗
9
Connection Between f -Factors and f -Edge Covers
3
The classical approach for solving fC -edge cover problem is reducing it to fF -factor. Specifically,
looking for a minimum weight fC -edge cover C can be seen as choosing edges that are not in C,
which is a maximum weight fF -factor where fF (u) = deg(u) − fC (u).
The main drawback of this reduction is that it yields inefficient algorithms. For example,
Gabow’s algorithms [11] for solving maximum weight fF -factor scales linearly with fF (V ), which
makes it undesirable when fC is small. Even for fC (V ) = O(n), Gabow’s algorithm runs in
O(m2 + mn log n) time. Moreover, this reduction is not approximation-preserving. In other words,
the complement of an arbitrary (1 − )-approximate maximum weight fF -factor is not guaranteed
to be a (1 + )-approximate fC -edge cover.
In this section we establish two results: First we prove that a folklore reduction from 1-edge cover
to matching is approximation preserving. This allows us to use an efficient approximate matching
algorithm to solve the weighted 1-edge cover problem. Then we establish the connection between
approximate fF -factor and approximate fC -edge cover using approximate complementary slackness
from the previous section. This will give a (1 + )-approximate minimum weight fC -edge cover
algorithm from our (1 − ) approximate maximum weight fF -factor algorithm.
3.1
Approximate Preserving Reduction from 1-Edge Cover to 1-Factors
The edge cover problem is a special case of f -edge cover where f is 1 everywhere. The minimum
weight edge cover problem is reducible to maximum weight matching, simply reweighting edges [21].
Let e(v) be any edge with minimum weight in δ(v) and let µ(v) = w(e(v)). Define a new weight
function w0 as follows
w0 (u, v) = µ(u) + µ(v) − w(u, v).
Schrijver [21, §27] showed the following theorem:
Theorem 7. Let M ∗ be a maximum weight matching with respect to weight function w0 , and C =
M ∗ ∪{e(v) : v ∈ V \V (M )}. Then C is a minimum weight edge cover with respect to weight function
w.
We show this reduction is also approximation preserving.
Theorem 8. Let M 0 be a (1 − )-maximum weight matching with respect to weight function w0 , and
C 0 = M 0 ∪ {e(v) : v ∈ V \ V (M 0 )}. Then C 0 is a (1 + )-minimum weight edge cover with respect to
weight function w.
Proof. Let C ∗ and M ∗ be the optimal edge cover and matching defined previously. By construction,
we have
w(C 0 ) = w(M 0 ) + µ(V \ V (M 0 )) = µ(V (M 0 )) − w0 (M 0 ) + µ(V \ V (M 0 )) = µ(V ) − w0 (M 0 )
Similarly, we have w(C ∗ ) = µ(V ) − w0 (M ∗ ). Then
w(C 0 ) = µ(V ) − w0 (M ) ≤ µ(V ) − (1 − )w0 (M ∗ ) = w(C ∗ ) + w0 (M ∗ ) ≤ (1 + )w(C ∗ ).
The last inequality holds because we have w0 (u, v) = µ(u) + µ(v) − w(u, v) ≤ w(u, v).
The reduction does not naturally extend to f -edge cover. In the next section we will show how
to obtain a (1 + )-approximate f -edge cover algorithm from a (1 − )-approximate f -factor within
the primal-dual framework.
10
3.2
From f -factor to f -edge cover
We show that a primal-dual algorithm computing a (1−)-approximate f -factor can used to compute
an (1 + )-approximate f -edge cover. We start by giving the approximate complementary slackness
for f -edge cover. Similar to f -factor, the property characterizes a good approximate f -edge cover.
Property 2 (Approximate Complementary Slackness for f -edge cover). Let δ1 , δ2 ≥ 0 be positive
parameters. We say an f -edge cover C, with duals y, z and blossom family Ω satisfies the (δ1 , δ2 )approximate complementary slackness if the following requirements holds:
1. Approximate Domination. For each unmatched edge e ∈ E \ C, yzC (e) ≤ w(e) + δ1 .
2. Approximate Tightness. For each matched edge e ∈ C, yzC (e) ≥ w(e) − δ2 .
3. Blossom Maturity. For each blossom B ∈ Ω, |C ∩ (γ(B) ∪ (δ(B) \ IC (B)))| =
l
f (B)−|IC (B)|
2
m
.
4. Oversaturated Vertices’ Duals. For each oversaturated vertex v, y(v) = 0.
Recall that we are using the aggregated duals yzC for f -edge cover:
X
yzC (u, v) = y(u) + y(v) +
z(B)
B:(u,v)∈γ(B)∪(δ(B)\IC (B))
The proof for the following Lemma 9 is identical to Lemma 6.
Lemma 9. Let C be an f -edge cover with duals y, z, Ω satisfying Property 2 with parameters δ1
and δ2 , and let C ∗ be the minimum weight f -edge cover. We have w(C) ≤ w(C ∗ ) + δ1 |C ∗ | + δ2 |C|.
Suppose we have an f 0 -factor F with blossoms Ω and duals y, z satisfying Property 1 and let C
be an f -edge cover that is F ’s complement. The key observation is that the same blossom set Ω
and duals y, z can be used to show Property 2 for C. Specifically, we have the following lemma,
Lemma 10. If the duals y, z, Ω and an f 0 -factor F satisfy Property 1 with parameters δ10 , δ20 , then
the same duals y, z, Ω and the complementary f -edge cover C = E \ F satisfies Property 2 with
parameter δ1 = δ20 and δ2 = δ10 .
Proof. It is trivial to see Property 2(4) (Oversaturated Vertices’ Duals) and Property 1(4) (Unsaturated Vertices’ Duals) are equivalent to each other.
To show Property 2(1,2) is equivalent to Property 1(2,1), it suffices to show that the function
yzF for f 0 -factor F agrees with the function yzC for its f -edge cover complement C. Recall that
X
yzC (u, v) = y(u) + y(v) +
z(B)
B:(u,v)∈γ(B)∪(δ(B)\IC (B))
X
yzF (u, v) = y(u) + y(v) +
z(B)
B:(u,v)∈γ(B)∪IF (B)
Here IC and IF refer to the I-sets of a blossom with respect to the f -edge cover C and the
f 0 -factor F . It suffices to show that IF (B) = δ(B) \ IC (B):
IF (B) = η(B) ⊕ δF (B) = η(B) ⊕ (δ(B) ⊕ δC (B))
= δ(B) ⊕ (η(B) ⊕ δC (B)) = δ(B) \ IC (B)
11
v0
v0
v1
v6
v1
v7
v2
v3
v8
v4
v5
v9
v6
v7
v2
v3
v8
v4
v5
v9
Figure 3: Illustration on relation between I-set of an f -factor and the I-set of its complementary
f 0 -edge cover. Here figures on the left demonstrate an f -factor and its complementary f 0 -cover is
on the right. Their I-sets are circled (dashed).
Therefore, in yzF (e) and yzC (e), z-values are summed up over the same set of blossoms in Ω. In
other words, yzF (e) = yzC (e) for each e ∈ E and the claim follows
For Blossom Maturity in Property 1 and Property 2, we argue that one equality implies the other.
Suppose η(B) ⊂ F . We have IC (B) = δC (B) \ η(B). Therefore the edge set C ∩ (γ(B) ∪ (δ(B) \
IC (B))) contains edges with both endpoints inside B plus the edge η(B), while f (B) − |IC (B)| =
f (B) − degC (B) + 1 is a lower bound on how
this set of edges can have inside B.
l many endpoints
m
f (B)−|IC (B)|
Equality |C ∩ (γ(B) ∪ (δ(B) \ IC (B)))| =
implies f (v) = degC (v) for every v ∈ B.
2
This further implies that f 0 -factor F also saturates every vertex v ∈ B w.r.t. f 0 . Therefore, equality
in Property 1(3) holds. If η(B) 6⊂ C, then IC (B) = δC (B), the edge set C ∩ (γ(B) ∪ (δ(B) \ IC (B)))
contains edges with both endpoints inside B only. Similarly, f (B) − |IC (B)| = f (B) − degC (B) is
al lower bound
m on the total number of their endpoints. Equality |C ∩ (γ(B) ∪ (δ(B) \ IC (B)))| =
f (B)−|IC (B)|
again implies every vertex in B is saturated so Property 1(3) is satisfied. Notice
2
that the same arugment also applies to the case when η(B) = ∅. This completes the proof that
Property 2(3) implies Property 1(3). The other direction is symmetric.
4
Approximation Algorithms for f -Factor and f -Edge Cover
In this section, we prove the main result by giving an approximation algorithm for computing
(1 − )-approximate maximum weight f -factor. The crux of the result is an implementation of
Edmonds’ search with relaxed complementary slackness as the eligibility criterion. The notion
of approximate complementary slackness was introduced by Gabow and Tarjan for both bipartite
matching [14] and general matching [15]. Gabow gave an implementation of Edmonds’ search with
exact complementary slackness for f -factor problem [11], which finds augmenting walks one at a
time. The main contribution of this section is to adapt [11] to approximate complementary slackness
to facilitate finding augmenting walks in batches.
To illustrate how this works, we will first give an approximation algorithm for f -factor in graph
with small edge weights. Let w(·) be a positive weight function w : E 7→ {1, ... , W }. The algorithm
12
computes a (1 − )-approximate maximum weight f -factor in O(mW −1 ) time, independent of f .
We also show how to use scaling techniques to transform this algorithm to run in O(m−1 log −1 )
time, independent of W .
4.1
Approximation for small weights
The main procedure in our O(mW −1 ) time algorithm is called Edmonds’ search. In one iteration,
Edmonds’ search finds a set of augmenting walks using eligible edges, creates and dissolve blossoms,
and performs Dual Adjustment on y and z while maintaining the following Invariant:
Invariant 1 (Approximate Complementary Slackness). Let δ > 0 be some parameter such that w(e)
is a multiple of δ, for all e ∈ E:
1. Granularity. y-values are multiples of δ/2 and z-values are multiples of δ.
2. Approximate
Domination. For each unmatched edge and each blossom edge e ∈ (E \ F ) ∪
S
( B∈Ω EB ), yz(e) ≥ w(e) − δ.
S
3. Tightness. For each matched and each blossom edge e ∈ F ∪ ( B∈Ω EB ), yz(e) ≤ w(e).
j
k
4. Blossom Maturity. For each blossom B ∈ Ω, |F ∩ (γ(B) ∪ I(B))| = f (B)+|I(B)|
.
2
5. Unsaturated Vertices. All unsaturated vertices have the same y-value; their y-values are strictly
less than the y-values of other vertices.
Notice that here we relax Property 1(4) to allow unsaturated vertices to have positive y-values.
The purpose of Edmonds’ search is to decrease the y-values for all unsaturated vertices while maintaining Invariant 1. Following [15, 5, 6], we define the following eligibility criterion:
Criterion 1. An edge (u, v) is eligible if it satisfies one of the following:
1. e ∈ EB for some B ∈ Ω.
2. e 6∈ F and yz(e) = w(e) − δ.
3. e ∈ F and yz(e) = w(e).
A key property of this definition is that it is asymmetric for matched and unmatched edges. As
a result, if we augment along an eligible augmenting walk P , all edges in P , except for those in
contracted blossoms, will become ineligible.
[
Let Gelig be the graph obtained from G by discarding all ineligible edges, and let G
elig = Gelig /Ω
be obtained from Gelig by contracting all blossoms in Ω. For initialization, we set F = ∅, y = W/2,
z = 0, Ω = ∅. Edmonds’ search repeatedly executes the following Augmentation and Blossom
Formation, Dual Adjustment, and Blossom Dissolution steps until all unsaturated vertices have 0
y-values. See Figure 4.
Let us define what we mean by reachable vertices in Steps 1–3 of the algorithm, as well as
inner/outer labelling of blossoms and singletons. We start by defining the notion of alternation
that follows from Definition 5 of an augmenting walk. We say two edges e, e0 incident to a blossom/singleton B alternate if either B is a singleton and e and e0 are of different types, or B is a
13
b of augmenting path with
1. Augmentation and Blossom Formation. Find a maximal set Ψ
0
b in Gelig .
[
a maximal set of reachable mature blossom Ω in Gelig ; Ψ be the preimage of Ψ
S
[
Update F ← F ⊕ P ∈Ψ P and Ω ← Ω ∪ Ω0 . After this step, the new G
elig contains no
4
augmenting walk as well as no reachable blossoms .
[
2. Dual Adjustment. Let Sb be the set of vertices from G
elig reachable from an unsaturated
vertex via an eligible alternating walk. We classify vertices in Sb into Vc
in , the set of inner
5
vertices and Vd
out , the set of outer vertices . Let Vin and Vout be the set of original vertices
d
in V represented by Vc
in and Vout . Adjust the y and z values as follows:
y(v) ← y(v) − δ/2, if v ∈ Vout
y(v) ← y(v) + δ/2, if v ∈ Vin
z(B) ← z(B) + δ, if B is a root blossom in Vbout
z(B) ← z(B) − δ, if B is a root blossom in Vbin
3. Blossom Dissolution. After Dual Adjustment some root blossoms in Ω might have 0 zvalue. Remove them from Ω until none exists. Update Ω and Gelig . Notice that root
blossoms with 0 z-value can be generated because some root blossoms have their z-value
decremented in Dual Adjustment step, or root blossoms formed in Augmentation step
become unreachable after augmentation and thus do not get their z-value incremented.
Figure 4: A (1 − )-approximate f -factor algorithm for small integer weights.
nontrivial blossom, and |η(B) ∩ {e, e0 }| = 1. An alternating path P in the contracted graph is one
where every two consecutive edges alternates.
The search forest Sb consists of blossoms and singletons that are reachable from some unsaturated
[
blossom/singleton, via an eligible alternating path in G
elig . Furthermore, we require that the
preimage of those paths in Gelig start with an unsaturated vertex and an unmatched edge. It
follows that the roots of Sb can only be unsaturated singletons or unsaturated light blossoms. We
label the root vertices outer. If v is a nonroot vertex in the search forest let τ (v) be the edge in Sb
pointing to the parent of v. The inner/outer status of vertices is defined as follows:
Definition 11. A vertex v is outer if one of the following is satisfied:
1. v is the root of a search tree.
5
We observe that since augmenting along an eligible augmenting walk does not make any ineligible edges eligible,
any blossoms that is reachable after augmentation must also be reachable before it. Hence we do not have to further
contract any blossom after the augmentation.
5
In actual implementation we can reuse the inner/outer label from the previous Augmentation and Blossom
Formation step for dual adjustment. The reason is that augmenting along an eligible augmenting path will not create
any eligible edges, and will not make any unreachable vertex reachable. Moreover, the depth first nature of the search
tree guarantees that vertices on the augmenting path, if remains reachable, will still inherit its inner/outer label
before augmentation.
14
2. v is a singleton and τ (v) ∈ F .
3. v is a nontrivial blossom and τ (v) = η(v).
Otherwise, one the the following holds and v is classified as inner:
1. v is a singleton and τ (v) ∈ E\F .
2. v is a nontrivial blossom and τ (v) 6= η(v).
b call it Tb, can be grown by repeatedly attaching a child v to
An individual search tree in S,
b Let Bu denote the root blossom in Ω
its parent u using an edge (u, v) that is eligible for u in S.
containing u. We say an edge (u, v) ∈ E is eligible for u if it is eligible and one of the following is
satisfied:
1. u is an outer singleton and e 6∈ F .
2. Bu is an outer blossom and e 6= η(Bu ).
3. u is an inner singleton and e ∈ F .
4. Bu is an inner blossom and e = η(Bu ).
Hence, Sb consists of singletons and blossoms that are reachable from an unsaturated singleton
or light blossom, via an eligible alternating path whose preimage starts with an unsaturated vertex
and an unmatched edge. For simplicity, we call such blossoms and singletons reachable, and all
other singletons and blossoms unreachable. A vertex v from the original graph Gelig is reachable
[
(unreachable) if Bv is reachable (unreachable) in G
elig .
In our version of Edmonds’ Search, primal and dual variables are initialized in a way that Property 1(1) (Approximate Domination) is always satisfied, and Property 1 (Approximate Tightness) is
vacuous (as the f -factor is initially empty) but Property 1(4) (Unsaturated Vertices) is not. For this
reason, there is a large gap between primal and dual objective at the beginning of the algorithm,
which can be evaluated by the following:
yz(V ) − w(F ) =
X
f (v)y(v) +
v∈V
=
X
X f (B) + |I(B)|
2
B∈Ω
z(B) +
X
u(e) −
e∈E
X
w(e)
e∈F
def(v)y(v).
v∈V
The goal of the algorithm can be seen as bridging the gap between the primal objective and dual
objective while preserving all other complementary slackness properties. It can be achieve in two
ways. Augmentations enlarge the f -factor by augmenting F along some augmenting walk P . This
will reduce the total deficiency on the vertex set V . Dual Adjustments change the dual variables in
a way that decreases the y-value on unsaturated vertices while maintaining other complementary
slackness condition. In this algorithm, the progress of Edmonds’ Search is measured by the latter,
i.e., the overall reduction in y-values of unsaturated vertices.
The correctness of our algorithm reduces to showing that Augmentation and Blossom Formation,
Blossom Dissolution, and Dual Adjustment all preserve Invariant 1.
Lemma 12. Augmentation and Blossom Formation preserves Invariant 1.
15
v0
v1
v2
v18
v3
v4
v5
v6
v7
v19
v20
v8
v9
v10
v21
v22
v11
v12
v13
v23
v24
v14
v15
v16
v27
v25
v17
v26
Figure 5: An example of an eligible alternating search tree. Outer blossoms and singletons are
labeled using solid boundaries while inner blossoms and singletons have dashed boundaries.
16
Proof. We first show that the identity of I(B) is invariant under augmentation; in particular,
augmenting walks that intersect B do not affect I(B). As a result, the function yz(·) is invariant
under augmentation. We use I(B), η(B) and I 0 (B), η 0 (B) to denote the I-set and base edge of B
before and after the augmentation. By Definition 5 (augmenting walks), if P intersects B, then
δP (B) = η(B) ∪ η 0 (B) = η(B) ⊕ η 0 (B)
Let F and F 0 be the f -factor before and after augmentation. We have
δF 0 (B) = δF (B) ⊕ δP (B)
Combining both equations, we have
δF 0 (B) = δF (B) ⊕ (η(B) ⊕ η 0 (B))
Hence
I 0 (B) = δF 0 (B) ⊕ η 0 (B) = δF (B) ⊕ η(B) = I(B).
S
By Invariant 1, any blossom edge e ∈ B∈Ω EB satisfies both Approximate Domination as well
as Tightness, so it continues to satisfy these Invariants after augmentation. For any eligible edge not
in EB for any B ∈ Ω, by Criterion 1, if e ∈ F , yz(e) = w(e) − δ, thus after augmentation its duals
satisfy Approximate Domination. If e is unmatched, yz(e) = w(e), so its duals satisfy Tightness
after augmentation.
Augmentation preserves maturity of blossoms. For any vertex v in a nonterminal blossom B,
degF (v) = deg0F (v) = f (v), so maturity is naturally preserved. If B is a terminal blossom, we have
degF (v) = f (v)−1 for v = β(B) and degF (v) = f (v) for all v 6= β(B). Moreover, after augmentation
B always has a base edge η(B) = δP (B). Therefore, B is also mature after augmentation.
All the newly formed blossom in this step must be mature and have 0 z-values, so the value of
the yz function is unchanged and all the invariants are preserved.
Lemma 13. Blossom Dissolution both preserve Invariant 1.
Proof. Discarding blossoms of 0 z-values preserves the value of the yz function and Hence preserves
the invariants.
The crux of the proof is to show that Dual Adjustment also preserves Invariant 1, in particular
Approximate Domination and Tightness. Before proving the correctness of Dual Adjustment, we
first prove the following parity lemma, which was first used in [15]; we generalize it to f -factor:
Lemma 14 (Parity). Let Sb be the search forest defined as above. Let S be the preimage of Sb in G.
The y-value of every vertex in S has the same parity, as a multiple of δ/2.
Proof. The claim clearly holds after initialization as all vertices have the same y-values. Because
every eligible P
edge (u, v) ∈ Sb that straddles two singletons or blossoms must have yz(u, v) =
y(u) + y(v) + B:(u,v)∈γ(B)∪I(B) z(B) being a multiple of δ, and z-values are always multiples of δ,
y(u) and y(v) will always share the same parity, as multiple of δ/2. Therefore it suffices to show
that every vertex in a blossom B ∈ Ω has the same parity.
To prove this, we only need to show that Blossom Formation step only groups vertices with same
parity together. This is because new blossoms B are formed with when edges in CB are eligible
17
because of Criterion 1(2,3), this means their endpoints share the same parity. Hence by induction,
all vertices in B also share the same parity. The Dual Adjustment step also preserves this property
as vertices in a blossom will have the same inner/outer classification and thus have their y-values
all incremented or decremented by δ/2.
Lemma 15. Dual Adjustment preserves Invariant 1.
Proof. We focus on (2)(Approximate Domination) and (3)(Tightness). Other invariants are not
affected by Dual Adjustment.
There are much more cases to consider in f -factor compared to ordinary matching. Different
cases can be generated for an edge (u, v) by considering (1) the inner/outer classification of both
endpoints, (2) whether (u, v) is matched, (3) whether (u, v) is the base edge for its respective
endpoints, if they are in blossoms, and (5) whether (u, v) is eligible. In the following analysis, we
narrow down the number of meaningful cases to just 8.
We consider an edge e = (u, v). If u and v are both unreachable from any unsaturated vertex,
or both are in the same root blossom, yz(u, v) clearly remains unchanged after the dual adjustment.
Therefore we can assume Bu 6= Bv and at least one of them, say Bu , is reachable. Every reachable
endpoint will contribute a change of ±δ/2 to yz(u, v). This is the adjustment ofPy(u), plus the
adjustment of z(Bu ) if e ∈ I(Bu ). Let ∆e (u) be the net change of the quantity y(u)+ e∈I(Bu ) z(Bu ).
We omit e and use ∆(u) when the edge e we are considering is clear. By how we perform Dual
Adjustment, we have the following scenarios:
1. ∆(u) = +δ/2: This occurs if u is an inner singleton, or Bu is an outer blossom with e ∈ I(Bu ),
or an inner blossom with e 6∈ I(Bu ).
2. ∆(u) = −δ/2: This occurs if u is an outer singleton, or Bu is an inner blossom with e ∈ I(Bu ),
or an outer blossom with e 6∈ I(Bu ).
Then we consider the effect of a Dual Adjustment on edge e = (u, v). First we consider the case
b In this case only u will introduce a change on
when exactly one of Bu and Bv , say Bu , is in S.
yz(u, v):
Case 1: u is an inner singleton: Here ∆(u) = +δ/2. In this case Approximate Domination is
preserved, so we only need to worry about approximate tightness and hence assume e ∈ F . Since
b e cannot be eligible, or Bv would have been included in Sb as a child of Bu . Hence
Bv is not in S,
yz(e) < w(e). By Granularity, yz(e) ≤ w(e) − δ/2. Therefore we have yz(e) ≤ w(e) after the Dual
Adjustment.
Case 2: u is an outer singleton: Here ∆(u) = −δ/2. In this case Tightness is preserved and
we only need to worry about approximate dominination when e 6∈ F . Similar to Case 1, e must be
ineligible and yz(e) ≥ w(e) − δ/2. After Dual Adjustment we have yz(e) ≥ w(e) − δ.
Case 3: Bu is an inner blossom: We divide the cases according to whether e is matched or not.
Subcase 3.1: e ∈ F . If e 6∈ η(Bu ), then e ∈ I(Bu ) and ∆(u) = −δ/2. In this case Tightness
is preserved. If e ∈ η(Bu ), then e 6∈ I(Bu ) and ∆(u) = +δ/2. But e cannot be eligible since
otherwise Bv must be in the search tree, so we have yz(e) ≤ w(e) − δ/2 and yz(e) ≤ w(e) after
Dual Adjustment.
Subcase 3.2: e 6∈ F . This is basically symmetric to Subcase 3.1. If e ∈ η(Bu ), then e ∈ I(Bu )
and ∆(u) = −δ/2. But e cannot be eligible therefore yz(e) ≥ w(e) − δ/2, and yz(e) ≥ w(e) − δ after
18
Dual Adjustment. If e 6∈ η(Bu ), then e 6∈ I(Bu ) and ∆(u) = +δ/2, so approximate Domination is
preserved.
Case 4: Bu is an outer blossom:
Subcase 4.1: e ∈ F . If e ∈ η(Bu ), then Bv must be the parent of Bu in the search tree,
b Thus e 6∈ η(Bu ), so e ∈ I(Bu ) and ∆(u) = +δ/2. Since
contradicting the fact that Bv 6∈ S.
Bv is not reachable, e cannot be eligible, so yz(u, v) ≤ w(e) − δ/2 before Dual Adjustment and
yz(u, v) ≤ w(e) afterward.
Subcase 4.2: e 6∈ F . Similarly, e 6∈ η(Bu ), so e 6∈ I(Bu ) and ∆(u) = −δ/2. Similarly Bv is not
reachable so e cannot be eligible. Therefore we have yz(u, v) ≥ w(e) − δ/2 and yz(u, v) ≥ w(e) − δ
after Dual Adjustment.
This completes the case when exactly one of e’s endpoints is reachable. The following part will
complete the argument for when both endpoints are reachable. We argue that three scenarios can
happen: either ∆(u) and ∆(v) are of opposite signs and cancel each other out, or ∆(u) and ∆(v)
are of the same sign and the sign aligns with the property we wish to keep, or if both cases does
not hold, we use Lemma 14(Parity) to argue that there is enough room for Dual Adjustment not to
violate Approximate Domination or Tightness.
b In this case we assume Bu is the parent of Bv and e is the
We first examine tree edges in S.
parent edge of Bv . Hence e must be eligible for Bu . We argue by the sign of ∆(u).
Case 5: ∆(u) = +δ/2:
There are three cases here: u is an inner singleton, Bu is an outer blossom with e ∈ I(Bu ), or
Bu is an inner blossom with e 6∈ I(Bu ). We first observe that in all three cases, e ∈ F . This is
straightforward when u is an inner singleton. If Bu is an outer blossom with e ∈ I(Bu ), we know
that since Bu is outer, e 6∈ η(Bu ), so therefore e ∈ F . If Bu is an inner singleton with e 6∈ I(Bu ),
since Bu is inner, e ∈ η(Bu ), so combined with the fact that e 6∈ I(Bu ) we have e ∈ F .
Notice that since Bu is the parent of Bv , and e ∈ F , v can be an outer singleton, or Bv is
an outer blossom with e ∈ η(Bv ), or Bv is an inner blossom with e 6∈ η(Bv ). In the second case
e 6∈ I(Bv ) and in the third case e ∈ I(Bv ). In all three cases we have ∆(v) = −δ/2, and yz(e)
remains unchanged.
Case 6: ∆(u) = −δ/2: Case 6 is symmetric to Case 5. Bu can either be an outer singleton,
an inner blossom with e ∈ I(Bu ) or an outer blossom with e 6∈ I(Bu ). In all cases, the fact that e
must be eligible for Bu implies e 6∈ F , and Bv can only be an inner singleton, an outer blossom with
e ∈ I(Bu ) or an inner blossom with e 6∈ I(Bv ). Hence we have ∆(v) = +δ/2 so yz(e) still remains
constant.
Now suppose Bu and Bv are both in Sb but (u, v) is not a tree edge. We still break the cases
according to the sign of ∆(u) and ∆(v). Here we only need to consider when ∆(u) = ∆(v), since
otherwise they cancel each other and yz(e) remains constant.
Case 7: ∆(u) = ∆(v) = δ/2. In this case yz(e) is incremented by δ. Therefore we only need to
worry about Tightness when e ∈ F . Notice that Bu can only be an inner singleton, an outer blossom
with e ∈ I(Bu ) or an inner blossom with e 6∈ I(Bu ). When Bu is an outer blossom, e 6∈ η(Bu ).
When Bu is an inner blossom, since e ∈ F and e 6∈ I(Bu ), e ∈ η(Bu ). The same holds for the other
endpoint Bv .
It is easy to verify that in all cases, e is eligible for Bu (or Bv ) if and only if e is eligible.
But notice that after Augmentation and Blossom Formation steps, there is no augmenting walk or
19
[
reachable blossom in G
elig , i.e., there cannot be an edge (u, v) that is eligible for both endpoints
Bu and Bv since otherwise you can find an augmenting walk or a new reachable blossom. Thus
e is ineligible and yz(e) < w(e). But by Invariant 1 (1) (Granularity) and Lemma 14 (Parity),
both w(e) and yz(e) must be multiples of δ. Therefore we have yz(e) ≤ w(e) − δ. This implies
yz(e) ≤ w(e) after Dual Adjustment.
Case 8: ∆(u) = ∆(v) = −δ/2. Here yz(e) is decremented by δ. Similar to the case above, we
can assume e 6∈ F and only focus on Approximate Domination. Bu can be an outer singleton, inner
blossom with e ∈ I(Bu ), or outer blossom with e 6∈ I(Bu ). Since e 6∈ F , e ∈ I(Bu ) if and only if
e ∈ η(Bu ). Therefore if e is eligible, e must be eligible for both Bu and Bv . But similar to Case 7, e
being eligible for both endpoints will lead to the discovery of additional blossom or augmenting walk
in Gelig , which is impossible after Augmentation and Blossom Formation. Therefore we conclude in
this case e is ineligible and yz(e) > w(e) − δ. By Lemma 14(Parity), we have yz(e) ≥ w(e) before
Dual Adjustment, so Approximate Domination still holds after Dual Adjustment.
Theorem 16. A (1 − )-approximate f -factor can be computed in O(W m−1 ) time.
Proof. By setting δ = 1/ −1 ≤ , y-values of unsaturated vertices takes (W/2)/(δ/2) = O(W −1 )
iterations to reach 0 and thus satisfying Property 1 with δ1 = δ, δ2 = 0. By invoking Lemma 6, with
F ∗ being the optimum f -factor, we have
w(F ) ≥ w(F ∗ ) − |F ∗ |δ ≥ w(F ∗ ) − w(F ∗ )δ ≥ (1 − )w(F ∗ ).
For the running time, each iteration of Augmentation, Blossom Formation, Dual Adjustment
and Blossom Dissolution can be implemented in linear time. We defer the detail implementation to
Section 5. There are a total of W/δ = O(W −1 ) iterations, so the running time is O(W m−1 ).
As a result of Lemma 10 and Lemma 9, we also obtain the following result:
Corollary 17. A (1 + )-approximate f -edge cover can be computed in O(W m−1 ) time.
4.2
A Scaling Algorithm for General Weight
In this section, we can modify the O(W m−1 ) weighted f -factor algorithm to work on graphs with
general weights. The modification is based on the scaling framework in [5]. The idea is to divide
the algorithm into into L = log W + 1 scales that execute Edmonds’ search with exponentially
diminishing δ. The goal of each scale is to use O(−1 ) Edmonds’ searches to halve the y-value of
all unsaturated vertices while maintaining a more relaxed version of approximate complementary
slackness. By manipulating the weight function, Approximate Domination, which is weak at the
beginning, is strengthened over scales, while Approximate Tightness is weakened in exchange. Assume without loss of generality that W and are powers of two. We define δi , 0 ≤ i < L be the
error parameter for each scale, where δ0 = W and δi = δi−1 /2 for 0 < i < L. Each scale works with
a new weight function wi which is the old weight function rounded down to the nearest multiple of
δi , i.e, wi (e) = δi bw(e)/δi c. In the last scale WL = w. We maintain a scaled version of Invariant 1
at each scale:
Invariant 2 (Scaled approximate complementary slackness with positive unsaturated vertices). At
scale i = 0, 1, ... , L = log W , we maintain the f -factor F , blossoms Ω and duals y, z to satisfy the
following invariant:
20
1. Granularity. All y-values are multiple of δi /2, and z-values are multiple of δi .
2. Approximate Domination. For each e 6∈ F or e ∈ EB for any B ∈ Ω, yz(e) ≥ wi (e) − δi .
3. Approximate Tightness. For each e ∈ F or e ∈ EB for any B ∈ Ω, let j be the index of the
earliest scale that e became matched (e can be unmatched and rematched afterwards). We have
yz(e) ≤ wi (e) + 2δj − 2δi .
j
k
4. Mature Blossoms. For each blossom B ∈ Ω, |F ∩ (γ(B) ∪ I(B))| = f (B)+I(B)
.
2
5. Unsaturated Vertices’ Duals. The y-values of all free vertices are the same and will always be
smaller or equal to the y-values of other vertices.
Based on Invariant 2, Edmonds’ search will use the following Eligibility criterion:
Criterion 2. At scale i, an edge e ∈ E is eligible if one of the following holds
1. e ∈ EB for some B ∈ Ω.
2. e 6∈ F and yz(e) = wi (e) − δi .
3. e ∈ F and yz(e) − wi (e) is a nonnegative multiple of δi .
Before the start of scale 0, the algorithm initializes F, Ω, y, z similar to the algorithm for small
edge weights: y(u) ← W/2, Ω ← ∅, F ← ∅. At scale i, the duals of unsaturated vertices start at
W/2i+1 . We execute (W/2i+2 )/(δi /2) = O(−1 ) iterations of Edmonds’ search with parameter δi
and Criterion 2. The scale terminates when the y-values of unsaturated vertices are decreased to
W/2i+2 , or in the last iteration, terminates as they reach 0.
Notice that although the invariant and the eligibility criterion are changed, the fact that Edmonds’ search preserves the complementary slackness invariant, in particular that Dual Adjustment
preserves approximate domination and approximate tightness still holds here. By the proof of
Lemma 15, as long as the definition of eligibility guarantees the following parity property:
Lemma 18. At any point of scale i, let S be the set of vertices in Gelig reachable from an unsaturated
vertices using eligible edges. The y-value of any vertex v ∈ V with Bv ∈ S has the same parity as
multiple of δi /2.
Dual adjustment never changes the yz-values of edges inside any blossom B ∈ Ω, while it will
have the following effect on edge e if its endpoints are lying in different blossoms:
1. If e 6∈ F and is ineligible, yz(e) might decrease but will never exceed the threshold for eligibility,
i.e, it will not drop below wi (e) − δi .
2. If e 6∈ F and is eligible, yz(e) will never decrease.
3. If e ∈ F and is ineligible, yz(e) might increase but will never exceed the threshold for eligibility,
i.e, it will not raise above wi (e) + 2δj − 2δi .
4. If e ∈ F and is eligible, yz(e) will never increase.
In order words, Dual Adjustment will not destroy Approximate Domination and Approximate Tightness. Therefore Edmonds’ search within scale i will preserve Invariant 2.
We also need to manipulate the duals between different scales to ensure Invariant 2. Formally,
after completion of scale i, we increment all the y-values by δi+1 . This will ensure both approximate
21
domination and approximate tightness holds at scale i + 1: wi+1 (e) ≤ wi (e) + δi+1 , so increasing
y-values by δi+1 ensures Approximate Domination. For Approximate Tightness, we have yz(e) −
wi+1 (e) ≤ 2δj − 2δi + 2δi+1 = 2δj − 2δi+1 , since δi+1 = δi /2.
The algorithm terminates when the y-values of all unsaturated vertices reach 0. It terminates
with an f -factor F and its corresponding duals y, z and Ω satisfying the following property:
Property 3 (Final Complementary Slackness).
1. Approximate Domination. For all e 6∈ F or e ∈ EB for any B ∈ Ω, yz(e) ≥ w(e) − δL .
2. Approximate Tightness. For all e ∈ F or e ∈ EB for any B ∈ Ω, let j be the index of the
earliest scale that e becomes matched (e can be unmatched and rematched afterwards). We
have yz(e) ≤ w(e) + 2δj .
j
k
3. Blossoms Maturity. For all blossoms B ∈ Ω, |F ∩ (γ(B) ∪ I(B))| = f (V )+I(B)
).
2
4. Unsaturated Vertices Duals. The y-values of all free vertices are 0.
This implies domination and tightness are satisfied within some factor 1±O(). For Approximate
Domination this is easy to see since w(e) ≥ 1 and δL = , thus yz(e) ≥ (1 − )w(e) if e 6∈ F . For
Approximate Tightness, we can lower bound the weight of e if e first enters F at scale j. Throughout
scale j, the y-values are at least W/2j+2 , so w(e) ≥ wj (e) ≥ 2(W/2j+2 ) − δj . Since δj = W/2j ,
yz(e) ≤ w(e) + 2δj ≤ (1 + O())w(e) when e ∈ F .
With a similar proof to Lemma 6, we can show this characterizes an (1 − O())-approximate
minimum weight f -factor.
The running time of the algorithm is O(m−1 log W ) because there is a total of log W + 1 scales,
and each scale consists of O(−1 ) iterations of Edmonds’ search that can be implemented in linear
time.
Theorem 19. A (1 − )-approximate maximum weight f -factor can be computed in O(m−1 log W )
time.
Corollary 20. A (1+)-approximate minimum weight f -edge cover can be computed in O(m−1 log W )
time.
4.3
A Linear Time Algorithm
We also point out that by applying techniques in [5, §3.2], the algorithm can be modified to run
in time independent of W . The main idea is to force the algorithm to ignore an edge e for all
but O(log −1 ) scales. Let µi = W/2i be the maximum possible weight of an edge, matched or
unmatched, being eligible during scale i. Let scale(e) be the i such that w(e) ∈ [µi , µi−1 ). We
notice that we can ignore e in any scale j < scale(e). Moreover, we will also forcibly ignore e at
scale j > scale(e) + λ where λ = log −1 + O(1). Ignoring an otherwise eligible edge might cause
violation of approximate tightness and approximate domination. However, since the y-values of free
vertices are O(w(e)) at this point, this violation will only amount to O(w(e)).
To see this, notice that µi is also an upper bound to the amount of change to yz(e) caused
by all Dual Adjustment after scale i. Hence, after scale scale(e) + λ, the total amount of violation to approximate tightness and approximate domination on e can be bounded by µscale(e)+λ =
O()µscale(e) = O()w(e), which guarantees we still get an (1 − O()) approximate solution.
Therefore, every edge takes part in at most log −1 + O(1) scales, with O(−1 ) cost per scale.
The total running time is O(m−1 log −1 ).
22
Theorem 21. A (1−)-approximate maximum weight f -factor and a (1+)-approximate minimum
weight f -edge cover can be computed in O(m−1 log −1 ) time, independent of the weight function.
5
A Linear Time Augmenting Walk Algorithm
This section presents the linear time augmenting walk algorithm used in the Augmentation step of
Edmonds’ search. The goal here is to find a maximal set Ψ of edge disjoint augmenting walks in
the graph Gelig .
The main idea is to apply the modified depth first search of [15, §8], which finds a maximal set of
vertex disjoint augmenting walks for ordinary matching in linear time. There are several difficulties
in adapting algorithm in [15] for f -factor:
1. Instead of vertex disjoint, we are looking for a maximal set of edge disjoint augmenting walks,
which might lead to intersecting search trees.
2. The algorithm needs to be able to identify augmenting cycles, which are not present in the
standard matching problem.
3. The depth first search tree branches on both outer and inner singletons, as well as outer
blossoms.
b = G/Ω with f -factor F . At any moment, we maintain a
The input is a contracted graph G
D
E
c1 , T
c2 , ... , T
ck on a minor of
search forest, which is an ordered set of depth first search trees Sb = T
b where vertices on Tbi are
G . The minor is defined by a dynamic laminar set Ω0 of blossoms on G,
0
6
singletons or maximal blossoms of Ω ∪ Ω. For a vertex v in G, we use Bv to denote the largest
blossom in Ω ∪ Ω0 that contains v. We use Ti to refers to the set of vertices contained in blossoms
of Tbi .
Since search trees are rooted at unsaturated vertices, we can use Definition 11 to define inner/outer vertices in the search forest. This also gives us the set of edges that are eligible for a
vertex in the search forest.
c1 , T
c2 , ... , T
[
Similar to depth first search, T
k−1 are search trees from previously terminated searches.
b
Each Ti can either be a successful search tree, which contains an augmenting walk Pi , or an exhausted
search tree, which is a maximal search tree that does
S not lead to any augmenting walk, in which case
Pi = ∅. The final output of the algorithm is Ψ = i Pi , along with the newly discovered blossoms
in Ω0 , such that Ψ is a maximal set of augmenting walks in Ω0 ∪ Ω.
Invariant 3. For each vertex u in Ti \ Pi , i < k, there is no edge (u, v) that is eligible for u, but v
is in some later search tree Tj with j > i.7
In other words, each vertex u in Ti \ Pi , i < k, is exhausted, that is, every edge that is eligible
for u is scanned by the depth first search procedure. Notice that a vertex can go from being already
exhausted to unexhausted because its inner/outer classification changes and the change introduces
a new set of eligible edges. Therefore, we say a vertex v is outer(inner)-exhausted if it is currently
outer(inner) and all edges eligible for v are scanned.
As in Edmonds Algorithm, Ω0 is the set of blossoms we discovered during the search for augmenting walk
In standard matching, this corresponds to the property that there does not exist an unmatched edge connecting
two outer vertices from different search trees.
6
7
23
Walks in Ψ must be edge disjoint but are not necessarily vertex disjoint. Suppose we scan the
neighborhood of v in the order given by its adjacency list e1 , e2 , ... , edeg(v) . During the algorithm,
each edge in δ(v) is in one of the following three states.
• Explored, indicating the edge is explored from v when building some search tree Tbi , and is
either included in Tbi , or is not included in Tbi because it cannot be used to enlarge Tbi .
• Augmented, indicating the edge is explored from v in some Tbi and is part of Pi .
• Unexplored, indicating it has not been explored in any Tbi yet.
When the algorithm terminates all the unexplored edges in δ(v) will be declared unreachable,
i.e., after removing all the edges in Ψ, the edge cannot be reached via an alternating path starting
from any unsaturated vertex. This will be stated in Lemma 22.
The main complication of our algorithm is the alternating structure of the search tree, which
necessitates the maintenance of a maximal set of blossoms. Maintaining a maximal set of blossoms
allows us to completely decide for each vertex v, whether there is an even and odd length alternating
path from an unsaturated vertex to v. We can reduce it to maintaining the following Invariant:
Invariant 4. If (u, v) is an edge such that (u, v) is scanned from both u and v, u and v must be in
the same blossom.
ck , referred to as the active search tree, is the search
The last search tree in the search forest T
tree that the algorithm is currently growing. The algorithm grows the search tree in a depth first
ck consisting of all vertices that we have
manner by extending the active walk, Pactive , i.e., a walk in T
not finish exploring yet. The rest of the Invariant states the topology of the search tree as well as
its depth first property.
Invariant 5.
E
D
c1 , T
c2 , ... , T
ck consists of edge disjoint alternating trees in the graph
1. The sequence Sb = T
b = G/(Ω ∪ Ω0 ) that are rooted at unsaturated singletons/light blossoms.
G
2. Edges in Tbi are all explored. If an edge (u, v) is explored but not augmented, then all edges
(v, w) eligible for v must also be explored. If (u, v) is augmented, then its parent edge τ (Bu )
must also be augmented.
3. Vertices in Tbi are singletons or blossoms of Ω ∪ Ω0 . For each tree edge (u, v) = τ (v), (u, v) is
eligible for u.
ck descendant.
4. The active walk Pactive consists of a walk from root to a T
A search tree initially starts with a single unsaturated vertex as its root and the only vertex in
the active path. Suppose a blossom B is the last blossom on the active path. In each iteration, we
scan the next unexplored edge (u, v), u ∈ B that is eligible for B. Depending on where the other
endpoint v is located, we do one of the following:
1. Augmentations: We form an augmenting walk in two situations: (1) when (u, v) is unmatched,
Bv is not saturated and not yet in the active search tree, and (2) when (u, v) is unmatched,
Bv is the singleton root of the active search tree, and def(v) ≥ 2. In both cases we extend
the active walk with (u, v), terminate the search, and make the state of every Pactive edge
augmenting.
24
2. DFS extensions: If the exploration of (u, v) does not lead to an Augmentation step, and either
Bv is a nontrivial blossom not in any search tree, or Bv is a singleton, extend the active walk
ck as Bu ’s child. This corresponds to a grow step in Edmonds’ Search.
to v and put v into T
3. Blossom Formation: If Bv is a descendant of B, and edge (u, v) is also eligible for Bv , we form
ck path from B to Bv . Contract this
a blossom consisting of blossoms and singletons from the T
blossom, call it B 0 , and place the blossom in the active path. Label all these vertices now as
outer and ready to be scanned. Note that all previously inner vertices will go from exhausted
to not exhausted as an outer vertex now.
4. DFS retractions: If every edge (u, v) eligible for B is already scanned, mark B as exhausted
and remove it from the active walk. If B is the only vertex in the active walk, terminate the
search.
After the search terminates and returns with a search tree, we update the deficiency function
(in case we discover an augmenting walk/cycle, and some unsaturated vertices become saturated)
and start a new search at an unsaturated vertex that has not been an exhausted search tree root,
as long as it exists. Notice that the root of a successful search tree can be reused as long as it is
unsaturated after all augmentations so far. The algorithm terminates when all unsaturated vertices
are exhausted, where each vertex is either saturated, or is unsaturated but we cannot discover any
augmenting path starting from it.
We first show after the search terminates, all unexplored edges are not reachable from any
alternating path starting from an unsaturated vertex. This guarantees we did not ignore any edges
that might lead to a new augmenting path.
Lemma 22. When the search terminates, each unexplored edges (u, v) is unreachable from any
alternating path that does not contain any edge in Ψ.
Proof. Suppose an unexplored edge (u, v) is reachable from an alternating path consisting of explored but not augmented edges. Without loss of generality let (u, v) be the first reachable unexplored edge in δ(u) and let (w, u) be the edge that precedes (u, v) in the alternating path. Since
(w, u) is explored but not augmented, all unexplored edges must be explored from u, leading to a
contradiction.
Lemma 23. All operations preserve Invariants 3, 4, and 5.
Proof. Invariant 3 is a natural consequence of depth first search. Invariant 5 (1) is immediate from
how we maintain blossoms and the active walk. Invariant 5 (2) holds because if (u, v) is explored
but, for each (v, w) eligible for v, the search along (v, w) finds no augmenting walk, then every edge
eligible for v must also be explored before the search retracts from u.
To show Invariant 4, notice by the depth first nature of the search tree, Bu and Bv must be
ancestor of one another (otherwise, if Bu is first explored while Bv is not in the search tree, DFS
extension will put Bv into the search tree as Bu child). Suppose Bu is the ancestor of Bv , when we
scan the edge (u, v) from Bu , if (u, v) is not eligible for v and no blossom step can be performed,
the edge (u, v) must be made eligible for Bv in a later blossom step from Bu or an ancestor of Bu ,
to Bv or a descendant of Bv . This puts u and v into the same blossom.
With these invariants, we can show the following lemma:
25
Lemma 24. Any augmenting walk P 0 w.r.t. F ⊕
P ∈ Ψ at an edge.
S
P ∈Ψ P
must intersect some augmenting walk
Proof. Suppose we have an augmenting walk P 0 = hu0 , u1 , ... u2k−2 , u2k−1 , u2k i that does not intersect Ψ at any edge. By Lemma 22, we can assume all edges (ui , ui+1 ) in P 0 must be explored or
ineligible for ui . By termination of the algorithm, u0 must be an exhausted unsaturated vertex so
must be a search tree root. And by definition of augmenting walk (u1 , u2 ) must be eligible for u0
so must be explored. We show by induction that for 0 ≤ i ≤ 2k − 1, (ui , ui+1 ) must be explored
b
and ui+1 must be in the search forest S.
For i = 0, by definition u0 is a search tree root and (u0 , u1 ) is explored from u0 and is eligible for
u0 . This means u1 must also be in the search tree. If ui is in the search tree and (ui , ui+1 ) is explored
from ui . Consider vertex (ui+1 ), since it is in the augmenting walk, by the alternation requirement
for augmenting walk one of (ui , ui+1 ) and (ui+1 , ui+2 ) must be eligible for ui+1 , if (ui+1 , ui+2 ) is
eligible for ui+1 , (ui+1 , ui+2 ) must be explored and we are done. Otherwise, (ui , ui+1 ) is eligible
for both of its endpoints and thus (ui , ui+1 ) must be in the same blossom. In this case, Blossom
Formation step makes (ui+1 , ui+2 ) eligible for ui+1 .
Since all ui ’s is in the search tree and the preceding edge is eligible for its predecessor, ui ’s,
in particular u2k can not be a unsaturated inner singleton or an unsaturated light inner blossom
because otherwise an Augmentation step will be performed. This contradicts the fact that P 0 is an
augmenting walk.
Theorem 25. A maximal set of augmenting walks can be found in linear time.
Proof. The algorithm runs in linear time because each edge is explored at most twice, i.e. once
in each direction. Moreover, blossom structures here can also be maintained in linear time using
incremental-tree disjoint set data structure in [13].
We say a set of nested blossoms Ω0 is maximal if after contracting blossoms in Ω0 , no more contractible blossom that is reachable from an unsaturated vertex can be found. Since all augmenting
walk has been eliminated after Augmentation, this is equivalent to saying that no edge (u, v) is
eligible for both Bu and Bv . Thus, to implement the blossom step for Edmonds’ search, it suffices
to run the linear time find-aw once again (which will not find any augmenting walk) and return
the blossom set Ω0 discovered at the Blossom Formation step. By Invariant 5 (4), Ω0 is maximal.
Corollary 26. A maximal set of nested blossom can be found in linear time.
Corollary 27. One iteration of Edmonds’ Search with Criterion 1 (Approximate Complementary
Slackness) can be implemented in linear time.
6
Algorithms for unweighted f -factor and f -edge cover
p
In this section we will give an O( f (V )m) algorithm for both maximum cardinality f -factor and
minimum cardinality f -edge cover. This is a direct consequence of the O(W m−1 ) algorithm for the
weighted problem. This algorithm matches the running time of [10] but does not rely on reduction
to Micali-Vazirani Algorithm. Moreover, it is much simpler to state and to analyze.
For illustration purposes we focus on maximum cardinality f -factor. The algorithm consists of
two phases. The first phase, referred to as batch augmentation, finds an f -factor F that is close to
26
optimal using an instance of the O(W m−1 ) algorithm. After F is close to optimum, we discard
all dual variables y and z, dissolve all the blossoms in Ω and uses our linear time augmenting walk
algorithm to increase the cardinality of F until F becomes optimum.
This is stated formally in the following theorem:
p
Theorem 28. A maximum cardinality f -factor can be computed in O( f (V )m) time.
Proof. We can view an maximum cardinality fp
-factor problem as an maximum weight problem
with weight function w(e) = 1. Choose = 1/ f (V ), by p
Theorem 16, we can compute a (1 −
√ 1 )-approximate maximum cardinality matching F in O( f (V )m) time. If F ∗ is the maximum
f (V )
cardinality f -factor, we have
p
1
f (V )
)|F ∗ | > |F ∗ | − p
> |F ∗ | − f (V )/2
f (V )
f (V ) 2
p
This means F is only O( f (V )) augmentations away from optimal. Hence we can then discard
blossom structure Ω with duals y and z from the approximate f -factor and run the linear time
augmenting
pwalk algorithm of Lemma 25 in G with respect to F until F is optimal. By
p the discussion
above, O( f (V )) iterations suffice. The total running time of the algorithm is O( f (V )m).
p
Theorem 29. A minimum cardinality f -edge cover can be computed in O( f (V )m) time.
|F | ≥ (1 − p
1
Proof. This is similar to Theorem 28. We first use the O(W m−1 ) algorithm for f -edge cover given
p
−1
in Section 3 to find an (1 + f (V ) )-approximate minimum cardinality f -edge
p cover F by viewing
the graph as a weighted graph with weight 1 everywhere. Choosing = 1/ f (V ) will give us an
p
−1
f -edge cover F with |F | ≤ |F ∗ | + f (V ) |F ∗ |. Notice that we always have |F ∗ | ≤ f (V ) because
taking f (v) arbitrary incident edges for each v and taking their union will
p always give a trivial
∗| +
f -edge cover
with
cardinality
at
most
f
(V
).
Hence
we
have
|F
|
≤
|F
f (V ), which means at
p
most O( f (V )) reductions are needed to make F optimal. Therefore we can run the augmenting
path algorithm from Lemma 25 to find reducing paths (P is a reducing path w.r.t. F if and
p only
if it is an augmenting path w.r.t. E \ F ) until no reducing path can be
p found. There are f (V )
iterations in this phase. The total running time of the algorithm is O( f (V )m).
27
References
[1] K. Choromanski, T. Jebara, and K. Tang. Adaptive anonymity via b-matching. In Proceedings
of the 26th International Conference on Neural Information Processing Systems, pages 3192–
3200, 2013.
[2] K. M. Choromanski, A. Khan, A. Pothen, and T. Jebara. Large scale robust adaptive anonymity
via b-edge cover and parallel computation. 2015.
[3] V. Chvatal. A greedy heuristic for the set-covering problem. Mathematics of Operations Research, 4(3):233–235, 1979.
[4] D. E. Drake and S. Hougardy. A simple approximation algorithm for the weighted matching
problem. Information Processing Letters, 85(4):211–213, 2003.
[5] R. Duan and S. Pettie. Linear time approximation for maximum weight matching. J. ACM,
61(1), 2014.
[6] R. Duan, S. Pettie, and H.-H. Su. Scaling algorithms for weighted matching in general graphs.
In Proceedings 28th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages
781–800, 2017.
[7] J. Edmonds. Maximum matching and a polyhedron with 0, 1 vertices. J. of Res. the Nat.
Bureau of Standards, 69 B:125–130, 1965.
[8] J. Edmonds. Paths, trees and flowers. Canadian Journal of Mathematics, pages 449–467, 1965.
[9] J. Edmonds and E. Johnson. Matching: A Well-Solved Class of Integer Linear Programs. In
Combinatorial Optimization - Eureka, You Shrink!, pages 27–30. 2003.
[10] H. N. Gabow. An efficient reduction technique for degree-constrained subgraph and bidirected
network flow problems. In Proceedings of the Fifteenth Annual ACM Symposium on Theory of
Computing, pages 448–456, 1983.
[11] H. N. Gabow. Data structures for weighted matching and extensions to b-matching and f factors. CoRR, abs/1611.07541, 2016.
[12] H. N. Gabow and P. Sankowski. Algebraic algorithms for b-matching, shortest undirected
paths, and f-factors. In 2013 IEEE 54th Annual Symposium on Foundations of Computer
Science, pages 137–146, 2013.
[13] H. N. Gabow and R. E. Tarjan. A linear-time algorithm for a special case of disjoint set union.
In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, STOC ’83,
pages 246–251, 1983.
[14] H. N. Gabow and R. E. Tarjan. Faster scaling algorithms for network problems. SIAM Journal
on Computing, 18(5):1013–1036, 1989.
[15] H. N. Gabow and R. E. Tarjan. Faster scaling algorithms for general graph matching problems.
J. ACM, 38(4):815–853, 1991.
28
[16] A. Khan and A. Pothen. A new 3/2-approximation algorithm for the b-edge cover problem.
In 2016 Proceedings of the Seventh SIAM Workshop on Combinatorial Scientific Computing,
pages 52–61.
[17] E. Lawler. Combinatorial Optimization: Networks and Matroids. Dover Books on Mathematics
Series. 2001.
p
[18] S. Micali and V. V. Vazirani. An O( |V |E) algoithm for finding maximum matching in general
graphs. In 21st Annual Symposium on Foundations of Computer Science, pages 17–27, 1980.
[19] S. Pettie and P. Sanders. A simpler linear time 2/3 − approximation for maximum weight
matching. Inf. Process. Lett., 91(6):271–276, Sept. 2004.
[20] W. Pulleyblank. Faces of matching polyhedra. PhD thesis, University of Waterloo, Ontario,
Canada, 1973.
[21] A. Schrijver. Combinatorial Optimization: Polyhedra and Efficiency. Algorithms and Combinatorics. Springer, 2002.
[22] W. T. Tutte. On the problem of decomposing a graph into n connected factors. Journal of the
London Mathematical Society, s1-36(1):221–230, 1961.
29
| 8cs.DS
|
ROBUST TORIC IDEALS
arXiv:1304.0603v2 [math.AC] 19 Jun 2013
ADAM BOOCHER AND ELINA ROBEVA
Abstract. We call an ideal in a polynomial ring robust if it can be minimally generated
by a universal Gröbner basis. In this paper we show that robust toric ideals generated
by quadrics are essentially determinantal. We then discuss two possible generalizations to
higher degree, providing a tight classification for determinantal ideals, and a counterexample
to a natural extension for Lawrence ideals. We close with a discussion of robustness of higher
Betti numbers.
1. Introduction
Let S = k[x1 , . . . , xn ] be a polynomial ring over a field k. We call an ideal robust if it can
be minimally generated by a universal Gröbner basis, that is, a collection of polynomials
which form a Gröbner basis with respect to all possible monomial term orders. Robustness
is a very strong condition. For instance, if I is robust then the number of minimal generators
of each initial ideal is the same:
(1.1)
µ(I) = µ(in< I) for all term orders <.
In general, we can only expect an inequality (≤).
For trivial reasons, all monomial and principal ideals are robust. Simple considerations
show that robustness is preserved upon taking coordinate projections and joins (see Section
2). However, nontrivial examples of robust ideals are rare. A difficult result of [BZ93, SZ93]
(recently extended by [Boo12] and [CDNG13]) shows that the ideal of maximal minors of
a generic matrix of indeterminates is robust. In the toric case, the class of Lawrence ideals
(which naturally includes determinantal ideals) is the largest known class of robust ideals.
This paper discusses robustness for toric ideals. Our main result is the following:
Theorem 1.2. Let F be a set of irreducible binomials that minimally generate an ideal.
(Assume that F cannot be partitioned into disjoint sets of polynomials in distinct variables.)
If F consists of polynomials of degree 2 then the following are equivalent:
• The ideal generated by F is robust
• |F | = 1 or F consists of the 2 × 2 minors of a generic 2 × n matrix
x1 · · · xn
y1 · · · yn
up to a rescaling of the variables.
In higher degree, it is not true that the robustness of (F ) implies that it is determinantal (or
even Lawrence).
1
2
ADAM BOOCHER AND ELINA ROBEVA
Our motivation for studying robust toric ideals is threefold. First, the study of ideals
minimally generated by a Gröbner basis (for some term order) is ubiquitous in the literature.
In [CHT06], Conca et al studied certain classical ideals and determined when they are
minimally generated by some Gröbner basis. In the study of Koszul algebras, one of the
most fruitful approaches has been via G-quadratic ideals - those generated by a quadratic
Gröbner basis. We are not aware, however, of any systematic study of ideals minimally
generated by a universal Gröbner basis; robust ideals.
Second, we focus on toric ideals, because they are a natural testing ground for algebraic
questions. Toric ideals possess binomial universal Gröbner bases, and hence and there is a
rich theory of Gröbner basis theory, see e.g. [Stu96].
Finally, passing from an ideal to an initial ideal is a particular type of flat deformation.
In this phrasing, robustness is almost equivalent to the property that the minimal number
of generators is preserved by these deformations.1 This interpretation suggests there might
be a geometric interpretation of robustness in terms of the Hilbert scheme.
The paper is organized as follows: In section 2, we prove our main result, Theorem 2.2
characterizing robust toric ideals generated in degree two. The methods are mainly combinatorial. In Sections 3 and 4 we pose two questions concerning extensions of Theorem 2.2
using Lawrence ideals. We provide negative and positive answers respectively. Section 5
closes with a discussion of “robustness of higher Betti numbers,” our original motivation for
this project.
2. Quadratic Robust Toric Ideals are Determinantal
In the sequel, by toric ideal we will always mean a prime ideal generated minimally by
homogeneous binomials with nonzero coefficients in k. By the support of a polynomial we
mean the set of variables appearing in its terms.
Definition 2.1. A set F of polynomials in S is called robust if F is a universal Gröbner
basis and the elements of F minimally generate their ideal.
If a set of polynomials F can be written as a union F = G ∪ H of polynomials in disjoint
sets of variables, then we say that G is a robust component of F . If F admits no such
decomposition, then we say the set F is irreducibly robust. Notice that robustness is preserved
under these disjoint unions, so to classify robust ideals, it suffices to study the irreducible
ones. We remark that the ideal of F corresponds to the join of the varieties corresponding
to the G and H.
The goal of this section is to prove the following theorem:
Theorem 2.2. Let F be an irreducibly robust set consisting of irreducible quadratic binomials. Then F is robust if and only if |F | = 1 or F consists of the 2 × 2 minors of a generic
2 × n matrix
x1 · · · xn
y1 · · · yn
up to a rescaling of the variables.
1Note
y, y − z).
that the equality 1.1 is in general, weaker than robustness. For example, consider the ideal (x −
ROBUST TORIC IDEALS
3
Remark 2.3. In the statement of the Theorem, we only assume that the generators are
irreducible. It turns out that this is sufficient to show that the ideal they generate is prime.
Notice that one direction follows immediately from the results of [SZ93] which show that
the 2 × 2 minors are a universal Gröbner basis. To prove the converse, our technique is
essentially to eliminate certain combinations of monomials from appearing in F . To simplify
notation, we will omit writing coefficients in the proofs when it is clear that they do not
affect the argument. In particular, we treat the issue of coefficients only in tackling the proof
of Theorem 2.2 itself and not in earlier lemmas.
Lemma 2.4. Let F be a robust set of prime quadratic binomials. Then no monomial appears
as a term in two different polynomials in F .
Proof. Suppose that the monomial m appears in the polynomials f, g ∈ F . Let < be a Lex
term order taking the support of m to be first. Since f and g are prime, < will select m
as the lead term of both f and g, and applying Buchberger’s algorithm, we would obtain a
degree zero syzygy of the elements in F , contradicting the minimality of F .
Proposition 2.5. If F is robust, and 0 ≤ k ≤ n, then so is F ∩ k[x1 , . . . , xk ].
Proof. Write Fk = F ∩ k[x1 , . . . , xk ]. It is clear that Fk minimally generates the ideal (Fk ).
Let < be any term order on k[x1 , . . . , xk ]. Extend < to a term order <S on S, taking
x1 , . . . , xk last. Then since F is a Gröbner basis with respect to <S , by basic properties of
Gröbner bases, we know that Fk will be a Gröbner basis with respect to <.
The above proposition is extremely useful, because in our analysis it will be helpful to
assume we are working in a ring with few variables. We will use this reduction extensively
in the following main technical lemma. We use the letters a, . . . , z when convenient for ease
of reading.
Lemma 2.6. Let F be a robust set of prime quadratic binomials:
(a) F cannot contain two polynomials of the form
f = x2 + yz, g = xy + m
or
f = x2 + y 2 , g = xy + m
or
f = x2 + y 2 , g = xz + m.
where m is any monomial.
(b) F cannot contain two polynomials of the form
f = xi x j + xk x l , g = xi xk + xp xq
(here we do not assume i, j, k, l, p, q are distinct.)
(c) F cannot contain two polynomials of the form
f = x2 + yz, g = xw + m
4
ADAM BOOCHER AND ELINA ROBEVA
or
f = x2 + yz, g = yw + m
where m is any monomial.
(d) If f, g ∈ F are two polynomials whose supports share a variable, then all terms of f and
g are squarefree.
(e) If F contains two polynomials whose supports share a variable, then (up to coefficients)
F must contain the 2 × 2 minors of a generic matrix.
a b c
d e f
Proof. a) We prove the first statement. The proofs of the others are similar. Suppose that
f, g ∈ F . Notice that by primality, m cannot contain a factor of y. Let < be the lex term
order with (y > x > z > all other variables). Then the S-pair of f and g is x3 − mz, whose
lead term is x3 . Since F is a Gröbner basis with respect to < we must have some polynomial
h whose lead term divides x3 . Since x2 is not the lead term of f , h 6= f and we must have
two distinct polynomials in F with x2 appearing. This contradicts Lemma 2.4.
b) Suppose that f, g ∈ F . By restricting to the subring k[xi , xj , xk , xp , xq ], Proposition 2.5
tells us we can assume F involves only these variables. Notice by primality (and part (a))
we know that k and i are distinct from j, l, p, q. Let < be the lex term order with (xk > xi >
all other variables.) Then the S-pair of f and g is x2i xj − xl xp xq , whose lead term is x2i xj .
As in part a) we must have some polynomial h ∈ F whose lead term divides x2i xj . The only
possible monomials are x2i and xi xj . And since xi xj appears in f (and is not a lead term)
we must have a polynomial h = x2i + xa xb ∈ F for some a, b ∈ {i, j, k, l, p, q}. So F contains
f = xi xj + xk xl , g = xi xk + xp xq , h = x2i + xa xb .
Applying part a), and primality, we know that a, b ∈ {l, p, q}. By part a), we know that
xa xb must be squarefree, and since xp xq already appears, we can say (renaming p and q if
necessary,) that xa xb = xl xp . But now choosing < to be the lex term order with (xl > xp >
xi > xk > all other variables,) we see that the S-pair of f and h is x2i xk − xi xj xk whose lead
term is x2i xk which is only divisible by the monomials x2i and xi xk , neither of which can be
a lead term of a polynomial in F by Lemma 2.4.
c) We will prove the first statement. The second proof is similar. Suppose that f, g ∈ F .
First restrict, using Proposition 2.5 to assume we are working only with the variables x, y, z, w
and the factors of m. Let < be the lex term order with (w > x > all other variables. Taking
the S-pair of f and g, we obtain wyz − mx, whose lead term is wyz. Since this must be
divisible by the lead term of some polynomial h ∈ F , without loss of generality, we assume
h = wy + n. Consider now the possibilities for n. By primeness n cannot contain a factor
of w or y. By part b) it cannot contain a factor of x or z. Hence, the only possible options
left are that the factors of n are contained in the factors of m. But this means that m, n are
ab, a2 for some (new, distinct) variables a, b. As in (b), we can conclude this is impossible.
d) This follows immediately from parts a) - c).
e) We assume that F contains two polynomials whose supports intersect. By d) we can
assume that these polynomials are squarefree, and we write them as p = ae − bd, q =
af − m1 m2 where mi represents some variable. Notice that by primality and part b), neither
ROBUST TORIC IDEALS
5
m1 nor m2 can be a, e or f . Nor can m1 m2 = bd (since it would be a repetition). Hence we
may as well assume m1 is different from the other variables, and call it c. There are now two
cases: Either m2 is also a new variable g, or it isn’t, in which case we can see that without
loss of generality, m2 = d. Rewriting: If p, q are two polynomials whose supports intersect,
then they must contain either 6 or 7 distinct variables.
In the case of 6 variables, restrict F to the subring k[a, b, c, d, e, f ]. Now
p = ae − bd, q = af − cd.
Computing an S-pair with the lex order (a > b > d > all other variables) we obtain f bd−ecd
with lead term f bd. This must be divisible by the lead term of some polynomial r ∈ F . But
this lead term cannot be bd (by its presence in p), hence it must be either bf or df . In case
it is bf then F contains a polynomial of the form r = bf − n1 n2 . Now n1 , n2 ∈ {a, c, d, e}
by primality. And part b) of this lemma allows us to further say n1 , n2 ∈ {c, e} which along
with squarefreeness implies that r = bf − ce as required. In case the term is df , similar
considerations show that parts a) - d) will not allow any n1 n2 .
In the case of 7 variables, restrict F to the subring k[a, b, c, d, e, f, g]. Now
p = ae − bd, q = af − cg.
Computing an S-pair with the lex term order (a > b > d > all other variables): we obtain
f bd − ebg with lead term f bd. This must be divisible by the lead term of some polynomial
r ∈ F . But this lead term cannot be bd (by its presence in p), hence it must be either bf
or df . By symmetry we can assume that it is df and that F contains a polynomial of the
form df − n1 n2 . Now n1 , n2 ∈ {a, b, c, e, g} by primality, and part b) restricts us further
to n1 , n2 ∈ {c, e, g}. And since cg already appears, we can conclude that n1 n2 = eg or ec
(and again by symmetry, we may assume n1 n2 = ec. But now notice that q and r are two
polynomials whose supports intersect, and involve only 6 variables. Hence, by the previous
part of this proof, we can conclude that F contains a polynomial s = gd − ae. But this is a
contradiction by Lemma 2.4.
Proof of Theorem 2.2. Suppose that |F | > 1. Since F is irreducible, it must contain two
polynomials whose supports intersect. By Lemma 2.6 we can conclude that F contains
polynomials of the form:
p1 = ae − bd, p2 = af − cd, p3 = bf − ce
up to coefficients. However, computing an S-pair with the lex order on (a > b > · · · > f )
we obtain:
S(p1 , p2 ) = bdf − cde (with some nonzero coefficients)
which after reducing by p3 we obtain either zero, or a constant multiple of cde. In the latter
case, in order to continue the algorithm, we would have to have another polynomial in F
whose lead term divided cde. By the presence of p1 , p2 , p3 , the terms cd and ce are prohibited.
And by Lemma 2.6 b), de is also prohibited. Hence, this S-pair must reduce to zero after
only two subtractions.
This means in fact, that the polynomials are precisely determinants of some matrix
λ1 a λ2 b λ3 c
µ1 d µ 2 e µ 3 f
6
ADAM BOOCHER AND ELINA ROBEVA
for some nonzero constants λi , µi .
To complete the proof, suppose that F 6= {p1 , p2 , p3 }. Since F is irreducible, one polynomial p4 ∈ F must share a variable with say, p1 . Renaming variables if necessary, say that
variable is a. Then (ignoring constants for the moment) by applying the proof of Lemma 2.6
e), to the polynomials p1 = ae − bd and p4 = ah − m1 m2 we can conclude that F contains
the minors of the matrix
λ1 a λ 2 b λ 4 g
.
µ1 d µ 2 e µ 4 h
Applying this technique to p2 and p4 as well, shows that we in fact get all 2 × 2 minors of
the full matrix
λ1 a λ2 b λ3 c λ4 g
.
µ1 d µ 2 e µ 3 f µ 4 h
Inductively we continue this process until we obtain all of F .
Notice that in our proof, every term order we used was a Lex term order, and we ended
up a with a prime ideal. Hence, we have the following:
Corollary 2.7. If F is a set of prime quadratic binomials that minimally generate an ideal.
Then the following are equivalent:
(i) F is a Gröbner basis with respect to every Lex term order.
(ii) F is a Gröbner basis with respect to every term order.
(iii) F generates a prime ideal and the irreducible robust components of F are generic
determinantal ideals and hypersurfaces.
Corollary 2.8. If X is a generic k × n matrix, and F is the set of 2 × 2 minors, then F is
a universal Gröbner basis if and only if k = 2.
Remark 2.9. It is almost the case that every irreducibly robust component is determinantal.
Indeed, every prime binomial is up to rescaling either xy − zw or x2 − yz. The former is
determinantal. Thus the only possible non-determinantal robust component is {x2 − yz}.
3. From Determinants to Lawrence Ideals
Encouraged by the result of the previous section, it is natural to ask to what extent
robustness classifies generic determinantal ideals. Indeed, it is easy to see that the ideal of
minors of any 2 × n matrix whose entries are relatively prime monomials will be robust.
There are two questions we consider:
Question 3.1.
1. If I is a robust toric ideal, is I generated by the 2×2 minors of some matrix of monomials?
2. Precisely which matrices of monomials provide robust ideals of 2 × 2 minors?
The answer to the first question is negative. Examples are provided by Lawrence ideals,
studied in [Stu96]. If I is any toric ideal, with corresponding variety X ⊂ Pn−1 , then the
ideal J corresponding to the re-embedding of X in (P1 )n−1 is called the Lawrence lifting of
I. Its ideal is generated by polynomials of the following form:
JL = xa yb − xb ya | a − b ∈ L ⊂ S = k[x1 , . . . , xn , y1 , . . . , yn ],
ROBUST TORIC IDEALS
7
where L is a sublattice of Zn and k is a field. Here a = xa11 xa22 · · · xann for a = (a1 , . . . , an ) ∈ Nn .
Binomial ideals of the form JL are called Lawrence ideals. The following result is Theorem
7.1 in [Stu96].
Proposition 3.2. The following sets of binomials in a Lawrence ideal JL coincide:
a) Any minimal set of binomial generators of JL .
b) Any reduced Gröbner basis for JL .
c) The universal Gröbner basis for JL .
d) The Graver basis for JL .
Hence Lawrence ideals provide a large source of robust toric ideals, and naturally include
the class of generic determinantal ideals. Given this, it is natural to rephrase the first part
of Question 3.1 as:
Question 3.3. Does robustness characterize Lawrence ideals?
Again the answer is negative.
Example 3.4. The ideal
I = (b2 e − a2 f, bc2 − adf, ac2 − bde, c4 − d2 ef)
in the polynomial ring Q[a, b, c, d, e, f ] is robust but not Lawrence. This example was found
using the software Macaulay2 and Gfan [Gra, Jen]. It is the toric ideal IL corresponding to
the lattice defined by the kernel of
1 1 1 1 1 1
1 1 0 0 0 0
L=
0 0 1 2 0 0
1 0 1 0 3 1
Given this counterexample we ask
Question 3.5. Is there a nice combinatorial description of robust toric ideals?
Remark 3.6. Heuristically, it is very easy to find robust ideals that are not Lawrence by
starting with a Lawrence ideal given by JL . This lattice L gives rise to a lattice L̃ ⊂ N2n such
that JL = IL̃ . By modifying L̃ slightly, it is very often the case that the resulting toric ideal
is robust (though often non-homogeneous). The ubiquity of these examples computationally
suggests that a nice combinatorial description of robustness may require imposing further
hypotheses.
4. Matrices of Monomials
In this section we answer Question 3.1.2.
Theorem 4.1. Suppose that Xi , Yj are monomials of degree at least 1 in some given set of
variables U = {u1 , u2 , . . . , ud }. Let
X1 X2 · · · Xn
A=
,
Y1 Y2 · · · Yn
8
ADAM BOOCHER AND ELINA ROBEVA
where n > 3 and suppose that the set F of 2 × 2-minors Xi Yj − Xj Yi , i 6= j consists of
irreducible binomials. Then F is robust if and only if all the monomials Xi , Yj are relatively
prime.
The proof is technical, so we begin by fixing notation. Since we will assume that each
Xi Yj − Xj Yi is prime for all i 6= j, then, gcd(Xi , Xj ) = gcd(Yi , Yj ) = gcd(Xi , Yi ) = 1 for all
i 6= j. Therefore, if we define
zij = gcd(Xi , Yj ),
then, we can write
X i = xi
Y
zij
and
j6=i
Yj = yj
Y
zij .
i6=j
Thus,
(i)
gcd(xi , xj ) = gcd(yi , yj ) = 1 for all i 6= j
(ii)
gcd(zij , zkl ) = 1 whenever i 6= k or j 6= l,
(iii)
gcd(xi , zkl ) = 1 if i 6= k and gcd(yj , zkl ) = 1 if j 6= l.
Our goal is to show that zij = 1 for all i 6= j.
Lemma 4.2. If z12 6= 1 then n > 4 and for each m > 3, there exist permutations im , lm 6=
1, 2, m and jm , km 6= 1, 2 and term orders >1 and >2 such that
X1
and Xim Yjm >1 Xjm Yim
(iv)
Xim Yjm | X2 Ym2
z12
2
Y1
Xkm Ylm | Xm
(iv’)
Y2
and Xkm Ylm >2 Xlm Ykm .
z12
Moreover,
Xim = xim zim m and xim |zim m ,
Ylm = ylm zmlm and ylm |zmlm .
Proof. We will build <1 and <2 in several steps. To begin, take a lex term order > where
the variables in z12 are first. Consider the S-pair:
S X1 Ym − Xm Y1 , Xm Y2 − X2 Ym =
=
lcm(X1 Ym , Xm Y2 )
lcm(X1 Ym , Xm Y2 )
(X1 Ym − Xm Y1 ) −
(Xm Y2 − X2 Ym ) =
X 1 Ym
Xm Y2
= Xm
Y2
X1
(X1 Ym − Xm Y1 ) − Ym (Xm Y2 − X2 Ym ) =
z12
z12
X1
Y2
2
− Xm
Y1 .
z12
z12
Y2
2 X1
2
Since all of the variables in X2 Ym z12 − Xm Y1 z12 are different from the variables in z12 , then,
there exist term orders >1 and >2 refining > for which X2 Ym2 zX121 is the leading term for >1
= X2 Ym2
ROBUST TORIC IDEALS
9
2
and Xm
Y1 zY122 is the leading term for >2 .
2
Consider first >1 : X2 Ym2 zX121 >1 Xm
Y1 zY122 . Since the Xi Yj − Xj Yi form a Gröbner basis with
respect to >1 , there exist im 6= jm such that
(iv)
Xim Yjm | X2 Ym2
X1
and Xim Yjm >1 Xjm Yim
z12
in this ordering. If jm = 2, then, z12 | Y2 | X2 Ym2 zX121 , which is not true. If jm = 1, then, since
z12 | X1 | X1 Yim and z12 - Xim Y1 and z12 was chosen to have its variables first in >1 , then,
Xjm Yim = X1 Yim >1 Xim Y1 = Xim Yjm , which is not true by (iv). Thus, jm > 3. Similarly,
we can deduce that im > 3. Thus, im , jm > 3.
Since im > 3, gcd(X1 , Xim ) = gcd(X2 , Xim ) = 1, and we are assuming that Xi , Yi 6= 1
for all i and Xim | X2 Ym2 zX121 then, Xim | Ym2 . Since gcd(Xm , Ym ) = 1, im 6= m either.
Thus, we have that im 6= 1, 2, m and , jm > 3. So, in particular, ifQn = 3, we already
have a contradiction. We assume now that n > 4. Since Xim = xim j6=im zim j and Ym =
Q
ym k6=m zkm , properties (i) and (iii) allow us to conclude that Xim = xim zim m and xim | zim m .
Going back to when we chose the ordering >1 , consider now the ordering >2 for which
2
Xm
Y1 zY122 >2 X2 Ym2 zX121 . By a symmetric argument we find that there exist km > 3, lm 6= 1, 2, m
2
such that Xkm Ylm | Xm
Y1 zY122 and, thus, Ylm = ylm zmlm with ylm | zmlm .
Hence, there exist im , lm 6= 1, 2, m and jm , km 6= 1, 2 such that Xim = xim zim m , xim | zim m
and Ylm = ylm zmlm , ylm | zmlm .
Lemma 4.3. If z12 6= 1, then, n is even and we can rearrange the numbers 1, .., n so that
for each i 6 n2 ,
X2i = x2i z2i,2i+1 and Y2i = y2i z2i+1,2i
X2i+1 = x2i+1 z2i+1,2i and Y2i+1 = y2i+1 z2i,2i+1
and x2i , y2i+1 | z2i,2i+1 and x2i+1 , y2i | z2i+1,2i .
Proof. By property (ii) and Lemma 4.2 we have that m 7→ im and m 7→ lm are permutations
on {3, .., n} with no fixed points. Thus, for each i > 3, there exists m > 3 such that m 6= i
and i = im , Xi = xi zim with xi | zim and for each l > 3, there exists m > 3, m 6= l such that
l = lm and Yl = yl zml .
Fix m0 6= 1, 2. Then, Xim0 = xim0 zim0 m0 and xim0 | zim0 m0 . Since we assumed that Xim0 6= 1,
then, zim0 m0 6= 1. So now, repeating the whole argument with m0 and im0 instead of with 1
and 2 (recall that im0 6= 1, 2, m0 ), we would get similar permutations on {1, . . . , n}\{m0 , im0 }.
But, by property (ii), these permutations have to agree with the permutations m 7→ im and
m 7→ lm from above on the set {1, . . . , n} \ {1, 2, m0 , im0 }. Thus, (1, 2) and (m0 , im0 ) will be
transpositions in all of these permutations (and, in particular, im0 = lm0 ).
Since we can run the above argument with any m0 6= 1, 2, we have that the permutations
m 7→ im and m 7→ lm agree and are composed of transpositions (m, im ). In particular, n
10
ADAM BOOCHER AND ELINA ROBEVA
is even and, after rearranging the numbers from {1, .., n} so that i2k = 2k + 1 and, thus,
i2k+1 = 2k for all k = 1, .., n/2, our matrix A looks as follows:
x1 z12 x2 z21 x3 z34 x4 z43 · · ·
A=
.
y1 z21 y2 z12 y3 z43 y4 z34 · · ·
The rest of the statement of the Lemma follows from Lemma 4.2.
Proof of Theorem: (⇒): It suffices to show that zij = 1 for all i, j. Without loss of generality,
assume that z12 6= 1.
By Lemma 4.2 we have that
X1
Y2
2
and Xkm Ylm | Xm
Y1
Xim Yjm | X2 Ym2
z12
z12
for all m > 3. But by (the proof of) Lemma 4.3 we know that the above hold when we
substitute 1 and 2 with any m0 and im0 such that m 6= im0 , m0 , i.e.
Yi 0
Xm 0
2
Xim Yjm | Xim0 Ym2
and Xkm Ylm | Xm
Ym0 m
zm0 im0
zm0 im0
Rewriting out the expressions in the form Xim = xim zim m and Ylm = ylm zmlm and then
canceling repeating factors, we get that
2
zim m xm0
xim yjm zljm jm | xim0 zim0 m0 ym
and xkm zkm lkm ylm | x2m zmlm ym0 zim0 m0 yim0
for all m0 6= m, im . Therefore, we have that for every m0 6= m, im
2
zim m xm0
zljm jm | xim0 zim0 m0 ym
and zkm lkm | x2m zmlm ym0 zim0 m0 yim0
Noting that xim0 | zim0 m0 and xm0 | zm0 lm0 and, similarly for ym0 , yim0 , switching m0 with im0 ,
and using (ii), shows us that
2
zim m
zljm jm | ym
and zkm lkm | x2m zmlm
Again, by property (ii), the only way for this to happen is if jm = km = m. In that case, we
have that
2
xim ym zlm m | xim0 zim0 m0 ym
zim m xm0
and xm zmlm ylm | x2m zmlm ym0 zim0 m0 yim0
Again, by (i),(ii), and (iii), and by switching m0 and im0 , we have that
2
xim ym zim m | ym
zim m
and xm zmlm ylm | x2m zmlm
After cancelations,
xim | ym and ylm | xm .
Thus, xim = ylm = 1. Since i and l are permutations, we have that xm = ym for all m. Thus,
our matrix looks like this
z12 z21 z34 z43 · · ·
A=
.
z21 z12 z43 z34 · · ·
2
2
But then, we have that, for example, X1 Y2 − X2 Y1 = z12
− z21
, which is not prime! Contradiction! Thus, zij = 1 for all i 6= j.
Thus, z12 = 1 and by symmetry, zij = 1 for all i 6= j and gcd(Xi , Yj ) = 1 for all
i 6= j. Combined with the assumptions of the theorem statement, we get that gcd(Xi , Xj ) =
ROBUST TORIC IDEALS
11
gcd(Xi , Yi ) = gcd(Yi , Yj ) = 1 for all i 6= j, that is, all the entries of A are pairwise relatively
prime.
(⇐): Assume that the entries of A are pairwise relatively prime. Let < be any monomial
term order. To show that the 2×2 minors of A are a Gröbner basis with respect to <, we just
need to show that all S-pairs reduce to zero. By the result of Bernstin-Sturmfels-Zelevinsky,
such a reduction is guaranteed to exist for a generic matrix X = (xij ) . Since all entries of
A are relatively prime, it is clear that such a reduction will extend simply by the ring map:
xij 7→ Xij .
5. Robustness of Higher Betti Numbers
Our interest in robust ideals originated with the following classical inequality:
(5.1)
βi (S/ in< I) ≤ βi (S/I) for all i.
It is natural to ask for which ideals and term orders equality holds (for all i). In the setting
of determinantal ideals, Conca et al proved in [CHT06] that the ideal of maximal minors
of a generic matrix has some initial ideal with this property. They also gave examples
of determinantal ideals for which no initial ideal has this property. In a different vein,
Conca, Herzog and Hibi showed in [CHH04] that if the generic initial ideal Gin(I) has
βi (I) = βi (Gin(I)) for some i > 0, then βk (I) and βk (Gin(I)) also agree for k > i.
Our interest was to instead approach the inequality 5.3 in a universal setting, i.e. to
consider when equality holds for all term orders <. In this case we say that I has robust
Betti numbers. The following result is due to the first author [Boo12]
Theorem 5.2. If I := Ik (X) is the ideal of maximal minors of a generic k × n matrix X
and < is any term order, then
(5.3)
βij (S/ in< I) = βij (S/I)
for all i, j.
In particular, every initial ideal is a Cohen-Macaulay, squarefree monomial ideal with a linear
free resolution. Further, the resolution can be obtained from the Eagon-Northcott complex by
taking appropriate lead terms of each syzygy.
A combination of Theorems 5.2 and 2.2 yields
Corollary 5.4. Let I be a toric ideal generated in degree two. If I is robust, then I has
robust Betti numbers.
Our original hope with this project was that all robust toric ideals had robust Betti
numbers. Unfortunately, the situation seems much more delicate.
Example 5.5. Using Gfan [Jen], we were able to check that the Lawrence ideal JL corresponding to the lattice L given by the matrix
1 1 1 1 1
0 1 2 7 8
has initial ideals with different Betti numbers.
12
ADAM BOOCHER AND ELINA ROBEVA
6. Acknowledgments
Many of the results in this paper were discovered via computations using Macaulay 2 [Gra]
and Gfan [Jen]. We thank David Eisenbud and Bernd Sturmfels for many useful discussions.
Finally we thank Seth Sullivant for introducing us to Lawrence ideals and starting us on the
path toward Example 3.4.
References
[Boo12] A. Boocher, Free resolutions and sparse determinantal ideals, Math. Res. Letters 19 (2012), no. 4,
805–821. ↑1, 11
[BZ93] D. Bernstein and A. Zelevinsky, Combinatorics of maximal minors, J. Algebraic Combin. 2
(1993), no. 2, 111–121. MR1229427 (94j:52021) ↑1
[CDNG13] A. Conca, E. De Negri, and E. Gorla, Universal groebner bases for maximal minors, ArXiv (2013).
↑1
[CHH04] A. Conca, J. Herzog, and T. Hibi, Rigid resolutions and big Betti numbers, Comment. Math.
Helv. 79 (2004), no. 4, 826–839. MR2099124 (2005k:13025) ↑11
[CHT06] A. Conca, S. Hoşten, and R. R. Thomas, Nice initial complexes of some classical ideals, Algebraic
and geometric combinatorics, 2006, pp. 11–42. MR2298753 (2008h:13035) ↑2, 11
[Gra] D. R. Grayson, Macaulay 2, a software system for research in algebraic geometry. Available at
http://www.math.uiuc.edu/Macaulay2/. ↑7, 12
[Jen] A. N. Jensen, Gfan, a software system for Gröbner fans and tropical varieties. ↑7, 11, 12
[Stu96] B. Sturmfels, Gröbner bases and convex polytopes, University Lecture Series, vol. 8, American
Mathematical Society, Providence, RI, 1996. MR1363949 (97b:13034) ↑2, 6, 7
[SZ93] B. Sturmfels and A. Zelevinsky, Maximal minors and their leading terms, Adv. Math. 98 (1993),
no. 1, 65–112. MR1212627 (94h:52020) ↑1, 3
| 0math.AC
|
Segmentation of nearly isotropic overlapped tracks in
photomicrographs using successive erosions as
watershed markers
arXiv:1706.03282v2 [cs.CV] 18 Jan 2018
Alexandre Fioravante de Siqueiraa,b,∗, Wagner Massayuki Nakasugaa , Sandro
Guedesa , Lothar Ratschbacherb
a Departamento
de Raios Cósmicos e Cronologia, IFGW, University of Campinas
b Institut für Geologie, TU Bergakademie Freiberg
Abstract
The major challenges of automatic track counting are distinguishing tracks and
material defects, identifying small tracks and defects of similar size, and detecting overlapping tracks. Here we address the latter issue using WUSEM,
an algorithm which combines the watershed transform, morphological erosions
and labeling to separate regions in photomicrographs. WUSEM shows reliable
results when used in photomicrographs presenting almost isotropic objects. We
tested this method in two datasets of diallyl phthalate (DAP) photomicrographs
and compared the results when counting manually and using the classic watershed. The mean automatic/manual efficiency ratio when using WUSEM in the
test datasets is 0.97 ± 0.11.
Keywords: Automatic counting, Diallyl phthalate, Digital image processing,
Fission track dating
∗ Corresponding
author. Phone: +55(19)3521-5362.
Email addresses: [email protected] (Alexandre Fioravante de Siqueira),
[email protected] (Wagner Massayuki Nakasuga), [email protected] (Sandro
Guedes), [email protected] (Lothar Ratschbacher)
Authorship statement: A. F. de S. designed the algorithms, wrote the code, analyzed the
data and wrote the paper. W. M. S. counted the tracks in the images, analyzed the data and
wrote the paper. S. G. obtained the images from the samples, analyzed the data, wrote the
paper and supervised the research project. L. R. supervised the research project.
Preprint submitted to Computers & Geosciences
January 19, 2018
1. Introduction
Solid state nuclear track detectors (SSNTD) are materials such as inorganic
crystals, plastics and glasses, known to record the path of charged particles.
There are several applications for SSNTD in nuclear science; for instance, measurements of radon gas [1], boron neutron capture therapy [2], and age determination by fission track dating [3, 4, 5, 6, 7, 8].
When a charged particle collide in a SSNTD, the ionization and/or the
collision with atoms modify the path by which the particle go through. This
damage in the SSNTD structure is called latent track. This track becomes
visible under an optical microscope after a convenient etching process [9], and
these tracks can be counted. Photomicrographs can also be used, which could
improve the counting accuracy [10].
Procedures for measuring and counting tracks are time-consuming and involve practical problems, e.g. variation in observer efficiency [11]. An automatic
method based on image processing techniques could increase the track counting rate and improve counting reproducibility. However, separating elements in
nontrivial images is one of the hardest tasks in image processing [12].
Automatic systems for separating, counting or measuring tracks have been
studied for a while, and several solutions were presented (e.g. [13, 14, 15, 16,
17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 11, 28, 29]. Still, the precision of
automatic methods is not satisfactory yet; an automatic analysis could need to
be manually adjusted by the operator, being more time consuming than the
usual measure [26, 30]. The major challenges to automatic track counting are
detecting overlapping tracks, distinguishing tracks and material defects (e.g.
surface scratches due to polishing), and identifying small tracks and defects of
comparable size in the background of photomicrographs [11].
To address the problem of identifying overlapping ion tracks in photomicrographs, we propose an algorithm based on the watershed transform [31] using
morphological erosions [32] as markers. A similar method was used to separate packings of ellipsoidal particles represented using X-Ray tomography [33].
2
We tested this method in two datasets of diallyl phthalate (DAP) photomicrographs, and used the results to relate the incident track energy with the mean
gray levels and mean diameter products for each sample from the first dataset.
2. Material and methods
We employed the ISODATA threshold to obtain the binary images used in
our tests. The WUSEM algorithm is based on the following techniques: 1.
morphological erosion; 2. watershed transform, and 3. labeling. We describe
these algorithms in this Section.
2.1. The ISODATA threshold
The Iterative Self-Organizing Data Analysis Technique (A) (ISODATA) threshold [34, 35] is an histogram-based method. It returns a threshold that separates
the image into two pixel classes, where the threshold intensity is halfway between
their mean intensities.
When applied for two classes, ISODATA is always convergent [36]; in our
case, these classes are the tracks (our regions of interest, ROI) and the background. We used the algorithm filters.threshold isodata, implemented in
scikit-image [37].
2.2. Structuring elements and morphological erosion
In morphological image processing, a structuring element is a matrix representing a mask, or a shape, that is used to retrieve information about the shapes
in an input image [32]. Erosion, a basic operation in image processing, uses a
chosen structuring element to shrink the border of all ROI in a binary image;
the shrinkage factor is correspondent to the structuring element size [12].
In our tests (Section 3) we used disks as structuring elements, since tracks in
DAP are mostly round in shape. The algorithms used were morphology.disk
and morphology.erosion, contained in scikit-image.
3
2.3. Watershed transform
The watershed algorithm is a non-parametric method which defines the contours as the watershed of the gradient modulus of the gray levels of the input
image, considered as a relief surface detection method [31].
In this algorithm, the input image is seen in a three-dimensional perspective.
Two dimensions correspond to spatial coordinates, and the third represents the
gray levels. In this interpretation, we consider three kinds of points [12]:
1. Points in regional minima.
2. Points where a drop of water would flow to a common minimum.
3. Points where a drop of water would flow to different minima. The set of
these points is named watershed line.
The aim of watershed algorithms is to find the watershed lines. The method
used in this paper is implemented in the function morphology.watershed, from
scikit-image.
2.4. Labeling algorithm
In image processing, the labeling algorithm labels connected regions of a
binary input image, according to the 2-connectivity sense: all eight pixels surrounding the reference pixel. Pixels receive the same label when they are connected and have the same value. We used the algorithm measure.label from
scikit-image, implemented as described in [38].
2.5. Watershed Using Successive Erosions as Markers (WUSEM) algorithm
Here we present the WUSEM (Watershed Using Successive Erosions as
Markers) algorithm, which combines morphological erosions, the watershed transform and labeling algorithms to separate regions of interest (ROI) in binary
images. The WUSEM algorithm and its steps follow (Figure 1):
1. The user define an initial radius (r0 ) and an iterative radius (∆r) to a
structuring element (Figure 2).
4
Figure 1: Representing WUSEM and the functions employed in its implementation.
2. The input binary image is eroded using the structuring element with radius
equal to r0 . This erosion is used as a marker to the watershed algorithm.
Then, the resulting image is labeled. This is the first segmentation.
3. A new structuring element is defined. Its radius is r0 + ∆r. The input
binary image is eroded with this new structuring element, the erosion is
used as a marker to watershed, and the result is labeled. This is the second
segmentation.
4. The process continues until the eroded image does not have objects. Then,
all segmentations are summed.
5. The result is labeled again, to reorder the ROI, and labels with area smaller
than 64 pixels are excluded, to ensure that noise will not affect the results.
Tracks are counted according to the “lower right corner” method, where
objects that touch the bottom and right edges are not counted. This leads
to an accurate, unbiased measure [39].
WUSEM is implemented in the function segmentation wusem(), available
in the Supplementary Material. It receives the arguments str el, initial radius
and delta radius, representing the structuring elements, r0 and ∆r, respectively. To exemplify WUSEM’s capabilities, we used it to separate overlapping
tracks within the test photomicrographs (Figure 3).
2.6. DAP photomicrographs
We used two sets of diallyl phtalate (DAP, C14 H14 O4 ) photomicrographs to
test the WUSEM algorithm. One of them was obtained from detectors irradiated with
78
Kr tracks, and the other has induced fission tracks.
5
Figure 2: Representation of disks as structuring elements defined for each segmentation when
employing WUSEM in an interest region. The radius of the first, second and third structuring
elements are r0 , r0 + ∆r and r0 + 2∆r, respectively.
2.6.1.
78
Kr tracks
The first dataset contains 362 photomicrographs of tracks from nine different
DAP plaques irradiated with
78
Kr ions at a nominal fluence of 1.4 × 105 cm−2 ,
from a beam perpendicular to the detector surfaces at GSI, Darmstadt, Germany2 .
During the irradiation, detectors were covered with aluminum foils forming
a moderation layers of thicknesses varying from zero (no cover) to 90 µm. Detectors were named after their cover thicknesses (K0, K20, K30, ..., K90). Ions
arrived at the setup with initial energy of 865 MeV and were slowed down in
the aluminum cover before hitting the detector surface. Incidence energies were
2 These
photomicrographs are contained in the folder orig figures/dataset 01, available
in the Supplementary Material.
6
0
100
200
300
400
500
0
100
200
300
400
500
600
700
Figure 3: WUSEM algorithm application in an input image. First, the image is binarized
using the ISODATA threshold. Then, the image is eroded using initial radius (r0 ) and iterative
radius (∆r) equal to 1 and 1 respectively, to ease visualization. The process continues until
the eroded image has regions in it. All erosions are summed, and the result is labeled; then,
regions with area smaller than 64 px are excluded. Each labeled track receives a color from the
nipy spectral colormap. Finally, the function enumerate objects() is used to number the
found tracks. Final results are shown to r0 and ∆r equal to 10 and 4, respectively. Animation
also available at https://youtu.be/CtIOxhNISW8.
calculated using the software SRIM [40], and varied from 18 MeV (90 µm cover)
to 865 MeV (no cover). Detectors were etched in a PEW solution (7.5 g KOH,
32.5 g ethanol, 10 g water) solution for 4.5 ± 0.2 min at 65 ± 3 ◦ C.
Images were captured with a CCD camera coupled with a Zeiss microscope,
in reflected light mode, under 1250 × nominal magnification. Then, the detectors were further etched for 4 minutes, total of 8.5 ± 0.3 min, and new images
were captured. This way, we obtained 18 subsets of images. Tracks within
these photomicrographs are almost isotropic and have the same orientation,
resembling circles (Figure 4).
7
Figure 4: Photomicrograph from the first dataset, presenting tracks in a DAP sample.
2.6.2. Induced fission tracks
The second dataset contains 19 photomicrographs with two different magnifications from a DAP plaque used as external detector, coupled to an apatite
sample and irradiated with thermal neutrons to induce fission in the 235 U atoms
inside the mineral3 . During the fission process, two fragments are released and,
eventually, are detected by the DAP plaque. Fragments arrive at the detector surface with different energies and incidence angles, resulting in a variety
of track formats. Hence, counting tracks in these photomicrographs is more
complex than in the previous case (Figure 5).
2.7. License and reusability
The WUSEM algorithm and several functions for its implementation lie
within the packages Numpy [41], Scipy [42], Matplotlib [43], scikit-image [37],
among others. All code published with this paper is written in Python 3 [44]
3 These
photomicrographs are contained in the folder orig figures/dataset 02, available
in the Supplementary Material.
8
Figure 5: Input test photomicrograph from the second dataset, presenting tracks in a DAP
sample.
and is available under the GNU GPL v3.0 license, and all photomicrographs and
figures distributed with this paper are available under the CC-BY 2.0 license.
3. Experimental
3.1. Processing photomicrographs of
78
Kr tracks
3.1.1. Exemplifying the methodology
Here we use a photomicrograph from the first dataset4 to exemplify WUSEM
(Figure 4). We binarized this photomicrograph using the ISODATA threshold
[34, 35] (Figure 6). Different gray levels in some tracks may not be properly separated, complicating the extraction of track features. To address this issue, we
filled the regions in the binary image using the function ndimage.morphology.binary fill holes()
from scipy.
4 Image
K90 incid4,5min 3.bmp from the folder orig figures/dataset 01/Kr-78 4,5min/K90 incid,
available in the Supplementary Material.
9
0
100
200
300
400
500
0
100
200
300
400
500
600
700
Figure 6: Input photomicrograph (Figure 4) binarized using the ISODATA threshold (threshold = 128) and region filling. Colormap: gray.
After binarizing the input image, the WUSEM algorithm separates the overlapping tracks (Figure 7). For this example, we chose initial radius = 10
and delta radius = 4 as parameters.
Tracks were counted using the “lower right corner” method, i.e., border
tracks are only counted if they lie on the right or bottom edges of the image.
We used the function clear rd border(), given in the Supplementary Material,
to remove the tracks in these edges. WUSEM returns a labeled region, which
can be used as parameter to the function enumerate objects() (Figure 8).
3.1.2. Comparison between manual and automatic counting
An experienced observer can easily distinguish tracks in the photomicrograph, even when several tracks are superimposed. For this reason, manual
counting is considered the control in the comparison with the automatic count-
10
ing. In the following, the WUSEM algorithm is applied to the photomicrograph
set and the processing parameters are studied.
We established an arbitrary value of up to two tracks less than the mean
of the manual counting as a tolerance. WUSEM’s parameters become candidates if the automatic counting lies within the tolerance interval, i.e. 0 <
µnmanual –nauto < 2, where n is the track number obtained by each approach
(Figure 9).
WUSEM’s best parameters for this study are the ones within the tolerance
interval for most samples. According to the stated comparison, the best parameters are initial radius = 10, delta radius = 20 for 4.5 min samples, and
initial radius = 10, delta radius = 14 for 8.5 min samples.
Using the best parameters defined, we compared manual, classic (flooding)
watershed and WUSEM counting for each sample (Figure 10, Table 1). The
classic watershed algorithm used is implemented in ImageJ [45], and the full
method consisted in binarizing the input image, applying the watershed and
removing small objects. The source code for these operations and instructions
on how to use it are given in the Supplementary Material.
Since tracks in this dataset have the same shapes, we can attribute an efficiency of 100 % for manual counting. WUSEM counting was initially set to
obtain a smaller number of tracks when compared to the manual counting.
However, WUSEM counting returns false positives, i.e., incorrectly labels background regions as ROI (points above the 1:1 line in Figure 10 (b) and (d)). To
avoid false positives, one could use a more restrictive criterion, such as eccentricity (Section 3.1.3).
Counting reproducibility is important for considering the reliability of track
counting.
Despite the variations in track characteristics, the efficiencies of
WUSEM’s automatic counting remained constant within uncertainties, when
compared to manual counting.
11
Manual counting (µ ± 1σ)
WUSEM counting (µ ± 1σ)
Sample
4.5 min
8.5 min
4.5 min
8.5 min
4.5 min
Efficiency ± 1σ
8.5 min
K0
22 ± 3
20 ± 3
21 ± 2
19 ± 3
0.99 ± 0.12
0.95 ± 0.11
K20
25 ± 5
22 ± 4
23 ± 3
22 ± 3
0.90 ± 0.11
0.99 ± 0.14
K30
23 ± 4
24 ± 4
22 ± 4
22 ± 3
0.96 ± 0.12
0.94 ± 0.10
K40
22 ± 4
22 ± 4
22 ± 3
21 ± 3
1.01 ± 0.10
0.96 ± 0.08
K50
24 ± 2
22 ± 4
23 ± 3
20 ± 3
0.94 ± 0.11
0.95 ± 0.13
K60
25 ± 3
23 ± 4
25 ± 3
22 ± 3
0.99 ± 0.08
0.97 ± 0.13
K70
21 ± 4
17 ± 4
21 ± 4
17 ± 4
1.00 ± 0.07
1.00 ± 0.13
K80
21 ± 4
20 ± 5
20 ± 4
20 ± 4
0.96 ± 0.13
1.02 ± 0.14
K90
24 ± 4
21 ± 4
23 ± 4
21 ± 4
0.99 ± 0.11
0.94 ± 0.09
Table 1: Mean, standard deviation, and automatic/manual efficiency ratio for each sample of
the first dataset.
3.1.3. Relating ion energies with diameter product and mean gray levels
In this application, we use WUSEM to relate the track energies to the product of major and minor diameters (D> and D< , respectively) and the mean
gray level of each track. We considered only approximately circular tracks in
our analysis, based on an eccentricity ()5 criterion: should be equal to or less
than 0.3 (Figure 11). This additional criterion can be used also for counting
tracks, to ensure that false positives (spurious objects counted as tracks) are
avoided.
After separating each track, we can obtain its features such as gray levels
and diameters. Once the mean gray level and diameters of each track in a
photomicrograph are obtained, we can relate them with the incident energy for
each sample. The mean gray level of each sample is obtained getting the mean
of all gray levels of the tracks in the images of that sample. We adopted a
similar process to obtain the mean diameters. Then, the results are related to
the incident energy (Figure 12).
The diameter products roughly reflect the electronic energy loss (dE/dx)
curve for
5 In
78
Kr in DAP (Figure 12 (a) and (c)), calculated with the software
image processing, the eccentricity of an object is a number in the interval [0, 1). The
lower the value, the region becomes closer to a circle.
12
SRIM [40]. The Bragg peak appears around 100 MeV. Further scatter of points
can be attributed to poor control of etching conditions. The uncertainty of 3 ◦ C
in temperature may cause a large variation in etching results [46]. Variations in
gray level means are impaired probably because this set was acquired in reflected
illumination mode, which privileges surface details over depth effects.
3.2. Processing photomicrographs of fission tracks in DAP
In photomicrographs from the first dataset, our main concern was track superposition. However, all tracks were similar, created by a collimated beam of
78
Kr tracks. Here we go one step ahead, applying WUSEM to images where
tracks present a variety of shapes. This image dataset was obtained from DAP
plaques irradiated with thermal neutrons, coupled with apatite mounts. Fission fragments are born in the interior of the mineral, then emitted at different
directions towards the detector. For instance, round tracks were created by perpendicular incident fragments, while the elliptical ones were created by particles
hitting DAP surface at shallower angles (Figure 5).
As in the previous analysis, the manual counting performed by an experienced observer is taken as reference because we expect the observer to be able to
recognize tracks efficiently. However, in this case, we do not expect the observer
efficiency to 100 %. Fragments hitting the detector at lower energies originate
tracks that are very difficult to distinguish from detector surfaces. An experienced observer would avoid counting those tracks to keep hers/his counting
efficiency constant.
Repeating the previous processes for photomicrographs in the second dataset,
we first binarize a test photomicrograph6 (Figure 5) using the ISODATA threshold. The binarized image is generated for two scenarios: considering and ignoring border tracks. Here, regions in the binary image are also filled using the function ndimage.morphology.binary fill holes() from scipy. Then we apply
6 Image
“FT-Lab 19.07.390.MAG1.jpg”, from the folder orig figures/dataset 02. Avail-
able in the Supplementary Material.
13
the WUSEM algorithm. We chose initial radius = 5 and delta radius = 2
as parameters, and the WUSEM result as parameter in the function enumerate objects()
(Figure 13).
For this dataset, we established an arbitrary tolerance of five tracks less
than the mean of the manual counting. In this case, WUSEM’s parameters
become candidates if 0 < µnmanual –nauto < 5, where n is the track number obtained by each approach. According to the stated comparison, the best parameters are initial radius = 5, delta radius = 12 for the first magnification
and initial radius = 10, delta radius = 14 for the second one. Using the
best parameters defined, we compared manual, classic watershed and WUSEM
counting for each sample (Figure 14, Table 2).
Magnification
Manual counting (µ ± 1σ)
WUSEM counting (µ ± 1σ)
Efficiency ± 1σ
1
85 ± 8
83 ± 6
0.98 ± 0.07
2
37 ± 3
37 ± 5
0.99 ± 0.05
Table 2: Mean, standard deviation, and automatic/manual efficiency ratio for each magnification of the second dataset.
WUSEM succeeded in avoiding false positives in this application, when compared to the classic watershed (black line above the 1:1 line in Figure 14 (b)).
Still, the user could apply more restrictive criteria. Also, it is worth noting the
efficiency variation between the two image sets. Bigger objects are easier to be
treated, thus automatic track counting in greater magnification images resulted
in a higher counting efficiency (Table 2).
4. Discussion
4.1. Structuring elements
In this study, we used disks as structuring elements for processing images
in both datasets. Since tracks in photomicrographs from dataset 1 are almost
isotropic (as seen in Figure 4), disks are suitable structuring elements to be
used in their segmentation. However, tracks within images in dataset 2 do not
have a defined format (Figure 5). Employing different structuring elements, e.g.
14
rotated cones or ellipses, could improve their segmentation and the automatic
counting result.
4.2. False positives, false negatives and counting efficiency
In track counting, reproducibility is not about counting every track in the
image, but counting the same types of tracks every time. It is the primary
concern in FTD: for instance, the efficiencies for counting tracks in the standard
sample should not vary when using zeta age calibrations [47, 48]. For absolute
methods of determining neutron fluence [49], the efficiency should be constant
when counting tracks in unknown age samples. The fast-growing areas of FTD
using the Laser Ablation Inductively Couple Plasma Mass Spectrometer (LAICP-MS, [50, 51, 52, 53]) or the Electron Microprobe ([54, 55]) have the same
efficiency issues, and could also benefit from automatic counting.
The major challenge for reproducibility is avoiding false positives, spurious
objects such as scratches on the detector or mineral surface and other etching
figures which automatic counting algorithms could misrepresent as tracks. In
most situations, it is preferable to restrict the criteria, thus increasing the number of false negatives (not counted tracks), even implying in efficiency reduction.
Even more experienced observers expect some decreasing in efficiency due
to superposition when counting tracks in high track density samples. This loss
tends to be more severe in automatic counting. When applying algorithms as
WUSEM, the separation of tracks in objects formed of several tracks is not
always possible.
Counting less tracks than the actual number in a cluster is acceptable; however, when processing a large number of clusters in higher track density samples,
we expect a lower efficiency when compared with lower track density samples.
This effect can be assessed by calibrating the efficiency as a function of track
density. Therefore, efficiencies presented for WUSEM (Tables 1 and 2) only
hold for the track densities of the used samples.
15
4.3. Perspective of future development
The WUSEM algorithm represents an advance in automated track counting,
opening several possibilities. Differently from the direct application of classic
watershed, WUSEM allows adaptation (Figure 15): the user can determine optimal structuring elements and efficiencies using a training image subset and apply
these parameters to hers/his sample photomicrographs. This is very convenient
in fission track dating, where the tracks present the same shapes regardless of
the track source, and efficiency may vary mainly due to superposition of tracks
in higher track density samples.
Another possibility is applying WUSEM in separate parts of the input image,
allowing the determination of specific parameters for each track configuration.
This could bring even better results when dealing with the superposition of two,
three or more tracks.
5. Conclusion
In this paper we present a watershed algorithm using successive erosions as
markers, which we call WUSEM. We employ WUSEM to separate overlapping
tracks in photomicrographs. WUSEM performs well in images containing overlapping circular tracks (from a 78 Kr collimated beam) and in photomicrographs
with fission tracks at various orientations, both in DAP. The results are encouraging: the mean automatic/manual counting efficiency ratio is 0.97 ± 0.11 when
using WUSEM in the test datasets. We show also that diameter and eccentricity
criteria may be used to increase the reliability of this method.
Since WUSEM using circles as structuring elements is aimed to isotropically
shaped regions, this technique is suitable for separating etched tracks in DAP.
Etching velocity in mineral surfaces depends on the crystal orientation, yielding
more complex etching figures. Also, natural minerals are richer in scratches and
other etching figures that can be mistaken with fission tracks, especially when
using image processing techniques. WUSEM could be studied to separate tracks
16
in mineral surfaces; for that, it would need to use different structuring elements,
which have to consider the orientation and shape of each track.
Acknowledgements
The authors would like to thank Raymond Jonckheere for the second photomicrograph dataset and Matthias Schröter for his insights, and also Christina
Trautmann for the sample irradiation at GSI in Darmstadt. This work is supported by the São Paulo Research Foundation (FAPESP), grants # 2014/229220 and 2015/24582-4.
Supplementary Material
The supplementary material contains the complementary results and the
code published with this study, and is available at https://github.com/alexandrejaguar/
publications/tree/master/2017/dap_segmentation.
References
References
[1] J. M. C. Brown, S. Solomon, R. A. Tinker, Development of an energy
discriminate CR-39 R nuclear track etch dosimeter for Radon-220 gas measurements, Journal of Environmental Radioactivity 102 (10) (2011) 901–
905. doi:10.1016/j.jenvrad.2010.09.008.
[2] B. Smilgys, S. Guedes, M. Morales, F. Alvarez, J. C. Hadler, P. R. P.
Coelho, P. T. D. Siqueira, I. Alencar, C. J. Soares, E. A. C. Curvo,
Boron thin films and CR-39 detectors in BNCT: A method to measure
the 10B(n,α)7Li reaction rate, Radiation Measurements 50 (2013) 181–
186. doi:10.1016/j.radmeas.2012.07.001.
URL http://dx.doi.org/10.1016/j.radmeas.2012.07.001
17
[3] G. A. Wagner, P. Van den Haute, Fission-Track Dating, Springer Netherlands, Dordrecht, 1992. doi:10.1007/978-94-011-2478-2.
URL http://link.springer.com/10.1007/978-94-011-2478-2
[4] Y. Goto, T. Danhara, Zircon Fission-track Dating of the Hiyoriyama
Cryptodome at Kuttara Volcano, Southwestern Hokkaido, Japan, Bulletin of the volcanological society of Japan 56 (1) (2011) 19–23. doi:
10.18940/kazan.56.1_19.
[5] T. Imayama, T. Takeshita, K. Yi, D.-L. Cho, K. Kitajima, Y. Tsutsumi,
M. Kayama, H. Nishido, T. Okumura, K. Yagi, T. Itaya, Y. Sano,
Two-stage partial melting and contrasting cooling history within the
Higher Himalayan Crystalline Sequence in the far-eastern Nepal Himalaya,
Lithos 134-135 (2012) 1–22. doi:10.1016/j.lithos.2011.12.004.
URL
http://linkinghub.elsevier.com/retrieve/pii/
S002449371100377X
[6] H. Takagi, K. Tsutsui, H. Arai, H. Iwano, T. Danhara, Geological framework and fission track dating of pseudotachylyte of the Atotsugawa Fault,
Magawa area, central Japan, Island Arc 22 (3) (2013) 318–337. doi:
10.1111/iar.12036.
URL http://doi.wiley.com/10.1111/iar.12036
[7] T. Yuguchi, S. Sueoka, H. Iwano, T. Danhara, M. Ishibashi, E. Sasao,
T. Nishiyama, Spatial distribution of the apatite fission-track ages in the
Toki granite, central Japan: Exhumation rate of a Cretaceous pluton emplaced in the East Asian continental margin, Island Arc 26 (6) (2017) 1–15.
doi:10.1111/iar.12219.
URL http://doi.wiley.com/10.1111/iar.12219
[8] T. Ninomiya, S. Taniguchi, S. Shimoyama, K. Watanabe, T. Danhara,
H. Iwano, D. J. Dunkley, K. Shiraishi, C. Gouzu, U-Pb and fission-track
dating of a submarine pyroclastic rock from southwest Japan, Island Arc
18
26 (6) (2017) 1–11. doi:10.1111/iar.12215.
URL http://doi.wiley.com/10.1111/iar.12215
[9] R. L. Fleischer, P. B. Price, R. M. Walker, E. L. Hubbard, Track Registration in Various Solid-State Nuclear Track Detectors, Physical Review
133 (5A) (1964) A1443–A1449. doi:10.1103/PhysRev.133.A1443.
URL https://link.aps.org/doi/10.1103/PhysRev.133.A1443
[10] K. Moriwaki, Y. Shimpuku, M. Makimura, Improvement of Track Counting Accuracy and Efficiency in the Fission Track Method., Radioisotopes
47 (8) (1998) 611–616. doi:10.3769/radioisotopes.47.611.
URL
https://www.jstage.jst.go.jp/article/radioisotopes1952/
47/8/47_8_611/_article
[11] A. J. W. Gleadow, S. J. Gleadow, D. X. Belton, B. P. Kohn, M. S.
Krochmal, R. W. Brown, Coincidence mapping - a key strategy for the automatic counting of fission tracks in natural minerals, Geological Society,
London, Special Publications 324 (1) (2009) 25–36. doi:10.1144/SP324.2.
URL http://sp.lyellcollection.org/lookup/doi/10.1144/SP324.2
[12] R. C. Gonzalez, R. E. Woods, Digital Image Processing, 3rd Edition, Pearson, Upper Saddle River, NJ, USA, 2007.
[13] D. Azimi-Garakani, J. G. Williams, Automatic fission track counting using
the Quantimet 720, Nuclear Instruments and Methods 147 (1977) 69–73.
[14] J. Beer, J. Pipper, W. Heinrich, Automatic measurements of nuclear tracks
in plastic foils, Journal of Physics E: Scientific Instruments 15 (4) (1982)
439–443.
URL http://stacks.iop.org/0022-3735/15/i=4/a=013
[15] P. B. Price, W. Krischer, Semi-automated, three-dimensional measurement
of etched tracks in solid-state nuclear track detectors, Nuclear Instruments
and Methods in Physics Research Section A: Accelerators, Spectrometers,
Detectors and Associated Equipment 234 (1) (1985) 158–167.
19
[16] W. Trakowski, B. Schöfer, J. Dreute, S. Sonntag, C. Brechtmann, J. Beer,
H. Drechsel, W. Heinrich, An automatic measuring system for particle
tracks in plastic detectors, Nuclear Instruments and Methods in Physics
Research 225 (1) (1984) 92–100. doi:10.1016/0167-5087(84)91342-5.
[17] S. Masumoto, K. Wadatsumi, Computerized Image-Processing System for
Fission-Track Dating, Geoinformatics 1 (1) (1990) 93–102.
[18] K. Wadatsumi, S. Masumoto, Three-dimensional measurement of fissiontracks: Principles and an example in zircon from the Fish Canyon tuff,
International Journal of Radiation Applications and Instrumentation. Part
D. Nuclear Tracks and Radiation Measurements 17 (3) (1990) 399–406.
doi:10.1016/1359-0189(90)90063-4.
URL
http://linkinghub.elsevier.com/retrieve/pii/
1359018990900634
[19] A. P. Fews, Fully automated image analysis of etched tracks in CR39, Nuclear Instruments and Methods in Physics Research Section B:
Beam Interactions with Materials and Atoms 71 (4) (1992) 465–478.
doi:10.1016/0168-583X(92)95367-Z.
URL
http://linkinghub.elsevier.com/retrieve/pii/
0168583X9295367Z
[20] N. Petford, J. A. Miller, Three-dimensional imaging of fission tracks using
confocal scanning laser microscopy, American Mineralogist 77 (1992) 529–
533.
[21] N. Petford, J. A. Miller, J. Briggs, The automated counting of fission
tracks in an external detector by image analysis, Computers & Geosciences
19 (4) (1993) 585–591. doi:10.1016/0098-3004(93)90084-I.
URL
http://linkinghub.elsevier.com/retrieve/pii/
009830049390084I
[22] G. Espinosa, R. B. Gammage, K. E. Meyer, C. S. Dudney, Nuclear track
20
analysis by digital imaging, Radiation Protection Dosimetry 66 (1-4) (1996)
363–366.
[23] A. Boukhair, A. Haessler, J. C. Adlo, A. Nourreddine, New code for digital
imaging system for track measurements, Nuclear Instruments and Methods in Physics Research. Section B, Beam Interactions with Materials and
Atoms 160 (2000) 550–555.
[24] M. Dolleiser, S. R. Hashemi-Nezhad, A fully automated optical microscope
for analysis of particle tracks in solids, Nuclear Instruments and Methods in
Physics Research, Section B: Beam Interactions with Materials and Atoms
198 (1-2) (2002) 98–107. doi:10.1016/S0168-583X(02)01484-2.
[25] R. Bedogni, Development of a reader for the routine analysis of CR-39 fast
neutron dosemeters: improvement of the dosimetric performance using
automatic vision and motion tools, Radiation Measurements 36 (1-6)
(2003) 239–243. doi:10.1016/S1350-4487(03)00131-8.
URL
http://linkinghub.elsevier.com/retrieve/pii/
S1350448703001318
[26] N. Yasuda, K. Namiki, Y. Honma, Y. Umeshima, Y. Marumo, H. Ishii,
E. R. Benton, Development of a high speed imaging microscope and new
software for nuclear track detector analysis, Radiation Measurements 40 (26) (2005) 311–315. doi:10.1016/j.radmeas.2005.02.013.
[27] H. Tawara, K. Eda, K. Takahashi, T. Doke, N. Hasebe, S. Kodaira,
S. Ota, M. Kurano, N. Yasuda, Development of an automated multisample scanning system for nuclear track etched detectors, Nuclear Instruments and Methods in Physics Research, Section A: Accelerators, Spectrometers, Detectors and Associated Equipment 593 (3) (2008) 475–480.
doi:10.1016/j.nima.2008.05.035.
[28] A. F. de Siqueira, W. M. Nakasuga, A. Pagamisse, C. A. Tello Saenz, A. E.
Job, An automatic method for segmentation of fission tracks in epidote
21
crystal photomicrographs, Computers and Geosciences 69 (2014) 55–61.
doi:10.1016/j.cageo.2014.04.008.
URL http://dx.doi.org/10.1016/j.cageo.2014.04.008
[29] J. Ruan, H. Li, J. Zhang, Z. Zhang, L. Chen, J. Song, J. Liu, J. Liu,
Image mosaic method for recognition of proton track in nuclear emulsions,
Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment 762 (2014)
16–21. doi:10.1016/j.nima.2014.05.040.
URL
http://dx.doi.org/10.1016/j.nima.2014.05.040http:
//linkinghub.elsevier.com/retrieve/pii/S0168900214005671
[30] E. Enkelmann, T. A. Ehlers, G. Buck, A. K. Schatz, Advantages and challenges of automated apatite fission track counting, Chemical Geology 322323 (2012) 278–289. doi:10.1016/j.chemgeo.2012.07.013.
URL http://dx.doi.org/10.1016/j.chemgeo.2012.07.013
[31] S. Beucher, C. Lantuejoul, Use of Watersheds in Contour Detection (1979).
doi:citeulike-article-id:4083187.
URL http://www.citeulike.org/group/7252/article/4083187
[32] J. Serra, Image analysis and mathematical morphology, Vol. 1, Academic
press, 1982.
[33] F. M. Schaller, M. Neudecker, M. Saadatfar, G. Delaney, K. Mecke, G. E.
Schröder-Turk, M. Schröter, Tomographic analysis of jammed ellipsoid
packings, in: AIP Conference Proceedings, Vol. 1542, 2013, pp. 377–380.
doi:10.1063/1.4811946.
URL http://aip.scitation.org/doi/abs/10.1063/1.4811946
[34] G. H. Ball, D. J. Hall, A clustering technique for summarizing multivariate data, Behavioral Science 12 (2) (1967) 153–155. doi:10.1002/bs.
3830120210.
22
[35] T. W. Ridler, S. Calvard, Picture Thresholding Using an Iterative Selection
Method, IEEE Transactions on Systems, Man and Cybernetics 8 (8) (1978)
630–632. doi:10.1109/TSMC.1978.4310039.
[36] F. R. Dias Velasco, Thresholding Using the ISODATA Clustering Algorithm, IEEE Transactions on Systems, Man, and Cybernetics 10 (11) (1980)
771–774. doi:10.1109/TSMC.1980.4308400.
URL http://ieeexplore.ieee.org/document/4308400/
[37] S. van der Walt, J. L. Schönberger, J. Nunez-Iglesias, F. Boulogne, J. D.
Warner, N. Yager, E. Gouillart, T. Yu, scikit-image: image processing in
Python, PeerJ 2 (2014) e453. arXiv:1407.6245, doi:10.7717/peerj.453.
URL https://peerj.com/articles/453
[38] C. Fiorio, J. Gustedt, Two linear time Union-Find strategies for image
processing, Theoretical Computer Science 154 (2) (1996) 165–181. doi:
10.1016/0304-3975(94)00262-2.
[39] J. C. Russ, The Image Processing Handbook, 6th Edition, CRC Press, 2011.
URL https://www.crcpress.com/The-Image-Processing-Handbook-Sixth-Edition/
Russ/p/book/9781439840450
[40] J. F. Ziegler, M. D. Ziegler, J. P. Biersack, SRIM - The stopping and range
of ions in matter (2010), Nuclear Instruments and Methods in Physics
Research, Section B: Beam Interactions with Materials and Atoms 268 (1112) (2010) 1818–1823. doi:10.1016/j.nimb.2010.02.091.
URL http://dx.doi.org/10.1016/j.nimb.2010.02.091
[41] S. van der Walt, S. C. Colbert, G. Varoquaux, The NumPy Array: A
Structure for Efficient Numerical Computation, Computing in Science &
Engineering 13 (2) (2011) 22–30. doi:10.1109/MCSE.2011.37.
URL http://ieeexplore.ieee.org/document/5725236/
[42] E. Jones, T. Oliphant, P. Peterson, SciPy: Open source scientific tools for
23
Python (2001–).
URL http://www.scipy.org/
[43] J. D. Hunter, Matplotlib: A 2D Graphics Environment, Computing in
Science & Engineering 9 (3) (2007) 90–95. doi:10.1109/MCSE.2007.55.
URL http://ieeexplore.ieee.org/document/4160265/
[44] G. van Rossum, Python Reference Manual, Tech. rep., Centrum voor
Wiskunde en Informatica (CWI), Amsterdam (1995).
URL https://ir.cwi.nl/pub/5008/05008D.pdf
[45] C. T. Rueden, J. Schindelin, M. C. Hiner, B. E. DeZonia, A. E. Walter, E. T. Arena, K. W. Eliceiri, ImageJ2: ImageJ for the next generation of scientific image data, BMC Bioinformatics 18 (1) (2017) 529.
doi:10.1186/s12859-017-1934-z.
URL https://bmcbioinformatics.biomedcentral.com/articles/10.
1186/s12859-017-1934-z
[46] S. Guedes, J. C. Hadler, P. J. Iunes, S. R. Paulo, C. A. Tello, On the
reproducibility of SSNTD track counting efficiency, Nuclear Instruments
and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment 418 (2-3) (1998) 429–433.
doi:10.1016/S0168-9002(98)00918-8.
URL
http://linkinghub.elsevier.com/retrieve/pii/
S0168900298009188
[47] A. J. Hurford, P. F. Green, The zeta age calibration of fission-track dating,
Chemical Geology 41 (1983) 285–317.
doi:10.1016/S0009-2541(83)
80026-6.
URL
http://linkinghub.elsevier.com/retrieve/pii/
S0009254183800266
[48] A. J. Hurford, Standardization of fission track dating calibration: Recommendation by the Fission Track Working Group of the I.U.G.S. Subcom-
24
mission on Geochronology, Chemical Geology: Isotope Geoscience Section
80 (2) (1990) 171–178. doi:10.1016/0168-9622(90)90025-8.
[49] C. J. Soares, I. Alencar, S. Guedes, R. H. Takizawa, B. Smilgys, J. C.
Hadler, Alpha spectrometry study on LR 115 and Makrofol through measurements of track diameter, Radiation Measurements 50 (2013) 246–248.
doi:10.1016/j.radmeas.2012.06.010.
[50] J. C. Hadler, P. J. Iunes, C. A. Tello, F. Chemale, K. Kawashita, E. A. C.
Curvo, F. G. S. Santos, T. E. Gasparini, P. A. F. P. Moreira, S. Guedes,
Experimental study of a methodology for Fission-track Dating without
neutron irradiation, Radiation Measurements 44 (9-10) (2009) 955–957.
doi:10.1016/j.radmeas.2009.10.081.
URL
http://dx.doi.org/10.1016/j.radmeas.2009.10.081http:
//linkinghub.elsevier.com/retrieve/pii/S1350448709002571
[51] N. Hasebe, J. Barbarand, K. Jarvis, A. Carter, A. J. Hurford, Apatite
fission-track chronometry using laser ablation ICP-MS, Chemical Geology
207 (3-4) (2004) 135–145. doi:10.1016/j.chemgeo.2004.01.007.
[52] C. J. Soares, S. Guedes, J. C. Hadler, R. Mertz-Kraus, T. Zack, P. J.
Iunes, Novel calibration for LA-ICP-MS-based fission-track thermochronology, Physics and Chemistry of Minerals 41 (1) (2014) 65–73.
doi:
10.1007/s00269-013-0624-2.
[53] C. J. Soares, R. Mertz-Kraus, S. Guedes, D. F. Stockli, T. Zack, Characterisation of Apatites as Potential Uranium Reference Materials for Fissiontrack Dating by LA-ICP-MS, Geostandards and Geoanalytical Research
39 (3) (2015) 305–313. doi:10.1111/j.1751-908X.2014.00301.x.
URL http://doi.wiley.com/10.1111/j.1751-908X.2014.00301.x
[54] D. J. Gombosi, J. I. Garver, S. L. Baldwin, On the development of electron microprobe zircon fission-track geochronology, Chemical Geology 363
(2014) 312–321. doi:10.1016/j.chemgeo.2013.11.005.
URL http://dx.doi.org/10.1016/j.chemgeo.2013.11.005
25
[55] A. N. C. Dias, F. Chemale, C. J. Soares, S. Guedes, A new approach
for electron microprobe zircon fission track thermochronology, Chemical
Geology 459 (January) (2017) 129–136. doi:10.1016/j.chemgeo.2017.
04.014.
URL http://dx.doi.org/10.1016/j.chemgeo.2017.04.014
26
Figure 7: Processing an input image using WUSEM. Each line presents a segmentation step.
Left column: original binary image (red) and erosion obtained according to the variation
of delta radius (white). Center column: erosion results labeled, used as markers. Right
column: watershed results when using generated markers. Parameters for WUSEM algorithm:
initial radius = 10, delta radius = 4.
27
Figure 8: (a) Labels generated from tracks in Figure 4 using the WUSEM algorithm. (b)
Tracks in (a) enumerated using enumerate objects(). Tracks in the lower or right corners
are not counted, according to the “lower right corner” method. Parameters for WUSEM
algorithm: initial radius = 10, delta radius = 4. Colormaps: (a) nipy spectral, (b)
gray.
Figure 9: Manual counting mean (top of the blue bar; values on the right) for each sample
and automatic counting results with mean within (orange points) and outside (gray points)
the tolerance interval (blue bar) for the first dataset.
28
Figure 10: Comparison between manual and automatic counting for (a, b) 4.5 min etching
samples and (c, d) 8.5 min etching samples. (a, c) white: manual counting. Gray: flooding
watershed counting. Red line: distribution median. White signal: distribution mean. (b, d)
dashed: 1:1 line. Red line: regression for the WUSEM counting data. Black line: regression
for the flooding watershed counting data.
Figure 11: Regions from Figure 4 complying with ≤ 0.3. (a) labeled regions. (b) tracks
correspondent to (a) in their original gray levels. Colormaps: (a) nipy spectral. (b) magma.
29
Figure 12: Relation between incident energy versus mean diameter product ((a) 4.5 min; (c)
8.5 min samples, left Y axis) and incident energy versus mean gray levels ((b) 4.5 min; (d)
8.5 min samples, left Y axis). Cyan dashed line: electronic energy loss calculated with SRIM
(right Y axis).
Figure 13: (a) Input photomicrograph (Figure 5) binarized using the ISODATA threshold
(threshold = 0.59) and region filling. (b) Tracks separated in Figure 5 using the WUSEM
algorithm, and then enumerated using the function enumerate objects(). Parameters for
WUSEM algorithm: initial radius = 5, delta radius = 12.
30
Figure 14: Comparison between manual and automatic counting for photomicrographs in
dataset 2.
(a) white: manual counting.
Gray: flooding watershed counting.
Red line:
distribution median. White signal: distribution mean. Blue dots: outliers. (b) dashed: 1:1
line. Red line: regression for the WUSEM counting data. Black line: regression for the
flooding watershed counting data.
Figure 15: When using suitable input parameters, WUSEM may perform better in certain
regions where the classic watershed does not return reliable results. For instance, the highlighted region in (a) presents three tracks. WUSEM separates them correctly, but the region
is oversegmented by the classic watershed. The highlighted region in (b), by its turn, is
undersegmented by the classic watershed, which returns two tracks. WUSEM returns three
tracks, being closer to the real number (four tracks). Left: input photomicrographs with
highlighted regions. Center: tracks separated using WUSEM. Right: tracks separated using
classic watershed. Parameters for WUSEM algorithm: initial radius = 15, delta radius
= 4.
31
| 1cs.CV
|
1
Sparse Activity Detection for Massive Connectivity
arXiv:1801.05873v1 [cs.IT] 17 Jan 2018
Zhilin Chen, Student Member, IEEE, Foad Sohrabi, Student Member, IEEE, and Wei Yu, Fellow, IEEE
Abstract—This paper considers the massive connectivity application in which a large number of potential devices communicate
with a base-station (BS) in a sporadic fashion. The detection of
device activity pattern together with the estimation of the channel
are central problems in such a scenario. Due to the large number
of potential devices in the network, the devices need to be assigned
non-orthogonal signature sequences. The main objective of this
paper is to show that by using random signature sequences and
by exploiting sparsity in the user activity pattern, the joint user
detection and channel estimation problem can be formulated as
a compressed sensing single measurement vector (SMV) problem
or multiple measurement vector (MMV) problem, depending on
whether the BS has a single antenna or multiple antennas, and be
efficiently solved using an approximate message passing (AMP)
algorithm. This paper proposes an AMP algorithm design that
exploits the statistics of the wireless channel and provides an
analytical characterization of the probabilities of false alarm and
missed detection by using the state evolution. We consider two
cases depending on whether the large-scale component of the
channel fading is known at the BS and design the minimum
mean squared error (MMSE) denoiser for AMP according to the
channel statistics. Simulation results demonstrate the substantial
advantage of exploiting the statistical channel information in
AMP design; however, knowing the large-scale fading component
does not offer tangible benefits. For the multiple-antenna case,
we employ two different AMP algorithms, namely the AMP with
vector denoiser and the parallel AMP-MMV, and quantify the
benefit of deploying multiple antennas at the BS.
Index Terms—Device activity detection, channel estimation,
approximate message passing, compressed sensing, Internet of
Things (IoT), machine-type communications (MTC)
I. I NTRODUCTION
One of the key requirements for the next-generation wireless cellular networks is to provide massive connectivity for
machine-type communications (MTC), envisioned to support
diverse applications such as environment sensing, event detection, surveillance and control [1], [2]. Machine-centric
communications have two distinctive features as compared to
conventional human-centric communications: (i) the overall
system needs to support massive connectivity—the number
of devices connected to each cellular base-station (BS) may
be in the order of 104 to 106 ; and (ii) the traffic pattern of
each device may be sporadic—at any given time only a small
fraction of potential devices are active. For such a network,
accurate user activity detection and channel estimation are
Manuscript accepted and to appear in IEEE Transactions on Signal Processing. This work has been presented in part at IEEE International Conference on
Acoustics, Speech, and Signal Processing (ICASSP), March 2017. This work
is supported by Natural Sciences and Engineering Research Council (NSERC)
of Canada through a Discovery Grant and through a Steacie Memorial
Fellowship.
The authors are with The Edward S. Rogers Sr. Department of Electrical
and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4,
Canada (e-mails:{zchen, fsohrabi, weiyu}@comm.utoronto.ca).
crucial for establishing successful communications between
the devices and the BS.
To identify active users and to estimate their channels,
each user must be assigned a unique signature sequence.
However, due to the large number of potential devices but
the limited coherence time and frequency dimensions in the
wireless fading channel, the signature sequences for all users
cannot be mutually orthogonal. Non-orthogonal signature sequences superimposed in the pilot stage causes significant
multi-user interference, e.g., when a simple matched filtering or correlation operation is applied at the BS for user
activity detection and channel estimation. A key observation
of this paper is that the sporadic nature of the traffic leads
to sparse user transmission patterns. By exploiting sparsity
and by formulating the detection and estimation problem
with independent identically distributed (i.i.d.) random nonorthogonal pilots as a compressed sensing problem, this multiuser interference problem can be overcome, and highly reliable
activity detection and accurate channel estimation can be made
possible. In the compressed sensing terminology, when the
BS is equipped with a single antenna, activity detection and
channel estimation can be formulated as a single measurement
vector (SMV) problem; when the BS has multiple antennas,
the problem can be formulated as a multiple measurement
vector (MMV) problem.
This paper proposes the use of compressed sensing techniques for the joint user activity detection and channel estimation problem. Due to the large-scale nature of massive
device communications, this paper adopts the computationally
efficient approximate message passing (AMP) algorithm [3]
as the main technique. AMP is an iterative thresholding
method with a key feature that allows analytic performance
characterization via the so-called state evolution. The main
contributions of this paper are: (i) a novel AMP algorithm
design for user activity detection that exploits the statistical
information of the wireless channel; and (ii) a characterization
of the probabilities of false alarm and missed detection for both
SMV and MMV scenarios.
A. Related Work
The user activity detection problem for massive connectivity
has been studied from information theoretical perspectives
in [2], [4]. From an algorithmic point of view, the problem
is closely related to sparse recovery in compressed sensing
and has been studied in a variety of wireless communication
settings. For example, assuming no prior knowledge of the
channel state information (CSI), joint user activity detection
and channel estimation is considered in [5]–[8]. Specifically,
[5] proposes an efficient greedy algorithm based on orthogonal
matching pursuit for sporadic multi-user communication. By
2
exploiting the statistics of channel path-loss and the joint
sparsity structures, [6] proposes a modified Bayesian compressed sensing algorithm in a cloud radio-access network.
In the context of orthogonal frequency division multiplexing
(OFDM) systems, [7] introduces a one-shot random access
protocol and employs the basis pursuit denoising detection
method with a detection error bound based on the restricted
isometry property. The performance of such schemes in a
practical setting is illustrated in [7], [8]. When perfect CSI
is assumed, joint user activity and data detection for code
division multiple access systems (CDMA) is investigated in
[9], [10], where [9] designs the sparsity-exploiting maximum
a posteriori detector by accounting for both sparsity and finitealphabet constraints of the signal, and [10] proposes a greedy
block-wise orthogonal least square algorithm by exploiting
the block sparsity among several symbol durations. Differing
from most of the above works that consider cellular systems,
[11], [12] study the user activity detection in wireless ad hoc
networks, where each node in the system identifies its neighbor
nodes simultaneously. The authors of [11] propose a scalable
compressed neighbor discovery scheme that employs random
binary signatures and group testing based detection algorithms.
In [12], the authors propose a more dedicated scheme that uses
signatures based on Reed-Muller code and a chirp decoding
algorithm to achieve a better performance.
In contrast to the aforementioned works, this paper adopts
the more computationally efficient AMP algorithm for user activity detection and channel estimation, which is more suitable
for large-scale networks with a large number of devices. The
AMP algorithm is first proposed in [3] as a low-complexity
iterative algorithm for conventional compressed sensing with
real-valued signals and real-valued measurements. A framework of state evolution that tracks the performance of AMP
at each iteration is introduced in [3]. The AMP algorithm is
then extended along different directions. For example, [13]
generalizes the AMP algorithm to a broad family of iterative
thresholding algorithms, and provides a rigorous proof of the
framework of the state evolution. To deal with complex-valued
signals and measurements, [14] proposes a complex AMP
algorithm (CAMP). By exploiting the input and output distributions, a generalized AMP (GAMP) algorithm is designed in
[15]. Similarly, a Bayesian approach is used to design the AMP
algorithm in [16], [17] by accounting for the input distribution.
For the compressed sensing problem with multiple signals
sharing joint sparsity, i.e., the MMV problem, [18] designs an
AMP algorithm via a vector form of message passing; and [19]
designs the AMP-MMV algorithm by directly using message
passing over a multi-frame factor graph.
Although the use of the AMP algorithm for user activity
detection has been previously proposed in [20], the statistical
information of the channel is not exploited in the prior work;
also performance analysis is not yet available. This paper
makes progress by showing that exploiting channel statistics
can significantly enhance the Bayesian AMP algorithm. Moreover, analytical performance characterization can be obtained
by using state evolution. Finally, the AMP algorithm can be
extended to the multiple-antenna case.
B. Main Contributions
This paper considers the user activity detection and channel
estimation problem in the uplink of a single-cell network with
a large number of potential users, but at any given time slot
only a small fraction of them are active. To exploit the sparsity
in user activity pattern, this paper formulates the problem as a
compressed sensing problem and proposes the use of random
signature sequences and the computationally efficient AMP
algorithm for device activity detection. This paper provides the
design and analysis of AMP for both cases in which the BS
is equipped with a single antenna and with multiple antennas.
This paper considers two different scenarios: (i) when the
large-scale fading coefficients of all user are known and the
detector is designed based on the statistics of fast fading component only; and (ii) when the large-scale fading coefficients
are not known and the detector is designed based on the
statistics of both fast fading and large-scale fading components
as a function of the distribution of device locations in the cell.
The proposed AMP-based detector exploits the statistics of the
wireless channel by specifically designing the minimum mean
squared error (MMSE) denoiser. This paper provides analytical
characterization of the probabilities of false alarm and missed
detection via the state evolution for both scenarios.
For the case where the BS is equipped with a single
antenna, numerical results indicate that: (i) the analytic performance characterization via state evolution is very close to
the simulation; (ii) exploiting the statistical information of
the channel and user activity can significantly improve the
detector performance; and (iii) knowing the large-scale fading
coefficient actually does not bring substantial performance
improvement as compared to the case that only the statistical
information about the large-scale fading is available.
For the case where the BS is equipped with multiple antennas, this paper considers both the AMP with vector denoiser
[18] and the parallel AMP-MMV [17]. For the AMP with
vector denoiser, this paper exploits wireless channel statistics
in denoiser design and further analytically characterizes the
probabilities of false alarm and missed detection based on
the state evolution. For the parallel AMP-MMV algorithm,
which is more suitable for distributed computation, performance characterization is more difficult to obtain. Simulation
results show that: (i) having multiple antennas at the BS
can significantly improve the detector performance; (ii) the
predicted performance of AMP with vector denoiser is very
close to its simulated performance; and (iii) AMP with vector
denoiser and parallel AMP-MMV achieve approximately the
same performance.
C. Paper Organization and Notations
The remainder of this paper is organized as follows. Section II introduces the system model. Section III introduces
the AMP algorithms for both SMV and MMV problems.
Section IV considers user activity detection and channel estimation when the BS has a single-antenna, while Section V
considers the multiple-antenna case. Simulation results are
provided in Section VI. Conclusions are drawn in Section VII.
3
Throughout this paper, upper-case and lower-case letters
denote random variables and their realizations, respectively.
Boldface lower-case letters denote vectors. Boldface uppercase letters denote matrices or random vectors, where context
should make the distinction clear. Superscripts (·)T , (·)∗
and (·)−1 denote transpose, conjugate transpose, and inverse
operators, respectively. Further, I denotes identity matrix with
appropriate dimensions, E[·] denotes expectation operation,
, denotes definition, | · | denotes either the magnitude of a
complex variable or the determinant of a matrix, depending
on the context, and k · k2 denotes the `2 norm.
II. S YSTEM M ODEL
Consider the uplink of a wireless cellular system with one
BS located at the center and N single-antenna devices located
uniformly in a circular area with radius R, but in each coherence block only a subset of users are active. Let an ∈ {1, 0}
indicate whether or not user n is active. For the purpose of
channel probing and user identification, user n is assigned
a unique signature sequence sn = [s1n , s2n , · · · , sLn ]T ∈
CL×1 , where L is the length of the sequence. This paper
assumes that the signature sequence sn is generated according
to i.i.d. complex Gaussian distribution with zero mean and
variance 1/L such that each sequence is normalized to have
unit power, and the normalization factor 1/L is incorporated
into the transmit power.
We consider a block-fading channel model where the channel is static in each block. In this paper, we consider two
cases where the BS is equipped with either a single antenna
or multiple antennas. When the BS has only one antenna, the
received signal at the BS can be modeled as
y=
N
X
(1)
where hn ∈ C is the channel coefficient between user n
and the BS, w ∈ CL×1 is the effective complex Gaus2
depends on the background
sian noise whose variance σw
noise power normalized by the user transmit power. Here,
x , [x1 , x2 , · · · , xN ]T ∈ CN ×1 where xn , hn an , and
S , [s1 , s2 , · · · , sN ] ∈ CL×N .
We aim to recover the non-zero entries of x based on the
received signals y. We are interested in the regime where
the number of potential users is much larger than the pilot
sequence length, i.e., N L, so that the user pilot sequences
cannot be mutually orthogonal; but due to the sporadic traffic,
only a small number of devices transmit in each block,
resulting in a sparse x. The recovering of x for the single
antenna case is in the form of the SMV problem in compressed
sensing.
This paper also considers the case where the BS is equipped
with M antennas. In this case, the received signal Y ∈ CL×M
at the BS can be expressed in matrix form as
N
X
pR|G (rn |gn ) = (1 − λ)δ0 + λpH|G (rn |gn ),
an sn hn + W , SX + W,
(2)
n=1
where hn ∈ C1×M is the channel vector between user n and
the BS, W ∈ CL×M is the effective complex Gaussian noise,
(3)
where δ0 denotes the point mass measure at 0, pH|G denotes
the probability density function (pdf) of the channel vector
H given prior information G, which has a pdf pG , and gn
denotes the prior information for user n. Note that we use
H to denote the random channel vector and hn to denote its
realization. Based on (3), the pdf of the entries of x is
pX|G (xn |gn ) = (1 − λ)δ0 + λpH|G (xn |gn ).
an sn hn + w , Sx + w,
n=1
Y=
and X , [rT1 , · · · , rTN ]T ∈ CN ×M where rn , an hn ∈
C1×M is the nth row vector of X. We also use cm ∈ CN ×1 to
represent the mth column vector of X, i.e., X = [c1 , · · · , cM ].
Note that an indicates whether the entire row vector rn is zero
or not. In other words, columns of X (i.e., cm ) share the same
sparsity pattern.
We are interested in detecting the user activity an as well
as in estimating the channel gains of the active users, which
correspond to the non-zero rows of the matrix X, based on
the observation Y in the regime where N L. The problem
of recovering X from Y is in the form of the MMV problem
in compressed sensing.
A key observation of this paper is that the design of recovery
algorithm can be significantly enhanced by taking advantage
of the knowledge about the statistical information of x or X.
Toward this end, we provide a model for the distribution of
the entries of x, and the distribution of the rows of X. Since
x is a special case of X when M = 1, we focus on the model
for X.
We assume that each user accesses the channel with a small
probability λ in an i.i.d. fashion, i.e., Pr(an = 1) = λ, ∀n,
and there is no correlation between different users’ channels,
so that the row vectors of X follow a mixture distribution
(4)
To model the distribution of H, we assume that all users are
randomly and uniformly located in a circular coverage area of
radius R with the BS at the center, and the channels between
the users and the BS follow an independent distribution that
depends on the distance. More specifically, H includes pathloss, shadowing, and Rayleigh fading. The path-loss between
a user and the BS is modeled (in dB) as α + β log10 (d),
where d is the distance measured in meter, α is the fading
coefficient at d = 1, and β is the path-loss exponent. The
shadowing (in dB) follows a Gaussian distribution with zero
2
mean and variance σSF
. The Rayleigh fading is assumed to
be i.i.d. complex Gaussian with zero mean and unit variance
across all antennas.
The large-scale fading, which includes path-loss and shadowing, is denoted as G, whose pdf pG can be modeled by the
2
distribution of BS-user distance and shadowing parameter σSF
.
This paper considers both the case where only the statistics
of the the large-scale fading, i.e., pG , is known as well as
the case where the exact large-scale fading coefficient gn is
known at the BS. The latter case is motivated by the scenario
in which the devices are stationary, so that the path-loss and
shadowing can be estimated and stored at the BS as prior
information. When gn is known, pH|G captures the distribution
of the Rayleigh fading component. When only p(G) is known,
we drop G and gn from pH|G (hn |gn ), and write it as pH (hn ),
4
which captures the distribution of both large-scale fading and
Rayleigh fading.
III. AMP A LGORITHM
AMP is an iterative algorithm that recovers sparse signal
for compressed sensing. We introduce the AMP framework
for both the SMV and the MMV problems in this section.
A. AMP for SMV problem
AMP is first proposed for the SMV problem in [3]. Starting
with x0 = 0 and z0 = y, AMP proceeds at each iteration as
xt+1 = η(S∗ zt + xt , g, t),
N
zt+1 = y − Sxt+1 + zt hη 0 (S∗ zt + xt , g, t)i,
L
(5)
(6)
where g , [g1 , · · · , gN ]T , and t = 0, 1, · · · is the index of
iteration, xt is the estimate of x at iteration t, zt is the residual,
η(·, g, t) , [ηt (·, g1 ), · · · , ηt (·, gN )]T where ηt (·, gn ) : C →
C is an appropriately designed non-linear function known as
denoiser that operates on the nth entry of the input vector,
η 0 (·) , [ηt0 (·, g1 ), · · · , ηt0 (·, gN )]T where ηt0 (·, gn ) is the first
order derivative of ηt (·, gn ) with respect to the first argument,
and h·i is averaging operation over all entries of a vector. Note
that the third term in the right hand side of (6) is the correction
term known as the “Onsager term” from statistical physics.
In the AMP algorithm, the matched filtered output x̃t ,
S∗ zt + xt can be modeled as signal x plus noise (including
multiuser interference), i.e., x̃t = x + vt , where vt is
Gaussian due to the correction term. The denoiser is typically
designed to reduce the estimation error at each iteration. In
the compressed sensing literature, the prior distribution of x
is usually assumed to be unknown. In this case, a minimax
framework over the worst case x leads to a soft thresholding
denoiser [21]. When the prior distribution of x is known, the
Bayesian framework then can be used to account for the prior
information on x [16]. In this paper, we adopt the Bayesian
approach and design the MMSE denoiser for the massive
connectivity setup as shown in the next section.
The AMP algorithm can be analyzed in the asymptotic
regime where L, N → ∞ with fixed N/L via the state
evolution, which predicts the per-coordinate performance of
the AMP algorithm at each iteration as follows
2
2
τt+1
= σw
+
N
2
E |ηt (X + τt V, G) − X| ,
L
(7)
where τt is referred to as the state, X, V , and G are random
variables with X following pX|G , V following the complex
Gaussian distribution with zero mean and unite variance, and
G following pG , and the expectation is taken over all X, V ,
and G. We denote X̃ t , X + τt V . The random variables X,
V , G X̃ t capture the distributions of the entries of x, entries
of vt (up to a factor τt ), the
prior informationgn , and entries
of x̃t , respectively, with E |ηt (X̃ t , G) − X|2 characterizing
the per-coordinate MSE of the estimate of x at iteration t.
B. AMP for MMV problem
1) AMP with vector denoiser: One extension of the AMP
algorithm to solve the MMV problem in (2) is proposed in
[18], which employs a vector denoiser that operates on each
row vector of the matched filtered output:
Xt+1 = η(S∗ Zt + Xt , g, t),
N
Zt+1 = Y − SXt+1 + Zt hη 0 (S∗ Zt + Xt , g, t)i,
L
(8)
(9)
where η(·, g, t) , [ηt (·, g1 ), · · · , ηt (·, gN )]T with ηt (·, gn ) :
C1×M → C1×M is a vector denoiser that operates on the nth
row vector of S∗ Zt + Xt , and the other notations are similar
to those used in (5) and (6). The state evolution of the AMP
algorithm for the MMV problem also has a similar form as
N
2
Σt+1 = σw
I + E Dt (Dt )∗ ,
(10)
L
T
where Dt , (ηt (R + Ut , G) − R) ∈ CM ×1 , with random
vector R following pR|G and random vector Ut following
CN (0, Σt ). The expectation is taken over R, Ut , and G. To
minimize the estimation error at each iteration, we can also
design the vector denoiser ηt (·, ·) via the Bayesian approach.
2) Parallel AMP-MMV: A different extension of the AMP
algorithm for dealing with the MMV problem is the parallel
AMP-MMV algorithm proposed in [19]. The basic idea is to
solve the MMV problem iteratively by using multiple parallel
AMP-SMVs then exchanging soft information between them.
Parallelization allows distributed implementation of the algorithm, which can be computationally advantageous, especially
when the number of antennas is large.
The outline of the parallel AMP-MMV algorithm is illustrated in Algorithm 1 which operates on a per-antenna
basis, i.e., on the columns of X and Z, denoted as
cm and zm respectively, and where η(·, g, t, i, m) ,
[ηt,i,m (·, g1 ), · · · , ηt,i,m (·, gN )]T is the denoiser used for the
mth antenna in the iteration (t, i). Note that here we add
index i and m in the notation of denoiser, ηt,i,m (·, gn ), to
indicate the index of outer iteration and the index of SMV
stage, respectively. In the first phase which is called the (into)(
phase, the messages π nm , are calculated and passed to the
mth AMP-SMV stage. These messages convey the current
belief about the probability of being active for each user. In
(
the first iteration, we have π nm = λ, ∀n, m, since no further
information is available. In the next phase, which is called the
(within)-phase, the conventional AMP algorithm is applied to
the received signal of each antenna. Note that the denoiser in
AMP algorithm is a function of the current belief about the
activity of the users which is obtained based on the information
sharing between all M AMP-SMV stages. Finally, in the (out)phase, the estimate of channel gains is used to refine the belief
about the activity of the users.
IV. U SER ACTIVITY D ETECTION : S INGLE -A NTENNA C ASE
A main point of this paper is that exploiting the statistics
of the wireless channel can significantly enhance detector
performance. This section proposes an MMSE denoiser design
for the AMP algorithm for the wireless massive connectivity
5
√
−10 2
−α − β log10 (R) 20
√
b=
−
, c=
.
(ln 10)σSF
βb
2σSF
Proof. See Appendix A.
Algorithm 1 Parallel AMP-MMV Method [19]
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
*
Initialize π nm = 0.5, ∀n, m.
for i = 1 to I do
Execute the (into)-phase: Q
π nm =
*
m0 6=m π nm0
Q
*
*
m0 6=m (1− π nm0 )+λ
m0 6=m π nm0
λ
(
(1−λ)
Q
, ∀n, m
Execute the (within)-phase:
for m = 1 to M do
Initialize c0m = 0, z0m = ym .
for t = 0 to T do
∗ t
t
ct+1
m = η(S zm + cm , g, t, i, m),
t
0
∗ t
t+1
zm
= ym − Sct+1
+ N
m
L zm hη (S zm +
t
cm , g, t, i, m)i,
end for
end for
Execute the (out)-phase:
*
Calculate π nm , ∀n, m, the probability of user n being
active based on the decision at the mth AMP-SMV stage.
end for
problem that specifically takes wireless channel characteristics
into consideration in the single-antenna case. Two scenarios
are considered: the large-scale fading gn of each user is either
directly available or only its statistics is available at the BS.
This section further studies the optimal detection strategy, and
analyzes the probabilities of false alarm and missed detection
by using the state evolution of the AMP algorithm.
A. MMSE Denoiser for AMP Algorithm
In the scenario where only the statistics about the largescale fading is known at the BS, the distributions of the
channel coefficients pH (hn ) are independent and identical for
all devices. In the scenario where the devices are stationary and
their path-loss and shadowing coefficients can be estimated
and thus the exact large-scale fading is known at the BS,
the distributions of the channel coefficients are of the form
pH|G (hn |gn ), which are complex Gaussian with variance
parameterized by gn , and are independent but not identical
across the devices. To derive the MMSE denoisers via the
Baysian approach for both cases, we first characterize the
distributions pG (gn ), pH (hn ) and pH|G (hn |gn ) as follows.
Proposition 1. Consider a circular wireless cellular coverage area of radius R with BS at the center and uniformly
distributed devices where the channels between the BS and
the devices are modeled with large-scale fading gn with
parameters α, β and shadowing fading parameter σSF as
defined in the system model. Then, gn follows a distribution
as
pG (gn ) = agn−γ Q(gn ),
(11)
R∞
where Q(gn ) , (b ln gn +c) exp(−s2 )ds, γ , 40/β + 1, and
a, b, and c are constants depending on parameters α, β, σSF
and R as
2
40
2(ln 10)2 σSF
2 ln(10)α
a = 2 √ exp
−
,
β2
β
R β π
Proposition 2. Denote hn as the channel coefficient which
contains both the large-scale fading gn and Rayleigh fading.
If only pG (gn ) is known at the BS, the pdf of hn is given by
Z ∞
−|hn |2
a −γ−2
dgn . (12)
g
Q(gn ) exp
pH (hn ) =
π n
gn2
0
If gn is known at the BS, the pdf of hn given gn is
1
−|hn |2
pH|G (hn |gn ) =
exp
.
(13)
πgn2
gn2
Proof. See Appendix B.
Note that for the first scenario, the channel distribution
(12) only depends on a few parameters such as the path-loss
exponent in the path-loss model and the standard deviation in
the shadowing model, which are assumed to be known and can
be estimated in practice. For the second scenario, the channel
distribution (13) is just a Rayleigh fading model parameterized
by the large-scale fading. The large-scale fading information
can be obtained by tracking the estimated channel over a
reasonable period. This second scenario is applicable to the
case where the users are mostly stationary, so the large-scale
fading changes only slowly over time. It is worth noting that
although this paper restricts attention to the Rayleigh fading
model, the approach developed here is equally applicable for
Rician or any other statistical channel model.
In the following, we design the MMSE denoisers for the
AMP algorithm by exploiting pH (hn ) and pH|G (hn |gn ).
1) With Statistical Knowledge of Large-Scale Fading Only:
Since gn is unknown and only the distribution pG (gn ) is
available at the BS, the denoiser ηt (·, gn ) reduces to ηt (·),
which indicates that the denoiser for each entry of the matched
filtered output is the same. By using (12), the pdf of the entries
of x can be expressed as
Z ∞
exp(−|xn |2 gn−2 )
pX (xn ) = (1 − λ)δ0 +
dgn . (14)
πgnγ+2 /(aλQ(gn ))
0
The MMSE denoiser is given by the conditional expectation, i.e., ηt (x̃tn ) = E[X|X̃ t = x̃tn ] where random variable
X̃ t = X + τt V , and x̃tn is a realization of X̃ t . Note that the
denoiser ηt (x̃tn ) depends on t through τt . The expression of the
conditional expectation is given in the following proposition.
Proposition 3. Based on the pdf of xn in (14) and the signalplus-noise model X̃ t = X + τt V at each iteration in AMP,
the conditional expectation of X given X̃ t = x̃tn is given by
E[X|X̃ t = x̃tn ] = x̃tn
ν1 (|x̃tn |2 )
,
ξ1 (|x̃tn |2 )
where functions νi (s) and ξi (s) are defined as
Z ∞ 2−γ
−s
gn Q(gn )
exp
dgn ,
νi (s) ,
(gn2 + τt2 )i+1
gn2 + τt2
0
1−λ
−s
ξi (s) ,
exp
τ2
λaτt2i
Z ∞ −γ t
gn Q(gn )
−s
+
exp
dgn .
(gn2 + τt2 )i
gn2 + τt2
0
(15)
(16)
(17)
6
1.5
hypothesis testing problem
(
H0 : X = 0, inactive user,
10 -5
H1 : X 6= 0, active user;
1
the optimal decision rule is given by
0.5
0
LLR = log
-0.5
MMSE denoiser
t
=10-6
soft thresholding =10-6
=2 10
-6
soft thresholding =2 10
-6
MMSE denoiser
-1
-1.5
-1.5
-1
-0.5
0
0.5
t
1
1.5
10 -5
Fig. 1. MMSE denoiser vs. soft thresholding denoiser [14] ηtsoft (x̃tn ) ,
(x̃tn −
(21)
θ x̃tn
)I(|x̃tn |
|x̃tn |
> θ), where I(·) is the indicator function.
Proof. See Appendix C.
Note that to implement ηt (x̃tn ) at each iteration, the value of
τt is needed. In practice, an empirical estimate τ̂t = √1L kzt k2 ,
where k · k2 denotes the `2 norm, can be used [22]. Although
ηt (x̃tn ) is in a complicated form, we note that it can be precomputed and stored as table lookup, so it does not add to runtime complexity. To gain some intuition, we illustrate the shape
of the MMSE denoiser as compared to the widely used soft
thresholding denoiser in Fig. 1. We observe that the MMSE
denoiser plays a role similar to the soft thresholding denoiser,
shrinking the input towards the origin, especially when the
input is small, thereby promoting sparsity.
2) With Exact Knowledge of Large-Scale Fading: When gn
is available at the BS, we substitute (13) into (4), and the pdf
of the entries of x is simplified to Bernoulli-Gaussian as
λ
−|xn |2
pX|G (xn |gn ) = (1 − λ)δ0 + 2 exp
. (18)
πgn
gn2
The MMSE denoiser is given by ηt (x̃tn , gn ) = E[X|X̃ t =
x̃tn , G = gn ], where the conditional expectation is [17]
E[X|X̃ t = x̃tn , G = gn ] =
1+
gn2 (gn2 + τt2 )−1 x̃tn
,
2 +τ 2
1−λ gn
t
exp (−∆|x̃tn |2 )
λ
τt2
(19)
where
∆ , τt−2 − (gn2 + τt2 )−1 .
(20)
Compared with the MMSE denoiser in (15), we add gn to the
left hand side of (19) to emphasize the dependency on prior
information gn .
B. User Activity Detection
After the AMP algorithm has converged, we employ the
likelihood ratio test to perform user activity detection. For the
pX̃ t |X (x̃tn |X 6= 0)
pX̃ t |X (x̃tn |X
= 0)
!
H0
≶ ln ,
(22)
H1
where LLR denotes the log-likelihood ratio, and ln denotes
the decision threshold typically determined by a cost function.
The performance metrics of interest are the probability of
missed detection PM , defined as the probability that a device
is active but the detector declare the null hypothesis H0 , and
the probability of false alarm, PF , defined as the probability
that a device is inactive, but the detector declare it to be active.
We consider the threshold for two cases depending on whether
the large-scale fading coefficient gn is available at the BS or
not.
1) With Statistical Knowledge of Large-Scale Fading Only:
We first derive the likelihood probabilities in the following.
Proposition 4. Suppose that X follows (14), and V follows
complex Gaussian distribution with zero mean and unit variance, the likelihood of X̃ t = X + τt V given X = 0 or X 6= 0
is given by
−|x̃tn |2
1
exp
,
(23)
pX̃ t |X (x̃tn |X = 0) =
πτt2
τt2
Z ∞ −γ
agn Q(gn )
−|x̃tn |2
pX̃ t |X (x̃tn |X 6= 0) =
exp
dgn .
π(gn2 + τt2 )
gn2 + τt2
0
(24)
Proof. See Appendix D.
Based on (23) and (24), the log-likelihood ratio is given as
Z ∞ 2 −γ
aτt gn
LLR = log
Q(gn ) exp(|x̃tn |2 ∆)dgn ,
(25)
gn2 + τt2
0
where ∆ is defined in (20). By observing that LLR is
monotonic in |x̃tn |, we can simplify the decision rule in (22)
H0
as |x̃tn | ≶ ln , indicating that user activity detection can be
H1
performed based on the magnitude of x̃tn only.
Based on the likelihood probabilities and the threshold ln ,
the probabilities of false alarm and missed detection can be
characterized as follows
2
Z
−ln
t
t
PF =
pX̃ t |X (x̃n |X = 0)dx̃n = exp
, (26)
τt2
|x̃tn |>ln
Z
PM =
pX̃ t |X (x̃tn |X 6= 0)dx̃tn ,
(27)
|x̃tn |<ln
where (26) is simplified by using (23). Note that since only
statistical information of the large-scale fading is known at
the BS, PF and PM are the averaged false alarm and missed
detection probabilities which do not depend on gn .
7
2) With Exact Knowledge of Large-Scale Fading: When
gn is known at the BS, the distribution of X is simplified to
Bernoulli-Gaussian. The likelihood probabilities become
exp −|x̃n |2 τt−2
t
,
(28)
pX̃ t |X,G (x̃n |X = 0, G = gn ) =
πτt2
exp −|x̃n |2 (gn2 + τt2 )−1
t
.
pX̃ t |X,G (x̃n |X 6= 0, G = gn ) =
π(τt2 + gn2 )
(29)
The log-likelihood ratio is then given as
τt2
t 2
LLR(gn ) = log
exp(|x̃
|
∆)
,
n
gn2 + τt2
(30)
where the notation LLR(gn ) emphasizes the dependency on
the prior information gn . Similar to the case where only the
statistics of gn is known, LLR here is also monotonic in |x̃tn |,
which means that the user activity detection can be performed
based on |x̃tn | only.
We also use ln to denote the threshold in the detection.
Based on (28) and (29), the probabilities of false alarm and
missed detection probability are given as follows
Z
PF (gn ) =
pX̃ t |X,G (x̃tn |X = 0, G = gn )dx̃tn
|x̃tn |>ln
= exp −ln2 τt−2 ,
(31)
Z
pX̃ t |X,G (x̃tn |X 6= 0, G = gn )dx̃tn
PM (gn ) =
|x̃tn |<ln
= 1 − exp −ln2 (gn2 + τt2 )−1 ,
(32)
where we use the notation PF (gn ) and PM (gn ) to indicate
the prior known gn . Note that the false alarm probability in
(31) has the form as that in (26) even through the value of τt
may be different due to different denoisers.
A natural question then arises: how to design the threshold
ln as a function of the known large-scale fading gn ? In theory,
we can treat each user separately, i.e., set the thresholding
value of each user separately according to its own cost function. For example, if a specific target false alarm probability is
needed for user n, we can design its thresholding parameter,
ln , using the expression in (31). In order to bring fairness,
this paper considers a common target false alarm probability
for all users. Under this condition, all users share the same
thresholding parameter, i.e., ln = l, ∀n, since the expression of
PF (gn ) in (31) does not depend on gn . In such a case, different
users may have different probabilities of missed detection
depending on their large-scale fading gn . To measure the
performance of the detector for the entire system, we employ
the average probability of missed detection as
N
1 X
−l2
PM =
1 − exp
N n=1
τt2 + gn2
Z
−l2
→ pG (g) 1 − exp
dg, as N → ∞,
τt2 + g 2
(33)
where the distribution PG (g) is given in (11). When N is large,
once τt is given, the averaged performance only depends on
the statistics of the large-scale fading gn .
C. State Evolution Analysis
We have characterized the probabilities of false alarm
PF and missed detection PM for user activity detection
in (26), (27) and (31), (32), but the parameter τt that
represents the standard deviation of the residual noise still
needs to be determined. As AMP proceeds, τt converges to
τ∞
. To compute τt, we use the state evolution (7), where
E |ηt (X̃ t , G) − X|2 in (7) can be interpreted as the MSE of
the denoiser. Note that for the MMSEdenoiser,
MSE can also
be expressed as E |ηt (X̃ t , G) − X|2 = E Var(X|X̃ t , G) ,
where Var(X|X̃ t , G) is the conditional variance of X given
X̃ t and G, and the expectation is taken over both X̃ t and G.
(Note that we drop G if the large-scale fading coefficient is
unknown.) By using conditional variance, we characterize the
MSE of the designed denoisers in the following propositions.
Proposition 5. The MSE of the denoiser for the case where
only the statistics of gn is known to the BS is given by
Z ∞
aQ(gn ) λgn2 τt2
dgn
· 2
MSE(τt ) =
gnγ
gn + τt2
0
Z ∞
+
aλs µ1 (s) − ν12 (s)ξ1−1 (s) ds, (34)
0
where functions νi (s) and ξi (s) are defined in (16) and (17),
respectively, and function µi (s) is defined as
Z ∞ 4−γ
gn Q(gn )
−s
µi (s) ,
exp
dgn .
(35)
(gn2 + τt2 )i+2
gn2 + τt2
0
Proof. See Appendix E.
It is worth noting that λgn2 τt2 (gn2 + τt2 )−1 in the first term
of the right hand side of (34) corresponds to the MSE of the
estimate of xn if the large-scale fading coefficient gn as well
as the user activity is assumed to be a priori known, and the
integral of gn corresponds to the averaging over all possible
gn . The second term then represents the cost of unknown gn
and unknown user activity in reality. Similarly, for the case
where gn is exactly known, the MSE can be characterized as
follows.
Proposition 6. The MSE of the denoiser for the case where
gn is known exactly at the BS is
Z ∞
aQ(gn ) λgn2 τt2
MSE(τt ) =
· 2
dgn
gnγ
gn + τt2
0
Z ∞
aλQ(gn )gn4
+
1 − ϕ1 (gn2 τt−2 ) dgn ,
γ 2
2
gn (gn + τt )
0
(36)
where function ϕi (s) of s is defined as
Z ∞
ti exp(−t)
dt.
ϕi (s) ,
1 + (1 − λ)(1 + s)i exp(−st)/λ
0
(37)
Proof. See Appendix F.
We also observe from (36) that the first term in the right
hand side corresponds to the averaged MSE if the user activity
is assumed to be known, and the second term corresponds the
extra error brought by unknown user activity.
8
Based on the expressions of MSE in (34) and (36), the state
evolution in (7) can be expressed as
N
2
2
τt+1
= σw
+ MSE(τt ),
(38)
L
based on which PF and PM can be evaluated according to
(26), (27), and (31), (32), as functions of the iteration number.
As the AMP algorithm converges, τt converges to the fixed
point τ∞ of the above equation.
Now we compare the resulting MSEs in these two cases.
According to the decomposition of variance, we have
E Var X|X̃ t = E Var X|X̃ t , G
+ E Var E[X|X̃ t , G] X̃ t
≥ E Var X|X̃ t , G ,
(39)
which indicates that knowing the large-scale fading can help
to improve the estimation on X given X̃ t . However, the
simulation results in Section VI show that surprisingly for the
model of the large-scale fading considered in this paper, the
performance improvement is actually minor, indicating that
knowing the large-scale fading does not help to get a much
better estimation. Knowing the exact value of gn is not crucial
in user activity detection and the statistical information of gn
is sufficient for device detection.
V. U SER ACTIVITY D ETECTION : M ULTIPLE -A NTENNA
C ASE
This section designs the AMP algorithms that account for
wireless channel propagation for the massive connectivity
problem in the multiple-antenna case. As mentioned earlier,
two different AMP algorithms can be used for the MMV
problem: the AMP with a vector denoiser operating on each
row of the input matrix, or the parallel AMP-MMV that
divides the MMV problem into parallel SMV problems and
iteratively solves the SMV problem on each antenna separately
with soft information exchange between the antennas. The
AMP with vector denoiser admits a state evolution, which
allows an easier characterization of its performance, whereas
AMP-MMV can be implemented in a distributed way which
is helpful for reducing the running time of the algorithm,
especially when the BS is equipped with large antenna arrays.
A. User Activity Detection by AMP with Vector Denoiser
As in the scenario with single antenna, we consider both
the cases where only the statistical knowledge or the exactly
knowledge of the large-scale fading is known at the BS. To
design the denoisers, we first characterize the pdfs of the row
vectors of X in the following.
Proposition 7. Denote rn as the row vector of X. If only
pG (gn ) is known at the BS, the pdf of rn is given by
Z ∞
exp −krn k22 gn−2
dgn .
pR (rn ) = (1 − λ)δ0 +
π M gnγ+2M /(aλQ(gn ))
0
(40)
If gn is known, the pdf of rn is Bernoulli-Gaussian as
pR|G (rn |gn ) = (1 − λ)δ0 +
λ exp(−krn k22 gn−2 )
.
(πgn2 )M
(41)
Proof. The results are extensions of (14) and (18) by considering multivariate random variables.
Given R̃t = R + Utn with Ut following complex Gaussian
distribution with zero mean and covariance Σt , the MMSE
denoisers ηt (r̃tn ) and ηt (r̃tn , gn ) for both cases are given by
the conditional expectation in the following.
Proposition 8. If only pG (gn ) is known at the BS, the
conditional expectation of R given R̃t = r̃tn is
R∞
Q(gn )ψa (gn )(gn−2 Σt + I)−1 r̃tn dgn
t
t
R∞
,
E[R|R̃ = r̃n ] = 0
ψc (gn ) + 0 Q(gn )ψb (gn )dgn
(42)
where ψa (gn ), ψb (gn ) and ψc (gn ) are defined as follows
t ∗
−2 2 −1
exp −r̃tn Σ−1
(r̃n )
t − (Σt + gn Σt )
ψa (gn ) ,
,
γ
2
gn |Σt + gn I|
(43)
t ∗
t
−2
2
4 −1 −1
exp −r̃n gn I − (gn I + gn Σt )
(r̃n )
,
ψb (gn ) ,
γ
2
gn |Σt + gn I|
(44)
−1 t ∗
−1
t
−1
ψc (gn ) ,(1 − λ)(aλ) exp −r̃n Σt (r̃n ) |Σt | . (45)
If gn is known at the BS, the conditional expectation is
E[R|R̃t = r̃tn , G = gn ] =
(gn−2 Σt + I)−1 r̃tn
, (46)
2
1 + 1−λ
λ |gn I + Σt |ψd (gn )
where ψd (gn ) is defined as follows
t ∗
2 −1
ψd (gn ) , exp −r̃tn Σ−1
(r̃n ) |Σt |−1 .
t − (Σt + gn I)
(47)
Proof. See Appendix G.
The covariance matrix Σt in both (42) and (46) is tracked
via the state evolution (10), and Σt can be further simplified
by the following proposition.
Proposition 9. Based on the pdfs in (40) and (41) and the state
evolution (10), if the initial covariance matrix Σ0 is a diagonal
matrix with identical diagonal entries, i.e., Σ0 = τ02 I, then Σt
stays as a diagonal matrix with identical diagonal entries, i.e.,
Σt = τt2 I, for t ≥ 1, where τt is determined by
N
2
2
τt+1
= σw
+ MSE(τt ).
(48)
L
If only pG (gn ) is known at the BS, MSE(τt ) is given by
Z ∞
aλgn2 τt2 Q(gn )
MSE(τt ) =
dgn
gnγ (gn2 + τt2 )
0
Z ∞
−1
2
µM (s) − νM
(s)ξM
(s)
ds,
(49)
+
M
Γ(M + 1)/(λas )
0
where functions µi (s) , νi (s) and ξi (s) are defined in (35),
(16), and (17), respectively, and Γ(·) is the Gamma function.
If the exact large-scale fading gn is known at the BS, MSE(τt )
is given by
Z ∞
aλgn2 τt2 Q(gn )
MSE(τt ) =
dgn
gnγ (gn2 + τt2 )
0
Z ∞
aλQ(gn )gn4
ϕM (gn2 τt−2 )
+
1−
dgn ,
gnγ (gn2 + τt2 )
Γ(M + 1)
0
(50)
9
where function ϕi (s) is defined in (37).
Proof. See Appendix H.
Note that Σ0 is the noise covariance matrix after the first
matched filtering, which is indeed a diagonal matrix with
identical diagonal entries. Based on Proposition 9, the MMSE
denoiser in (42) can be further simplified as
t
E[R|R̃ =
r̃tn ]
=
νM (kr̃tn k22 )
,
r̃tn
ξM (kr̃tn k22 )
and
(51)
where νi (s) and ξi (s) are defined in (16) and (17), respectively, and the MMSE denoiser in (46) can be simplified as
E[R|R̃t = r̃tn , G = gn ]
gn2 (gn2 + τt2 )−1 r̃tn
=
1+
2
2 +τ
1−λ gn
t M
λ ( τt2 )
exp(−∆kr̃tn k22 )
large-scale fading is unknown at the BS, the probabilities of
false alarm or missed detection are then given as, respectively
Z
exp −kr̃tn k22 τt−2
dr̃tn
PF =
π M τt2M
kr̃tn k2 >ln
1
(a)
= 1−
γ̄ M, ln2 τt−2 ,
(59)
Γ(M )
, (52)
where ∆ is defined in (20). Note that if we let M = 1, (51) and
(52) reduce to the denoisers for the single-antenna case in (15)
and (19). As mentioned before, we can also pre-compute and
store the functions νM (·) and ξM (·) in (51) as table lookup.
After the AMP algorithm has converged, we use the likelihood ratio test to perform the user activity detection. Recall
that R̃t = R + Ut where Ut follows complex Gaussian
distribution. For the case where the large-scale fading is unknown, based on (40) and pR̃t derived in (82) in Appendix G,
the likelihood probabilities given that the user is inactive and
active are, respectively
exp −kr̃tn k22 τt−2
pR̃t |R (r̃tn |R = 0) =
,
(53)
π M τt2M
Z ∞
agn−γ Q(gn )
pR̃t |R (r̃tn |R 6= 0) =
M
π (gn2 + τt2 )M
0
−kr̃tn k22
exp
dgn .
(54)
gn2 + τt2
For the case where the large-scale fading coefficient is known,
noting that R follows a Beroulli-Gaussian distribution, and
R̃t follows a mixed Gaussian distribution, then the likelihood
probabilities can be computed as, respectively
exp −kr̃tn k22 τt−2
t
,
(55)
pR̃t |R,G (r̃n |R = 0, G = gn ) =
π M τt2M
exp −kr̃tn k22 (τt2 + gn2 )−1
pR̃t |R,G (r̃n |R 6= 0, G = gn ) =
.
π M (τt2 + gn2 )M
(56)
For both cases, we immediately obtain the LLRs as, respectively
Z ∞ 2M −γ
aτt gn Q(gn )
exp kr̃tn k22 ∆ dgn , (57)
LLR = log
2
2
M
(gn + τt )
0
τt2M
LLR(gn ) = log
exp kr̃tn k22 ∆ .
(58)
2
2
M
(τt + gn )
Observing that LLRs are monotonic in kr̃tn k2 , we can set a
threshold ln on kr̃tn k2 to perform the detection. When the
∞
agn−γ Q(gn )
π M (gn2 + τt2 )M
kr̃tn k2 <ln 0
−kr̃tn k22
exp
dgn dr̃tn
gn2 + τt2
Z ∞ −γ
agn Q(gn )
(b)
=
γ̄ M, ln2 (gn2 + τt2 )−1 dgn , (60)
Γ(M
)
0
Z
Z
PM =
where γ̄(·, ·) is the lower incomplete Gamma function, and (a)
and (b) are simply obtained by noticing that the integral of r̃tn
can be interpreted as the cumulative distribution function (cdf)
of a χ2 distribution with 2M degrees of freedom since kr̃tn k22
can be regarded as a sum of the squares of 2M identical real
Gaussian random variables. Using the same approach, when
the large scale fading is known to the BS, the probabilities of
false alarm and missed detection can be evaluated as
Z
exp −kr̃tn k22 τt−2
dr̃tn ,
PF (gn ) =
π M τt2M
kr̃tn k2 >ln
1
γ̄ M, ln2 τt−2 ,
(61)
=1−
Γ(M )
Z
exp −kr̃tn k22 (τt2 + gn2 )−1
PM (gn ) =
dr̃tn
π M (τt2 + gn2 )M
kr̃tn k2 <ln
1
γ̄ M, ln2 (gn2 + τt2 )−1 .
(62)
=
Γ(M )
It is easy to verify that when M = 1, (59), (60), (61) and (62)
reduce to (26), (27), (31) and (32), respectively.
Based on (59), (60), (61) and (62), we can design the
threshold ln to achieve a trade-off between the probability of
false alarm and probability of missed detection. The proposed
thresholding strategy in the single-antenna case can still be
used in multiple-antenna scenario.
B. User Activity Detection by Parallel AMP-MMV
The outline of the parallel AMP-MMV algorithm is as
presented in Algorithm 1. In this section, we adopt the
parallel AMP-MMV algorithm for our problem setup; we
present the expression of the denoiser, η(·, g, t, i, m) ,
[ηt,i,m (·, g1 ), · · · , ηt,i,m (·, gN )]T and the probability of a device being active based on the decision at the mth AMP-SMV
*
stage, π nm . Here we only discuss the case where the largescale fading is known. The extension to the scenario where
the large-scale fading is unknown is similar.
Since the parallel AMP-MMV algorithm employs M parallel AMP-SMVs, the expression of the scalar denoiser for
each AMP-SMV is in the form of the MMSE denoiser for the
single-antenna case in (19). However, instead of using the prior
λ as the probability of being active for each user, the algorithm
has access to a better estimate for the probability of activities
10
(
p(x̃T,i
nm |X = 0, G = gn ) =
p(x̃T,i
nm |X 6= 0, G = gn ) =
2 −2
exp(−|x̃T,i
nm | τT,i )
2
πτT,i
,
10 0
10 -1
10 -2
PM
as π nm as algorithm proceeds. Therefore, the expression for
the MMSE denoiser can be written as
2 −1 t,i
) x̃nm
gn2 (gn2 + τt,i
2 t,i 2 ,
ηt,i,m (x̃t,i
,
g
)
=
(
nm n
2 +τ 2
g
−gn |x̃nm |
π nm n t,i
exp
1 + 1−
(
2
2 (g 2 +τ 2 )
τt,i
τt,i
π nm
n
t,i
(63)
where x̃t,i
and
x
are
the
elements
in
the
nth
row
and
the
nm
nm
mth column of X̃t,i and X, respectively. At the end of the ith
outer iteration, i.e., t = T , the likelihood probabilities given
that the user is inactive or active can be written as
10 -3
(64)
10 -4
2 2
2 −1
exp(−|x̃T,i
)
nm | (gn + τT,i )
.
2 + g2 )
π(τT,i
n
(65)
Further, using equations (64) and (65), the probability that
user n is active based on the decision at the mth AMP-SMV
can be calculated as
p(x̃T,i
*
nm |X 6= 0, G = gn )
π nm =
T,i
p(x̃nm |X 6= 0, G = gn ) + p(x̃T,i
nm |X = 0, G = gn )
!!−1
2
2
+ gn2
τT,i
−gn2 |x̃T,i
nm |
= 1+
exp
. (66)
2
2 (g 2 + τ 2 )
τT,i
τT,i
n
T,i
After the parallel AMP-MMV is terminated, we use likelihood ratio test to perform the user activity detection. It can be
shown that the LLR for user n can be calculated as
!!
P
2M
2
τT,I
−gn2 m |x̃T,I
nm |
.
LLR(gn ) = log
2 + g 2 )M exp
2 + g 2 )τ 2
(τT,I
(τT,I
n
n T,I
(67)
It can be seen that the LLR expression for AMP-MMV
algorithm is in a similar form as in (57). Therefore, with
the same discussion, we can show that the probabilities of
false alarm and missed detection can be further simplified in a
form similar to (61) and (62), respectively. To have complete
performance prediction analysis, we also need to determine
2
τT,I
in the parallel AMP-MMV algorithm. However, due to
the soft information exchange between the antennas, deriving
2
an analytic state evolution for τt,i
is very challenging. The numerical experiments in Section VI show that the performance
of parallel AMP-MMV is very similar to AMP with vector
2
denoiser. This observation suggests that the parameter τT,I
for the AMP-MMV algorithm should be similar to the final
value of τt2 in AMP with vector denoiser.
We briefly discuss the complexities of AMP with vector denoiser and AMP-MMV. For both algorithms the computational
complexities mainly lie in the matched filtering and residual
calculation, which depend on the problem size as O(N LM ),
at each iteration. The advantage of AMP-MMV is that parallel
computation is allowed due to the division of MMV problem
into several SMV problems.
VI. S IMULATION R ESULTS
We evaluate the performance of the proposed method in
a cell of radius R = 1000m with potential N = 4000 users
among which 200 are active, i.e., λ = 0.05. The channel fading
10 -5
AMP simulated, 5dBm
AMP predicted, 5dBm
lower bound, 5dBm
AMP simulated, 15dBm
AMP predicted, 15dBm
lower bound, 15dBm
AMP simulated, 25dBm
AMP predicted, 25dBm
lower bound, 25dBm
10 -4
10 -3
10 -2
10 -1
10 0
PF
Fig. 2. Performance of AMP based user activity detection with only statistical
knowledge of the large-scale fading.
parameters are α = 15.3, β = 37.6 and σSF = 8, and the
background noise is −169dBm/Hz over 10MHz.
We first consider the single-antenna case with only statistical knowledge of large-scale fading. Fig. 2 shows the tradeoff
between the probabilities of missed detection and the false
alarm of AMP with MMSE denoiser when the pilot sequence
length is set as L = 800 and the transmit power is set as
5dBm, 15dBm, and 25dBm. We see that the predicted PM
and PF match the analysis very well. We also plot a lower
bound using τ∞ = σw . The lower bounds are very close to
the actual performance, indicating that after convergence AMP
is able to almost completely eliminate multiuser interference;
the remaining error is dominated by the background noise.
Fig. 3 shows the performance of the AMP algorithm with
MMSE denoiser when the exact large-scale fading coefficients are known. For comparison, the performance with
only statistical knowledge of the large-scale fading is also
demonstrated (only simulated performance is included since
the predicted performance is almost the same as depicted in
Fig. 2). Fig. 3 shows that the predicted curves match the
simulated curves very well. More interestingly, it indicates
that the performance improvement for knowing the exact
large-scale fading coefficients is negligible which suggests
that knowing the distribution of the large-scale fading (rather
than the exact value) is already enough for good user activity
detection performance.
The next simulation compares the AMP algorithm with
MMSE denoiser with two other algorithms widely used in
compressed sensing: CoSaMP [23], and AMP but with soft
thresholding denoiser [3]. Compare to AMP, CoSaMP is based
on the matching pursuit technique. Compare to AMP with
MMSE denoiser, AMP with soft thresholding does not exploit
the statistical knowledge of xn . Fig. 4 shows that AMP with
MMSE denoiser outperforms both CoSaMP and AMP with
soft thresholding denoiser. This is partly due to the fact that
both CoSaMP and AMP with soft thresholding denoiser do
11
10 0
10 0
10 -1
10 -1
PM = PF
PM
10 -2
AMP simulated w/o LS, 5dBm
AMP simulated with LS, 5dBm
10 -3
10 -2
AMP predicted with LS, 5dBm
AMP simulated w/o LS, 15dBm
AMP simulated with LS, 15dBm
10
-4
MMSE denoiser, L = 300
MMSE denoiser, L = 400
MMSE denoiser, L = 800
soft thresholding denoiser, L = 600
soft thresholding denoiser, L = 800
10 -3
AMP predicted with LS, 15dBm
AMP simulated w/o LS, 25dBm
AMP simulated with LS, 25dBm
AMP predicted with LS, 25dBm
10 -4
10 -3
10 -2
10 -1
10 0
PF
10 0
PM
10 -1
soft thresholding denoiser, 5dBm
CoSaMP, 5dBm
MMSE denoiser, 5dBm
soft thresholding denoiser, 15dBm
10
-3
CoSaMP, 15dBm
MMSE denoiser, 15dBm
soft thresholding denoiser, 25dBm
CoSaMP, 25dBm
MMSE denoiser, 25dBm
10 -4
10 -4
10 -3
10 -2
5
10
15
20
25
30
35
40
45
Tx power (dBm)
Fig. 3. Performance of AMP based user activity detection with knowledge
of the large-scale fading.
10 -2
10 -4
10 -1
10 0
PF
Fig. 4. Performance comparison of AMP with MMSE denoiser, AMP with
soft threshoding denoiser, and CoSaMP.
not exploit the the statistical knowledge of xn . Note that
AMP with soft thresholding implicitly solves the LASSO
problem [14], [24], i.e., the sparse signal recovery problem
as an `1 -penalized least squares optimization. Therefore, the
results in Fig. 4 indicate that AMP with MMSE denoiser also
outperforms LASSO.
Fig. 5 compares the performance of the AMP algorithm
with MMSE denoiser and the AMP algorithm with soft
thresholding denoiser as function of transmit power and pilot
length. For convenience, we set PF = PM by properly
choosing the threshold l. We observe first that the MMSE
denoiser outperforms soft thresholding denoiser significantly,
but more importantly, we observe that the minimum L needed
to drive PF and PM to zero as transmit power increases is
between 300 and 400 for the MMSE denoiser, whereas the
Fig. 5. Impact of transmit power and length of pilot on user activity detection
performance: MMSE denoiser vs. soft threholding denoiser.
minimum L is between 600 and 800 for the soft threshloding
denoiser, indicating the clear advantage of accounting for
channel statistics in user activity detector design.
Finally, we consider the multiple-antenna case assuming the
knowledge of large-scale fading coefficients. Fig. 6 illustrates
the probabilities of false alarm and missed detection under
different numbers of antennas for both AMP with vector
denoiser and parallel AMP-MMV algorithms. For comparison,
the single-antenna M = 1 case is also included. Fig. 6 shows
that for AMP with vector denoiser, the simulated results match
the predicted results very well. Further, it shows that the
performances of AMP with vector denoiser and parallel AMPMMV are approximately the same, indicating that although
these two algorithms employ different strategies, they both
exploit the statistical knowledge of the channel in the same
way, resulting in similar performances.
The impact of the pilot length L and the number of antennas
M on the probabilities of false alarm and missed detection as
the transmit power increases is shown in Fig. 7. We set L =
300, 600, and M = 1, 2, 4. We make PF = PM for convenient
comparison by properly choosing the threshold l. Note that in
the scenario where the exact large-scale fading coefficients
are known, different users have the same probabilities of false
alarm but different probabilities of missed detection. Thus we
have to use the average probability of missed detection over all
users. Fig. 7 shows that increasing L or M brings significant
improvement. Specifically, when L = 300, M = 1, PF and
PM tend to remain unchanged as the transmit power increases.
However, by either increasing L or increasing M , PF and PM
can be driven to zero as the transmit power increases. In other
words, the minimum L required to drive PF and PM to zeros
can be reduced by increasing M .
VII. C ONCLUSION
This work shows that compressed sensing is a viable
strategy for sporadic device activity detection for massive
12
for both the single-antenna case and the multiple-antenna
case. Simulation results validate the analysis, and show that
exploiting the statistics of the channel in AMP denoiser
design can significantly improve the detection threshold, and
further deploying multiple antennas at the BS can also bring
significant performance improvement.
10 0
10 -1
Tx power = 5dB
PM
10 -2
10 -3
10 -4
10 -5
A PPENDIX
AMP simulated, M=1
AMP predicted, M=1
bound, M=1
vAMP simulated, M=2
AMP-MMV simulated, M=2
vAMP predicted, M=2
bound, M=2
vAMP simulated, M=4
AMP-MMV simulated, M=4
vAMP predicted, M=4
bound, M=4
10 -4
A. Proof of Proposition 1
Tx power = 25dB
10 -3
10 -2
10 -1
10 0
PF
Fig. 6. Performance of AMP with vector denoiser (vAMP) and AMP-MMV
for user activity detection in the multiple-antenna case.
Denote d, x, y, z as the distance from a user to the BS,
the shadowing in dB, the shadowing in linear scale, and the
path-loss, respectively. Note that in appendices we slightly
abuse some notations appeared in the paper due to the limited
alphabet. However this should not cause confusion since they
only used for derivations in the appendices. Denote g , yz as
the large-scale fading. We derive the pdfs of d, x, y, z and g
as follows.
Assuming that all users are uniformly distributed in the cell
with radius R, the pdf of d is
pD (d) =
10 0
10
PF=PM
0 < d < R.
(68)
Since x = −20 log10 (y) follows Gaussian distribution with
2
, the pdf of y can be derived as
zero mean and variance σSF
!
20
200 ln2 (y)
√
pY (y) =
exp − 2
.
(69)
2
ln (10)σSF
ln(10) 2πσSF y
-1
10 -2
By using z = 10−(α+β log10 d)/20 , we get the pdf of z as
10 -3
10
2d
,
R2
pZ (z) =
vAMP, simulated, L=300, M=1
-4
40
10−2α/β z −40/β−1 ,
R2 β
(70)
vAMP, simulated, L=300, M=2
where z > 10−(α+β log10 R)/20 . The pdf of g is
Z
pG (g) = |y|−1 pY (y)pZ y −1 g dy , ag −γ Q(g),
vAMP, simulated, L=300, M=4
10
-5
10
-6
vAMP, simulated, L=600, M=1
vAMP, simulated, L=600, M=2
vAMP, simulated, L=600, M=4
5
10
15
20
25
30
35
40
45
Tx power (dBm)
(71)
R∞
where Q(g) , b ln g+c exp(−s2 )ds, γ , 40/β + 1, and a, b
and c are constants given in the proposition.
Fig. 7. Impact of length of pilot, number of antennas, and transmit power.
B. Proof of Proposition 2
connectivity applications with random non-orthogonal signature sequences. Specifically, we propose an AMP-based user
activity detection algorithm by exploiting the statistics of the
wireless channel for the uplink of a cellular system with a
large number of potential users but only a small fraction of
them are active at any time slot. We show that by using the
state evolution, a performance characterization in terms of
the probabilities of false alarm and missed detection can be
accurately predicted. In particular, we consider both cases in
which the BS is equipped with a single antenna or multiple
antennas. We present the designs of the MMSE denoisers in
the scenarios where the large-scale fading is either available
exactly or when only its statistics is available at the BS. For
the multiple-antenna case, we adopt two AMP algorithms,
AMP with vector denoiser and parallel AMP-MMV, to tackle
the detection problem. We derive a performance analysis
Denote g as the large-scale fading following (11), and x =
xR +jxI as the Rayleigh fading, where xR and xI are the real
and imaginary parts of x, respectively. Denote h = hR +jhI as
the channel coefficient accounting for both large-scale fading
g and Rayleigh fading x, i.e., h = gx. Then the pdf of h is
Z
pH (h) = pHR ,HI ,G (hR , hI , g)dg
Z
∂(xR , xI , g)
hR hI
,
dg
= pG (g)pXR ,XI
g g
∂(hR , hI , g)
Z ∞
a
−|h|2
=
g −γ−2 Q(g) exp
dg,
(72)
π 0
g2
where pHR ,HI ,G (hR , hI , g) and pXR ,XI (xR , xI ) are the joint
∂(xR ,xI ,g)
pdfs, and | ∂(h
| = g −2 is the Jacobian determinant.
R ,hI ,g)
When g is known, pH|G (h|g) follows the complex Gaussian
distribution with zero mean and variance g 2 .
13
C. Proof of Proposition 3
We omit superscript t and subscript n for notation simplicity. The conditional expectation of X given X̃ = x̃ can be
expressed as
E[X|X̃ = x̃]
Z
pX (x)
= x
p
(x̃|x)dx
pX̃ (x̃) X̃|X
ZZ ∞
−|x̃ − x|2
−|x|2
+
dgdx
=
f (g)x exp
g2
τ2
0
ZZ ∞
−|x̃|2
−|x − δ x̃|2
f (g)x exp
=
+
dgdx
g2 + τ 2
δτ 2
0
Z ∞
−|x̃|2
Q(g)g 2−γ
(a) λax̃
=
exp
dg,
(73)
pX̃ (x̃)π 0
g 2 + τ 2 (g 2 + τ 2 )2
where f (g) , λaQ(g)/(pX̃ (x̃)π 2 τ 2 g γ+2 ), δ , g 2 /(g 2 + τ 2 ),
(a) is obtained by using Gaussian integral of x. By substituting
the expression of pX̃ (x̃) derived in Appendix D, we get
E[X|X̃ = x̃] as in (15).
D. Proof of Proposition 4
We omit superscript t and subscript n in the following. Note
that pX̃|X (x̃|X = 0) = pW (x̃) where random variable W is
defined as W , τ V , and pX̃|X (x̃|X 6= 0) = pY (x̃) where
random variable Y is defined as Y , H +W with H following
the distribution in (12). Since V follows complex Gaussian
distribution with zero mean and unit variance, we get
1
−|x̃|2
pX̃|X (x̃|X = 0) =
exp
,
(74)
πτ 2
τ2
To compute pX̃|X (x̃|X 6= 0), we derive pY (y) as follows
(a)
Z
pH (y − w)pW (w)dw
Z ∞
ag −γ Q(g)
−|y|2
(b)
=
exp
dg,
π(g 2 + τ 2 )
g2 + τ 2
0
where f (g) is defined in Appendix C, (a) is obtained by using
2 4
Gaussian integral of x, fˆ(g) , τ 2 g 2 /(g 2 +τ 2 )2 +|x̃|
g /(g 2 +
R
2 3
τ ) . By using (77), (76), (73), and MSE(τ ) = Var(X|X̃ =
x̃)pX̃ (x̃)dx̃ with some algebraic manipulations, we obtain
(34).
F. Proof of Proposition 6
Similar to Appendix E, we first
derive the conditional
expectation E |X|2 |X̃ = x̃, G = g as
λfˆ(g) exp(−|x̃|2 /(g 2 + τ 2 ))
E |X|2 |X̃ = x̃, G = g =
,
pX̃|G (x̃|g)π
(79)
where fˆ(g) is defined in Appendix
E. Then based on (19)
and Var(X|X̃ = x̃, G = g) = E |X|2 X̃ = x̃, G = g −
2
E[X|X̃ = x̃, G = g] , we have
ZZ
MSE =
Var(X|X̃ = x̃, G = g)pX̃|G (x̃|g)pG (g)dx̃dg
!
Z ∞
λg 4 1 − ϕ1 (g 2 τ −2 )
λg 2 τ 2
(a)
pG (g)dg,
+
=
g2 + τ 2
g2 + τ 2
0
(80)
where (a) is obtained by using Gaussian integral over x̃. After
plugging pG (g), we finally get (36).
pY (y) =
(75)
where (a) is obtained by pY,W (y, w) = pH (y − w)pW (w),
and (b) is obtained by substituting (72). Combine the results
in (74) and (75) with pX̃|X (x̃|X 6= 0) = pY (x̃), we get
pX̃ (x̃) =
Since we have derived E[X|X̃ = x̃] in (73), we only need to
derive E |X|2 X̃ = x̃ , which can be expressed as
E |X|2 X̃ = x̃
Z
|x|2 pX (x)
=
p
(x̃|x)dx
p (x̃) X̃|X
Z Z ∞ X̃
−|x̃ − x|2
−|x|2
=
f (g)|x|2 exp
+
dgdx
g2
τ2
0
ZZ ∞
−|x − δ x̃|2
−|x̃|2
+
dgdx
=
f (g)|x|2 exp
g2 + τ 2
δτ 2
0
Z ∞
λaQ(g)fˆ(g)
−|x̃|2
(a)
dg,
(78)
=
exp
g γ pX̃ (x̃)π
g2 + τ 2
0
1−λ
−|x̃|2
exp
πτ 2
τ2
Z ∞
λaQ(g) exp −|x̃|2 /(g 2 + τ 2 )
dg. (76)
+
πg γ (g 2 + τ 2 )
0
E. Proof of Proposition 5
We omit superscript t and subscript n for notation simplicity. The conditional variance of X given X̃ = x̃ is
2
Var(X|X̃ = x̃) = E |X|2 X̃ = x̃ − E[X|X̃ = x̃] . (77)
G. Proof of Proposition 8
We omit superscript t and subscript n. For the case where
the large scale fading is unknown, the proof is similar to
Appendix C except that we need to deal with random vectors
rather than random scalars. By using
Z
pR (r)
E[R|R̃ = r̃] = r
p
(r̃|r)dr,
(81)
pR̃ (r̃) R̃|R
where pR̃ (r̃) can be derived as
1−λ
−kr̃k22
pR̃ (r̃) =
exp
(πτ 2 )M
τ2
Z ∞
λaQ(g) exp −kr̃k22 /(g 2 + τ 2 )
+
dg. (82)
π M g γ (g 2 + τ 2 )M
0
By plugging pR̃ (r̃) and pR (r) into (81), and using multivariate
Gaussian integral of r with some algebraic manipulations, we
can obtain (42). For the case where the large-scale fading is
known, the conditional expectation can be found in [18].
14
H. Proof of Proposition 9
The state evolution in (10) is then simplified to
Since the proofs for both cases are similar, in the following
we focus on the case where the large-scale fading is known.
We omit subscript n, and use t as subscript instead of
superscript for convenience. We use induction by assuming
Σt = τt2 I holds. To evaluate the right hand side of (10), we
first derive the distribution of R̃t based on (41) as
λ exp − kr̃t k22 (g 2 + τt2 )−1
φ(r̃t ), (83)
pR̃t |G (r̃t |g) =
π M (g 2 + τt2 )M
N
2
EG [CI] , τt+1
I,
L
which completes the induction.
where φ(r̃t ) , 1 + (1 − λ)(1 + g 2 τt−2 )M exp(−∆kr̃t k22 )/λ,
and ∆ is defined in (20). We then compute the conditional
covariance matrix of Rt given R̃t = r̃t and G = g as
Cov =E[RTt (RTt )∗ |R̃t = r̃t , G = g]
∗
− E[RTt |R̃t = r̃t , G = g] E[RTt |R̃t = r̃t , G = g]
φ−1 (r̃t ) − φ−2 (r̃t ) T T ∗
g 2 τt2 φ−1 (r̃t )
r̃t (r̃t ) . (84)
I+
=
2
2
g + τt
g −4 (g 2 + τt2 )2
Then by taking the expectation over R̃t , we obtain
Z
ER̃t |G [Cov] = pR̃t |G (r̃t |g)Covdr̃t ,
(85)
which is a diagonal matrix due to fact that the off-diagonal
element is an integral of an odd function over a symmetric
interval, which is zero. Furthermore, it is easy to observe
from the integral that the diagonal elements of ER̃t |G [Cov]
are identical. Note that when MMSE denoiser is employed,
∗
the right hand side
of (10) can be rewritten as E Dt Dt∗ =
EG ER̃t |G [Cov] , which leads to the result that E Dt Dt is
also a diagonal matrix with identical diagonal elements.
In the following, we derive an explicit expression of
E Dt D∗t . To this end, we first compute ER̃t |G [Cov]. Denote
ci as the ith diagonal entry of ER̃t |G [Cov], and r̃t,i is the ith
entry of r̃t . Based on (84) and (85), we have
Z
λ exp − kr̃t k22 /(g 2 + τt2 )
g 2 τt2
ci =
·
dr̃t
g 2 + τt2
π M (g 2 + τt2 )M
Z
|r̃t,i |2 1 − φ−1 (r̃t )
+
·
g −4 (g 2 + τt2 )2
λ exp − kr̃t k22 /(g 2 + τt2 )
dr̃t
π M (g 2 + τt2 )M
λg 2 τt2
λg 4
ϕM (g 2 τt−2 )
= 2
+ 2
1−
,
(86)
g + τt2
g + τt2
Γ(M + 1)
where the fist term of the last step is obtained by using
Gaussian integral, the second term is obtained by integrating in spherical coordinates instead of Cartesian coordinates,
and function ϕi (s) is defined in (37). As expected, ci does
not depend on i, indicating that the diagonal elements are
indeed
identical.
By replacing g by G and ci by C, we get
E Dt D∗t = EG [C]I, where C is a random variable depends
on G, and
Z ∞
aQ(g) λg 2 τt2
EG [C] =
· 2
dg
gγ
g + τt2
0
Z ∞
λg 4
ϕM (g 2 τt−2 )
aQ(g)
+
· 2
1−
dg. (87)
gγ
g + τt2
Γ(M + 1)
0
2
Σt+1 = σw
I+
(88)
R EFERENCES
[1] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong,
and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun.,
vol. 32, no. 6, pp. 1065–1082, June 2014.
[2] W. Yu, “On the fundamental limits of massive connectivity,” in Information Theory and Application (ITA) Workshop, San Diego, CA, USA,
Feb. 2017.
[3] D. Donoho, A. Maleki, and A. Montanari, “Message-passing algorithms
for compressed sensing,” Proc. Nat. Acad. Sci., vol. 106, no. 45, pp.
18 914–18 919, Nov. 2009.
[4] X. Chen, T.-Y. Chen, and D. Guo, “Capacity of Gaussian many-access
channels,” IEEE Trans. Inf. Theory, vol. 63, no. 6, pp. 3516–3539, June
2017.
[5] H. F. Schepker, C. Bockelmann, and A. Dekorsy, “Exploiting sparsity in
channel and data estimation for sporadic multi-user communication,” in
Inter. Symp. Wireless Commun. Sys. (ISWCS), Ilmenau, Germany, Aug.
2013, pp. 1–5.
[6] X. Xu, X. Rao, and V. K. N. Lau, “Active user detection and channel
estimation in uplink CRAN systems,” in IEEE Inter. Conf. Commun.
(ICC), London, UK, June 2015, pp. 2727–2732.
[7] G. Wunder, P. Jung, and M. Ramadan, “Compressive random access
using a common overloaded control channel,” in IEEE Globecom
Workshops, San Diego, CA, USA, Dec. 2015, pp. 1–6.
[8] G. Wunder, H. Boche, T. Strohmer, and P. Jung, “Sparse signal processing concepts for efficient 5G system design,” IEEE Access, vol. 3, pp.
195–208, Feb. 2015.
[9] H. Zhu and G. B. Giannakis, “Exploiting sparse user activity in multiuser
detection,” IEEE Trans. Commun., vol. 59, no. 2, pp. 454–465, Feb.
2011.
[10] H. F. Schepker and A. Dekorsy, “Compressive sensing multi-user detection with block-wise orthogonal least squares,” in IEEE Veh. Technol.
Conf. (VTC Spring), Yokohama, Japan, May 2012, pp. 1–5.
[11] J. Luo and D. Guo, “Neighbor discovery in wireless ad hoc networks
based on group testing,” in Allerton Conf. on Commun., Control, and
Computing, Urbana-Champaign, IL, USA, Sep. 2008, pp. 791–797.
[12] L. Zhang, J. Luo, and D. Guo, “Neighbor discovery for wireless
networks via compressed sensing,” Performance Evaluation, vol. 70,
no. 7, pp. 457–471, July 2013.
[13] M. Bayati and A. Montanari, “The dynamics of message passing on
dense graphs, with applications to compressed sensing,” IEEE Trans.
Inf. Theory, vol. 57, no. 2, pp. 764–785, Feb. 2011.
[14] A. Maleki, L. Anitori, Z. Yang, and R. G. Baraniuk, “Asymptotic
analysis of complex LASSO via complex approximate message passing
(CAMP),” IEEE Trans. Inf. Theory, vol. 59, no. 7, pp. 4290–4308, July
2013.
[15] S. Rangan, “Generalized approximate message passing for estimation
with random linear mixing,” in IEEE Inter. Symp. Inf. Theory (ISIT), St.
Petersburg, Russia, July 2011, pp. 2168–2172.
[16] D. L. Donoho, A. Maleki, and A. Montanari, “Message passing algorithms for compressed sensing: I. motivation and construction,” in IEEE
Inf. Theory Workshop (ITW), Cairo, Egypt, Jan. 2010, pp. 1–5.
[17] P. Schniter, “Turbo reconstruction of structured sparse signals,” in
Annual Conf. on Information Sciences and Systems (CISS), Princeton,
NJ, USA, Mar. 2010, pp. 1–6.
[18] J. Kim, W. Chang, B. Jung, D. Baron, and J. C. Ye, “Belief propagation for joint sparse recovery,” [Online] available:
http://arxiv.org/abs/1102.3289v1, 2011.
[19] J. Ziniel and P. Schniter, “Efficient high-dimensional inference in the
multiple measurement vector problem,” IEEE Trans. Signal Process.,
vol. 61, no. 2, pp. 340–354, Jan. 2013.
[20] G. Hannak, M. Mayer, A. Jung, G. Matz, and N. Goertz, “Joint channel
estimation and activity detection for multiuser communication systems,”
in IEEE Inter. Conf. Commun. (ICC) Workshop, London, UK, June 2015,
pp. 2086–2091.
[21] D. L. Donoho, I. Johnstone, and A. Montanari, “Accurate prediction
of phase transitions in compressed sensing via a connection to minimax
denoising,” IEEE Trans. Inf. Theory, vol. 59, no. 6, pp. 3396–3433, June
2013.
15
[22] A. Montanari, “Graphical models concepts in compressed sensing,”
in Compressed Sensing: Theory and Applications, Y. C. Eldar and
G. Kutyniok, Eds. New York: Cambridge University Press, 2012, ch. 9,
pp. 394–438.
[23] D. Needell and J. A. Tropp, “CoSaMP: Iterative signal recovery from
incomplete and inaccurate samples,” Appl. Comp. Harmonic Anal.,
vol. 26, no. 3, pp. 301–321, May 2009.
[24] D. L. Donoho, A. Maleki, and A. Montanari, “The noise-sensitivity
phase transition in compressed sensing,” IEEE Trans. Inf. Theory,
vol. 57, no. 10, pp. 6920–6941, Oct. 2011.
Zhilin Chen (S’14) received the B.E. degree in electrical and information engineering and the M.E. degree in signal and information processing from Beihang University (BUAA), Beijing, China, in 2012
and 2015, respectively. He is currently pursuing the
Ph.D. degree at the University of Toronto, Toronto,
ON, Canada. His main research interests include
wireless communication and signal processing.
Foad Sohrabi (S’13) received his B.A.Sc. degree in
2011 from the University of Tehran, Tehran, Iran,
and his M.A.Sc. degree in 2013 from McMaster
University, Hamilton, ON, Canada, both in Electrical
and Computer Engineering. Since September 2013,
he has been a Ph.D student at University of Toronto,
Toronto, ON, Canada. Form July to December 2015,
he was a research intern at Bell-Labs, AlcatelLucent, in Stuttgart, Germany. His main research
interests include MIMO communications, optimization theory, wireless communications, and signal
processing. He received an IEEE Signal Processing Society Best Paper Award
in 2017.
Wei Yu (S’97-M’02-SM’08-F’14) received the
B.A.Sc. degree in Computer Engineering and Mathematics from the University of Waterloo, Waterloo,
Ontario, Canada in 1997 and M.S. and Ph.D. degrees
in Electrical Engineering from Stanford University,
Stanford, CA, in 1998 and 2002, respectively. Since
2002, he has been with the Electrical and Computer Engineering Department at the University of
Toronto, Toronto, Ontario, Canada, where he is now
Professor and holds a Canada Research Chair (Tier
1) in Information Theory and Wireless Communications. His main research interests include information theory, optimization,
wireless communications and broadband access networks.
Prof. Wei Yu currently serves on the IEEE Information Theory Society
Board of Governors (2015-20). He serves as the Chair of the Signal Processing
for Communications and Networking Technical Committee of the IEEE Signal
Processing Society (2017-18). He was an IEEE Communications Society
Distinguished Lecturer (2015-16). He currently serves as an Area Editor of
the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS (2017-19). He
served as an Associate Editor for IEEE T RANSACTIONS ON I NFORMATION
T HEORY (2010-2013), as an Editor for IEEE T RANSACTIONS ON C OMMUNI CATIONS (2009-2011), as an Editor for IEEE T RANSACTIONS ON W IRELESS
C OMMUNICATIONS (2004-2007), and as a Guest Editor for a number of
special issues for the IEEE J OURNAL ON S ELECTED A REAS IN C OMMUNI CATIONS and the EURASIP J OURNAL ON A PPLIED S IGNAL P ROCESSING .
He was a Technical Program co-chair of the IEEE Communication Theory
Workshop in 2014, and a Technical Program Committee co-chair of the
Communication Theory Symposium at the IEEE International Conference
on Communications (ICC) in 2012. Prof. Wei Yu received the IEEE Signal
Processing Society Best Paper Award in 2017 and in 2008, a J OURNAL OF
C OMMUNICATIONS AND N ETWORKS Best Paper Award in 2017, a Steacie
Memorial Fellowship in 2015, an IEEE Communications Society Best Tutorial
Paper Award in 2015, an IEEE ICC Best Paper Award in 2013, the McCharles
Prize for Early Career Research Distinction in 2008, the Early Career Teaching
Award from the Faculty of Applied Science and Engineering, University of
Toronto in 2007, and an Early Researcher Award from Ontario in 2006. Prof.
Wei Yu is recognized as a Highly Cited Researcher. He is a Fellow of the
Canadian Academy of Engineering.
| 7cs.IT
|
Distributed Colour Reduction Revisited
Jukka Kohonen · [email protected] · University of Helsinki
Janne H. Korhonen · [email protected] · Aalto University
Christopher Purcell · [email protected] · Aalto University
Jukka Suomela · [email protected] · Aalto University
arXiv:1709.00901v1 [cs.DC] 4 Sep 2017
Przemyslaw Uznański · [email protected] · ETH Zürich
Abstract. We give a new, simple distributed algorithm for graph colouring in paths and
cycles. Our algorithm is fast and self-contained, it does not need any globally consistent
orientation, and it reduces the number of colours from 10100 to 3 in three iterations.
1
Introduction
We present a very fast and simple distributed algorithm for colouring paths and cycles.
Algorithms for colouring paths or cycles are key primitives that are used as subroutines
in many other distributed and parallel algorithms, and they are also material that is
typically covered in introductory courses on distributed algorithms [1, 7, 10, 11]. Yet the
best currently known algorithms tend to be inefficient, restricted, or inelegant.
1.1
Problem setting
We will focus on iterative colour reduction algorithms in paths and cycles: we have a path
that is properly coloured with k colours, and the algorithm will relabel the nodes so that
the path is properly coloured with f (k) < k colours. Naturally, we can then iterate the
algorithm to find a colouring with f (f (k)) colours, f (f (f (k))) colours, etc., until we reach
a fixed point. We use the notion k ⊲ f (k) for colour reduction from k to f (k).
We are interested in one-round algorithms [4], in which all nodes are re-coloured based
on the current colours of their immediate neighbours only. Such an algorithm can be
interpreted as a function
A : [k] × [k] × [k] → [c]
that maps three old colours to a new colour. Here A(x, y, z) is the new colour of a node
that was coloured y, and its two neighbours had colours x and z. We want to keep the
algorithm symmetric so that we can apply it even if we do not have a well-defined global
orientation:
A(x1 , x2 , x3 ) = A(x3 , x2 , x1 ) for all x1 , x2 , x3 .
(1)
And naturally we require that the algorithm produces a proper colouring as output, assuming we have a proper colouring as input:
A(x1 , x2 , x3 ) 6= A(x2 , x3 , x4 ) for all x1 6= x2 6= x3 6= x4 .
1
(2)
1.2
A simple example
Here is a colour reduction algorithm A : 4 ⊲ 3 that reduces the number of colours from 4
to 3:
A(x, 1, z) = 1,
A(x, 2, z) = 2,
A(x, 3, z) = 3,
A(x, 4, z) = min({1, 2, 3} \ {x, z}).
For example, if we have a properly 4-coloured path with the input colours
(1, 2, 1, 4, 3, 4, 3),
and we apply function A in all local neighbourhoods, we get a properly 3-coloured path
(1, 2, 1, 2, 3, 1, 3).
At the endpoints we can apply the standard trick: pretend that the nodes near the endpoints have a neighbour of some different colour.
1.3
Our contribution
We present a simple approach that enables us to do iterative colour reduction e.g. as
follows:
10100 ⊲ 12 ⊲ 4 ⊲ 3.
That is, in only 3 steps, we can reduce the number of colours from astronomical numbers
to only 3. Naturally getting below 3 colours is not possible with any local rule; 2-colouring
paths is an inherently global problem.
We are not aware of any prior algorithm that is equally fast and that does not need to
assume e.g. a global orientation. As we will see in the next section, our algorithm is also
much simpler than prior algorithms. Our algorithm is also completely self-contained, so
one can safely skip the next section.
2
Prior work
A typical theoretical presentation of this topic gives a number of algorithms, all of which
have a complexity of O(log∗ k) or 12 log∗ (k) + O(1) iterations for a colour reduction from
k to 3. However, to highlight the differences between the algorithms, we will use here
concrete numbers; our goal is to reduce the number of colours from at least M = 2128 to 3
(note that M is chosen so that we can use e.g. IPv6 addresses as colours). As we will see,
the seemingly innocent O(1) part actually dominates here.
Most of the prior algorithms proceed in two steps. First, we develop a colour reduction
algorithm assuming that there is a well-defined global orientation (each node has at most
one predecessor and at most one successor). Put otherwise, we develop an algorithm that
satisfies (2) but not necessarily (1). Then, using such an asymmetric algorithm as a black
box, we design a symmetric algorithm that also satisfies (1).
2
2.1
Asymmetric algorithms
The classical example of an asymmetric algorithm is the algorithm by Cole and Vishkin
from 1986 [2]. In its modern form, it is a colour reduction algorithm 2k ⊲ 2k. Iterating
the rule, we get
2128 ⊲ 256 ⊲ 16 ⊲ 8 ⊲ 6,
at which point the algorithm is stuck. At 6 colours we can switch to a naive algorithm
that eliminates one colour per round, and overall we obtain
2128 ⊲ 256 ⊲ 16 ⊲ 8 ⊲ 6 ⊲ 5 ⊲ 4 ⊲ 3.
In 7 steps we reduce the number of colours from M to 3. This is where a typical introductory lecture on the topic stops.
However, we can do better. A particularly elegant approach is toresort to the algorithm
by Naor and Stockmeyer [6], which gives a colour reduction of 2k
k ⊲ 2k. This rule has a
fixed point at 4 colours, after which we can do one round of the naive algorithm. Overall,
we get
1050000 ⊲ 184756 ⊲ 20 ⊲ 6 ⊲ 4 ⊲ 3.
Only 5 steps from way beyond M to 3 colours.
There is also a simple trick that is applicable to both Cole–Vishkin and Naor–Stockmeyer
algorithms. These algorithms only use the colour of the predecessor, and ignore the colour
of the successor, that is,
A(x, y, z) = A(x′ , y, z) for all x, x′ .
We can simulate two steps of any such algorithm in one iteration; for Cole–Vishkin we
obtain
2128 ⊲ 16 ⊲ 6 ⊲ 5 ⊲ 4 ⊲ 3
and for Naor–Stockmeyer we obtain
1050000 ⊲ 20 ⊲ 4 ⊲ 3.
(3)
We are down to only 3 iterations for colour reduction from beyond M to 3.
Here 3 rounds is optimal for these values of the parameters. Also, the last step 4 ⊲ 3 is
optimal; a simple computer search shows that there is no 5 ⊲ 3 algorithm [8, 9]. However,
the step 20 ⊲ 4 leaves some room for improvement; there is a 24 ⊲ 4 algorithm [8].
2.2
From asymmetric to symmetric algorithms
Equipped with an efficient asymmetric algorithm, for example (3), we can then apply it
in undirected paths in a somewhat ad-hoc fashion. Here is a concrete example:
1. Use the local minima and local maxima of the colours to split the path in fragments
that consist of strictly increasing colours.
2. Orient each fragment in the direction of increasing colours.
3. Apply an efficient asymmetric algorithm to each such fragment to iteratively find a
3-colouring. Now everything except the local minima and local maxima are properly
coloured.
3
4. Label the local minima with colour 4 and local maxima with colour 5, to obtain a
proper 5-colouring.
5. Run two rounds of the naive colour reduction algorithm to get back to 3 colours.
Some care is needed to make sure we do not lose too many rounds in each step; for
example, we want to do useful colour reduction already in the first round, in addition to
just identifying the local minima and maxima. With a little bit of thought, combined with
(3), we obtain something along the lines of
1050000 ⊲ 20 + 2 ⊲ 4 + 2 ⊲ 3 + 2 ⊲ 4 ⊲ 3,
where “+2” refers to the local minima and local maxima that will use two additional
colours. This is 5 rounds for M to 3. Our new algorithm will only need 3 rounds, and it
is much more streamlined.
2.3
Symmetric algorithms by design
There are very few efficient algorithms that are symmetric by design; most available algorithms are derived from asymmetric algorithms by following a scheme similar to the one
sketched above.
However, there are some colour reduction algorithms that are designed for general
undirected graphs, and we can naturally apply them also in the case of graphs of maximum
degree 2. The classical example is Linial’s [4, 5] algorithm. The algorithm is based on socalled cover-free set families [3], and we obtain slightly different algorithms based on the
specific choice of the set family. Unfortunately, all of the constructions give at best an
exponential colour reduction k ⊲ O(log k) per round; for example, one of the constructions
used by Linial gives k ⊲ 5⌈4 log k⌉.
Our new algorithm is much faster; it provides a doubly-exponential colour reduction
k ⊲ O(log log k) per round, which is asymptotically optimal for both symmetric and asymmetric algorithms [5].
3
Our algorithm
Fix a target number of colours c. We will consider
• subsets X ⊆ [c],
• families X that consist of such subsets, and
• collections A that consist of such families.
It turns out that certain collections can be directly interpreted as colour reduction algorithms; we will call such collections colourful collections.
Section 3.1 gives the definition of a colourful collection. Section 3.2 shows that any
colourful collection A gives a colour reduction algorithm k ⊲ c for k = |A|. Section 3.3
shows that the converse is also true: any colour reduction algorithm k ⊲ c gives a colourful
collection A of size k. Finally, Section 3.4 shows how to construct large colourful collections.
4
3.1
Colourful collections
We say that a collection A is colourful if the following holds:
(P1) For each family X ∈ A, for all subsets X, Y ∈ X , we have X ∩ Y 6= ∅.
(P2) For all families X 6= Y, there are X ∈ X and Y ∈ Y such that X ∩ Y = ∅.
Here is an example of a colourful collection, for c = 3 and |A| = 4:
n
o
A=
{1} , {2} , {3} , {1, 2}, {1, 3}, {2, 3} .
A simple example.
To keep the examples easier to read, we leave out two innermost levels of brackets and
commas and write simply
A = 1, 2, 3, 12 13 23 .
3.2
From colourful collections to algorithms
We now show how to use a colourful collection A to do colour reduction k ⊲ c for k =
|A|. The algorithm proceeds as follows. Here it will be convenient to imagine that each
undirected edge {u, v} is a pair of directed edges.
High-level plan:
1. Label each node u with a family L(u) ∈ A.
2. Using the labels of the nodes t and u, label the directed edge (t, u) with a subset
L(t, u) ∈ L(u).
3. Using the labels of the incoming edges (t, u) and (v, u), label the node u with a
colour ℓ(u) ∈ L(t, u) ∩ L(v, u).
Detailed description:
1. Apply a bijection [k] → A to label each node u with a family L(u) ∈ A.
2. Consider an edge {t, u}. By (P2), there are X ∈ L(t) and Y ∈ L(u) with X ∩ Y = ∅.
Assign the labels L(t, u) = Y and L(u, t) = X.
3. Consider a node u with the incoming edges (t, u) and (v, u). Note that L(t, u), L(v, u) ∈
L(v). By (P1), there is a c ∈ L(t, u) ∩ L(v, u). Set ℓ(u) = c.
Correctness. We already argued above that the algorithm is well-defined, assuming
that A is colourful. Let us now show that it indeed produces a proper colouring with c
colours. If not, there would be an edge {u, v} with ℓ(u) = ℓ(v). But by construction, we
have ℓ(u) ∈ L(v, u), ℓ(v) ∈ L(u, v), and L(u, v) ∩ L(v, u) = ∅, a contradiction.
5
3.3
From algorithms to colourful collections
We will now show that colourful collections are not only sufficient in the design of oneround colour reduction algorithms, but they are also necessary: given any colour reduction
algorithm A : k ⊲ c, we can construct a colourful collection A of size k. We proceed as
follows:
1. For any two colours x, y ∈ [k], x 6= y, define the subset Fx,y = {A(x, y, z) : z 6= y}.
2. For any colour y ∈ [k], define the family Fy = {Fx,y : x 6= y}.
3. Define the collection A = {Fy : y ∈ [k]}.
Correctness. First, consider a family Fy for some y. Let X, Y ∈ Fy . Then there are
x 6= y 6= z such that X = Fx,y and Y = Fz,y . By definition, we have A(x, y, z) ∈ Fx,y and
A(z, y, x) ∈ Fz,y , and by (1) also A(x, y, z) = A(z, y, x). Hence there is a common element,
A(x, y, z), in X ∩ Y , and (P1) holds.
Second, let x 6= y, and consider the families Fx and Fy . We have Fy,x ∈ Fx and
Fx,y ∈ Fy . If there was a common element a ∈ Fx,y ∩ Fy,x , there would also exist some
s and t with A(x, y, s) = A(y, x, t) = A(t, x, y), which contradicts (2); if we had a path
with the colours (t, x, y, s) in this order, algorithm A would fail to colour the middle nodes
properly. Therefore we have X ∈ Fx and Y ∈ Fy with X ∩ Y = ∅. This shows that (P2)
holds.
Together with (P1), the above argument also shows that Fx 6= Fy for x 6= y, and hence
the size of the collection is indeed |A| = k.
3.4
Explicit constructions of colourful collections
We have already seen in Section 3.1 an example of a colourful collection for c = 3 and
|A| = 4. Now we present the general scheme, for an even c. We will use the case of c = 4
c
as a running example. To simplify the notation, let s = c/2
.
1. Take all subsets of size c/2 (there are s such subsets):
12, 13, 14, 23, 24, 34 .
2. Split these in s/2 pairs of a subset and its complement:
(12, 34), (13, 24), (14, 23) .
3. Collection A0 contains all 2s/2 families that we can form by picking one half of each
pair:
A0 = 12 13 14,
12 13 23,
12 24 14,
12 24 23,
34 13 14,
34 13 23,
34 24 14,
34 24 23 .
6
4. Collection A1 is formed from A0 by augmenting each family with all subsets of size
c − 1:
A1 = 12 13 14 123 124 134 234,
12 13 23 123 124 134 234,
12 24 14 123 124 134 234,
12 24 23 123 124 134 234,
34 13 14 123 124 134 234,
34 13 23 123 124 134 234,
34 24 14 123 124 134 234,
34 24 23 123 124 134 234 .
5. Then form a collection A2 that contains all c families that contain just one subset of
size 1:
A2 = 1,
2,
3,
4 .
6. Finally, set A = A1 ∪ A2 .
Note that in the running example, we have c = 4 and |A| = 12, and hence this is a colour
reduction algorithm 12 ⊲ 4, assuming that the collection is indeed colourful.
Correctness. Collection A0 satisfies both (P1) and (P2): Consider some X , Y ∈ A, and
let X ∈ X , and let X̄ = [c] \ X be the complement of X. Now X̄ is the only set of size
h with X ∩ X̄ = ∅, and we have X̄ ∈
/ X , which satisfies (P1), and X̄ ∈ Y, which satisfies
(P2).
The augmented collection A1 still satisfies both (P1) and (P2): we only added subsets
that intersect with everything, satisfying (P1), and for the purposes of (P2) we can ignore
the extra subsets.
The trivial collection A2 clearly also satisfies both (P1) and (P2).
Finally, we need to argue that A also satisfies both (P1) and (P2). Property (P1)
follows directly from the fact that A1 and A2 satisfy it. What remains to be checked is
that (P2) holds even if we pick X ∈ A1 and Y ∈ A2 (or vice versa). But this is trivial,
as Y contains just one subset Y ∈ Y of one element, and its complement is contained in
every X ∈ A1 .
Analysis.
By construction, for every even c we have a colour reduction scheme
2s/2 + c ⊲ c,
c
where s = c/2
. As a concrete example, we obtain the following three-round colour
reduction scheme:
2462 + 12 ⊲ 12 ⊲ 4 ⊲ 3.
Asymptotically, the scheme is doubly-exponential; we have k ⊲ O(log log k).
7
Remarks. If we are doing colour reduction k ⊲ c, we can assign the input colours
1, 2, . . . , c to the singleton families in A2 . This way the colour reduction algorithm has an
additional nice property: the nodes that already have a colour at most c do not change their
colours. This is a natural property, but prior efficient algorithms (e.g. Naor–Stockmeyer
and Cole–Vishkin) do not guarantee this.
References
[1] Leonid Barenboim and Michael Elkin. Distributed Graph Coloring: Fundamentals and
Recent Developments. Synthesis Lectures on Distributed Computing Theory. Morgan
& Claypool Publishers, 2013.
[2] Richard Cole and Uzi Vishkin. Deterministic coin tossing with applications to optimal
parallel list ranking. Information and Control, 70(1):32–53, 1986.
[3] P. Erdős, P. Frankl, and Z. Füredi. Families of finite sets in which no set is covered
by the union of r others. Israel Journal of Mathematics, 51(1):79–89, Dec 1985.
[4] Fabian Kuhn and Roger Wattenhofer. On the complexity of distributed graph coloring.
In Proc. PODC 2006, pages 7–15, 2006.
[5] Nathan Linial. Locality in distributed graph algorithms. SIAM Journal on Computing,
21(1):193–201, 1992.
[6] Moni Naor and Larry Stockmeyer. What can be computed locally? SIAM Journal
on Computing, 24(6):1259–1277, 1995.
[7] David Peleg. Distributed Computing: A Locality-sensitive Approach. Society for
Industrial and Applied Mathematics, Philadelphia, PA, USA, 2000.
[8] Joel Rybicki. Exact bounds for distributed graph colouring. Master’s thesis, Department of Computer Science, University of Helsinki, May 2011.
[9] Joel Rybicki and Jukka Suomela. Exact bounds for distributed graph colouring. In
Proc. SIROCCO 2015, pages 46–60, 2015.
[10] Jukka Suomela. Distributed algorithms, 2016. Online textbook.
[11] Roger Wattenhofer. Lecture notes on principles of distributed computing, 2017. Online lecture notes.
8
| 8cs.DS
|
Logical Methods in Computer Science
Vol. 8 (2:12) 2012, pp. 1–27
www.lmcs-online.org
Submitted
Published
Jan. 7, 2011
Jun. 19, 2012
GENERIC FIBRATIONAL INDUCTION ∗
NEIL GHANI, PATRICIA JOHANN, AND CLÉMENT FUMEX
University of Strathclyde, Glasgow G1 1XH, UK
e-mail address: {Neil.Ghani, Patricia.Johann, Clement.Fumex}@cis.strath.ac.uk
Abstract. This paper provides an induction rule that can be used to prove properties of
data structures whose types are inductive, i.e., are carriers of initial algebras of functors.
Our results are semantic in nature and are inspired by Hermida and Jacobs’ elegant algebraic formulation of induction for polynomial data types. Our contribution is to derive,
under slightly different assumptions, a sound induction rule that is generic over all inductive types, polynomial or not. Our induction rule is generic over the kinds of properties to
be proved as well: like Hermida and Jacobs, we work in a general fibrational setting and
so can accommodate very general notions of properties on inductive types rather than just
those of a particular syntactic form. We establish the soundness of our generic induction
rule by reducing induction to iteration. We then show how our generic induction rule can
be instantiated to give induction rules for the data types of rose trees, finite hereditary
sets, and hyperfunctions. The first of these lies outside the scope of Hermida and Jacobs’
work because it is not polynomial, and as far as we are aware, no induction rules have
been known to exist for the second and third in a general fibrational framework. Our
instantiation for hyperfunctions underscores the value of working in the general fibrational
setting since this data type cannot be interpreted as a set.
1. Introduction
Iteration operators provide a uniform way to express common and naturally occurring
patterns of recursion over inductive data types. Expressing recursion via iteration operators makes code easier to read, write, and understand; facilitates code reuse; guarantees
properties of programs such as totality and termination; and supports optimising program transformations such as fold fusion and short cut fusion. Categorically, iteration
operators arise from initial algebra semantics of data types, in which data types are regarded as carriers of initial algebras of functors. Lambek’s Lemma ensures that the carrier
of the initial algebra of F is its least fixed point µF , and initiality ensures that, given
any F -algebra h : F A → A, there is a unique F -algebra homomorphism, denoted f old h,
from the initial algebra in : F (µF ) → µF to that algebra. For each functor F , the map
1998 ACM Subject Classification: F.3.2, D.3.1.
Key words and phrases: Induction, algebraic semantics of data types, fibrations, category theory.
∗
This paper is revised and significantly expanded version of [9].
This research is partially supported by EPSRC grant EP/C0608917/1.
l
LOGICAL METHODS
IN COMPUTER SCIENCE
c
DOI:10.2168/LMCS-8 (2:12) 2012
CC
N. Ghani, P. Johann, and C. Fumex
Creative Commons
2
N. GHANI, P. JOHANN, AND C. FUMEX
fold : (F A → A) → µF → A is the iteration operator for the data type µF . Initial algebra
semantics thus provides a well-developed theory of iteration which is...
• ...principled, in that it is derived solely from the initial algebra semantics of data types.
This is important because it helps ensure that programs have rigorous mathematical
foundations that can be used to ascertain their meaning and correctness.
• ...expressive, and so is applicable to all inductive types — i.e., to every type which is the
carrier of an initial algebra of a functor — rather than just to syntactically defined classes
of data types such as polynomial data types.
• ...correct, and so is valid in any model — set-theoretic, domain-theoretic, realisability,
etc. — in which data types are interpreted as carriers of initial algebras.
Because induction and iteration are closely linked — induction is often used to prove properties of functions defined by iteration, and the correctness of induction rules is often established by reducing it to that of iteration — we may reasonably expect that initial algebra
semantics can be used to derive a principled, expressive, and correct theory of induction
for data types as well. In most treatments of induction, given a functor F together with a
property P to be proved about data of type µF , the premises of the induction rule for µF
constitute an F -algebra with carrier Σx : µF. P x. The conclusion of the rule is obtained by
supplying such an F -algebra as input to the iteration operator for µF . This yields a function from µF to Σx : µF. P x from which a function of type ∀x : µF. P x can be obtained. It
has not, however, been possible to characterise F -algebras with carrier Σx : µF. P x without
additional assumptions on F . Induction rules are thus typically derived under the assumption that the functors involved have a certain structure, e.g., that they are polynomial.
Moreover, taking the carriers of the algebras to be Σ-types assumes that properties are
represented as type-valued functions. So while induction rules derived as described above
are both principled and correct, their expressiveness is limited along two dimensions: with
respect to the data types for which they can be derived and the nature of the properties
they can verify.
A more expressive, yet still principled and correct, approach to induction is given by
Hermida and Jacobs [10]. They show how to lift each functor F on a base category of types
to a functor F̂ on a category of properties over those types, and take the premises of the
induction rule for the type µF to be an F̂ -algebra. Hermida and Jacobs work in a fibrational
setting and the notion of property they consider is, accordingly, very general. Indeed, they
accommodate any notion of property that can be suitably fibred over the category of types,
and so overcome one of the two limitations mentioned above. On the other hand, their
approach gives sound induction rules only for polynomial data types, so the limitation on
the class of data types treated remains in their work.
This paper shows how to remove the restriction on the class of data types treated.
Our main result is a derivation of a sound generic induction rule that can be instantiated
to every inductive type, regardless of whether it is polynomial or not. We think this is
important because it provides a counterpart for induction to the existence of an iteration
operator for every inductive type. We take Hermida and Jacobs’ approach as our point of
departure and show that, under slightly different assumptions on the fibration involved, we
can lift any functor on the base category of a fibration to a functor on the total category of
the fibration. The lifting we define forms the basis of our generic induction rule.
GENERIC FIBRATIONAL INDUCTION
3
The derivation of a generic, sound induction rule covering all inductive types is clearly
an important theoretical result, but it also has practical consequences:
• We show in Example 2 how our generic induction rule can be instantiated to the families
fibration over Set (the fibration most often implicitly used by type theorists and those
constructing inductive proofs with theorem provers) to derive the induction rule for rose
trees that one would intuitively expect. The data type of rose trees lies outside the scope
of Hermida and Jacobs’ results because it is not polynomial. On the other hand, an
induction rule for rose trees is available in the proof assistant Coq, although it is neither
the one we intuitively expect nor expressive enough to prove properties that ought to be
amenable to inductive proof. Indeed, if we define rose trees in Coq by
Node : list rose -> rose
then Coq generates the following induction rule
rose_ind : forall P : rose -> Prop,
(forall l : list rose, P (Node l)) ->
forall r : rose, P r
But to prove a property of a rose tree Node l, we must prove that property assuming only
that l is a list of rose trees, and without recourse to any induction hypothesis. There is,
of course, a presentation of rose trees by mutual recursion as well, but this doesn’t give
the expected induction rule in Coq either. Intuitively, what we expect is an induction
rule whose premise is
forall [r_0, ..., r_n] : list rose,
P(r_0) -> ... -> P(r_n) -> P(Node [r_0, ..., r_n])
The rule we derive for rose trees is indeed the expected one, which suggests that our
derivation may enable automatic generation of more useful induction rules in Coq, rather
than requiring the user to hand code them as is currently necessary.
• We further show in Example 3 how our generic induction rule can be instantiated, again
to the families fibration over Set, to derive a rule for the data type of finite hereditary
sets. This data type is defined in terms of quotients and so lies outside most current
theories of induction.
• Finally, we show in Example 7 how our generic induction rule can be instantiated to the
subobject fibration over ωCP O⊥ to derive a rule for the data type of hyperfunctions.
Because this data type cannot be interpreted as a set, a fibration other than the families
fibration over Set is required; in this case, use of the subobject fibration allows us to
derive an induction rule for admissible subsets of hyperfunctions. The ability to treat the
data type of hyperfunctions thus underscores the importance of developing our results
in the general fibrational framework. Moreover, the functor underlying the data type of
hyperfunctions is not strictly positive [7], so the ability to treat this data type also underscores the advantage of being able to handle a very general class of functors going beyond
simply polynomial functors. As far as we know, induction rules for finite hereditary sets
and hyperfunctions have not previously existed in the general fibrational framework.
4
N. GHANI, P. JOHANN, AND C. FUMEX
Although our theory of induction is applicable to all inductive functors — i.e., to all
functors having initial algebras, including those giving rise to nested types [15], GADTs [21],
indexed containers [1], dependent types [19], and inductive recursive types [6] — our examples show that working in the general fibrational setting is beneficial even if we restrict our
attention to strictly positive data types. We do, however, offer some preliminary thoughts
in Section 5 on the potentially delicate issue of instantiating our general theory with fibrations appropriate for deriving induction rules for specific classes of higher-order functors
of interest. It is also worth noting that the specialisations of our generic induction rule to
polynomial functors in the families fibration over Set coincide exactly with the induction
rules of Hermida and Jacobs. But the structure we require of fibrations generally is slightly
different from that required by Hermida and Jacobs, so while our theory is in essence a
generalisation of theirs, the two are, strictly speaking, incomparable. The structure we
require of our fibrations is, nevertheless, certainly present in all standard fibrational models
of type theory (see Section 4). Like Hermida and Jacobs, we prove our generic induction
rule correct by reducing induction to iteration. A more detailed discussion of when our
induction rules coincide with those of Hermida and Jacobs is given in Section 4.
We take a purely categorical approach to induction in this paper, and derive our generic
induction rule from only the initial algebra semantics of data types. As a result, our work
is inherently extensional. Although translating our constructions into intensional settings
may therefore require additional effort, we expect the guidance offered by the categorical
viewpoint to support the derivation of induction rules for functors that are not treatable at
present. Since we do not use any form of impredicativity in our constructions, and instead
use only the weaker assumption that initial algebras exist, this guidance will be widely
applicable.
The remainder of this paper is structured as follows. To make our results as accessible
as possible, we illustrate them in Section 2 with a categorical derivation of the familiar
induction rule for the natural numbers. In Section 3 we derive an induction rule for the
special case of the families fibration over Set. We also show how this rule can be instantiated
to derive the one from Section 2, and the ones for rose trees and finite hereditary sets
mentioned above. Then, in Section 4 we present our generic fibrational induction rule,
establish a number of results about it, and illustrate it with the aforementioned application
to hyperfunctions. The approach taken in this section is completely different from the
corresponding one in the conference version of the paper [9], and allows us to improve upon
and extend our previous results. Section 5 concludes, discusses possible instantiations of
our generic induction rule for higher-order functors, and offers some additional directions
for future research.
When convenient, we identify isomorphic objects of a category and write = rather
than ≃. We write 1 for the canonical singleton set and denote its single element by · . In
Sections 2 and 3 we assume that types are interpreted as objects in Set, so that 1 also
denotes the unit type in those sections. We write id for identity morphisms in a category
and Id for the identity functor on a category.
2. A Familiar Induction Rule
Consider the inductive data type Nat, which defines the natural numbers and can be specified in a programming language with Haskell-like syntax by
data Nat = Zero | Succ Nat
GENERIC FIBRATIONAL INDUCTION
5
The observation that Nat is the least fixed point of the functor N on Set — i.e., on the
category of sets and functions — defined by N X = 1 + X can be used to define the
following iteration operator:
foldNat
foldNat z s Zero
foldNat z s (Succ n)
=
=
=
X → (X → X) → Nat → X
z
s (foldNat z s n)
The iteration operator foldNat provides a uniform means of expressing common and naturally occurring patterns of recursion over the natural numbers.
Categorically, iteration operators such as foldNat arise from the initial algebra semantics
of data types, in which every data type is regarded as the carrier of the initial algebra of
a functor F . If B is a category and F is a functor on B, then an F -algebra is a morphism
h : F X → X for some object X of B. We call X the carrier of h. For any functor F , the
collection of F -algebras itself forms a category Alg F which we call the category of F -algebras.
In Alg F , an F -algebra morphism between F -algebras h : F X → X and g : F Y → Y is a
map f : X → Y such that the following diagram commutes:
FA
Ff
/ FB
g
h
A
f
/B
When it exists, the initial F -algebra in : F (µF ) → µF is unique up to isomorphism and
has the least fixed point µF of F as its carrier. Initiality ensures that there is a unique
F -algebra morphism fold h : µF → X from in to any F -algebra h : F X → X. This gives
rise to the following iteration operator fold for the inductive type µF :
fold
fold h (in t)
:
=
(F X → X) → µF → X
h (F (fold h) t)
Since fold is derived from initial algebra semantics it is principled and correct. It is also
expressive, since it can be defined for every inductive type. In fact, fold is a single iteration
operator parameterised over inductive types rather than a family of iteration operators, one
for each such type, and the iteration operator foldNat above is the instantiation to Nat of
the generic iteration operator fold .
The iteration operator foldNat can be used to derive the standard induction rule for Nat
which coincides with the standard induction rule for natural numbers, i.e., with the familiar
principle of mathematical induction. This rule says that if a property P holds for 0, and if
P holds for n + 1 whenever it holds for a natural number n, then P holds for all natural
numbers. Representing each property of natural numbers as a predicate P : Nat → Set
mapping each n : Nat to the set of proofs that P holds for n, we wish to represent this rule
at the object level as a function indNat with type
∀(P : Nat → Set). P Zero → (∀n : Nat. P n → P (Succ n)) → (∀n : Nat. P n)
Code fragments such as the above, which involve quantification over sets, properties, or
functors, are to be treated as “categorically inspired” within this paper. This is because
quantification over such higher-kinded objects cannot be interpreted in Set. In order to
give a formal interpretation to code fragments like the one above, we would need to work
in a category such as that of modest sets. While the ability to work with functors over
categories other than Set is one of the motivations for working in the general fibrational
6
N. GHANI, P. JOHANN, AND C. FUMEX
setting of Section 4, formalising the semantics of such code fragments would obscure the
central message of this paper. Our decision to treat such fragments as categorically inspired
is justified in part by the fact that the use of category theory to suggest computational constructions has long been regarded as fruitful within the functional programming community
(see, e.g., [2, 3, 18]).
A function indNat with the above type takes as input the property P to be proved, a
proof φ that P holds for Zero, and a function ψ mapping each n : Nat and each proof that P
holds for n to a proof that P holds for Succ n, and returns a function mapping each n : Nat
to a proof that P holds for n, i.e., to an element of P n. We can write indNat in terms
of foldNat — and thus reduce induction for Nat to iteration for Nat — as follows. First
note that indNat cannot be obtained by instantiating the type X in the type of foldNat
to a type of the form P n for a specific n because indNat returns elements of the types
P n for different values n and these types are, in general, distinct from one another. We
therefore need a type containing all of the elements of P n for every n. Such a type can
informally be thought of as the union over n of P n, and is formally given by the dependent
type Σn : Nat. P n comprising pairs (n, p) where n : Nat and p : P n.
The standard approach to defining indNat is thus to apply foldNat to an N -algebra
with carrier Σn : Nat. P n. Such an algebra has components α : Σn : N at. P n and β : Σn :
N at. P n → Σn : N at. P n. Given φ : P Zero and ψ : ∀n. P n → P (Succ n), we choose
α = (Zero, φ) and β (n, p) = (Succ n, ψ n p) and note that f oldN at α β : N at → Σn :
N at. P n. We tentatively take indNat P φ ψ n to be p, where f oldN at α β n = (m, p).
But in order to know that p actually gives a proof for n itself, we must show that m = n.
Fortunately, this follows easily from the uniqueness of foldNat α β. Indeed, we have that
1 + N at
/ 1 + Σn : N at. P n
/ 1 + N at
[α,β]
in
N at
foldNat α β
in
/ Σn : N at. P n
λ(n,p). n
/ Nat
commutes and, by initiality of in, that (λ(n, p). n)◦(f oldN at α β) is the identity map. Thus
n = (λ(n, p). n)(f oldN at α β n) = (λ(n, p). n)(m, p) = m
πP′
Letting
be the second projection on dependent pairs involving the predicate P , the
induction rule for Nat is thus
indNat
: ∀(P : Nat → Set). P Zero → (∀n : Nat. P n → P (Succ n))
→ (∀n : Nat. P n)
′
indNat P φ ψ = πP ◦ (foldNat (Zero, φ) (λ(n, p). (Succ n, ψ n p)))
As expected, this induction rule states that, for every property P , to construct a proof that
P holds for every n : Nat, it suffices to provide a proof that P holds for Zero, and to show
that, for any n : Nat, if there is a proof that P holds for n, then there is also a proof that
P holds for Succ n.
The use of dependent types is fundamental to this formalization of the induction rule
for Nat, but this is only possible because properties to be proved are taken to be set-valued
functions. The remainder of this paper uses fibrations to generalise the above treatment
of induction to arbitrary inductive functors and arbitrary properties which are suitably
fibred over the category whose objects interpret types. In the general fibrational setting,
properties are given axiomatically via the fibrational structure rather than assumed to be
(set-valued) functions.
GENERIC FIBRATIONAL INDUCTION
7
3. Induction Rules for Predicates over Set
The main result of this paper is the derivation of a sound induction rule that is generic over
all inductive types and which can be used to verify any notion of property that is fibred
over the category whose objects interpret types. In this section we assume that types are
modelled by sets, so the functors we consider are on Set and the properties we consider are
functions mapping data to sets of proofs that these properties hold for them. We make these
assumptions because it allows us to present our derivation in the simplest setting possible,
and also because type theorists often model properties in exactly this way. This makes the
present section more accessible and, since the general fibrational treatment of induction can
be seen as a direct generalisation of the treatment presented here, Section 4 should also be
more easily digestible once the derivation is understood in this special case. Although the
derivation of this section can indeed be seen as the specialisation of that of Section 4 to the
families fibration over Set, no knowledge of fibrations is required to understand it because
all constructions are given concretely rather than in their fibrational forms.
We begin by considering what we might naively expect an induction rule for an inductive
data type µF to look like. The derivation for Nat in Section 2 suggests that, in general, it
should look something like this:
ind : ∀P : µ F → Set. ??? → ∀ x : µF. P x
But what should the premises — denoted ??? here — of the generic induction rule ind be?
Since we want to construct, for any term x : µF , a proof term of type P x from proof terms
for x’s substructures, and since the functionality of the fold operator for µF is precisely
to compute a value for x : µF from the values for x’s substructures, it is natural to try to
equip P with an F -algebra structure that can be input to fold to yield a mapping of each
x : µF to an element of P x. But this approach quickly hits a snag. Since the codomain
of every predicate P : µF → Set is Set itself, rather than an object of Set, F cannot be
applied to P as is needed to equip P with an F -algebra structure. Moreover, an induction
rule for µF cannot be obtained by applying fold to an F -algebra with carrier P x for any
specific x. This suggests that we should try to construct an F -algebra not for P x for each
term x, but rather for P itself.
Such considerations led Hermida and Jacobs [10] to define a category of predicates P
and a lifting for each polynomial functor F on Set to a functor F̂ on P that respects the
structure of F . They then constructed F̂ -algebras with carrier P to serve as the premises of
their induction rules. The crucial part of their construction, namely the lifting of polynomial
functors, proceeds inductively and includes clauses such as
(F\
+ G) P = F̂ P + ĜP
and
(F\
× G) P = F̂ P × ĜP
The construction of Hermida and Jacobs is very general: they consider functors on bicartesian categories rather than just on Set, and represent properties by bicartesian fibrations
over such categories instead of using the specific notion of predicate from Definition 3.2
below. On the other hand, they define liftings for polynomial functors.
The construction we give in this section is in some sense orthogonal to Hermida and
Jacobs’: we focus exclusively on functors on Set and a particular category of predicates, and
show how to define liftings for all inductive functors on Set, including non-polynomial ones.
8
N. GHANI, P. JOHANN, AND C. FUMEX
In this setting, the induction rule we derive properly extends Hermida and Jacobs’, thus
catering for a variety of data types that they cannot treat. In the next section we derive
analogous results in the general fibrational setting. This allows us to derive sound induction
rules for initial algebras of functors defined on categories other than Set which can be used
to prove arbitrary properties that are suitably fibred over the category interpreting types.
We begin with the definition of a predicate.
Definition 3.1. Let X be a set. A predicate on X is a function P : X → Set mapping
each x ∈ X to a set P x. We call X the domain of P .
We may speak simply of “a predicate P ” if the domain of P is understood. A predicate
P on X can be thought of as mapping each element x of X to the set of proofs that P holds
for x. We now define our category of predicates.
Definition 3.2. The category of predicates P has predicates as its objects. A morphism
from a predicate P : X → Set to a predicate P ′ : X ′ → Set is a pair (f, f ∼ ) : P → P ′ of
functions, where f : X → X ′ and f ∼ : ∀x : X. P x → P ′ (f x). Composition of predicate
morphisms is given by (g, g∼ ) ◦ (f, f ∼ ) = (g ◦ f, λxp. g ∼ (f x)(f ∼ xp)).
Diagrammatically, we have
f
/ X′
④
∼
❉❉
④
❉❉ f
④④
❉❉
④/ ④P ′
④
P
}④
"
X ❉
❉
Set
As the diagram indicates, the notion of a morphism from P to P ′ does not require the sets
of proofs P x and P ′ (f x), for any x ∈ X, to be equal. Instead, it requires only the existence
of a function f ∼ which maps, for each x, each proof in P x to a proof in P ′ (f x). We denote
by U : P → Set the forgetful functor mapping each predicate P : X → Set to its domain
X and each predicate morphism (f, f ∼ ) to f .
An alternative to Definition 3.2 would take the category of predicates to be the arrow
category over Set, but the natural lifting in this setting does not indicate how to generalise
liftings to other fibrations. Indeed, if properties are modelled as functions, then every
functor can be applied to a property, and hence every functor can be its own lifting. In the
general fibrational setting, however, properties are not necessarily modelled by functions,
so a functor cannot, in general, be its own lifting. The decision not to use arrow categories
to model properties is thus dictated by our desire to lift functors in a way that indicates
how liftings can be constructed in the general fibrational setting.
We can now give a precise definition of a lifting.
Definition 3.3. Let F be a functor on Set. A lifting of F from Set to P is a functor F̂ on
P such that the following diagram commutes:
P
F̂
/P
U
U
Set
F
/ Set
We can decode the definition of F̂ as follows. The object part of F̂ must map each predicate
P : X → Set to a predicate F̂ P : F X → Set, and thus can be thought of type-theoretically
GENERIC FIBRATIONAL INDUCTION
9
as a function ∀(X : Set). (X → Set) → F X → Set. Of course, F̂ must also act on
morphisms in a functorial manner.
We can now use the definition of a lifting to derive the standard induction rule from
Section 2 for Nat as follows.
Example 1. The data type of natural numbers is µN where N is the functor on Set defined
by N X = 1 + X. A lifting N̂ of N can be defined by sending each predicate P : X → Set
b P : N X → Set given by
to the predicate N
N̂ P (inl ·)
N̂ P (inr n)
=
=
1
Pn
An N̂ -algebra with carrier P : Nat → Set can be given by in : 1 + Nat → Nat and
in∼ : ∀t : 1 + Nat. N̂ P t → P (in t). Since in (inl ·) = 0 and in (inr n) = n + 1, we see that
in∼ consists of an element h1 : P 0 and a function h2 : ∀n : Nat. P n → P (n + 1). Thus, the
second component in ∼ of an N̂ -algebra with carrier P : Nat → Set and first component in
gives the premises of the familiar induction rule in Example 1.
The notion of predicate comprehension is a key ingredient of our lifting. It begins to
explain, abstractly, what the use of Σ-types is in the theory of induction, and is the key
construct allowing us to define liftings for non-polynomial, as well as polynomial, functors.
Definition 3.4. Let P be a predicate on X. The comprehension of P , denoted {P }, is the
type Σx : X. P x comprising pairs (x, p) where x : X and p : P x. The map taking each
predicate P to {P }, and taking each predicate morphism (f, f ∼ ) : P → P ′ to the morphism
{(f, f ∼ )} : {P } → {P ′ } defined by {(f, f ∼ )}(x, p) = (f x, f ∼ x p), defines the comprehension
functor {−} from P to Set.
We are now in a position to define liftings uniformly for all functors:
Definition 3.5. If F is a functor on Set, then the lifting F̂ is the functor on P given as
follows. For every predicate P on X, F̂ P : F X → Set is defined by F̂ P = (F πP )−1 ,
where the natural transformation π : {−} → U is given by πP (x, p) = x. For every predicate
morphism f : P → P ′ , F̂ f = (k, k ∼ ) where k = F U f , and k∼ : ∀y : F X. F̂ P y → F̂ P ′ (k y)
is given by k∼ y z = F {f }z.
In the above definition, note that the inverse image f −1 of f : X → Y is indeed a predicate
P : Y → Set. Thus if P is a predicate on X, then πP : {P } → X and F πP : F {P } → F X.
Thus F̂ P is a predicate on F X, so F̂ is a lifting of F from Set to P. The lifting F̂ captures
an “all” modality, in that it generalises Haskell’s all function on lists to arbitrary data
types. A similar modality is given in [17] for indexed containers.
The lifting in Example 1 is the instantiation of the construction in Definition 3.5 to
the functor N X = 1 + X on Set. Indeed, if P is any predicate, then N̂ P = (N πP )−1 ,
i.e., N̂ P = (id + πP )−1 . Then, since the inverse image of the coproduct of functions is the
coproduct of their inverse images, since id −1 1 = 1, and since πP−1 n = {(n, p) | p : P n} for
all n, we have N̂ P (inl ·) = 1 and N̂ P (inr n) = P n. As we will see, a similar situation
to that for Nat holds in general: for any functor F on Set, the second component of an
F̂ -algebra whose carrier is the predicate P on the data type µF and whose first component
is in gives the premises of an induction rule that can be used to show that P holds for all
data of type µF .
10
N. GHANI, P. JOHANN, AND C. FUMEX
The rest of this section shows that F -algebras with carrier {P } are interderivable with
F̂ -algebras with carrier P , and then uses this result to derive our induction rule.
Definition 3.6. The functor K1 : Set → P maps each set X to the predicate K1 X = λx :
X. 1 on X and each f : X → Y to the predicate morphism (f, λx : X. id).
The predicate K1 X is called the truth predicate on X. For every x : X, the set K1 Xx of
proofs that K1 X holds for x is a singleton, and thus is non-empty. We intuitively think of
a predicate P : X → Set as being true if P x is non-empty for every x : X. We therefore
consider P to be true if there exists a predicate morphism from K1 X to P whose first
component is id X . For any functor F , the lifting F̂ is truth-preserving, i.e., F̂ maps the
truth predicate on any set X to that on F X.
Lemma 3.7. For any functor F on Set and any set X, F̂ (K1 X) ∼
= K1 (F X).
Proof. By Definition 3.5, F̂ (K1 X) = (F πK1 X )−1 . We have that πK1 X is an isomorphism
because there is only one proof of K1 X for each x : X, and thus that F πK1 X is an isomorphism as well. As a result, (F πK1 X )−1 maps every y : F X to a singleton set, and therefore
F̂ (K1 X) = (F πK1 X )−1 ∼
= λy : F X. 1 = K1 (F X).
The fact that K1 is a left-adjoint to {−} is critical to the constructions below. This is
proved in [10]; we include its proof here for completeness and to establish notation. The
description of comprehension as a right adjoint can be traced back to Lawvere [14].
Lemma 3.8. K1 is left adjoint to {−}.
Proof. We must show that, for any predicate P and any set Y , the set P(K1 Y, P ) of
morphisms from K1 Y to P in P is in bijective correspondence with the set Set(Y, {P })
of morphisms from Y to {P } in Set. Define maps (−)† : Set(Y, {P }) → P(K1 Y, P ) and
(−)# : P(K1 Y, P ) → Set(Y, {P }) by h† = (h1 , h2 ) where hy = (v, p), h1 y = v and h2 y = p,
and (k, k∼ )# = λ(y : Y ). (ky, k∼ y). These give a natural isomorphism between Set(Y, {P })
and P(K1 Y, P ).
Naturality of (−)† ensures that (g ◦f )† = g † ◦K1 f for all f : Y ′ → Y and g : Y → {P }.
Similarly for (−)# . Moreover, id† is the counit, at P , of the adjunction between K1 and
{−}. These observations are used in the proof of Lemma 3.10. Lemmas 3.9 and 3.10 are the
key results relating F -algebras and F̂ algebras, i.e., relating iteration and induction. They
are special cases of Theorem 4.8 below, but we include their proofs to ensure continuity of
our presentation and to ensure that this section is self-contained.
We first we show how to construct F̂ -algebras from F -algebras
Lemma 3.9. There is a functor Φ : Alg F → Alg F̂ such that if k : F X → X, then
Φk : F̂ (K1 X) → K1 X.
Proof. For an F -algebra k : F X → X define Φk = K1 k, and for two F -algebras k : F X → X
and k′ : F X ′ → X ′ and an F -algebra morphism h : X → X ′ between them define the F̂ algebra morphism Φh : Φk → Φk ′ by Φh = K1 h. Then K1 (F X) ∼
= F̂ (K1 X) by Lemma 3.7,
so that Φk is an F̂ -algebra and K1 h is an F̂ -algebra morphism. It is easy to see that Φ
preserves identities and composition.
GENERIC FIBRATIONAL INDUCTION
11
We can also construct F -algebras from F̂ -algebras.
Lemma 3.10. The functor Φ has a right adjoint Ψ such that if j : F̂ P → P , then Ψj :
F {P } → {P }.
Proof. We construct the adjoint functor Ψ : Alg F̂ → Alg F as follows. Given an F̂ -algebra
j : F̂ P → P , we use the fact that F̂ (K1 {P }) ∼
= K1 (F {P }) by Lemma 3.7 to define
†
#
Ψj : F {P } → {P } by Ψj = (j ◦ F̂ id ) . To specify the action of Ψ on an F̂ -algebra
morphism h, define Ψh = {h}. Clearly Ψ preserves identity and composition.
Next we show Φ ⊣ Ψ, i.e., for every F -algebra k : F X → X and F̂ -algebra j : F̂ P → P
with P a predicate on X, there is a natural isomorphism between F -algebra morphisms
from k to Ψj and F̂ -algebra morphisms from Φk to j. We first observe that an F -algebra
morphism from k to Ψj is a map from X to {P }, and an F̂ -algebra morphism from Φk
to j is a map from K1 X to P . A natural isomorphism between such maps is given by the
adjunction K1 ⊣ {−} from Lemma 3.8. We must check that f : X → {P } is an F -algebra
morphism from k to Ψj iff f † : K1 X → P is an F̂ -algebra morphism from Φk to j.
To this end, assume f : X → {P } is an F -algebra morphism from k to Ψj, i.e., assume
f ◦k = Ψj ◦F f . We must prove that f † ◦ Φk = j ◦ F̂ f † . By the definition of Φ in Lemma 3.9,
this amounts to showing f † ◦ K1 k = j ◦ F̂ f † . Now, since (−)† is an isomorphism, f is an F algebra morphism iff (f ◦k)† = (Ψj◦F f )† . Naturality of (−)† ensures that (f ◦k)† = f † ◦K1 k
and that (Ψj ◦ F f )† = (Ψj)† ◦ K1 (F f ), so the previous equality holds iff
f † ◦ K1 k = (Ψj)† ◦ K1 (F f )
(3.1)
But
j ◦ F̂ f †
= j ◦ F̂ id † ◦ K1 f )
= (j ◦ F̂ id† ) ◦ F̂ (K1 f )
= (Ψj)† ◦ K1 (F f )
= f † ◦ K1 k
by naturality of (−)† and f = id ◦ f
by the functoriality of F̂
by the definition of Ψ, the fact that (−)† and (−)#
are inverses, and Lemma 3.7
by Equation 3.1
Thus, f † is indeed an F̂ -algebra morphism from Φk to j.
Lemma 3.10 ensures that F -algebras with carrier {P } are interderivable with F̂ -algebras
with carrier P . For example, the N -algebra [α, β] with carrier {P } from Section 2 can be
derived from the N̂ -algebra with carrier P given in Example 1. Since we define a lifting
F̂ for any functor F , Lemma 3.10 thus shows how to construct F -algebras with carrier
Σx : µF. P x for any functor F and predicate P on µF .
Corollary 3.11. For any functor F on Set, the predicate K1 (µF ) is the carrier of the
initial F̂ -algebra.
Proof. Since Φ is a left adjoint it preserves initial objects, so applying Φ to the initial
F -algebra in : F (µF ) → µF gives the initial F̂ -algebra. By Lemma 3.9, Φ in has type
F̂ (K1 (µF )) → K1 (µF ), so the carrier of the initial F̂ -algebra is K1 (µF ).
12
N. GHANI, P. JOHANN, AND C. FUMEX
We can now derive our generic induction rule. For every predicate P on X and every F̂ algebra (k, k∼ ) : F̂ P → P , Lemma 3.10 ensures that Ψ constructs from (k, k∼ ) an F -algebra
with carrier {P }. Applying the iteration operator to this algebra gives a map
fold (Ψ (k, k∼ )) : µF → {P }
This map decomposes into two parts: φ = πP ◦ fold (Ψ (k, k∼ )) : µF → X and ψ : ∀(t :
µF ). P (φ t). Initiality of in : F (µF ) → µF , the definition of Ψ, and the naturality of πP
ensure φ = fold k. Recalling that πP′ is the second projection on dependent pairs involving
the predicate P , this gives the following sound generic induction rule for the type X, which
reduces induction to iteration:
genind
: ∀ (F : Set → Set) (P : X → Set) ((k, k ∼ ) : (F̂ P → P )) (t : µF ).
P (fold k t)
genind F P = πP′ ◦ fold ◦ Ψ
Notice this induction rule is actually capable of dealing with predicates over arbitrary sets
and not just predicates over µF . However, when X = µF and k = in, initiality of in further
ensures that φ = fold in = id, and thus that genind specialises to the expected induction
rule for an inductive data type µF :
ind
∀ (F : Set → Set) (P : µF → Set) ((k, k ∼ ) : (F̂ P → P )).
(k = in) → ∀(t : µF ). P t
= πP′ ◦ fold ◦ Ψ
:
ind F P
This rule can be instantiated to familiar rules for polynomial data types, as well as to ones
we would expect for data types such as rose trees and finite hereditary sets, both of which
lie outside the scope of Hermida and Jacobs’ method.
Example 2. The data type of rose trees is given in Haskell-like syntax by
data Rose = Node(List Rose)
The functor underlying Rose is F X = List X and its induction rule is
indRose
:
indRose F P
Calculating F̂ P = (F πP
list xs, we have that
)−1
=
∀ (P : Rose → Set) ((k, k ∼ ) : (F̂ P → P )).
(k = in) → ∀(x : Rose). P x
′
πP ◦ fold ◦ Ψ
: F Rose → Set, and writing xs !! k for the k th component of a
F̂ P rs
= {z : F {P } | F πp z = rs}
= {cps : List {P } | List πP cps = rs}
= {cps : List {P } | ∀k < length cps. πP (cps !! k) = rs !! k}
An F̂ -algebra whose underlying F -algebra is in : F Rose → Rose is thus a pair of functions
(in, k∼ ), where k∼ has type
= ∀rs : List Rose.
{cps : List {P } | ∀k < length cps. πP (cps !! k) = rs !! k} → P (Node rs)
= ∀rs : List Rose. (∀k < length rs. P (rs !! k)) → P (Node rs)
GENERIC FIBRATIONAL INDUCTION
13
The last equality is due to surjective pairing for dependent products and the fact that
length cps = length rs. The type of k ∼ gives the hypotheses of the induction rule for rose
trees.
Although finite hereditary sets are defined in terms of quotients, and thus lie outside
the scope of previously known methods, they can be treated with ours.
Example 3. Hereditary sets are sets whose elements are themselves sets, and so are the
core data structures within set theory. The data type HS of finitary hereditary sets is µPf
for the finite powerset functor Pf . We can derive an induction rule for finite hereditary
sets as follows. If P : X → Set, then Pf πP : Pf (Σx : X.P x) → Pf X maps each set
{(x1 , p1 ), . . . , (xn , pn )} to the set {x1 , . . . , xn }, so that (Pf πP )−1 maps a set {x1 , . . . , xn } to
the set P x1 × . . . × P xn . A Pˆf -algebra with carrier P : HS → Set and first component in
therefore has as its second component a function of type
∀({s1 , . . . , sn } : Pf (HS)). P s1 × . . . × P sn → P (in{s1 , . . . , sn })
The induction rule for finite hereditary sets is thus
indHS :: (∀({s1 , . . . , sn } : Pf (HS)). P s1 × . . . × P sn → P (in{s1 , . . . , sn }))
→ ∀(s : HS).P s
4. Generic Fibrational Induction Rules
We can treat more general notions of predicates using fibrations. We motivate the use of
fibrations by observing that i) the semantics of data types in languages involving recursion
and other effects usually involves categories other than Set; ii) in such circumstances, the
notion of a predicate can no longer be taken as a function with codomain Set; and iii)
even when working in Set there are reasonable notions of “predicate” other than that in
Section 3. (For example, a predicate on a set X could be a subobject of X). Moreover,
when, in future work, we consider induction rules for more sophisticated classes of data
types such as indexed containers, inductive families, and inductive recursive families (see
Section 5), we will not want to have to develop an individual ad hoc theory of induction for
each such class. Instead, we will want to appropriately instantiate a single generic theory of
induction. That is, we will want a uniform axiomatic approach to induction that is widely
applicable, and that abstracts over the specific choices of category, functor, and predicate
giving rise to different forms of induction for specific classes of data types.
Fibrations support precisely such an axiomatic approach. This section therefore generalises the constructions of the previous one to the general fibrational setting. The standard
model of type theory based on locally cartesian closed categories does arise as a specific
fibration — namely, the codomain fibration over Set — and this fibration is equivalent
to the families fibration over Set. But the general fibrational setting is far more flexible.
Moreover, in locally cartesian closed models of type theory, predicates and types coexist in
the same category, so that each functor can be taken to be its own lifting. In the general fibrational setting, predicates are not simply functions or morphisms, properties and types do
not coexist in the same category, and a functor cannot be taken to be its own lifting. There
is no choice but to construct a lifting from scratch. A treatment of induction based solely
on locally cartesian closed categories would not, therefore, indicate how to treat induction
in more general fibrations.
14
N. GHANI, P. JOHANN, AND C. FUMEX
Another reason for working in the general fibrational setting is that this facilitates a
direct comparison of our work with that of Hermida and Jacobs [10]. This is important,
since their approach is the most closely related to ours. The main difference between
their approach and ours is that they use fibred products and coproducts to define provably
sound induction rules for polynomial functors, whereas we use left adjoints to reindexing
functors to define provably sound induction rules for all inductive functors. In this section
we consider situations when both approaches are possible and give mild conditions under
which our results coincide with theirs when restricted to polynomial functors.
The remainder of this section is organised as follows. In Section 4.1 we recall the
definition of a fibration, expand and motivate this definition, and fix some basic terminology
surrounding fibrations. We then give some examples of fibrations, including the families
fibration over Set, the codomain fibration, and the subobject fibration. In Section 4.2 we
recall a useful theorem from [10] that indicates when a truth-preserving lifting of a functor
to a category of predicates has an initial algebra. This is the key theorem used to prove
the soundness of our generic fibrational induction rule. In Section 4.3 we construct truthpreserving liftings for all inductive functors. We do this first in the codomain fibration, and
then, using intuitions from its presentation as the families fibration over Set, as studied
in Section 3, in a general fibrational setting. Finally, in Section 4.4 we establish a number
of properties of the liftings, and hence of the induction rules, that we have derived. In
particular, we characterise the lifting that generates our induction rules.
4.1. Fibrations in a Nutshell. In this section we recall the notion of a fibration. More
details about fibrations can be found in, e.g., [12, 20]. We begin with an auxiliary definition.
Definition 4.1. Let U : E → B be a functor.
(1) A morphism g : Q → P in E is cartesian over a morphism f : X → Y in B if U g = f ,
and for every g′ : Q′ → P in E for which U g′ = f ◦ v for some v : U Q′ → X there exists
a unique h : Q′ → Q in E such that U h = v and g ◦ h = g ′ .
(2) A morphism g : P → Q in E is opcartesian over a morphism f : X → Y in B if U g = f ,
and for every g′ : P → Q′ in E for which U g′ = v ◦ f for some v : Y → U Q′ there exists
a unique h : Q → Q′ in E such that U h = v and h ◦ g = g ′ .
It is not hard to see that the cartesian morphism fP§ over a morphism f with codomain U P
is unique up to isomorphism, and similarly for the opcartesian morphism f§P . If P is an
GENERIC FIBRATIONAL INDUCTION
15
object of E, then we write f ∗ P for the domain of fP§ and Σf P for the codomain of f§P . We
can capture cartesian and opcartesian morphisms diagrammatically as follows.
E
′
Q′ ◗◗◗
◗◗◗ ′
◗◗◗g
◗◗◗
h
◗◗◗
◗◗(
∗
/P
f P
§
♠6 Q
♠♠♠ O
g ′ ♠♠♠♠
♠
h
♠♠♠
♠♠♠
♠
♠
♠
/ Σf P
P
P
U Q′ ◗◗
◗◗◗
◗◗U◗ g′
◗◗◗
v
◗◗◗
◗◗(
/Y
X
❧6 U Q
O
❧❧❧
❧
❧
❧
❧
v
❧❧
❧❧❧
❧
❧
❧
/Y
X
fP
f§
U
B
f
′
U g′
f
Cartesian morphisms (opcartesian morphisms) are the essence of fibrations (resp., opfibrations). We introduce both fibrations and their duals now since the latter will prove useful
later in our development. Below we speak primarily of fibrations, with the understanding
that the dual observations hold for opfibrations.
Definition 4.2. Let U : E → B be a functor. Then U is a fibration if for every object P
of E, and every morphism f : X → U P in B there is a cartesian morphism fP§ : Q → P in
E above f . Similarly, U is an opfibration if for every object P of E, and every morphism
f : U P → Y in B there is an opcartesian morphism f§P : P → Q in E above f . A functor
U a bifibration if it is simultaneously a fibration and an opfibration.
If U : E → B is a fibration, we call B the base category of U and E the total category
of U . Objects of the total category E can be thought of as properties, objects of the base
category B can be thought of as types, and U can be thought of as mapping each property
P in E to the type U P of which P is a property. One fibration U can capture many different
properties of the same type, so U is not injective on objects. We say that an object P in
E is above its image U P under U , and similarly for morphisms. For any object X of B, we
write EX for the fibre above X, i.e., for the subcategory of E consisting of objects above X
and morphisms above id. If f : X → Y is a morphism in B, then the function mapping
each object P of E to f ∗ P extends to a functor f ∗ : EY → EX . Indeed, for each morphism
k : P → P ′ in EY , f ∗ k is the morphism satisfying k ◦ fP§ = fP§ ′ ◦ f ∗ k. The universal
property of fP§ ′ ensures the existence and uniqueness of f ∗ k. We call the functor f ∗ the
reindexing functor induced by f . A similar situation ensures for opfibrations, and we call
the functor Σf : EX → EY which extends the function mapping each object P of E to Σf P
the opreindexing functor.
Example 4. The functor U : P → Set defined in Section 3 is called the families fibration
over Set. Given a function f : X → Y and a predicate P : Y → Set we can define a
cartesian map fP§ whose domain f ∗ P is P ◦ f , and which comprises the pair (f, λx : X. id).
The fibre PX above a set X has predicates P : X → Set as its objects. A morphism in PX
from P : X → Set to P ′ : X → Set is a function of type ∀x : X. P x → P ′ x.
Example 5. Let B be a category. The arrow category of B, denoted B → , has the morphisms,
or arrows, of B as its objects. A morphism in B → from f : X → Y to f ′ : X ′ → Y ′ is a pair
16
N. GHANI, P. JOHANN, AND C. FUMEX
(α1 , α2 ) of morphisms in B such that the following diagram commutes:
α1
X
/ X′
f′
f
Y
α2
/ Y′
i.e., such that α2 ◦ f = f ′ ◦ α1 . It is easy to see that this definition indeed gives a category.
The codomain functor cod : B → → B maps an object f : X → Y of B → to the object
Y of B and a morphism (α1 , α2 ) of B → to α2 . If B has pullbacks, then cod is a fibration,
called the codomain fibration over B. Indeed, given an object f : X → Y in the fibre above
Y and a morphism f ′ : X ′ → Y in B, the pullback of f along f ′ gives a cartesian morphism
above f ′ as required. The fibre above an object Y of B has those morphisms of B that map
into Y as its objects. A morphism in (B → )Y from f : X → Y to f ′ : X ′ → Y is a morphism
α1 : X → X ′ in B such that f = f ′ ◦ α1 .
Example 6. If B is a category, then the category of subobjects of B, denoted Sub(B), has
monomorphisms in B as its objects. A monomorphism f : X ֒→ Y is called a subobject of
Y . A morphism in Sub(B) from f : X ֒→ Y to f ′ : X ′ ֒→ Y ′ is a pair of morphisms (α1 , α2 )
in B such that α2 ◦ f = f ′ ◦ α1 .
The map U : Sub(B) → B sending a subobject f : X ֒→ Y to Y extends to a functor. If
B has pullbacks, then U is a fibration, called the subobject fibration over B; indeed, pullbacks
again give cartesian morphisms since the pullback of a monomorphism is a monomorphism.
The fibre above an object Y of B has as objects the subobjects of Y . A morphism in
Sub(B)Y from f : X ֒→ Y to f ′ : X ′ ֒→ Y is a map α1 : X → X ′ in B such that f = f ′ ◦ α1 .
If such a morphism exists then it is, of course, unique.
4.2. Lifting, Truth, and Comprehension. We now generalise the notions of lifting,
truth, and comprehension to the general fibrational setting. We prove that, in such a setting,
if an inductive functor has a truth-preserving lifting, then its lifting is also inductive. We
then see that inductiveness of the lifted functor is sufficient to guarantee the soundness
of our generic fibrational induction rule. This subsection is essentially our presentation of
pre-existing results from [10]. We include it because it forms a natural part of our narrative,
and because simply citing the material would hinder the continuity of our presentation.
Recall from Section 3 that the first step in deriving an induction rule for a datatype
interpreted in Set is to lift the functor whose fixed point the data type is to the category P of
predicates. More specifically, in Definition 3.3 we defined a lifting of a functor F : Set → Set
to be a functor F̂ : P → P such that U F̂ = F U . We can use these observations to generalise
the notion of a lifting to the fibrational setting as follows.
Definition 4.3. Let U : E → B be a fibration and F be a functor on B. A lifting of F with
respect to U is a functor F̂ : E → E such that the following diagram commutes:
E
F̂
/E
U
U
B
F
/B
GENERIC FIBRATIONAL INDUCTION
17
In Section 3 we saw that if P : X → Set is a predicate over X, then F̂ P is a predicate over
F X. The analogous result for the general fibrational setting observes that if F̂ is a lifting
of F and X is an object of B, then F̂ restricts to a functor from EX to EF X .
By analogy with our results from Section 3, we further expect that the premises of a
fibrational induction rule for a datatype µF interpreted in B should constitute an F̂ -algebra
on E. But in order to construct the conclusion of such a rule, we need to understand how
to axiomatically state that a predicate is true. In Section 3, a predicate P : X → Set is
considered true if there is a morphism in P from K1 X, the truth predicate on X, to P that
is over id X . Since the mapping of each set X to K1 X is the action on objects of the truth
functor K1 : Set → P (cf. Definition 3.6), we actually endeavour to model the truth functor
for the families fibration over Set axiomatically in the general fibrational setting.
Modeling the truth functor axiomatically amounts to understanding its universal property. Since the truth functor in Definition 3.6 maps each set X to the predicate λx : x. 1, for
any set X there is therefore exactly one morphism in the fibre above X from any predicate
P over X to K1 X. This gives a clear categorical description of K1 X as a terminal object
of the fibre above X and leads, by analogy, to the following definition.
Definition 4.4. Let U : E → B be a fibration. Assume further that, for every object
X of B, the fibre EX has a terminal object K1 X such that, for any f : X ′ → X in B,
f ∗ (K1 X) ∼
= K1 X ′ . Then the assignment sending each object X in B to K1 X in E, and
§
each morphism f : X ′ → X in B to the morphism fK
in E defines the (fibred) truth
1X
functor K1 : B → E.
The (fibred) truth functor is sometimes called the (fibred) terminal object functor. With
this definition, we have the following standard result:
Lemma 4.5. K1 is a (fibred) right adjoint for U .
The interested reader may wish to consult the literature on fibrations for the definition
of a fibred adjunction, but a formal definition will not be needed here. Instead, we can
simply stress that a fibred adjunction is first and foremost an adjunction, and then observe
that the counit of this adjunction is the identity, so that U K1 = Id . Moreover, K1 is full
and faithful. One simple way to guarantee that a fibration has a truth functor is to assume
that both E and B have terminal objects and that U maps a terminal object of E to a
terminal object of B. In this case, the fact that reindexing preserves fibred terminal objects
ensures that every fibre of E indeed has a terminal object.
The second fundamental property of liftings used in Section 3 is that they are truthpreserving. This property can now easily be generalised to the general fibrational setting
(cf. Definition 3.7).
Definition 4.6. Let U : E → B be a fibration with a truth functor K1 : B → E, let F be
a functor on B, and let F̂ : E → E be a lifting of F . We say that F̂ is a truth-preserving
lifting of F if, for any object X of B, we have F̂ (K1 X) ∼
= K1 (F X).
The final algebraic structure we required in Section 3 was a comprehension functor
{−} : P → Set. To generalise the comprehension functor to the general fibrational setting
we simply note that its universal property is that it is right adjoint to the truth functor K1
(cf. Definition 3.8). We single out for special attention those fibrations whose truth functors
have right adjoints.
18
N. GHANI, P. JOHANN, AND C. FUMEX
Definition 4.7. Let U : E → B be a fibration with a truth functor K1 : B → E. Then U is
a comprehension category with unit if K1 has a right adjoint.
If U : E → B is a comprehension category with unit, then we call the right adjoint to K1
the comprehension functor and denote it by {−} : E → B. With this machinery in place,
Hermida and Jacobs [10] show that if U is a comprehension category with unit and F̂ is a
truth-preserving lifting of F , then F̂ is inductive if F is and, in this case, the carrier µF̂ of
the initial F̂ -algebra is K1 (µF ). This is proved as a corollary to the following more abstract
theorem.
Theorem 4.8. Let F : B → B, G : A → A, and S : B → A be functors. A natural
transformation α : GS → SF , i.e., a natural transformation α such that
AO
S
B
G
/A
O
❈❈❈❈❈❈α
%
S
/B
F
induces a functor
AlgF
Φ
/ AlgG
given by Φ (f : F X → X) = S f ◦ αX . Moreover, if α is an isomorphism, then a right
adjoint T to S induces a right adjoint
AlgF l
Φ
⊤
,
AlgG
Ψ
given by Ψ(g : GX → X) = T g ◦βX , where β : F T → T G is the image of G ǫ◦α−1
T : SF T →
∼
G under the adjunction isomorphism Hom(S X, Y ) = Hom(X, T Y ), and ǫ : ST → id is
the counit of this adjunction.
We can instantiate Theorem 4.8 to generalise Lemmas 3.9 and 3.10.
Theorem 4.9. Let U : E → B be a comprehension category with unit and F : B → B be a
functor. If F has a truth-preserving lifting F̂ then there is an adjunction Φ ⊣ Ψ : Alg F →
Alg F̂ . Moreover, if f : F X → X then Φf : F̂ (K1 X) → K1 X, and if g : F̂ P → P then
Ψg : F {P } → {P }.
Proof. We instantiate Theorem 4.8, letting E be A, F̂ be G, and K1 be S. Then α is an
isomorphism since F̂ is truth-preserving, and we also have that K1 ⊣ {−}. The theorem thus
ensures that Φ maps every F -algebra f : F X → X to an F̂ -algebra Φf : F̂ (K1 X) → K1 X,
and that Ψ maps every F̂ -algebra g : F̂ P → P to an F -algebra Ψg : F {P } → {P }.
Corollary 4.10. Let U : E → B be a comprehension category with unit and F : B → B be
a functor which has a truth-preserving lifting F̂ . If F is inductive, then so is F̂ . Moreover,
µF̂ = K1 (µF ).
Proof. The hypotheses of the corollary place us in the setting of Theorem 4.9. This theorem
guarantees that Φ maps the initial F -algebra in F : F (µF ) → µF to an F̂ -algebra with
carrier K1 (µF ). But since left adjoints preserve initial objects, we must therefore have that
the initial F̂ -algebra has carrier K1 (µF ). Thus, µF̂ exists and is isomorphic to K1 (µF ).
GENERIC FIBRATIONAL INDUCTION
19
Theorem 4.11. Let U : E → B be a comprehension category with unit and F : B → B
be an inductive functor. If F has a truth-preserving lifting F̂ , then the following generic
fibrational induction rule is sound:
genfibind
genfibind F P
: ∀ (F : B → B) (P : E). (F̂ P → P ) → (µF̂ → P )
= fold
An alternative presentation of genfibind is
genfibind
genfibind F P
: ∀ (F : B → B) (P : E). (F̂ P → P ) → (µF → {P })
= fold ◦ Ψ
We call genfibind F the generic fibrational induction rule for µF .
In summary, we have generalised the generic induction rule for predicates over Set
presented in Section 3 to give a sound generic induction rule for comprehension categories
with unit. Our only assumption is that if we start with an inductive functor F on the
base of the comprehension category, then there must be a truth-preserving lifting of that
functor to the total category of the comprehension category. In that case, we can specialise
genfibind to get a fibrational induction rule for any datatype µF that can be interpreted in
the fibration’s base category.
The generic fibrational induction rule genfibind does, however, look slightly different
from the generic induction rule for set-valued predicates. This is because, in Section 3, we
used our knowledge of the specific structure of comprehensions for set-valued predicates
to extract proofs for particular data elements from them. But in the fibrational setting,
predicates, and hence comprehensions, are left abstract. We therefore take the return type
of the general induction scheme genfibind to be a comprehension with the expectation that,
when the general theory of this section is instantiated to a particular fibration of interest, it
may be possible to use knowledge about that fibration to extract from the comprehension
constructed by genfibind further proof information relevant to the application at hand.
As we have previously mentioned, Hermida and Jacobs provide truth-preserving liftings
only for polynomial functors. In Section 4.3, we define a generic truth-preserving lifting for
any inductive functor on the base category of any fibration which, in addition to being a
comprehension category with unit, has left adjoints to all reindexing functors. This gives a
sound generic fibrational induction rule for the datatype µF for any functor F on the base
category of any such fibration.
4.3. Constructing Truth-Preserving Liftings. In light of the previous subsection, it is
natural to ask whether or not truth-preserving liftings exist. If so, are they unique? Or, if
there are many truth-preserving liftings, is there a specific truth-preserving lifting to choose
above others? Is there, perhaps, even a universal truth-preserving lifting? We can also ask
about the algebraic structure of liftings. For example, do truth-preserving liftings preserve
sums and products of functors?
Answers to some of these questions were given by Hermida and Jacobs, who provided
truth-preserving liftings for polynomial functors. To define such liftings they assume that
the total category and the base category of the fibration in question have products and
coproducts, and that the fibration preserves them. Under these conditions, liftings for
polynomial functors can be defined inductively. In this section we go beyond the results of
Hermida and Jacobs and construct truth-preserving liftings for all inductive functors. We
employ a two-stage process, first building truth-preserving liftings under the assumption
20
N. GHANI, P. JOHANN, AND C. FUMEX
that the fibration of interest is a codomain fibration, and then using the intuitions of
Section 3 to extend this lifting to a more general class of fibrations. In Section 4.4 we
consider the questions from the previous paragraph about the algebraic structure of liftings.
4.3.1. Truth-Preserving Liftings for Codomain Fibrations. Recall from Example 5 that if B
has pullbacks, then the codomain fibration over B is the functor cod : B → → B. Given a
functor F : B → B, it is trivial to define a lifting F → : B → → B → for this fibration. We can
define the functor F → to map an object f : X → Y of B → to F f : F X → F Y , and to map
a morphism (α1 , α2 ) to the morphism (F α1 , F α2 ). That F → is a lifting is easily verified.
If we further verify that codomain fibrations are comprehension categories with unit,
and that the lifting F → is truth-preserving, then Theorem 4.11 can be applied to them. For
the former, we first observe that the functor K1 : B → B → mapping an object X to id and
a morphism f : X → Y to (f, f ) is a truth functor for this fibration. (In fact, we can take
any isomorphism into X as K1 X; we will use this observation below.) If we let B → (U, V )
denote the set of morphisms from an object U to an object V in B → , then the fact that K1
is right adjoint to cod can be established via the natural isomorphism
B → (f : X → Y, K1 Z) = {(α1 : X → Z, α2 : Y → Z) | α1 = α2 ◦ f } ∼
= B(Y, Z) = B(cod f, Z)
We next show that the functor dom : B → → B mapping an object f : X → Y of B → to
X and a morphism (α1 , α2 ) to α1 is a comprehension functor for the codomain fibration.
That dom is right adjoint to K1 is established via the natural isomorphism
B → (K1 Z, f : X → Y ) = {(α1 : Z → X, α2 : Z → Y ) | α2 = f ◦ α1 } ∼
= B(Z, X) = B(Z, dom f )
Finally, we have that F → is truth-preserving because
F → (K1 Z) = F → id = F id = id = K1 (F Z)
A lifting is implicitly given in [16] for functors on a category with display maps. Such
a category is a subfibration of the codomain fibration over that category, and the lifting
given there is essentially the lifting for the codomain fibration restricted to the subfibration
in question.
4.3.2. Truth-Preserving Liftings for the Families Fibration over Set. In Section 3 we defined, for every functor F : Set → Set, a lifting F̂ which maps the predicate P to (F πP )−1 .
Looking closely, we realise this lifting decomposes into three parts. Given a predicate P ,
we first consider the projection function πP : {P } → U P . Next, we apply the functor F
to πP to obtain F πP : F {P } → F U P . Finally, we take the inverse image of F πP to get a
predicate over F U P as required.
Note that π is the functor from P to Set→ which maps a predicate P to the projection
function πP : {P } → U P (and maps a predicate morphism (f, f ∼ ) from a predicate P : X →
Set to P ′ : X ′ → Set to the morphism ({(f, f ∼ )}, f ) from πP to πP ′ ; cf. Definition 3.4). If
I : Set→ → P is the functor sending a function f : X → Y to its “inverse” predicate f −1
(and a morphism (α1 , α2 ) to the predicate morphism (α2 , ∀y : Y. λx : f −1 y. α1 x)), then
each of the three steps of defining F̂ is functorial and the relationships indicated by the
GENERIC FIBRATIONAL INDUCTION
21
following diagram hold:
π
P ❇l
❇❇
❇❇
❇❇
U ❇!
⊤
I
Set
,
Set→
✇✇
✇✇
✇
✇
{ ✇ cod
✇
Note that the adjunction I ⊣ π is an equivalence. This observation is not, however,
necessary for our subsequent development; in particular, it is not needed for Theorem 4.14.
The above presentation of the lifting F̂ of a functor F for the families fibration over Set
uses the lifting of F for the codomain fibration over Set. Indeed, writing F → for the lifting
of F for the codomain fibration over Set, we have that F̂ = IF → π. Moreover, since π and
I are truth-preserving (see the proof of Lemma 3.7), and since we have already seen that
liftings for codomain fibrations are truth-preserving, we have that F̂ is truth-preserving
because each of its three constituent functors is. Finally, since we showed in Section 3 that
the families fibration over Set is a comprehension category with unit, Theorem 4.11 can be
applied to it.
Excitingly, as we shall see in the next subsection, the above presentation of the lifting
of a functor for the families fibration over Set generalises to many other fibrations!
4.3.3. Truth-Preserving Liftings for Other Fibrations. We now turn our attention to the
task of constructing truth-preserving liftings for fibrations other than codomain fibrations
and the families fibration over Set. By contrast with the approach outlined in the conference
paper [9] on which this paper is based, the one we take here uses a factorisation, like that
of the previous subsection, through a codomain fibration. More specifically, let U : E → B
be a comprehension category with unit. We first define functors I and π, and construct an
adjunction I ⊣ π between E and B → such that the relationships indicated by the following
diagram hold:
π
E ❄k
❄❄
❄❄
❄
U ❄❄
⊤
I
,
B→
⑤
⑤⑤
⑤
⑤⑤
}⑤⑤ cod
B
We then use the adjunction indicated in the diagram to construct truth-preserving a lifting
for U from that for the codomain fibration over B.
To define the functor π : E → B → we generalise the definition of π : P → Set→
from Sections 3 and 4.3.2. This requires us to work with the axiomatic characterisation in
Definition 4.7 of the comprehension functor {−} : E → B as the right adjoint to the truth
functor K1 : B → E. The counit of the adjunction K1 ⊣ {−} is a natural transformation
ǫ : K1 {−} → Id. Applying U to ǫ gives the natural transformation U ǫ : U K1 {−} → U , but
since U K1 = Id, in fact we have that U ǫ : {−} → U . We can therefore define π to be U ǫ.
Then π is indeed a functor from E to B → , its action on an object P is πP , and its action
on a morphism (f, f ∼ ) is ({(f, f ∼ )}, f ).
We next turn to the definition of the left adjoint I to π. To see how to generalise the
inverse image construction to more general fibrations we first recall from Example 4 that, if
f : X → Y is a function and P : Y → Set, then f ∗ P = P ◦ f . We can extend this mapping
22
N. GHANI, P. JOHANN, AND C. FUMEX
to a reindexing functor f ∗ : EY → EX by defining f ∗ (id , h∼ ) = (id , h∼ ◦ f ). If we define the
action of Σf : EX → EY on objects by
]
Σf P = λy.
Px
{x|f x=y}
U
where denotes the disjoint union operator on sets, and its action on morphisms by taking
Σf (id , α∼ ) to be (id , ∀(y : Y ). λ(x : X, p : f x = y, t : P x). (x, p, α∼ x t)), then Σf is left
adjoint to f ∗ . Moreover, if we compute
]
Σf (K1 X) = λy.
K1 Xx
{x | f x=y}
and recall that, for any x : X, the set K1 X x is a singleton, then Σf (K1 X) is clearly
equivalent to the inverse image of f .
The above discussion suggests that, in order to generalise the inverse image construction
to a more general fibration U : E → B, we should require each reindexing functor f ∗ to have
the opreindexing functor Σf as its left adjoint. As in [10], no Beck-Chevalley condition is
required on these adjoints. The following result, which appears as Proposition 2.3 of [11],
thus allows us to isolate the exact class of fibrations for which we will have sound generic
induction rules.
Theorem 4.12. A fibration U : E → B is a bifibration iff for every morphism f in B the
reindexing functor f ∗ has left adjoint Σf .
Definition 4.13. A Lawvere category is a bifibration which is also a comprehension category
with unit.
We construct the left adjoint I : B → → E of π for any Lawvere category U : E → B as
follows. If f : X → Y is an object of B → , i.e., a morphism of B, then we define I f to be the
object Σf (K1 X) of E. To define the action of I on morphisms, let (α1 , α2 ) be a morphism
in B → from f : X → Y to f ′ : X ′ → Y ′ in B → . Then (α1 , α2 ) is a pair of morphisms in B
such that the following diagram commutes:
X
α1
/ X′
f′
f
Y
α2
/ Y′
We must construct a morphism from Σf (K1 X) to Σf ′ (K1 X ′ ) in E. To do this, notice
′
that f§′K1 X ◦ K1 α1 : K1 X → Σf ′ (K1 X ′ ) is above f ′ ◦ α1 , and that it is also above α2 ◦ f
′
since f ′ ◦ α1 = α2 ◦ f . We can then consider the morphism f§′K1 X ◦ K1 α1 and use the
universal property of the opcartesian morphism f§K1 X to deduce the existence of a morphism
h : Σf (K1 X) → Σf ′ (K1 X ′ ) above α2 . It is not difficult, using the uniqueness of the
morphism h, to prove that setting this h to be the image of the morphism (α1 , α2 ) makes
I a functor. In fact, since cod ◦ π = U , Result (i) on page 190 of [11] guarantees that,
for any Lawvere category U : E → B the functor I : B → → E exists and is left adjoint to
π : E → B→ .
We can now construct a truth-preserving lifting for any Lawvere category U : E → B
and functor F on B.
GENERIC FIBRATIONAL INDUCTION
23
Theorem 4.14. Let U : E → B be a Lawvere category and, for any functor F on B, define
the functor F̂ on E by
F̂ : E → E
F̂ = IF → π
Then F̂ is a truth-preserving lifting of F .
Proof. It is trivial to check that F̂ is indeed a lifting. To prove that it is truth-preserving, we
need to prove that F̂ (K1 X) ∼
= K1 (F X) for any functor F on B and object X of B. We do
this by showing that each of π, F → , and I preserves fibred terminal objects, i.e., preserves
the terminal objects of each fibre of the total category which is its domain. Then since
K1 X is a terminal object in the fibre EX , we will have that F̂ (K1 X) = I(F → (π(K1 X))) is
a terminal object in EF X , i.e., that F̂ (K1 X) ∼
= K1 (F X) as desired.
We first show that π preserves fibred terminal objects. We must show that, for any
object X of B, πK1 X is a terminal object of the fibre of B → over X, i.e., is an isomorphism
with codomain X. We prove this by observing that, if η : Id → {−}K1 is the unit of
the adjunction K1 ⊣ {−}, then πK1 X is an isomorphism with inverse ηX . Indeed, if ǫ
is the counit of the same adjunction, then the facts that U K1 = Id and that K1 is full
and faithful ensure that K1 ηX is an isomorphism with inverse ǫK1 X . Thus, ǫK1 X is an
isomorphism with inverse K1 ηX , and so πK1 X = U ǫK1 X is an isomorphism with inverse
U K1 ηX , i.e., with inverse ηX . Since K1 X is a terminal object in EX and πK1 X is a terminal
object in the fibre of B → over X, we have that π preserves fibred terminal objects.
It is not hard to see that F → preserves fibred terminal objects: applying the functor F
to an isomorphism with codomain X — i.e., to a terminal object in the fibre of B → over
X — gives an isomorphism with codomain F X — i.e., a terminal object in the fibre of B →
over F X.
Finally, if f : X → Y is an isomorphism in B, then Σf is not only left adjoint to f ∗ ,
but also right adjoint to it. Since right adjoints preserve terminal objects, and since K1 X
is a terminal object of EX , we have that If = Σf (K1 X) is a terminal object of EY . Thus I
preserves fibred terminal objects.
We stress that, to define our lifting, the codomain functor over the base B of the Lawvere
category need not be a fibration. In particular, B need not have pullbacks; indeed, all that
is needed to construct our generic truth-preserving lifting F̂ for a functor F on B is the
existence of the functors I and π (and F → , which always exists). We nevertheless present
the lifting F̂ as the composition of π, F → , and I because this presentation shows it can be
factored through F → . This helps motivate our definition of F̂ , thereby revealing parallels
between it and F → that would otherwise not be apparent. At the same time it trades the
direct, brute-force presentation of F̂ from [9] for an elegant modularly structured one which
makes good use, in a different setting, of general results about comprehension categories
due to Jacobs [11].
We now have the promised sound generic fibrational induction rule for every inductive
functor F on the base of a Lawvere category. To demonstrate the flexibility of this rule, we
now derive an induction rule for a data type and properties on it that cannot be modelled
in Set. Being able to derive induction rules for fixed points of functors in categories other
than Set is a key motivation for working in a general fibrational setting.
Example 7. The fixed point Hyp = µF of the functor F X = (X → Int) → Int is the data
type of hyperfunctions. Since F has no fixed point in Set, we interpret it in the category
24
N. GHANI, P. JOHANN, AND C. FUMEX
ωCP O⊥ of ω-cpos with ⊥ and strict continuous monotone functions. In this setting, a
property of an object X of ωCP O⊥ is an admissible sub-ωCP O⊥ P of X. Admissibility
means that the bottom element of X is in P and P is closed under least upper bounds of
ω-chains in X. This structure forms a Lawvere category [11, 12]; in particular, it is routine
to verify the existence of its opreindexing functor. In particular, Σf P is constructed for a
continuous map f : X → Y and an admisible predicate P ⊆ X, as the intersection of all
admissible Q ⊆ Y with P ⊆ f −1 (Q). The truth functor maps X to X, and comprehension
maps a sub-ωCP O⊥ P of X to P . The lifting F̂ maps a sub-ωCP O⊥ P of X to the least
admissible predicate on F X containing the image of F P . Finally, the derived induction
rule states that if P is an admissible sub-ωCP O⊥ of Hyp, and if F̂ (P ) ⊆ P , then P = Hyp.
4.4. An Algebra of Lifting. We have proved that in any Lawvere category U : E → B,
any functor F on B has a lifting F̂ on E which is truth-preserving, and thus has the following
associated sound generic fibrational induction rule:
genfibind
genfibind F P
: ∀ (F : B → B) (P : E). (F̂ P → P ) → (µF → {P })
= fold ◦ Ψ
In this final subsection of the paper, we ask what kinds of algebraic properties the lifting
operation has. Our first result concerns the lifting of constant functors.
Lemma 4.15. Let U : E → B be a Lawvere category and let X be an object of B. If FX is
the constantly X-valued functor on B, then Fc
X is isomorphic to the constantly K1 X-valued
functor on E.
Proof. For any object P of E we have
→
Fc
X P = (I(FX ) π)P = I(FX πP ) = ΣF
X πP
K1 FX {P } = Σid K1 X ∼
= K1 X
The last isomorphism holds because id ∗ ∼
= Id and Σid ⊣ id ∗ .
Our next result concerns the lifting of the identity functor. It requires a little additional
structure on the Lawvere category of interest.
Definition 4.16. A full Lawvere category is a Lawvere category U : E → B such that
π : E → B → is full and faithful.
b ∼
Lemma 4.17. In any full Lawvere category, Id
= Id
Proof. By the discussion following Definition 4.13, I ⊣ π. Since π is full and faithful, the
counit of this adjunction is an isomorphism, and so IπP ∼
= P for all P in E. We therefore
have that
bP
P ∼
= IπP = Σπ K1 {P } = ΣId π K1 (Id {P }) = (I Id → π)P = Id
p
p
bP ∼
i.e., that Id
= P for all P in E. Because these isomorphisms are clearly natural, we
b ∼
therefore have that Id
= Id.
GENERIC FIBRATIONAL INDUCTION
25
We now show that the lifting of a coproduct of functors is the coproduct of the liftings.
Lemma 4.18. Let U : E → B be a Lawvere category and let F and G be functors on B.
Then F\
+G∼
= F̂ + Ĝ.
Proof. We have
(F\
+ G)P = I((F + G)→ πP ) = I(F → πP + G→ πP ) ∼
= I(F → πP ) + I(G→ πP ) = F̂ P + ĜP
The third isomorphism holds because I is a left adjoint and so preserves coproducts.
Note that the statement of Lemma 4.18 does not assert the existence of either of the
two coproducts mentioned, but rather that, whenever both do exist, they must be equal.
Note also that the lemma generalises to any colimit of functors. Unfortunately, no result
analogous to Lemma 4.18 can yet be stated for products.
Our final result considers whether or not there is anything fundamentally special about
the lifting we have constructed. It is clearly the “right” lifting in some sense because it
gives the expected induction rules. But other truth-preserving liftings might also exist and,
if this is the case, then we might hope our lifting satisfies some universal property. In
fact, under a further condition, which is also satisfied by all of the liftings of Hermida and
Jacobs, and which we therefore regard as reasonable, we can show that our lifting is the only
truth-preserving lifting. Our proof uses a line of reasoning which appears in Remark 2.13
in [10].
Lemma 4.19. Let U : E → B be a full Lawvere category and let F be a truth-preserving
lifting of a functor F on B. If F preserves Σ-types — i.e., if (F )(Σf P ) ∼
= ΣF f (F )P
∼
— then F = F̂ .
Proof. We have
(F )P
∼
=
∼
=
∼
=
∼
=
b P)
(F )(Id
(F )(ΣπP K1 {P })
ΣF πP (F )K1 {P }
ΣF πP K1 F {P }
= F̂ P
Finally, we can return to the question of the relationship between the liftings of polynomial
functors given by Hermida and Jacobs and the liftings derived by our methods. We have seen
that for constant functors, the identity functor, and coproducts of functors our constructions
agree. Moreover, since Hermida and Jacobs’ liftings all preserve Σ-types, Lemma 4.19
guarantees that in a full Lawvere category their lifting for products also coincides with
ours.
5. Conclusion and future work
We have given a sound induction rule that can be used to prove properties of data structures
of inductive types. Like Hermida and Jacobs, we give a fibrational account of induction,
but we derive, under slightly different assumptions on fibrations, a generic induction rule
that can be instantiated to any inductive type rather than just to polynomial ones. This
rule is based on initial algebra semantics of data types, and is parameterised over both
the data types and the properties involved. It is also principled, expressive, and correct.
26
N. GHANI, P. JOHANN, AND C. FUMEX
Our derivation yields the same induction rules as Hermida and Jacobs’ when specialised to
polynomial functors in the families fibration over Set and in other fibrations, but it also
gives induction rules for non-polynomial data types such as rose trees, and for data types
such as finite hereditary sets and hyperfunctions, for which no fibrational induction rules
have previously been known to exist.
There are several directions for future work. The most immediate is to instantiate our
theory to give induction rules for more sophisticated data types, such as nested types. These
are exemplified by the data type of perfect trees given in Haskell-like syntax as follows:
data PTree a : Set where
PLeaf : a → PTree a
PNode : PTree (a, a) → PTree a
Nested types arise as least fixed points of rank-2 functors; for example, the type of perfect
trees is µH for the functor H given by HF = λX. X + F (X × X). An appropriate fibration
for induction rules for nested types thus takes B to be the category of functors on Set,
E to be the category of functors from Set to P, and U to be postcomposition with the
forgetful functor from Section 3. A lifting Ĥ of H is given by Ĥ P X (inl a) = 1 and
Ĥ P X (inr n) = P (X × X) n. Taking the premise to be an Ĥ-algebra gives the following
induction rule for perfect trees:
indP T ree : ∀ (P : Set → P).
(U P = PTree) → (∀(X : Set)(x : X). P (PLeaf x)) →
(∀(X : Set)(t : PTree (X × X). P (X × X) t → P (PNode t))) →
∀(X : Set)(t : PTree X). P X t
This rule can be used to show, for example, that P T ree is a functor.
Extending the above instantiation for the codomain fibration to so-called “truly nested
types” [15] and fibrations is current work. We expect to be able to instantiate our theory for
truly nested types, GADTs, indexed containers, dependent types, and inductive recursive
types, but initial investigations show care is needed. We must ascertain which fibrations can
model predicates on such types, since the codomain fibration may not give useful induction
rules, as well as how to translate the rules to which these fibrations give rise to an intensional
setting.
Matthes [15] gives induction rules for nested types (including truly nested ones) in an
intensional type theory. He handles only rank-2 functors that underlie nested types (while
we handle any functor of any rank with an initial algebra), but his insights may help guide
choices of fibrations for truly nested types. These may in turn inform choices for GADTs,
indexed containers, and dependent types.
Induction rules can automatically be generated in many type theories. Within the
Calculus of Constructions [4] an induction rule for a data type can be generated solely
from the inductive structure of that type. Such generation is also a key idea in the Coq
proof assistant [5]. As far as we know, generation can currently be done only for syntactic
classes of functors rather than for all inductive functors with initial algebras. In some
type theories induction schemes are added as axioms rather than generated. For example,
attempts to generate induction schemes based on Church encodings in the Calculus of
Constructions proved unsuccessful and so initiality was added to the system, thus giving the
Calculus of Inductive Constructions. Whereas Matthes’ work is based on concepts such as
impredicativity and induction recursion rather than initial algebras, ours reduces induction
GENERIC FIBRATIONAL INDUCTION
27
to initiality, and may therefore help lay the groundwork for extending implementations of
induction to more sophisticated data types.
Acknowledgement
We thank Robert Atkey, Pierre-Evariste Dagand, Peter Hancock, and Conor McBride for
many fruitful discussions.
References
[1] T. Altenkirch and P. Morris. Indexed Containers. Proceedings, Logic in Computer Science, pp. 277–285,
2009.
[2] R. S. Bird and O. De Moor. Algebra of Programming. Prentice Hall, 1997.
[3] R. Bird and L. Meertens. Nested Datatypes. Proceedings, Mathematics of Program Construction, pp.
52–67, 1998.
[4] T. Coquand and G. Huet. The Calculus of Constructions. Information and Computation 76 (2-3), pp.
95–120, 1988.
[5] The Coq Proof Assistant. Available at coq.inria.fr
[6] P. Dybjer. A General Formulation of Simultaneous Inductive-Recursive Definitions in Type Theory.
Journal of Symbolic Logic 65 (2), pp. 525–549, 2000
[7] N. Ghani, M. Abbott, and T. Altenkirch. Containers - Constructing Strictly Positive Types. Theoretical
Computer Science 341 (1), pp. 3–27, 2005.
[8] N. Ghani and P. Johann. Foundations for Structured Programming with GADTs. Proceedings, Principles
of Programming Languages, pp. 297–308, 2008.
[9] N. Ghani and P. Johann and C. Fumex. Fibrational Induction Rules for Initial Algebras. Proceedings,
Computer Science Logic, pp. 336–350, 2010.
[10] C. Hermida and B. Jacobs. Structural Induction and Coinduction in a Fibrational Setting. Information
and Computation 145 (2), pp. 107–152, 1998.
[11] B. Jacobs. Comprehension Categories and the Semantics of Type Dependency. Theoretical Computer
Science 107, pp. 169–207, 1993.
[12] B. Jacobs. Categorical Logic and Type Theory. North Holland, 1999.
[13] P. Johann and N. Ghani. Initial Algebra Semantics is Enough! Proceedings, Typed Lambda Calculus
and Applications, pp. 207–222, 2007.
[14] F. W. Lawvere. Equality in Hyperdoctrines and Comprehension Scheme as an Adjoint Functor. Applications of Categorical Algebra, pp. 1–14, 1970.
[15] R. Matthes. An Induction Principle for Nested Datatypes in Intensional Type Theory. Journal of Functional Programming 19 (3&4), pp. 439–468, 2009.
[16] N. P. Mendler. Predicative type universes and primitive recursion. Proceedings, Logic in Computer
Science, pp. 173–184, 1991.
[17] P. Morris. Constructing Universes for Generic Programming. Dissertation, University of Nottingham,
2007.
[18] E. Moggi. Notations of Computation and Monads. Information and Computation 93 (1), pp. 55–92,
1991.
[19] B. Nordström, K. Petersson, and J. Smith. Programming in Martin-Löf ’s Type Theory. Oxford University Press, 1990.
[20] D. Pavlovič. Predicates and Fibrations. Dissertation, University of Utrecht, 1990.
[21] T. Sheard. Languages of the Future. SIGPLAN Notices 39 (10), pp. 116–119, 2004.
This work is licensed under the Creative Commons Attribution-NoDerivs License. To view
a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a
letter to Creative Commons, 171 Second St, Suite 300, San Francisco, CA 94105, USA, or
Eisenacher Strasse 2, 10777 Berlin, Germany
| 6cs.PL
|
Logical Methods in Computer Science
Vol. 5 (4:2) 2009, pp. 1–48
www.lmcs-online.org
Submitted
Published
Mar. 3, 2009
Dec. 17, 2009
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS ∗
CĂTĂLIN HRIŢCU a AND JAN SCHWINGHAMMER b
a
Department of Computer Science, Saarland University, Saarbrücken, Germany
e-mail address: [email protected]
b
Programming Systems Lab, Saarland University, Saarbrücken, Germany
e-mail address: [email protected]
Abstract. Step-indexed semantic interpretations of types were proposed as an alternative
to purely syntactic proofs of type safety using subject reduction. The types are interpreted
as sets of values indexed by the number of computation steps for which these values are
guaranteed to behave like proper elements of the type. Building on work by Ahmed, Appel
and others, we introduce a step-indexed semantics for the imperative object calculus of
Abadi and Cardelli. Providing a semantic account of this calculus using more ‘traditional’,
domain-theoretic approaches has proved challenging due to the combination of dynamically
allocated objects, higher-order store, and an expressive type system. Here we show that,
using step-indexing, one can interpret a rich type discipline with object types, subtyping,
recursive and bounded quantified types in the presence of state.
1. Introduction
The imperative object calculus of Abadi and Cardelli is a very small, yet very expressive
object-oriented language [2]. Despite the extreme simplicity of its syntax, the calculus
models many important concepts of object-oriented programming, as well as the often subtle
interaction between them. In particular it raises interesting and non-trivial questions with
respect to typing.
In contrast to the more common class-based object-oriented languages, in the imperative object calculus every object comes equipped with its own set of methods that can be
updated at run-time. As a consequence, the methods need to reside in the store, i.e., the
store is higher-order. Moreover, objects are allocated dynamically and aliasing is possible.
Dynamically-allocated, higher-order store is present in different forms in many practical
programming languages (e.g., pointers to functions in C and general references in SML),
but it considerably complicates the construction of adequate semantic models in which one
can reason about the behaviour of programs (as pointed out for instance by Reus [40]).
Purely syntactic arguments such as subject reduction suffice for proving the soundness
of traditional type systems. However, once such type systems are turned into powerful
1998 ACM Subject Classification: D.3.1, F.3.2.
Key words and phrases: Formal calculi, objects, type systems, programming language semantics.
∗
A preliminary version of this paper was presented at the International Workshop on Foundations of
Object-Oriented Languages (FOOL’08), 13 January 2008, San Francisco, California.
l
LOGICAL METHODS
IN COMPUTER SCIENCE
c
DOI:10.2168/LMCS-5 (4:2) 2009
CC
C. Hriţcu and J. Schwinghammer
Creative Commons
2
C. HRIŢCU AND J. SCHWINGHAMMER
specification languages, like the logic of objects of Abadi and Leino [4] or the hybrid type
system of Flanagan et al. [24], purely syntactic arguments seem no longer appropriate. The
meaning of assertions is no longer obvious, since they have to describe the code on the heap.
We believe that specifications of program behaviour should have a meaning independent of
the particular proof system on which syntactic preservation proofs rely, as also argued by
Benton [13] and by Reus and Schwinghammer [41].
In the case of specifications one would ideally prove soundness with respect to a semantic model that makes a clear distinction between semantic validity and derivability using
the syntactic rules. However, building such semantic models is challenging, and there is
currently no fully satisfactory semantic account of the imperative object calculus:
Denotational semantics: Domain-theoretic models have been employed in proving the
soundness of the logic of Abadi and Leino [41, 42]. However, the existing techniques fall
short of providing convincing models of typed objects: Reus and Streicher [42] consider an
untyped semantics, and the model presented by Reus and Schwinghammer [41] handles
neither second-order types, nor subtyping in depth. Due to the dynamically-allocated
higher-order store present in the imperative object calculus, the models rely on techniques
for recursively defined domains in functor categories [31, 36]. This makes them complex,
and establishing properties even for specific programs often requires a substantial effort.
Equational reasoning: Gordon et al. [25] develop reasoning principles for establishing
the contextual equivalence of untyped objects, and apply them to prove correctness of
a compiler optimization. Jeffrey and Rathke [29] consider a concurrent variant of the
calculus and characterize may-testing equivalence in terms of the trace sets generated
by a labeled transition system. In both cases the semantics is limited to equational
reasoning, i.e., establishing contextual equivalences between programs. In theory, this
can be used to verify a program by showing it equivalent to one that is trivially correct
and acts as a specification. However, this can be more cumbersome in practice than using
program logics, the established formalism for specifying and proving the correctness of
programs.
Translations: Abadi et al. [3] give an adequate encoding of the imperative object calculus into a lambda calculus with records, references, recursive and existential types and
subtyping. Together with an interpretation of this target language, an adequate model
for the imperative object calculus could, in principle, be obtained. However, we are
not aware of any worked-out adequate domain-theoretic models for general references
and impredicative second-order types. Even if such a model was given, it would still be
preferable to have a self-contained semantics for the object calculus, without the added
complexity of the (non-trivial) translation.
A solution to the problem of finding adequate models of objects could be the step-indexed
semantic models of types, introduced by Appel and McAllester [10] as an alternative to
subject reduction proofs. Such models are based directly on the operational semantics, and
are more easy to construct than the existing domain-theoretic models. The types are simply
interpreted as sets of syntactic values indexed by a number of computation steps. Intuitively,
a term belongs to a certain type if it behaves like an element of that type for any number of
steps. Every type is built as a sequence of increasingly accurate semantic approximations,
which allows one to easily deal with recursion. Type safety is an immediate consequence
of this interpretation of types, and the semantic counterparts of the usual typing rules
are proved as independent lemmas, either directly or by induction on the index. Ahmed
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
3
et al. [6, 9] successfully applied this generic technique to a lambda calculus with general
references, impredicative polymorphism and recursive types.
In this paper we further extend the semantics of Ahmed et al. with object types and
subtyping, and we use the resulting interpretation to prove the soundness of an expressive
type system for the imperative object calculus. The main contribution of our work is the
novel semantics of object types. We extend this semantics in two orthogonal ways. First,
we adapt it to self types, i.e., recursive object types that validate the usual subtyping rules
as well as strong typing rules with structural assumptions. Second, we study a natural
generalization of object types that results in simpler and more expressive typing rules.
Even though in this paper we are concerned with the safety of a type system, the
step-indexing technique is not restricted to types, and has already been used for equational
reasoning [5, 7, 10] and for proving the soundness of Hoare-style program logics of low-level
languages [13, 14]. We expect therefore that it will eventually become possible to use a stepindexed model to prove the soundness of more expressive program logics for the imperative
object calculus.
Outline. The next section introduces the syntax, operational semantics, and type system
that we consider for the imperative object calculus. In Section 3 we present a step-indexed
semantics for this calculus. In particular, we define the interpretations of types and establish their semantic properties. In Section 4 these properties are used to prove the soundness
of the type system. Section 5 studies self types, while Section 6 discusses a natural generalization of object types. Section 7 gives a comparison to related work and Section 8
concludes. The Appendix presents the proofs of the most interesting typing and subtyping
lemmas for object types, while an earlier technical report contains additional proofs [28].
2. The Imperative Object Calculus
We recall the syntax of the imperative object calculus with recursive and second-order types,
and introduce a small-step operational semantics for this calculus that is equivalent to the
big-step semantics given by Abadi and Cardelli [2].
2.1. Syntax. Let Var, TVar and Meth be pairwise disjoint, countably infinite sets of variables, type variables and method names, respectively. Let x, y range over Var, X, Y range
over TVar, and let m range over Meth. Figure 1 defines the syntax of the types and terms
of the imperative object calculus.
Objects are unordered collections of named methods, written as [md =ς(xd :A)bd ]d∈D .
In a method m = ς(x:A)b, ς is a binder that binds the ‘self’ argument x in the method
body b. The self argument can be used inside the method body for invoking the methods of
the containing object. Methods with arguments other than self can be obtained by having
a procedure as the method body. The methods of an object can be invoked or updated,
but no new methods can be added, and the existing methods cannot be deleted. The type
of objects with methods named md that return results of type Ad , for d in some set D, is
written as [md :νd Ad ]d∈D , where ν ∈ {◦, +, −} is a variance annotation that indicates if
the method is considered invoke-only (+), update-only (−), or if it may be used without
restriction (◦).
While procedural abstractions are sometimes defined in the imperative object calculus
using an additional let construct, we include them as primitives. We write procedures
4
C. HRIŢCU AND J. SCHWINGHAMMER
A, B, C ::= X | Top | Bot | A → B
(type expressions)
| [md :νd Ad ]d∈D | µ(X)A
| ∀(X6A)B | ∃(X6A)B
ν ::= ◦ | + | −
a, b ::= x
(variance annotations)
(variable)
| [md =ς(xd :A)bd ]d∈D
(object creation)
| a.m
(method invocation)
| a.m := ς(x:A)b
(method update)
| clone a
(shallow copy)
| λ(x:A)b
(procedure)
| ab
(application)
| foldA b
(recursive folding)
| unfoldA b
(recursive unfolding)
| Λ(X6A)b
(type abstraction)
| a[A]
(type application)
| pack X6A = C in a :B
(existential package)
| open a as X6A, x:B in b :C
(package opening)
Figure 1: Syntax of types and terms
with type A → B as λ(x:A)b and applications as a b, respectively. We use foldA and
unfoldA to denote the isomorphism between a recursive type µ(X)B and its unfolding
{{X 7→ µ(X)B}}(B). Finally, we consider bounded universal and existential types ∀(X6A)B
and ∃(X6A)B along with their introduction and elimination forms [21].
The set of free variables of a term a is denoted by fv(a), and similarly the free type
variables in a type A by fv(A). We identify types and terms up to the consistent renaming of
bound variables. We use {{t 7→ r}} to denote the singleton map that maps t to r. For a finite
map σ from variables to terms, σ(a) denotes the result of capture-avoiding substitution of
all x ∈ fv(a) ∩ dom(σ) by σ(x). The same notation is used for the substitution of type
variables. Generally, for any function f , the notation f [t := r] denotes the function that
maps t to r, and otherwise agrees with f .
2.2. Operational Semantics. Let Loc be a countably infinite set of heap locations ranged
over by l. We extend the set of terms by run-time representations of objects {md =ld }d∈D ,
associating heap locations to a set of method names. Values are given by the grammar:
v ∈ Val ::= {md =ld }d∈D | λ(x:A)b | foldA v | Λ(X6A)b | pack X6A = C in v :B
Apart from run-time objects, values consist of procedures, values of recursive type, type
abstractions and existential packages as in the call-by-value lambda calculus. We often only
consider terms and values without free variables, and denote the set of these closed terms
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
5
E[·] ::= [·] | E.m | E.m := ς(x:A)b | clone E | E b | v E | foldA E | unfoldA E
| E[A] | pack X6A = C in E :B | open E as X6A, x:B in b :C
Figure 2: Evaluation contexts
(Red-Obj)
hh, [md =ς(xd :A)bd ]d∈D i → hh [ld := λ(xd :A)bd ]d∈D , {md =ld }d∈D i
where ∀d ∈ D. ld ∈
/ dom(h)
(Red-Inv)
(Red-Upd)
(Red-Clone)
hh, {md =ld }d∈D .me i → hh, h(le ) {md =ld }d∈D i, if e∈D
hh, {md =ld }d∈D .me := ς(x:A)bi → hh [le := λ(x:A)b], {md =ld }d∈D i, if e∈D
hh, clone {md =ld }d∈D i → hh ld′ := h(ld ) d∈D , md =ld′ d∈D i
where ∀d ∈ D. ld′ ∈
/ dom(h)
hh, (λ(x:A)b) vi → hh, {{x 7→ v}}(b)i
(Red-Beta)
(Red-Unfold)
hh, unfoldA (foldB v)i → hh, vi
hh, (Λ(X6A)b)[B]i → hh, {{X 7→ B}}(b)i
(Red-TBeta)
(Red-Open)
hh, open v as X6A, x:B in b :Ci → hh, {{x 7→ v ′ , X 7→ C ′ }}(b)i
where v ≡ pack X ′ 6A′ = C ′ in v ′ :B ′
Figure 3: One-step reduction relation
and closed values by CTerm and CVal, respectively. A program is a closed term that does
not contain any locations, and we denote the set of all programs by Prog. A heap h is a
finite map from Loc to CVal1, and we write Heap for the set of all heaps.
Figure 2 defines the set of evaluation contexts, formalizing a left-to-right, call-by-value
strategy. We write E[a] for the term obtained by plugging a into the hole [·] of E. The
one-step reduction relation → is defined as the least relation on configurations hh, ai ∈
Heap × CTerm generated by the rules in Figure 3 and closed under the following context
rule:
hh, ai → hh ′ , a′ i =⇒ hh, E[a]i → hh ′ , E[a′ ]i
(Red-Ctx)
The methods are actually stored in the heap as procedures. Object construction allocates new heap storage for these procedures and returns a record of references to them
(Red-Obj). Upon method invocation the corresponding stored procedure is retrieved from
the heap and applied to the enclosing object (Red-Inv). The self parameter is thus passed
just like any other procedure argument. Identifying methods and procedures makes the
‘self-application’ semantics of method invocation explicit, while technically it allows us to
use the step-indexed model of Ahmed et al. [6, 9] with only few modifications.
While variables are immutable identifiers, methods can be updated destructively. Such
updates only modify the heap and leave the run-time object unchanged (Red-Upd). Object
1In fact, for the purpose of modelling the imperative object calculus it would suffice to regard procedures
as the only kind of storable value.
6
C. HRIŢCU AND J. SCHWINGHAMMER
Γ⊢A6B
Subtyping
Γ⊢A
Γ⊢A6A
(SubRefl)
(SubTop)
′
Γ⊢A
Γ ⊢ A 6 Top
(SubTrans)
(SubBot)
(SubProc)
′
Γ⊢A6A Γ⊢A 6B
Γ⊢A6B
Γ⊢A
Γ ⊢ Bot 6 A
(SubVar)
Γ1 , X6A, Γ2 ⊢ ⋄
Γ1 , X6A, Γ2 ⊢ X 6 A
Γ ⊢ A′ 6 A Γ ⊢ B 6 B ′
Γ ⊢ A → B 6 A′ → B ′
E⊆D
(SubObj)
∀e∈E. (νe ∈ {+, ◦} ⇒ Γ ⊢ Ae 6 Be )
∧ (νe ∈ {−, ◦} ⇒ Γ ⊢ Be 6 Ae )
Γ ⊢ [md :νd Ad ]d∈D 6 [me :νe Be ]e∈E
∀d ∈ D. νd = ◦ ∨ νd = νd′
(SubObjVar)
Γ ⊢ [md :νd Ad ]d∈D 6 [md :νd′ Ad ]d∈D
(SubRec)
Γ ⊢ µ(X)A
Γ ⊢ µ(Y )B Γ, Y 6Top, X6Y ⊢ A 6 B
Γ ⊢ µ(X)A 6 µ(Y )B
(SubUniv)
Γ ⊢ A′ 6 A Γ, X6A′ ⊢ B 6 B ′
Γ ⊢ ∀(X6A)B 6 ∀(X6A′ )B ′
(SubExist)
Γ ⊢ A 6 A′ Γ, X6A ⊢ B 6 B ′
Γ ⊢ ∃(X6A)B 6 ∃(X6A′ )B ′
Figure 4: Subtyping
cloning generates a shallow copy of an object in the heap (Red-Clone). The last four rules
in Figure 3 are as in the lambda calculus.
For k ∈ N, →k denotes the k-step reduction relation. We write hh, ai9 if the configuration hh, ai is irreducible (i.e., there exists no configuration hh ′ , a′ i such that hh, ai → hh ′ , a′ i).
Note that reduction is not deterministic, due to the arbitrarily chosen fresh locations
in (Red-Obj) and (Red-Clone). However, we still have that there is always at most one,
uniquely determined redex. This has the important consequence that the reduction order
is fixed. For example, if there is a reduction sequence beginning with a method invocation
and ending in an irreducible configuration: hh1 , a.mi →k hh2 , bi9, then this sequence can
be split into
hh1 , a.mi →i hh1′ , a′ .mi →k−i hh2 , bi
where hh1 , ai →i hh1′ , a′ i9 for some i ≥ 0. Similar decompositions into subsequences hold
for reductions starting from the other term forms.
It is easy to see that the operational semantics is independent of the type annotations
inside terms. Also the semantic types that we define in Section 3 will not depend on the
syntactic type expressions in the terms. In order to reduce the notational overhead and to
prevent confusion between the syntax and semantics of types we will omit type annotations
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
Γ⊢a:A
Subsumption and axioms
(Sub)
7
Γ⊢a:A Γ⊢A6B
Γ⊢a:B
(Var)
Γ1 , x:A, Γ2 ⊢ ⋄
Γ1 , x:A, Γ2 ⊢ x : A
Procedure types
(Lam)
Object types
Γ, x:A ⊢ b : B
Γ⊢a:B→A Γ⊢b:B
(App)
Γ ⊢ λ(x:A)b : A → B
Γ⊢ab:A
(where A ≡ [md :νd Ad ]d∈D )
(Obj)
∀d∈D. Γ, xd :A ⊢ bd : Ad
Γ ⊢ [md =ς(xd :A)bd ]d∈D : A
(Inv)
(Upd)
(Clone)
Γ⊢a:A
Γ ⊢ clone a : A
Γ ⊢ a : A e ∈ D νe ∈ {+, ◦}
Γ ⊢ a.me : Ae
Γ ⊢ a : A e ∈ D Γ, x:A ⊢ b : Ae νe ∈ {−, ◦}
Γ ⊢ a.me := ς(x:A)b : A
Recursive types
(Unfold)
Γ ⊢ a : µ(X)A
Γ ⊢ unfoldµ(X)A a : {{X 7→ µ(X)A}}(A)
(Fold)
Γ ⊢ a : {{X 7→ µ(X)A}}(A)
Γ ⊢ foldµ(X)A a : µ(X)A
Bounded quantified types
(TAbs)
Γ, X6A ⊢ b : B
Γ ⊢ Λ(X6A)b : ∀(X6A)B
(Pack)
(Open)
(TApp)
Γ ⊢ a : ∀(X6A)B Γ ⊢ A′ 6 A
Γ ⊢ a[A′ ] : {{X 7→ A′ }}(B)
Γ ⊢ C 6 A Γ ⊢ {{X 7→ C}}(a) : {{X 7→ C}}(B)
Γ ⊢ (pack X6A = C in a :B) : ∃(X6A)B
Γ ⊢ a : ∃(X6A)B Γ ⊢ C Γ, X6A, x:B ⊢ b : C
Γ ⊢ (open a as X6A, x:B in b :C) : C
Figure 5: Typing of terms
when presenting the step-indexed semantics. For example, instead of the type application
a[A] we will merely write a[].
2.3. Type System. The type system we consider features procedure, object, iso-recursive
and (impredicative, bounded) quantified types, as well as subtyping, and corresponds to
FOb<:µ from [2]. It is fairly standard and consists of four inductively defined typing
judgments:
• Γ ⊢ ⋄, describing well-formed typing contexts,
• Γ ⊢ A, defining well-formed types,
8
C. HRIŢCU AND J. SCHWINGHAMMER
• Γ ⊢ A 6 B, for subtyping between well-formed types, and
• Γ ⊢ a : A, for typing terms.
The typing context Γ is a list containing type bindings for the (term) variables x:A and
upper bounds for the type variables X6A. A typing context is well-formed if it does not
contain duplicate bindings for (term or type) variables and all types appearing in it are
well-formed. A type is well-formed with respect to a well-formed context Γ if all its type
variables appear in Γ.
Figure 4 defines the subtyping relation. For the object types it allows subtyping in
width: an object type with more methods is a subtype of an object type with fewer methods, as long as the types of the common methods agree. For the invoke-only (+) and
update-only methods (−) in object types, covariant respectively contravariant subtyping in
depth is allowed (SubObj). Furthermore, the unrestricted methods (◦) can be regarded, by
subtyping, as either invoke-only or update-only (SubObjVar). Since the annotations can
be conveniently chosen at creation time (Obj) this brings much flexibility. As explained by
Abadi and Cardelli [2], this allows us to distinguish in the type system between the invocations and updates done through the self argument, and the ones done from the outside.
The main idea is to type an object creation with an object type where all methods are
considered invariant, so that all invocations and updates through the self argument (internal) are allowed, but have to be type preserving. Then rules (Sub) and (SubObjVar) are
applied and some of the methods can become invoke-only, some others update-only. This
enables the subsequent weakening of the types of these methods using (SubObj). In effect,
this allows for safe and flexible subtyping of methods, at the price of restricting update
and invocation of the methods from the outside. Nevertheless, the internal updates and
invocations remain unrestricted.
Figure 5 defines the typing relation. The applicability of the rules for method invocation
(Inv), and for method update (Upd), depends on the variance annotation. Also notice that
only type-preserving updates are allowed in (Upd). Finally, it is important to note that we
do not give types to heap locations, since the type system is only used to check programs, and
programs do not contain locations. In contrast, a proof of type safety using the preservation
and progress properties would require the syntactic judgement to also depend on a heap
typing since partially evaluated terms would also need to be typed.
3. A Step-indexed Semantics of Objects
Modelling higher-order store is necessarily more involved than the treatment of firstorder storage since the semantic domains become mutually recursive. Recall that heaps
store values that may be procedures. These in turn can be modeled as functions that take
a value and the initial heap as input, and return a value and the possibly modified heap
upon termination. This suggests the following semantic domains for values and heaps, respectively:
DVal = (DHeaps × DVal ⇀ DHeaps × DVal ) + . . .
(3.1)
DHeaps = Loc ⇀fin DVal
A simple cardinality argument shows that there are no set-theoretic solutions (i.e., where
D ⇀ E denotes the set of all partial functions from D to E) satisfying the equations in (3.1).
A possible solution is to use a domain-theoretic approach, as done for the imperative object
calculus by Reus and Streicher [42], building on earlier work by Kamin and Reddy [30].
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
9
In a model of a typed calculus one also wants to interpret the types. But naively taking
a collection Type of subsets τ ⊆ DVal as interpretations of syntactic types does not work,
since values generally depend on the heap and a typed model should guarantee that all heap
access operations are type-correct. We are led to the following approach: first, in order to
ensure that updates are type-preserving, we also consider heap typings. Heap typings are
partial maps Ψ ∈ HeapTyping = Loc ⇀fin Type that track the set of values that may be
stored in each heap location. Second, the collection of types is refined to take heap typings
into account: a type will now consist of values paired with heap typings that describe the
necessary requirements on heaps. These ideas suggest that we take
Type = P(HeapTyping × DVal )
(3.2)
HeapTyping = Loc ⇀fin Type
Again, a cardinality argument shows the impossibility of defining these sets.
A final obstacle to modelling the object calculus, albeit independent of the higher-order
nature of heaps, is due to dynamic allocation in the heap. This results in heap typings that
may vary in the course of a computation, reflecting the changing ‘shape’ of the heap.
However, as is the case for many high-level languages, the object calculus is well-behaved
in this respect:
• inside the language, there is no possibility of deallocating heap locations; and
• only weak (i.e., type-preserving) updates are allowed.
As a consequence, extensions are the only changes that need to be considered for heap
typings. Intuitively, values that rely on heaps with typing Ψ will also be type-correct for
extended heaps, with an extended heap typing Ψ′ ⊒ Ψ. For this reason, semantic models
of dynamic allocation typically lend themselves to a Kripke-style presentation, where all
semantic entities are indexed by possible worlds drawn from the set of heap typings, partially
(pre-) ordered by heap typing extension [31, 33, 34, 37, 39].
Rather than trying to extend the already complex domain-theoretic models to heap
typings and dynamic allocation, we will use the step-indexing technique. Since this technique is based directly on the operational semantics, it provides an alternative that has less
mathematical overhead. In particular, there is no need to find semantic domains satisfying
(3.1); we can simply have DVal be the set of closed values and use syntactic procedures in
place of set-theoretic functions. Moreover, it is relatively easy to also model impredicative
second-order types in the step-indexed model of Ahmed et al. [6, 9], which is crucial for the
interpretation of object types we develop below. Although recently there has been progress
in finding domain-theoretic models of languages that combine references and polymorphic
types [15, 16, 17], the constructions are more involved.
The circularity in (3.2) is resolved by considering a stratification based on a notion of
‘k-step execution safety’. The central idea is that a term has type τ with approximation k
if this assumption cannot be proved wrong (in the sense of reaching a stuck state) in any
context by executing fewer than k steps. The key insight for constructing the sets satisfying
(3.2) is that all operations on the heap consume one step. Thus, in order to determine
whether a pair hΨ, vi, where Ψ is a heap typing and v a value, belongs to a type τ with
approximation k it is sufficient to know the types of the stored values on which v relies (as
recorded by Ψ) only up to level k − 1. The true meaning of types and heap typings is then
obtained by taking the limit over all such approximations.
For instance, if a heap typing Ψ asserts that a Bool-returning procedure is stored at
location l, i.e., Ψ(l) = [m:Bool] → Bool, then it is certainly not safe to assume that the
10
C. HRIŢCU AND J. SCHWINGHAMMER
pair hΨ, λ(y){m=l}.mi belongs to the type of Int-returning procedures. However, it is not
possible to contradict this assumption by taking only two reduction steps: the first step is
consumed by the beta reduction, the second one by the method selection {m=l}.m in the
procedure body, which involves a heap access. In this case, there are no steps left to observe
that the result of the computation is a boolean rather than an integer. Consequently, the
value λ(y){m=l}.m is in the type of Int-returning procedures for two computation steps,
even though it does not actually return an integer. One can of course distinguish such ‘false
positives’ by taking more reduction steps.
The preceding considerations are now formalized, building on the model originally developed by Ahmed et al. for an ML-like language with general references and impredicative
second-order types [6, 9]. Apart from some notational differences, the definitions in Section 3.1 are the same as in [6]. Section 3.2 adds subtyping, while Section 3.3 deals with
procedure types, and Section 3.4 revisits reference types. The semantics of object types is
presented in Section 3.5 and constitutes the main contribution of this paper. We further
deviate from [6] by adding bounds to the second-order types in Section 3.6, and by using
iso-recursive instead of equi-recursive types in Section 3.7.
3.1. The Semantic Model. To make the (circular) definition of types and heap typings
from (3.2) work, the step-indexed semantics considers triples with an additional natural
number component, representing the step index, rather than just pairs. First, we inductively define two families (PreTypek )k∈N of pre-types, and (HeapPreTypingk )k∈N of heap
pre-typings, by
τ ∈ PreType0 ⇔ τ = ∅
S
τ ∈ PreTypek+1 ⇔ τ ∈ P(N × ( j≤k HeapPreTypingj ) × CVal)
∧ ∀hj, Ψ, vi ∈ τ. j ≤ k ∧ Ψ ∈ HeapPreTypingj
where HeapPreTypingk = Loc ⇀fin PreTypek . That is, each τ ∈ PreTypek is a set of
triples hj, Ψ, vi where the set HeapPreTypingj from which the heap pre-typing Ψ is drawn
depends on the index j < k. Clearly PreTypek ⊆ PreTypek+1 and thus HeapPreTypingk ⊆
HeapPreTypingk+1 for all k. Now it is possible to set
S
τ ∈ PreType ⇔ τ ∈ P(N × ( j HeapPreTypingj ) × CVal)
∧ ∀hj, Ψ, vi ∈ τ. Ψ ∈ HeapPreTypingj
We call the elements of this set pre-types, rather than types, since there will be a further
condition that proper types must satisfy (this is done in Definition 3.4 below). From now
on, when writing hk, Ψ, vi, we always implicitly assume that Ψ ∈ HeapPreTypingk . By
HeapPreTyping we denote the set Loc ⇀fin PreType of finite maps into pre-types.
Each pre-type τ is a union of sets τk ∈ PreTypek where the index appearing in elements of τk is bounded by k. This is made explicit by the following notion of semantic
approximation and the stratification invariant below.
Definition 3.1 (Semantic approximation). For any pre-type τ we call ⌊τ ⌋k the k-th approximation of τ and define it as the subset containing all elements of τ that have an index
strictly less than k: ⌊τ ⌋k = {hj, Ψ, vi ∈ τ | j < k}. This definition is lifted pointwise to the
(partial) functions in HeapPreTyping: ⌊Ψ⌋k = λl ∈ dom(Ψ). ⌊Ψ(l)⌋k .
Proposition 3.2
S (Stratification). For all τ ∈ PreType and k ∈ N, ⌊τ ⌋k ∈ PreTypek .
Moreover, τ = k ⌊τ ⌋k .
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
11
So in particular, if hk, Ψ, vi ∈ τ and l ∈ dom(Ψ) then Ψ(l) ∈ PreTypej for some j ≤ k.
This is captured by the following ‘stratification invariant’, which will be satisfied by all
the constructions on (pre-) types, and which ensures the well-foundedness of the whole
construction:
Stratification invariant. For all pre-types τ , ⌊τ ⌋k+1 cannot depend on any
pre-type beyond approximation k.
As indicated above, in order to take dynamic allocation into account we consider a possible
worlds model. Intuitively we think of a pair (k, Ψ) as describing the state of a heap h,
where Ψ lists locations in h that are guaranteed to be allocated, and contains the types of
the stored values up to approximation k. In the course of a computation, there are three
different situations where the heap state changes:
• New objects are allocated on the heap, which is reflected by a heap pre-typing Ψ′ with
additional locations compared to Ψ. This operation does not affect any of the previously
stored objects, so Ψ′ will be an extension of Ψ.
• The program executes for k − j steps, for some j ≤ k, without accessing the heap.
This is reflected by a heap state (j, ⌊Ψ⌋j ) that ‘forgets’ that we have a more precise
approximation, and guarantees that the heap is safe only for j execution steps.
• The heap is updated, but in such a way that all typing guarantees of Ψ are preserved.
Thus updates will be reflected by an information forgetting extension, as in the previous
case. However, because of the step taken by the update itself, in this case we necessarily
have that j < k.
The following definition of state extension captures these possible evolutions of a state.
Definition 3.3 (State extension). State extension ⊑ is the relation on N × HeapPreTyping
defined by
(k, Ψ) ⊑ (j, Ψ′ ) ⇔ j ≤ k ∧ dom(Ψ) ⊆ dom(Ψ′ )
∧ ∀l ∈ dom(Ψ). Ψ′ j (l) = ⌊Ψ⌋j (l)
The step-indexing technique relies on the approximation of the ‘true’ set of values that
constitute a type, by all those values that behave accordingly unless a certain number of
computation steps are taken. Limiting the number of available steps, we will only be able to
make fewer distinctions. Moreover, if for instance a procedure relies on locations in the heap
as described by a state (k, Ψ), we can safely apply the procedure after further allocations.
In fact, if we are only interested in safely executing the procedure for j < k steps, a heap
described by state (j, ⌊Ψ⌋j ) will suffice. These conditions are captured precisely by state
extension, so we require our semantic types to be closed under state extension:
Definition 3.4 (Semantic types and heap typings). The set Type of semantic types is the
subset of PreType defined by
τ ∈ Type ⇔ ∀k, j ≥ 0. ∀Ψ, Ψ′ . ∀v ∈ CVal.
(k, Ψ) ⊑ (j, Ψ′ ) ∧ hk, Ψ, vi ∈ τ ⇒ hj, Ψ′ , vi ∈ τ
We also define the set HeapTyping = Loc ⇀fin Type of heap typings, ranged over by Ψ in
the following, as the subset of heap pre-typings that map to semantic types.
As explained by Ahmed [6], this structure may be viewed as an instance of Kripke
models of intuitionistic logic where states are the possible worlds, state extension is the
12
C. HRIŢCU AND J. SCHWINGHAMMER
reachability relation between worlds, and where closure under state extension corresponds
to Kripke monotonicity.
Next we define when a particular heap h conforms to the requirements expressed by a
heap typing Ψ. This is done with respect to an approximation index.
Definition 3.5 (Well-typed heap). A heap h is well-typed with respect to Ψ with approximation k, written as h :k Ψ, if dom(Ψ) ⊆ dom(h) and
∀j < k. ∀l ∈ dom(Ψ). hj, ⌊Ψ⌋j , h(l)i ∈ Ψ(l)
Semantic types only contain values, but we also need to associate types with terms that
are not values. We do this in two steps, first for closed terms, then for arbitrary ones. A
closed term has a certain type to approximation k with respect to some heap typing Ψ, if
in all heaps that are well-typed with respect to Ψ the term behaves like an element of the
type for k computation steps. In general, before reducing to a value the term will execute
for j steps, and possibly allocate some new heap locations in doing so. The state describing
the final heap will therefore be an extension of the state describing the initial heap, and it
only needs to be safe for the remaining k − j steps. Similarly, the final value needs to be in
the original type only for another k − j steps. The next definition makes this precise.
Definition 3.6 (Closed term has semantic type). We say that a closed term a has type τ
with respect to the state (k, Ψ), denoted as a :k,Ψ τ , if and only if
∀j < k, h, h ′ , b. (h :k Ψ ∧ hh, ai →j hh ′ , bi ∧ hh ′ , bi9)
⇒ ∃Ψ′ . (k, Ψ) ⊑ (k − j, Ψ′ ) ∧ h ′ :k−j Ψ′ ∧ hk − j, Ψ′ , bi ∈ τ
Even though the terms we evaluate are closed, when type-checking their subterms we
also have to reason about open terms. Typing open terms is done with respect to a semantic
type environment Σ that maps variables to semantic types. We reduce typing open terms to
typing their closed instances obtained by substituting all free variables with appropriately
typed, closed values. This is done by a value environment σ (a finite map from variables to
closed values) that agrees with the type environment.
Definition 3.7 (Value environment agrees with type environment). We say that value
environment σ agrees with semantic type environment Σ, with respect to the state (k, Ψ), if
∀x ∈ dom(Σ). σ(x) :k,Ψ Σ(x). We denote this by σ :k,Ψ Σ.
Definition 3.8 (Semantic typing judgement). We say that a term a (possibly with free
variables, but not containing locations), has type τ with respect to a semantic type environment Σ, written as Σ |= a : τ , if after substituting well-typed values for the free variables
of a, we obtain a closed term that has type τ for any number of computation steps. More
precisely:
Σ |= a : τ
⇔ fv(a) ⊆ dom(Σ) ∧ ∀k ≥ 0. ∀Ψ. ∀σ :k,Ψ Σ. σ(a) :k,Ψ τ
By construction, the semantic typing judgment enforces that all terms that are typable
with respect to it do not produce type errors when evaluated.
Definition 3.9 (Safe for k steps). We call a configuration hh, ai safe for k steps, if the
term a does not get stuck in less than k steps when evaluated in the heap h, i.e., we define
the set of all such configurations by
Safek = {hh, ai | ∀j < k. ∀h ′ , b. hh, ai →j hh ′ , bi ∧ hh ′ , bi9 ⇒ b ∈ Val}
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
13
Definition 3.10 (Safety).
T We call a configuration safe if it does not get stuck in any number
of steps, and let Safe = k∈N Safek .
Theorem 3.11 (Safety). For all programs a such that ∅ |= a : τ and for all heaps h we
have that hh, ai ∈ Safe.
Proof. One first easily shows that, if a :k,Ψ τ and h :k Ψ, then hh, ai ∈ Safek . The theorem
then follows by observing that any h is well-typed with respect to the empty heap typing,
to any approximation k.
This is much more direct than a subject reduction proof [46]. However, unlike with
subject reduction, the validity of the typing rules still needs to be proved with respect to
the semantics. We do this in two steps. In the remainder of this section we introduce
the specific semantic interpretations of types, and prove that they satisfy certain semantic
typing lemmas. These proofs are similar in spirit to proving the ‘fundamental theorem’ of
Kripke logical relations [32]. Then, in Section 4 we prove the soundness of the rules of the
initial type system with respect to these typing lemmas.
Even though the semantic typing lemmas are constructed so that they directly correspond to the rules of the original type system, there is a big difference between the two.
While the semantic typing lemmas allow us to logically derive valid semantic judgments
using other valid judgments as premises, the typing rules are just syntax that is used in the
inductive definitions of the typing and subtyping relations.
3.2. Subtyping. Since types in the step-indexed interpretation are sets (satisfying some
additional constraints), the natural subtyping relation is set inclusion. This subtyping
relation forms a complete lattice on semantic types, where infima and suprema are given
by set-theoretic intersections and unions, respectively. The least element is ⊥ = ∅, while
the greatest is
⊤ = {hj, Ψ, vi | j ∈ N, Ψ ∈ HeapTypingj , v ∈ CVal}.
Obviously ⊥ and ⊤ satisfy both the stratification invariant (i.e., they are pre-types) and
the closure under state extension condition, so they are indeed semantic types.
We can easily show the standard subsumption property
Lemma 3.12 (Subsumption). If Σ |= a : α and α ⊆ β then Σ |= a : β.
While it is very easy to define subtyping in this way, the interaction between subtyping
and the other features of the type system, in particular the object types, is far from trivial.
This point will be discussed further in Section 3.5.
3.3. Procedure Types. Intuitively, a procedure has type α → β for k computation steps
if, when applied to any well-typed argument of type α, it produces a result that has type β for
another k − 1 steps. This is because the procedure application itself takes one computation
step, and the only way to use a procedure is by applying it to some argument.
Additionally, we have to take into account that the procedure can also be applied after
some computation steps that extend the heap. So, for every j < k and for every heap
typing Ψ′ such that (k, Ψ) ⊑ (j, Ψ′ ), when applying the procedure to a value in type α
for j steps with respect to Ψ′ , the result must have type β for j steps with respect to Ψ′ .
This computational intuition nicely fits the possible worlds reading of procedure types as
intuitionistic implication.
14
C. HRIŢCU AND J. SCHWINGHAMMER
Σ[x := α] |= b : β =⇒ Σ |= λx. b : α → β
(Σ |= a : β → α ∧ Σ |= b : β =⇒ Σ |= a b : α
α′ ⊆ α ∧ β ⊆ β ′ =⇒ α → β ⊆ α′ → β ′
(SemLam)
(SemApp)
(SemSubProc)
Figure 6: Typing lemmas: procedure types
Definition 3.13 (Procedure types). If α and β are semantic types, then α → β consists of
those triples hk, Ψ, λx. bi such that for all j < k, heap typings Ψ′ and closed values v:
((k, Ψ) ⊑ (j, Ψ′ ) ∧ hj, Ψ′ , vi ∈ α) ⇒ {{x 7→ v}}(b) :j,Ψ′ β
Proposition 3.14. If α and β are semantic types, then α → β is also a semantic type.
Figure 6 contains the semantic typing lemmas associated with procedure types. The
procedure type constructor is of course contravariant in the argument type and covariant
in the result type.
Lemma 3.15 (Procedure types). The three semantic typing lemmas shown in Figure 6 are
valid implications.
Proof sketch. The validity of (SemApp) and (SemLam) is proved in [6]. Verifying (SemSubProc) is simply a matter of unfolding the definitions.
3.4. Revisiting Reference Types. While our calculus does not have references syntactically, we will use the model of references from [6, 9] in our construction underlying object
types. In order to interpret the variance annotations in object types, we additionally introduce readable reference types and writable reference types, with covariant and contravariant
subtyping, respectively [35, 43].
A heap typing associates with each allocated location the precise type that can be used
when reading from it and writing to it. So all heap locations support both reading and
writing at a certain type, and we do not have read-only or write-only locations. Intuitively,
for the readable reference types and the writable ones the precise type of the locations is
only partially known, so that without additional information only one of the two operations
is safe at a meaningful type.
We first recall the definition of reference types from [6, 9].
Definition 3.16 (Reference types). If τ is a semantic type then
ref◦ τ = {hk, Ψ, li | ⌊Ψ(l)⌋k = ⌊τ ⌋k }
According to this definition, a location l has type ref◦ τ if the type associated with l
by the heap typing Ψ is approximately τ . Semantic approximation is used to satisfy the
stratification invariant, and is operationally justified by the fact that reading from a location
or writing to it takes one computation step. So, l has type ref◦ τ for k steps if all values
that are read from l or written to l have type τ for k − 1 steps.
The readable reference type ref+ τ is similar to ref◦ τ , but poses less constraints on
the heap typing Ψ: it only requires that Ψ(l) is a subtype of τ , as before up to some
approximation.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
15
α⊆β
=⇒
ref+ α ⊆ ref+ β
(SemSubCovRef)
β⊆α
=⇒
ref− α ⊆ ref− β
(SemSubConRef)
ref◦ α ⊆ refν α, where ν ∈ {◦, +, −}
(SemSubVarRef)
Figure 7: Subtyping reference types
Definition 3.17 (Readable reference types). If τ is a semantic type then
ref+ τ = {hk, Ψ, li | ⌊Ψ⌋k (l) ⊆ ⌊τ ⌋k }
The value stored at location l also has type τ by subsumption, and therefore can be
read and safely used as a value of type τ . However, the true type of location l is in general
unknown, so writing any value to it could be unsafe (the true type of l might be the empty
type ⊥). Nevertheless, knowing that a location has type ref+ τ does not mean that we
cannot write to it: it simply means that we do not know the type of the values that can be
written to it, so in the absence of further information no writing can be guaranteed to be
type safe2.
Dually, the type ref− τ of writable references contains all those locations l whose type
associated by Ψ is a supertype of τ .
Definition 3.18 (Writable reference types). If τ is a semantic type then
ref− τ = {hk, Ψ, li | ⌊τ ⌋k ⊆ ⌊Ψ⌋k (l)}
We can safely write a value of type τ to a location of type ref− τ , since this value also
has the real type of location l by subsumption. However, the real type of such locations
can be arbitrarily general. In particular it can be ⊤, the type of all values. Thus a location
about which we only know that it has type ref− τ can only be read safely at type ⊤.
With these definitions in place, the usual reference type from Definition 3.16 can be
recovered as the intersection of a readable and a writable reference type:
ref◦ τ = ref+ τ ∩ ref− τ
Hence ref+ τ and ref− τ are both supertypes of ref◦ τ . It can also be easily shown that the
readable reference type constructor is covariant, the writable reference type constructor is
contravariant (Figure 7), while the usual reference types are obviously invariant. For a
variance annotation ν ∈ {◦, +, −} we use refν to stand for the reference type constructor
with this variance.
Note that, strictly speaking, the set refν τ is not a semantic type since for our calculus
locations are not values (although locations appear in object values {md =ld }d∈D ; see Section 2.2). In fact, the definition of object types (Definition 3.20 in the next section) will not
depend on refν τ being a semantic type. However, in order for the object type constructor
to yield semantic types, it is crucial that refν τ is closed under state extension.
Proposition 3.19. If τ is a semantic type, then refν τ is closed under state extension.
2This is conceptually different from the immutable reference types modeled in [6] using singleton types.
16
C. HRIŢCU AND J. SCHWINGHAMMER
3.5. Object Types. Giving a semantics to object types is much more challenging than for
the other types. The typing rules from Section 2 indicate why this is the case. First, an
adequate interpretation of object types must permit subtyping both in width and in depth,
taking the variance annotations into account. Second, in contrast to all the other types we
consider that have just a single elimination rule, once constructed, objects support three
different operations: invocation, update, and cloning. The definition of object types must
ensure the consistent use of an object through all possible future operations. That is, all
the requirements on which invocation, update or cloning rely must already be established
at object creation time.
Before defining the object types, it is instructive to consider some simpler variants that
do not fulfill all the requirements we have for object types.
Our decision to store methods in the heap as procedures, together with the ‘selfapplication’ semantics of method invocation (Red-Inv in Figure 3), suggest that object
types are somewhat similar to recursive types of records of references holding procedures
that take the enclosing record as argument:
?
[md : τd ]d∈D = µ(α).{md : ref◦ (α → τd )}d∈D
However, the invariance of the reference type constructor blocks any form of subtyping,
even in width. A look at typing rules for subtyping recursive types, such as Cardelli’s
Amber rule [20] (which appears as rule SubRec in Figure 4), suggests that the position
of the recursion variable should be covariant. For instance, when attempting to establish
the subtyping [m1 : τ1 , m2 : τ2 ] ⊆ [m1 : τ1 ] by the Amber rule one needs to show that
ref◦ (α → τ1 ) ⊆ ref◦ (β → τ1 ), for any α and β such that α ⊆ β. Clearly this does not
hold. Even in a simpler setting without the reference types (e.g., for the functional object
calculus) the contravariance of the procedure type constructor in its first argument would
cause subtyping to fail.
A combination of type recursion and an existential quantifier that uses the recursion
variable as bound would allow us to enforce covariance for the positions of the recursion
variable, and thus have subtyping in width:
?
[md : τd ]d∈D = µ(α).∃α′ ⊆α.{md : ref◦ (α′ → τd )}d∈D
Intuitively α′ can be viewed as the ‘true’ (i.e., most precise) type of the object, while α is
a more general type that can be given to it by subtyping. This is essentially the idea of the
encodings of object types explored by Abadi et al. [2, 3].
For subtyping in depth with respect to the variance annotations we simply use the
readable and writable reference types we defined in the previous section:
?
[md :νd τd ]d∈D = µ(α).∃α′ ⊆α.{md : refνd (α′ → τd )}d∈D
Still, by keeping α′ abstract, neither the typing rule for method invocation (Inv in Figure 5),
nor the one for object cloning (Clone) is validated.
By explicitly enforcing in the definition of object types that the object value itself in
fact belongs to this existentially quantified α′ , the assumptions become sufficiently strong
to repair the invocation case. This is consistent with seeing α′ as the ‘true’ type of the
object. Semantically, we can express this using an intersection of types:
?
[md :νd τd ]d∈D = µ(α).∃α′ ⊆α.({md : refνd (α′ → τd )}d∈D ∩ α′ )
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
17
Forcing not only the current object value to be in α′ , but also all the ‘sufficiently similar’
values (maybe not even created yet), covers the case of cloning. The following definition
formalizes this construction.
Definition 3.20 (Object types). Let α = [md :νd τd ]d∈D be defined as the set of all triples
hk, Ψ, {me =le }e∈E i such that D ⊆ E and
∃α′ . α′ ∈ Type ∧ α′ k ⊆ ⌊α⌋k
(Obj-1)
∧ (∀d ∈ D. hk, Ψ, ld i ∈ refνd (α′ → τd ))
∧ (∀j < k. ∀Ψ′ . ∀ me =le′ e∈E .
(k, Ψ) ⊑ (j, Ψ′ ) ∧ (∀e ∈ E. Ψ′ j (le′ ) = ⌊Ψ⌋j (le ))
⇒ hj, Ψ′ j , me =le′ e∈E i ∈ α′ )
(Obj-2)
(Obj-3)
The condition stating that D ⊆ E ensures that all values in an object type provide
at least the required methods listed by this type, but can also provide more. Clearly this
is necessary for subtyping in width. Condition (Obj-1) postulates the existence of a more
specific type α′ , the ‘true’ type of the object {me =le }e∈E (up to approximation k), and the
subsequent conditions are all stated in terms of α′ rather than α. Condition (Obj-2) states
the requirements for the methods in terms of the reference type constructors introduced in
Section 3.4. Since the existentially quantified α′ might equal α, one must take care that
(Obj-2) does not introduce a circularity. However, due to the use of approximation in the
definition of the reference type constructors, the condition only depends on ⌊α′ ⌋k , rather
than α′ . This will ensure the well-foundedness of the construction.
As explained above, in order to invoke methods we must know that {me =le }e∈E belongs
to the more specific type α′ for j < k steps (which suffices since application consumes a
step). In the particular case where Ψ′ is Ψ and {me =le′ }e∈E is {me =le }e∈E condition (Obj3) states exactly this. We need the more general formulation in order to ensure that the
clones of the considered object also belong to the same type α′ . Therefore we enforce that no
matter how an object value {me =le′ }e∈E is constructed, it belongs to type α′ provided that
it satisfies the same typing assumptions as {me =le }e∈E , with respect to a possibly extended
heap typing Ψ′ . Allowing for state extension is necessary since cloning itself allocates new
locations not present in the original Ψ, and also because cloning can be performed after
some intermediate computation steps that result in further allocations.
We show that this definition of object types actually makes sense, in that it defines a
semantic type. This is not immediately obvious because of the recursion.
Proposition 3.21. If τd ∈ Type for all d ∈ D, then we also have that [md :νd τd ]d∈D ∈ Type.
Proof sketch. We must show (1) that [md :νd τd ]d∈D is well-defined, i.e., that the recursive
definition is well-founded, and (2) that it is closed under state extension.
To prove the well-definedness one can use general results about recursive types in stepindexed semantics [10], since the
S object type constructor is ‘contractive’. Alternatively,
from the observation that
τ
=
⌋k for all types τ , it
argue that
k ⌊τ
suffices to directly
Definition 3.20 defines [md :νd τd ]d∈D k only in terms of [md :νd τd ]d∈D j for j < k. The
closure under state extension follows from the corresponding property of the types α′ → τd
(Proposition 3.14) and of the sets refνd (α′ → τd ) (Proposition 3.19), and from the transitivity
of state extension.
18
C. HRIŢCU AND J. SCHWINGHAMMER
Let α = [md :νd τd ]d∈D .
(∀d ∈ D. Σ[xd := α] |= bd : τd )
=⇒
Σ |= [md =ς(xd )bd ]d∈D : α
(SemObj)
(Σ |= a : α ∧ e ∈ D ∧ νe ∈ {+, ◦})
=⇒
Σ |= a.me : τe
(SemInv)
∧ Σ[x := α] |= b : τe )
=⇒
Σ |= a.me := ς(x)b : α
Σ |= a : α
=⇒
Σ |= clone a : α
(Σ |= a : α ∧ e ∈ D ∧ νe ∈ {−, ◦}
(SemUpd)
(E ⊆ D ∧ (∀e ∈ E. νe ∈ {+, ◦} ⇒ αe ⊆ βe )
(SemClone)
(SemSubObj)
∧ (∀e ∈ E. νd ∈ {−, ◦} ⇒ βe ⊆ αe ))
=⇒
[md :νd αd ]d∈D ⊆ [me :νe βe ]e∈E
νd′ )
=⇒
[md :νd αd ]d∈D ⊆ [md :νd′ αd ]d∈D
(SemSubObjVar)
(∀d ∈ D. νd = ◦ ∨ νd =
Figure 8: Typing lemmas: object types
Figure 8 presents the semantic typing and subtyping lemmas for object types.
Lemma 3.22 (Object types). All the semantic typing lemmas shown in Figure 8 are valid
implications.
Proof sketch. The semantic typing lemmas are proved independently. We sketch this for
(SemObj). A detailed proof, as well as the proofs of the other typing lemmas are given in
the Appendix.
For α = [md :νd τd ]d∈D and assuming Σ[xd := α] |= bd : τd for all d ∈ D, we must
show that Σ |= [md =ς(xd )bd ]d∈D : α. So let k ≥ 0, σ and Ψ be such that σ :k,Ψ Σ. By
Definition 3.8 (Semantic typing judgement) we must prove that σ([md =ς(xd )bd ]d∈D ) :k,Ψ α,
or equivalently (after suitable α-renaming), that [md =ς(xd )σ(bd )]d∈D :k,Ψ α holds. Now let
h, h′ and b′ be such that h :k Ψ and
hh, [md =ς(xd )σ(bd )]d∈D i →j hh′ , b′ i
for some j < k, and assume that hh′ , b′ i is irreducible. From the operational semantics it is
clear that j = 1, b′ ≡ {md =ld }d∈D and that, for some locations ld ∈
/ dom(h),
h′ = h [ld := λ(xd )σ(bd )]d∈D
Choosing Ψ′ = Ψ [ld := (α → τd )]d∈D k−1 it is easily seen that (k, Ψ) ⊑ (k − 1, Ψ′ ). Furthermore, from the hypothesis by (SemLam) we have that Σ |= λ(xd )bd : α → τd for all
d ∈ D. From this and the assumption that h :k Ψ it follows that h′ :k−1 Ψ′ .
By Definition 3.6 it remains to establish that hk − 1, Ψ′ , {md =ld }d∈D i ∈ α. This is
achieved by proving the following more general claim by induction on j0 :
Claim 3.23. For all j0 ≥ 0, Ψ∗ and {md =ld∗ }d∈D we have that
(k − 1, Ψ′ ) ⊑ (j0 , Ψ∗ ) ∧ (∀d∈D. ⌊Ψ∗ ⌋j0 (ld∗ ) = Ψ′ j0 (ld )) ⇒ hj0 , ⌊Ψ∗ ⌋j0 , {md =ld∗ }d∈D i ∈ α
The key step is in choosing α′ equal to ⌊α⌋j0 , then verifying the three conditions of Definition 3.20 (Object types), where the inductive hypothesis is used for showing (Obj-3).
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
19
Remark 3.24. In the above proof, establishing hk−1, Ψ′ , {md =ld }d∈D i ∈ α directly does
not seem possible, and the generalization to Claim 3.23 arises naturally from a failed proof
attempt: in order to prove the three conditions of Definition 3.20 a sensible choice for α′ is
α, and for E is D, after which (Obj-1) and (Obj-2) follow easily. But (Obj-3) requires
us to show that hj, ⌊Ψ′′ ⌋j , {md =ld′ }d∈D i ∈ α, for any j < k, any ld′ , and any extension Ψ′′
of Ψ′ with ⌊Ψ′′ ⌋j (ld′ ) = ⌊Ψ′ ⌋j (ld ). This is just what Claim 3.23 states.
The fact that there is an inductive argument hidden in this proof does not come as a
surprise: the induction on the step index j0 resolves the recursion that is inherent to objects
due to the self application semantics of method invocation.
3.6. Bounded Quantified Types. Impredicative quantified types were previously studied in a step-indexed setting by Ahmed et al. [6, 9] for a lambda-calculus with general
references, and we follow their presentation. However, unlike in the work of Ahmed et al.
our quantifiers have bounds, and we are also studying subtyping. It is important to note
that the impredicative second-order types were the reason why a semantic stratification of
types was needed in the presence of general references [6], as opposed to a syntactic one
based on the nesting of reference types [8]. In the setting we consider in this paper we need
the semantic stratification not only to explicitly accommodate quantified types, but also
because our interpretation of object types uses existential types implicitly.
As in Appel and McAllester’s work [10], a type constructor F (i.e., a function from
semantic types to semantic types) is non-expansive if in order to determine whether a term
has type F (τ ) with approximation k, it suffices to know the type τ only to approximation
k. As we will later show (Lemma 3.33), all the type constructors we define in this paper
are non-expansive.
Definition 3.25 (Non-expansiveness). A type constructor F : Type → Type is nonexpansive if for all types τ and for all k ≥ 0 we have that ⌊F (τ )⌋k = ⌊F (⌊τ ⌋k )⌋k .
The definitions of second-order types require that ∀ and ∃ are only applied to nonexpansive type constructors. The non-expansiveness condition ensures that in order to
determine level k of a universal or existential type, quantification over the types in PreTypek
suffices. This helps avoid the circularity that is otherwise introduced by the impredicative
quantification.
Definition 3.26 (Bounded universal types). If F : Type → Type is non-expansive and
α ∈ Type, then we define ∀α F by hk, Ψ, Λ. ai ∈ ∀α F if and only if
∀j, Ψ′ . ∀τ. (k, Ψ) ⊑ (j, Ψ′ ) ∧ τ ∈ Type ∧ ⌊τ ⌋j ⊆ ⌊α⌋j ⇒ ∀i < j. a :i,⌊Ψ′ ⌋i F (τ )
Definition 3.27 (Bounded existential types). For all non-expansive F : Type → Type and
α ∈ Type, the set ∃α F is defined by hk, Ψ, pack vi ∈ ∃α F if and only if
∃τ.τ ∈ Type ∧ ⌊τ ⌋k ⊆ ⌊α⌋k ∧ ∀j < k. hj, ⌊Ψ⌋j , vi ∈ F (τ )
Proposition 3.28. If α ∈ Type and F : Type → Type is non-expansive, then ∀α F and ∃α F
are also types.
Proof sketch. The proofs are minor modifications of those given in [6], to additionally take
the bounds into account.
20
C. HRIŢCU AND J. SCHWINGHAMMER
For all non-expansive F, G : Type → Type,
(∀τ ∈ Type. τ ⊆ α ⇒ Σ |= a : F (τ ))
=⇒
Σ |= Λ. a : ∀α F
(SemTAbs)
(Σ |= a : ∀α F ∧ τ ∈ Type ∧ τ ⊆ α)
=⇒
Σ |= a[] : F (τ )
(SemTApp)
(∃τ ∈ Type. τ ⊆ α ∧ Σ |= a : F (τ ))
=⇒
Σ |= pack a : ∃α F
(SemPack)
(Σ |= a : ∃α F ∧ ∀τ ∈Type.
(SemOpen)
τ ⊆ α ⇒ Σ[x := F (τ )] |= b : β)
=⇒
Σ |= open a as x in b : β
(β ⊆ α ∧ ∀τ ∈ Type. τ ⊆ β ⇒ F (τ ) ⊆ G(τ ))
=⇒
∀α F ⊆ ∀β G
(SemSubUniv)
(α ⊆ β ∧ ∀τ ∈ Type. τ ⊆ α ⇒ F (τ ) ⊆ G(τ ))
=⇒
∃α F ⊆ ∃β G
(SemSubExist)
Figure 9: Typing lemmas: bounded quantified types
Lemma 3.29 (Bounded quantified types). All the semantic typing lemmas shown in Figure 9 are valid implications.
Proof sketch. The first four implications are proved as in [6]; the additional precondition
τ ⊆ α in (SemTApp) and (SemPack) serves to establish the requirements for the bounds.
The two subtyping lemmas (SemSubUniv) and (SemSubExist) are easily proved by just
unfolding the definitions.
3.7. Recursive Types. In contrast to most previous work on step-indexed models, we
consider iso-recursive rather than equi-recursive types, so folds and unfolds are explicit in our
syntax and consume computation steps. Iso-recursive types have been previously considered
by Ahmed for a step-indexed relational model of the lambda calculus [7]. Iso-recursion is
simpler, and sufficient for our purpose. As a consequence, we require type constructors to
be only non-expansive, as opposed to the stronger ‘contractiveness’ requirement [10].
Definition 3.30 (Recursive types). Let F : Type → Type be a non-expansive function. We
define the set µF by
hk, Ψ, fold vi ∈ µF ⇔ ∀j < k. hj, Ψ′ , vi ∈ F (µF )
Proposition 3.31. For all non-expansive F : Type → Type, µF ∈ Type is well-defined.
Proof sketch. The well-definedness follows from the observation that ⌊µF ⌋k is defined only
in terms of ⌊F (µF )⌋j for j < k, which by the non-expansiveness of F means that ⌊µF ⌋k
relies only on ⌊µF ⌋j . The closure under state extension is established by an induction,
proving that for each k ≥ 0, ⌊µF ⌋k ∈ Type.
Figure 10 presents the semantic typing lemmas for recursive types. As a consequence,
we have the expected fixed point property |= a : F (µF ) ⇔ |= fold a : µF .
Lemma 3.32 (Recursive types). All the semantic typing lemmas shown in Figure 10 are
valid implications.
Proof sketch. The validity of (SemFold) and (SemUnfold) are easy consequences of Definition 3.30. For (SemSubRec), one shows by induction on k that ⌊µF ⌋k ⊆ ⌊µG⌋k , using
the precondition of the rule and the non-expansiveness of F and G.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
21
For all non-expansive F, G : Type → Type,
Σ |= a : µF =⇒ Σ |= unfold a : F (µF )
(SemUnfold)
Σ |= a : F (µF ) =⇒ Σ |= fold a : µF
(SemFold)
(∀α, β. α ⊆ β ⇒ F (α) ⊆ G(β)) =⇒ µF ⊆ µG
(SemSubRec)
Figure 10: Typing lemmas: recursive types
i
h
y
q
[md :νd Ad ]d∈D η = md :νd JAd Kη
JXKη = η(X)
JBotKη = ⊥
JTopKη = ⊤
d∈D
Jµ(X)AKη = µ(λα∈Type. JAKη[X:=α] )
JA → BKη = JAKη → JBKη
J∀(X6A)BKη = ∀JAKη (λα∈Type. JBKη[X:=α] )
J∃(X6A)BKη = ∃JAKη (λα∈Type. JBKη[X:=α] )
Figure 11: Interpretation of types
Lemma 3.33 (Non-expansiveness). All the considered type constructors are non-expansive.
Proof sketch. It is easily seen that the definition of ⌊α → β⌋k uses only ⌊α⌋j and ⌊β⌋j for
j < k, and therefore that ⌊α → β⌋k = ⌊⌊α⌋k → ⌊β⌋k ⌋k . A similar statement holds for the
k-th approximation of quantified types ∀α F and ∃α F , since their definition only depends
on ⌊α⌋j and ⌊F ⌋j for j < k. In the case of object and recursive types, the properties
[md :νd τd ]d∈D k = [md :νd ⌊τd ⌋k ]d∈D k and ⌊µF ⌋k = ⌊µ ⌊F ⌋k ⌋k can be established by
induction on k, using the non-expansiveness of F in the latter case.
4. Semantic Soundness
In order to prove that well-typed terms are safe to evaluate we relate the syntactic types
to their semantic counterparts, and then use the fact that the semantic typing judgement
enforces safety by construction (Theorem 3.11). This approach is standard in denotational
semantics. In fact, none of the main statements or proofs in this section mentions stepindices explicitly.
Definition 4.1 (Interpretation of types and typing contexts). Let η be a total function
from type variables to semantic types.
(1) The interpretation JAKη of a type A is given by the structurally recursive meaning
function defined in Figure 11.
(2) The interpretation of a well-formed typing context Γ with respect to η is given by the
function that maps x to JAKη , for every x:A ∈ Γ.
Note that in Figure 11 the type constructors used on the left-hand sides of the equations
are simply syntax, while those on the right hand-sides refer to the corresponding semantic
constructions, as defined in the previous section.
Recall that non-expansiveness is a necessary precondition for some of the semantic
typing lemmas. In particular, the well-definedness of JAKη depends on non-expansiveness,
22
C. HRIŢCU AND J. SCHWINGHAMMER
due to the use of µ, ∀(·) and ∃(·) in Figure 11. So we begin by showing that the interpretation
of types is a non-expansive map.
Lemma 4.2 (Non-expansiveness). JAKη is non-expansive in η.
k
k
j
j
holds by induction on the structure of
Proof sketch. We show that JAKη = JAK⌊η⌋
k k
k
A, relying on Lemma 3.33 for the non-expansiveness of the semantic type constructions.
Definition 4.3 (η |= Γ). Let Γ be a well-formed typing context. We say that η satisfies
Γ, written as η |= Γ, if η(X) ⊆ JAKη holds for all X6A appearing in Γ.
We show the soundness of the subtyping relation.
Lemma 4.4 (Soundness of subtyping). If Γ ⊢ A 6 B and η |= Γ then JAKη ⊆ JBKη .
Proof sketch. By induction on the derivation of Γ ⊢ A 6 B and case analysis on the
last applied rule. Each case is immediately reduced to one of the subtyping lemmas from
Section 3.
Finally, we prove the semantic soundness of the syntactic type system with respect to
the model.
Theorem 4.5 (Semantic soundness). Whenever Γ ⊢ a : A and η |= Γ it follows that
JΓKη |= a : JAKη .
Proof sketch. By induction on the derivation of Γ ⊢ a : A and case analysis on the last rule
applied. Each case is easily reduced to one of the semantic typing lemmas from Section 3,
using a standard type substitution lemma for derivations ending with an application of
(Fold), (Unfold), (TApp), or (Pack).
By Theorems 4.5 (Semantic soundness) and 3.11 (Safety), we have a proof of safety for
the type system from Section 2.3.
Corollary 4.6 (Type safety). Well-typed terms are safe to evaluate.
5. Self Types
Self types have been proposed by Abadi and Cardelli [2] as a means to reconcile recursive
object types with ‘proper’ subtyping. Self types are interesting because they allow us to
type methods that return the possibly modified host object, or a clone of it. For instance,
a type of list nodes, with a filter method that produces the sublist of all elements satisfying
a given predicate, is
ListA = Obj(X)[hd :◦ A, tl :◦ X+Unit, filter :+ (A → Bool) → X, . . .]
Note that the similar recursive type
µ(X)[hd :◦ A, tl :◦ X+Unit, filter :+ (A → Bool) → X, . . .]
does not satisfy the usual subtyping for object types because of the invariance of the hd
and tl fields.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
23
Let α = [md :νd Fd ]d∈D and β = [me :νe Ge ]e∈E with E ⊆ D.
(∀d ∈ D. Σ[xd := α] |= bd : Fd (α))
=⇒
Σ |= [md =ς(xd )bd ]d∈D : α
(SemObj-Self)
(Σ |= a : α ∧ e ∈ D ∧ νe ∈ {+, ◦})
=⇒
Σ |= a.me : Fe (α)
(Σ |= a : α ∧ e ∈ D ∧ νe ∈ {−, ◦}
(SemInv-Self)
(SemUpd-Self)
∧ ∀ξ ⊆ α. Σ[x := ξ] |= b : Fe (ξ))
=⇒
Σ |= a.me := ς(x)b : α
Σ |= a : α
=⇒
Σ |= clone a : α
(∀e ∈ E. (νe ∈ {+, ◦} ⇒ ∀ξ ⊆ α. Fe (ξ) ⊆ Ge (ξ))
(SemClone-Self)
(SemSubObj-Self)
∧ (νe ∈ {−, ◦} ⇒ ∀ξ ⊆ α. Ge (ξ) ⊆ Fe (ξ)))
=⇒
α⊆β
(∀d ∈ D. νd = ◦ ∨ νd = νd′ )
=⇒
[md :νd Fd ]d∈D ⊆ [md :νd′ Fd ]d∈D
(SemSubObjVar-Self)
Figure 12: Typing lemmas: self types
5.1. Semantics of Self Types. Abadi and Cardelli [2, Ch. 15] show how self types can be
understood in terms of recursive and existentially quantified object types via an encoding.
More precisely, the type Obj(X)[md :νd Bd ]d∈D where X may occur positively in Bd , stands
for the recursive type µ(Y )∃(X6Y )[md :νd Bd ]d∈D . The bounded existential quantifier introduced by this encoding gives rise to the desired subtyping in width and depth, despite
the type recursion.
Since our type system features recursive and bounded existential types, self types could
be accommodated via this encoding. However a treatment of self types can be achieved
even more directly, without relying on the encoding. In fact, almost everything is in place
already: recall that the semantics of object types (Definition 3.20) employs recursion and
an existential quantification to refer to the ‘true’ type of an object. Condition Obj-2 in
Definition 3.20 can be changed to take advantage of this type:
Definition 5.1 (Self types). Assume Fd : Type → Type are monotonic and non-expansive
type constructors, for all d ∈ D. Then let α = [md :νd Fd ]d∈D be defined as the set of all
triples hk, Ψ, {me =le }e∈E i such that D ⊆ E and
∃α′ . α′ ∈ Type ∧ α′ k ⊆ ⌊α⌋k
(Obj-1)
∧ (∀d ∈ D. hk, Ψ, ld i ∈ refνd (α′ → Fd (α′ )))
∧ (∀j < k. ∀Ψ′ . ∀ me =le′ e∈E .
(k, Ψ) ⊑ (j, Ψ′ ) ∧ (∀e ∈ E. Ψ′ j (le′ ) = ⌊Ψ⌋j (le ))
⇒ hj, Ψ′ j , me =le′ e∈E i ∈ α′ )
(Obj-2-self)
(Obj-3)
As in Section 3.5 one shows that Definition 5.1 uniquely determines a type. In this
proof,
the non-expansiveness
of the type functions Fd isnecessary in order to ensure that
[md :νd Fd ]d∈D k is defined in terms of [md :νd Fd ]d∈D j for j < k only. Moreover, the
proofs of the typing lemmas for object types (see Section A.2 in the Appendix) carry over
with minor modifications, to show that the semantic typing lemmas in Figure 12 hold. Most
24
C. HRIŢCU AND J. SCHWINGHAMMER
cases are obtained by replacing the result type τd by Fd (α′ ) throughout the proof, for α′
the existentially quantified type from condition (Obj-1) of Definition 5.1. The proof of
(SemInv-Self) uses the monotonicity of Fe , to conclude that the result of the invocation
has type Fe (α) from the fact that it has type Fe (α′ ), as given by condition (Obj-2-Self). In
the proofs of (SemUpd-Self) and (SemSubObj-Self), the universally quantified ξ from
the respective assumptions is instantiated by α′ . Since (Obj-1) only gives that ⌊α′ ⌋k ⊆ ⌊α⌋k
but not necessarily α′ ⊆ α, these three proofs also use the non-expansiveness of Fd in an
of each Fd , an induction shows that
given the non-expansiveness
essential way. Finally,
[md :νd Fd ]d∈D k = [md :νd ⌊Fd ⌋k ]d∈D k for all k. In other words, [md :νd Fd ]d∈D , viewed
as a type constructor, is non-expansive and Lemma 3.33 still holds.
The interpretation of syntactic type expressions given in Figure 11 extends straightforwardly to self types using the new type constructor:
i
h
y
q
Obj(X)[md :νd Ad ]d∈D η = md :νd λ(α∈Type) JAd Kη[X:=α]
d∈D
With this interpretation and the semantic typing lemmas from Figure 12, the soundness
theorem from Section 4 should extend to a syntactic type system for objects with self types
similar to the one derived by Abadi and Cardelli [2, Ch. 15] for their encoding (but also
including variance annotations and a typing rule for cloning).
5.2. Limitations. Note that with the exception of SemUpd-Self, all the semantic typing
lemmas for self types are stronger than their counterparts from Figure 8. This is already
enough to typecheck many examples involving self types [2, Ch. 15].
However, as for the encoding of Abadi and Cardelli, when updating methods one usually
does not have full information about the precise self type α′ of the host object, which may be
a proper subtype of α. Therefore the statement (SemUpd-Self) about method update in
Figure 12 includes a quantification over all subtypes ξ of the known type α of the object a, to
ensure that the updated method also works correctly for the precise type. As a consequence
the new method body b must be sufficiently parametric in the type of its self parameter x,
which can be overly restrictive. Abadi and Cardelli [2, Ch. 17] demonstrate this limitation
with an example of objects that provide a backup and a retrieve method:
Bk = Obj(X)[retrieve :◦ X, backup :◦ X, . . .]
A sensible definition of the backup method updates the retrieve method so that a subsequent
invocation of retrieve yields a clone of the current object x:
backup(x) = let z = clone x in x.retrieve := ς(y)z
Here, the ‘ let z = a in b ’ stands for the usual syntactic sugar (λ(z)b) a. Let β = JBkKη
denote the interpretation of the syntactic type Bk. While the backup method has the correct
operational behaviour, to typecheck the method update to x in its body using (SemUpdSelf) we would need the statement Σ [x:=β, z:=β, y:=ξ] |= z : ξ. But this statement does
not hold for an arbitrary subtype ξ ⊆ β. Therefore the semantic typing lemmas stated
above are not strong enough to prove that Σ [x:=β, z:=β] |= x.retrieve := ς(y)z : β, and
thus that Σ [x:=β] |= backup(x) : β holds for the method body. This prevents us from
typing an object that contains this method (e.g., [backup = ς(x)backup(x), . . .]) to type β
using the semantic typing lemmas.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
25
Abadi and Cardelli [2, Ch. 17] address this lack of expressiveness by modifying the
calculus in two respects. First, they introduce a new syntax for method update, a.m :=
(y, z = c)ς(x)b. Operationally this new construct behaves just like
let y = a in let z = c in y.m := ς(x)b
(5.1)
but its typing rule is more powerful than the one induced by this encoding. When typing
c and the method body b, y can be assumed to have the precise type of the object:
A ≡ Obj(Y )[md :νd Ad ]d∈D
Γ⊢a:A
e∈D
νe ∈ {−, ◦}
Γ, X6A, y:X ⊢ c : C
Γ, X6A, y:X, z:C, x:X ⊢ b : Ae
(Upd-Self)
Γ ⊢ a.me := (y, z = c)ς(x)b : A
Second, in order to propagate this information, typing rules with ‘structural’ assumptions
are introduced. For instance, the inference rule for object cloning takes the form
(Clone-Str)
A6Obj(Y )[md :νd Ad ]d∈D
Γ ⊢ clone a : A
Γ⊢a:A
thus applying also in the case where A is a type variable. In this modified system, the body
of the backup method can be rewritten as
backupmod (x) = x.retrieve := (y, z = clone y)ς(x)z
(5.2)
and the judgement Γ, x:Bk ⊢ backupmod (x) : Bk is derivable.
Even in the purely syntactic setting, the ad hoc character of the syntax extension is
not entirely satisfactory, but for the step-indexed semantics of types both modifications are
in fact problematic. First, although it seems reasonable to expect that all the semantic
typing lemmas from Section 3 continue to hold, a change of the calculus and its operational
semantics would require us to recheck the proofs about object types in detail. Fortunately,
the syntax extension does not seem necessary from the semantic typing point of view; we
can already prove the semantic soundness of rule (Upd-Self) with respect to the encoding
of the new method update construct from (5.1):
If α = [md :νd Fd ]d∈D , e ∈ D, and νe ∈ {−, ◦} then
Σ |= a : α ∧ ∀ξ ⊆ α. Σ[y := ξ] |= c : γ ∧ ∀ξ ⊆ α. Σ [y := ξ, z := γ, x := ξ] |= b : Fe (ξ)
=⇒
Σ |= let y = a in let z = c in y.m := ς(x)b : α
However, by itself this rule does not help in typing the body of the backup method, and the
introduction of rules with structural assumptions presents a more severe difficulty. Soundness of these rules relies on the fact that every subtype of an object type is another object
type. In other words, in the (Clone-Str) rule the type A is assumed to range only over
object types. Such structural assumptions are usually not valid in semantic models, and
they are certainly not justified with respect to our semantically defined subtype relation,
which is just set inclusion.
5.3. Self Types with Structural Assumptions. To sum up the previous subsection, the
problem is that the semantic typing lemmas from Figure 12 are too weak to type certain
examples such as the body of the backup method, but the usual way to strengthen these rules
in a syntactic setting is not semantically sound in our model. Still, Σ[x := β] |= backup(x) : β
is a valid typing judgement about the method body. This can be seen by taking a closer
26
C. HRIŢCU AND J. SCHWINGHAMMER
Let α = [md :νd Fd ]d∈D .
(∀d∈D. ∀ξ∈Type. ξ ⊳ α ⇒ Σ[xd := ξ] |= bd : Fd (ξ))
=⇒
Σ |= [md =ς(xd )bd ]d∈D : α
(SemObj-Str)
(α′ ⊳ α ∧ Σ |= a : α′ ∧ e ∈ D ∧ νe ∈ {+, ◦})
=⇒
Σ |= a.me : Fe (α′ )
(α′ ⊳ α ∧ Σ |= a : α′ ∧ e ∈ D ∧ νe ∈ {−, ◦}
(SemInv-Str)
(SemUpd-Str)
∧ Σ[x := α ] |= b : Fe (α ))
=⇒
Σ |= a.me := ς(x)b : α′
α′ ⊳ α ∧ Σ |= a : α′
=⇒
Σ |= clone a : α′ (SemClone-Str)
Σ |= a : α ∧ (∀ξ∈Type. ξ ⊳ α ⇒ Σ[x := ξ] |= b : β)
=⇒
Σ |= let x = a in b : β
(SemLet-Str)
′
′
Figure 13: Typing lemmas with structural assumptions: self types
look at the semantic definition of the self type β = JBkKη : essentially, if for a suitable
substitution σ :k,Ψ Σ[x := β] the substitution instance
σ(backup(x)) = let z = clone σ(x) in σ(x).retrieve := ς(y)z
becomes irreducible in less than k steps, then σ(x) must be an object value v = {md =ld }d∈D
such that hk, Ψ, vi ∈ β. Property (Obj-1) of β asserts the existence of a type α′ such that
⌊α′ ⌋k ⊆ ⌊β⌋k , and property (Obj-3) entails that z becomes bound to a value v ′ of this type
α′ . Thus by (Obj-2-self) the eventual update of the retrieve field of v is valid, since the
new method λ(y)v ′ has the expected type α′ → α′ to sufficient approximation.
Similar ‘manual’ reasoning seems possible in other cases, but a more principled approach will let us use typing lemmas that are strong enough and avoid explicit reasoning
about the operational semantics and step indices. To facilitate this, we develop a semantic
counterpart to the structural assumptions that appear in the syntactic type system of Abadi
and Cardelli [2, Ch. 17]. More precisely, we introduce a relation α′ ⊳ α between semantic
types that strengthens the subtype relation: intuitively α′ is the precise, recursive type of
some collection of object values from the object type α. The type α acts as an interface
that lists the permitted operations on these object values.
Definition 5.2 (Self type exposure). For α = [md :νd Fd ]d∈D and α′ ∈ Type the relation
α′ ⊳ α holds if and only if α′ ⊆ α and for all E ⊇ D and hk, Ψ, {me =le }e∈E i ∈ α′ ,
(Obj-2-self)
(∀d ∈ D. hk, Ψ, ld i ∈ refνd (α′ → Fd (α′ )))
′
′
∧ (∀j < k. ∀Ψ . ∀ me =le e∈E .
(Obj-3)
′ ′
′
(k, Ψ) ⊑ (j, Ψ ) ∧ (∀e ∈ E. Ψ j (le ) = ⌊Ψ⌋j (le ))
⇒ hj, Ψ′ j , me =le′ e∈E i ∈ α′ )
Notice that α′ ⊳ α essentially states that α′ is a type that can take the place of the
existentially quantified ‘self type’ in an object type (see Definition 5.1). It is immediate
from this definition that α′ ⊳ α implies α′ ⊆ α. Note however that ⊳ is not reflexive: in
general, α′ is not an object type (e.g., α′ could be empty). Intuitively, the object type α is
obtained as a union of such α′ .
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
27
Figure 13 lists new typing lemmas for self types that exploit the relation ⊳. Compared
to (SemInv-Self) and (SemClone-Self) from Figure 12, the typing lemmas (SemInvStr) and (SemClone-Str) use the additional assumptions α′ ⊳ α and Σ |= a : α′ to
establish a more precise typing for the result. Similarly, while (SemUpd-Self) universally
quantifies over all ξ ⊆ α in its premise, (SemUpd-Str) limits this to those ξ ∈ Type for
which ξ ⊳ α holds. Finally, (SemLet-Str) lets us use an object a within b with the more
precise type ξ where ξ ⊳ α, and similarly (SemObj-Str) lets us type the method bodies
under the more informative assumption that ξ ⊳ α. The latter two are the key lemmas to
introduce an assumption α′ ⊳ α in proofs using these semantic typing lemmas.
As an illustration, consider the example of the backup method again. In order to
construct objects with the backup method, we will establish that
∀ξ∈Type. ξ ⊳ β ⇒ Σ[x := ξ] |= backup(x) : ξ
(5.3)
holds, where β = JBkKη and backup(x) abbreviates ‘let z = clone x in x.retrieve := ς(y)z’ as
before. From this, by (SemObj-Str) it will follow that
Σ |= [backup = ς(x)backup(x), retrieve = . . .] : β
If we desugar the let construct in backup(x) and apply lemmas (SemApp) and (SemLam),
we notice that in order to show (5.3) it suffices to prove that Σ[x:=ξ] |= clone x : ξ and
Σ[x:=ξ, z:=ξ] |= x.retrieve := ς(y)z : ξ. Using ξ ⊳ β and Σ[x:=ξ] |= x : ξ, the validity
of the former judgement is immediate by (SemClone-Str). Similarly, the latter follows
by (SemUpd-Str) from the fact that ξ ⊳ β and since the retrieve method is listed with
variance annotation ‘◦’ in β.
Lemma 5.3 (Self types: lemmas with structural assumptions). All the semantic typing
lemmas shown in Figure 13 are valid implications.
Proof sketch. The proofs of (SemInv-Str), (SemClone-Str), and (SemUpd-Str) are
straightforward adaptations of those for (SemInv), (SemClone), and (SemUpd). As an
example, we give the proof of (SemUpd-Str) as Lemma A.10 in the Appendix. More
interestingly, (SemLet-Str) relies on the following property of object types α:
hk, Ψ, vi ∈ α
=⇒
∃α′ ∈ Type. α′ ⊳ α ∧ hk − 1, ⌊Ψ⌋k−1 , vi ∈ α′
In the proof of (SemLet-Str), this α′ is used to instantiate the universally quantified ξ
in the premise ξ ⊳ α ⇒ Σ[x := ξ] |= b : β. The full proof is given as Lemma A.12 in the
Appendix.
The proof of (SemObj-Str) is similar to the one of (SemObj)
(Lemma A.4 in the Ap
pendix), except that we use the heap typing extension Ψ′ = Ψ [ld := (β → Fd (β))]d∈D k−1 ,
where β is a recursive record type satisfying conditions (Obj-2-self) and (Obj-3), but not
validating any subtyping property. In verifying that the extended heap is well-typed with
respect to this Ψ′ , one uses that β ⊳ α, in order to instantiate the assumptions on the
method bodies and obtain Σ[xd := β] |= bd : Fd (β). Finally, to show that the generated
object value has type α, Claim 3.23 is strengthened to show that the object value is in fact
in β, which is a subtype of α since β ⊳ α (see Proposition A.14 and Lemma A.15 in the
Appendix for the full proof).
28
C. HRIŢCU AND J. SCHWINGHAMMER
Remark 5.4. The implication Σ |= a : α =⇒ ∃α′ ∈ Type. α′ ⊳ α ∧ Σ |= a : α′
for α = [md :νd Fd ]d∈D may appear reasonable (and would entail both (SemLet-Str) and
(SemObj-Str)), but we do not believe that it holds. The problem is that, while the premise
Σ |= a : α guarantees for each k ≥ 0 the existence of a type α′k that satisfies the requirement
α′k ⊳ α, it is in general not possible to construct a type α′ ‘in the limit’ from this sequence.
For the same reason, the implication Σ |= pack a : ∃α F =⇒ ∃α′ ⊆ α. Σ |= a : F (α′ ) is not
valid. The typing lemma (SemLet-Str) avoids this problem since α′ is only needed up to
a fixed approximation, and so the choice of α′k for sufficiently large k suffices (cf. proof of
Lemma A.12 in the Appendix). On the other hand, the (SemObj-Str) lemma avoids the
problem by instantiating ξ with a particular type β, for which β ⊳ α is already known.
In this section we showed that our semantics of object types naturally extends to self
types, while avoiding any change to the syntax and operational semantics of the calculus.
We proved a first set of typing lemmas that are natural and apply to many examples
(Figure 12). These lemmas are however not sufficient to typecheck self-returning methods.
To achieve this, we developed a second set of typing lemmas that involve the object’s precise
type, through the relation α′ ⊳ α (Figure 13). Note that these latter lemmas do not fully
subsume the former ones, since the ⊳ relation is not reflexive. We leave open the problem
of relating the lemmas in Figure 13 to a syntactic type system.
6. Generalizing Reference and Object Types
The semantics described in this paper generalizes the reference types from [6, 9] to readable
and writable reference types. This can be generalized even further. We can have a reference
type constructor that takes two types as arguments: one that represents the most general
type that can be used when writing to the reference, and another for the most specific type
that can be read from it [38]. This can be easily expressed using our readable and writable
reference types together with intersection types:
ref(τ w , τ r ) = ref− τ w ∩ ref+ τ r
After unfolding the definitions, this yields
ref(τ w , τ r ) = {hk, Ψ, li | ⌊τ w ⌋k ⊆ ⌊Ψ(l)⌋k ⊆ ⌊τ r ⌋k }.
As one would expect, this generalized reference type constructor is contravariant in the first
argument and covariant in the second one:
β w ⊆ αw
∧
αr ⊆ β r
=⇒
ref(αw , αr ) ⊆ ref(β w , β r )
(SemSubRef-Gen)
Note that, if one takes these generalized reference types as primitive, then the three reference
types from Section 3.4 are obtained as special cases:
ref◦ τ = ref(τ, τ ),
ref+ τ = ref(⊥, τ ),
ref− τ = ref(τ, ⊤),
and the subtyping properties from Figure 7 are still valid.
Figures 14 and 15 give a graphical representation of the different reference type constructors. In both figures the horizontal axis represents the type at which a reference can be
read, while the vertical one gives the type at which it can be written. Notice that because
of the different variance the read axis goes from ⊥ to ⊤ while the write axis from ⊤ to ⊥.
Figure 14 represents the usual, as well as the readable, and the writable reference types
as points on the three edges of a triangle. Notice that the usual references can be read
and written at the same type. Without additional information, the readable references
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
Figure 14: Readable/writable reference types
29
Figure 15: Generalized reference types
Let α = [md : (τdw , τdr ) ]d∈D and α′ = [md : (τd , τd ) ]d∈D .
(∀d ∈ D. Σ[xd := α′ ] |= bd : τd )
=⇒
Σ |= [md =ς(xd )bd ]d∈D : α′
(SemObj-Gen)
(Σ |= a : α ∧ e ∈ D)
=⇒
Σ |= a.me :
τer
(SemInv-Gen)
(Σ |= a : α ∧ e ∈ D ∧ Σ[x := α] |= b : τew )
=⇒
Σ |= a.me := ς(x)b : α
Σ |= a : α
=⇒
Σ |= clone a : α
r
r
(E ⊆ D ∧ (∀e ∈ E. βew ⊆ αw
e ∧ αe ⊆ βe ))
=⇒
r
w
r
[md : (αw
d , αd ) ]d∈D ⊆ [me : (βe , βe ) ]e∈E
(SemSubObj-Gen)
(SemUpd-Gen)
(SemClone-Gen)
Figure 16: Typing lemmas: generalized object types
can only be written safely at type ⊥, and the writable ones can only be read at type ⊤.
Subtyping is represented by arrows: covariant on the edge of the readable reference types
and contravariant on the writable reference types’ edge. An invariant reference type can
only be subtyped either to a readable or to a writable reference type.
Figure 15 illustrates that our generalization of reference types is indeed very natural.
When generalizing, we take not only the points on the edges of the triangle, but also the
points inside it to be reference types. Furthermore, instead of having three different kinds of
reference types, we only have one. Subtyping is also more natural: the set of all supertypes
of a reference type cover the area of a rectangle which goes from the point corresponding
to this reference type to the ‘top’ reference type ref(⊥, ⊤). For instance, the dark gray
rectangle in Figure 15 contains all supertypes of ref(τ, τ ).
Applying this idea in the context of the imperative object calculus leads not only to
more expressive subtyping but also to simplifications, since the variance annotations are no
longer needed. The extended object type [md : (τdw , τdr ) ]d∈D has two types for each method
md : τdw is the most general type that can be used to update the given method, and τdr is
the most specific type that can be expected as a result when invoking the method. When
defining the semantics of these generalized object types, the only difference with respect
to Definition 3.20 (Object types) is that condition (Obj-2) is changed to use an extended
reference type:
∀d ∈ D. hk, Ψ, ld i ∈ ref(α′ → τdw , α′ → τdr ).
(Obj-2-Gen)
30
C. HRIŢCU AND J. SCHWINGHAMMER
r
′
Let A = [md : (Aw
d , Ad ) ]d∈D and A = [md : (Ad , Ad ) ]d∈D .
(Obj-Gen)
(Inv-Gen)
∀d ∈ D. Γ, xd : A′ ⊢ bd : Ad
Γ ⊢ md =ς(xd :A′ )bd d∈D : A′
Γ⊢a:A e∈D
Γ ⊢ a.me : Are
(SubObj-Gen)
(Upd-Gen)
(Clone-Gen)
Γ⊢a:A
Γ ⊢ clone a : A
Γ ⊢ a : A e ∈ D Γ, x : A ⊢ b : Aw
e
Γ ⊢ a.me := ς(x:A)b : A
E ⊆ D ∀e ∈ E. Γ ⊢ Bew 6 Aw
∀e ∈ E. Γ ⊢ Are 6 Ber
e
r
w
r
Γ ⊢ [md : (Aw
d , Ad ) ]d∈D 6 [me : (Be , Be ) ]e∈E
Figure 17: The typing rules for generalized object types
Figure 16 presents the semantic typing lemmas that are validated by this definition of
object types, while Figure 17 gives the corresponding syntactic typing rules. Note that the
complex and seemingly ad-hoc rules for subtyping object types given in Figure 4 or in [2]
are replaced by only one rule (SubObj-Gen).
Lemma 6.1 (Generalized object types). All the semantic typing lemmas shown in Figure 16
are valid implications.
Proof sketch. The proof of the subtyping lemma (SemSubObj-Gen) follows easily from the
lemma for subtyping generalized reference types (SemSubRef-Gen above), and is therefore
significantly simpler than when variance annotations are involved (see Lemma A.16 in the
Appendix). For all the other semantic typing lemmas the proofs are basically unchanged
(see Section A.2 in the Appendix).
Note that the generalization of object types presented in this section is orthogonal to
the extension to self types from the previous section. The generalized object types lead to
a type system that is both simpler and more expressive than the usual type systems for
objects [2]. Our generalized object types directly correspond to the split types of Bugliesi
and Pericás-Geertsen [19], who have shown that these types are strictly more expressive
than object types with variance annotations [19, Example 4.3].
7. Comparison to Related Work
7.1. Domain-theoretic Models. Abadi and Cardelli give a semantic model for the functional object calculus in [1, 2]. Their type system is comparable to the one we consider
here. Types are interpreted as certain partial equivalence relations over an untyped domaintheoretic model of the calculus. No indication is given on how to adapt this to the imperative
execution model.
Based on earlier work by Kamin and Reddy [30], Reus et al. [41, 42, 44] construct
domain-theoretic models for the imperative object calculus, with the goal of proving soundness for the logic of Abadi and Leino [4]. The higher-order store exhibited by the object
calculus requires defining the semantic domains by mixed-variant recursive equations. The
dynamic allocation is then addressed by interpreting specifications of the logic as Kripke
relations, indexed by store specifications, which are similar to the heap typings used here.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
31
Building on work by Levy [31], an ‘intrinsically typed’ model of the imperative object
calculus is presented in the second author’s PhD thesis [44], by solving the domain equations
in a suitable category of functors. However, only first-order types are considered.
Compared to these domain-theoretic models, the step-indexed model we present not
only soundly interprets a richer type language, but is also easier to work with. The way it
is based on the operational semantics eliminates the need for explicit continuity conditions,
and the admissibility conditions are replaced by the closure under state extension, which
is usually very easy to check. All that is needed for the definition of iso-recursive and
second-order types are non-expansiveness and the stratification invariant. What is missing
from our model is a semantic notion of equality that approximates program equivalence.
For reasoning about program equivalence in an ML-like language, Ahmed et al. [5] have
recently developed a relational step-indexed model, and it could be interesting to adapt
their work to an object-oriented setting.
Recently proposed models for polymorphism and general references [15, 16, 17] suggest
that an adequate semantics for imperative objects with expressive typing could in principle
be developed also in a domain-theoretic setting. A detailed comparison between stepindexed semantics and domain-theoretic models would be useful, to make the similarities
and differences between the two approaches more precise.
It is interesting to see how the object construction rule (Obj) is proved correct in
each of the models described above. In the domain-theoretic self-application models [41,
42], it directly corresponds to a recursive predicate whose well-definedness (i.e., existence
and uniqueness) must be established. This proof exploits properties of the underlying,
recursively defined domain, and imposes some further restrictions on the semantic types:
besides admissibility, types appearing in the defining equation of a recursive predicate need
to satisfy an analogue of the contractiveness property [36]. In the typed functor category
model [44], object construction is interpreted using a recursively defined function, and
correspondingly (Obj) is proved by fixed point induction. In the step-indexed case, the
essence of the proof is a more elementary induction on the step index, with a suitably
generalized induction hypothesis (see Claim 3.23 in the proof sketch of Lemma 3.22 on page
18, or the full proof in the Appendix).
7.2. Interpretations of Object Types. Our main contribution in this paper is the novel
interpretation of object types in the step-indexed model. The step-index-induced stratification permits the construction of mixed-variance recursive as well as impredicative, secondorder types. Both are key ingredients in our interpretation of object types. The use of
recursive and existentially quantified types is in line with the type-theoretic work on object
encodings, which however has mainly focused on object calculi with a functional execution
model [18].
Closest to our work is the encoding of imperative objects into an imperative variant
of system F6µ with updatable records, proposed by Abadi et al. [3]. There, objects are
interpreted as records containing references to the procedures that represent the methods.
As in our case, these records have a recursive and existentially quantified record type. The
difference is that two additional record fields are included in order to achieve invocation and
cloning, and uninitialized fields are used to construct this recursive record. Subtyping in
depth is considered in [3] only for the encoding of the functional object calculus. However,
if one added to the target language the readable and writable reference types we use in this
32
C. HRIŢCU AND J. SCHWINGHAMMER
paper, the encoding of the imperative object calculus would extend to subtyping in depth
as well.
In the typing rules for self types, the structural assumptions about the subtype relation
play an important role [2]. In Section 5 we developed a semantic counterpart to such typing
rules with structural assumptions, in order to deal with the polymorphic update of selfreturning methods. This is, however, tailored specifically to object types. Hofmann and
Pierce [26] investigate the metatheory of subtyping with structural assumptions in general,
and give elementary presentations of two encodings of functional objects in a variant of
System F≤ with type destructors. It may be interesting to see if a step-indexed model of
this variant of System F≤ can be found.
7.3. Step-indexed Models. Step-indexed semantic models were introduced by Appel et
al. in the context of foundational proof-carrying code. Their goal was to construct more
elementary and modular proofs of type soundness that can be easily checked automatically.
They were primarily interested in low-level languages, however they also applied their technique to a pure λ-calculus with recursive types [10]. Later Ahmed et al. successfully
extended it to general references and impredicative polymorphism [6, 9]. The step-indexed
semantic model we present extends the one by Ahmed et al. with object types and subtyping. In order to achieve this, we refine the reference types from [6] to readable and writable
reference types.
Subtyping in a step-indexed semantic model was previously considered by Swadi who
studied Typed Machine Language [45]. Our setup is however much different. In particular,
the subtle issues concerning the subtyping of object types are original to our work.
The previous work on step-indexing focuses on ‘semantic type systems’, i.e., the semantic typing lemmas can directly be used for type-checking programs [9, 10, 12]. However,
when one considers more complex type systems with subtyping, recursive types or polymorphism, the semantic typing lemmas no longer directly correspond to the usual syntactic
rules. These discrepancies can be fixed, but usually at the cost of more complex models, like
the one developed by Swadi to track type variables [12, 45]. In Swadi’s model an additional
‘semantic kind system’ is used to track the contractiveness and non-expansiveness of types
with free type variables. We avoid having a more complex model (e.g., one that tracks type
variables) by considering iso-recursive rather than equi-recursive types. An equi-recursive
type is well-defined if its argument is contractive, and some of the type constructors are not
contractive in general (e.g., the identity as well as the equi-recursive type constructor itself). On the other hand, an iso-recursive type is well-defined under the weaker assumption
that the argument is non-expansive, and all our type constructors are indeed non-expansive
(see Lemma 3.33). It is then relatively straightforward to use the semantic typing lemmas
in order to prove the soundness of the standard, syntactic type system we consider (see
Theorem 4.5).
7.4. Type Safety Proofs. Abadi and Cardelli use subject reduction to prove the safety
of several type systems very similar to the one considered in this paper [2]. Those purely
syntactic proofs are very different from the ‘semantic’ type safety proof we present (for
detailed discussions about the differences see [10, 46]). Since type safety is built into the
model, our safety proof neither relies on a preservation property, nor can preservation be
concluded from it.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
33
Constructing a step-indexed semantics is more challenging than proving progress and
preservation. However, for our particular semantics we could reuse the model by Ahmed
et al. and extend it to suit our needs, even though the calculus we are considering is
quite different. So one would expect that once enough general models are constructed
(e.g., [6, 10, 11]), it will become easier to build new models just by mixing and matching.
Assuming the existence of an adequate step-indexed model, the effort needed to prove
the semantic typing lemmas using ‘pencil-and-paper’ is somewhat comparable to the one
required for a subject reduction proof. Since each of the semantic typing lemmas is proved in
isolation, the resulting type soundness proof is more modular; the extensions we consider in
Sections 5 and 6 illustrate this aspect rather well. According to Appel’s original motivation,
the advantages of step-indexing should become even more apparent when formalizing the
proofs in a proof assistant [10].
7.5. Generalized Reference and Object Types. The readable and the writable reference types we define in Section 3.4 and use for modeling object types in Section 3.5 are
similar to the reference types in the Forsythe programming language [43] and to the channel
types of [22, 35]. The generalization to a reference type constructor taking two arguments
described in Section 6 is quite natural, and also appeared in Pottier’s thesis [38], where
it facilitated type inference by allowing meets and joins to distribute over reference types.
This idea has recently been applied by Craciun et al. for inferring variant parametric types
in Java [23].
The generalized object types we introduce in Section 6 directly correspond to the split
types of Bugliesi and Pericás-Geertsen [19]. Split types are also motivated by type inference, since they guarantee the existence of more precise upper and lower bounds. In
particular, Bugliesi and Pericás-Geertsen show that split types are strictly more expressive
than first-order object types with variance annotations [19, Example 4.3]. They establish
the soundness of a type system with split types by subject reduction, with respect to a
functional semantics of the object calculus.
7.6. Functional Object Calculus. Our initial experiments on the current topic were done
in the context of the functional object calculus [27]. Even though in the functional setting
the semantic model is much simpler, both models satisfy the same semantic typing lemmas.
Even more, the syntactic type system we considered for the functional calculus is exactly the
same as the one in this paper, so all the results in Section 4 directly apply to the functional
object calculus: well-typed terms do not get stuck, no matter whether they are evaluated in
a functional or an imperative way. It would not be possible to directly prove such a result
using subject reduction, since for subject reduction the syntactic typing judgment for the
imperative calculus would also depend on a heap typing, and thus be different from the
judgment for the functional calculus. However, since we are not using subject reduction,
we do not need to type-check partially evaluated terms that contain heap locations.
8. Conclusion
We have presented a step-indexed semantics for Abadi and Cardelli’s imperative object
calculus, and used it to prove the safety of a type system with object types, recursive and
second-order types, as well as subtyping. We showed how this semantics can be extended
to self types and typing lemmas with structural assumptions; and generalized in a way that
34
C. HRIŢCU AND J. SCHWINGHAMMER
eliminates the need for variance annotations and at the same time simplifies the subtyping
rules for objects.
The step-indexing technique is however not limited to type safety proofs, and has already been employed for more general reasoning about programs. Based on previous work
by Appel and McAllester [10], Ahmed built a step-indexed partial equivalence relation model
for the lambda calculus with recursive and impredicative quantified types, and showed that
her relational interpretation of types is sound for proving contextual equivalences [7]. Recently, this was extended significantly to reason about program equivalence in the presence
of general references [5]. Benton also used step-indexing as a technical device, together with
a notion of orthogonality relating expressions to contexts, to show the soundness of a compositional program logic for a simple stack-based abstract machine [13]. He also employed
step-indexing in a Floyd-Hoare-style framework based on relational parametricity for the
specification and verification of machine code programs [14].
We hope that our work paves the way for similarly compelling, semantic investigations
of program logics for the imperative object calculus: using a step-indexed model it should
be possible to prove the soundness of more expressive program logics for this calculus.
Acknowledgements
We express our gratitude to the anonymous reviewers for their detailed and constructive
comments on the preliminary versions of this article. We also thank Andreas Rossberg for
pointing us to the work of John C. Reynolds on Forsythe. Cătălin Hriţcu is supported by a
fellowship from Microsoft Research and the International Max Planck Research School for
Computer Science.
References
[1] Martı́n Abadi and Luca Cardelli. A semantics of object types. In Proceedings Ninth Annual IEEE
Symposium on Logic in Computer Science, LICS’94, pages 332–341. IEEE Computer Society Press,
1994.
[2] Martı́n Abadi and Luca Cardelli. A Theory of Objects. Springer, 1996.
[3] Martı́n Abadi, Luca Cardelli, and Ramesh Viswanathan. An interpretation of objects and object types.
In Proceedings 23rd Symposium on Principles of Programming Languages, POPL’96, pages 396–409.
ACM Press, 1996.
[4] Martı́n Abadi and K. Rustan M. Leino. A logic of object-oriented programs. In Nachum Dershowitz,
editor, Verification: Theory and Practice. Essays Dedicated to Zohar Manna on the Occasion of his
64th Birthday, Lecture Notes in Computer Science, pages 11–41. Springer, 2004.
[5] Amal Ahmed, Derek Dreyer, and Andreas Rossberg. State-dependent representation independence. In
Zhong Shao and Benjamin C. Pierce, editors, Proceedings 36th Symposium on Principles of Programming
Languages, POPL’09, pages 340–353, 2009.
[6] Amal J. Ahmed. Semantics of types for mutable state. PhD thesis, Princeton University, 2004.
[7] Amal J. Ahmed. Step-indexed syntactic logical relations for recursive and quantified types. In Peter
Sestoft, editor, Proceedings 15th European Symposium on Programming, ESOP’06, volume 3924 of
Lecture Notes in Computer Science, pages 69–83. Springer, 2006.
[8] Amal J. Ahmed, Andrew W. Appel, and Roberto Virga. A stratified semantics of general references
embeddable in higher-order logic. In Proceedings 17th Annual IEEE Symposium Logic in Computer
Science, LICS’02, pages 75–86. IEEE Computer Society Press, 2002.
[9] Amal J. Ahmed, Andrew W. Appel, and Roberto Virga. An indexed model of impredicative polymorphism and mutable references. Princeton University, January 2003.
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
35
[10] Andrew W. Appel and David McAllester. An indexed model of recursive types for foundational proofcarrying code. ACM Transactions on Programming Languages and Systems, 23(5):657–683, September
2001.
[11] Andrew W. Appel, Paul-André Melliès, Christopher D. Richards, and Jérôme Vouillon. A very modal
model of a modern, major, general type system. In Proceedings 34th Symposium on Principles of Programming Languages, POPL’07, pages 109–122, 2007.
[12] Andrew W. Appel, Christopher Richards, and Kedar Swadi. A kind system for typed machine language.
Technical report, Princeton University, September 2002.
[13] Nick Benton. A typed, compositional logic for a stack-based abstract machine. In Zoltán Ésik, editor,
Proceedings Asian Symposium on Programming Languages and Systems, APLAS’05, volume 3780 of
Lecture Notes in Computer Science, pages 182–196. Springer, 2005.
[14] Nick Benton. Abstracting allocation: the new new thing. In Zoltán Ésik, editor, Proceedings Computer
Science Logic, CSL’06, volume 4207 of Lecture Notes in Computer Science, pages 364–380. Springer,
2006.
[15] Lars Birkedal, Kristian Støvring, and Jacob Thamsborg. Realizability semantics of parametric polymorphism, general references, and recursive types. In Proceedings Foundations of Software Science and
Computation Structures, FOSSACS’09, volume 5504 of Lecture Notes in Computer Science, pages 456–
470. Springer, 2009.
[16] Nina Bohr. Advances in Reasoning Principles for Contextual Equivalence and Termination. PhD thesis,
IT University of Copenhagen, 2007.
[17] Nina Bohr and Lars Birkedal. Relational reasoning for recursive types and references. In Naoki
Kobayashi, editor, Proceedings Asian Symposium on Programming Languages, APLAS’06, volume 4279
of Lecture Notes in Computer Science, pages 79–96. Springer, 2006.
[18] Kim B. Bruce, Luca Cardelli, and Benjamin C. Pierce. Comparing object encodings. Information and
Computation, 155(1/2):108–133, November 1999.
[19] Michele Bugliesi and Santiago M. Pericás-Geertsen. Type inference for variant object types. Information
and Computation, 177(1):2–27, 2002.
[20] Luca Cardelli. Amber. In Guy Cousineau, Pierre-Louis Curien, and Bernard Robinet, editors, Combinators and Functional Programming Languages, volume 242 of Lecture Notes in Computer Science,
pages 21–47. Springer, 1985.
[21] Luca Cardelli. Type systems. In Allen B. Tucker, editor, The Computer Science and Engineering Handbook, chapter 103, pages 2208–2236. CRC Press, 1997.
[22] Giuseppe Castagna, Rocco De Nicola, and Daniele Varacca. Semantic subtyping for the π-calculus.
Theoretical Computer Science, 398(1-3):217–242, 2008. Essays in honour of Mario Coppo, Mariangiola
Dezani-Ciancaglini and Simona Ronchi della Rocca.
[23] Florin Craciun, Wei-Ngan Chin, Guanhua He, and Shengchao Qin. An interval-based inference of variant
parametric types. In Giuseppe Castagna, editor, Proceedings 18th European Symposium on Programming, ESOP ’09, volume 5502 of Lecture Notes in Computer Science, pages 112–127. Springer, 2009.
[24] Cormac Flanagan, Stephen Freund, and Aaron Tomb. Hybrid types, invariants, and refinements for
imperative objects. In Workshop on Foundations and Developments of Object-Oriented Languages,
FOOL/WOOD’06, 2006.
[25] Andrew D. Gordon, Paul D. Hankin, and Søren B. Lassen. Compilation and equivalence of imperative
objects. In S. Ramesh and G. Sivakumar, editors, Proceedings 17th Conference on Foundations of
Software Technology and Theoretical Computer Science, FST+TCS’97, volume 1346 of Lecture Notes
in Computer Science, pages 74–87. Springer, 1997.
[26] Martin Hofmann and Benjamin C. Pierce. Type destructors. Information and Computation, 172(1):29–
62, 2002.
[27] Cătălin Hriţcu. A step-indexed semantic model of types for the functional object calculus. Master’s
thesis, Programming Systems Lab, Saarland University, May 2007.
[28] Cătălin Hriţcu and Jan Schwinghammer. A step-indexed semantics of imperative objects. Extended
version, Programming Systems Lab, Saarland University, February 2008.
[29] Alan Jeffrey and Julian Rathke. A fully abstract may testing semantics for concurrent objects. Theoretical Computer Science, 338(1-3):17–63, 2005.
36
C. HRIŢCU AND J. SCHWINGHAMMER
[30] Samuel N. Kamin and Uday S. Reddy. Two semantic models of object-oriented languages. In Carl A.
Gunter and John C. Mitchell, editors, Theoretical Aspects of Object-Oriented Programming: Types,
Semantics, and Language Design, pages 464–495. MIT Press, 1994.
[31] Paul Blain Levy. Possible world semantics for general storage in call-by-value. In Julian Bradfield, editor,
Proceedings Computer Science Logic, CSL’02, volume 2471 of Lecture Notes in Computer Science, pages
232–246. Springer, 2002.
[32] John C. Mitchell and Eugenio Moggi. Kripke-style models for typed lambda calculus. Annals of Pure
and Applied Logic, 51(1–2):99–124, 1991.
[33] Eugenio Moggi. An abstract view of programming languages. Technical Report ECS-LFCS-90-113,
Laboratory for Foundations of Computer Science, University of Edinburgh, 1990.
[34] Frank J. Oles. Type algebras, functor categories, and block structure. In Maurice Nivat and John C.
Reynolds, editors, Algebraic Methods in Semantics. Cambrige University Press, 1985.
[35] Benjamin C. Pierce and Davide Sangiorgi. Typing and subtyping for mobile processes. Mathematical
Structures in Computer Science, 6(5), 1996.
[36] Andrew M. Pitts. Relational properties of domains. Information and Computation, 127:66–90, 1996.
[37] Andrew M. Pitts and Ian D. B. Stark. Operational reasoning for functions with local state. In Andrew D.
Gordon and Andrew M. Pitts, editors, Higher-Order Operational Techniques in Semantics, Publications
of the Newton Institute, pages 227–273. Cambridge University Press, 1998.
[38] François Pottier. Type inference in the presence of subtyping: from theory to practice. Research Report
3483, INRIA, September 1998.
[39] Uday S. Reddy and Hongseok Yang. Correctness of data representations involving heap data structures.
Science of Computer Programming, 50(1–3):129–160, March 2004.
[40] Bernhard Reus. Modular semantics and logics of classes. In Matthias Baatz and Johann A. Makowsky,
editors, Proceedings Computer Science Logic, CSL’03, volume 2803 of Lecture Notes in Computer Science, pages 456–469. Springer, 2003.
[41] Bernhard Reus and Jan Schwinghammer. Denotational semantics for a program logic of objects. Mathematical Structures in Computer Science, 16(2):313–358, April 2006.
[42] Bernhard Reus and Thomas Streicher. Semantics and logic of object calculi. Theoretical Computer
Science, 316:191–213, 2004.
[43] John C. Reynolds. Design of the programming language Forsythe. Technical Report CMU-CS-96-146,
Carnegie Mellon University, June 1996. Reprinted in O’Hearn and Tennent, ALGOL-like Languages,
vol. 1, pages 173-233, Birkhäuser, 1997.
[44] Jan Schwinghammer. Reasoning about Denotations of Recursive Objects. PhD thesis, Department of
Informatics, University of Sussex, 2006.
[45] Kedar N. Swadi. Typed Machine Language. PhD thesis, Princeton University, July 2003.
[46] Andrew K. Wright and Matthias Felleisen. A syntactic approach to type soundness. Information and
Computation, 115(1):38–94, 1994.
Appendix A.
A.1. Auxiliary Propositions.
Proposition A.1 (Preorder). The state extension relation, ⊑, is reflexive and transitive.
Proposition A.2 (Information-forgetting extension). If j ≤ k then (k, Ψ) ⊑ (j, ⌊Ψ⌋j ).
Proposition A.3 (Relation between hk, Ψ, vi ∈ τ and v :k,Ψ τ ). Let v be a closed value.
(1) If hk, Ψ, vi ∈ τ then v :k,Ψ τ .
(2) If v :k,Ψ τ , k > 0, and there exists some h such that h :k Ψ, then hk, Ψ, vi ∈ τ .
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
37
A.2. Typing Lemmas for Object Types.
Lemma A.4 (SemObj: Object construction). For all object types α = [md :νd τd ]d∈D , if
for all d ∈ D we have Σ[xd := α] |= bd : τd , then Σ |= [md =ς(xd )bd ]d∈D : α.
Proof. Let α = [md :νd τd ]d∈D and assume that ∀d ∈ D. Σ[xd := α] |= bd : τd . We must
show that Σ |= [md =ς(xd )bd ]d∈D : α. Thus, let k ≥ 0, σ be a value environment and Ψ be
a heap typing such that σ :k,Ψ Σ. By the definition of the semantic typing judgement (Definition 3.8) we need to show that σ([md =ς(xd )bd ]d∈D ) :k,Ψ α. Equivalently (after suitable
α-renaming), we show that
[md =ς(xd )σ(bd )]d∈D :k,Ψ α
′
′
Suppose j < k, h, h and b are such that the following three conditions are fulfilled:
h :k Ψ
∧
hh, [md =ς(xd )σ(bd )]d∈D i →j hh′ , b′ i
∧
hh′ , b′ i9
(A.1)
By the operational semantics Red-Obj is the only rule that applies, which means that
necessarily j = 1 and for some distinct ld 6∈ dom(h) we have b′ = {md =ld }d∈D and
We choose
and show that
h′ = h [ld := λ(xd )σ(bd )]d∈D
(A.2)
Ψ′ = Ψ [ld := (α → τd )]d∈D k−1
(A.3)
(k, Ψ) ⊑ (k − 1, Ψ′ )
∧
h′ :k−1 Ψ′
∧
hk − 1, Ψ′ , b′ i ∈ α
(A.4)
Ψ′
That the first conjunct of (A.4) holds is immediate from the construction of
(A.3).
In order to show the second conjunct, by Definition 3.5 (Well-typed heap) we first need
to show that dom(Ψ′ ) ⊆ dom(h′ ). From the first conjunct of (A.1) and Definition 3.5 it
is clear that dom(Ψ) ⊆ dom(h). Thus from the shape of h′ (A.2) and the definition of Ψ′
(A.3) we obtain the required inclusion.
Next, let i < k − 1 and l ∈ dom(Ψ′ ). To establish h′ :k−1 Ψ′ in (A.4) we now need to
show that hi, ⌊Ψ′ ⌋i , h′ (l)i ∈ Ψ′ (l). We distinguish two cases:
• Case l = ld for some d ∈ D. From (A.2) and (A.3) respectively we get that
h′ (l) = λ(xd )σ(bd )
∧
Ψ′ (l) = ⌊α → τd ⌋k−1
Thus we need to show that
hi, Ψ′ i , λ(xd )σ(bd )i ∈ ⌊α → τd ⌋k−1
(A.5)
∀d ∈ D. λ(xd )σ(bd ) :k,Ψ α → τd
(A.6)
By SemLam in Figure 6 (Lemma 3.15) and the assumption Σ[xd := α] |= bd : τd we
already know that Σ |= λ(xd )bd : α → τd for all d ∈ D. From this and σ :k,Ψ Σ by
Definition 3.8 (Semantic typing judgement) we obtain
Since k > 1 and from (A.1) h :k Ψ, Proposition A.3 shows that (A.6) implies
∀d ∈ D. hk, Ψ, λ(xd )σ(bd )i ∈ α → τd
1, Ψ′ )
(i, ⌊Ψ′ ⌋
(A.7)
By Proposition A.2 we get that (k −
⊑
i ), which together with the first
conjunct of (A.4) and the transitivity of ⊑ yields (k, Ψ) ⊑ (i, ⌊Ψ′ ⌋i ). Since each α → τd
is closed under state extension, the latter property and (A.7) imply the required (A.5).
38
C. HRIŢCU AND J. SCHWINGHAMMER
• Case l ∈ dom(Ψ). From (A.2) and (A.3) respectively we get that h′ (l) = h(l) and
Ψ′ (l) = ⌊Ψ(l)⌋k−1 , so we actually need to show that hi, ⌊Ψ′ ⌋i , h(l)i ∈ ⌊Ψ(l)⌋k−1 . From
h :k Ψ (A.1) by Definition 3.5 we get that hk −1, ⌊Ψ⌋k−1 , h(l)i ∈ Ψ(l). Since Ψ(l) is closed
under state extension and (k − 1, ⌊Ψ⌋k−1 ) ⊑ (i, ⌊Ψ′ ⌋i ), we obtain hi, ⌊Ψ′ ⌋i , h(l)i ∈ Ψ(l).
Finally, we need to show the third conjunct of (A.4), i.e., hk − 1, Ψ′ , {md =ld }d∈D i ∈ α.
To this end, we prove the following more general claim:
Claim: For all j0 ≥ 0, for all Ψ0 and for all {md =ld′ }d∈D
(k − 1, Ψ′ ) ⊑ (j0 , Ψ0 ) ∧ (∀d ∈ D. ⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld ))
⇒ hj0 , ⌊Ψ0 ⌋j0 , md =ld′ d∈D i ∈ α (A.8)
From this and ⌊Ψ′ ⌋k−1 = Ψ′ , (A.4) follows by taking j0 = k − 1, Ψ0 = Ψ′ , and ld′ = ld for
all d ∈ D, and by observing that ⊑ is reflexive (Proposition A.1).
The claim is proved by complete induction on j0 . So assume j0 ≥ 0 and Ψ0 are such
that
(k − 1, Ψ′ ) ⊑ (j0 , Ψ0 )
Moreover, for all d ∈ D let
ld′
(A.9)
∈ dom(Ψ0 ) such that
∀d ∈ D. ⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld )
(A.10)
We show that hj0 , ⌊Ψ0 ⌋j0 , {md =ld′ }d∈D i ∈ α, by checking that all the conditions obtained
by unfolding the definition of α = [md :νd τd ]d∈D hold. Choosing α′ = ⌊α⌋j0 yields (Obj-1):
∃α′ .α′ ∈ Type ∧ α′ j0 ⊆ ⌊α⌋j0
(A.11)
Next, by the construction of Ψ′ in (A.3), together with (A.9), (A.10), and the nonexpansiveness of procedure types, it follows that for all d ∈ D
j
k
⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld ) = ⌊α → τd ⌋j0 = ⌊α⌋j0 → τd
(A.12)
= α′ → τd j0
j0
By the definition of reference types (Definition 3.16) this implies that
∀d ∈ D. hj0 , ⌊Ψ0 ⌋j0 , ld′ i ∈ ref◦ (α′ → τd )
(A.13)
By the lemma for subtyping variance annotations (SemSubVarRef in Figure 7) we then
obtain property (Obj-2):
∀d ∈ D. hj0 , ⌊Ψ0 ⌋j0 , ld′ i ∈ refνd (α′ → τd )
(A.14)
Finally, we must prove (Obj-3), i.e., that for all j < j0 , Ψ1 and
{md =ld′′ }d∈D
(j0 , Ψ0 ) ⊑ (j, Ψ1 ) ∧ (∀d ∈ D. ⌊Ψ1 ⌋j (ld′′ ) = ⌊Ψ0 ⌋j (ld′ ))
⇒ hj, ⌊Ψ1 ⌋j , md =ld′′
d∈D
i ∈ α (A.15)
Note that this last condition holds trivially in the base case of the induction, when j0 = 0.
So assume j < j0 and Ψ1 and ld′′ are such that (j0 , Ψ0 ) ⊑ (j, Ψ1 ) and ⌊Ψ1 ⌋j (ld′′ ) = ⌊Ψ0 ⌋j (ld′ )
for all d ∈ D. Now j < j0 and assumption (A.10) yield that for all d ∈ D
j
k
j
k
⌊Ψ1 ⌋j (ld′′ ) = ⌊Ψ0 ⌋j (ld′ ) = ⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld ) = Ψ′ j (ld )
j
j
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
39
Moreover, from (k − 1, Ψ′ ) ⊑ (j0 , Ψ0 ) (A.9) and (j0 , Ψ0 ) ⊑ (j, Ψ1 ), by the transitivity of ⊑
we have that (k − 1, Ψ′ ) ⊑ (j, Ψ1 ). Since j < j0 , the induction hypothesis of the claim gives
hj, ⌊Ψ1 ⌋j , md =ld′′ d∈D i ∈ α
and we have established (A.15).
By Definition 3.20 applied to the object type α = [md :νd τd ]d∈D the properties D ⊆ D,
(A.11), (A.14), and (A.15) establish that indeed hj0 , ⌊Ψ0 ⌋j0 , {md =ld′ }d∈D i ∈ α. This finishes
the inductive proof of claim (A.8), and the proof of the lemma.
Lemma A.5 (SemInv: Method invocation). For all object types α = [md :νd τd ]d∈D and
for all e ∈ D, if Σ |= a : α and νe ∈ {+, ◦}, then Σ |= a.me : τe .
Proof. Let α = [md :νd τd ]d∈D . We assume that e ∈ D, νe ∈ {+, ◦}, and Σ |= a : α and show
that Σ |= a.me : τe . To this end, let k ≥ 0, σ and Ψ such that σ :k,Ψ Σ. From Σ |= a : α by
Definition 3.8 we get that
σ(a) :k,Ψ α
(A.16)
′
We need to show that σ(a).me :k,Ψ τe . Thus, let j < k, and consider heaps h and h and a
term b′ such that the following three conditions are fulfilled:
∧
h :k Ψ
hh, σ(a).me i →j hh ′ , b′ i
∧
hh ′ , b′ i9
(A.17)
From the second and third conjunct of (A.17) by the operational semantics we have that
for some i ≤ j, h ∗ and b∗
hh, σ(a)i →i hh∗ , b∗ i9
∧
hh ∗ , b∗ .mi →j−i hh ′ , b′ i
(A.18)
From the first conjunct together with (A.16) and the first conjunct of (A.17), by Definition 3.6 it follows that there exists a heap typing Ψ∗ such that
(k, Ψ) ⊑ (k − i, Ψ∗ )
∧
h ∗ :k−i Ψ∗
∧
hk − i, Ψ∗ , b∗ i ∈ α = [md :νd τd ]d∈D
By the definition of object types, the latter shows that there exists C and
b∗ = {mc =lc }c∈C , D ⊆ C and (Obj-1) and (Obj-2) hold:
′
α′ ∈ Type ∧
α k−i ⊆ ⌊α⌋k−i
α′
∀d ∈ D. hk − i, Ψ∗ , ld i ∈ refνd (α′ → τd )
as well as (Obj-3): for all j0 < k − i, all Ψ′ and all {mc =lc′ }c∈C ,
((k − i, Ψ∗ ) ⊑ (j0 , Ψ′ ) ∧ ∀c ∈ C. Ψ′ j0 (lc′ ) = ⌊Ψ∗ ⌋j0 (lc )) ⇒ hj0 , Ψ′ j0 , mc =lc′
(A.19)
such that
(A.20)
(A.21)
i ∈ α′
(A.22)
c∈C
From e ∈ D and νe ∈ {+, ◦} using (A.21) we deduce that ⌊Ψ∗ ⌋k−i (le ) ⊆ ⌊α′ → τe ⌋k−i . So
by expanding the definition of h ∗ :k−i Ψ∗ from (A.19) for k − i − 1 < k − i we have
(A.23)
hk − i − 1, ⌊Ψ∗ ⌋k−i−1 , h ∗ (le )i ∈ α′ → τe k−i
By the definition of the procedure type α′ → τe this means in particular that h ∗ (le ) must
be an abstraction, i.e., for some x and a′ , h ∗ (le ) = λ(x)a′ . Thus, since {mc =lc }c∈C ∈ CVal
40
C. HRIŢCU AND J. SCHWINGHAMMER
and e ∈ D ⊆ C, by (A.18), Red-Ctx, Red-Inv, Red-Beta and the operational semantics,
we obtain a reduction sequence of the form
hh, σ(a).me i →i hh ∗ , {mc =lc }c∈C .me i
→ hh∗ , (λ(x)a′ ) {mc =lc }c∈C i
→ hh∗ , {{x 7→ {mc =lc }c∈C }}(a′ )i
(A.24)
→j−i−2 hh′ , b′ i
Since k − i − 2 < k − i by Proposition A.2 we have that
(k − i, Ψ∗ ) ⊑ (k − i − 2, ⌊Ψ∗ ⌋k−i−2 )
(A.25)
We can now use the property (Obj-3) of the object type α: we instantiate (A.22) with
lc′ = lc , j0 = k − i − 2, and Ψ′ = ⌊Ψ∗ ⌋k−i−2 to obtain
hk − i − 2, ⌊Ψ∗ ⌋k−i−2 , {mc =lc }c∈C i ∈ α′
(A.26)
From this using (A.23) and from the definition of procedure types, it follows that
{{x 7→ {mc =lc }c∈C }}(a′ ) :k−i−2,⌊Ψ∗ ⌋k−i−2 τe
(A.27)
On the other hand, the second conjunct of (A.19) implies
h∗ :k−i−2 ⌊Ψ∗ ⌋k−i−2
(A.28)
by Definition 3.5, Proposition A.2 and the closure of types under state extension. Moreover,
by (A.24), hh ∗ , {{x 7→ {mc =lc }c∈C }}(a′ )i →j−i−2 hh ′ , b′ i, which by (A.17) is irreducible. This,
combined with (A.28) and (A.27), by Definition 3.6, means that there exists Ψ′′ such that
(k − i − 2, ⌊Ψ∗ ⌋k−i−2 ) ⊑ (k − j, Ψ′′ )
∧
h′ :k−j Ψ′′
∧
hk − j, Ψ′′ , b′ i ∈ τe
(A.29)
From the first conjunct above, the first conjunct in (A.19), and (A.25), using the transitivity
of state extension we obtain
(k, Ψ) ⊑ (k − j, Ψ′′ )
(A.30)
From (A.17), (A.30), and the second and third conjuncts of (A.29), by Definition 3.6 we
can conclude that σ(a).me :k,Ψ τe holds. This is what we needed to show.
Lemma A.6 (SemUpd: Method update). For all object types α = [md :νd τd ]d∈D and for
all e ∈ D, if Σ |= a : α and Σ[x := α] |= b : τe and νe ∈ {−, ◦}, then Σ |= a.me := ς(x)b : α.
Proof sketch. The proof is similar to that of Lemma A.5 (Method invocation). The existence
of some Ψ∗ such that
hh, σ(a).me := ς(x)σ(b)i →j hh∗ , {me =le }e∈E .me := ς(x)σ(b)i
with (k, Ψ) ⊑ (k − j, Ψ∗ ), h∗ :k−j Ψ∗ and hk − j, Ψ∗ , {me =le }e∈E i ∈ α follows from the
existence of a corresponding reduction sequence hh, σ(a)i →j hh∗ , {me =le }e∈E i. Since the
only reduction from hh∗ , {me =le }e∈E .me := ς(x)σ(b)i is by (Red-Upd) and results in the
configuration hh′ , {me =le }e∈E i where
h′ = h∗ [le := λ(x)σ(b)]
the proof of the lemma is essentially a matter of showing that h′ :k−j−1 ⌊Ψ∗ ⌋k−j−1 .
(A.31)
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
41
First, note that dom(Ψ∗ ) ⊆ dom(h′ ) = dom(h∗ ) holds, by h∗ :k−j Ψ∗ . Next, let
i < k − j − 1, and let l ∈ dom(Ψ∗ ). It remains to show that
hi, ⌊Ψ∗ ⌋i , h′ (l)i ∈ ⌊Ψ∗ (l)⌋k−j−1
Note that by the definition of hk − j, Ψ∗ , {me =le }e∈E i ∈ α (Definition 3.20)
there exists α′ ∈ Type such that ⌊α′ ⌋k−j ⊆ ⌊α⌋k−j , that D ⊆ E, and that
∀d ∈ D. hk − j, Ψ∗ , ld i ∈ refνd (α′ → τd )
(A.32)
it follows that
(A.33)
We now prove (A.32) by a case distinction on the location l:
• Case l = le . From (A.31) we have that h′ (le ) = λ(x)σ(b). Since e ∈ D ⊆ E and
νe ∈ {−, ◦} by assumption, (A.33) yields ⌊α′ → τe ⌋k−j ⊆ ⌊Ψ∗ ⌋k−j (le ). Since ⌊α′ ⌋k−j ⊆
⌊α⌋k−j , the subtyping lemma (SemSubProc) and the non-expansiveness of procedure
types yield ⌊α → τe ⌋k−j ⊆ ⌊Ψ∗ ⌋k−j (le ). The monotonicity of semantic approximation
therefore entails
⌊α → τe ⌋k−j−1 ⊆ ⌊Ψ∗ ⌋k−j−1 (le )
(A.34)
Additionally, the assumption Σ[x := α] |= b : τe gives λ(x)σ(b) :k−j,Ψ∗ α → τe . Since
0 ≤ i < k − j and h∗ :k−j Ψ∗ , Proposition A.3 yields hk − j, Ψ∗ , λ(x)σ(b)i ∈ α → τe . By
the closure under state extension, this implies hi, ⌊Ψ∗ ⌋i , λ(x)σ(b)i ∈ α → τe , from which
(A.32) follows by (A.34).
• Case l 6= le . This case is easier since the value in the heap does not change for this
location, i.e., h′ (l) = h∗ (l), so the result follows from the closure under state extension of
Ψ∗ (l).
Lemma A.7 (SemClone: Object cloning). For all object types α = [md :νd τd ]d∈D , if
Σ |= a : α then Σ |= clone a : α.
Proof sketch. The proof is similar to that of Lemma A.6 (Method update). Assuming
σ :k,Ψ Σ and h :k Ψ such that hh, clone σ(a)i halts in fewer than k steps, by appealing to
the operational semantics and the assumption that Σ |= a : α one obtains the existence of
some Ψ∗ such that
hh, clone σ(a)i →j hh∗ , clone {me =le }e∈E i → hh′ , b′ i
with (k, Ψ) ⊑ (k − j, Ψ∗ ), h∗ :k−j Ψ∗ and hk − j, Ψ∗ , {me =le }e∈E i ∈ α. Since the only reduction from hh∗ , clone {me =le }e∈E i is by (Red-Clone) it is clear that for some (distinct)
/ dom(h∗ ) we have
le′ ∈
h′ = h∗ le′ := h∗ (le ) e∈E ∧ b′ = me =le′ e∈E
(A.35)
If we set Ψ′ = Ψ∗ [le′ := Ψ∗ (le )]e∈E k−j−1 then it follows that (k, Ψ) ⊑ (k − j − 1, Ψ′ ), and
to establish the lemma it suffices to prove
h′ :k−j−1 Ψ′ ∧ hk − j − 1, Ψ′ , me =le′ e∈E i ∈ α
(A.36)
Observing that dom(Ψ′ ) ⊆ dom(h′ ) is satisfied, the first conjunct is proved by showing
that hi, ⌊Ψ′ ⌋i , h′ (l)i ∈ ⌊Ψ′ (l)⌋k−j−1 holds for all i < k − j − 1 and all l ∈ dom(Ψ′ ). This is
done by a case distinction on whether l ∈ dom(Ψ∗ ) or l = le′ for some e. In both cases, the
relation follows from h∗ :k−j Ψ∗ and the closure under state extension of types.
As for the second conjunct of (A.36), we note that Ψ′ is constructed from Ψ∗ such
that ⌊Ψ′ (le′ )⌋k−j−1 = ⌊Ψ∗ (le )⌋k−j−1 holds for all e ∈ E. Therefore, by unfolding the
definition of the object types for hk − j, Ψ∗ , {me =le }e∈E i ∈ α, condition (Obj-3) allows
42
C. HRIŢCU AND J. SCHWINGHAMMER
us to conclude that hk − j − 1, ⌊Ψ′ ⌋k−j−1 , {me =le′ }e∈E i ∈ ⌊α⌋k−j−1 . Then the required
hk − j − 1, Ψ′ , {me =le′ }e∈E i ∈ α follows from the fact that ⌊Ψ′ ⌋k−j−1 = Ψ′ holds by definition of Ψ′ , and that ⌊α⌋k−j−1 ⊆ α.
A.3. Subtyping Lemmas for Object Types.
Lemma A.8 (SemSubObj: Subtyping object types). E ⊆ D and for all e ∈ E if
νe ∈ {+, ◦} then αe ⊆ βe and if νe ∈ {−, ◦} then βe ⊆ αe imply that [md :νd αd ]d∈D ⊆
[me :νe βe ]e∈E .
Proof. We denote α = [md :νd αd ]d∈D and β = [me :νe βe ]e∈E . We assume that E ⊆ D and
∀e ∈ E. (νe ∈ {+, ◦} ⇒ αe ⊆ βe ) ∧ (νe ∈ {−, ◦} ⇒ βe ⊆ αe ),
(A.37)
and prove that for all heap typings Ψ, for all values v and all k ≥ 0, if hk, Ψ, vi ∈ α then
hk, Ψ, vi ∈ β, by complete induction on k. The induction hypothesis is that for all j < k if
hj, Ψ, vi ∈ α then hj, Ψ, vi ∈ β, or equivalently ⌊α⌋k ⊆ ⌊β⌋k .
If we assume that hk, Ψ, vi ∈ α, then by the definition of α (Definition 3.20) we have
that v = {mc =lc }c∈C , D ⊆ C and there exists α′ ∈ Type such that ⌊α′ ⌋k ⊆ ⌊α⌋k and
∀d ∈ D. hk, Ψ, ld i ∈ refνd (α′ → αd )
(A.38)
Moreover, condition (Obj-3) holds with respect to α, i.e., for all j < k, all Ψ′ and all
{me =le′ }e∈E such that (k, Ψ) ⊑ (j, Ψ′ ),
(∀e ∈ E. Ψ′ j (le′ ) = ⌊Ψ⌋j (le )) ⇒ hj, Ψ′ j , me =le′ e∈E i ∈ α′
(A.39)
From E ⊆ D and D ⊆ C by transitivity E ⊆ C. From ⌊α′ ⌋k ⊆ ⌊α⌋k and the induction
hypothesis ⌊α⌋k ⊆ ⌊β⌋k we get that ⌊α′ ⌋k ⊆ ⌊β⌋k , i.e., (Obj-1) holds. Moreover, (A.39)
entails that condition (Obj-3) also holds with respect to the object type β. So in order
to conclude that hk, Ψ, vi ∈ β, and therefore that α ⊆ β, all that remains to be proven is
condition (Obj-2):
∀e ∈ E. hk, Ψ, le i ∈ refνe (α′ → βe )
For this, we choose some e in E and do a case analysis on the variance annotation νe :
• Case νe = +. By (A.37) we deduce that αe ⊆ βe , thus by the covariance of the procedure
type constructor in its second argument (SemSubProc in Figure 6) we get that α′ →
αe ⊆ α′ → βe . But since E ⊆ D from (A.38) we know that hk, Ψ, le i ∈ ref+ (α′ → αe ).
Since the type constructor ref+ is covariant (SemSubCovRef in Figure 7) this implies
hk, Ψ, le i ∈ ref+ (α′ → βe ).
• Case νe = −. Similarly to the previous case, (A.37) gives us that βe ⊆ αe . Again by
the covariance of λξ. α′ → ξ (SemSubProc) we infer that α′ → βe ⊆ α′ → αe . From
(A.38) hk, Ψ, le i ∈ ref− (α′ → αe ), so by the contravariance of ref− (SemSubConRef in
Figure 7) we get that hk, Ψ, le i ∈ ref− (α′ → βe ).
• νe = ◦. Now (A.37) entails that αe = βe . Since hk, Ψ, le i ∈ ref◦ (α′ → αe ) by (A.38) we
immediately obtain that also hk, Ψ, le i ∈ ref◦ (α′ → βe ).
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
43
Lemma A.9 (SemSubObjVar: Subtyping object variances). If for all d ∈ D we have
νd = ◦ or νd = νd′ then [md :νd τd ]d∈D ⊆ [md :νd′ τd ]d∈D .
Proof. The proof proceeds similarly to the proof of Lemma A.8.
[md :νd τd ]d∈D and α′ = [md :νd′ τd ]d∈D . We assume that
Let us denote α =
∀d ∈ D. νd = ◦ ∨ νd = νd′
(A.40)
Let Ψ and v be arbitrary. We prove that for all k ≥ 0, if hk, Ψ, vi ∈ α then hk, Ψ, vi ∈ α′ ,
by complete induction on k. The induction hypothesis is that for all j < k if hj, Ψ, vi ∈ α
then hj, Ψ, vi ∈ α′ , or equivalently ⌊α⌋k ⊆ ⌊α′ ⌋k .
Assume that hk, Ψ, vi ∈ α, then by the definition of α we have that v = {me =le }e∈E ,
D ⊆ E, and there exists a type α′′ such that ⌊α′′ ⌋k ⊆ ⌊α⌋k and
∀d ∈ D. hk, Ψ, ld i ∈ refνd (α′′ → τd )
(A.41)
Moreover, condition (Obj-3) holds.
From ⌊α′′ ⌋k ⊆ ⌊α⌋k and the induction hypothesis ⌊α⌋k ⊆ ⌊α′ ⌋k by transitivity we get
that ⌊α′′ ⌋k ⊆ ⌊α′ ⌋k . This choice of α′′ also shows that (Obj-3) holds for hk, Ψ, vi with
respect to α′ . So in order to show that hk, Ψ, vi ∈ α′ , and therefore that α ⊆ α′ , all that
remains to be proven is that:
∀d ∈ D. hk, Ψ, ld i ∈ refνd′ (α′′ → τd )
We show this by case analysis on the disjunction in (A.40). Both cases are trivial:
• Case νd = ◦. From (A.41) and ref◦ (α′′ → τd ) ⊆ refνd′ (α′′ → τd ) (SemSubVarRef in
Figure 7) it is immediate that hk, Ψ, ld i ∈ refνd′ (α′′ → τd ).
• Case νd = νd′ , then the required statement is the same as (A.41).
A.4. Typing Lemmas with Structural Assumptions for Self Types.
Lemma A.10 (SemUpd-Str: Method update with structural assumptions). For all object
types α = [md :νd Fd ]d∈D and all α′ ∈ Type such that α′ ⊳ α, if e ∈ D, νe ∈ {−, ◦} and
Σ |= a : α′ and Σ[x := α′ ] |= b : Fe (α′ ), then Σ |= a.me := ς(x)b : α′ .
Proof. The proof is an adaptation of the proof given for Lemma A.6 (Method update)
above. Assume α = [md :νd Fd ]d∈D , e ∈ D, and νe ∈ {−, ◦}, and let α′ ∈ Type such that
α′ ⊳ α. Moreover assume that Σ |= a : α′ and Σ[x := α′ ] |= b : Fe (α′ ) hold. We show that
Σ |= a.me := ς(x)b : α′ .
Let k ≥ 0, σ be a value environment and Ψ be a heap typing such that σ :k,Ψ Σ. We
must prove that σ(a.me := ς(x)b) :k,Ψ α′ , so let h and j < k be such that
h :k Ψ
hh, σ(a).m e := ς(x)σ(b)i →j hh ′ , a′ i
∧
∧
hh ′ , a′ i9
→i
(A.42)
hh ′′ , a′′ i
By the operational semantics, this sequence is induced by hh, σ(a)i
for i ≤ j
′′
′′
′
′′
and some h and a , and by the assumption Σ |= a : α there exists some Ψ such that
(k, Ψ) ⊑ (k − i, Ψ′′ )
∧
h ′′ :k−i Ψ′′
∧
hk − i, Ψ′′ , a′′ i ∈ α′ ⊆ [md :νd Fd ]d∈D
(A.43)
In particular, a′′ is of the form {me =le }e∈E for some E ⊇ D, and by the operational semantics hh ′′ , a′′ .me := ς(x)σ(b)i → hh ′ , a′′ i. In particular, a′ is a′′ and h′ is h′′ [le := λ(x)σ(b)].
By choosing Ψ′ = ⌊Ψ′′ ⌋k−j , the first and last conjuncts of (A.43) yield
(k, Ψ) ⊑ (k − j, Ψ′ )
∧
hk − j, Ψ′ , a′′ i ∈ α′
44
C. HRIŢCU AND J. SCHWINGHAMMER
by Proposition A.2 and transitivity, and by closure under state extension of α′ . To establish
the lemma, it remains to show that h′ :k Ψ′ . For l ∈ dom(Ψ′ ) − {le } this follows from the
second conjunct of (A.43) by the closure under state extension. The interesting case is when
l = le and we must prove h′ (l) = λ(x)σ(b) :k−j Ψ′ (l). Since α′ ⊳ α and hk − j, Ψ′ , a′′ i ∈
α′ , condition (Obj-2-self) in Definition 5.2 (Self type exposure) yields hk − j, Ψ′ , le i ∈
refνe (α′ → Fe (α′ )). By assumption, νe ∈ {−, ◦} so Ψ′ (l) ⊇ ⌊α′ → Fe (α′ )⌋k−j holds by the
definition of refνe . Hence it suffices to prove that
λ(x)σ(b) :k−j,Ψ′ α′ → Fe (α′ )
which follows from the assumption Σ[x := α′ ] |= b : Fe (α′ ).
Proposition A.11 (Self type exposure). Let α be a self type and suppose hk, Ψ, vi ∈ α.
Then there exists α′′ ∈ Type such that α′′ ⊳ α and hk − 1, ⌊Ψ⌋k−1 , vi ∈ α′′ .
Proof. Suppose hk, Ψ, vi ∈ α = [md :νd Fd ]d∈D . By Definition 5.1 (Self types), this means
that there exists α′ ∈ Type such that ⌊α′ ⌋k ⊆ ⌊α⌋k and conditions (Obj-2-Self) and (Obj3) are satisfied. Choosing α′′ = ⌊α′ ⌋k , it is clear that α′′ ⊳ α since all the conditions only
rely on α′ to approximation k. Moreover, by instantiating Ψ′ = Ψ and {me =le′ }e∈E = v in
(Obj-3) we obtain that hk − 1, ⌊Ψ⌋k−1 , vi ∈ α′′ . This proves the proposition.
Lemma A.12 (SemLet-Str: Introducing structural assumptions). Let α = [md :νd Fd ]d∈D
and suppose that Σ |= a : α and that Σ[x := ξ] |= b : β for all ξ ∈ Type with ξ ⊳ α. Then
Σ |= let x = a in b : β.
Proof. Let α = [md :νd Fd ]d∈D and suppose that Σ |= a : α and that Σ[x := ξ] |= b : β for all
ξ ∈ Type with ξ ⊳ α. We must show that Σ |= let x = a in b : β. Thus, let k ≥ 0, Ψ and σ
be such that σ :k,Ψ Σ. By the definition of the semantic typing judgement (Definition 3.8)
we must show that σ(let x = a in b) :k,Ψ β, or equivalently (after suitable α-renaming and
removing the syntactic sugar) that
(λ(x)σ(b)) σ(a) :k,Ψ β
Suppose j < k, h, h′ and b′ are such that
h :k Ψ
∧
hh, (λ(x)σ(b)) σ(a)i →j hh′ , b′ i
∧
hh′ , b′ i9
(A.44)
From the second and third conjunct of (A.44) by the operational semantics we have that
for some i ≤ j < k, some h′′ and some Ψ′′ ,
hh, σ(a)i →i hh′′ , a′′ i9
hh ′′ , (λ(x)σ(b)) a′′ i →j−i hh ′ , b′ i
∧
(A.45)
From the first conjunct together with the assumption Σ |= a : α and the first conjunct of
(A.44), by Definition 3.6 it follows that there exists a heap typing Ψ′′ such that
(k, Ψ) ⊑ (k − i, Ψ′′ )
∧
h ′′ :k−i Ψ′′
∧
hk − i, Ψ′′ , a′′ i ∈ α = [md :νd Fd ]d∈D
(A.46)
In particular, a′′ ∈ Val and the operational semantics gives
hh, (λ(x)σ(b)) (σ(a))i →i hh′′ , (λ(x)σ(b)) a′′ i → hh ′′ , σ x := a′′ (b)i →j−i−1 hh ′ , b′ i (A.47)
From the third conjunct of (A.46) by Proposition A.11 there exists α′ ∈ Type such that
α′ ⊳ α and hk − i − 1, ⌊Ψ′′ ⌋k−i−1 , a′′ i ∈ α′ . From σ :k,Ψ Σ, the first conjunct of (A.46),
Propositions A.1 and A.2 and the closure under state extension, this yields
σ x := a′′ :k−i−1,⌊Ψ′′ ⌋k−i−1 Σ x := α′
(A.48)
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
45
Since α′ ⊳ α, by instantiating the universally quantified type ξ in the hypothesis on b we
obtain that Σ[x := α′ ] |= b : β. Therefore, (A.48) gives σ[x := a′′ ](b) :k−i−1,⌊Ψ′′ ⌋k−i−1 β.
Clearly h′′ :k−i−1 ⌊Ψ′′ ⌋k−i−1 by the second conjunct of (A.46), so that the second conjunct
of (A.45) shows that there is some Ψ′ such that (k, Ψ) ⊑ (k −i−1, ⌊Ψ′′ ⌋k−i−1 ) ⊑ (k − j, Ψ′ ),
h ′ :k−j Ψ′ and hk−j, Ψ′ , b′ i ∈ β, by Definition 3.6. This establishes that σ(let x = a in b) :k,Ψ
β holds as required.
We next define a recursive type of records {| md :νd Fd |}d∈D , which is the type arising
from the recursive record interpretation of (imperative) objects [18]. While this type does
not give rise to non-trivial subtyping, we will show that it satisfies {| md :νd Fd |}d∈D ⊳
[md :νd Fd ]d∈D .
Definition A.13. Assume Fd : Type → Type are monotonic and non-expansive type constructors, for all d ∈ D. Then let β = {| md :νd Fd |}d∈D be defined as the set of all triples
hk, Ψ, {md =ld }d∈D i such that
(∀d ∈ D. hk, Ψ, ld i ∈ refνd (β → Fd (β)))
∧ (∀j < k. ∀Ψ′ . ∀ me =le′ e∈E .
(k, Ψ) ⊑ (j, Ψ′ ) ∧ (∀d ∈ D. Ψ′ j (ld′ ) = ⌊Ψ⌋j (ld )) ⇒ hj, Ψ′ j , md =ld′
(Rec-1)
(Rec-2)
d∈D
i ∈ β)
Note that the recursive specification of β is well-founded, i.e., β is well-defined. Moreover,
β is a type, i.e., it is closed under state extension.
Proposition A.14. For all self types [md :νd Fd ]d∈D we have that
{| md :νd Fd |}d∈D ⊳ [md :νd Fd ]d∈D
Proof. Let α = [md :νd Fd ]d∈D and β = {| md :νd Fd |}d∈D for some arbitrary monotonic
and non-expansive type constructors Fd . It is clear that for all hk, Ψ, {md =ld }d∈D i ∈ β,
conditions (Obj-2-Self) and (Obj-3) from Definition 5.2 are satisfied, by the definition of
β (Definition A.13). It remains to prove that β ⊆ α. We establish this by showing that for
all k ≥ 0, ⌊β⌋k ⊆ ⌊α⌋k , by complete induction on k. Let hk, Ψ, {md =ld }d∈D i ∈ β; we need
to show that hk, Ψ, {md =ld }d∈D i ∈ α. We have that D ⊆ D and we choose α′ = β which
is a type and fulfills ⌊β⌋k ⊆ ⌊α⌋k (Obj-1) by the induction hypothesis. The conditions
(Obj-2-Self) and (Obj-3) in Definition 5.1 (Self types) are exactly the same as conditions
(Rec-1) and (Rec-2) in the definition of β (Definition A.13), which concludes the proof.
Lemma A.15 (SemObj-Str: Object construction with structural assumptions). Let α =
[md :νd Fd ]d∈D and suppose that for all d ∈ D and all ξ ∈ Type with ξ ⊳ α, Σ[x := ξ] |= bd :
Fd (ξ). Then Σ |= [md =ς(xd )bd ]d∈D : α.
Proof. Let α = [md :νd Fd ]d∈D and assume that
∀d∈D. ∀ξ∈Type. ξ ⊳ α ⇒ Σ[xd := ξ] |= bd : Fd (ξ)
(A.49)
We must show that Σ |= [md =ς(xd )bd ]d∈D : α. Thus, let k ≥ 0, σ be a value environment
and Ψ be a heap typing such that σ :k,Ψ Σ. By Definition 3.8 we need to show that
σ([md =ς(xd )bd ]d∈D ) :k,Ψ α. Equivalently (after suitable α-renaming), we show that
[md =ς(xd )σ(bd )]d∈D :k,Ψ α
Suppose j <
k, h, h′
and
h :k Ψ
∧
b′
are such that the following three conditions are fulfilled:
hh, [md =ς(xd )σ(bd )]d∈D i →j hh′ , b′ i
∧
hh′ , b′ i9
(A.50)
46
C. HRIŢCU AND J. SCHWINGHAMMER
By the operational semantics Red-Obj is the only rule that applies, which means that
necessarily j = 1 and for some distinct ld 6∈ dom(h) we have b′ = {md =ld }d∈D and
h′ = h [ld := λ(xd )σ(bd )]d∈D
(A.51)
Let β = {| md :νd Fd |}d∈D , as in Definition A.13. We choose
Ψ′ = Ψ [ld := (β → Fd (β))]d∈D k−1
(A.52)
and show that
(k, Ψ) ⊑ (k − 1, Ψ′ )
∧
h′ :k−1 Ψ′
∧
hk − 1, Ψ′ , b′ i ∈ α
(A.53)
Ψ′
The first conjunct of (A.53) holds by the construction of
(A.52). In order to show the
second conjunct, let i < k − 1 and l ∈ dom(Ψ′ ). We now need to show that hi, ⌊Ψ′ ⌋i , h′ (l)i ∈
Ψ′ (l). In case l ∈ dom(Ψ) the proof proceeds exactly as for Lemma A.4, so we only consider
the case when l = ld for some d ∈ D. From (A.51) and (A.52) we get that
h′ (l) = λ(xd )σ(bd )
∧
Ψ′ (l) = ⌊β → Fd (β)⌋k−1
Thus we need to show that
hi, Ψ′ i , λ(xd )σ(bd )i ∈ ⌊β → Fd (β)⌋k−1
(A.54)
By Proposition A.14 we obtain that β ⊳ α, so we can instantiate the universally quantified
ξ in (A.49) with β and obtain that
Σ[xd := β] |= bd : Fd (β)
By SemLam in Figure 6 (Lemma 3.15) this gives us that
Σ |= λ(xd )bd : β → Fd (β)
From this and σ :k,Ψ Σ by Definition 3.8 we obtain
λ(xd )σ(bd ) :k,Ψ β → Fd (β)
(A.55)
Since k > 1 and from (A.50) h :k Ψ, Proposition A.3 shows that (A.55) implies
hk, Ψ, λ(xd )σ(bd )i ∈ β → Fd (β)
(A.56)
By Proposition A.2 we get that (k−1, Ψ′ ) ⊑ (i, ⌊Ψ′ ⌋i ), which together with the first conjunct
of (A.53) and the transitivity of ⊑ yields (k, Ψ) ⊑ (i, ⌊Ψ′ ⌋i ). Since each β → Fd (β) is closed
under state extension, the latter property and (A.56) imply the required (A.54).
Finally, we need to show the third conjunct of (A.53), i.e., hk − 1, Ψ′ , {md =ld }d∈D i ∈ α.
To this end, we prove the following more general claim:
Claim: For all j0 ≥ 0, for all Ψ0 and for all {md =ld′ }d∈D
(k − 1, Ψ′ ) ⊑ (j0 , Ψ0 ) ∧ (∀d ∈ D. ⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld ))
⇒ hj0 , ⌊Ψ0 ⌋j0 , md =ld′ d∈D i ∈ β (A.57)
From this and ⌊Ψ′ ⌋k−1 = Ψ′ , the last conjunct of (A.53) follows by taking j0 = k − 1,
Ψ0 = Ψ′ , and ld′ = ld for all d ∈ D, and by observing that ⊑ is reflexive (Proposition A.1)
and β ⊆ α (since β ⊳ α).
The claim above is proved by complete induction on j0 . So assume j0 ≥ 0 and Ψ0 are
such that
(k − 1, Ψ′ ) ⊑ (j0 , Ψ0 )
(A.58)
A STEP-INDEXED SEMANTICS OF IMPERATIVE OBJECTS
47
Moreover, for all d ∈ D let ld′ ∈ dom(Ψ0 ) such that
⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld )
(A.59)
We show that hj0 , ⌊Ψ0 ⌋j0 , {md =ld′ }d∈D i ∈ β, by checking that the two conditions from the
definition of β (Definition A.13) are satisfied. By the construction of Ψ′ in (A.52), together
with (A.58) and (A.59), it follows that for all d ∈ D
⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld ) = ⌊β → Fd (β)⌋j0
(A.60)
By the definition of reference types (Definition 3.16) this implies that
∀d ∈ D. hj0 , ⌊Ψ0 ⌋j0 , ld′ i ∈ ref◦ (β → Fd (β))
(A.61)
By the lemma for subtyping reference types (SemSubVarRef in Figure 7) we then obtain
property (Rec-1):
∀d ∈ D. hj0 , ⌊Ψ0 ⌋j0 , ld′ i ∈ refνd (β → Fd (β))
(A.62)
Second, we must prove (Rec-2), i.e., that for all j < j0 , Ψ1 and {md =ld′′ }d∈D
(j0 , Ψ0 ) ⊑ (j, Ψ1 ) ∧ (∀d ∈ D. ⌊Ψ1 ⌋j (ld′′ ) = ⌊Ψ0 ⌋j (ld′ ))
⇒ hj, ⌊Ψ1 ⌋j , md =ld′′
d∈D
i ∈ β (A.63)
Note that this last condition holds vacuously in the base case of the induction, when j0 = 0.
So assume j < j0 and Ψ1 and ld′′ are such that (j0 , Ψ0 ) ⊑ (j, Ψ1 ) and ⌊Ψ1 ⌋j (ld′′ ) = ⌊Ψ0 ⌋j (ld′ )
for all d ∈ D. Now j < j0 and assumption (A.59) yield that for all d ∈ D
k
j
j
k
⌊Ψ1 ⌋j (ld′′ ) = ⌊Ψ0 ⌋j (ld′ ) = ⌊Ψ0 ⌋j0 (ld′ ) = Ψ′ j0 (ld ) = Ψ′ j (ld )
j
j
1, Ψ′ )
Moreover, from (k −
⊑ (j0 , Ψ0 ) (A.58) and (j0 , Ψ0 ) ⊑ (j, Ψ1 ), by the transitivity of ⊑
we have that (k − 1, Ψ′ ) ⊑ (j, Ψ1 ). Since j < j0 , the induction hypothesis of the claim gives
hj, ⌊Ψ1 ⌋j , md =ld′′ d∈D i ∈ β
and we have established (A.63).
By Definition A.13 applied to the type β = {| md :νd Fd |}d∈D the properties (A.62),
and (A.63) establish that indeed hj0 , ⌊Ψ0 ⌋j0 , {md =ld′ }d∈D i ∈ β. This finishes the inductive
proof of claim (A.57), and the proof of the lemma.
A.5. Subtyping Lemma for Generalized Object Types.
Lemma A.16 (SemSubGen-Obj: Subtyping generalized object types). If E ⊆ D and for
r
r
w
r
w
r
all e ∈ E we have that βew ⊆ αw
e and αe ⊆ βe then [md : (αd , αd ) ]d∈D ⊆ [me : (βe , βe ) ]e∈E .
w
r
r
Proof. Denote α = [md : (αw
d , αd ) ]d∈D , β = [me : (βe , βe ) ]e∈E , and assume E ⊆ D and
r
r
∀e ∈ E. (βew ⊆ αw
e ∧ αe ⊆ βe ).
(A.64)
We prove that for all heap typings Ψ, for all values v and all k ≥ 0, if hk, Ψ, vi ∈ α then
hk, Ψ, vi ∈ β, by complete induction on k. The induction hypothesis is that ⌊α⌋k ⊆ ⌊β⌋k .
If we assume that hk, Ψ, vi ∈ α, then by the definition of α (Definition 3.20 with
condition (Obj-2-Gen) instead of (Obj-2)) we have that v = {mc =lc }c∈C , D ⊆ C and
there exists α′ ∈ Type such that ⌊α′ ⌋k ⊆ ⌊α⌋k and
′
r
∀d ∈ D. hk, Ψ, ld i ∈ ref(α′ → αw
d , α → αd )
(A.65)
48
C. HRIŢCU AND J. SCHWINGHAMMER
Moreover, condition (Obj-3) holds with respect to α, i.e., for all j < k, all Ψ′ and all
{me =le′ }e∈E such that (k, Ψ) ⊑ (j, Ψ′ ),
(∀e ∈ E. Ψ′ j (le′ ) = ⌊Ψ⌋j (le )) ⇒ hj, Ψ′ j , me =le′ e∈E i ∈ α′
(A.66)
From E ⊆ D and D ⊆ C by transitivity E ⊆ C. From ⌊α′ ⌋k ⊆ ⌊α⌋k and the induction
hypothesis ⌊α⌋k ⊆ ⌊β⌋k we get that ⌊α′ ⌋k ⊆ ⌊β⌋k , i.e., (Obj-1) holds. Moreover, (A.66)
entails that condition (Obj-3) also holds with respect to the object type β. So in order to
conclude that hk, Ψ, vi ∈ β, all that remains to be proven is condition (Obj-2-Gen):
∀e ∈ E. hk, Ψ, le i ∈ ref(α′ → βew , α′ → βer )
(A.67)
Let e ∈ E. Since the procedure type constructor is covariant in the result type (SemSubProc in Figure 6) assumption A.64 implies that
′
r
′
r
α′ → βew ⊆ α′ → αw
e ∧ α → αe ⊆ α → βe
From this by (SemSubRef-Gen) we get that
′
r
′
w
′
r
ref(α′ → αw
e , α → αe ) ⊆ ref(α → βe , α → βe )
This together with A.65 and E ⊆ D directly implies A.67, which concludes the proof.
This work is licensed under the Creative Commons Attribution-NoDerivs License. To view
a copy of this license, visit http:// reative ommons.org/li enses/by-nd/2.0/ or send a
letter to Creative Commons, 171 Second St, Suite 300, San Francisco, CA 94105, USA, or
Eisenacher Strasse 2, 10777 Berlin, Germany
| 6cs.PL
|
Submitted to IEEE Transactions on Signal Processing
Efficient L1-Norm Principal-Component Analysis
via Bit Flipping
Panos P. Markopoulos†, Sandipan Kundu▽ , Shubham Chamadia‡ , and Dimitris A. Pados‡∗
arXiv:1610.01959v1 [cs.DS] 6 Oct 2016
†
Department of Electrical and Microelectronic Engineering
Rochester Institute of Technology
Rochester, NY 14623 USA
E-mail: [email protected]
▽
Qualcomm Technologies, Inc.
San Jose, CA 95110 USA
E-mail: [email protected]
‡
Department of Electrical Engineering
State University of New York at Buffalo
Buffalo, NY 14260 USA
E-mail: {shubhamc, pados}@buffalo.edu
EDICS: MLR-ICAN, MLR-LEAR, MLR-PATT, MDS-ALGO, SSP-SSAN
Submitted: September 22, 2016
Abstract
It was shown recently that the K L1-norm principal components (L1-PCs) of a real-valued data matrix X ∈
RD×N (N data samples of D dimensions) can be exactly calculated with cost O(2N K ) or, when advantageous,
O(N dK−K+1 ) where d = rank(X), K < d [1], [2]. In applications where X is large (e.g., “big” data of large N
and/or “heavy” data of large d), these costs are prohibitive. In this work, we present a novel suboptimal algorithm
for the calculation of the K < d L1-PCs of X of cost O(N Dmin{N, D} + N 2 (K 4 + dK 2 ) + dN K 3 ), which
is comparable to that of standard (L2-norm) PC analysis. Our theoretical and experimental studies show that the
proposed algorithm calculates the exact optimal L1-PCs with high frequency and achieves higher value in the L1-PC
optimization metric than any known alternative algorithm of comparable computational cost. The superiority of the
calculated L1-PCs over standard L2-PCs (singular vectors) in characterizing potentially faulty data/measurements is
demonstrated with experiments on data dimensionality reduction and disease diagnosis from genomic data.
Index Terms — Dimensionality reduction, data analytics, eigen-decomposition, L1 norm, L2 norm, machine
learning, outlier resistance, principal component analysis, subspace signal processing.
∗
Corresponding author.
A part of this paper was presented in IEEE Intern. Conf. on Acoust., Speech, and Signal Processing (ICASSP), Florence, Italy, May 2014
[3]. This work was supported in part by the National Science Foundation under Grant ECCS-1462341 and the Office of the Vice President
for Research of Rochester Institute of Technology.
I. I NTRODUCTION
Principal-Component Analysis (PCA) [4] has been a “mainstay” of signal processing, machine learning, pattern
recognition, and classification [5]–[7] for more than a century. Numerous important applications of PCA can
be found in the fields of wireless communications, computer networks, computer vision, image processing, bioinformatics/genomics, and neuroscience, to name a few. Broadly speaking, PCA seeks to calculate orthogonal
directions that define a subspace wherein data presence is maximized. Traditionally, PCA quantifies data presence
by the Frobenius (L2) norm of the projected data onto the subspace, or, equivalently, the Euclidean distance of the
original data from their subspace representations (L2-norm of residual error). Herein, we will be referring to standard
PCA as L2-PCA. Key strengths of L2-PCA are (i) its low-complexity implementation (quadratic in the number of
data points) by means of singular-value decomposition (SVD) of the data matrix and (ii) the reliable approximation
that it offers to the nominal principal data subspace, when calculated over sufficiently many clean/nominal or
benign-noise corrupted data points.
In the advent of the big-data era, datasets often include grossly corrupted, highly deviating, irregular data points
(outliers), due to a variety of causes such as transient sensor malfunctions, errors in data transmission/transcription,
errors in training data labeling, and bursty-noise data corruption, to name a few [8], [9]. Regretfully, standard
L2-PCA is well-known to be fragile in the presence of such faulty data, even when they appear in a vanishingly
small fraction of the training set [10]. The reason is that the L2-norm objective of standard PCA (minimization
of error variance or maximization of squared projection magnitude) gives squared importance on the magnitude of
every datum, thus overemphasizing peripheral data points.
To remedy the impact of outliers, researchers from the fields of data analysis and signal processing have long
focused on calculating subspaces of minimum absolute error deviations, instead of minimum error variances.
Important early theoretical studies date back to the 1940s [11]–[14]. In the past decade, there have been several
L1-norm-based principal component calculators under the general label “L1-PCA” [3], [15]–[37]. In these works,
researchers seek either to (i) minimize the aggregate absolute data representation error or (ii) maximize the aggregate
absolute magnitude of the projected data points. For approach (i), it has been shown that the error surface is
non-smooth and the problem non-convex, resisting attempts to reach an exact solution even with exponential
computational cost [38]. Therefore, only suboptimal algorithms exist in the literature [15]–[18]. For approach (ii),
a problem known as maximum-projection L1-PCA, the works in [1], [2] proved that maximum-projection L1PCA is not NP-hard for fixed data dimension D and offered the first two optimal algorithms in the literature
for exact calculation. Specifically, for a data record of size N , X ∈ RD×N , the first optimal algorithm solves
2
L1-PCA exactly with complexity O(2N K ); the second optimal algorithm solves L1-PCA exactly with complexity
O(N rank(X)K−K+1 ) where K < rank(X) is the desired number of L1-PCs. Before the results of [1], [2], several
low-complexity suboptimal algorithms for L1-PCA existed in the literature [19]–[22]. However, in lack of the
optimal solution, no absolute performance evaluation of those algorithms with respect to the L1-PCA metric could
be conducted until [1], [2] made the optimal value available. Today, optimal-solution-informed experimental studies
indicate that the existing low-cost approximate algorithms for L1-PCA yield non-negligible performance degradation,
in particular when more than one principal component is calculated.
In this present work, we introduce L1-BF, a bit-flipping based algorithm for the calculation of the K L1-PCs
of any rank-d data matrix X ∈ RD×N with complexity O(N Dmin{N, D} + N 2 (K 4 + dK 2 ) + N dK 3 ). The
proposed algorithm is accompanied by: (i) Formal proof of convergence and theoretical analysis of converging
points; (ii) detailed asymptotic complexity derivation; (iii) theoretically proven performance guarantees; (iv) L1PCA performance comparisons with state-of-the-art counterparts of comparable computational cost [19]–[22]; and
(v) outlier-resistance experiments on dimensionality reduction, foreground motion detection in surveillance videos,
and disease diagnosis from genomic data. Our studies show that L1-BF outperforms all suboptimal counterparts of
comparable cost with respect to the L1-PCA metric and retains high outlier-resistance similar to that of optimal
L1-PCA. Thus, the proposed algorithm may bridge the gap between computationally efficient and outlier-resistant
principal component analysis.
The rest of the paper is organized as follows. Section II presents the problem statement and reviews briefly
pertinent technical background. Section III is devoted to the development and analysis of the proposed algorithm.
Extensive experimental studies are presented in Section IV. A few concluding remarks are drawn in Section V.
II. P ROBLEM S TATEMENT
AND
BACKGROUND
Given a data matrix X = [x1 , x2 , . . . , xN ] ∈ RD×N of rank d ≤ min{D, N }, we are interested in calculating a
low-rank data subspace of dimensionality K < d in the form of an orthonormal basis QL1 ∈ RD×K that solves
QL1 =
argmax
Q=[q1 ,...,qK ]∈RD×K
Q⊤ Q=IK
K
X
k=1
X⊤ qk
1
.
(1)
In (1), k·k1 denotes the element-wise L1-norm of the vector/matrix argument that returns the sum of the absolute
values of the individual entries. [1], [2] and [22] presented different proofs that L1-PCA in the form of (1) is
formally NP-hard problem in jointly asymptotic N , d. Suboptimal algorithms (with non-negligible performance
degradation) for approximating the solution in (1) were proposed in [19]–[22]. [1], [2] showed for the first time
3
that for fixed data dimension D , (1) is not NP-hard and presented two optimal algorithms for solving it.
Below, we review briefly the optimal solution to (1) and the suboptimal algorithms that exist in the literature.
A. Optimal Solution
△
For any matrix A ∈ Rm×n , m > n, that admits SVD A = UΣn×n VT , define U (A) = UV⊤ . Let k · k∗ denote
nuclear norm. In [1], [2] it was shown that, if
Bopt = argmax kXBk∗ ,
(2)
QL1 = U (XBopt )
(3)
B∈{±1}N ×K
then
is a solution to (1). In addition, Q⊤
L1 X
1
= kXBopt k∗ and Bopt = sgn(X⊤ QL1 ) [1], [2].
For K = 1, (2) takes the binary quadratic form1
bopt = argmax kXbk22
(4)
b∈{±1}N
and the L1-principal component of X is given by
qL1 = U (Xbopt ) = Xbopt kXbopt k−1
2 .
In addition, X⊤ qL1
1
(5)
= kXbopt k∗ = kXbopt k2 and bopt = sgn(X⊤ qL1 ).
In view of (2), (3), the first optimal algorithm in [1], [2] performs an exhaustive search over the size-2N K
candidate set {±1}N ×K to obtain a solution Bopt to (2); then QL1 is returned by SVD on XBopt .2 The second
optimal algorithm in [1], [2], of polynomial complexity, constructs and searches inside a subset of {±1}N ×K
wherein a solution to (2) is proven to exist. Importantly, for d constant with respect to N , the cost to construct and
search exhaustively within this set is O(N dK−K+1 ).
From (2)-(5), it is seen that, in contrast to L2-PCA, in L1-PCA the scalability principle does not hold. That
is, qL1 =
argmax
q∈RD×1 ;
kqk2 =1
kX⊤ qk1 is not (in general) a column of QL1 =
argmax
Q∈RD×K ;
Q⊤ Q=IK
kX⊤ Qk1 for some
For every a ∈ Rd , the nuclear and euclidean norm trivially coincide, i.e., kak∗ = kak2 .
In practice, the exhaustive-search optimal algorithm takes advantage of the nuclear-norm invariability to negations and permutations of
N −1
the columns of the matrix argument and searches exhaustively in a size- 2 K+K−1 subset of {±1}N×K wherein a solution to (2) is
guaranteed to exist.
1
2
4
K > 1. Therefore, the size-(K > 1) L1-PCA problem cannot be translated into a series of size-(K = 1) L1-PC
problems simply by projecting the data-matrix onto the null-space of the previous solutions.
B. State-of-the-art Approximate Algorithms
1) Fixed-point Iterations with Successive Nullspace Projections [19], [20]: Kwak et al. [19], [20] made an
important early contribution to the field by proposing a fixed point (FP) iteration to approximate the K = 1 L1-PC
solution. Following our formulation and notation in Section II, the algorithm has the iterative form
b(t) = sgn X⊤ Xb(t−1) , t = 2, 3, . . . ,
(6)
where b(1) is an arbitrary initialization point in {±1}N . For any initialization, (6) is guaranteed to converge to a fixed
point of sgn X⊤ Xb in Φ(X) = {b ∈ {±1}N : b = sgn(X⊤ Xb)}. Then, the L1-PC can be approximated by
(t)
qfp = Xbfp kXbopt k−1
2 where bfp is the converging point of the iteratively generated sequence {b }. For K > 1,
L1-PCs are approximated sequentially in a greedy fashion. That is, the kth L1-PC qfp,k , k > 1, is calculated by the
above procedure, having replaced X by its projection onto the nullspace of the previously calculated components,
Pk−1
qfp,i q⊤
(ID − i=1
fp,i )X. The complexity of this algorithm is O(M N DK) where M is the maximum number of
iterations per component. Considering M to be bounded by a linear function of N , or practically terminating the
iterations at most at N , the complexity of this algorithm can be expressed as O(N 2 DK).
2) Iterative Alternating Optimization (Non-greedy) [21]: Nie et al. [21] offered a significant advancement for
the case K > 1. Following, again, our formulation and notation, they proposed a converging iterative algorithm
that, initialized at an arbitrary orthonormal matrix Q(1) ∈ RD×K , calculates
B(t) = sgn X⊤ Q(t−1)
and
Q(t) = U XB(t) , t = 2, 3, . . . .
(7)
The solution to (1) is approximated by the convergence point of the generated sequence {Q(t) }, say Qao . Notice
that, for K = 1, the algorithm coincides with the one in [19]. The computational complexity of (7) is O(T (N D +
K 2 )) where T is the maximum number of iterations per component. Considering T to be bounded by a linear
function of N K , or practically terminating the iterations at most at N K , the complexity of the algorithm becomes
O(N 2 DK + N K 3 ).
5
3) SDP with Successive Nullspace Projections [22]: McCoy and Tropp [22] suggested a novel semi-definite
programming (SDP) view of the problem. The binary-optimization problem in (4) can be rewritten as
maximize
N
Z∈S+ , [Z]n,n =1 ∀n
rank(Z)=1
Tr ZX⊤ X
(8)
N the set of positive semi-definite matrices in RN ×N . Specifically, if Z
where S+
opt is the solution to (8), then any
column of Zopt is a solution to (4). Then, the algorithm relaxes the non-convex rank constraint in (8) and finds
instead the solution Zsdp to the convex semi-definite program
maximize
N
Z∈S+ , [Z]n,n =1 ∀n
Tr ZX⊤ X .
(9)
In this present paper’s notation, to obtain an approximation to bopt , say bsdp , the algorithm factorizes Zsdp =
WW⊤ , W ∈ RN ×N , and calculates L instances of b = sgn W⊤ a for vectors a drawn from N (0N , IN ) (L-
instance Gaussian randomization). bsdp is chosen to be the instance that maximizes kXbk2 and the solution to (1)
is approximated by qsdp = Xbsdp kXbsdp k−1
2 . For K > 1, similar to [19], [22] follows the method of sequential
Pk−1
qsdp,i q⊤
nullspace projections calculating the kth L1-PC qsdp,k as the L1-PC of (ID − i=1
sdp,i )X. The complexity
to solve within ǫ accuracy the SDP in (9) is O(N 3.5 log(1/ǫ)) [39]. Thus, the overall computational cost of the
algorithm is O(KN 3.5 log(1/ǫ) + KL(N 2 + DN )).
III. P ROPOSED A LGORITHM
We begin our new algorithmic developments with the following Proposition.
SVD
⊤
Proposition 1. Assume that data matrix X admits compact singular-value decomposition X = UD×d Σd×d VN
×d ∈
RD×N where d = rank(X) ≤ min{D, N } and define
△
Y = [y1 , y2 , . . . , yN ] = ΣV⊤ ∈ Rd×N .
(10)
Then, for any B ∈ {±1}N ×K , kXBk∗ = kYBk∗ .
Proof: Notice that
X⊤ X = VΣU⊤ UΣV⊤ .
√
(11)
√
B⊤ X⊤ XB = Tr
B⊤ Y ⊤ YB = kYBk∗ where for any positive semi-definite
√ √
symmetric matrix A ∈ Rm×m , A A = A.
Thus, kXBk∗ = Tr
6
By Proposition 1, the proposed algorithm will attempt to find a solution to (2) by solving instead the reduced-size
problem
Bopt = argmax kYBk∗ ,
(12)
bopt = argmax kYbk22 .
(13)
B∈{±1}N ×K
which for K = 1 takes the form
b∈{±1}N ×1
This problem-size reduction, with no loss of optimality so far, contributes to the low cost of the proposed algorithm.
In the sequel, we present separately the cases K = 1 and K > 1.
A. Calculation of the L1-Principal Component (K = 1)
First, we attempt to find efficiently a quality approximation to bopt in (13), say bbf , by a bit-flipping search
procedure. Then, per (5),
qbf = Xbbf kXbbf k−1
2
(14)
will be the suggested L1-principal component of the data. Proposition 2, presented herein for the first time, bounds
the L1 error metric of interest by L2-norm differences.
Proposition 2. For any b ∈ {±1}N and corresponding q = Xb kXbk−1
2 ,
X⊤ qL1
1
− X⊤ q
1
≤ kYbopt k2 − kYbk2
(15)
with equality if b = sgn(Y ⊤ Yb)=sgn(X⊤ Xb).
Proof: By (2)-(5) and Proposition 1,
X⊤ qL1
1
− X⊤ q
1
= kXbopt k2 − X⊤ Xb
= kYbopt k2 − Y ⊤ Yb
1
1
kXbk−1
2
kYbk−1
2
= kYbopt k2 − (maxz∈{±1}N z⊤ Y ⊤ Yb) kYbk−1
2
≤ kYbopt k2 − b⊤ Y ⊤ Yb kYbk−1
2
= kYbopt k2 − kYbk2 .
(16)
Equality holds when b = sgn(Y ⊤ Yb) = argmaxz∈{±1}N z⊤ Y ⊤ Yb.
7
In particular, by Proposition 2, the performance degradation in the L1-PCA metric kX⊤ qk1 when q = Xb kXbk−1
2
is used instead of the optimal qL1 is upper bounded by the performance degradation in the metric of (13) when b
is used instead of the optimal bopt .
In view of Proposition 2, the proposed algorithm operates as follows. The algorithm initializes at a binary vector
b(1) and employs bit-flipping (BF) iterations to generate a sequence of binary vectors {b(t) }. At each iteration
step, the algorithm browses all bits that have not been flipped before kept in an index-set3 L. Then, the algorithm
negates (flips) the single bit in L that, when flipped, offers the highest increase in the metric of (13). If no bit
exists in L the negation of which increases the quadratic metric (13), then L is reset to {1, 2, . . . , N } and all N
bits become eligible for flipping consideration again. The iterations terminate when metric (13) cannot be further
increased by any single-bit flipping.
Mathematically, at tth iteration step, t ≥ 1, the optimization objective (13) is
Yb(t)
2
2
X
= kYk2F +
(t) ⊤
b(t)
n bm yn ym
(17)
n∈{1,2,...,N }
m∈{1,2,...,N }\n
where kYkF is the Frobenius (Euclidean) norm of Y . Factorizing (17), we observe that the contribution of the nth
(t)
bit of b(t) , bn , to (17) is
α b(t) , n = 2b(t)
n
X
m∈{1,2,...,N }\n
(t) ⊤
⊤
(t)
2
bm
yn ym = 2 b(t)
y
Yb
−
ky
k
n
n n
2 .
That is, for any n ∈ {1, 2, . . . , N }, (17) can be written as
Yb(t)
2
2
= α b(t) , n + β b(t) , n
(18)
(t)
(t)
where β b(t) , n is a constant with respect to bn . Then, if we flip the nth bit by setting b(t+1) = b(t) − 2bn en,N
(where en,N is the nth column of the size-N identity matrix IN ), the change to the quadratic metric in (13) is
Y(b(t) − 2bn(t) en,N )
2
2
− Yb(t)
2
2
= −2α b(t) , n .
(19)
(t)
Thus, if the contribution of the nth bit to the quadratic of (17), α b(t) , n , is negative, flipping bn will increase
the quadratic by 2|α b(t) , n |, whereas if α b(t) , n is positive, flipping bn will decrease the quadratic by
2|α b(t) , n |.
In view of this analysis, L1-BF is initialized at an arbitrary binary antipodal vector b(1) and L = {1, 2, . . . , N }.
3
The index-set L is used to restrain the “greediness” of unconstrained single-bit flipping iterations.
8
The initial bit contributions α b(1) , 1 , . . . , α b(1) , N are calculated by (18). Then, at iteration step t ≥ 1, we
find
n = argmin α b(t) , m .
(20)
m∈L
(t)
(t)
If α b(t) , n < 0, bn is flipped by setting b(t+1) = b(t) − 2bn en,N , α b(t+1) , 1 , . . ., α b(t+1) , N are recalcu
lated, and L is updated to L \ n. If, otherwise, α b(t) , n ≥ 0, a new solution n to (20) is obtained after resetting
(t)
L to {1, 2, . . . , N }. If, for the new solution n, α b(t) , n < 0, then bn is flipped, α b(t+1) , 1 , . . . , α b(t+1) , N
are recalculated, and L is updated to L \ n. Otherwise, the iterations terminate and the algorithm returns bbf = b(t) ,
qbf = Ybbf kYbbf k−1
2 .
(t)
Notice that the contribution factors at the end of tth iteration step when bn has been flipped can be directly
updated by
α b(t+1) , n = −α b(t) , n > 0
(21)
(t) ⊤
α b(t+1) , m = α b(t) , m − 4b(t)
m bn ym yn
(22)
and
for every m 6= n. Given the data correlation matrix Y ⊤ Y , updating the contributions by (21) and (22) costs only
O(N ). For ease in reference, complete code for L1-BF, K = 1, is provided in Fig. 1.
Convergence Characterization
The termination condition of the BF iterations (convergence) is summarized to
α b(t) , n ≥ 0 ∀n ∈ {1, 2, . . . , N }.
(23)
That is, when (23) is met, the algorithm returns bbf = b(t) and terminates. For any initialization point, (23) will be
met and the BF iterations will converge in a finite number of steps, since (i) the binary quadratic form maximization
in (4) has a finite upper bound and (ii) at every step of the presented BF iterations the quadratic value increases.
Thus, the proposed iterations converge globally4 both in argument and in value.
Characterization of Point of Converngence and Relationship to Fixed Points of [19], [21]
The last point of the generated sequence, bbf , satisfies the termination condition α (bbf , n) ≥ 0 ∀n, which in
view of (18) can be equivalently rewritten as bbf,n yn⊤ Ybbf ≥ ||yn ||22 ∀n. Therefore, for every initialization point,
4
We say that a sequence converges globally if it convergences for any initialization.
9
the BF iterations converge in the set
Ω(Y) = {b ∈ {±1}N ; bn yn⊤ Yb ≥ ||yn ||22 ∀n}.
(24)
By (11), Y ⊤ Y = X⊤ X and, thus, Ω(Y) = Ω(X). Importantly, the following proposition holds true.
Proposition 3. Every optimal solution to the binary-quadratic maximization in (13) belongs to Ω(Y).
Proof: Let b be a solution to (13) outside Ω(Y). Then, there exists at least one entry in b, say the nth entry,
for which the contribution to the objective value is negative; i.e., α b(t) , n < 0. Consider now the binary vector
b′ ∈ {±1}N derived by negation of the nth entry of b. By (19), kYb′ k22 = kYbk22 − 2|αn | > kYbk22 . Hence, b
is not a maximizer in (4).
By Proposition 3, being an element of Ω(Y) is a necessary condition for a binary vector to be a solution
to (13). Since any point in Ω(Y) is reachable by the BF iterations upon appropriate initialization, L1-BF may
indeed calculate bopt and, through (14), return the optimal L1-PC solution to (1), qL1 . The following Proposition
establishes an important relationship between the set of convergence points of the proposed BF iterations, Ω(Y),
and the set of convergence points of the fixed-point iterations in [19], [21], say Φ(Y).
Proposition 4. Every element of Ω(Y) lies also in the fixed-point set Φ(Y); that is, Ω(Y) ⊆ Φ(Y).
Proof: Consider an arbitrary b ∈ Ω(Y). Then, bn yn⊤ Yb ≥ ||yn ||22 , for all n ∈ {1, 2, . . . , N }. Assume that
bn = +1 for some n. Then, yn⊤ Yb ≥ kyn k22 ≥ 0 and sgn(yn⊤ Yb) = +1 = bn . Otherwise, bn = −1. Then,
yn⊤ Yb ≤ − kyn k22 ≤ 0 and sgn(yn⊤ Yb) = −1 = bn . Hence, for every vector b ∈ Ω(Y), bn = sgn(yn⊤ Yb) for all
n and, thus, b ∈ Φ(Y).
If we denote by B(Y) the set of optimal solutions to (4), Propositions 3 and 4 can be summarized as
B(Y) ⊆ Ω(Y) ⊆ Φ(Y) ⊆ {±1}N
(25)
or, in terms of set sizes, 2 ≤ |B(Y)| ≤ |Ω(Y)| ≤ |Φ(Y)| ≤ 2N .
For illustration, in Fig. 2, we demonstrate experimentally the relationship between the cardinalities of Φ(Y),
Ω(Y), and B(Y). We generate 1000 independent instances of a full-rank data matrix Y ∈ R(d=2)×N for N =
2, 3, . . . , 7, with each element of Y drawn independently from the Gaussian N (0, 1) distribution. Then, we plot the
average observed cardinality of Φ(Y), Ω(Y), and B(Y) versus the number of data points N . We see that as N
increases Ω(Y) remains a tight super-set of B(Y), while the cardinality of Φ(Y) (number of possible converging
points of the FP iterations) increases at a far higher rate. Fig. 2 offers insight why the proposed BF iterations are
10
expected to return the optimal solution to (4) much more often than the FP iterations of [19]–[21].
Performance Bounds
The performance attained by qbf is formally lower bounded by Proposition 5 whose proof is given in the
Appendix.
Proposition 5. The performance of qbf in the metric of (1), calculated upon any initialization, is lower bounded
by X⊤ qbf
1
≥ kXkF .
Moreover, for the optimal L1-PC qL1
X⊤ qL1
1
= kXbopt k2 =
√
N
max
1
z∈{± √N }N
kXzk2 ≤
√
N
max
z∈RN ; kzk2 =1
kXzk2 =
√
N σmax
(26)
where σmax is the maximum singular value of the data matrix X. Then, the loss with respect to the L1-PCA metric
in (1) experienced by qbf is bounded by
X⊤ qL1
1
− X⊤ qbf
1
≤
√
N σmax − kXkF .
(27)
In Fig. 3, we execute the proposed BF iterations on an arbitrary data matrix X ∈ R(d=4)×(N =32) (elements drawn
independently from N (0, 1)) and plot the binary quadratic metric kXb(t) k2 and L1-PCA metric kX⊤ q(t) k1 per
iteration t. For reference, we also plot the optimal line kX⊤ qL1 k1 = kXbopt k2 and lower bound kXkF . Fig. 3
offers a vivid numerical illustration of Proposition 5 and eq. (27).
Initialization
Next, we consider initializations that may both expedite convergence and offer superior L1-PC approximations. In
the trivial d = 1 case, Y = σv⊤ for some σ ∈ R+ and v ∈ RN ×1 , kvk2 = 1, and bopt = arg maxb∈{±1}N kYbk22 =
arg maxb∈{±1}N |v⊤ b|22 = ±sgn(v). Motivated by this special case, we initialize the BF iterations to the sign of the
right singular vector of Y that corresponds to the highest singular value. We call this initialization choice sv-sign
initialization. Evidently, by the definition of Y in (10),
b(1) = sgn([Y ⊤ ]:,1 ).
(28)
Experimental studies that compare the efficiency of the proposed sv-sign initialization with that of equiprobable
random initializations (b(1) takes any value in {±1}N with probability 2−N ) show that sv-sign initialization not
only leads to superior L1-PC approximations with respect to (1), but also reduces significantly the actual execution
time of the proposed algorithm by reducing the number of bit-flips needed for convergence. As an illustration, we
11
generate 1000 realizations of the data matrix X ∈ R3×20 with entries drawn independently from N (0, 1). On each
realization we run bit-flipping iterations with both sv-sign and equiprobable binary initialization. We observe that
81.6% of the time the L1-PC obtained with sv-sign initialization attains value in the metric of (1) greater than or
equal to L1-PC obtained by random initialization. Also, in Fig. 4 we plot the empirical CDF of the number of
bit-flips needed until convergence for the two initializations. We observe that 50% of the time sv-sign initialization
is already in the convergence set Ω(X) and no bit-flips take place. Moreover, with sv-sign initialization no more
than 6 bit-flips are needed for convergence with empirical probability 1. On the contrary, random initialization may
need with non-zero probability up to 16 bit-flips for convergence.
Complexity Analysis
Prior to bit-flipping iterations, L1-BF calculates Y in (10) and chooses the initial binary vector b(1) with complexity O(N Dmin{N, D}) (SVD). Then, the algorithm calculates and stores the correlation matrix Y ⊤ Y ∈ RN ×N
with complexity O(N 2 d) and, given b(1) and Y ⊤ Y , evaluates by (18) the initial contribution factors α b(1) , n
for all n ∈ {1, 2, . . . , N } with cost O(N 2 ). Therefore, initialization has total cost O(N Dmin{N, D} + N 2 (d + 1)).
At iteration t ≥ 1, finding n by (20) costs O(N ). In case α b(t) , n > 0, repetition of the maximization over the
entire index set {1, 2, . . . , N } costs an additional O(N ). Therefore, each bit flip costs O(N ). Denoting by M the
number of bit flips until the termination criterion is met, we find that the computational cost for calculating bbf is
O(N Dmin{N, D} + N 2 (d + 1) + M N ).
Finally, taking into account the computation of qbf from bbf , the proposed L1-BF algorithm costs O(N D
min{N, D} +N 2 (d + 1) + (M + D)N ). According to our experiments, M is with empirical probability 1 upper
bounded by N ; that is, no more than N bits need to be flipped to reach bbf .5 Therefore, the total complexity of
the proposed algorithm becomes O(N Dmin{N, D} + N 2 (d + 2) + N D). Keeping only the dominant complexity
terms, L1-BF has complexity O(N Dmin{N, D} + N 2 d), i.e. quadratic in N and either linear, or quadratic in D
(depending on the cost of the initial SVD). Thus, the proposed L1-BF algorithm has cost comparable to that of
standard PCA (SVD). A summary of the calculated complexity is provided in Table I.
Multiple Initializations
(1)
For further L1-PCA metric improvement, we may also run BF on L distinct initialization points, b1
(1)
sgn([Y ⊤ ]:,1 ) and bl
= sgn(Y ⊤ al ), with al ∼ N (0d , Id ), l = 2, . . . , L, to obtain L corresponding con(L)
vergence points bbf,1 , bbf,2 , . . . , bbf,L . Then, if qbf,l = Xbbf,l kXbbf,l k−1
2 , l = 1, . . . , N , we return qbf
argmaxq∈{qbf,1 ,...,qbf,L } X⊤ q
5
=
1
=
. Certainly, multiple initializations will increase the complexity of the algorithm
In practice, a brute-force termination M ≤ N can be imposed to the algorithm.
12
by a constant factor L.
B. Calculation of K > 1 L1-Principal Components
In contrast to L2-PCA, L1-PCA in (1) is not a scalable problem [2]. Therefore, successive-nullspace-projection
approaches [19], [22] fail to return optimal L1-PC bases. Optimal L1-PCA demands joint computation of all K
principal components of Y , a procedure that increases exponentially in K the computational complexity of optimal
algorithms. In this section, we generalize the BF algorithm presented in Section III.A to calculate K > 1 L1-PCs
of any given data matrix X ∈ RD×N of rank d ≥ K .
Given the reduced-size, full-row-rank data matrix Y ∈ Rd×N (see Proposition 1), the proposed algorithm first
attempts to approximate the solution to (12) Bopt . To do so, it begins from an initial matrix B(1) and employs
bit-flipping iterations to reach an approximation to Bopt , say Bbf . Finally, per (29) the algorithm returns
Qbf = U (XBbf ) .
(29)
Evidently, if Bbf is an exact solution to (2), then Qbf is an exact solution to the L1-PCA problem in (1).
Calculation of Bbf via Bit-flipping Iterations
The algorithm initializes at a binary matrix B(1) and employs BF iterations to generate a sequence of binary
matrices B(t) , t = 2, 3, . . . , such that each matrix B(t) attains the highest possible value in the maximization metric of
(12) given that it differs from B(t−1) in exactly one entry. Similar to the K = 1 case, the indices of bits that have not
been flipped throughout the iterations are kept in a memory index-set L initialized at {1, 2, . . . , N K} (the (n, k)th
bit of the binary matrix argument in (12) has corresponding single-integer index (k − 1)N + n ∈ {1, 2, . . . , N K}).
Mathematically, at the tth iteration step, t ≥ 1, we search for the single bit in the current binary argument B(t)
whose index is not in L and its flipping increases the nuclear-norm metric kYB(t) k∗ the most. We notice that if
(t)
we flip the (n, k)th bit of B(t) setting B(t+1) = B(t) − 2Bn,k en,N e⊤
k,K , then
(t)
YB(t+1) = YB(t) − 2Bn,k yn e⊤
k,K .
(30)
Therefore, at the tth iteration step, the algorithm obtains the index pair
(n, k) =
(t)
argmax
(m,l)∈{1,2,...,N }×{1,2,...,K}
(l−1)N +m∈L
If
(t)
YB(t) − 2Bn,k yn e⊤
k,K
∗
>
YB(t)
YB(t) − 2Bm,l ym e⊤
l,K
(t)
∗
∗
.
(31)
(t)
, the algorithm flips Bn,k setting B(t+1) = B(t) − 2Bn,k en,N e⊤
k,K
13
(t)
YB(t) − 2Bn,k yn e⊤
k,K
and updates L to L \ {(k − 1)N + n}. If, otherwise,
∗
YB(t)
≤
∗
, the algorithm
obtains a new solution (n, k) to (31) after resetting L to {1, 2, . . . , N K}. If now, for this new pair (n, k),
(t)
YB(t) − 2Bn,k yn e⊤
k,K
∗
YB(t)
>
(t)
∗
, the algorithm sets B(t+1) = B(t) − 2Bn,k en,N e⊤
k,K and updates L =
L \ {(k − 1)N + n}. Otherwise, the iterations terminate and the algorithm returns Bbf = B(t) and Qbf = ÛV̂⊤ ,
SVD
⊤
where XBbf = ÛD×K Σ̂K×K V̂K×K
.
(t)
We note that to solve (31) exhaustively, one has to calculate YB(t) − 2Bm,l ym e⊤
l,K
∗
for all (m, l) ∈ {1, 2, . . . , N }×
{1, 2, . . . , K} such that (l − 1)N + m ∈ L. In worst case, L = {1, 2, . . . , N K} and this demands N K in-
dependent singular-value/nuclear-norm calculations. A simplistic, but computationally inefficient, approach would
(t)
2
be perform an SVD on YB(t) − 2Bm,l ym e⊤
l,K from scratch with cost O(dK ). This would yield a worst case
total cost of O(N dK 3 ) to find (n, k) in (31). Below, we present an alternative method to solve (31) with cost
O(dK 2 + N (K 3 + dK)).
Reduced-cost Nuclear-norm Evaluations for Optimal Bit-flipping
At the beginning of the tth iteration step, we perform the singular-value decomposition
SVD
(t)
(t)⊤
(t)
YB(t) = Ud×K SK×K VK×K
(32)
(t)
with cost O(dK 2 ). Then, for any (m, l) ∈ {1, 2, . . . , N }×{1, 2, . . . , K}, the singular values of YB(t) −2Bm,l ym e⊤
l,K
(t)
(t)
⊤
(t) − 2B
⊤
are the square roots of the eigenvalues of (YB(t) − 2Bm,l ym e⊤
l,K ) (YB
m,l ym el,K ) (found with constant
(t)
⊤
⊤
(t)
cost), which due to rotation invariance are equal to the eigenvalues of A = V(t) (YB(t) −2Bm,l ym e⊤
l,K ) (YB −
(t)
(t)
⊤
⊤
(t) U(t) y ] ∈ RK×2 and the eigenvalue decomposition
(t)
(t) ⊤
2Bm,l ym e⊤
m
l,K )V . Defining W = [[V ]l,: , −2Bm,l S
EVD
⊤
(EVD) QDQ⊤ = kym k22 e1,2 e⊤
1,2 + [e2,2 , e1,2 ] where D = diag([d1 , d2 ] ), it is easy to show that
⊤
A = S(t) S(t) + d1 Wq1 (Wq1 )⊤ + d2 Wq2 (Wq2 )⊤ .
(33)
Consider now the eigenvalue decomposition
EVD
⊤
ZK×K PZ⊤ = S(t) S(t) + d1 Wq1 (Wq1 )⊤ .
(34)
(t)
Then, again by eigenvalue permutation invariance, the singular values of YB(t) − 2Bm,l ym e⊤
l,K are equal to the
square roots of the eigenvalues of
Z⊤ AZ = P + d2 Z⊤ Wq2 (Z⊤ Wq2 )⊤ .
⊤
Notice that matrix S(t) U(t)
⊤
(35)
needed for the calculation of W is constant for all candidate-bit evaluations of
14
the tth iteration and, given the SVD of YB(t) , can be found with cost O(K 2 ). Thus, this computational cost is
absorbed in the SVD of YB(t) . Then, for bit-flip examination of all K bits of the mth row of B(t) it suffices to
⊤
⊤
⊤
calculate the quantities Q, d, and S(t) U(t) ym , appearing in S(t) S(t) + d1 Wq1 (Wq1 )⊤ and d2 Wq2 , just once
with cost O(dK). Employing the algorithm proposed in [40] for the EVD of a diagonal positive semidefinite matrix
⊤
perturbated by a rank-1 symmetric matrix, EVD of S(t) S(t) + d1 Wq1 (Wq1 )⊤ (i.e., calculation of Z and P) costs
O(K 2 ). Then, defining d2 Z⊤ Wq2 (Z⊤ Wq2 )⊤ and finding the eigenvalues of P + d2 Z⊤ Wq2 (Z⊤ Wq2 )⊤ (again
per [40]) costs an additional O(K 2 ). Thus, including the initial SVD, the total cost for bit-flipping examination of
all bits in B(t) (worst case scenario) is O(dK 2 ) + N O(dK) + N KO(K 2 ) ≡ O(dK 2 + N (K 3 + dK)).
Termination Guarantee
Similarly to the K = 1 case, the termination condition
(t)
YB(t) − 2Bm,l ym e⊤
l,K
∗
≤ YB(t)
∗
∀(m, l) ∈ {1, 2, . . . , N } × {1, 2, . . . , K}
(36)
is guaranteed to be met after a finite number of iterations because (i) binary nuclear-norm maximization in (2) has
finite upper bound and (ii) at every step of the BF iterations the nuclear-norm value increases.
Initialization
Generalizing the initialization idea for the K = 1 case, we choose B(1) = sgn([Y ⊤ ]:,1 )1⊤
K where 1K is the allone vector of length K . Again, our motivation here lies in the fact that for d = 1 and any K , Bopt = sgn(vopt )1⊤
K.
For this particular initialization, YB(1)
∗
= K Ysgn([Y ⊤ ]:,1 )
2
. Pseudocode of the proposed L1-BF algorithm
for K ≥ 1 is offered in Fig. 5. Of course, for K = 1 the L1-PCs generated by the algorithms of Fig. 1 and Fig. 5
coincide.
Complexity Analysis
Before the BF iterations, the algorithm expends O(N Dmin{N, D}) to calculate Y ∈ Rd×N through SVD of X ∈
RD×N . By the same SVD, we calculate also the initial binary matrix. Then, for the proposed initialization YB(1) and
YB(1)
∗
are calculated in the beginning of the first iteration with complexity O(N dK). To find a solution to (31),
we incur worst case cost O(dK 2 +N (K 3 +dK)). Setting the maximum number of BF iterations run by the algorithm
to N K , the total complexity to calculate Bbf is in worst case O(N Dmin{N, D} + N dK 3 + N 2 (K 4 + dK 2 )).
Then, to calculate Qbf from Bbf costs an additional O(N Dmin{N, D} + N DK). Therefore, the total complexity
of the proposed algorithm is O(N Dmin{N, D} + N 2 (K 4 + dK 2 ) + N dK 3 ); that is, quadratic complexity in N
and at most quadratic complexity in D . Notice that for K = 1 the asymptotic complexity of the algorithm becomes
O(N Dmin(N, D) + N 2 d), i.e. equal to that of the algorithmic operations of Fig. 1. A summary of the calculated
15
complexity is provided in Table II.
Multiple Initializations
Similar to the K = 1 case, we can further increase performance of the proposed L1-PCA scheme by running
(1)
(1)
(1)
(1)
BF iterations on L distinct initialization matrices B1 , B2 , . . . , BL . We choose B1 = sgn([Y ⊤ ]:,1 )1⊤
K (sv-sign
(1)
initialization) and for l ∈ {2, 3, . . . , L} we initialize randomly to Bl
= sgn(al )1⊤
K , al ∼ N (0N , IN ), to obtain
the L corresponding convergence points Bbf,1 , Bbf,2 , . . . , Bbf,L and, through (29), the associated L1-PC bases
(L)
Qbf,1 , Qbf,2 , . . . , Qbf,L . Then, we return Qbf = argmaxQ∈{Qbf ,1 ,Qbf,2 ,...,Qbf,L } X⊤ Q
1
.
IV. E XPERIMENTAL S TUDIES
A. Comparison of L1-BF with Current State-of-the-art Algorithms
We first compare the performance of L1-BF with that of algorithms proposed in [19], [21], [22].6 In our
experiment, we generate 1000 arbitrary matrices of size (D = d = 4) × (N = 16) with entries drawn independently
from N (0, 1) and calculate the primary (K = 1) L1-PC by L1-BF iterations (L = 1 initialization), the fixed-point
algorithm of [19], [21] (L = 1 initialization), and the SDP approach in [22] (L = 1 Gaussian randomization). We
measure the performance degradation experienced by a unit-length vector q on the metric of (1) by
∆(q; X) =
kX⊤ qL1 k1 − kX⊤ qk1
kX⊤ qL1 k1
(37)
and in Fig. 6(a) we plot the empirical cumulative distribution function (CDF) of ∆(qbf ; X), ∆(qfp ; X), and
∆(qsdp ; X). We observe that 86% of the time, L1-BF returns the exact, optimal L1-PC of X. In addition, the
performance degradation attained by the proposed algorithm is, with empirical probability 1, less than 0.09. On the
other hand, FP iterations [19], [21] and SDP [22] attain optimal performance, with empirical probabilities 0.3 and
0.5, respectively. The performance degradation for FP [19], [21] and SDP [22] can be as much as 0.25 and 0.55,
respectively.
We repeat the same experiment after increasing the number of initializations for the proposed algorithm and the
FP [19], [21] to L = N = 16 and the number of Gaussian randomizations in SDP [22] to L = N = 16. In Fig.
6(b), we plot the corresponding empirical CDFs of ∆(qbf ; X), ∆(qfp ; X), and ∆(qsdp ; X). L1-BF outperforms the
two counterparts, returning the exact L1-PC with empirical probability 1.
Next, we examine the performance of the four algorithms (FP iterations with successive nullspace projections [19],
alternating optimization [21], and SDP with successive nullspace projections [22], and proposed BF iterations) when
Regarding the SDP approach of [22], the total computational cost employing L Gaussian randomization instances is O(N 3.5 log(1/ǫ) +
L(N 2 + DN )), which is similar to running the proposed BF iterations over N distinct initialization points.
6
16
K = 2 L1-PCs are sought. We generate 1000 arbitrary data matrices of size (D = 3) × (N = 8) (all entries drawn
independently from N (0, 1)) and plot in Fig. 7(a) the empirical CDF of the corresponding performance degradation
ratios, ∆(Qfp ; X), ∆(Qao ; X), ∆(Qsdp ; X), and ∆(Qbf ; X). All iterative methods are run on a single initialization
point (one Gaussian-randomization instance for SDP). We observe that 83% of the time, L1-BF returns the exact,
optimal L1-PCs of X. The performance degradation attained by the proposed PCs is, with empirical probability 1,
less than 0.09. On the other hand, the PCs calculated by [19], [21], [22] attain optimal performance, with empirical
probabilities of above 0.31, 0.05, and 0.1, respectively, while the performance degradation for the algorithms in
[19], [21] and [22] can be as much as 30%. Evidently, the nullspace projections of [19], [22] that “violate” the
non-scalability principle of the L1-PCA problem, have significant impact on their performance. Next, we repeat
the above experiment with L = N K = 16 initializations (L = 16 Gaussian-randomization instances for SDP). In
Fig. 7(b), we plot the new performance degradation ratios for the four algorithms. This time, the proposed method
returns the exact/optimal L1-PCs of X with probability 1. High, but inferior, performance is also attained by the
iterative algorithm of [21]. On the other hand, the algorithms in [19], [22] that follow the greedy approach of
solving a sequence of nullspace-projected K = 1 problem instances experience performance degradation values
similar to those of Fig. 7(a).
B. Line-fitting Experiment
For visual evaluation of the outlier resistance of the proposed L1-PCs, we consider N = 100 2-dimensional
4 10
points drawn from the nominal zero-mean Gaussian distribution N 02 , R =
organized in matrix
10 29
form Xnom = [x1 , x2 , . . . , x100 ]. We use the nominal data points to extract an estimate of the true maximumvariance/minimum-mean-squared-error subspace (line) of our data distribution by means of L2-PCA (standard SVD
method). We do the same by means of L1-PCA through the proposed L1-BF method. In Fig. 8(a), we plot on the
2-dimensional plain the 100 training data points in Xnom and the lines described by qL2 (Xnom ) and qbf (Xnom ). For
reference, we also plot alongside the true maximum-variance line. All three lines visually coincide, i.e. qL2 (Xnom )
and qbf (Xnom ) are excellent estimates of the true maximum-variance line.
Next, we assume that instead of the clean matrix of nominal training data points Xnom , we are given the outliercorrupted data matrix Xcor = [Xnom , O] ∈ R2×104 , for estimating qopt . Here, in addition to the previous 100
nominal data points in Xnom , Xcor also contains the 4 outliers in O = [o1 , o2 , o3 , o4 ] ∈ R2×4 as seen in Fig. 8(b)
that do not follow the nominal distribution. Similar to our treatment of Xnom , we calculate the L2-PC and L1-PC
(by L1-BF) of Xcor , qL2 (Xcor ) and qbf (Xcor ), respectively. In Fig. 8(b) we plot the two lines, against the true
17
maximum-variance line of the nominal data. This time, the lines of qL2 (Xcor ) and qbf (Xcor ) differ significantly. In
sharp contrast to L1-PC, the L2-PC of Xcor is strongly attracted by the four outliers and drifting away from the true
maximum-variance line. The outlier-resistance and superior line-fitting performance of the proposed approximate
L1-PC in the presence of the faulty data is clearly illustrated.
C. Classification of Genomic Data – Prostate Cancer Diagnosis
In this experiment, we conduct subspace-classification of MicroRNA (miRNA) data for prostate cancer diagnosis
[41], [42]. Specifically, we operate on the expressions of D = 9 miRNAs (miR-26a, miR-195, miR-342-3p, miR126*, miR-425*, miR-34a*, miR-29a*, miR-622, miR-30d) that have been recently considered to be differentially
expressed between malignant and normal human prostate tissues [43]. For each of the above miRNAs, we obtain one sample expression from one malignant and one normal prostate tissue from N = 19 patients (patient
indexes per [43]: 1, 2, . . . , 10, 12, . . . , 20) of the of the Swedish Watchful Waiting cohort [44].7 The miRNA
expressions from malignant and normal tissues are organized in XM = [xM,1 , xM,2 , . . . , xM,N ] ∈ RD×N and
XN = [xN,1 , xN,2 , . . . , xN,N ] ∈ RD×N , respectively. The classification/diagnosis experiment is conducted as
follows.
We collect Ntrain = 10 points from XM in XM,tr = [XM ]:,IM with IM ⊂ {1, 2, . . . , N } and |IM | = Ntrain ,
and Ntrain points from XN in XN,tr = [XN ]:,IN with IN ⊂ {1, 2, . . . , N } and |IN | = Ntrain . Then, we calculate
the zero-centered malignant and normal tissue training datasets X̃M,tr = XM,tr − mM 1⊤
Ntrain where mM =
1
Ntrain XM,tr 1Ntrain
and X̃N,tr = XN,tr − mN 1⊤
Ntrain where mN =
1
Ntrain XN,tr 1Ntrain ,
respectively. Next, we
find K = 3 L2-PCs or L1-PCs by L1-BF of the zero-centered malignant and normal datasets, QM ∈ RD×K
and QN ∈ RD×K , respectively, and conduct subspace-classification [45], [46] of each data-point x that has not
c
c
c ∪ {x
c where I
been used for PC training (i.e., every x ∈ {xM,i }i∈IM
N,i }i∈IN
M = {1, 2, . . . , N } \ IM and IN =
{1, 2, . . . , N } \ IN ) as
malignant
kQ⊤
M (x
−
mM )k22
>
<
normal
2
kQ⊤
N (x − mN )k2 + λ
(38)
where λ is the classification/detection bias term. We run the above classification experiment over 2000 distinct
training-dataset configurations and calculate the receiver operating characteristic (ROC) curve of the developed
L2-PCA or L1-PCA classifier identifying as “detection” the event of classifying correctly a malignant tissue and
as “false alarm” the event of classifying erroneously a normal tissue (Fig. 9, “p = 0” curves).
7
More information about the studied data can be found in [43].
18
Next, we consider the event of training on faulty/mislabeled data. That is, we recalculate the above ROC curves
having exchanged p = 2 or 4 data points between XM,tr and XN,tr . In Fig. 9, we plot the ROC curves for the
designed L2-PCA and L1-PCA malignant tissue detectors, for K = 3 and p = 0, 2, 4. We observe that for p = 0
(no mislabeling) the the two classifiers perform almost identically, attaining frequency of detection (FD) close to
1 for frequency of false alarm (FFA) less than 0.15. However, in the event of training data mislabeling, the strong
resistance of the proposed L1-PCs against dataset contamination is apparent. The L1-PCA classifier outperforms
significantly L2-PCA, for every examined value of p. For instance, for p = 2, L1-PCA achieves FD of .95 for FFA
0.23, while L2-PCA achieves the same FD for FFA .65.
V. C ONCLUSIONS
In this work, we presented a novel, near-optimal, bit-flipping based algorithm named L1-BF, to calculate K
L1-PCs of any rank-d D × N data matrix with complexity O(N Dmin{N, D} + N 2 (K 4 + dK 2 ) + N dK 3 ). Formal
proof of convergence, theoretical analysis of converging points, and detailed asymptotic complexity derivation were
carried out. Our numerical experiments show that the proposed algorithm outperforms in the optimization metric
all other L1-PCA calculators at cost comparable to L2-PCA. L1-PCA and L2-PCA have almost indistinguishable
behavior on clean, nominal data. L1-PCA shows remarkable relative resistance to faulty data contamination. Thus,
the proposed algorithm, retaining the robustness of L1-PCA at a cost close to that of L2-PCA, may bridge the gap
between outlier resistant and computationally efficient principal-component analysis.
A PPENDIX
A. Proof of Proposition 5
Since bbf ∈ Ω(Y), (24) and (11) imply
kYbbf k22 =
≥
X
bn yn⊤ Yb
X
kyn k22 = kYk2F = kXk2F .
n∈{1,2,...,N }
n∈{1,2,...,N }
19
(39)
In addition, by Proposition 4, bbf lies in Φ(Y) as well and satisfies bbf = sgn(Y ⊤ Ybbf ). Therefore, for qbf =
Xbbf kXbbf k−1
2 ,
X⊤ qbf
1
= X⊤ Xbbf kXbbf k−1
2
1
= sgn(X⊤ Xbbf )⊤ X⊤ Xbbf kXbbf k−1
2
= sgn(Y ⊤ Ybbf )⊤ X⊤ Xbbf kXbbf k−1
2
(39)
= kXbbf k2 = kYbbf k2 ≥ kXkF .
20
(40)
R EFERENCES
[1] P. P. Markopoulos, G. N. Karystinos, and D. A. Pados, “Some options for L1-subspace signal processing,” in Proc. 10th Intern. Symp.
Wireless Commun. Syst. (ISWCS), Ilmenau, Germany, Aug. 2013, pp. 622–626.
[2] P. P. Markopoulos, G. N. Karystinos, and D. A. Pados, “Optimal algorithms for L1-subspace signal processing,” IEEE Trans. Signal
Process., vol. 62, pp. 5046–5058, Oct. 2014.
[3] S. Kundu, P. P. Markopoulos, and D. A. Pados, “Fast computation of the L1-principal component of real-valued data,” in Proc. IEEE
Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Florence, Italy, May 2014, pp. 8028–8032.
[4] K. Pearson, “On lines and planes of closest fit to systems of points in space,” Philosophical Mag., vol. 2, pp. 559–572, 1901.
[5] I. T. Jolliffe, Principal Component Analysis. New York, NY: Springer-Verlag, 1986.
[6] C. M. Bishop, Pattern Recognition and Machine Learning. New York, NY: Springer, 2006.
[7] R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification, 2nd ed. New York, NY: Wiley, 2001.
[8] V. Barnett and T. Lewis, Outliers in Statistical Data, New York, NY: John Wiley and Sons, 1994.
[9] J. W. Tukey, “The future of data analysis,” Ann. Math. Stat., pp. 1–67, 1962.
[10] E. J. Candès, X. Li, Y. Ma, and J. Wright, “Robust principal component analysis?,” J. ACM, vol. 58, art. 11, May 2011.
[11] R. R. Singleton, “A method for minimizing the sum of absolute values of deviations,” Ann. Math. Stat., vol. 11, pp. 301–310, Sep.
1940.
[12] O. J. Karst, “Linear curve fitting using least deviations,” J. American Stat. Assoc., vol. 53, pp. 118–132, Mar. 1958.
[13] I. Barrodale, “L1 approximation and the analysis of data,” J. Royal Stat. Soc., App. Stat., vol. 17, pp. 51–57, 1968.
[14] I. Barrodale and F. D. K. Roberts, “An improved algorithm for discrete l1 linear approximation,” SIAM J. Num. Anal., vol. 10, pp.
839–848, Oct. 1973.
[15] Q. Ke and T. Kanade, “Robust subspace computation using L1 norm,” Internal Technical Report Computer Science Dept., Carnegie
Mellon Univ., Pittsburgh, PA, USA, CMU-CS-03-172, 2003.
[16] Q. Ke and T. Kanade, “Robust L1 norm factorization in the presence of outliers and missing data by alternative convex programming,”
in Proc. IEEE Conf. Comp. Vision Patt. Recog. (CVPR), San Diego, CA, Jun. 2005, pp. 739–746.
[17] J. P. Brooks and J. H. Dulá, “The L1-norm best-fit hyperplane problem,” Appl. Math. Lett., vol. 26, pp. 51–55, Jan. 2013.
[18] J. P. Brooks, J. H. Dulá, and E. L. Boone, “A pure L1-norm principal component analysis, J. Comput. Stat. Data Anal., vol. 61, pp.
83–98, May 2013.
[19] N. Kwak, “Principal component analysis based on L1-norm maximization,” IEEE Trans. Patt. Anal. Mach. Intell., vol. 30, pp. 1672–
1680, Sep. 2008.
[20] N. Kwak and J. Oh, “Feature extraction for one-class classification problems: Enhancements to biased discriminant analysis,” Patt.
Recog., vol. 42, pp. 17–26, Jan. 2009.
[21] F. Nie, H. Huang, C. Ding, D. Luo, and H. Wang, “Robust principal component analysis with non-greedy L1-norm maximization,” in
Proc. Int. Joint Conf. Artif. Intell. (IJCAI), Barcelona, Spain, Jul. 2011, pp. 1433–1438.
[22] M. McCoy and J. A. Tropp, “Two proposals for robust PCA using semidefinite programming,” Electron. J. Stat., vol. 5, pp. 1123–1160,
Jun. 2011.
[23] A. Eriksson and A. v. d. Hengel, “Efficient computation of robust low-rank matrix approximations in the presence of missing data
using the L1 norm,” in Proc. IEEE Conf. Comput. Vision Patt. Recog. (CVPR), San Francisco, CA, USA, Jun. 2010, pp. 771–778.
21
[24] R. He, B.-G. Hu, W.-S. Zheng, and X.-W. Kong, “Robust principal component analysis based on maximum correntropy criterion,”
IEEE Trans. Image Process., vol. 20, pp. 1485–1494, Jun. 2011.
[25] L. Yu, M. Zhang, and C. Ding, “An efficient algorithm for L1-norm principal component analysis,” in Proc. IEEE Int. Conf. Acoust.
Speech, Signal Process. (ICASSP), Kyoto, Japan, Mar. 2012, pp. 1377–1380.
[26] X. Li, Y. Pang, and Y. Yuan, “L1-norm-based 2DPCA,” IEEE Trans. Syst., Man. Cybern. B, Cybern., vol. 40, pp. 1170–1175, Aug.
2009.
[27] Y. Pang, X. Li, and Y. Yuan, “Robust tensor analysis with L1-norm,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, pp. 172–178,
Feb. 2010.
[28] C. Ding, D. Zhou, X. He, and H. Zha, “R1 -PCA: Rotational invariant L1-norm principal component analysis for robust subspace
factorization,” in Proc. Int. Conf. Mach. Learn., Pittsburgh, PA, 2006, pp. 281–288.
[29] P. P. Markopoulos, S. Kundu, and D. A. Pados, “L1-fusion: Robust linear-time image recovery from few severely corrupted copies,”
in Proc. IEEE Int. Conf. Image Process. (ICIP), Quebec City, Canada, Sep. 2015, pp.1225–1229.
[30] N. Funatsu and Y. Kuroki, “Fast parallel processing using GPU in computing L1-PCA bases,” in Proc. IEEE TENCON 2010, Fukuoka,
Japan, Nov. 2010, pp. 2087–2090.
[31] D. Meng, Q. Zhao, and Z. Xu, “Improve robustness of sparse PCA by L1-norm maximization,” Patt. Recog., vol. 45, pp. 487–497,
Jan. 2012.
[32] H. Wang, Q. Tang, and W. Zheng, “L1-norm-based common spatial patterns,” IEEE Trans. Biomed. Eng., vol. 59, pp. 653–662, Mar.
2012.
[33] H. Wang, “Block principal component analysis with L1-norm for image analysis,” Patt. Recog. Lett., vol. 33, pp. 537-542, Apr. 2012.
[34] M. Johnson and A. Savakis, “Fast L1-eigenfaces for robust face recognition,” in Proc. IEEE West. New York Image Signal Process.
Workshop (WNYISPW), Rochester, NY, Nov. 2014, pp. 1–5.
[35] P. P. Markopoulos, “Reduced-rank filtering on L1-norm subspaces,” in Proc. IEEE Sensor Array Multichan. Signal Process. Workshop
(SAM), Rio de Janeiro, Brazil, Jul. 2016.
[36] P. P. Markopoulos, N. Tsagkarakis, D. A. Pados, and G. N. Karystinos, “Direction finding with L1-norm subspaces,” in Proc. Comp.
Sens. Conf., SPIE Def., Security, Sens. (DSS), Baltimore, MD, May 2014, pp. 91090J-1–91090J-11.
[37] N. Tsagkarakis, P. P. Markopoulos, D. A. Pados, “Direction finding by complex L1-principal component analysis,” in Proc. IEEE 16th
Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC), Stockholm, Sweden, Jun. 2015, pp. 475–479.
[38] Y. Nesterov and A. Nemirovski, “On first-order algorithms for L1/nuclear norm minimization,” Acta Numerica, vol. 22, pp. 509–575,
May 2013.
[39] Z.-Q. Luo, W.-K. Ma, A.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal
Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010.
[40] G. H. Golub, “Some modified matrix eigenvalue problems,” SIAM Rev., vol. 15, pp. 318-334, 1973.
[41] J. Lu, G. Getz, E. A. Miska, E. Alvarez-Saavedra, J. Lamb, D. Peck, A. Sweet- Cordero, B. L. Ebert, R. H. Mak, A. A. Ferrando, J.
R. Downing, T. Jacks, H. R. Horvitz, and T. R. Golub, “MicroRNA expression profiles classify human cancers,” Nature, vol. 435, pp.
834-838, Jun. 2005.
[42] A. Gaur, D. A. Jewell, Y. Liang, D. Ridzon, J. H. Moore, C. Chen, V. R. Ambros, and M. A. Israel, “Characterization of microRNA
expression levels and their biological correlates in human cancer cell lines,” Cancer Res., vol. 67, pp. 2456-2468, Mar. 2007.
22
[43] J. Carlsson, S. Davidsson, G. Helenius, M. Karlsson, Z. Lubovac, O. Andrén, B. Olsson, and K. Klinga-Levan, “A miRNA expression
signature that separates between normal and malignant prostate tissues,” Cancer Cell Intern., vol. 11, pp. 1-10, May 2011.
[44] J. E. Johansson, O. Andrén, S. O. Andersson SO, P. W. Dickman, L. Holmberg, A. Magnuson, and H. O. Adami, “Natural history of
early, localized prostate cancer,” J. Amer. Med. Assoc., vol. 291, pp. 2713-2719, Jun. 2004.
[45] A. Jain, R. Duin, and J. Mao, “Statistical pattern recognition: A review,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 1, pp.
4-37, Jan. 2000.
[46] Y. Liu, S. Ge, C. Li, and Z. You, “k-ns: A classifier by the distance to the nearest subspace,” IEEE Trans. Neural Net., vol. 22, pp.
1256- 1268, Aug. 2011.
23
L1-BF for the calculation of the first L1-norm principal component (K = 1)
Input: XD×N
1: (U, Σ, V) ← csvd(X), Y ← ΣV⊤
2: bbf ← bf Y⊤ Y, sgn([Y]:,1 )
3: qbf ← Xbbf / kXbbf k2
Output: qbf
Function bf(A, b)
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
N ← length(b), L ← {1, 2, . . . , N }
P
αi ← 2bi m6=i bm [A]i,m ∀i ∈ {1, 2, . . . , N }
while true (or terminate at N BFs)
n ← argminm∈L αm
if an ≤ 0,
bn ← −bn , L ← L \ {n}
an ← −an , αi ← αi − 4bi bn [A]i,n ∀i 6= n
elseif an > 0 and |L| < N , L ← {1, 2, . . . , N }
else, break
Return b
Fig. 1. The proposed L1-BF algorithm for the calculation of the L1-principal component of a rank-d data matrix XD×N of N samples of
dimension D; csvd(·) returns the compact SVD of the argument.
24
6
Φ(Y)
Ω(Y)
B(Y)
Average Cardinality
5
4
3
2
1
2
3
4
5
6
7
Number of data points N
Fig. 2. Average cardinality of fixed-point set Φ(Y) [19], [20], bit-flipping convergence set Ω(Y), and set of optimal points B(Y) versus
number of data points N (d = 2).
25
70
60
50
40
30
kXT qL1 k1 = kXbopt k2
kXT q(t) k1
kXb(t) k2
kXkF
20
10
0
2
4
6
8
10
12
14
16
18
Iteration index t
Fig. 3. Binary quadratic metric kX⊤ b(t) k2 and L1-PCA metric kX⊤ q(t) k1 per iteration. We plot along the upper bound line kX⊤ qL1 k1 =
kXbopt k2 and lower bound line kXkF of Proposition 5.
26
1
Empirical CDF
0.8
0.6
0.4
0.2
random initialization
sv-sign initialization
0
0
2
4
6
8
10
12
14
16
18
Number of bit-flips until convergence
Fig. 4. Empirical CDF of number of bit-flips needed until convergence for sv-sign and random initialization (D = 3, N = 20, 1000
experiments).
27
TABLE I: Computational cost of L1-BF for the calculation of the principal component (K = 1) of a D × N real data matrix.
Computational Task
Computational Cost
Y and b(1)
O(N D min{N, D})
Y⊤Y
One bit flip
O(N 2 d)
O(N )
N BF iterations
O(N 2 )
qbf from bbf
O(N D)
Total
O(N D min{N, D} + N 2 d)
28
L1-BF for the calculation of K > 1 L1-norm principal components
Input: Data matrix XD×N of rank d, K ≤ d
1: (U, Σd×d , V) ← csvd(X)
2: Y ← ΣV⊤ , v ← [V]:,1 , B = sgn(v1⊤
K)
3:
Bbf ← bfK (Y, B, K, )
4:
ÛD×K , Σ̂K×K , V̂K×K ← svd(XBbf )
5: Qbf ← ÛV̂⊤
Output: Qbf
Function bfK(Yd×N , BN ×K , K ≤ d)
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
ω ← KkY[B]:,1 k2
L ← {1, 2, . . . , K}
while true (or terminate at N K BFs)
(U, SK×K , V⊤ ) ← svd(YB), F ← US
for x ∈ L, m ← mod(x, N ), l ← (x − m)/N + 1
([q1 , qh2 ], D) ← evd(kym k22 ei1,2 e⊤
1,2 + [e2,2 , e1,2 ])
⊤
W ← [V]⊤
l,: , −2Bm,l F ym
(Z, diag(p)) ← fevd(S⊤ S + d1 Wq1 (Wq1 )⊤ )
(∼, Λ) ← fevd(diag(d) + d2 Z⊤ Wq2 (Z⊤ Wq2 )⊤ )
p
P
al,k ← j=1:K λj
(n, k) ← argmaxm,l: (l−1)N +m∈L am,l
if ω < an,k ,
Bn,k ← −Bn,k , ω ← an,k ,
L ← L \ {(k − 1)N + n}
elseif ω ≥ an,k and |L| < N K, L ← {1, 2, . . . , N K}
else, break
Return B
Fig. 5. The proposed L1-BF algorithm for the calculation of K > 1 L1-principal components of a rank-d data matrix XD×N of N samples
of dimension D; csvd(·) returns the compact SVD of the argument; fevd(·) returns the EVD of the argument (diagonal positive semidefinite
matrix perturbated by a rank-1 symmetric) by the algorithm of [40].
29
TABLE II: Computational complexity of L1-BF for the calculation of K > 1 principal components of a D × N real data matrix of rank d.
Computational Task
Computational Cost
Y and B(1)
O(N Dmin{N, D})
One bit flip
O(dK 2 + N (K 3 + dK))
N K BF iterations
O(N 2 (K 4 + dK 2 )N dK 3 )
Qbf by Bbf
O(N Dmin{N, D} + N DK)
Total
O(N Dmin{N, D} + N 2 (K 4 + dK 2 ) + N dK 3 )
30
(a)
Empirical CDF
1
0.8
0.6
0.4
L1-BF (proposed)
SDP [22]
FP iterations [19] / Alternating optimization [21]
0.2
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Performance degradation ratio
(b)
Empirical CDF
1
0.98
0.96
0.94
L1-BF (proposed)
SDP [22]
FP iterations [19] / Alternating optimization [21]
0.92
0
0.01
0.02
0.03
0.04
0.05
0.06
Performance degradation ratio
Fig. 6. Empirical CDF of ∆(qbf ; X), ∆(qfp ; X), and ∆(qsdp ; X) (D = 4, N = 16) for (a) L = 1 and (b) L = N = 16 initializations.
31
(a)
1
Empirical CDF
0.8
0.6
0.4
L1-BF (proposed)
SDP [22]
FP iterations [19]
Alternating optimization [21]
0.2
0
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
Performance degradation ratio
(b)
1
Empirical CDF
0.9
0.8
0.7
0.6
L1-BF (proposed)
SDP [22]
FP iterations [19]
Alternating optimization [21]
0.5
0.4
0
0.02
0.04
0.06
0.08
0.1
0.12
Performance degradation ratio
Fig. 7. Empirical CDF of ∆(Qao ; X), ∆(Qfp ; X), ∆(Qsdp ; X), and ∆(Qbf ; X) for (a) L = 1 and (b) L = N K = 16 initializations.
32
(a)
20
15
10
5
0
-5
Nominal training data
L2-PC (by SVD)
PC by L1-BF (proposed)
True max-variance line
-10
-15
-20
-40
-30
-20
-10
0
10
20
30
40
(b)
20
15
10
5
0
-5
Nomining training data
Outliers
L2-PC (by SVD)
PC by L1-BF (proposed)
True max-variance line
-10
-15
-20
-40
-30
-20
-10
0
10
20
30
40
Fig. 8. L2-PC and L1-PC (by L1-BF) trained over (a) the clean data matrix X ∈ R2×100 (100 nominal data points) and (b) the outlier
corrupted data matrix Xcor ∈ R2×104 (same 100 nominal data points plus 4 outliers).
33
Frequency of detection
1
0.8
p=0
0.6
p=2
p=4
0.4
0.2
L2-PCA
L1-PCA (proposed)
0
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Frequency of false alarm
Fig. 9. ROC curve of L2-PCA and L1-PCA (L1-BF) malignant tissue detector for p = 0, 2, 4 mislabeled points per training dataset (N = 19,
Ntrain = 10, D = 9, K = 3).
34
| 8cs.DS
|
arXiv:1609.09000v1 [cs.DB] 28 Sep 2016
StruClus: Structural Clustering of Large-Scale
Graph Databases
Till Schäfer
Petra Mutzel
TU Dortmund University
Dept. of Computer Science
44227 Dortmund, Germany
Email: [email protected]
TU Dortmund University
Dept. of Computer Science
44227 Dortmund, Germany
Email: [email protected]
Abstract—We present a structural clustering algorithm for
large-scale datasets of small labeled graphs, utilizing a frequent
subgraph sampling strategy. A set of representatives provides
an intuitive description of each cluster, supports the clustering process, and helps to interpret the clustering results. The
projection-based nature of the clustering approach allows us to
bypass dimensionality and feature extraction problems that arise
in the context of graph datasets reduced to pairwise distances
or feature vectors. While achieving high quality and (human)
interpretable clusterings, the runtime of the algorithm only grows
linearly with the number of graphs. Furthermore, the approach is
easy to parallelize and therefore suitable for very large datasets.
Our extensive experimental evaluation on synthetic and real
world datasets demonstrates the superiority of our approach over
existing structural and subspace clustering algorithms, both, from
a runtime and quality point of view.
I. I NTRODUCTION
Molecules, protein interaction networks, XML documents,
social media interactions, and image segments all have in common that they can be modeled by labeled graphs. The ability to
represent topological and semantic information causes graphs
to be among the most versatile data structures in computer
science. In the age of Big Data, huge amounts of graph data
are collected and the demand to analyze them increases with
its collection. We focus on the special case of clustering
large sets of small labeled graphs. Our main motivation stems
from the need to cluster large-scale molecular databases for
drug discovery, such as PubChem1 , ChEMBL2 , ChemDB3 or
synthetically constructed de-novo databases [1], which contain
up to a billion molecules. However, the presented approach is
not limited to this use case.
Clustering techniques aim to find homogeneous subsets in a
set of objects. Classical approaches do not interpret the objects
directly, but abstract them by utilizing some intermediate
representation, such as feature vectors or pairwise distances.
While the abstraction over pairwise distances is beneficial in
terms of generality, it can be disadvantageous in the case of
intrinsic high dimensional datasets [2, 3]. In this case the
concentration effect may cause the pairwise distances to loose
their relative contrast; i.e. the distances converge towards a
1 https://pubchem.ncbi.nlm.nih.gov/
2 https://www.ebi.ac.uk/chembl/
3 http://cdb.ics.uci.edu/
common value [4]. The concentration effect is closely related
to a bad clusterability [5].
Sets of graphs are usually clustered by transforming the
graphs to feature vectors or by using graph theoretic similarity
measures.
Typical feature extraction methods for graphs are: counting
graphlets, that is, small subgraphs [6, 7], counting walks [8],
and using eigenvectors of adjacency matrices (spectral graph
theory) [9]. The enumeration of all subgraphs is considered
intractable even for graphs of moderate size, because there
exist up to exponentially many subgraphs wrt the graph size.
Many efficient clustering algorithms have been proposed for
vector space. Therefore, the transformation to feature vectors might look beneficial in the first place. However, the
above mentioned feature extraction methods tend to produce
a large amount of distinct and often unrelated features. This
results in datasets with a high intrinsic dimensionality [10,
11]. Additionally, the extracted features only approximate the
graph structure, which implies that feature vectors cannot be
transformed back into a graph. Hence, the interpretability of
clustering algorithms which perform vector modifications (e.g.
calculating centroids) is limited.
Besides the utilization of various feature extraction techniques, it is possible to compare graphs directly using graph
theoretic distances such as (maximum) common subgraph
derived distances [12–14] or the graph edit distance [15].
The computation of the previously mentioned graph theoretic
distances is NP-hard and as shown in [11] their application
results in datasets with a high intrinsic dimensionality as well.
High quality clustering methods for arbitrary (metric) and
high dimensional datasets furthermore require a superlinear
number of exact distance computations. These factors render
graph theoretic distance measures in combination with generic
clustering algorithms infeasible for large-scale datasets.
Subspace and projected clustering methods tackle high
dimensional datasets by identifying subspaces in which well
separated clusters exist. However, generic subspace algorithms
come with a high runtime burden and are often limited to an
euclidean vector space.
Our structural projection clustering algorithm approaches
the dimensionality problems by explicitly selecting cluster
representatives in form of common subgraphs. Consider a
feature mapping to binary feature vectors that contain one
feature for each subgraph that is found in the complete dataset.
For each graph, its feature vector has binary entries encoding
the presence of the associated substructure graph. Selecting a
common subgraph S as cluster representative is another way
of selecting a subspace in these feature vectors consisting of
all features associated with subgraphs of S.
Our main contributions in this paper are: We present a
novel structural projection clustering algorithm for datasets of
small labeled graphs which scales linearly with the dataset
size. A set of representatives provides an intuitive description
of each cluster, supports the clustering process, and helps to
interpret the clustering results. Up to our knowledge, this is
the first approach actively selecting representative sets for each
cluster based on a new ranking function. The candidates for
the representatives are constructed using frequent subgraph
sampling. In order to speed up the computation, we suggest
a new error bounded sampling strategy for support counting
in the context of frequent subgraph mining. Our experimental
evaluation shows that our new approach outperforms competitors in its runtime and quality.
The paper is structured as follows: Section II provides an
overview of related clustering algorithms. Basic definitions are
given in Section III. Section IV presents the main algorithm
and a runtime analysis. Our experimental evaluation in which
we compare our new algorithm to SCAP [16], PROCLUS [17]
and Kernel K-Means [18] is presented in Section V.
II. R ELATED W ORK
Several clustering algorithms for graph and molecule data
have been proposed in the last years. Tsuda and Kudo [10]
presented an EM algorithm using a binomial mixture model
over very high dimensional binary vectors, indicating the presence of all frequent substructures. Two years later, Tsuda and
Kurihara [19] presented a similar graph clustering algorithm
using a Dirichlet Process mixture model and pruning the set
of frequent substructures to achieve smaller feature vectors. A
K-Median like graph clustering algorithm has been presented
by Ferrer et al. [20], that maps each graph into the euclidean
space utilizing the edit distance to some pivot elements. A
median graph is then selected based on the distance to the
euclidean median. Furthermore, a parallel greedy overlapping
clustering algorithm has been presented by Seeland et al. [21].
It adds a graph to a cluster whenever a common substructure
of a user-defined minimum size exists. However, none of
the previously mentioned algorithms are suitable for large
datasets as a result of their high computational complexity.
XProj [22] uses a projection-based approach by selecting all
(enumerated) frequent substructures of a fixed size as cluster
representatives. The approach scales well with the dataset
size but is limited to trees. A generalization to graphs would
result in a huge performance degradation. Furthermore, there
exist some hybrid approaches, that pre-cluster the dataset by
using a vector-based representation and refine the results using
structural clustering algorithms. The most relevant with respect
to large-scale datasets is the SCAP algorithm proposed by
Seeland et al. [16].
Of course many subspace algorithms are also applicable after using a feature extraction method. Giving a comprehensive
overview on subspace techniques is out of the scope of this
article. However, there are two algorithms that are of special
interest for this work: In [23] it is shown that frequent pattern
mining can be used for feature selection in vector space.
This relates to XProj and our approach in the way, that the
selection of a graph representative—with the help of frequent
substructure mining—is another way of selecting a subspace
in the feature space of substructures. In the later evaluation
we will compare ourself to the PROCLUS [17] algorithm. It
is a fast projected clustering algorithm with noise detection,
that selects features by minimizing variance. The algorithm
has been studied intensively and performed well in various
subspace clustering comparisons [24, 25].
III. P RELIMINARIES
An undirected labeled graph G = (V, E, l) consists of
a finite set of vertices V (G) = V , a finite set of edges
E(G)U= E ⊆ {{u, v} ⊆ V | u 6= v} and a labeling function
l : V E → L, where L is a finite set of labels. |G| is used
as a short term for |V (G)| + |E(G)|. A path of length n is
a sequence of vertices (v0 , . . . , vn ) such that {vi , vi+1 } ∈ E
and vi 6= vj for i 6= j. Let G and H be two undirected
labeled graphs. A (label preserving) subgraph isomorphism
from G to H is an injection ψ : V (G) → V (H), where ∀v ∈
V (G) : l(v) = l(ψ(v)) and ∀u, v ∈ V (G) : {u, v} ∈ E(G) ⇒
{ψ(u), ψ(v)} ∈ E(H)∧l({u, v}) = l({ψ(u), ψ(v)}). Iff there
exists a subgraph isomorphism from G to H we say G is
supported by H, G is a subgraph of H, H is a supergraph
of G or write G ⊆ H. If there exists a subgraph isomorphism
from G to H and from H to G, the two graphs are isomorphic.
A common subgraph of G and H is a graph S, that is subgraph
isomorphic to G and H. Furthermore, the support sup(G, G)
of a graph G over a set of graphs G is the fraction of graphs
in G, that support G. G is said to be frequent, iff its support is
larger or equal than a minimum support threshold minSup. A
frequent subgraph G is maximal, iff there exists no frequent
supergraph of G. For a set of graphs G, we write F(G)
for the set of all frequent subgraphs and M(G) for the set
of all maximal frequent subgraphs. A clustering of a graph
dataset X is a partition C = {C1 , . . . , Cn } of X . Each cluster
C ∈ C consists of a set of graphs and is linked to a set of
cluster representatives R(C) = {R1 , . . . , Rk } which are itself
undirected labeled graphs. Please note, that we consider each
graph in our dataset to be a distinct object. As a result, it is
possible to have isomorphic graphs in a single set.
IV. T HE StruClus A LGORITHM
A high level description of the StruClus algorithm is given
in Algorithm 1. Initially, it partitions the dataset using a
lightweight pre-clustering algorithm. Afterwards, the clustering is refined using an optimization loop similar to the KMeans algorithm. In order to fit the number of clusters to the
dataset structure (i.e., to achieve a good cluster separation and
homogeneity, see Sections IV-B and IV-D), we use a cluster
splitting and merging strategy in each iteration.
Algorithm 1 StruClus Algorithm
1: apply pre-clustering {Section IV-E}
2: while not convergent {Section IV-F} do
3:
split clusters {Section IV-D}
4:
merge clusters {Section IV-D}
5:
update representatives {Section IV-B}
6:
assign graphs to closest cluster {Section IV-C}
7: end while
∀G, H ∈ G⊆ : G ⊆ H ⇒ sup(G, G) ≥ sup(H, G)
An important ingredient of our algorithm is the set of
representatives R(C) for each cluster C ∈ C. Representatives
serve as an intuitive description of the cluster and define the
substructures over which intra cluster similarity is measured.
The set R(C) is chosen such that for every graph G ∈ C there
exists at least one representative R ∈ R(C) which is subgraph
isomorphic (i.e., supported by G). With the exception of a
single noise cluster the following invariant holds after each
iteration:
∀C ∈ C : ∀G ∈ C : ∃R ∈ R(C) : R ⊆ G.
S 0 or otherwise removed. If no further extension is possible
without violating the minimum support threshold, a maximal
frequent subgraph S has been found. This process is justified
by the monotonicity property of subgraphs G⊆ of graphs in G:
(1)
The representative set R(C) of a cluster C ∈ C is
constructed using maximal frequent subgraphs of C (see
Section IV-A). Having a representative set instead of a single
representative has the advantage, that graphs composed of
multiple common substructures can be represented. In order
to be meaningful and human interpretable, the cardinality of
R(C) is limited by a user defined value Rmax . Figure 1 shows
two example clusters and their representatives of a real world
molecular dataset generated with StruClus.
A. Stochastic Representative Mining
We construct the representative set R(C) of a cluster C ∈ C
using maximal frequent subgraphs of C. Since the set M(C)
may have exponential size wrt the maximal graph size in
C, we restrict ourselves to a subset of candidate representatives S(C) ⊆ M(C) using a randomized maximal frequent
connected subgraph sampling technique from ORIGAMI [26]
combined with a new stochastic sampling strategy for support
counting. In a second step, the final representative set R(C) ⊆
S(C) is selected using a ranking function (see Section IV-B1).
ORIGAMI constructs a maximal frequent connected subgraph S ∈ S(G) over a set of graphs G by extending a
random frequent vertex with frequent paths of length one
leading to a graph S 0 . In a first step, all frequent vertices
N(G) and all frequent paths of length one P(G) are enumerated
with a single scan of G. Then, for each extension, a random
vertex of S 0 is chosen and a random, label preserving path
p ∈ P(G) is connected to it in a forward (creating a new
vertex) or backward (connecting two existing vertices) fashion.
After each extension, the support sup(S 0 , G) is evaluated by
solving a subgraph isomorphism test for all graphs in G. If
sup(S 0 , G) ≥ minSup, the extension is permanently added to
(2)
While ORIGAMI greatly improves performance in comparison
with enumeration algorithms, the |G| subgraph isomorphism
tests for each extension remain a major performance bottleneck for StruClus. For this reason, we have added a stochastic
sampling strategy for support counting.
Initially, we draw a random sample H ⊆ G. Then θ̂ =
sup(S 0 , H) is an estimator for the parameter θ of a binomial distribution B(·, θ), where θ = sup(S 0 , G) is the true
probability of the underlying Bernoulli distribution. We are
interested if the true value of sup(S 0 , G) is smaller than the
minimum support threshold. Without loss of generality, let us
focus on the case θ̂ < minSup in the following. We can take
advantage of a binomial test under the null hypothesis, that
θ ≥ minSup and thereby determine the probability of an
error, if we assume sup(S 0 , G) < minSup. With a predefined
significance level α we can decide if the sample gives us
enough confidence to justify our assumption. If we cannot
discard our null hypothesis, we continue by doubling the
sample size |H| and repeat the process. In the extreme case
we will therefore calculate the exact value of sup(S 0 , G).
The statistical test is repeated for each extension and each
sample size doubling. As a consequence, a multiple hypothesis
testing correction is necessary to bound the real error for S to
be a maximal frequent substructure of G.
Proposition IV-A.1. Let G be a set of undirected labeled
graphs, |Hmin | the minimal sample size, P(G) the set of all
frequent paths of length one, minSup a minimum support
threshold, and Vmax the (1 − minSup)-quantile of the sorted
(increasing order) graph sizes of each graph in G. Then the
maximal number of binomial tests to construct a maximal
frequent substructure over G is bounded by:
|G|
2
(Vmax
+ Vmax ) |P(G)|
log
|Hmin |
m
l
times if the
Proof. The sample size is doubled log |H|G|
|
min
test never reaches the desired significance level. The size of
some S ∈ M(G) is bounded by the size of each supporting
graph. In the worst case S is supported by the (|G|minSup)largest graphs of G. The graph size of the smallest supporting
graph is then equal to the (1 − minSup)-quantile of the sorted
graph sizes in increasing order. The number of backward
extensions is bounded by the number of vertex pairs times
the number of applicable extensions p ∈ P(G). Additionally,
we need to check |P(G)| forward extensions for each vertex
to conclude that S is maximal.
Finally, with the value of Proposition IV-A.1 we are able
to apply a Bonferroni correction to our significance level. We
can afford a relative high error, because the selection of the
Fig. 1. Two real world clusters generated with StruClus. The grey boxes show the cluster representatives.
final representatives will filter out bad candidates. However,
the used significance level has an influence on the runtime.
On the one hand a high error leads to many bad candidates
and we need to increase the number of candidates to mine. On
the other hand a low error will lead to larger sample sizes to
reject the null hypothesis. A maximal error of 50% has turned
out to be a good choice during our experimental evaluation.
B. Update Representatives
1) Representative Selection: In its role as a cluster description, a good representative R ∈ R(C) explains a large
portion of its cluster. Accordingly, it should (a) be supported
by a large fraction of C and (b) cover a large fraction of
vertices and edges of each graph G ∈ C supporting R. We
define the coverage of a graph G by a representative R as
|R|
cov(R, G) := |G|
. The two criteria are closely related to the
cluster homogeneity. A uniform cluster, that is, a cluster that
contains only isomorphic graphs, can achieve optimal values
for both criteria. Vice versa, the monotonicity property (2)
implies non-optimal values for inhomogeneous clusters for at
least one of the two criteria. As homogeneous clusters are
desired, we use a product of the two criteria for our ranking
function.
In order to discriminate clusters from each other, a cluster
representative should be cluster specific as well. Thus, its
support in the rest of the dataset should be low. For this reason,
we use the following ranking function for a dataset X , cluster
C and representative R ∈ R(C):
CR := {G ∈ C | R ⊆ G}
|CR | |R|
(sup(R, C) − sup(R, X ))
rank(R) := P
G∈CR |G|
(3)
Finally, we select the Rmax highest ranked sampled subgraphs
from S(C) as cluster representatives R(C).
2) Balancing Cluster Homogeneity: Besides the representative selection, the choice of the minimum support threshold
for representative mining has an influence on the cluster
homogeneity. The fraction of unsupported graphs for a cluster C after updating the cluster representatives is bounded
by (1 − minSup). The bound clearly relates to criteria (a)
from the representative ranking (see Section IV-B1). However,
unsupported graphs are removed from the cluster and will be
assigned to a different cluster at the end of the current iteration
(see Section IV-C). Due to the monotonicity property (2), this
process of sorting out graphs by choosing a minimum support
threshold below 1, will increase the size of the representatives
and therefore our coverage value, i.e criteria (b). A decrease
of the minimum support threshold will lead to an increase in
the size of the representatives. Subsequently, this process will
also reduce the cluster cardinality. Therefore, increasing the
homogeneity to an optimal value will result in a clustering
with uniform or singleton clusters, which is clearly not the
desired behavior.
To get around this, we will aim towards a similar homogeneity for all clusters and choose the minimum support threshold
cluster specific. However, choosing a fixed homogeneity level
a priori is not an easy task, as an appropriate value depends on
the dataset. Therefore we will calculate an average coverage
score over all clusters and use this as a baseline adjustment.
For the ease of computation, we choose a slightly simplified
coverage approximation:
aCov(C) =
relCov(C, C) =
1
|R(C)|
1
|C|
1
|C|
P
R∈R(C) |R|
P
G∈C |G|
aCov(C)
P
0
C 0 ∈C aCov(C )
(4)
(5)
Finally, we can define a linear mapping from the relative coverage relCov to a cluster specific minimum support threshold
with the help of two predefined tuples (ls, lr ) and (hs, hr ),
where ls < hs and lr < hr . The parameter ls (hs) denotes the
lowest (highest) support value and lr (hr ) the relative coverage
value mapped to the lowest (highest) minimum support:
hs − ls
hs − ls
f(C, C) := relCov(C, C)
+ (ls − lr
)
hr − lr
hr − lr
if relCov(C, C) < lr
ls
minSup(C, C) := hs
(6)
if relCov(C, C) > hr
f(C, C) otherwise.
To result in a minimum support threshold of 1 for all clusters
(i.e. stopping the process of sorting out graphs if the clustering
is balanced), we will set the values of the parameters hs very
close or equal to 1 and hr < 1.
C. Cluster Assignment
Each graph G in the dataset is assigned to its most similar
cluster in the assignment phase. As a measure for similarity,
we are summing up the squared sizes of the representatives of
a cluster, which are subgraph isomorphic to G. This choice of
similarity is once more justified by the representative ranking
criteria. We square the representative sizes, to prefer a high
coverage over a high number of representatives to be subgraph
isomorphic to the assigned graph.
As mentioned in Section IV-B2 it is possible that a graph
G ∈ C will no more be supported by any representative R ∈
R(C) of its cluster C after updating the representatives. In this
situation we will create a single noise cluster, where all graphs
(of all clusters) that are not supported by any representative
are collected. As the minimum support threshold is bounded
by the fixed value ls (see Section IV-B2) and the number
of representatives is limited by Rmax , it is not guaranteed
that we can find an appropriate set of representatives for this
most likely largely inhomogeneous noise cluster. It is therefore
excluded from the invariant (1).
The problem of finding all subgraph isomorphic graphs in a
graph database is also known as the subgraph search problem
and was extensively studied in the past. We apply the fingerprint pre-filtering technique CT-Index [27], which has emerged
from this research topic, to speed up the assignment phase.
CT-Index enumerates trees and circles up to a specified size
for a given graph and hashes the presence of these subgraphs
into a binary fingerprint of fixed length. If the fingerprint of
a graph G has a bit set that is unset in the fingerprint of
a graph H we can conclude that no subgraph isomorphism
from G to H exists, because G contains a subgraph that is not
present in H. We calculate a fingerprint for each graph and
representative and only perform a subgraph isomorphism test
in our assignment phase if the fingerprint comparison cannot
rule out the presence of a subgraph isomorphism.
D. Cluster Splitting and Merging
Without the operation of cluster splitting, the above mentioned process of creating noise clusters would create at most
one extra cluster in each iteration of our main loop. A large
difference in the initial and final number of clusters therefore
would lead to a slow convergence of the StruClus algorithm
towards its final result. As mentioned before, it is also possible
that no representative is found at all for the noise cluster,
and therefore the process of sorting out graphs from the noise
cluster to increase its homogeneity is stopped completely in the
worst case. A similar situation can occur for regular clusters.
For example, if a cluster is composed of uniform sets T ∈ T
of graphs, we will require a minimum support threshold less
1
than or equal to 1 − minT ∈T
{|T |} to sort the smallest possible
number of graphs out. For this reason, a cluster splitting step is
necessary (see Algorithm 1). In this step, all clusters that have
a relative coverage value below an a priori specified threshold
relCovmin will be merged into a single set of graphs and
the pre-clustering algorithm is applied on them. The resulting
clusters are added back to the clustering.
On the contrary to cluster splitting, which focuses on cluster
homogeneity, cluster merging ensures a minimum separation
between clusters. Separation can be measured on different levels. Many classical measures define separation as the minimum
distance between two cluster elements. However, this type of
definition is not suitable for projected clustering algorithms,
because the comparison does not take the cluster specific
subspace into account. As mentioned in the introduction,
the cluster representatives in StruClus define the subspace
of the cluster. Additionally, they serve as a description of
the graphs inside the cluster itself. A high coverage value
leads to an accurate cluster description. Thus, we will define
separation between two clusters C and C 0 solely over the
representatives sets R(C) and R(C 0 ). This definition is also
beneficial from a runtime perspective, as separation calculation
is independent of the cluster size. Without cluster merging it
is possible that clusters with very similar representatives do
exist. Although the pre-clustering will ensure that the initial
clusters will have dissimilar representatives (see Section IV-E)
it may happen that two clusters converge towards each other or
that newly formed clusters are similar to an already existing
one. Therefore, we will merge two clusters whenever their
representatives are too similar.
To compare two single representatives R, R0 we calculate
the size of their maximum common subgraph (MCS) and use
its relative size as similarity:
sim(R, R0 ) :=
|mcs(R, R0 )|
max{|R|, |R0 |}
(7)
The maximum of the representatives sizes is chosen as denominator to support different clusters with subgraph isomorphic
representatives, which differ largely in size. Finally, we will
merge two clusters C and C 0 if the following condition holds:
|{(R, R0 ) ∈ R(C) × R(C 0 ) | sim(R, R0 )
≥ sim min }| ≥ sim num
(8)
where sim num is a minimum number of representative pairs
which have a similarity greater than or equal to sim min .
Note that the calculated MCS between two representatives
R ∈ R(C), R0 ∈ R(C 0 ) is supported by all the graphs
G ∈ C ∪ C 0 , that support either R or R0 , because the
subgraph isomorphism relation is transitive. The coverage for
these graphs in the merged cluster is furthermore bounded
by max{cov(G, R), cov(G, R0 )} sim(R, R0 ) if we reuse the
MCS as representative. For this reason, we recommend to set
sim num close to the number of representatives per cluster to
support a large fraction of graphs in the merged cluster. The
parameter sim min is furthermore an intuitive knob to adjust
the granularity of the clustering.
Finally, the representatives for the merged clusters are updated. We do not use the calculated MCSs as representatives,
because better representatives may exist and the decision
problem “Does an MCS larger than some threshold exist?”
is computationally less demanding than calculating the MCS
itself.
E. Pre-Clustering
The pre-clustering serves as an initial partitioning of the
dataset. A random partitioning of all graphs would be problematic as representatives may not be found for all partitions and
the found representatives are most likely not cluster specific.
This will result in a high number of clusters to be merged to
a few inhomogeneous clusters and in a slow convergence of
the StruClus algorithm.
To pre-cluster the dataset X , we compute maximal frequent
subgraphs S(X ) ⊆ M(X ), as described in Section IV-A with
a fixed minimum support. These frequent subgraphs serve as
representative candidates for the initial clusters. To avoid very
similar representatives we will first greedily construct maximal
sets of dissimilar graphs. As a measure of similarity we reuse the similarity (7) and the threshold sim min from cluster
merging. In other words, we are picking all graphs G from
S(X ) in a random order and add G to our dissimilar set D, if
@H ∈ D with sim(G, H) < sim min . This process is repeated
several times and the largest set Dmax is used to create one
cluster for each H ∈ D with H as single representative.
Afterwards we run a regular assignment phase as described in
Section IV-C. As a result of re-using sim min we can expect,
that we have well separated cluster and no cluster merging is
necessary in the first iteration of the main loop (excluding the
noise cluster).
F. Convergence
StruClus optimizes cluster homogeneity while maintaining
a minimal cluster separation. As described in Section IV-B2,
homogeneity is defined by two criteria wrt the cluster representatives. With an exception of the noise cluster, the
representative support criteria (a) can be dismissed, because
not represented graphs will be sorted out of the cluster. It
was further discussed, that an optimal homogeneity can be
achieved for singleton clusters. However, the later introduced
cluster separation constraint will limit the granularity of the
clustering, because two similar representatives will be merged.
Nevertheless, there might exist several clusterings with different granularity that respect the separation constraint. For this
reason the objective function balances the coverage criteria (b)
of the homogeneity and the granularity of the clustering. The
parameter α adjusts this granularity:
P
|C| aCov(C)
(9)
z(C) := C∈C
α
|C|
As a consequence of the cluster splitting and merging, the
objective function will fluctuate and contain local optima. We
will therefore smooth the objective function. Let Ci be the
clustering after the i-th iteration. Algorithm 1 will terminate
after the first iteration c for which the following condition
holds:
P
c−w<i≤c z(Ci )
≤1+β
(10)
c≥s+w∧ P
c−s−w<i≤c−s z(Ci )
where w is the averaging width and β is the minimum relative
increase of the objective function in s iterations.
G. Runtime Analysis
The subgraph isomorphism problem and the maximum
common subgraph problem are both NP-complete even in their
decision variants [28]. StruClus solves these problems in order
to calculate the support and to decide if clusters need to be
merged. Furthermore, the size of a representative can be linear
in the sizes of the supporting graphs. Thus, StruClus scales
exponentially wrt the size of the graphs in the dataset X .
Nevertheless, these problems can be solved sufficiently fast
for small graphs with a few hundred vertices and edges, e.g.,
molecular structures. We will therefore consider the graph size
a constant in the following analysis and focus on the scalability
wrt the dataset size. Let Vmax be the maximal number of
vertices for a graph in X and Cmax the maximal number of
clusters during the clustering process.
Representative Mining: As described in Proposition IV-A.1 the number of extensions to mine a single maximal
frequent subgraph from a set of graphs G ⊆ X is bounded
2
by (Vmax
+ Vmax ) |P(G)|. The variable Vmax is obviously
a constant. Also |P(G)| is only bounded by Vmax and the
lowest minimum support threshold ls, as a fraction of dlsV 2|G|e
max
of all edges in G must be isomorphic to be frequent. Thus,
2
Vmax
there exist at most ls frequent paths of length one. Note,
that the number of distinct labels does not have an influence
on this theoretical bound. For each mined maximal frequent
subgraph we need to calculate the support over G and this
involves O(|G|) many subgraph isomorphism tests. Therefore,
the runtime to mine a single maximal frequent subgraph is
bounded by O(|G|).
Representative Update: Updating the representatives involves two steps: representative mining and representative
selection. Representative mining includes the calculation of
the cluster specific minimum support with the help of relCov.
The relCov values for each cluster can be calculated in
O(Cmax ) if we maintain a sum of the graph sizes of each
cluster and update this value during cluster assignment. Since
the cluster sizes sum up to |X | the runtime of the actual
frequent subgraph mining is in O(X ). To rank a representative
candidate R ∈ R(C), the set CR , the value sup(R, C), and the
value sup(R, X ) can be calculated by a single scan over X , i.e.
calculating whether R is subgraph isomorphic to each graph
in X . As the number of candidates per cluster is a constant,
the runtime of the ranking is in O(Cmax |X |), which is also
the overall runtime of the representative update.
Other Parts: The runtimes of the cluster assignment and
the pre-clustering are in O(Cmax |X |). Cluster splitting is com2
putable in O(Cmax + |X |), cluster merging in O(Cmax
+ |X |),
and converge in O(Cmax ) time.
Overall Runtime: A single iteration of Algorithm 1 has a
runtime of O(Cmax |X |), and hence is linear. This is justified
2
) ≤ O(Cmax |X |). Let m be
by the observation that O(Cmax
the number of iterations after Algorithm 1 terminates. Then,
the overall runtime is in O(m Cmax |X |).
V. E VALUATION
In the following evaluation we compare StruClus to SCAP
[16], PROCLUS [17] and Kernel K-Means [18] wrt their
runtime and the clustering quality. Furthermore, we evaluate
the influence of our sampling strategy for support counting
and evaluate the parallel scaling of our implementation.
Hardware & Software: All tests were performed on a
dual socket NUMA system (Intel Xeon E5-2640 v3) with 128
GiB of RAM. The applications were pinned to a single NUMA
domain (i.e. 8 cores + HT / 64 GiB RAM) to eliminate random
memory effects. Turbo Boost was deactivated to minimize
external runtime influences. Ubuntu Linux 14.04.1 was used
as operating system. The Java implementations of StruClus,
PROCLUS and Kernel K-Means were running in an Oracle
Java Hotspot VM 1.8.0 66. SCAP was compiled with GCC
4.9.3 and -O3 optimization level. StruClus and SCAP are
shared memory parallelized.
Test Setup & Evaluation Measures: The tests were
repeated 30 times if the runtime was below 2 hours and
15 times otherwise. Quality is measured by ground truth
comparisons. We use the Normalized Variation of Information
(NVI) [29] and Fowlkes-Mallows (FW) [30] measures for
StruClus, PROCLUS and Kernel K-Means. While NVI and
FW are established quality measures, they are not suited for
overlapping clusterings as produces by SCAP. Thus, Purity
[31] was used for comparison with SCAP.
Datasets: We evaluate the algorithms on synthetic
datasets of different sizes and three real world datasets. The
synthetic datasets have ≈ 35 vertices and ≈ 51 edges on
average with 10 vertex and 3 edge labels (weights drawn
from an exponential distribution). They contain 100 clusters
and 5% random noise graphs. For each cluster 3 seed patterns
were randomly generated with a Poisson distributed number of
vertices (mean 10) and an edge probability of 10%. Additionally, we created a common seed pool with 100 (noise) seeds.
The cluster specific graphs were then generated by connecting
the cluster specific seeds with 0 to 2 common noise seeds.
The first real world dataset (AnchorQuery) is a molecular
de-novo database. Each molecule is the result of a chemical
reaction of multiple purchasable building blocks. We have
used 11 reaction types, i.e., class labels, from AnchorQuery4 .
The second real world dataset (Heterocyclic) is similar to
the first one, but contains heterocyclic compounds and 39
distinct reaction types. The third real world dataset (ChemDB)
contains 5 million molecules from ChemDB [32]. ChemDB
is a collection of purchasable molecules from 150 chemical
vendors. The dataset has no ground truth and will mainly
serve as proof that we are able to cluster large real world
datasets. Table I shows additional statistics about these real
world datasets.
To cluster the datasets with PROCLUS the graph data was
transformed to vectors by counting distinct subgraphs of size 3,
resulting in 7 000 to 10 000 features on the synthetic datasets.
The application to the AnchorQuery and Heterocyclic datasets
results in much lower feature counts of 274 and 133. The same
vectors were used as features space representation for Kernel K-Means. Additionally, we have evaluated various other
graph kernels with explicit feature mapping for PROCLUS
and Kernel K-Means, such as the Weisfeiler-Lehman shortest
path, Weisfeiler-Lehman subtree and fixed length random walk
kernels [33]. However, we observed feature vectors with even
higher dimensionality and clustering results with lower quality.
For this reason, the results of these graph kernels are omitted
here.
Algorithm Configuration: The parameters of StruClus
were set as follows: maximal error for support counting: 50%;
number of representative candidates: 25; minimum support
threshold calculated with: lr = 0; ls = 0.4; hr = 0.9; hs =
0.99; splitting threshold: aCov ≤ 0.6; minimum separation
sim min = 0.3; sim num = 3; convergence determined with:
α = 1, β = 0.01, w = 3, s = 3. SCAP has two parameters:
(a) the minimum size for a common substructure, that must be
present in a single cluster and (b) a parameter that influences
the granularity of the fingerprint-based pre-partitioning. (a)
was set to 80% of the mean seed size for the synthetic dataset,
otherwise to 8. (b) was set to the highest number that results
in a reasonable clustering quality, as the clustering process
is faster with fine grained pre-partitioning, but cannot find
any clusters over the pre-partition boundary. For the synthetic
dataset this was 0.2. PROCLUS has two parameters as well:
(a) the number of clusters and (b) the average dimensionality
of the cluster subspaces. (a) was set to the number of clusters
in the ground truth. The ChemDB dataset, which has no
ground truth, was too large for PROCLUS. (b) was set to 20,
for which we got best quality results. The number of clusters
4 http://anchorquery.csb.pitt.edu/reactions/
TABLE I
R EAL WORLD DATASET STATISTICS . C UMULATED VALUES ARE GIVEN AS TRIPLE MIN / MAX / AVERAGE .
dataset
size
AnchorQuery
Heterocyclic
ChemDB
65 700
10 000
5 000 000
classes
# vertices
# edges
# vertex labels
# edge labels
11
39
–
11 / 90 / 79.19
9 / 69 / 42.99
1 / 684 / 50.74
11 / 99 / 86.02
10 / 79 / 47.35
0 / 745 / 53.20
6
25
86
5
5
5
Scaling
is the only parameter of Kernel K-Means and was set in exact
the same manner as for PROCLUS. Please note, that the a
priory selection of this optimal value gives PROCLUS and
Kernel K-Means an advantage over their competitors during
the evaluation.
Results: As shown in Table II, StruClus outperforms
all competitors in terms of quality on the synthetic datasets.
The differences of all corresponding mean quality values are
always larger than small multiples of the standard deviations.
For small synthetic datasets, SCAP was the fastest algorithm.
This changes for larger data set sizes. StruClus outperforms
SCAP by a factor of ≈ 13 at size 500 000. Furthermore,
we were unable to cluster the largest dataset with SCAP in
less than 2 days. PROCLUS and Kernel K-Means were the
slowest algorithms with a huge gap to their next competitor.
The sublinear growth of StruClus’s runtime for the smaller
datasets sizes is caused by our sampling strategy for support
counting. Running StruClus with exact support counting yields
a linear growth in runtime. It is important to mention that the
clustering quality is not significantly influenced by the support
counting strategy.
Our implementation of StruClus scales well with the number
of cores as shown in Fig. 2. With 8 cores we get a speedup of
7.15. Including the Hyper-Threading cores, we get a speedup
of 9.11.
10
8
6
4
2
00
Optimal Scaling
Scaling StruClus (CV < 0.02)
1
2
4
Cores
8
8+HT
Fig. 2. Parallel scaling: synthetic dataset of size 10 000
The evaluation results wrt the real world datasets are summarized in Table III. We were unable to cluster the AnchorQuery and the ChemDB datasets with PROCLUS, Kernel KMeans and SCAP (even for high values of parameter (b)) in
less than 2 days. For the chemical reaction datasets, StruClus
also needs more time compared to a synthetic dataset of similar
size. This runtime increase can be partially explained by the
larger graph sizes. However, other hidden parameters of the
datasets, such as the size of maximal common substructures
have an influence on the runtime as well. StruClus had
some runtime outliers on the Heterocyclic dataset. They were
caused by small temporary clusters with large (> 60 vertices)
representatives. The high runtime of the SCAP algorithm on
the AnchorQuery dataset is a bit surprising, as the common
substructures processed by SCAP are limited in their size
(maximum 8 vertices). We consider a larger frequent pattern
search space to be the reason for this runtime increase. Kernel
K-Means was surprisingly slow on the Heterocyclic dataset
and took more than 24 hours for a single run. We have
therefore created a random subset with a size of 5000 graphs
for it.
StruClus always outperforms the competitors wrt the quality
scores. For the AnchorQuery dataset StruClus created 26
clusters on average. The high score for the Purity measure
shows, that StruClus splitted some of the real clusters, but
keeps a well inter cluster separation. ChemDB was clustered
by StruClus in ≈ 19 hours with ≈ 117 clusters. As a
consequence of the high runtime of the ChemDB measurement
and the lack of competitors, we repeated the test only 3 times.
The aCov value for the final clustering was 0.49 on average.
This highlights the ability of StruClus to cluster large-scale
real-world datasets.
VI. C ONCLUSION
In this paper we have presented a new structural clustering
algorithm for large scale datasets of small labeled graphs. With
the help of explicitly selected cluster representatives, we were
able to achieve a linear runtime in the worst case wrt the
dataset size. A novel support counting sampling strategy with
multiple hypothesis testing correction was able to accelerate
the algorithm significantly without lowering the clustering
quality. We have furthermore shown, that cluster homogeneity
can be balanced with a dynamic minimum support strategy
for representative mining. A cluster merging and splitting
step was introduced to achieve a well separated clustering
even in the high dimensional pattern space. Our experimental
evaluation has shown that our new approach outperforms the
competitors wrt clustering quality, while attaining significantly
lower runtimes for large scale datasets. Although we have
shown that StruClus greatly improves the clustering performance compared to its competitors, de-novo datasets with
several billion of molecules are still outside the scope of
this work. For this reason, we consider the development of a
distributed variant of the algorithm to be future work. Another
consideration to further improve the quality of the algorithm
is to integrate a discriminative frequent subgraph miner for
representative mining. The integration of the discriminative
property into the mining process has the advantage, that higher
TABLE II
R ESULTS FOR THE SYNTHETIC DATASETS . RUNTIMES ARE GIVEN IN HOURS . B EST RESULTS ARE MARKED BOLD . CV IS THE COEFFICIENT OF
VARIATION . T HE CV VALUE IS GIVEN AS THE MAXIMUM FOR EACH COLUMN . A LL OTHER VALUES ARE AVERAGED . Q UALITY MEASURES ARE :
N ORMALIZED VARIATION OF I NFORMATION (NVI), F OWLKES -M ALLOWS I NDEX (FW), AND P URITY.
Size
Runtime
CV < 0.08
1 000
5 000
10 000
50 000
100 000
500 000
1 000 000
0.05
–
0.19
0.33
0.47
1.35
2.73
StruClus
NVI
FM
Purity
StruClus (Exact Support)
Runtime NVI
FM
Runtime
SCAP
Purity
Runtime
PROCLUS
NVI
FM
Kernel K-Means
Runtime
NVI
FM
< 0.03
< 0.07
< 0.03
< 0.07
< 0.02
< 0.04
< 0.06
< 0.02
< 0.32
< 0.11
< 0.22
< 0.01
< 0.01
< 0.01
0.90
–
0.95
0.94
0.93
0.93
0.91
0.75
–
0.87
0.87
0.86
0.86
0.84
0.90
–
0.99
0.99
0.99
0.99
0.98
0.05
–
0.59
2.69
–
–
–
0.90
–
0.93
0.92
–
–
–
0.77
–
0.85
0.85
–
–
–
7.5 × 10−4
–
0.03
0.38
1.21
18.15
–
0.83
–
0.83
0.83
0.86
0.83
–
0.13
4.99
11.91
–
–
–
–
0.58
0.50
0.49
–
–
–
–
0.26
0.24
0.24
–
–
–
–
0.02
2.87
10.32
–
–
–
–
0.77
0.84
0.86
–
–
–
–
0.54
0.67
0.78
–
–
–
–
TABLE III
R ESULTS FOR THE REAL WORLD DATASETS . RUNTIMES ARE GIVEN IN HOURS . B EST RESULTS ARE MARKED BOLD . CV IS THE COEFFICIENT OF
VARIATION . T HE CV VALUE IS GIVEN AS THE MAXIMUM FOR EACH COLUMN . A LL OTHER VALUES ARE AVERAGED . T HE C HEM DB MEASUREMENT WAS
REPEATED ONLY 3 TIMES . W E HAVE NOT CALCULATED THE — OTHERWISE MEANINGLESS — CV FOR IT. R ESULTS FOR K ERNEL K-M EANS ARE ARE
GIVEN FOR A RANDOM SUBSET OF THE H ETEROCYLCIC DATASET. Q UALITY MEASURES ARE : N ORMALIZED VARIATION OF I NFORMATION (NVI),
F OWLKES -M ALLOWS I NDEX (FW), AND P URITY.
dataset
Runtime
CV < 2.91
AnchorQuery
Heterocyclic
ChemDB
2.47
1.07
≈ 19
StruClus
NVI
FM
Purity
SCAP
Runtime Purity
Runtime
< 0.09
< 0.12
< 0.08
< 0.02
< 0.01
< 0.03
< 0.05
< 0.08
< 0.01
< 0.01
< 0.01
0.44
0.46
–
0.63
0.53
–
0.89
0.66
–
–
0.01
–
–
0.58
–
–
0.01
–
–
0.29
–
–
0.29
–
–
3 .03 (Subset)
–
–
0.27
–
–
0 .29
–
quality representative candidates are mined. This will result in
a lower number of necessary candidate patterns, which has a
positive effect on the runtime. Furthermore, it allows to mine
highly discriminant, non-maximal subgraphs. However, it is
non-trivial to extend the support counting sampling strategy
to such miners. Additionally, discriminative scores are usually
non-monotonic on the subgraph lattice [34, 35], which imposes
another runtime burden.
ACKNOWLEDGMENT
This work was supported by the German Research Foundation (DFG), priority programme Algorithms for Big Data
(SPP 1736). We would like to thank Nils Kriege for providing
a fast subgraph isomorphism and Madeleine Seeland, Andreas
Karwath, and Stefan Kramer for providing their SCAP implementation.
R EFERENCES
[1]
[2]
[3]
C. Kalinski, M. Umkehrer, L. Weber, J. Kolb, C. Burdack, and G. Ross,
“On the industrial applications of mcrs: molecular diversity in drug
discovery and generic drug synthesis,” English, Molecular Diversity,
vol. 14, no. 3, pp. 513–522, 2010.
E. Chávez and G. Navarro, “A probabilistic spell for the curse
of dimensionality,” in Algorithm Engineering and Experimentation,
Third International Workshop, ALENEX 2001, Washington, DC, USA,
January 5-6, 2001, Revised Papers, A. L. Buchsbaum and J. Snoeyink,
Eds., ser. Lecture Notes in Computer Science, vol. 2153, Springer,
2001, pp. 147–160.
A. Gupta, R. Krauthgamer, and J. R. Lee, “Bounded geometries,
fractals, and low-distortion embeddings,” in Foundations of Computer
Science, 2003. Proceedings. 44th Annual IEEE Symposium on, IEEE,
2003, pp. 534–543.
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
PROCLUS
NVI
FM
Runtime
Kernel K-Means
NVI
FM
K. S. Beyer, J. Goldstein, R. Ramakrishnan, and U. Shaft, “When is
”nearest neighbor” meaningful?,” in Proceedings of the 7th International Conference on Database Theory, ser. ICDT ’99, London, UK,
UK: Springer-Verlag, 1999, pp. 217–235.
M. Ackerman and S. Ben-David, “Clusterability: A theoretical study,”
in Proceedings of the Twelfth International Conference on Artificial
Intelligence and Statistics, AISTATS 2009, Clearwater Beach, Florida,
USA, April 16-18, 2009, D. A. V. Dyk and M. Welling, Eds., ser. JMLR
Proceedings, vol. 5, JMLR.org, 2009, pp. 1–8.
N. Wale, I. A. Watson, and G. Karypis, “Comparison of descriptor
spaces for chemical compound retrieval and classification,” Knowl. Inf.
Syst., vol. 14, no. 3, pp. 347–375, 2008.
N. Shervashidze, S. V. N. Vishwanathan, T. Petri, K. Mehlhorn, and K.
M. Borgwardt, “Efficient graphlet kernels for large graph comparison,”
in Proceedings of the Twelfth International Conference on Artificial
Intelligence and Statistics, AISTATS 2009, Clearwater Beach, Florida,
USA, April 16-18, 2009, D. A. V. Dyk and M. Welling, Eds., ser. JMLR
Proceedings, vol. 5, JMLR.org, 2009, pp. 488–495.
S. V. N. Vishwanathan, N. N. Schraudolph, R. I. Kondor, and K. M.
Borgwardt, “Graph kernels,” Journal of Machine Learning Research,
vol. 11, pp. 1201–1242, 2010.
P. Foggia, G. Percannella, and M. Vento, “Graph matching and learning
in pattern recognition in the last 10 years,” IJPRAI, vol. 28, no. 1, 2014.
K. Tsuda and T. Kudo, “Clustering graphs by weighted substructure
mining,” in Proceedings of the 23rd international conference on
Machine learning, ACM, 2006, pp. 953–960.
N. Kriege, P. Mutzel, and T. Schäfer, “Practical sahn clustering for
very large data sets and expensive distance metrics,” Journal of Graph
Algorithms and Applications, vol. 18, no. 4, pp. 577–602, 2014.
H. Bunke and K. Shearer, “A graph distance metric based on the
maximal common subgraph,” Pattern Recognition Letters, vol. 19, no.
3-4, pp. 255–259, 1998.
W. D. Wallis, P. Shoubridge, M. Kraetzl, and D. Ray, “Graph distances
using graph union,” Pattern Recognition Letters, vol. 22, no. 6/7,
pp. 701–704, 2001.
M.-L. Fernández and G. Valiente, “A graph distance metric combining
maximum common subgraph and minimum common supergraph,”
Pattern Recognition Letters, vol. 22, no. 6–7, pp. 753 –758, 2001.
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
H. Bunke, “On a relation between graph edit distance and maximum common subgraph,” Pattern Recognition Letters, vol. 18, no. 8,
pp. 689–694, 1997.
M. Seeland, A. Karwath, and S. Kramer, “Structural clustering of
millions of molecular graphs,” in Symposium on Applied Computing,
SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014,
Y. Cho, S. Y. Shin, S. Kim, C. Hung, and J. Hong, Eds., ACM, 2014,
pp. 121–128.
C. C. Aggarwal, C. M. Procopiuc, J. L. Wolf, P. S. Yu, and J. S.
Park, “Fast algorithms for projected clustering,” in SIGMOD 1999,
Proceedings ACM SIGMOD International Conference on Management
of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., A. Delis, C.
Faloutsos, and S. Ghandeharizadeh, Eds., ACM Press, 1999, pp. 61–72.
M. A. Girolami, “Mercer kernel-based clustering in feature space,”
IEEE Trans. Neural Networks, vol. 13, no. 3, pp. 780–784, 2002.
K. Tsuda and K. Kurihara, “Graph mining with variational dirichlet
process mixture models,” in Proceedings of the SIAM International
Conference on Data Mining, SDM 2008, April 24-26, 2008, Atlanta,
Georgia, USA, SIAM, 2008, pp. 432–442.
M. Ferrer, E. Valveny, F. Serratosa, I. Bardajı́, and H. Bunke, “Graphbased k-means clustering: A comparison of the set median versus
the generalized median graph,” in Computer Analysis of Images
and Patterns, 13th International Conference, CAIP 2009, Münster,
Germany, September 2-4, 2009. Proceedings, X. Jiang and N. Petkov,
Eds., ser. Lecture Notes in Computer Science, vol. 5702, Springer,
2009, pp. 342–350.
M. Seeland, S. A. Berger, A. Stamatakis, and S. Kramer, “Parallel
structural graph clustering,” in Machine Learning and Knowledge
Discovery in Databases - European Conference, ECML PKDD 2011,
Athens, Greece, September 5-9, 2011, Proceedings, Part III, 2011,
pp. 256–272.
C. C. Aggarwal, N. Ta, J. Wang, J. Feng, and M. J. Zaki, “Xproj: a
framework for projected structural clustering of xml documents,” in
Proceedings of the 13th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, San Jose, California, USA,
August 12-15, 2007, P. Berkhin, R. Caruana, and X. Wu, Eds., ACM,
2007, pp. 46–55.
M. L. Yiu and N. Mamoulis, “Frequent-pattern based iterative projected clustering,” in Data Mining, 2003. ICDM 2003. Third IEEE
International Conference on, 2003, pp. 689–692.
E. Müller, S. Günnemann, I. Assent, and T. Seidl, “Evaluating clustering in subspace projections of high dimensional data,” in Proc. 35th
International Conference on Very Large Data Bases (VLDB 2009),
Lyon, France, PVLDB Journal, Vol. 2, No. 1,, VLDB Endowment,
2009, pp. 1270–1281.
A. Patrikainen and M. Meila, “Comparing subspace clusterings,” IEEE
Trans. Knowl. Data Eng., vol. 18, no. 7, pp. 902–916, 2006.
M. A. Hasan, V. Chaoji, S. Salem, J. Besson, and M. J. Zaki,
“ORIGAMI: mining representative orthogonal graph patterns,” in Proceedings of the 7th IEEE International Conference on Data Mining
(ICDM 2007), October 28-31, 2007, Omaha, Nebraska, USA, IEEE
Computer Society, 2007, pp. 153–162.
K. Klein, N. Kriege, and P. Mutzel, “CT-Index: fingerprint-based graph
indexing combining cycles and trees,” in Data Engineering (ICDE),
2011 IEEE 27th International Conference on, 2011, pp. 1115–1126.
M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide
to the Theory of NP-Completeness. W. H. Freeman, 1979.
M. Meilă, “Comparing clusterings—an information based distance,”
Journal of multivariate analysis, vol. 98, no. 5, pp. 873–895, 2007.
E. B. Fowlkes and C. L. Mallows, “A method for comparing two hierarchical clusterings,” Journal of the American Statistical Association,
vol. 78, no. 383, pp. 553–569, 1983.
X. Hui and L. Zhongmon, “Clustering validation measures,” in Data
clustering: algorithms and applications, C. C. Aggarwal and C. K.
Reddy, Eds., New York: CRC Press, 2013, ch. 23, pp. 571–605.
J. H. Chen, E. Linstead, S. J. Swamidass, D. Wang, and P. Baldi,
“Chemdb update—full-text search and virtual chemical space,” Bioinformatics, vol. 23, no. 17, pp. 2348–2351, 2007.
N. Shervashidze, P. Schweitzer, E. J. van Leeuwen, K. Mehlhorn,
and K. M. Borgwardt, “Weisfeiler-lehman graph kernels,” Journal of
Machine Learning Research, vol. 12, pp. 2539–2561, 2011.
X. Yan, H. Cheng, J. Han, and P. S. Yu, “Mining significant graph
patterns by leap search,” in Proceedings of the ACM SIGMOD
International Conference on Management of Data, SIGMOD 2008,
[35]
[36]
Vancouver, BC, Canada, June 10-12, 2008, J. T. Wang, Ed., ACM,
2008, pp. 433–444.
M. Thoma, H. Cheng, A. Gretton, J. Han, H. Kriegel, A. J. Smola, L.
Song, P. S. Yu, X. Yan, and K. M. Borgwardt, “Discriminative frequent
subgraph mining with optimality guarantees,” Statistical Analysis and
Data Mining, vol. 3, no. 5, pp. 302–318, 2010.
D. A. V. Dyk and M. Welling, Eds., Proceedings of the Twelfth International Conference on Artificial Intelligence and Statistics, AISTATS
2009, Clearwater Beach, Florida, USA, April 16-18, 2009, vol. 5, ser.
JMLR Proceedings, JMLR.org, 2009.
| 8cs.DS
|
On Sound Compilation of Reals
Eva Darulova
Viktor Kuncak
EPFL
[email protected]
EPFL
[email protected]
arXiv:1309.2511v1 [cs.PL] 10 Sep 2013
Abstract
In this paper we advocate a natural but ambitious alternative:
source code programs should be expressed in terms of ideal, mathematical real numbers. In our system, the programmer writes a program using a Real data type and states the desired postconditions,
then specifies uncertainties explicitly in pre- and postconditions as
well as the desired target precision on the return values. It is then
up to our trustworthy compiler to check, taking into account all uncertainties and their propagation, that the desired precision can be
soundly realized in a finite precision implemenation. If so, the compiler chooses and emits one such finite-precision implementation.
Following this model, we derive verification conditions that encode reasoning about floating-point roundoff errors into reasoning about real numbers. Our verification conditions explicitly separate the ideal program without external uncertainties and roundoffs from the actual program, which is actually executed in finite
precision with possibly noisy inputs. Additionally, our constraints
are fully parametric in the floating-point precision and can thus be
used with different floating-point hardware configurations, as well
as used for determining the minimum precision needed.
To summarize, the view of source code as functions over real
numbers has several advantages:
Writing accurate numerical software is hard because of many
sources of unavoidable uncertainties, including finite numerical
precision of implementations. We present a programming model
where the user writes a program in a real-valued implementation
and specification language that explicitly includes different types
of uncertainties. We then present a compilation algorithm that generates a conventional implementation that is guaranteed to meet
the desired precision with respect to real numbers. Our verification
step generates verification conditions that treat different uncertainties in a unified way and encode reasoning about floating-point
roundoff errors into reasoning about real numbers. Such verification conditions can be used as a standardized format for verifying
the precision and the correctness of numerical programs. Due to
their often non-linear nature, precise reasoning about such verification conditions remains difficult. We show that current state-of-the
art SMT solvers do not scale well to solving such verification conditions. We propose a new procedure that combines exact SMT
solving over reals with approximate and sound affine and interval
arithmetic. We show that this approach overcomes scalability limitations of SMT solvers while providing improved precision over
affine and interval arithmetic. Using our initial implementation we
show the usefullness and effectiveness of our approach on several
examples, including those containing non-linear computation.
1.
• Programmers can, for the most part, reason in real arithmetic
and not floating-point arithmetic. We thus achieve separation of
the design of algorithms (which may still be approximate) from
their realization using finite precision computations.
• We can verify the ideal meaning of programs using techniques
Introduction
developed to reason over real numbers, which are more scalable
than techniques that directly deal with floating point arithmetic.
Writing numerical programs is difficult, in part because the programmer needs to deal not only with the correctness of the algorithm but also with unavoidable uncertainties. Program inputs
may not be exactly known because they come from physical experiments or were measured by an embedded sensor. The computation itself suffers from roundoff errors at each step, because of the
use of finite-precision arithmetic. In addition, resources like energy
may be scarce so that only a certain number of bits are available
for the numerical datatype. At the same time, the computed results
can have far-reaching consequences if used to control, for example,
a vehicle or a nuclear power plant. It is therefore of great importance to improve confidence in numerical code [34]. One of the first
challenges in doing this is that most of our automated reasoning
tools work with real arithmetic, whereas the code is implemented in
finite-precision (typically, floating point) arithmetic. Many current
approaches to verifying numerical programs start with the floatingpoint implementation and then try to verify the absense of (runtime)
errors. However, the absence of errors by itself does not guarantee
that program behavior matches the desired specification expressed
using real numbers. Fundamentally, the source code semantics is
expressed in terms of data types such as floating points. This is
further problematic for compiler optimizations, because, e.g., the
associativity law is unsound with respect to such source code semantics.
• The approach allows us to quantify the deviation of implemen-
tation outputs from ideal ones, instead of merely proving e.g.
range bounds of floating-point variables which is used in simpler static analyses.
• The compiler for reals is free to do optimizations as long as they
preserve the precision requirements. This allows the compiler
to apply, for example, associativity of arithmetic, or even select
different approximation schemes for transcendental functions.
• In addition to roundoff errors, the approach also allows the
developer to quantify program behavior in the face of external
uncertainties such as input measurement errors.
Using our verification condition generation approach, the correctness and the precision of compilation for small programs can
be directly verified using an SMT solver such as Z3 [16] (see Section 5.3); this capability will likely continue to improve as the
solvers advance. However, the complexity of the generated verification conditions for larger programs is still out of reach of such
solvers and we believe that specialized techniques are and will continue to be necessary for this task. This paper presents two specialized techniques that improve the feasibility of the verification task.
The first technique performs local approximation and is effective
1
2013/9/11
different selection of numerical algorithms. To support programming of larger code fragments our system also supports a modular verification technique, which handles functions through inlining
function bodies or using their postconditions. We thus expect that
our technique is applicable to larger code bases as well, possibly
through refactoring code into multiple smaller and annotated functions. Even on the benchmarks that we release, we are aware of no
other available system that would provide the same guarantees with
our level of automation.
even in benchmarks containing nonlinear arithmetic; the second
technique specifically handles conditional expressions.
1.1
Solving Non-Linear Constraints
Nonlinear arithmetic poses a significant challenge for verification
because it cannot directly be handled using Simplex-like algorithms
embedded inside SMT solvers. Although interesting relevant fragments are decidable and are supported by solvers, their complexity is much higher. Unfortunately, non-linear arithmetic is ubiquitous in numerical software. Furthermore, our verification conditions add roundoff errors to arithmetic expressions, so the resulting
constraints grow further in complexity, often becoming out of reach
of solvers. An alternative to encoding into SMT solver input is to
use a sound and overapproximating arithmetic model such as interval or affine arithmetic [15]. However, when used by itself on
non-linear code, these approaches yield too pessimistic results to
be useful.
We show that we can combine range arithmetic computation
with SMT solving to overcome the limitations of each of the individual techniques when applied to non-linear arithmetic. We obtain
a sound, precise, and somewhat more scalable procedure. During
range computation, our technique also checks for common problems such as overflow, division by zero or square root of a negative
number, emitting the corresponding warnings. Additionally, because the procedure is a forward computation, it is suitable for automatically generating function summaries containing output ranges
and errors of a function. From the point of view of the logical
encoding of the problem, range arithmetic becomes a specialized
method to perform approximate quantifier elimination of bounded
variables that describe the uncertainty.
1.2
1.4
• We present a real-valued implementation and specification lan-
guage for numerical programs with uncertainties; we define its
semantics in terms of verification constraints that they induce.
We believe that such verification conditions can be used as a
standardized format for verifying the precision and the correctness of numerical programs.
• We develop an approximation procedure for computing precise
range and error bounds for nonlinear expressions which combines SMT solving with interval arithmetic. We show that such
an approach significantly improves computed range and error
bounds compared to standard interval arithmetic, and scales
better than SMT solving alone. Our procedure can also be used
independently as a more precise alternative to interval arithmetic, and thus can perform forward computation without having the desired postconditions.
• We describe an approach for soundly computing error bounds
in the presence of branches and uncertainties, which ensures
soundness of compilation in case the function defined by a
program is not known to be continuous.
Sound Compilation of Conditional Branches
In the presence of uncertainties, conditional braches become another verification challenge. The challenge is that the ideal execution may follow one branch, but, because of input or roundoff errors, the actual execution follows another. This behaviour may be
acceptable, however, if we can show that the error on the output
remains within required bounds. Therefore, our approach would
directly benefit from automated analysis of continuity, which was
advocated previously [48]. For such continuous functions, our analysis can be done separately for each program path. In the absence
of knowledge of continuity, we present a new method to check that
different paths taken by real-valued and floating point versions of
the program still preserves the desired precision specification. Our
check does not require continuity (which becomes difficult to prove
for non-linear code). Instead, it directly checks that the difference
between the two values on different branches meets the required
precision. This technique extends our method for handling nonlinear arithmetic, so it benefits from the combination of range arithmetic and SMT solving.
1.3
Summary of Contributions
Our overall contribution is an approach for sound compilation of
real numbers. Specifically:
• We have implemented our framework and report our experience
on a set of diverse benchmarks, including benchmarks from
physics, biology, chemistry, and control systems. The results
show that our technique is effective and that it achieves a synergy of the techniques on which it relies.
2.
Example
We demonstrate some aspects of our system on the example in Figure 1. The methods triangle and triangleSorted compute the area of
a triangle with side lengths a, b and c. The notation a.in(1.0, 9.0)
is short for 1.0 < a && a < 9.0. We consider a particular application where the user may have two side lengths given, and may
vary the third. She has two functions available to do the computation and wants to determine whether either or both satisfy the
precision requirement of 1e-11 on line 9. Our tool determines that
such requirement needs at least double floating point precision; the
challenge then is to establish that this precision is sufficient to ensure these bounds, given that errors in floating code accumulate and
grow without an a priori bound.
Our tool verifies fully automatically that the method triangleSorted
indeed satisfies the postcondition and generates the source code
with the Double datatype which also includes a more precise and
complete postcondition:
Implementation and Evaluation
We have implemented our compilation and verification procedure,
including the verification condition generation, analysis of possibly non-linear expressions, and the handling of conditionals. Our
system is implemented as an extension of a verifier for functional
Scala programs. The implementation relies on a range arithmetic
implementation for Scala as well as on the Z3 SMT solver.
We have evaluated the system on a number of diverse benchmarks, obtaining promising results. We are releasing our benchmarks (and making them available as supplementary material for
reviewers). We hope that the benchmarks can be used to compare future tools for error quantification, help the development of
nonlinear solvers, and also present challenges for more aggressive
compilation schemes, with different number representations and
0.01955760939159717 ≤ res ∧ res ≤ 12.519984025578283 ∧
res +/− 8.578997409317759e−12
To achieve this result, our tool first checks that the precondition
of the function call is satisfied using the Z3 solver. Then, it inlines
the body of the function triangleSorted and computes a sound bound
on the result’s uncertainty with our approximation procedure and
uses it to show that the postcondition is satisfied. The error compu-
2
2013/9/11
2
4
6
8
and the user annotates them with pre- and postconditions that explicitly talk about uncertainties. Real represents ideal real numbers without any uncertainty. We allow arithmetic expressions over
√
Reals with the standard arithmetic operators {+, −, ∗, /, }, and
together with conditionals and function calls they form the body
of methods. Our tool also supports immutable variable declarations
as val x = .... This language allows the user to define a computation
over real numbers. Note that this specification language is not executable.
The precondition allows the user to provide a specification of
the environment. A complete environment specification consists of
lower and upper bounds for all method parameters and an upper
bound on the uncertainty or noise. Range bounds are expressed
with regular comparison operators. Uncertainty is expressed with
the predicate such as x +/− 1e−6, which denotes that the variable
x is only known up to 1e − 6. Alternatively, the programmer can
specify the relative error as x +/− 1e−7 ∗ x. If no noise except for
roundoff is present, roundoff errors are automatically added to
input variables.
The postcondition can specify the range and the maximum uncertainty accepted on the output. In addition to the language allowed in the precondition, the postcondition may reference the errors on inputs directly in the following way: res +/− 3.5 ∗ !x, which
says that the maximum acceptable error on the output variable res
is bounded from above by 3.5 times the initial error on x. Whereas
the precondition may only talk about the ideal values, the postcondition can also reference the actual value directly via ∼x. This allows us to assert that runtime values will not exceed a certain range,
for instance.
def mainFunction(a: Real, b: Real, c: Real): Real = {
require(4.500005 <= a && a <= 6.5)
val b = 4.0
val c = 8.5
val area = triangleSorted(a, b, c)
//val area = triangleUnstable(a, b, c)
area
} ensuring(res => res +/− 1e−11)
10
12
def triangle(a: Real, b: Real, c: Real): Real = {
require(a.in(1.0, 9.0) && b.in(1.0, 9.0) && c.in(1.0, 9.0) &&
a + b > c + 1e−6 && a + c > b + 1e−6 && b + c > a + 1e−6)
14
val s = (a + b + c)/2.0
sqrt(s ∗ (s − a) ∗ (s − b) ∗ (s − c))
16
}
18
20
22
def triangleSorted(a: Real, b: Real, c: Real): Real = {
require(a.in(1.0, 9.0) && b.in(1.0, 9.0) && c.in(1.0, 9.0) &&
a + b > c + 1e−6 && a + c > b + 1e−6 && b + c > a + 1e−6 &&
a < c && b < c)
if (a < b) {
sqrt((c+(b+a)) ∗ (a−(c−b)) ∗ (a+(c−b)) ∗ (c+(b−a)))/4.0
} else {
sqrt((c+(a+b)) ∗ (b−(c−a)) ∗ (b+(c−a)) ∗ (c+(a−b))) / 4.0
}
24
26
28
}
Figure 1. Computing the area of a triangle.
Floating-point arithmetic Our tool and technique support in the
generated target code any floating-point precision and in particular, single and double floating-point precision as defined by the
IEEE 754 floating-point standard [46]. It is also straightforward to
combine it with techniques to generate fixed-point arithmetic [13],
which similarly relies on knowing ranges of variables. We assume
rounding-to-nearest rounding mode and that basic arithmetic oper√
ations {+, −, ∗, /, } are rounded correctly, which means that the
result from any such operation must be the closest representable
floating-point number. Hence, provided there is no overflow, the
result of a binary operation ◦F satisfies
tation takes into account in a sound way the input uncertainty (here
an initial roundoff error on the inputs), its propagation and roundoff
errors commited at each arithmetic operation. Additionally, due to
the initial roundoff error the comparison on line 24 is not exact, so
that some floating-point computations will take a different branch
than their corresponding real-valued computation. More precisely,
the total error when computing the condition is 7.22e − 16, as
computed by our tool. That is, floating-point values that satisfy
a < b + 7.22e − 16 may take the else branch, even though the
corresponding real values would follow the then branch, and similarly in the opposite direction. Our tool verifies that the difference
in the computed result in two branches, due to this divergence between real arithmetic and floating point arithmetic code, remains
within the precision requirement.
Finally, our tool uses our novel range computation procedure
to also compute a more precise output range than we could have
obtained in interval arithmetic. It then includes this more complete postcondition in the generated floating-point code. In fact, interval arithmetic alone computes the ranges [0.0138, 16.163] and
[0.0169, 14.457] for using the methods triangle and triangleSorted
respectively, seemingly suggesting that two methods perform entirely different computations. With our technique, the tool computes the same range [0.0195, 12.52] for both methods, but shows a
difference in the absolute error of the computation. For the method
triangle, the verification fails, as desired, because the computed error (2.3e − 11) exceeds the required precision bound. This result
is expected—the textbook formula for triangles is known to suffer
from imprecision for flat triangles [31], which is somewhat rectified
in the method triangleSorted.
3.
x ◦F y = (x ◦R y)(1 + δ), |δ| ≤ M , ◦ ∈ {+, −, ∗, /}
(1)
where ◦R is the ideal operation in real numbers and M is the
machine epsilon that determines the upper bound on the relative
error. This model provides a basis for our roundoff error estimates.
4.
Compiling Reals to Finite Precision
Given a specification or program over reals and a possible target
floating-point precision, our tool generates code over floating-point
numbers that satisfy the given pre- and postconditions. Figure 2
presents a high-level view of our compilation algorithm. Our tool
first analyses the entire specification and generates one verification
condition for each postcondition to be proven. To obtain a modular
algorithm, the tool also generates verification conditions that check
that at each function call the precondition of the called function
is satisfied. The methods are then sorted by occuring function
calls. This allows us to re-use already computed postconditions
of function calls in a modular analysis. If the user specified a
target precision, the remaining part of the compilation process is
perfomed with respect to this precision, if not or in the case the
user specified several possible precisions, our tool will iteratively
select the next more precise precision and attempt to compile the
entire program. If compilation fails due to unsatisfied assertions,
the next precision is selected. Thus, one task of our algorithm is to
Programs with Reals
Each program to be compiled consists of one top-level object with
methods written in a functional subset of the Scala programming
language [41]. All methods are functions over the Real datatype
3
2013/9/11
x ∈ [a, b]
x◦ = x + errx ∧ errx ∈ [−k, k]
x +/− m ∗ x
x◦ = x + errx ∧ errx ∈ [−|mx|, |mx|]
x◦
∼x
!x
errx
xy
(x y) ∧ (x◦ y◦ )(1 + δ1 )
sqrt(x)
sqrt(x) ∧ sqrt(x◦ )(1 + δ2 )
z = x ∧ z◦ = x◦
val z = x
if (c(x)) e1(x)
((c(x) ∧ e1(x)) ∨ (¬c(x) ∧ e2(x)))∧
else e2(x)
((c◦ (x◦ ) ∧ e1◦ (x◦ )) ∨ (¬c◦ (x◦ ) ∧ e2◦ (x◦ )))
g(x)
g(x) ∧ g◦ (x◦ )
∈ {+, −, ∗, /}
−m ≤ δi ∧ δi ≤ m , all δ are fresh
cond◦ and e◦ denote functions with roundoff errors at each step
a <= x && x <= b
Input: spec: specification over Reals, prec: candidate precisions
for fnc ← spec.fncs
fnc.vcs = generateVCs(fnc)
x +/− k
spec.fncs.sortBy((f1, f2) => f1 ⊆ f2.fncCalls)
while prec 6= ∅ and notProven(spec.fncs)
precision = prec.nextPrecise
for fnc ← spec.fncs
for vc ← fnc.vcs
while vc.hasNextApproximation ∧ notProven(vc)
approx = getNextApproximation(vc, precision)
vc.status = checkWithZ3(approx)
generateSpec(fnc)
generateCode(spec)
Output: floating−point code with generated postconditions
Figure 2. Compilation algorithm.
Table 1. Semantics of our specification language.
automatically determine the necessary least floating-point precision
to ensure the specification is met. Currently, each precision iteration
is computed separately, which is not a big issue due to a small
number alternative floating-point targets. We did identify certain
shared computations between iterations; we can exploit them in the
future for more efficient compilation. In order for the compilation
process to succeed, the specification has to be met with respect
to a given floating-point precision, thus the principal part of our
algorithm is spent in verification, which we describe in Section 5.
We envision that in the future the compilation task will also
include automatic precision-preserving code optimizations, but in
this paper we concentrate on the challenging groundwork of verifying the precision of code.
Our tool currently generates Scala code over single, double, double-double and quad-double floating-point arithmetic. For
double-double and quad-double precision, which were implemented in software by [3], we provide a Scala interface with the
generated code. In case the verification part of compilation fails,
we nonetheless generate code (together with a failure report) with
the best postconditions our tool was able to compute. The user can
then use the generated specifications to gain insight why and where
her program does not satify requirements.
Our techniques are not restricted to these floating-point precisions, however, and will work for any precision that follows the
abstraction given in Equation (1). Furthermore, while we have implemented our tool to accept specifications in a domain specific language embedded in Scala and generate code in Scala, all our techniques apply equally to all programming languages and hardware
that follow the floating-point abstraction we assume (Equation 1).
5.
where ~
x, res,
~ ~
y denote the input, output and local variables respectively.
Table 1 summarizes how verification constraints are generated
from our specification language. Each variable x in the specification
corresponds to two real-valued variables x, x◦ , the ideal one in the
absence of uncertainties and roundoff errors and the actual one,
computed by the compiled program. Note that the ideal and actual
variables are related only through the error bounds in the pre- and
postconditions, which allows for the ideal and actual executions to
take different paths.
In the method body we have to take into account roundoff
errors from arithmetic operations and the propagation of existing
√
errors. Our system currently supports operations {+, −, ∗, /, },
but these can be in principle extended to elementary functions, for
instance by encoding them via Taylor expansions [37].
Note that the resulting verification conditions are parametric in
the machine epsilon.
5.2
In order to give feedback to developers and to facilitate automatic
modular analysis, our tool also provides automatic specification
generation. By this we mean that the programmer still needs to
provide the environment specification in form of preconditions, but
our tool automatically computes a precise postcondition.
Formally, we can rewrite the constraint (*) as
∀~
x, res. (∃~
y . P (~
x) ∧ body(~
x, ~
y , res)) → Q(~
x, res)
where Q is now unknown. We obtain the most precise postcondition Q by applying quantifier elimination (QE) to P (~
x) ∧
body(~
x, ~
y , res) and eliminate ~
y . The theory of arithmetic over reals admits QE so it is theoretically possible to use this approach.
We do not currently use a full QE procedure for specification generation, as it is expensive and it is not clear whether the returned
expressions would be of a suitable format. Instead, we use our approximation approach which computes ranges and maximum errors
in a forward fashion and allows us to compute an (over) approximation of a postcondition of the form res ∈ [a, b] ∧ res ± u.
Verifying Real Programs
We will now describe the verification part of our compilation algorithm. In the following we will call the ideal computation the
computation in the absence of any uncertainties and implemented
in a real arithmetic, and the actual computation the computation
that will finally be executed in finite-precision and with potentially
uncertain inputs.
5.1
Verification Conditions for Loop-Free Programs
5.3
Each method with its precondition P and postcondition Q implies
the following verification condition:
∀~x, res,
~ ~
y . P (~
x) ∧ body(~
x, ~
y , res)
~ → Q(~
x, res)
~
Specification Generation
Difficulty of Simple Encoding into SMT solvers
For small functions we can already prove interesting properties by
using the exact encoding of the problem just described and discharging the verification constraints with Z3. Consider the follow-
(*)
4
2013/9/11
approximation pipeline. We support inlining of both user-provided
postconditions and postconditions computed by our own specification generation procedure. If this still is not precise enough, we
inline the entire function body.
Postcondition inlining is implemented by replacing the function
call with a fresh variable and constraining it with the postcondition. Thus, if verification suceeds with inlining the postcondition,
we avoid having to consider each path of the inlined function separately and can perform modular verification avoiding a potential
path explosion problem. Such modular verification is not feasible
when postconditions are too imprecise and we plan to explore the
generation of more precise postconditions in the future. One step
in this direction is to allow postconditions that are parametric in
the initial errors, for example with the operator !x introduced in
Section 3. While our tool currently supports postcondition inlining
with such postconditions, we do not yet generate these automatically.
def getNextApproximation(vc, precision):
getPathError!
inlining postcondition
inlining full function
functions
getRange!
evalWithError!
path-wise
approx. error
merging
approx. error & range
paths
arithmetic
first approximation
Figure 3. Approximation pipeline.
ing code a programmer may write to implement the third B-spline
basic function which is commonly used in signal processing [29].
def bspline3(u: Real): Real = {
require(0 ≤ u && u ≤ 1 && u ± 1e−13)
−u∗u∗u / 6.0
} ensuring (res ≥ −0.17 ≤ res && res ≤ 0.05 && res ± 1e−11)
Arithmetic The arithmetic part of the verification constraints generated by Table 1 can be essentially divided into the ideal part and
the actual part, which includes roundoff errors at each computation
step. The ideal part determines whether the ideal range constraints
in the postcondition are satisfied and the actual part determines
whether the uncertainty part of the postcondition is satisfied. We
can use our procedure presented in Section 6 to compute a sound
approximation of both the result’s range as well as its uncertainty.
Based on this, our tool constructs two approximations. For the first,
the ideal part of the constraint is left untouched and the actual part
is replaced by the computed uncertainty bound. This effectively removes a large number of variables and many times suffiently simplifies the constraint for Z3 to succeed. If this fails, our tool additionally replaces the ideal part by the computed range constraint.
Note that the second approximation may not have enough information to prove a more complex postconditions, as correlation information is lost. We note that the computation of ranges and errors
is the same for both approximations and thus trying both does not
affect efficiency significantly.
Functions and the correspoding verification conditions of this complexity are already within the possibilities of the nonlinear solver
within Z3. For more complex functions however, Z3 does not
(yet) provide an answer in a reasonable time, or returns unknown.
Whether alternative techniques in SMT solvers can help in such
cases remains to be seen [7, 30]. We here provide an approach
based on step-wise approximation that addresses the difficulty of
general-purpose constraint solving.
5.4
Verification with Approximations
In order to nontheless verify interesting programs, we have developed an approximation procedure that computes a sound overapproximation of the range of an expression and of the uncertainty
on the output. This procedure is a forward computation and we
also use it to generate specifications automatically. We describe the
approximation procedure in detail in Section 6, for now we will assume that it exists and, given a precondition P and an expression
expr, computes a sound bound on the output range and its associated uncertainty:
Paths In the case of several paths through the program, we have
the option to consider each path separately or to merge results at
each join in the control flow graph. This introduces a tradeoff between efficiency and precision, since on one hand, considering each
path separately leads to an exponential number of paths to consider.
On the other hand, merging at each join looses correlation information between variables which may be necessary to prove certain
properties. Our approximation pipeline chooses merging first, before resorting to a path-by-path verification in case of failure. We
believe that other techniques for exploring the path space could also
be integrated into our tool [9, 32]. Another possible improvement
are heuristics that select a different order of approximations depending on particular characteristics of the verification condition.
([a, b], err) = evalWithError(P, expr) ⇔
∀~
x, x~◦ , res, res◦ .P (~
x, x~◦ ) ∧ res = expr(~
x) ∧ res◦ = expr◦ (x~◦ )
→ ¬(res < a ∨ b < res) ∧ |res − res◦ | < err
We have identified three possibiities for approximation: nonlinear arithmetic, function calls, and paths and each can be approximated at different levels. We have observed in our experiments, that
“one size does not fit all” and a combination of different approximations is most successful in proving the verification conditions we
encountered. For each verification condition we thus construct approximations until Z3 is able to prove one, or until we run out of approximations where we report the verification as failed. We can thus
view verification as a stream of approximations to be proven. We illustrate the pipeline that computes the different approximations in
Figure 3. The routines getPathError, getRange and evalWithError are
described in the following sections in more detail.
The first approximation (indicated by the long arrow in Figure 3) is to use Z3 alone on the entire constraint constructed by the
rules in Table 1. This is indeed an approximation, as all function
calls are treated as uninterpreted functions in this case. As noted
before, this approach only works in very simple cases or when no
uncertainties and no functions are present.
Example We illustrate the verification algorithm on the example in Figure 4. The functions sineTaylor and sineOrder3 are verified first since they do not contain function calls. Verification with
the full verification constraint fails. Next, our tool computes the errors on the output and Z3 suceeds to prove the resulting constraint
with the ideal part untouched. From this approximation our tool
directly computes a new, more precise postcondition, in particular
it can narrow the resulting error to 1.63e-15. Next, our tool considers the comparison function. Inlining only the postcondition is
not enough in this case, but computing the error approximation on
the inlined functions suceeds in verifying the postcondition. Z3 is
again able to verify the real-valued portion independently. Finally,
the tool verifies that the preconditions of the function calls are satisfied by using Z3 alone. Verification of the function comparisonInvalid
fails with all approximations so that our tool reports unknown. It also
Function calls If the verification constraint contains function
calls and the first approximation failed, our tool will attempt to inline postconditions and pass on the resulting constraint down the
5
2013/9/11
sents possible values of variables as affine forms
def comparisonValid(x: Real): Real = {
require(−2.0 < x && x < 2.0)
val z1 = sineTaylor(x)
val z2 = sineOrder3(x)
z1 − z2
} ensuring(res => ∼res <= 0.1)
x̂ = x0 +
where x0 denotes the central value (of the represented interval) and
each noise symbol i is a formal variable denoting a deviation from
the central value, intended to range over [−1, 1]. The maximum
magnitude of each noise term is given by the corresponding xi .
Note that the sign of xi does not matter in isolation, it does, however, reflect the relative dependence between values. For example,
take x = x0 + x1 1 , then
x − x = x0 + x1 1 − (x0 + x1 1 )
= x0 − x0 + x1 1 − x1 1 = 0
def sineTaylor(x: Real): Real = {
require(−2.0 < x && x < 2.0)
x − (x∗x∗x)/6.0 + (x∗x∗x∗x∗x)/120.0 − (x∗x∗x∗x∗x∗x∗x)/5040.0
} ensuring(res => −1.0 < res && res < 1.0 && res +/− 1e−14)
If we subtracted x = x0 −x1 1 instead, the resulting interval would
have width 2 ∗ x1 and not zero.
The range represented by an affine form is computed as
def sineOrder3(x: Real): Real = {
require(−2.0 < x && x < 2.0)
0.954929658551372 ∗ x − 0.12900613773279798∗(x∗x∗x)
} ensuring(res => −1.0 < res && res < 1.0 && res +/− 1e−14)
[x̂] = [x0 − rad(x̂), x0 + rad(x̂)],
n
X
|xi |
A general affine operation αx̂ + β ŷ + ζ consists of addition, subtraction, addition of a constant (ζ) or multiplication by a constant
(α, β). Expanding the affine forms x̂ and ŷ we get
αx̂ + β ŷ + ζ = (αx0 + βy0 + ζ) +
provides the counterexample it obtains from Z3 (x = 1.0), which
in this case is a valid counterexample.
n
X
(αxi + βyi )i
i=1
An additional motivation for using affine arithmetic is that different contributions to the range it represents remain, at least partly,
separated. This information can be used for instance to help identify the major contributor of a result’s uncertainty or to separate
contributions from external uncertainties from roundoff errors.
Soundness
Our procedure is sound because our constraints overapproximate
the actual errors. Furthemore, even in the full constraint as generated from Table 1, roundoff errors are overapproximated since we
assume the worst-case error bound at each step. While this ensures
soundness, it also introduces incompleteness, as we may fail to validate a specification because our overapproximation is too large.
This implies that counterexamples reported by Z3 are in general
only valid, if they disprove the ideal real-valued part of the verification constraint. In general, this is easy to distinguish from the case
where verification fails due to too large error bounds, as Z3 prefers
simpler counterexamples over complex ones and thus chooses all
error variables to be zero if the ideal part is being violated.
6.1
Range Computation
The goal of this procedure is to perform a forward-computation to
determine the real-valued range of a nonlinear arithmetic expression given ranges for its inputs. Two common possibilities are interval and affine arithmetic, but they tend to overapproximate the
resulting range, especially if the input intervals are not sufficiently
small (order 1). Affine arithmetic improves over interval arithmetic
somewhat by tracking linear correlations, but in the case of nonlinear expressions the results can become actually worse than for
interval arithmetic.
Solving Nonlinear Constraints
Observation: A nonlinear theorem prover such as the one that
comes with Z3 can decide with relatively good precision whether
a given bound is sound or not. That is we can check with a prover
whether for an expression e the range [a, b] is a sound interval enclosure. This observation is the basis of our range computation.
Having given an overview of the approximation pipeline, we now
describe the computation of the approximation for nonlinear arithmetic, which corresponds to the last box in Figure 3. For completeness of presentation, we first review interval and affine arithmetic
which are common choices for performing sound arithmetic computations and which we also use as part of our technique. We then
present our novel procedure for computing the output range of a
nonlinear expression given ranges for its inputs that can be a more
precise substitute for interval or affine arithmetic. Finally, we continue with a procedure that computes a sound overapproximation
of the uncertainty on the result of a nonlinear expression.
One possibility to perform guaranteed computations is to use
standard interval arithmetic [39]. Interval arithmetic computes a
bounding interval for each basic operation as
x ◦ y = [min(x ◦ y), max(x ◦ y)]
rad(x̂) =
i=1
Figure 4. Different polynomial approximations of sine.
6.
xi i
i=1
def comparisonInvalid(x: Real): Real = {
require(−2.0 < x && x < 2.0)
val z1 = sineTaylor(x)
val z2 = sineOrder3(x)
z1 − z2
} ensuring(res => ∼res <= 0.01) // counterexample: 1.0
5.5
n
X
The input to our algorithm is a nonlinear expression expr and a
precondition P on its inputs, which specifies, among possibly other
constraints, ranges on all input variables ~
x. The output is an interval
[a, b] which satisfies the following:
[a, b] = getRange(P, expr) ⇔
∀~
x, res.P (~
x) ∧ res = expr(~
x) → ¬(res < a ∨ b < res)
The algorithm for computing the lower bound of a range is given
in Figure 5. The computation for the upper bound is symmetric. For
each range to be computed, our tool first computes an initial sound
estimate of the range with interval arithmetic. It then performs an
initial quick check to test whether the computed first approximation
bounds are already tight. If not, it uses the first approximation as the
starting point and then narrows down the lower and upper bounds
◦ ∈ {+, −, ∗, /}
and analogously for square root. Affine arithmetic was originally
introduced in [15] and addresses the difficulty of interval arithmetic
in handling correlations between variables. Affine arithmetic repre-
6
2013/9/11
other additional constraints on the ideal variables. The uncertainty
specification is necessary, as it related the ideal and actual variables.
The idea of our procedure is to “execute” a computation while
keeping track of the output range of the current expression and
its associated errors. At each arithmetic operation, we propagate
existing errors, compute an upper bound on the roundoff error
and add it to the overall errors. Since the roundoff error depends
proportionally on the range of values, we also need to keep track of
the ranges as precisely as possible.
Our procedure is build on the abstraction that a computation is
an ideal computation plus or minus some uncertainty. The abstraction of floating-point roundoff errors that we chose also follows this
separation:
def getRange(expr, precondition, precision, maxIterations):
z3.assertConstraint(precondition)
[aInit, bInit] = evalInterval(expr, precondition.ranges);
//lower bound
if z3.checkSat(expr a + precision) == UNSAT
a = aInit
b = bInit
numIterations = 0
while (b−a) < precision ∧ numIterations < maxIterations
mid = a + (b − a) / 2
numIterations++
z3.checkSat(expr mid) match
case SAT ⇒ b = mid
case UNSAT ⇒ a = mid
case Unknown ⇒ break
aNew = a
else
aNew = aInit
f l(x y) = (x y)(1 + δ) = (x y) + (x y)δ
for δ ∈ [−m , m ] and ∈ {+, −, ∗, /}. This allows us to treat all
uncertainties in a unified manner.
Our procedure builds on the idea of the SmartFloat datatype [12],
which uses affine arithmetic to track both the range and the errors.
For nonlinear operations, however, the so computed ranges become
very pessimistic quickly and the error computation may also suffer
from this imprecision. We observed that since the errors tend to be
relatively small, this imprecision does not affect the error propagation itself to such an extent. If the initial errors are small (less than
one), multiplied nonlinear terms tend to be even smaller, whereas
if the affine terms are larger than one, the nonlinear terms grow. We
thus concentrate on improving the ideal range of values and use our
novel range computation procedure for this part and leave the error
propagation with affine arithmetic as in [12].
In our adaptation, we represent every variable and intermediate
computation result as a datatype with the following components:
bNew = ... //upper bound symmetrically
return: [aNew, bNew]
Figure 5. Algorithm for computing the range of an expression.
using a binary search. At each step of the binary search our tool
uses Z3 to confirm or reject the newly proposed bound.
The search stops when either Z3 fails, i.e. returns unknown for
a query or cannot answer within a given timeout, the difference
between subsequent bounds is smaller than a precision threshold,
or the maximum number of iterations is reached. This stopping
criterion can be set dynamically.
x : (range : Interval, err
ˆ : Af f ineF orm)
where range is the range of this variable, computed as described in
Section 6.1 and err
ˆ is the affine form representing the errors. The
(overapproximation) of the actual range including all uncertainties
is then given by totalRange = range + [err],
ˆ where err
ˆ denotes
the interval represented by the affine form.
Additional constraints In addition to the input ranges, the precondition may also contain further constraints on the variables. For
example consider again the method triangle in Figure 1. The precondition bounds the inputs as a, b, c ∈ [1, 9], but the formula is
useful only for valid triangles, i.e. when every two sides together
are longer than the third. If not, we will get an error at the latest when we try to take the square root of a negative number. In
interval-based approaches we can only consider input intervals that
satisfy this constraint for all values, and thus have to check several (and possibly many) cases. In our approach, since we are using
Z3 to check the soundness of bounds, we can assert the additional
constraints up-front and then all subsequent checks are performed
with respect to all additional and initial contraints. This allows us to
avoid interval subdivisions due to imprecisions or problem specific
constraints such as those in the triangle example. This becomes especially valuable in the presence of multiple variables, where we
may need an exponential number of subdivisions.
6.2
Roundoff error computation
each computation step as
Roundoff errors are computed at
ρ = δ ∗ maxAbs(totalRange)
where δ is the machine epsilon, and added to err
ˆ as a fresh noise
term. Note that this roundoff error computation makes our error
computation parametric in the floating-point precision.
Error propagation For affine operations addition, subtraction,
and multiplication by a constant factor the propagated errors are
computed term-wise and thus as for standard affine arithmetic. We
refer the reader to [12, 15] for further details and describe here
only the propagation for nonlinear arithmetic. For multiplication,
division and square root, the magnitude of errors also depends
on the ranges of variables. Since our ranges are not affine terms
themselves, propagation has to be adjusted. In the following, we
denote the range of a variable x by [x] and its associated error by
the affine form err
ˆ x . When we write [x] ∗ err
ˆ y we mean that the
interval [x] is converted into an affine form and the multiplication
is performed in affine arithmetic.
Multiplication is computed as
Error Approximation
We now describe our approximation procedure which, for a given
expression expr and a precondition P on the inputs, computes
the range and error on the output. More formally, our procedure
satisfies the following:
([a, b], err) = evalWithError(P, expr) ⇔
∀~
x, x~◦ , res, res◦ .P (~
x, x~◦ ) ∧ res = expr(~
x) ∧ res◦ = expr◦ (x~◦ )
x ∗ y = ([x] + err
ˆ x )([y] + err
ˆ y)
→ ¬(res < a ∨ b < res) ∧ |res − res◦ | < err
= [x] ∗ [y] + [x] ∗ err
ˆ y + [y] ∗ err
ˆ x + err
ˆ x ∗ err
ˆy +ρ
where ρ is the new roundoff error. Thus the first term contributes
to the ideal range and the remaining three to the error affine form.
The larger the factors [x] and [y] are, the larger the finally computed
where expr◦ represents the expression evaluated in floating-point
arithmetic and ~x, x~◦ are the ideal and actual variables. The precondition specifies the ranges and uncertainties of initial variables and
7
2013/9/11
errors will be. In order to keep the overapproximation as small as
possible, we evaluate [x] and [y] with our new range computation.
Division is computed as
1
x
= x ∗ = ([x] + err
ˆ x )([1/y] + errˆ1/y )
y
y
1
1
= [x] ∗ [ ] + [x] ∗ err
ˆ 1 + [ ] ∗ err
ˆ x + err
ˆ x ∗ err
ˆ1 +ρ
y
y
y
y
2
4
6
8
For square root, we first compute an affine approximation of square
root as in [12]
√
x=α∗x+ζ +θ
and then perform the affine multiplication term wise.
10
12
Overflows and NaN Our procedure allows us to detect potential
overflows, division by zero and square root of a negative value, as
our tool computes ranges of all intermediate values. We currently
report these issues as warnings to the user.
6.3
14
def computePathError(pre, c, f1, f2):
([c], errc ) = evalWithError(pre, c)
([f2]f loat , errf loat ) =
evalWithError(pre ∧ c(x) ∈ [0, errc ], f2)
[f1]real =
getRange(pre ∧ c(x) ∈ [−errc , 0], f1)
return: max |[f1]real − ([f2]f loat + errf loat )|
Figure 6. Computing error due to diverging paths.
Limitations
conditional of the form c(x) == 0 would yield different results
for the ideal and actual computation for nearly any input, so we do
not allow it in our specification language.
The actual computation commits a certain error when computing the condition of the branch and it is this error that causes some
executions to follow a different branch than the corresponding ideal
one would. Consider the case where the ideal computation evaluates f1, but the actual one evaluates f2. Algorithm 6 gives the computation of the path error in this case. The idea is to compute the
ranges of f1 and f2, but only for the inputs that could be diverging. The final error is then the maximum difference of these value.
The algorithm extends naturally to several variables. In the case of
several paths through the program, this error has to be, in principle, computed for each combination of paths. We use Z3 to rule out
infeasible paths up front so that the path error computation is only
performed for those paths that are actually feasible.
We have currently implemented this approach in our tool for
the case when we use merging to handle paths in order to avoid
having to consider an exponential number of path combinations.
We also use a higher default precision and number of iterations
threshold during the binary search in the range computation as this
computation requires in general very tight intervals for each path.
We identify two challenges for performing this computation:
The limitation of this approach is clearly the ability of Z3 to check
our constraints. We found its capabilities satisfactory, although we
expect the performance to still significantly improve. To emphasize
the difference to the constraints that are defined by Table 1, the
constraints we use here do not add errors at each step and thus
the number of variables is reduced significantly. We also found
several transformations helpful, such as rewriting powers (e.g. x ∗
x ∗ x to x3 ), multiplying out products and avoiding non-strict
comparisons in the precondition, although the benefits were not
entirely consistent. Note that at each step of our error computation,
our tool computes the current range. Thus, even if Z3 fails to tighten
the bound for some expressions, we still compute more precise
bounds than interval arithmetic overall in most cases, as the ranges
of the remaining subexpressions have already been computed more
precisely.
7.
def getPathError:
Input: pre (x ∈ [a, b] ∧ x ± n)
program (if (cond(x) < 0) f1(x) else f2(x))
val pathError1 = computePathError(pre, cond, f1, f2)
val pathError2 = computePathError(pre, ¬ cond, f2, f1)
return max (pathError1, pathError2)
Conditional Statements
In this Section we consider the difference between the ideal and
actual computation due to uncertainties on computing branch conditions and the resulting different paths taken. We note that the
full constraint constructed according to Section 3 automatically includes this error. Recall that the ideal and actual computations are
independent except for the initial conditions, so that it is possible
that they follow different paths through the program.
In the case of approximation, however, we compute the error
on individual paths and have to consider the error due to diverging
paths separately. If a method encodes a continous function in the
usual mathematical sense then we note that we only need to quantify errors for each path separately. Thus, if have a method [9] to
determine whether a function with conditional statements is continuous, then our approach described so far is sufficient to provide
sound error bounds. For the case where such a procedure does not
exist or fails to provide an answer, for example due to nonlinearity, or the function simply is not continuous, we propose the following algorithm to explicitly compute the difference between the
ideal and the actual computation across paths. Note that we do not
assume continuity, i.e. the algorithm allows us to compute error
bounds even in the case on non-continous functions.
For simplicity, we present here the algorithm for the case of one
conditional statement:
1. As soon as the program has multiple variables, the inputs for the
different branches are not two-dimensional intervals anymore,
which makes an accurate evaluation of the individual paths
difficult in standard interval arithmetic.
2. The inputs for the two branches are inter-dependent. Thus,
simply evaluating the two branches with inputs that are in the
correct ranges, but are not correlated, yields pessimistic results
when computing the final difference (line 16).
We overcome the first challenge with our range computation
which takes into account additional constraints. For the second
challenge, we use our range computation as well, however unfortunately Z3 fails to tighten the final range to a satisfactory precision
due to timeouts. We still obtain much better error estimates than
with interval arithmetic alone, as the ranges of values for the individual paths are already computed much more precisely. We report
in Section 8 on the type of programs whose verification is already
in our reach today.
8.
if (c(x) < 0) f1(x)
else f2(x)
Experiments
The examples in Figure 1 and 4 and Section 5.3 provide an idea
of the type of programs our tool is currently able to verify fully
automatically. The B-spline example from Section 5.3 is the largest
It generalizes readily to more complex expressions. W.l.o.g. we
assume that the condition is of the form c(x) < 0. Indeed, any
8
2013/9/11
Benchmark
doppler1*
doppler1
doppler2*
doppler2
doppler3*
doppler3
rigidBody1*
rigidBody1
rigidBody2*
rigidBody2
jetEngine*
jetEngine
turbine1*
turbine1
turbine2*
turbine2
turbine3*
turbine3
verhulst*
verhulst
predatorPrey*
predatorPrey
carbonGas*
carbonGas
Sine (single)
Sine
Sqrt (single)
Sqrt
Sine, order 3 (single)
Sine, order 3
Our error (IA only)
2.36e-6
4.92e-13 (4.95e-13)
6.21e-5
1.29e-12
1.23e-4
2.03e-13 (2.05e-13)
9.21e-7
5.08e-13
1.51e-4
6.48e-11
0.15
(-)
1.62e-8 (-)
4.86e-6
1.25e-13 (1.38e-13)
8.05e-6
1.76e-13 (1.96e-13)
3.35e-6
8.50e-14 (9.47e-14)
2.82e-4
6.82e-16
9.22e-5
2.94e-16 (2.96e-16)
2114297.84
4.64e-8 (5.04e-8)
1.03e-6 (1.57e-6)
9.57e-16 (1.46e-15)
9.03e-7 (9.52e-7)
8.41e-16 (8.87e-16)
1.19e-6 (1.55e-6)
1.11e-15 (1.44e-15)
variables in preconditions and path conditions. Table 2 compares
results of our range computation procedure described in Section 6
against ranges obtained with standard interval arithmetic. Interval
arithmetic is one of the methods used for step-wise range estimation; an alternative being affine arithmetic. We have also experimented with an affine arithmetic implementation [12]. However, we
found that affine arithmetic gives more pessimistic results for computing ranges for non-linear benchmarks. We believe that this is
due to imprecision in computing nonlinear operations. Note, however, that we still use affine arithmetic to estimate errors given the
computed ranges.
We set the default precision threshold to 1e−10 and maximum
number of iterations for the binary search to 50. To obtain an
idea about the ranges of our functions, we have also computed
a lower bound on the range using simulations with 107 random
inputs and with exact rational arithmetic evaluation of expressions.
We observe that our range computation can significantly improve
over standard interval bounds. The jetEngine benchmark is a notable
example, where interval arithmetic yields the bound [−∞, ∞],
but our procedure can still provide bounds that are quite close to
the true range. Running times are below 7 seconds for the most
complex benchmarks, except for jetEngine which runs in about 1
minute due to timeouts from Z3 for some intermediate ranges.
Simulated error
5.97e-7
7.11e-14
1.85-5
1.14e-13
5.96e-5
4.27e-14
8.24e-7
2.28e-13
1.25e-4
2.19e-11
3.58e-5
5.46e-12
3.71e-7
1.07e-14
7.66e-7
1.43e-14
1.04e-6
5.33e-15
2.40e-4
2.23e-16
8.61e-5
1.12e-16
168874.70
3.73e-9
1.79e-7
4.45e-16
2.45e-7
4.45e-16
2.12e-7
3.34e-16
Error computation Table 3 compares uncertainties computed by
our tool against maximum uncertainties obtained through extensive simulation with 107 random inputs. We ran the simulation in
parallel with rational and their corresponding floating-point value
and obtained the error by taking the difference in the result. Benchmarks marked with (*) have added initial uncertainties. Unless otherwise indicated, we used double floating-point precision. To our
knowledge this is the first quantitative comparison of an error computation precision with (an approximation) of the true errors on
such benchmarks. Except for the benchmarks jetEngine∗ our computed uncertainties are within an order and many times even closer
to the underapproximation of the true errors provided by simulation. In the case of the jetEngine∗ benchmark, we believe that the
imprecision is mainly due to its complexity and subsequent failures
of Z3. The values in parentheses in the second column indicate errors computed if ranges at each arithmetic operation are computed
using interval arithmetic alone. While we have not attempted to improve the affine arithmetic-based error computation from [12], we
can see that in some cases a more precise range computation can
gain us improvements. The full effect of the imprecision of standard range computation appears when, due to this imprecision, we
obtain possible errors such as division-by-zero or square root of a
negative number errors. The first case happens in the case of the
non-linear jetEngine benchmark, so with interval arithmetic alone
we would therefore not obtain any meaningful result. Similarly, for
the triangle example from Section 2, without being able to constrain the inputs to form valid triangles, we cannot compute any
error bound, because the radicand becomes possibly negative.
Table 4 presents another relevant experiment, evaluating the
ability to use additional constraints during our range computation.
We use the triangle example from Section 2 with additional constraints allowing increasingly flat triangles by setting the threshold
on line 13 (a + b > c + 1e−6) to the different values given in the first
column. As the triangles become flatter, we observe an expected increase in uncertainty on the input since the formula becomes more
prone to roundoff errors. At threshold 1e−10 our range computation
fails to provide the necessary precision and the radicand becomes
possibly negative. (We used double precision in this example as
well.)
Table 3. Comparison of errors computed with our procedure
against simulated errors. Simulations were performed with 107 random inputs. (*) indicates that inputs have external uncertainties associated.
meaningful example we were able to find that Z3 alone could verify
in the presence of uncertainties. For all other cases, it was necessary
to use our approximation methods.
8.1
Evaluating Effectiveness on Nonlinear Expressions
To evaluate our range and error computation technique we have
chosen several nonlinear expressions commonly used in physics,
biology and chemistry [40, 43, 49] as benchmark functions, as well
as benchmarks used in control systems [1] and suitable benchmarks
from [18].Experiments were performed on a desktop computer
running Ubuntu 12.04.1 with a 3.5GHz i7 processor and 16GB of
RAM. Running times highly depend on the timeout used for Z3.
Our default setting is 1 second; we did not find much improvement
in the success rate above this threshold.
Range computation Stepwise estimation of errors crucially depends on the estimate of the ranges of variables. The strength of
using a constraint solver such as Z3 is that it can perform such estimation while taking into account the precise dependencies between
9
2013/9/11
Benchmark
doppler1
doppler2
doppler3
rigidBody1
rigidBody2
jetEngine
turbine1
turbine2
turbine3
verhulst
predatorPrey
carbonGas
Sine
Sqrt
Sine (order 3 approx.)
Our range
[-137.639, -0.033951]
[-230.991, -0.022729]
[-83.066, -0.50744]
[-705.0, 705.0]
[-56010.1, 58740.0]
[-1987.022, 5099.243]
[-18.526, -1.9916]
[-28.555, 3.8223]
[0.57172, 11.428]
[0.31489, 1.1009]
[0.039677, 0.33550]
[4.3032 e6, 1.6740 e7]
[-1.0093, 1.0093]
[1.0, 1.3985]
[-1.0001, 1.0001]
interval arithmetic
[-158.720, -0.029442]
[-276.077, -0.019017]
[-96.295, -0.43773]
[-705.0, 705.0]
[-58740.0, 58740.0]
[−∞, ∞]
[-58.330, -1.5505]
[-29.437, 80.993]
[0.46610, 40.376]
[0.31489, 1.1009]
[0.037277, 0.35711]
[2.0974 e6, 3.4344 e7]
[-2.3012, 2.3012]
[0.83593, 1.5625]
[-2.9420, 2.9420]
Simulated range
[-136.346, -0.035273]
[-227.841,-0.023235]
[-82.624, -0.51570]
[-697.132, 694.508]
[-54997.635, 57938.052]
[-1779.551, 4813.564]
[-18.284, -1.9946]
[-28.528, 3.8107]
[0.61170, 11.380]
[0.36685,0.94492]
[0.039669,0.33558]
[4.1508 e6, 1.69074 e7]
[-1.0093, 1.0093]
[1.0, 1.3985]
[-1.0, 1.0]
Table 2. Comparison of ranges computed with out procedure against interval arithmetic and simulation. Simulations were performed with
107 random inputs. Ranges are rounded outwards.
Benchmark
triangle1 (0.1)
triangle2 (1e-2)
triangle3 (1e-3)
triangle4 (1e-4)
triangle5 (1e-5)
triangle6 (1e-6)
triangle7 (1e-7)
triangle8 (1e-8)
triangle9 (1e-9)
triangle10 (1e-10)
Range
[0.29432, 35.0741]
[0.099375, 35.0741]
[3.16031e-2, 35.0741]
[9.9993e-3, 35.0741]
[3.1622e-3, 35.0741]
[9.9988e-4, 35.0741]
[3.1567e-4, 35.0741]
[9.8888e-5, 35.0741]
[3.0517e-5, 35.0741]
-
Max. abs. error
2.72e-11
8.04e-11
2.53e-10
7.99e-10
2.53e-9
7.99e-9
2.54e-8
8.08e-8
2.62e-7
-
2
4
6
def cav10(x: Real): Real = {
require(x.in(0, 10))
if (x∗x − x >= 0)
x/10
else
x∗x + 2
} ensuring(res => 0 <= res && res <= 3.0 && res +/− 3.0)
8
10
12
14
def squareRoot3(x: Real): Real = {
require( x.in(0,10) && x +/− 1e−10 )
if (x < 1e−5)
1 + 0.5 ∗ x
else
sqrt(1 + x)
} ensuring( res => res +/− 1e−10)
16
Table 4. Ranges and errors for increasingly flat triangles. All values are rounded outwards. Interval arithmetic alone fails to provide
any result.
18
def smartRoot(a: Real, b: Real, c: Real): Real = {
require(3 <= a && a <= 3 && 3.5 <= b && b <= 3.5 &&
c.in(−2, 2) && b∗b − a ∗ c ∗ 4.0 > 0.1)
20
22
8.2
Evaluating Errors across Program Paths
Figure 7 presents several examples to evaluate our error computation procedure across different paths from Section 7. The first
method cav10 [22] has been used before as a benchmark function
for computing the output range. Our tool can verify the given postcondition immediately. Note that the error on the result is actually
as large as the result itself, since the method is non-continuous,
an aspect that has been ignored in previous work, but that our
tool detects automatically. The method squareRoot3 is also an noncontinous function that computes the square root of 1 + x using an
approximation for small values and the regular library method otherwise. Note the additional uncertainty on the input, which could
occur for instance if this method is used in an embedded controller.
Our tool can verify the given spefication. If we change the condition
on line 10 to x < 1e−4 however, verification fails. In this fashion,
we can use our tool to determine the appropriate branch condition
to meet the precision requirement. The above examples verify all
in under 5 seconds. Finally, the smartRoot method computes one
root of a quadratic equation using the well-known more precise
24
26
28
30
val discr = b∗b − a ∗ c ∗ 4.0
if(b∗b − a∗c > 10.0) {
if(b > 0.0) c ∗ 2.0 /(−b − sqrt(discr))
else if(b < 0.0) (−b + sqrt(discr))/(a ∗ 2.0)
else (−b + sqrt(discr))/(a ∗ 2.0)
}
else {
(−b + sqrt(discr))/(a ∗ 2.0)
}
} ensuring (res => res +/− 6e−15)
Figure 7. Path error computation examples.
method from [23]. We are currently not aware of an automatic tool
to prove programs continuous in the presence of nonlinear arithmetic, so that we need to compute the error across different paths
as well. Our tool succeeds in verifying the postcondition in about
25s. The rather long running time is due to the complexity of the
conditions when computing the error across paths, and thus Z3’s
longer response time, and a number of Z3 timeouts (Z3 timeout
here means merely that some ranges have not been tightend to the
best precision). In the future, we envision that optimizations that
10
2013/9/11
arithmetic [30] will make many more verification problems feasible
with our techniques. An alternative to this approach is using linear
approximations to solve polynomial constraints [7]. We believe that
such advances are largely orthogonal to our use of range arithmetic
and complement each other.
select alternative approximations can be performed automatically
by a trustworthy compiler.
9.
Related work
Current approaches for verifying floating-point code include abstract interpretation, interactive theorem proving and decision procedures, which we survey in this section. We are not aware of work
that would automatically integrate reasoning about uncertainties.
Testing Symbolic execution is a well-known technique for generating test inputs. [6] use a combination of meta-heuristic search and
interval constraint solving to solve the floating-point constraints
that arise, whereas [33] combine random search and evolutionary
techniques. [47] test numerical code for precision by perturbing
low-order bits of values and rewriting expressions. The idea is to
exagerate initial errors and thus make imprecisions more visible.
Probabilistic arithmetic [45] is a similar approach but it does the
perturbation by using different rounding modes. [4] also propose
a testing produce to detect accuracy problems by instrumentring
code to perform a higher-precision computation side by side with
the regular computations. While these approaches are sound with
respect to floating-point arithmetic, they only generate or can check
individual inputs and are thus not able to verify or compute output
ranges or their roundoff errors.
Abstract interpretation (AI) Abstract domains that are sound
with respect to floating-point computations can prove bounds on
the ranges of variables [5, 11, 20, 28, 38]. The only work in this area
that can also quantify roundoff errors is the tool Fluctuat[17, 24].
These techniques use interval or affine arithmetic and together with
the required join and meet operations may yield too pessimistic
results. [42] improves the precision of Fluctuat by refining the input domains with a constraint solver. Our approach can be viewed
as approaching the problem from a different end, starting with an
exact constraint and then using approximation until the solver succeeds. Unlike AI tools in general, our system currently handles
only functional code, in particular it does not handle loops. If the
user can provide inductive postconditions, then we can still prove
the code correct, but we do not in general discover these ourselves.
Our focus lies on proving precise bounds on the ranges in the presence of nonlinear computations and the quantification of roundoff
errors and other uncertainties.
Robustness analysis [27] combines abstract interpretation with
model checking to check programs for stability by tracking the evolution of the width of the interval representing a single input. [36]
use concolic execution to find inputs which, given maximum deviations on inputs, maximize the deviation on the outputs. These two
works however, use a testing approach and cannot provide sound
guarantees. [9] presents a framework for continuity analysis of programs along the mathematical −δ definition of continuity and [10]
builds on this work and presents a sound robustness analysis. This
framework provides a syntactic proof of robustness for programs
over reals and thus does not consider floating-points. Our approach
describes a quantitative measure of robustness for nonlinear programs with floating-point numbers and other uncertainties, and we
believe that it can complement the cited framework.
Theorem proving The Gappa tool [14, 35] generates a proof
checkable by the interactive theorem prover Coq from source code
with specifications. It can reason about properties that can be reduced to reasoning about ranges and errors, but targets, very precise
properties of specialized functions, such as software implementations of elementary functions. The specification itself requires expertize and the proofs human intervention. A similar approach is
taken by [2] which generate verification conditions that are discharged by various theorem provers. Harisson has also done significant work on proving floating-point programs in the HOL Light
theorem prover [26].
Our approach makes a different compromise on the precision
vs. automation tradeoff, by being less precise, but automatic. The
Gappa approach can be used complementary to ours, in that if we
detect that more precision is needed, Gappa is employed by an
expert user on selected methods, and the results are then used by
our tool instead of automatically computed specifications.
10.
Conclusion
We have presented a programming model for numerical programs
that decouples the mathematical problem description from its realization in finite precision. The model uses a Real data type that
corresponds to mathematical real numbers. The developer specifies
the program using reals and indicates the target precision; the compiler chooses a floating point representation while checking that the
desired precision targets are met. We have described the soundness
criteria by translating programs with precision requirements into
verification conditions over mathematical reals. The resulting verification conditions, while a natural description of the problem being
solved, are difficult to solve using a state-of-the art SMT solver Z3.
We therefore developed an algorithm that combines SMT solving
with range computation. Our notion of soundness incorporates full
input/output behavior of functions, taking into account that, due to
conditionals, small differences in values can lead to different paths
being taken in the program. For such cases our approach estimates
a sound upper bound on the total error of the computation.
We have evaluated our techniques on a number of benchmarks
from the literature, including benchmarks from physics, biology,
chemistry, and control systems. We have found that invocation of
SMT solver alone is not sufficient to handle these benchmarks due
to scalability issues, whereas the use of range arithmetic by itself
is not precise enough. By combining these two techniques we were
able to show that a floating point version of the code conforms to
the real-valued version with reasonable precision requirements.
We believe that our results indicate that it is reasonable to introduce Reals as a data type, following a list of previously introduced mathematical abstractions in programming languages, such
Range computation The Gappa tool and most constraint solvers
internally use interval arithmetic for sound range computations,
whose limitations are well-known. [19] describes an arithmetic
based on function enclosures and [37] use an arithmetic based
on taylor series as an alternative. This approach is useful when
checking a constraint, but is not suitable for a forward computation
of ranges and errors.
Decision procedures An alternative approach to verification via
range computation are floating-point decision procedures. Bitprecise constraints, however, become very large quickly. [8] addresses this problem by using a combination of over- and underapproximations. [25] present an alternative approach in combining
interval constraint solving with a CDCL algorithm and [21] is a
decision procedure for nonlinear real arithmetic combining interval constraint solving with an SMT solver for linear arithmetic.[44]
formalizes the floating-points for the SMT-LIB format. While these
approach can check ranges on numeric variables, they do not handle
roundoff errors or other uncertainties and cannot compute specifications automatically.
Our techniques rely on the performance of Z3. We hope that
an integration of the recent new improved solver for nonlinear
11
2013/9/11
as unbounded integers, rationals, and algebraic data types. The feasibility of verified compilation of our benchmarks suggests that it
is realistic to decouple the verification of executable mathematical
models over reals from their sound compilation. We therefore expect that this methodology will help advance rigorous formal verification of numerical software and enable us to focus more on highlevel correctness properties as opposed to run-time errors alone.
[24] E. Goubault, S. Putot, and F. Védrine. Modular static analysis with
zonotopes. In SAS, 2012.
[25] L. Haller, A. Griggio, M. Brain, and D. Kroening. Deciding floatingpoint logic with systematic abstraction. In FMCAD, 2012.
[26] J. Harrison. Floating-Point Verification using Theorem Proving. In
Formal Methods for Hardware Verification, 6th International School
on Formal Methods for the Design of Computer, Communication, and
Software Systems, SFM, 2006.
[27] F. Ivancic, M. Ganai, S. Sankaranarayanan, and A. Gupta. Numerical
stability analysis of floating-point computations using software model
checking. In MEMOCODE, 2010.
[28] B. Jeannet and A. Miné. Apron: A Library of Numerical Abstract
Domains for Static Analysis. In CAV, 2009.
[29] J. Jiang, W. Luk, and D. Rueckert. FPGA-Based Computation of FreeForm Deformations. In Field-Programmable Logic and Applications,
2003.
References
[1] A. Anta and P. Tabuada. To Sample or not to Sample: Self-Triggered
Control for Nonlinear Systems. IEEE Transactions on Automatic
Control, 55(9), 2010.
[2] A. Ayad and C. Marché. Multi-prover verification of floating-point
programs. In IJCAR, 2010.
[3] D. H. Bailey, Y. Hida, X. S. Li, and B. Thompson. C++/Fortran90 double-double and quad-double package.
http://crdlegacy.lbl.gov/˜dhbailey/mpdist/, 2013.
[4] F. Benz, A. Hildebrandt, and S. Hack. A dynamic program analysis to
find floating-point accuracy problems. In PLDI, 2012.
[5] B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné,
D. Monniaux, and X. Rival. A static analyzer for large safety-critical
software. In PLDI, pages 196–207, 2003.
[6] M. Borges, M. d’Amorim, S. Anand, D. Bushnell, and C. S. Pasareanu.
Symbolic Execution with Interval Solving and Meta-heuristic Search.
In ICST, 2012.
[7] C. Borralleras, S. Lucas, A. Oliveras, E. Rodrı́guez-Carbonell, and
A. Rubio. Sat modulo linear arithmetic for solving polynomial constraints. J. Automated Reasoning, 48(1), 2012.
[8] A. Brillout, D. Kroening, and T. Wahl. Mixed abstractions for floatingpoint arithmetic. In FMCAD, pages 69–76, 2009.
[9] S. Chaudhuri, S. Gulwani, and R. Lublinerman. Continuity analysis
of programs. In POPL, 2010.
[10] S. Chaudhuri, S. Gulwani, R. Lublinerman, and S. Navidpour. Proving
Programs Robust. In ESEC/FSE, 2011.
[11] L. Chen, A. Miné, J. Wang, and P. Cousot. Interval Polyhedra: An
Abstract Domain to Infer Interval Linear Relationships. In SAS, 2009.
[12] E. Darulova and V. Kuncak. Trustworthy numerical computation in
Scala. In OOPSLA, 2011.
[13] E. Darulova, V. Kuncak, R. Majumdar, and I. Saha. Synthesis of fixedpoint arithmetic code. In EMSOFT, 2013.
[14] F. de Dinechin, C. Lauter, and G. Melquiond. Certifying the FloatingPoint Implementation of an Elementary Function Using Gappa. IEEE
Trans. Comput., 2011.
[15] L. H. de Figueiredo and J. Stolfi. Self-Validated Numerical Methods
and Applications. IMPA/CNPq, Brazil, 1997.
[16] L. De Moura and N. Bjørner. Z3: an efficient SMT solver. In TACAS,
2008.
[17] D. Delmas, E. Goubault, S. Putot, J. Souyris, K. Tekkal, and
F. Vedrine. Towards an industrial use of FLUCTUAT on safety-critical
avionics software. In FMICS, 2009.
[18] V. D’Silva, L. Haller, D. Kroening, and M. Tautschnig. Numeric
Bounds Analysis with Conflict-driven Learning. In TACAS, 2012.
[19] J. A. Duracz and M. Konecny. Polynomial function enclosures and
floating point software verification. Constraints in Formal Verification/IJCAR, 2008.
[20] J. Feret. Static Analysis of Digital Filters. In the 13th European
Symposium on Programming - ESOP, 2004.
[21] S. Gao, M. Ganai, F. Ivancic, A. Gupta, S. Sankaranarayanan, and
E. Clarke. Integrating ICP and LRA solvers for deciding nonlinear
real arithmetic problems. In FMCAD, 2010.
[22] K. Ghorbal, E. Goubault, and S. Putot. A Logical Product Approach
to Zonotope Intersection. In CAV, 2010.
[23] D. Goldberg. What every computer scientist should know about
floating-point arithmetic. ACM Comput. Surv., 23(1), 1991.
[30] D. Jovanović and L. de Moura. Solving Non-linear Arithmetic. In
IJCAR 2012, 2012.
[31] W. Kahan. Miscalculating Area and Angles of a Needle-like Triangle.
Technical report, University of California Berkeley, 2000.
[32] V. Kuznetsov, J. Kinder, S. Bucur, and G. Candea. Efficient State
Merging in Symbolic Execution. In PLDI, 2012.
[33] K. Lakhotia, N. Tillmann, M. Harman, and J. de Halleux. FloPSy Search-Based Floating Point Constraint Solving for Symbolic Execution. In Testing Software and Systems. Springer Berlin / Heidelberg,
2010.
[34] X. Leroy. Verified squared: does critical software deserve verified
tools? In POPL, 2011.
[35] M. D. Linderman, M. Ho, D. L. Dill, T. H. Meng, and G. P. Nolan. Towards program optimization through automated analysis of numerical
precision. In CGO, 2010.
[36] R. Majumdar, I. Saha, and Z. Wang. Systematic Testing for Control
Applications. In MEMOCODE, 2010.
[37] K. Makino and M. Berz. Taylor Models and Other Validated Functional Inclusion Methods. International Journal of Pure and Applied
Mathematics, 4, 2003.
[38] A. Miné. Relational Abstract Domains for the Detection of FloatingPoint Run-Time Errors. In ESOP, 2004.
[39] R. Moore. Interval Analysis. Prentice-Hall, 1966.
[40] J. D. Murray. Mathematical Biology, I. An Introduction. Springer,
2002.
[41] M. Odersky, L. Spoon, and B. Venners. Programming in Scala: A
Comprehensive Step-by-step Guide. Artima Incorporation, 2008.
[42] O. Ponsini, C. Michel, and M. Rueher. Refining Abstract Interpretation Based Value Analysis with Constraint Programming Techniques.
In CP, 2012.
[43] A. Quarteroni, F. Saleri, and P. Gervasio. Scientific Computing with
MATLAB and Octave. Springer, 3rd edition, 2010.
[44] P. Rümmer and T. Wahl. An SMT-LIB Theory of Binary FloatingPoint Arithmetic. In Informal proceedings of 8th International Workshop on Satisfiability Modulo Theories (SMT) at FLoC, 2010.
[45] N. Scott, F. Jézéquel, C. Denis, and J.-M. Chesneaux. Numerical
‘health check’ for scientific codes: the CADNA approach. Computer
Physics Communications, 2007.
[46] I. C. Society. IEEE Standard for Floating-Point Arithmetic. IEEE Std
754-2008, 2008.
[47] E. Tang, E. Barr, X. Li, and Z. Su. Perturbing numerical calculations
for statistical analysis of floating-point program (in)stability. In ISSTA,
2010.
[48] E. M. Westbrook and S. Chaudhuri. A Semantics for Approximate
Program Transformations. CoRR, 2013.
[49] C. Woodford and C. Phillips. Numerical Methods with Worked Examples, volume 2nd. Springer, 2012.
12
2013/9/11
| 6cs.PL
|
Fundamental concepts in the Cyclus nuclear fuel cycle simulation framework
Kathryn D. Huffa,∗, Matthew J. Giddenb , Robert W. Carlsenb , Robert R. Flanaganc , Meghan B. McGarryb ,
Arrielle C. Opotowskyb , Erich A. Schneiderc , Anthony M. Scopatzd , Paul P.H. Wilsonb
a University of California - Berkeley, Department of Nuclear Engineering Berkeley, CA, 94720
of Wisconsin - Madison, Department of Nuclear Engineering and Engineering Physics, Madison, WI 53706
c University of Texas - Austin, Department of Mechanical Engineering, Nuclear and Radiation Engineering Program, Austin,
TX 78758
d University of South Carolina, Nuclear Engineering Program, Columbia, SC 29201
arXiv:1509.03604v2 [cs.SE] 11 Mar 2016
b University
Abstract
As nuclear power expands, technical, economic, political, and environmental analyses of nuclear fuel cycles
by simulators increase in importance. To date, however, current tools are often fleet-based rather than
discrete and restrictively licensed rather than open source. Each of these choices presents a challenge to
modeling fidelity, generality, efficiency, robustness, and scientific transparency. The Cyclus nuclear fuel
cycle simulator framework and its modeling ecosystem incorporate modern insights from simulation science
and software architecture to solve these problems so that challenges in nuclear fuel cycle analysis can be
better addressed. A summary of the Cyclus fuel cycle simulator framework and its modeling ecosystem are
presented. Additionally, the implementation of each is discussed in the context of motivating challenges in
nuclear fuel cycle simulation. Finally, the current capabilities of Cyclus are demonstrated for both open
and closed fuel cycles.
Keywords: nuclear fuel cycle, simulation, agent based modeling, nuclear engineering, object orientation,
systems analysis
1. Introduction
As nuclear power expands, technical, economic,
political, and environmental analyses of nuclear fuel
cycles by simulators increase in importance. The
merits of advanced nuclear technologies and fuel
cycles are shaped by myriad physical, nuclear, chemical, industrial, and political factors. Nuclear fuel
cycle simulators must therefore couple complex models of nuclear process physics, facility deployment,
and material routing.
Indeed, the cardinal purpose of a dynamic nuclear
fuel cycle simulator is to calculate the time- and
facility-dependent mass flow through all or part
the fuel cycle. Dynamic nuclear fuel cycle analysis
more realistically supports a range of simulation
goals than static analysis [1]. Historically, dynamic
nuclear fuel cycle simulators have calculated fuel
cycle mass balances and performance metrics derived
∗ Corresponding
Author
Email address: [email protected] (Kathryn D. Huff)
Preprint submitted to Advances in Engineering Software
from them using software ranging from spreadsheetdriven flow calculators to highly specialized system
dynamics modeling platforms.
To date, current tools are typically distributed
under restrictive rather than open source licenses,
having been developed in industrial contexts or using
commercial software platforms. Additionally, having
often been developed for customized applications,
many possess inflexible architectures, never having
been designed to enable new features or extensions.
Finally, many model only fleet-level dynamics of facilities and materials rather than discrete resolution
of those individual agents and objects. When the
DOE-NE Fuel Cycles Technologies Systems Analysis Campaign developed requirements necessary in
a next generation fuel cycle simulator, three main
failure modes were associated with those software
choices. First, they discourage targeted contribution and collaboration among experts. Next, they
hobble efforts to directly compare modeling methodologies. Finally, they over-specialize, rendering most
tools applicable to only a subset of desired simulaMarch 14, 2016
1.1. Background
Nuclear fuel cycle simulators drive research development and design (RD&D) by calculating ‘metrics’,
quantitative measures of performance that can be
compared among fuel cycle options. The feasibility of the technology development and deployment
strategies which comprise a fuel cycle option, the operational features of nuclear energy systems, the dynamics of transitions between fuel cycles, and many
other measures of performance can be expressed
in terms of these metrics. For example, economic
feasibility is often measured in levelized cost of electricity (LCOE), a combination of fuel and operating
costs normalized by electricity generation, while
environmental performance might be measured by
spent fuel volume, radiotoxicity, or mined uranium
requirements. A meta-analysis of fuel cycle systems
studies identified over two dozen unique quantitative
metrics spanning economics and cost, environmental sustainability and waste management impacts,
safety, security and nonproliferation, resource adequacy and utilization, among others [11]. With few
exceptions, these metrics are derived from mass balances and facility operation histories calculated by
a fuel cycle simulator. For example, where nuclear
waste repository burden is derived from ejected fuel
masses, water pollution or land use can be derived
from facility operational histories (as in [12]).
However, methods for calculating those metrics
vary among simulators. Some model the system of
facilities, economics, and materials in static equilibrium, while other simulators capture the dynamics
of the system. Similarly, while some simulators discretely model batches of material and individual
facilities, others aggregate facilities into fleets and
materials into streams. Some simulators were designed to model a single aspect of the fuel cycle
in great detail while neglecting others. For example, a simulator created for policy modeling might
have excellent capability in economics while capabilities for tracking transformations in material isotopics and the effects of isotopics on technology
performance are neglected. The Code for Advanced
Fuel Cycles Assessment (CAFCA)[13] simulator
is problem-oriented in this way, having elected to
neglect isotopic resolution in favor of integral effects.
Historically, domestic national laboratories have
driven development and regulated the use of their
own tools: the Verifiable Fuel Cycle Simulation
Model (VISION)[14], Dynamic Model of Nuclear
Development (DYMOND)[15], and Nuclear Fuel
Cycle Simulator (NFCSim)[16, 17]. Internationally,
tion fidelities, scales, and applications. Those three
constraints were identified as presenting significant
challenges to modeling fidelity, generality, efficiency,
robustness, and scientific transparency in the field
of fuel cycle analysis [2].
The Cyclus nuclear fuel cycle simulator framework and its modeling ecosystem, the suite of agents
and other physics plug-in libraries compatible with
it, incorporate modern insights from simulation science and software architecture to solve these problems. These modern methods simultaneously enable
more efficient, accurate, robust, and validated analysis. This next-generation fuel cycle simulator is the
result of design choices made to:
• support access to the tool by fuel cycle analysts
and other users,
• encourage developer extensions,
• enable plug-and-play comparison of modeling
methodologies,
• and address a range of analysis types, levels of
detail, and analyst sophistication.
Cyclus is a dynamic, agent-based model, which
employs a modular architecture, an open development process, discrete agents, discrete time, and
arbitrarily detailed isotopic resolution of materials. Experience in the broader field of systems
analysis indicates that agent-based modeling enables more flexible simulation control than system
dynamics, without loss of generality [3]. Furthermore, openness allows cross-institutional collaboration, increases software robustness [4, 5], improves
the strength and quality of results through peer review [6, 7, 8, 9, 10], and cultivates an ecosystem of
modeling options. This ecosystem is modular, being
comprised of dynamically loadable, interchangeable,
plug-in libraries of fuel cycle component process
physics that vary in their scope, depth, and fidelity.
This modularity allows users and developers to customise Cyclus to analyze the cases that are of
interest to them rather than any custom application
the simulator was originally developed to address.
Additionally, that customizability allows users and
developers to address those cases at the level of
fidelity necessary for their application. The fundamental concepts of the Cyclus nuclear fuel cycle
simulator capture these modern insights so that
novel challenges in nuclear fuel cycle analysis can
be better addressed.
2
other laboratories have created their own as well,
such as Commelini-Sicard (COSI)[18, 19, 20, 21]
and ORION[22]. Finally, some simulators initiated
in a national lab setting have been continued as
propriety, industry-based simulators, such as Dynamic Analysis of Nuclear Energy System Strategies
(DANESS)[23]. Outside the national laboratories,
researchers have created new nuclear fuel cycle simulation tools when existing tools were not available
or not sufficiently general to calculate their metrics of interest. With limited access to the national
laboratory tools and a need to customize them for
research purposes, universities and private industry
researchers have “reinvented the wheel” by developing tools of their own from scratch and tailored
to their own needs. Examples include CAFCA[24]
and Dynamic Analysis of Nuclear Energy Systems
Strategies (DESAE)[25, 26, 17].
Cyclus emerged from a line of tools seeking to
break this practice. Its precursor, Global Evaluation
of Nuclear Infrastructure Utilization Scenarios (GENIUS) Version 1 [27, 28], originated within Idaho
National Laboratory (INL) and sought to provide
generic regional capability. Based on lessons learned
from GENIUS Version 1, the GENIUS Version 2
[29, 30] simulator sought to provide more generality
and an extensible interface to facilitate collaboration. The Cyclus project then improved upon the
GENIUS effort by implementing increased modularity and encapsulation. The result is a dynamic
simulator that treats both materials and facilities discretely, with an architecture that permits multiple
and variable levels of fidelity. Using an agent-based
framework, the simulator tracks the transformation
and trade of resources between autonomous regional
and institutional entities with customizable behavior and objectives. Each of these concepts (agentbased, resource tracking, and regional as well as
institutional entities) will be described in their own
sections (sections 2.2, 2.3.1, and 2.2.2 respectively).
Together, they provide a capability for extension
and reuse beyond that pursued by any existing fuel
cycle simulator.
This essential capability is absent in previous simulators where user customization and extensibility were
not design objectives. While the modular and open
architecture of Cyclus is necessary to meet these
goals, it is not sufficient. Agent interchangeability is
also required to facilitate direct comparison of alternative modeling methodologies and facility concepts.
With this concept at its core, Cyclus provides a
platform for users to quickly develop the capabilities
at a level of detail and validation necessary for their
unique applications. Finally, Cyclus is applicable
to a broader range of fidelities, scales, and applications than other simulators, due to the flexibility
and generality of its agent-based modeling (ABM)
paradigm and discrete, object-oriented approach.
This structure recognizes that specialists should
utilize their time and resources in modeling the specific process associated with their area of expertise
(e.g., reprocessing and advanced fuel fabrication),
without having to create a model of the entire fuel
cycle to serve as its host. Cyclus supports them
by separating the problem of modeling a physicsdependent supply chain into two distinct components: a simulation kernel and archetypes that interact with it. The kernel is responsible for supporting
the deployment and interaction logic of entities in
the simulation. Physics calculations and customized
behaviors of those entities are implemented within
archetype classes.
Ultimately, modeling the evolution of a physicsdependent, international nuclear fuel supply chain
is a multi-scale problem which existing tools cannot
support. They have either focused on macro effects,
e.g., the fleet-level stocks and flows of commodities,
or micro effects, e.g., the used-fuel composition of
fast reactor fuel. Each focus has driven the development of specialized tools, rendering the task of
answering questions between the macro and micro
levels challenging within a single tool. In contrast,
the open, extensible architecture and discrete object
tracking of Cyclus allow the creation and interchangeability of custom archetypes at any level of
fidelity and by any fuel cycle analyst.
1.2. Motivation
The Cyclus paradigm enables targeted contribution and collaboration within the nuclear fuel cycle
analysis community to achieve two important goals:
lower the barrier for users to include custom nuclear
technologies and facility types in their fuel cycle
analyses while improving the ability to compare simulations with and without those custom concepts.
1.2.1. Open Access and Development Practices
The proprietary concerns of research institutions
and security constraints of data within fuel cycle
simulators often restrict access. Use of a simulator is therefore often limited to its institution of
origin, necessitating effort duplication at other institutions and thereby squandering broader human
resources. License agreements and institutional ap3
proval are required for most current simulators (e.g.
COSI6, DANESS, DESAE, EVOLCODE, FAMILY21, NFCSim)[31], including ORION, and VISION. Even when the source code is unrestricted,
the platform on which it relies (e.g. VENSIM) is
often restricted or costly. The MIT CAFCA software, for example, relies on the commercially licensed VENSIM product as a platform. Cyclus,
on the other hand, is written in C++ for which
freely available development tools and an open standard are available. Further, Cyclus relies only on
open source, freely available libraries. As such, it
provides fully free and open access to all users and
developers, foreign and domestic.
Moreover, both technical and institutional aspects
of the software development practices employed
by the Cyclus community facilitate collaboration.
Technically, Cyclus employs a set of tools commonly used collaborative software development that
reduce the effort required to comment on, test and
ultimately merge individual contributions into the
main development path. For many of the simulation platforms adopted by previous simulators, there
were technical obstacles that impeded this kind of
collaboration. Institutionally, Cyclus invites all
participants to propose, discuss and provide input to
the final decision making for all important changes.
as they enter and leave the simulation over time and
seek to trade materials whose specific composition
may not be known a priori.
1.2.3. Discrete Facilities and Materials
Many fuel cycle phenomena have aggregate
system-level effects which can only be captured
by discrete material tracking [2]. Cyclus tracks
materials as discrete objects. Some current fuel
cycle simulation tools such as COSI [26, 32, 24],
FAMILY21[26], GENIUS version 1, GENIUS version 2, NFCSim, and ORION also possess the ability
to model discrete materials. However, even among
these, the ability to model reactor facilities individually is not equivalent to the ability to model distinct
activities. COSI, for example, has some support for
modeling reactors individually, but according to a
recent benchmark [33], it models many reactors operating in sync. That is, refuelling and discharging
occur simultaneously for all reactors. While Cyclus
allows this type of fleet-based aggregation of reactor
behavior, Cyclus also enables operations in each
facility to vary independently of any others in the
simulation.
Similarly, the ability to model disruptions (i.e.
facility shutdowns due to insufficient feed material or
insufficient processing and storage capacity) is most
readily captured by software capable of tracking
the operations status of discrete facilities [2]. Fleetbased models (e.g. VISION) are unable to capture
this gracefully, since supply disruptions are modeled
as a reduction in the capacity of the whole fleet.
All of the software capable of discrete materials
have a notion of discrete facilities, however not all
handle disruption in the same manner. DESAE, for
example, does not allow shutdown due to insufficient
feedstock. In the event of insufficient fissile material
during reprocessing, DESAE borrows material from
storage, leaving a negative value [26]. The Cyclus
framework does not dictate such heuristics. Rather,
it provides a flexible framework on which either
method is possible.
A final benefit of the discreteness of facilities and
materials is their power when combined. The ability to track a material’s history as it moves from
one facility to another is unique to Cyclus. While
some current simulators track materials in discrete
quanta, they do not necessarily preserve the identity
of each quantum as the materials move around the
fuel cycle. When coupled with Cyclus’ individual facility modeling, this capacity becomes distinct
from what other fuel cycle simulators are able to do.
1.2.2. Modularity and Extensibility
Modularity is a key enabler of extending the scope
of fuel cycle analysis within the Cyclus framework.
Changes that are required to improve the fidelity of
modeling a particular agent, or to introduce entirely
new agents, are narrowly confined and place no new
requirements on the Cyclus kernel. Furthermore,
there are few assumptions or heuristics that would
otherwise restrict the algorithmic complexity that
can be used to model the behavior of such agents.
For example, most current simulators describe
a finite set of acceptable cycle constructions (once
through, single-pass, multi-pass). That limits the
capability to create novel material flows and economic scenarios. The Cyclus simulation logic relies
on a market paradigm, parameterized by the user,
which flexibly simulates dynamic responses to pricing, availability, and other institutional preferences.
This minimal set of mutual dependencies between
the kernel and the agents is expressed through the
dynamic resource exchange (DRE) that provides a
level of flexibility that does not exist in other fuel
cycle simulators. It creates the potential for novel
agent archetypes to interact with existing archetypes
4
So, while FAMILY21 and COSI can identify whether
a batch being discharged from a reactor originated
in mixed oxide (MOX) fabrication rather than fresh
uranium oxide (UOX) fabrication, Cyclus can go
further, tracking which of the fresh batches contained material from a particular discharged batch.
By extension, Cyclus can also report which individual facilities the batch passed through and in
which it originated. The ability to track a single
material through the simulation, though it might
be split, transmuted, or merged with other materials along the way, allows Cyclus to answer more
data-rich questions that previous simulators have
been unable to ask. For example, it allows precise
tracking of specific material diversions, so queries
about nonproliferation robustness in a facility can
be levied either in the context of a single event or a
series of nefarious acts.
This encapsulated ‘plug-in’ design choice provides
two major benefits. First, analysts can take advantage of the simulation logic API and archetype
ecosystem when they apply Cyclus to their specific
problem. A modeler can focus on creating or customizing nuclear facility, institution, resource, and
toolkit models within their specific area of technical
expertise. Second, because Cyclus uses a modular
archetype approach, comparing two archetypes is
straightforward. For example, if an analyst would
like to compare the effect of using different models to determine the input fuel composition for fast
reactors, fuel fabrication archetypes can be developed and interchanged while keeping the rest of the
models used in the simulation fixed.
2.1.1. Cluster-Ready Software
Many fuel cycle simulators rely on commercial, offthe-shelf (COTS) and Windows-only software that
limits performance on and compatibility with resource computing infrastructures (e.g. cluster or
cloud computing). This constrains the possible
scope of simulations and increases the wall-clock
time necessary to conduct parameterized sensitivity
analyses and other multi-simulation studies. For
example, large scale sensitivity analyses to quantify
the dependence of fuel cycle outcomes are only feasible in a massively parallelized environment. To
enable such research, Cyclus, is primarily written
in C++ and relies on libraries supported by Linux
and UNIX (including Ubuntu and OSX) platforms,
which are flexible and support parallelization.
Cyclopts [34], a proof-of-principle Cyclusenabled application on such a large compute system,
uses UW-Madison’s HTCondor high-throughput
computing (HTC) infrastructure to study DRE performance and outcomes. For example, an investigation of the effect of solution degeneracy, a commonly observed phenomenon in scenarios with individual facilities and basic (e.g., commodity-only)
preference definitions, was performed for three different fuel cycles: once-through, MOX fast reactorthermal reactor cycles, and MOX-thorium oxide
(ThOX) recycle in fast reactors-thermal reactor cycles. Objective coefficients were generated based on
two factors: commodity-facility pairings and facility
location. The population of the possible values of
commodity-facility pairings is always small (O(10)).
The size of the population of possible values of the
location effect was investigated for values of zero,
ten, and infinity (i.e., any real number). The study
additionally included an investigation of problem-
2. Methodology and Implementation
A modular, agent-based modeling (ABM) approach is ideal for modeling the coupled, physicsdependent supply chain problems involving material
routing, facility deployment, and regional and institutional hierarchies which arise in fuel cycle analysis.
Additionally, the choice to build Cyclus on open
source libraries in modern programming languages
enables both remote and multiprocess execution
on a number of platforms. This section begins by
describing the general design features that make
Cyclus both flexible and powerful: cluster-ready
software and dynamically loadable libraries. The
ABM framework is then described, focusing on its
implementation and benefits in a fuel cycle context. A discussion of the time-dependent treatment
of discrete resources follows, focusing on the DRE.
Support for users and developers via the Cycamore
library of archetypes and the experimental toolkit
are also presented. Lastly, the methods for quality
assurance are outlined.
2.1. Modular Software Architecture
The architecture of Cyclus allows developers to
define nuclear fuel cycle processes independent of
the simulation logic. To achieve this, agents are developed which represent facilities, institutions, and
regions comprising the nuclear fuel cycle. These
agents are created using the Cyclus framework
application programming interface (API), a set of
functions and protocols which assist in agent development and specify how agents should be defined.
5
scaling behavior in order to quantify the magnitude
and rate-of-increase of DRE solution times as a function of the simulation-entity population for each fuel
cycle[35]. In total, Cyclopts has run over 105 jobs,
comprising more than 60,000 compute hours. The
HTC infrastructure has separately been utilized to
run and collect information from full Cyclus simulations running in parallel on 103 machines reliably
for order 105 simulations.
2.1.2. Dynamically Loadable Libraries
The Cyclus architecture encourages efficient, targeted contribution to the ecosystem of archetype
libraries. With Cyclus, a researcher can focus on
generating an archetype model within their sphere
of expertise while relying on the contributions of
others to fill in the other technologies in the simulation. Similarly, individual developers may explore
different levels of complexity within their archetypes,
including wrapping other simulation tools as loadable libraries within Cyclus.
Cyclus achieves this behavior by implementing
generic APIs and a modular architecture via a suite
of dynamically loadable plug-in libraries (pictured
in Figure 2.1.2). By anticipating the possible classes
of information required by the simulation kernel,
the Cyclus APIs facilitate information passing between the plug-in agents and the core framework.
Though common in modern software architecture,
such a plug-in paradigm has not previously been
implemented in a nuclear fuel cycle simulator. It
allows the core Cyclus framework to operate independently from the plug-in libraries, and the dynamically loadable plug-ins to be the primary mechanism
for extending Cyclus’ capabilities independent of
the core.
An additional benefit is the ability for contributors to choose different distribution and licensing
strategies for their contributions. Users and modelers control the accessibility of their archetypes and
data sets (See Figure 2.1.2). In particular, since the
clean plug-in architecture loads libraries without any
modifications to the Cyclus kernel, closed-source
archetypes can be used with the simulator alongside
open source archetypes without transfer of sensitive
information. This architecture allows closed-source
libraries (e.g., those representing sensitive nuclear
processes and subject to export control) to be developed and licensed privately.
Finally, dynamically loadable libraries enable Cyclus to easily handle varying levels of simulation
complexity. Hence a single simulation engine can be
Figure 1: The Cyclus core provides APIs that abstract away
the details in the kernel and allow the archetypes to be loaded
into the simulation in a modular fashion.
Figure 2: The Cyclus framework enables fully open, partially
open, and fully closed collaborations[36].
6
used by both users interested in big-picture policy
questions as well as users focused on detailed technical analyses. They merely choose their preferred
level of modeling depth from among the available
libraries in the ecosystem.
Critically, this novel functionality enables the comparison between agent implementations. For example, an archetype that inherits the Region interface,
as in Figure 3, is interchangeable with any other
Region agent.
cyclus::StateWrangler
2.2. Agent-based Paradigm
Cyclus implements an agent-based modeling
paradigm. ABM enables model development to
take place at an agent level rather than a system
level. In the nuclear fuel cycle context, for example,
an analyst can design a reactor agent that is entirely
independent from a fuel fabrication agent. Defining
the behavior of both agents according to the API
contract is sufficient for them to interact with one
another as bona fide agents in the simulation. The
two archetype libraries can be used in the same
simulation without any shared knowledge, allowing
modelers to construct a simulation from building
blocks of many types and origins.
Furthermore, the ABM paradigm is more flexible and intuitive (from both a developer and user
perspective) than the system dynamic approach
used in current simulators. System dynamics is a
popular approach for modeling nuclear fuel cycles
[37, 23, 13, 24]. Formally however, system dynamics
models are simply a strict subset of agent-based
models [3]. That is, any system dynamics model
can be translated into an agent-based model. ABM
techniques therefore enable a broader range of simulations in a more generic fashion.
cyclus::Ider
cyclus::Agent
cyclus::Facility
cyclus::Agent
cyclus::Region
cyclus::Dummy
Figure 3: Inheriting Cyclus class interfaces, such as the
Agent, Facility, Institution, and Region classes, abstracts
away unnecessary details while exposing powerful functionality. In the above example, the Dummy archetype simply
inherits from Region in order to become a bona fide Regiontype Agent.
In this way, a researcher can directly compare
two different reactor modeling implementations
(perhaps the imaginary classes DetailedReactor
and SimpleReactor) simply by exchanging the two
corresponding archetypes. That is, two reactor
archetypes both inheriting from the Facility class
are indistinguishable from a simulation perspective.
This can be done with any agent type, where agents
can be “Regions,” “Institutions,” or “Facilities.”
2.2.2. Regions, Institutions, and Facilities
Cyclus provides a novel representation of entities in the nuclear fuel cycle that reflects the reality
in international nuclear power: facilities implementing individual fuel cycle technologies, institutions
managing those facilities, and regions providing geographical and political context for institutions and
facilities. While few simulators have provided any
notion of static regional effects [2, 31], Cyclus allows for both regions and institutions to be firstclass agents in simulated fuel cycles. The fundamental interactions for each entity are implemented
in a corresponding archetype class in Cyclus, i.e.,
the Region class, Institution class, and Facility class. Archetype developers can then build on
the provided functionality by inheriting from the
appropriate class. Cyclus implements a RegionInstitution-Facility (RIF) relationship through a
parent-child hierarchy where regions are the parents
of institutions which are, in turn, the parents of
2.2.1. Agent Interchangeability
ABM is inherently object-oriented because agents
represent discrete, independently acting objects.
Figure 2.1.2 illustrates the modular nature of Cyclus archetypes. The core of the Cyclus simulator creates a set of classes on which agent plugins are based. Agent plug-ins utilize the generic
core APIs that define agent-to-agent interaction as
well as agent-to-environment interaction. For example, they use the resource exchange paradigm
API for trading resources with one another. For
the archetype developer, these interfaces provide
enormous power simply. The API abstracts away
details unnecessary to specifying the archetype behavior, while providing all necessary functionality
for interacting with the Cyclus simulation kernel.
For the user, multiple archetypes that inherit the
same APIs are interchangeable in a simulation.
7
2.3.1. Resources and Materials
Another such use case seeks to capture system
vulnerability to material diversion. Provenance and
trade-history of distinct materials is the fundamental
information unit in such studies, and so this type
of analysis requires discrete simulation of a target
facility and the individual materials modified within
it. Material risk analysis, therefore, demands that
both facilities and materials should be discretely
modeled objects like those in Cyclus.
In Cyclus, agents can transfer discrete resource
objects among one another. Cyclus supports two
types of resources:
facilities. In other words, RIF hierarchies form a
directed acyclic graph (DAG)1 , with regions as root
nodes and facilities as leaf nodes.
Two primary consequences arise from this structure. First, institutions are nominally responsible
for deploying and decommissioning facilities. Accordingly, advanced logic regarding building and decommissioning can be implemented on top of those
behaviors inherited from the Institution interface.
Second, the Facility class implements the Trader
interface to participate in resource exchange, and
institutions and regions, respectively, can adjust the
resource flow preferences of their managed facilities.
Importantly, this capability allows for the modeling
of preferential regional trading of resources (e.g.,
tariffs) as well as preferential institutional trading
(e.g., long-term contracts).
• materials: these represent typical nuclear materials with nuclide compositions;
• products: these can represent any user-defined
measure: carbon credits, build permits, employees, etc..
2.3. Discrete Objects
Cyclus models facilities, institutions, regions,
and resources as discrete objects. A discrete resource model allows for a range of modeling granularity. In the macroscopic extreme, it is equivalent
to time-stepped continuous flow. In the microscopic
extreme, the model is capable of representing arbitrarily small material objects at isotopic resolution.
In this way, Cyclus is applicable across the full
range of modeling fidelity.
Fleet-based, lumped-material models do not distinguish between discrete facility entities or materials. However, some questions require resolution at
the level of individual facilities and materials. As
a result, many detailed performance metrics cannot be captured with previously existing fleet-based
models. For example, meaningful models of spent
nuclear fuel storage transport, and disposal strategies, require representation of discrete casks and
their varying isotopic compositions.
For all of the reasons that the ABM paradigm
in 2.2 enables novel simulations, multiple use cases
require that these agents, such as the regions, institutions, and facilities in Cyclus, must be represented
as discrete objects. For instance, tracking of individual shipments is only viable if materials and
resources are tracked as discrete objects.
All operations performed on every resource object (splitting, combining, decay, etc.) are tracked
in detail as they are performed. This information
includes the agent that created each resource when
it was introduced into the simulation. The parentage of each resource is also tracked. This makes it
possible to follow the history of resources as they
are transferred between agents.
The Cyclus kernel has built-in experimental support for decay calculations. Materials store the time
since their last decay and agents are free to invoke
the decay function on them as desired to decay them
to the current simulation time. Cyclus can operate
in 3 decay modes, with 1 additional mode likely to
be added in a future release:
• “manual” (currently implemented) is the default mode where agents decay materials when
requested by an archetype,
• “never” (currently implemented) globally turns
off all decay. The Material decay function does
nothing,
• “lazy” (currently implemented) decays material
automatically whenever its composition is observed (e.g. when an agent queries information
about a material’s 239 Pu content),
1 DAGs are common graph theoretic structures whose
most important feature is a lack of cycles, i.e., there is a
single path from the root node to any other node in the
graph.
• “periodic” (future) automatically decays all
materials in a simulation with some fixed frequency.
8
When decay is invoked, a material checks to see
if it contains any nuclides with decay constants
that are significant with respect to the time change
since the last decay operation. If none of the decay
constants are significant, no decay calculation is performed and the material remains unchanged. This
error does not accumulate because the next time
the material’s decay function is invoked, the time
change will be larger.
Cyclus has no notion of “tracked” versus “untracked” nuclides. In Cyclus, the composition of a
material is represented by an arbitrarily large list
(potentially thousands) of nuclides. Agents are free
to treat nuclides present in materials any way they
please - including ignoring them. It is the responsibility of archetype developers to choose how to
handle potentially full-fidelity compositions.
In large simulations, many material objects may
change frequently. Material decay can also contribute significantly to such changes. In order to
help avoid unnecessary runtime performance and
database size impacts, compositions in Cyclus have
some special features. In particular, compositions
are immutable once created. This allows multiple material objects to hold references to the same
composition safely. Additionally, new compositions
resulting from decay are cached and used to avoid
redundant decay calculations. Figure 4 illustrates
how this decay history cache works. Composition
immutability in concert with decay history caching
help eliminate many redundant calculations in addition to reducing the total number of composition
entries recorded in the database.
A
dt=1
decay A +1
B
dt=2
decay A +4
decay B +3
decay A +3
decay B +2
C
dt=1
D
Figure 4: A simple decay line cache holding compositions
A, B, C, and a yet-uncomputed composition D. B comes
from decaying A 1 time step. C comes from decaying B 2
time steps, etc. Black represents the cache for this particular
composition chain. Blue indicates decay operations that can
be satisfied by cache lookups. If A needs to be decayed 1 time
step (A +1), a quick lookup returns the previously computed
B. Decaying B 3 time steps requires a decay calculation to
compute a new composition D, but subsequent requests such
as decaying A 4 time steps will not require any recalculation.
question, i.e., the same procedure is used for both
Materials and Products.
The information-gathering step begins by polling
potential consumers. Agents define both the quantity of a commodity they need to consume as well
as the target isotopics, or quality, by posting their
demand to the market exchange as a series of requests. Users may optionally parameterize the agent
to associate a collection of demand constraints with
each collection of requests. Collections of requests
may be grouped together, denoting mutual requests
that represent demand for some common purpose.
For example, a reactor may request UOX and MOX
fuel mutually, indicating that either will satisfy its
demand for fuel.
Suppliers then respond to the series of requests
with a bid. A bid supplies a notion of the quantity
and quality of a resource to match a request. Suppliers may add an arbitrary number of constraints
to accompany bids. For example, an enriched UOX
supplier may be constrained by its current inventory
of natural uranium or its total capacity to provide
enrichment in Separative Work Units (SWUs). It
attaches such constraints to its bids.
Any potential resource transfer, i.e., a bid or a
request, may be denoted as exclusive. An exclusive
2.3.2. Dynamic Resource Exchange (DRE)
The Cyclus simulation paradigm allows discrete
agents, based on archetypes about which the kernel
has no knowledge, to enter the simulation at arbitrary times and trade in discrete resources. These
resources are not defined a priori. Therefore, the
logic engine defining resource interaction mechanisms among agents is crucial. The DRE, described
in detail in [35], is that critical logic engine on which
Cyclus simulations are built. Supporting the general Cyclus philosophy, facilities are treated as
black boxes and a supply-demand communication
framework is defined.
The DRE consists of three steps: supply-demand
information gathering, resource exchange solution,
and trade execution. Importantly, each step is agnostic with respect to the exchange of resources in
9
transfer excludes partial fulfilment; it must either be
met fully or not at all. This mode supports concepts
such as the trading of individual reactor assemblies.
In combination with the notion of mutual requests,
complex instances of supply and demand are enabled.
Finally, requesting facilities, institutions and
regions may apply preferences to each potential
request-bid pairing based on the proposed resource
transfer. Facilities can apply arbitrary complex logic
to rank the bids that they have received, whether
based on the quantity available in each bid or on the
quality of each bid, and the consequent implications
of the physics behavior of that facility. In addition,
an institution can apply a higher preference to a
partner to which it is congenial; similarly, a region
may negate any transfers of material which have a
higher uranium enrichment than is allowable.
[35]:
min z = c> x
(1)
s.t. Ax ≤ b
(2)
x
xi,j ∈ [0, x̃j ] ∀i ∈ I, ∀j ∈ J
(3)
where
I = set of supply nodes
J = set of request nodes
ci,j = unit cost of flow from i to j
xi,j = flow from node i to node j
aki,j = coefficient for constraint k between i and j
bks|r = RHS for constraint k for a given supplier or requester
x̃j = requested quantity of request node j.
In practice, LPs solve much faster than MILPs.
However, both capabilities exist in Cyclus in order
to provide users with the desired level of fidelity.
Trades between agents are initiated by the Cyclus kernel after a solution to the DRE is found.
For each trade, the supplying agent is notified of
its matched request and provides an associated resource to the exchange. All supplied resources are
then sent to the corresponding requesting agents.
In Cyclus, the DRE is executed at each time
step. Therefore, if a facility’s request for a resource
is not met at a given time step, it may offer a request
in the following time step. Because agent behavior
may change arbitrarily, the exchange executed at
any given time step may be unique in a simulation.
The DRE is a novel simulation concept in the
nuclear fuel cycle domain. It provides a flexible
supply-demand infrastructure, supporting dynamic
flows of resources between agents, even as those
agents enter and leave the simulation, and even when
those agents are defined by archetypes of arbitrary
complexity. Trading between agents can be affected
by both the proposed quality of a resource and
agent relationships through the use of preferences.
Accordingly, a wide range of possible effects can
be modeled, from capacity-limited fuel supply to
international trade agreements.
Figure 5: The flow graph representing three suppliers (left),
two requesters (right), and the potential flows of various
commodities among them. The second consumer makes
two different requests. Meanwhile, the second supplier can
supply the commodities requested by both consumers and
has provided two bids accordingly [35].
Given a full definition of supply and demand, represented in Figure 5 as a flow graph, the DRE may
be solved either optimally using a mathematical
program or approximately by a simulation-based
heuristic [35]. If any trade is denoted as exclusive,
e.g., if an analyst desires an assembly-fidelity model,
then either a heuristic must be used or exchanges
must be represented as a mixed-integer linear program (MILP). If no exclusive trades exist, a linear
program (LP) model may be used. The LP formulation in Cyclus is of the form given by Gidden
2.4. Simulation Support
So that users and developers can build working simulations in the shortest time possible, the
10
Cyclus ecosystem provides fundamental building
blocks: basic archetypes and a toolkit of commonly
needed functions. The Cycamore library provides
a suite of fundamental Region, Institution, and Facility archetypes, while the Cyclus toolkit provides
assistance to developers.
classes provide the basis for in-simulation deployment determination: CommodityProducer, CommodityProducerManager, Builder, BuildingManager.
The CommodityProducer class provides an interface
for querying the prototypes which have the capacity
to produce a given commodity. The CommodityProducerManager provides an interface for registering
CommodityProducers and querying the current capacity (supply) of a commodity. The Builder class
provides an interface for querying which prototypes
can be built and interacts with the BuildingManager, which orders prototypes to be built. The
BuildingManager uses a simple minimum cost algorithm to determine how many of each prototype,
yi , to build given a demand (Φ), capacities (φi ),
and costs (ci ). Here i indexes I available prototypes which perform a similar function, and the
demand, capacity and cost carry prototype-specific
units which are defined by the developer.
2.4.1. Cycamore
Cycamore [38], the Cyclus additional module
repository, provides a fundamental set of dynamically loadable libraries providing agent archetypes
for basic simulation functionality within Cyclus.
Since Cyclus relies on external archetypes to represent the agents within a simulation, Cycamore
provides the basic archetypes a new user needs
to get started running simple simulations. These
archetypes support a minimal set of fuel cycle simulation goals and provide, by example, a guide to
new developers who would seek to contribute their
own archetypes outside of Cycamore.
As of version 1.0, Cycamore contains one region
archetype, two institution archetypes, and four facility archetypes. Three additional facilities were
added in version 1.3 . Short descriptions of these
functions can be found in Table 1.
Section 3.2 will demonstrate how the current
Cycamore release provides basic functionality enabling simple fuel cycle analyses. As future contributions are vetted, the capabilities in Cycamore
may grow.
min
N
X
ci yi
i=1
s.t.
N
X
(4)
φi yi ≥ Φ
i=1
yi ∈ [0, ∞) ∀i ∈ I, yi integer
Nuclear Engineering Tools. The Cyclus toolkit
provides two useful interfaces for querying physical
parameters of Material objects. First, the MatQuery tool provides a basic querying API, including
the atom and mass fractions of nuclides, the number of moles of a nuclide in a material, etc. (i.e., a
Composition), in a material. The Enrichment tool
provides an API for determining enrichment-related
parameters of a material, including the SWU and
natural uranium required to enrich a material provided knowledge of feed, product, and tails assays.
2.4.2. Toolkit
In addition to the core functionality of the Cyclus kernel, which is focused on the set of capabilities needed to implement an agent-based simulation
with DRE, a toolkit is provided to assist developers
and users with related simulation and nuclear engineering tasks. The toolkit is an actively developed
part of Cyclus, with a primarily forward-looking focus on supporting interesting in situ metric analysis
tools.
Toolkit Extensions. In addition to those that already exist, new tools will emerge from the
archetypes developed by the community. As these
tools gain adoption between projects and demonstrate their utility to the developer community, they
will be considered for screening and adoption into
the kernel as toolkit extensions. Likely extensions
include
Simulation Tools. A series of utility classes are provided to support demand-constrained agent facility
deployment. For example, symbolic function representations of linear, exponential, and piecewise
functions are supported via the SymbFunctionFactory class. Such functions are used with other
toolkit classes to determine commodity demand
(e.g., power demand) from user input. Four mix-in
• fuel cycle metrics calculators,
• supportive data tables,
• policy models,
11
Entity
Facility
Facility
Facility
Archetype
EnrichmentFacility
Fab∗
Reactor∗
Facility
Facility
Separations∗
Sink
Facility
Source
Institution
ManagerInst
Institution
DeployInst
Region
GrowthRegion
Functionality
This facility enriches uranium at a specified capacity.
This facility fabricates fuel material based on separated streams.
A reactor model that handles batch refueling, based on pre-determined
recipes of compositions. It requests any number of input fuel types
and transmutes them to static compositions upon discharge.
This facility separates an incoming material into specified streams.
This facility is capable of accepting a finite or infinite quantity of some
commodity produced in the simulation.
This facility generates material of the composition and commodity
type specified as input.
The manager institution manages production of commodities among
its facilities by building new ones as needed.
This institution deploys specific facilities as defined explicitly in the
input file.
This region determines whether there is a need to meet a certain
capacity (as defined via input) at each time step.
Table 1: The Archetypes in Cycamore seek to cover a large range of simple simulation use cases [38]. Facilities added in version
1.3 are marked with ∗ .
• and economic models.
Verficiation of Cyclus implementation relies on
software development best practices such as version
control, testing, continuous integration, documentation, and style guidelines to ensure reliability and reproducibility. Sections 2.5.1-2.5.3 discuss in greater
detail the software development components that
comprise the Cyclus verification strategy, which
allows the simulation kernel and physics models to
be tested explicitly and separately. Each of these approaches on its own is a valuable addition to QA but
it cannot be the entire answer to the requirements
imposed by NQA-1. Taken together and strictly adhered to, they present a fortress to protect against
poorly designed or otherwise undesirable code.
2.5. Quality Assurance
To garner the trust of a broad user and archetype
developer community, the Cyclus project must implement a strategy to assure the ongoing quality of
the software it provides. Multiple strategies, collectively known as quality assurance (QA), have been
developed by the scientific software development
community to mitigate structural and algorithmic
errors in software. These include verification and
validation (V&V) [39], testing, and others.
Nuclear engineering software quality is often governed by Nuclear Quality Assurance - 1 (NQA-1), an
American Society of Mechanical Engineers (ASME)
specification whose latest revision appeared in 2009
[40]. Cyclus has adopted an agile development process [41], interpreting NQA-1 in a manner similar
to the process adopted by the Department of Energy (DOE) within Nuclear Engineering Advanced
Modeling and Simulation (NEAMS) [42] or by the
PyNE toolkit [43].
Validation of simulators like Cyclus, that are
intended to give forecasts of system behavior in
uncertain futures, is not well defined as there are
no experimental benchmarks upon which to rely.
Instead, code-to-code comparisons with fuel cycle
simulators that use other modeling paradigms are
underway as the best approach to establish confidence that Cyclus produces correct answers. [44]
2.5.1. Version Control
Automated version control, provided by git, a
well-established distributed version control tool [45],
is at the heart of the QA strategy because it records
the full history of any change, along with metadata
such as the author, a timestamp, and an accompanying message. This makes it possible to identify when
changes were introduced, how they are related to
other changes, and who made those changes. If necessary, it also facilitates reversing individual changes
from a long and intricate set of changes. Version
control also enables a code review process descried
in section 2.5.3 below.
12
2.5.2. Testing
Automated software testing is the first line of
defense against errors in implementation. Testing
directly compares the actual results of running software versus the expected behavior of the software.
In Cyclus, three categories of tests are defined:
unit tests, integration tests, and regression tests.
Before a proposed code change is allowed into Cyclus, the change must be covered by a test, either
new or existing, and all tests must pass.
version of the Cyclus source code that includes
the requested changes and runs the complete test
suite, reporting back whether or not those steps
were successful. If CI was not successful, the code
author(s) must first identify and resolve the problems. These steps are performed for all incoming
code prior to inclusion, so broken code never enters
the main software development branch.
2.5.3. Code Review
Unit Tests. Unit tests verify behavior of the smallest code unit, typically a single function or a class.
Cyclus uses the Google Test framework [46] as a
harness for running unit tests. Sufficient unit tests
are required for any proposed change to the Cyclus
code base. Currently, Cyclus implements over 450
unit tests and Cycamore implements 85. These
cover approximately 65% of their respective code
bases, and these numbers are expected to grow over
time.
Automated testing including CI is a necessary
but not sufficient component of the Cyclus QA
system: it keeps bad code out of Cyclus. However,
Cyclus will always require human eyes and hands
to let good code in.
The main Cyclus repository is hosted remotely
and publicly on the GitHub website [49], in part
because it provides tools that facilitate a culture
of frequent and thorough code review. A number
of policies exist to ensure that a proposed set of
changes, known as a pull request, adhere to the
projects QA standards. Every pull request must be
reviewed and accepted by a member of the Cyclus
core team that was not involved in authoring the
changes. In addition to reviewing the algoirthmic
design in the source code, the reviewer relies on tests
to ensure correct behavior, and requires the authors
to adhere to the style guide and provide sufficient
documentation. Only after the QA standards have
been met are the proposed changes merged into the
software. This step has been repeatedly shown to
improve code quality [4].
Once CI is successful, a code reviewer inspects not
only the changes that are proposed to the software
itself, but also the changes that have been proposed
to tests.
Because of their long term benefit to the maintainability of the project, documentation and coding
style are also reviewed as part of this process. The
API must be documented as required by the Cyclus QA policy. In Cyclus, this information is
aggregated together into static websites with the
Doxygen [50] and Sphinx [51] tools, and can be
accessed at http://fuelcycle.org. Cyclus also
strictly enforces the use of the Google C++ Style
Guide [52] for all software contributions. This means
that all developers of Cyclus write Cyclus code
in the same way. This homogenization may be a
hurdle to new developers but ultimately improves
code legibility and, therefore, robustness [4].
Integration Tests. Integration tests combine multiple elements of the Cyclus interface and test that
they work correctly with each other. In Cyclus
and Cycamore, integration tests are performed by
running sample simulations for scenarios verifying
that results match predictions. A set of standard
input files are run, then the output is inspected and
compared via Nose [47], a Python test framework.
Regression Tests. Regression tests ensure significant
unintended changes do not occur over the course
of Cyclus development. Regression tests are implemented similarly to integration tests. In this
category, however, the comparison is done against
the output of the same input file when run with a
previous version of Cyclus, typically the last released version. In some sense, regression tests are
‘dumb’ in that they do not care about the contents
of a simulation being correct, only whether or not
it changed.
Continuous Integration. Continuous integration
(CI) is the idea that software should be automatically tested and validated as it is being developed,
rather than as a final stage in a longer development
cycle. The results of this testing are shown to code
reviewers prior to reviewing the software changes
themselves. The Cyclus project uses the CircleCI
[48] service for continuous integration. When a code
change is submitted for review, CircleCI builds a
13
3. Demonstration
Already, the ecosystem is growing. Early crossinstitutional contributions to the ecosystem demonstrate a significant achievement by the Cyclus
framework and provide the basis for a communitydriven development model.
The success of the Cyclus simulator can be measured in many ways. The most compelling are
early successes of the community-driven development model and demonstrations of its fundamental simulation capabilities. Promising growth of
the Cyclus ecosystem at multiple institutions indicates that a fuel cycle simulator can advance in
this community-driven development paradigm. Additionally, simulation results for both once-through
and more complex recycling scenarios demonstrate
that Cyclus possesses the fundamental fuel cycle
simulation capabilities to contribute to the field.
3.1.1. Supplementary Projects
A number of projects and tools outside of the
core simulation kernel have been developed to improve the scope and the diversity of the capabilities
in the Cyclus ecosystem. Table 2 lists the tools
and projects developed under close integration with
the Cyclus kernel. These tools are used to ease
development and simulation design (Cycstub, Cycic, Ciclus), data visualization and analysis (Cyclist,
Cyan), and remote execution (Cloudlus).
3.1. Ecosystem
The Cyclus community-driven software development model seeks to break the proliferation of
specialized simulators. It instead leverages the collective expertise of fuel cycle researchers toward a
single, more extensible, tool. Through the targeted
contributions of those researchers, an ecosystem of
capabilities should emerge. The Cyclus ‘Ecosystem’ is the collection of tools, calculation libraries,
archetypes, data, and input files intended for use
with the Cyclus simulator. Members of the ecosystem include:
3.1.2. Archetype Contributions
It is expected that the most common type of
contribution to Cyclus will be contributions of new
archetypes. Researchers will be driven to create a
new archetype when a need arises, such as to improve
the fidelity of simulation, or to represent a novel
reactor type, an innovative reprocessing strategy, or
a particular governmental or institutional behavior.
The real-world utility of Cyclus can in part be
measured by the breadth and diversity of archetypes
being developed in this way.
Early progress has been promising.
Many
archetypes external to the Cycamore library (Table 3) have been [59, 60] or are being [61, 62, 63]
developed for contribution to the Cyclus ecosystem. These archetypes provide the first examples of
developer-contributed capabilities. They add to the
fundamental Cycamore archetypes by providing
physics-based reactors, separations logic, fuel fabrication processing, storage facilities, and expanded
institutional paradigms. The existence and diversity
of these contributed archetypes illustrate the power
and potential of the community-based development
approach that Cyclus has taken.
• the archetypes provided in the Cycamore [38]
repository
• the archetypes created by researchers
• isotopic composition data
• historical facility deployment data
• the Cyclus graphical user interface (GUI) tool
Cyclist
• fundamental analysis tools in the Cyclus
toolkit
• tools for Cyclus optimization, parallelization,
and development
3.2. Simulations
To illustrate the flexibility of Cyclus, this section will discuss the creation and results of a range
of representative fuel cycle simulations. Previous
benchmarks between Cyclus and system dynamics
simulators for more complex problems, including
transition analyses, have been reported elsewhere
and Cyclus has demonstrated satisfactory performance [64, 65, 35, 66] . The examples presented here
Taken together, these form an ecosystem of capabilities. Over time, this ecosystem will grow as
archetype developers, kernel developers, and even
users contribute capabilities developed for their own
needs. Indeed, the long-term vision for the Cyclus
framework predicts an ever-expanding ecosystem of
both general and specialized capability extensions.
14
Name
Cycic
Cyclist
Ciclus
Cycstub
Cyan
Cloudlus
Description
Input control embedded in Cyclist
Interactive data exploration environment
Continuous integration scripts for Cyclus
Skeleton for clean slate module development
Cyclus analysis tool
Tools for running Cyclus in a cloud environment
Ref.
[53]
[54]
[55]
[56]
[57]
[58]
Table 2: Many tools have been developed outside of the scope of the Cyclus kernel for improved user, developer, and analyst
experiences with Cyclus.
Name
Bright-lite
Nuclear Fuel Inventory Model
CommodConverter
MktDrivenInst
SeparationsMatrix
StreamBlender
Description
A physics-based reactor archetype and fuel fabrication archetype
A flexible, ORIGEN-based, reactor analysis module
A simple commodity converting storage facility archetype
An institution that controls deployment based on commodity
availability
A facility for elemental separations of used fuel
A facility for fuel fabrication from reprocessed streams
Ref.
[61]
[62]
[60]
[63]
[59]
[59]
Table 3: A diverse set of archetypes under development reflect the diverse needs of researchers at various institutions. These
archetypes, contributed outside of the Cyclus core and Cycamore libraries are the first demonstration of community-driven
development in a fuel cycle simulator.
are not the limit of Cyclus’ capabilities, which are
extended with each new addition to the ecosystem,
as discussed above. Rather, these simulations are
designed to illustrate that Cyclus matches the capabilities of any recipe-based simulator and that
variations on a single Cyclus simulations can be
run with small changes to the input specification.
For simplicity of the current demonstration, many
simplifying assumptions have been made with respect to material compositions, fuel transmutation,
among others. The three fuel cycles examined are:
1. No Recycle (once through)
2. 1-pass MOX Recycle
3. Infinite-pass MOX Recycle
For each of these fuel cycles, a 1,100 month singlereactor Cyclus simulation was run in addition to a
10-reactor simulation with staggered refueling times.
As the number of staggered-cycle reactors increases
the system converges toward continuous material
flow results. Cyclus flexibility allows this transition
to be examined.
15
Facility
LWR
cycamore::Reactor
Spent Fuel Fabrication
cycamore::Fab
Separations
cycamore::Separations
Repository
cycamore::Sink
UOX Fabrication
cycamore::Source
DU Source
cycamore::Source
Parameter
type
batches
batch size
cycle length
refuelling time
requests
requests
requests
requests
offers
requests
offers
efficiency
Pu separation capacity
requests
capacity
offers
capacity
offers
capacity
Value
LWR
3 [batches/cycle]
20 [MTHM]
18 [months]
2 [months]
recycled MOX (1st preference)
enriched UOX (2nd preference)
depleted uranium
separated fissile material
recycled MOX
all spent fuel types
separated fissile material
0.99
6.0E4 [kg/month]
all waste
∞
UOX
∞
depleted U
∞
Table 4: Facility Configurations for Example Simulations
16
As described in Table 4, the facilities used in these
simulations are:
oped by the French Commissariat à l’Énergie
Atomique et aux Énergies Alternatives (CEA).
• Separations
(cycamore::Separations):
This facility takes in all kinds of spent fuel and
separates it into plutonium and waste streams
with some efficiency (0.99 was used for these
simulations). Up to 60,000 kg of Pu can be
separated per month.
• Repository (cycamore::Sink): This is an
infinite-capacity facility that can take in all
types of material including separations waste
streams and spent reactor fuel.
• Reactor (cycamore::Reactor): This is a reactor model that requests any number of input
fuel types and transmutes them to static compositions when they are burnt and discharged
from the core. The reactor was configured to
model a light water reactor with a 3 batch core
operating on an 18 month cycle with a 2 month
refuel time. The batches in the core each contain 20 metric tons of heavy metal (MTHM),
where heavy metals are actinide elements like
thorium, uranium, and plutonium. The reactor
was also configured to take in either enriched
UOX fuel or recycled MOX fuel.
• UOX Fabrication (cycamore::Source):
This facility provides enriched UOX fuel as
requested. This facility has infinite production
capacity.
• DU Source (cycamore::Source): This facility provides depleted uranium as requested.
This facility has infinite production capacity.
To model each of the three fuel cycles, only simple
adjustments to the input file specification were necessary. Specifically, only the commodity types and
trade preferences for each of the facilities needed to
be altered from one simulation to another.
For all cases, the reactor was configured to request recycled MOX fuel with a higher preference
than new UOX fuel. For the No Recycle case, the
Reactor was set to offer all spent fuel as waste. For
the 1-pass recycle case, the Reactor offered spent
UOX into a spent fuel market, but spent MOX is
still offered as waste. In the Infinite-Pass Recycle
case, the Reactor offers all burned fuel into a spent
fuel market. The separations facility requests spent
fuel with a higher preference than the repository resulting in preferential recycle. All these preferences
are easy to adjust and Cyclus dynamically handles
supply constraints and non-uniform preference resolution. It is notable that separations and recycle
fuel fabrication capacity are deployed identically in
all simulations. In the once through case, the recycling loop never acquires material, and so reactors
always receive fresh UOX fuel. The DRE ensures
everything operates smoothly in all cases.
Cyclus’ discrete materials make single-pass recycle straightforward to implement. The reactors
keep track of fuel as discrete batches. A reactor
remembers where it received each batch from. If a
batch was received from the recycled fuel fabrication facility, it does not offer it to separations and
• Spent Fuel Fabrication (cycamore::Fab):
This facility requests depleted uranium and
separated fissile material and mixes them together into recycled MOX fuel that it offers to
requesters. The two streams are mixed in a
ratio in order to match simple neutronics properties of the target fuel as closely as possible.
The method used is based on a variation “equivalence method” originally developed by Baker
and Ross [67]. This technique has also been
used in the COSI fuel cycle simulator devel17
DU Source
DU Source
depleted U
(7.11e+05 kg)
depleted U
(7e+05 kg)
Spent Fuel Fab
Spent Fuel Fab
Enrichment
Enrichment
MOX fuel
(1.2e+05 kg)
MOX fuel
(1e+05 kg)
UOX fuel
(1.06e+06 kg)
Pu stream
(1.38e+04 kg)
Pu stream
(1.08e+04 kg)
LWR
LWR
spent fuel
(1.08e+06 kg)
spent Fuel
(1e+06 kg)
waste
(0 kg)
Separations
waste
(8e+04 kg)
Separations
UOX fuel
(1.04e+06 kg)
waste
(1.07e+06 kg)
Repository
waste
(9.89e+05 kg)
Repository
Figure 7: Full MOX recycle (multi-pass) fuel cycle material
flows.
Figure 6: 1-pass MOX recycle scenario material flows.
and infinite-pass cases, enough separated fissile material accumulates in the fuel fabrication facility to
generate a full recycled batch. When this batch is
transmuted, more plutonium is burned than created.
This results in a drop in the total fuel cycle system
plutonium inventory. This pattern repeats roughly
every 10 cycles (200 months) for the Single-Pass
Recycle case and every 9 cycles (180 months) for
the Infinite-Pass Recycle case. Because the 1-pass
recycle scenario does not re-recycle material, it takes
the fabrication facility 2 cycles longer to accumulate
a full batch of fissile material.
Because facilities are represented individually and
transact discrete materials as discrete events, realistic non-uniform patterns in facility behavior that
affect total system behavior are observed using Cyclus.
Figure 9 shows plutonium buildup for the 10reactor simulations of the No Recycle, Single-Pass
Recycle, and Infinite-Pass Recycle scenarios. As
the number of reactors (with staggered refueling)
increases, the behavior of the system approaches
a more steady average reminiscent of continuous
material flow models.
The fundamental capabilities of demonstrated in
these simulations qualify Cyclus and its ecosystem
to model the breadth of scenario types expected of
instead offers it as a waste commodity which is only
requested by the repository. The material flows for
the Single-Pass Recycle case are shown in Figure 6.
Changing the scenario from a 1-pass fuel cycle
to an infinite-pass fuel cycle requires only a oneword change in the input file regarding the output
commodity for the spent MOX fuel of the Reactor:
< fuel >
< incommodity > mox </ incommodity >
< outcommodity > waste </ outcommodity >
+
< outcommodity > spent_fuel </ outcommodity >
< inrecipe > mox_fresh_fuel </ inrecipe >
< outrecipe > mox_spent_fuel </ outrecipe >
</ fuel >
This results in the material flows in Figure 7. A
similarly trivial change was used to switch from
the No Recycle to a 1-pass fuel cycle. Note that
because the reactors always transmute fuel into fixed
compositions, the error in isotopic compositions is
larger for the Infinite-Pass Recycle case.
Figure 8 shows the full-system plutonium buildup
for No Recycle (once through), Single-Pass Recycle, and Infinite-Pass Recycle variations of the onereactor scenario described above. The figure was
generated directly from Cyclus output data. After
several batch cycles (near month 300) in the 1-pass
18
once through
1-pass recycle
infinite-pass recycle
10
Pu (metric tonnes)
transparency and community oversight. Furthermore, the object-oriented ABM simulation paradigm
ensures more generic simulation capability. It allows
Cyclus to address common analyses in a more flexible fashion and enables analyses that are impossible
with system dynamics simulators.
Similarly, the fidelity-agnostic, modular Cyclus
architecture facilitates simulations at every level of
detail. Simulations relying on arbitrarily complex
isotopic compositions are possible in Cyclus, as
are simulations not employing any physics at all.
Physics is introduced through optional system-wide
radioactive decay of materials and through the use
of physics-enabled facility libraries. To support calculation of physical processes in nuclear facilities,
the Cycamore library provides models employing
basic physics for core fuel cycle facilities and extension libraries from the community support more
detailed simulations. Indeed, agents of such varying
fidelity can even exist in the same simulation. Researchers no longer need to reinvent the underlying
simulator framework in order to model a simulation
focused on the aspects of the fuel cycle relevant to
their research.
Furthermore, when the capabilities within Cyclus, Cycamore, and the rest of the ecosystem
are insufficient, adding custom functionality is simplified by a modular, plug-in architecture. A clean,
modern API simplifies customization and independent archetype development so that researchers can
create models within their domain of expertise without modifying the core simulation kernel. Throughout the Cyclus infrastructure, architecture choices
have sought to enable cross-institutional collaboration and sustainable, community-driven development. The ecosystem of capabilities, already growing, may someday reflect the full diversity of use
cases in the nuclear fuel cycle simulation domain.
Plutonium Buildup: 1 Reactor
12
8
6
4
2
0
0
200
400
600
Time (month)
800
1000
1200
Figure 8: System plutonium buildup with one reactor.
Plutonium Buildup: 10 Reactors
120
once through
1-pass recycle
infinite-pass recycle
Pu (metric tonnes)
100
80
60
40
20
0
0
200
400
600
Time (month)
800
1000
1200
Figure 9: System plutonium buildup with staggered refueling
for many reactors.
nuclear fuel cycle simulator tools. These examples
further show the flexibility provided by the DRE
logic within the Cyclus framework and provide an
example of the resolution made possible by discretefacility and discrete-material modeling in fuel cycle
simulation.
5. Acknowledgements
This work has been supported by a number of
people. The authors would like to thank software
contributors Zach Welch and Olzhas Rakhimov. Additionally, the authors are grateful to the many enthusiastic members of the Cyclus community and
our Nuclear Energy University Programs (NEUP)
collaboration partners at the University of Texas,
University of Utah, and University of Idaho.
Direct support for the Cyclus project has been
received from the Nuclear Regulatory Commission
(NRC) Faculty Development program, the NEUP
4. Conclusions
The Cyclus nuclear fuel cycle framework
presents a more generic and flexible alternative to existing fuel cycle simulators. Where previous nuclear
fuel cycle simulators have had limited distribution,
constrained simulation capabilities, and restricted
customizability, Cyclus emphasizes an open strategy for access and development. This open strategy
not only improves accessibility, but also enables
19
Research & Development Program, the National
Nuclear Security Administration (NNSA) Consortium for Verification Technology, and the University
of Wisconsin (UW). In addition students contributing to Cyclus have received fellowship support
from the Argonne National Laboratory (ANL) Lab
Grad program, the NEUP Fellowship program, the
National Science Foundation (NSF) Graduate Fellowship program, and the Department of Homeland
Security (DHS) Nuclear Forensics Graduate Fellowship program.
[10] M. Petre, G. Wilson, Code Review For and By Scientists,
arXiv:1407.5648 [cs]00000 arXiv: 1407.5648.
URL http://arxiv.org/abs/1407.5648
[11] M. Flicker, E. A. Schneider, P. Campbell, Evaluation
Criteria for Analyses of Nuclear Fuel Cycles, in: Transactions of the American Nuclear Society, Vol. 111 of Fuel
Cycle Options Analysis – III, American Nuclear Society,
La Grange Park, IL 60526, United States, Anaheim, CA,
United States, 2014, pp. 233–236.
URL http://epubs.ans.org/?a=36342
[12] C. Poinssot, S. Bourg, N. Ouvrier, N. Combernoux,
C. Rostaing, M. Vargas-Gonzalez, J. Bruno, Assessment of the environmental footprint of nuclear energy systems. Comparison between closed
and open fuel cycles, Energy 69 (2014) 199–211.
doi:10.1016/j.energy.2014.02.069.
URL
http://www.sciencedirect.com/science/
article/pii/S0360544214002035
[13] L. Guerin, M. Kazimi, Impact of Alternative Nuclear
Fuel Cycle Options on Infrastructure and Fuel Requirements, Actinide and Waste Inventories, and Economics,
Technical Report MIT-NFC-TR-111, Massachusetts Institute of Technology, Cambridge, MA, United States
(Sep. 2009).
[14] J. Jacobson, A. Yacout, G. Matthern, S. Piet, D. Shropshire, R. Jeffers, T. Schweitzer, VERIFIABLE FUEL
CYCLE SIMULATION MODEL (VISION): A TOOL
FOR ANALYZING NUCLEAR FUEL CYCLE FUTURES, Nuclear Technology 172 (2010) 157–178.
[15] A. M. Yacout, J. J. Jacobson, G. E. Matthern, S. J.
Piet, A. Moisseytsev, Modeling the Nuclear Fuel Cycle,
in: The 23rd International Conference of the System
Dynamics Society,” Boston, 2005.
URL
http://www.inl.gov/technicalpublications/
Documents/3169906.pdf
[16] E. A. Schneider, C. G. Bathke, M. R. James, NFCSim:
A Dynamic Fuel Burnup and Fuel Cycle Simulation Tool,
Nuclear Technology 151 (1) (2005) 35–50.
[17] C. Allan, International Atomic Energy Agency, International Project on Innovative Nuclear Reactors and Fuel
Cycles, Guidance for the application of an assessment
methodology for Innovative Nuclear Energy Systems
INPRO Manual: overview of the Methodology., rev.1
Edition, no. IAEA-TECDOC-1575 in IAEA-TECDOC,
International Atomic Energy Agency, Vienna, 2008.
URL http://www-pub.iaea.org/MTCD/Publications/
PDF/TE_1575_web.pdf
[18] L. Boucher, J. P. Grouiller, ”COSI” : A Simulation
Software for a Pool of Reactors and Fuel Cycle Plants, in:
Fuel Cycle and High Level Waste Management, Beijing,
China, 2005.
[19] L. Boucher, J. P. Grouiller, ”COSI”: The Complete
Renewal of the Simulation Software for The Fuel Cycle
Analysis, in: Fuel Cycle and High Level Waste Management, Vol. 1, ASME, New York, NY, USA, Miami, FL,
United states, 2006.
[20] M. Meyer, L. Boucher, New Developments on COSI
6, the Simulation Software for Fuel Cycle Analysis, in:
Proceedings of GLobal 2009, Paris, France, 2009.
[21] C. Coquelet-Pascal, M. Meyer, R. Girieud, R. Eschbach, C. Chabert, C. Garzenne, P. Barbrault, L. Van
Den Durpel, T. Duquesnoy, M. Caron-Charles, B. Carlier, J. C. Lefevre, Comparison of Different Scenarios
for the Deployment of Fast Reactors in France - Results
Obtained with COSI, in: Proceedings of GLobal 2011,
References
[1] S. J. Piet, B. W. Dixon, J. J. Jacobson, G. E. Matthern,
D. E. Shropshire, Dynamic Simulations of Advanced
Fuel Cycles, Nuclear Technology 173 (3) (2011) 227–
238.
URL http://epubs.ans.org/?a=11658
[2] K. Huff, B. Dixon, Next Generation Fuel Cycle Simulator Functions and Requirements Document, Tech. Rep.
fcrd-sysa-2010-000110, Idaho National Laboratory (Jul.
2010).
[3] C. M. Macal, To agent-based simulation from system
dynamics, in: Simulation Conference (WSC), Proceedings of the 2010 Winter, IEEE, 2010, pp. 371–382.
URL
http://ieeexplore.ieee.org/xpls/abs_all.
jsp?arnumber=5679148
[4] J. Cohen, Modern Code Review, Making Software:
What Really Works, and Why We Believe It (2010)
329–336.
URL
http://books.google.com/books?hl=
en&lr=&id=DxuGi5h2-HEC&oi=fnd&pg=PA329&dq=
cohen+modern+code+review&ots=0VrtsgOdqP&sig=
-XrFj4mAA2MB-20qZXOFx8Felzo
[5] M. Fagan, Design and code inspections to reduce
errors in program development, in: Software pioneers,
Springer, 2002, pp. 575–607.
URL
http://link.springer.com/chapter/10.1007/
978-3-642-59412-0_35
[6] D. L. Donoho, A. Maleki, I. U. Rahman, M. Shahram,
V. Stodden, Reproducible Research in Computational
Harmonic Analysis, Computing in Science & Engineering
11 (1) (2009) 8–18, 00110. doi:10.1109/MCSE.2009.15.
URL
http://scitation.aip.org/content/aip/
journal/cise/11/1/10.1109/MCSE.2009.15
[7] D. C. Ince, L. Hatton, J. Graham-Cumming, The case
for open computer programs, Nature 482 (7386) (2012)
485–488, 00142. doi:10.1038/nature10836.
URL
http://www.nature.com/doifinder/10.1038/
nature10836
[8] V. Stodden, The Scientific Method in Practice: Reproducibility in the Computational Sciences, SSRN Electronic Journal00037. doi:10.2139/ssrn.1550193.
URL http://www.ssrn.com/abstract=1550193
[9] J. M. Wicherts, M. Bakker, D. Molenaar, Willingness
to Share Research Data Is Related to the Strength
of the Evidence and the Quality of Reporting of
Statistical Results, PLoS ONE 6 (11) (2011) e26828.
doi:10.1371/journal.pone.0026828.
URL
http://dx.doi.org/10.1371/journal.pone.
0026828
20
[32] G. Grasso, S. Monti, M. Sumini, NEA-WPFC/FCTS
benchmark for fuel cycle scenarios study with COSI6,
Tech. rep., Report RSE/2009/136 (2009).
URL
http://www.enea.it/it/Ricerca_sviluppo/
documenti/ricerca-di-sistema-elettrico/
nucleare-fissione/studi-accordi/rse136.pdf
[33] L. Boucher, Benchmark Study on Nuclear Fuel Cycle Transition Scenarios Analysis Codes, Tech. Rep.
NEA/NSC/WPFC/DOC(2012)16, OECD, Nuclear Energy Agency (Jun. 2012).
Gidden,
Cyclopts
0.0.10,
Figshare[34] M.
Http://dx.doi.org/10.6084/m9.figshare.1288959. doi:
http://dx.doi.org/10.6084/m9.figshare.1288959.
URL
http://figshare.com/articles/cyclopts/
1288959
[35] M. J. Gidden, An Agent-Based Modeling Framework
and Application for the Generic Nuclear Fuel Cycle,
Ph.D. thesis, University of Wisconsin, Madison, WI,
United States (Mar. 2015).
[36] R. W. Carlsen, M. Gidden, K. Huff, A. C.
Opotowsky,
O. Rakhimov,
A. M. Scopatz,
Z. Welch, P. Wilson, Cyclus v1.0.0, FigshareHttp://dx.doi.org/10.6084/m9.figshare.1041745. doi:
http://dx.doi.org/10.6084/m9.figshare.1041745.
URL http://figshare.com/articles/Cyclus_v1_0_0/
1041745
[37] J. J. Jacobson, R. F. Jeffers, G. E. Matthern, S. J. Piet,
B. A. Baker, J. Grimm, VISION User Guide-VISION
(Verifiable Fuel Cycle Simulation) Model, Tech. rep.,
Idaho National Laboratory (INL) (2009).
URL
http://www.inl.gov/technicalpublications/
Documents/4363869.pdf
[38] R. W. Carlsen, M. Gidden, K. Huff, A. C.
Opotowsky,
O.
Rakhimov,
A.
M.
Scopatz, P. Wilson, Cycamore v1.0.0, FigshareHttp://figshare.com/articles/Cycamore v1 0 0/1041829.
doi:http://figshare.com/articles/Cycamore_v1_0_
0/1041829.
URL http://figshare.com/articles/Cycamore_v1_0_
0/1041829
[39] B. Boehm, Software risk management, Springer, 1989.
[40] ASME, NQA-1a-2009, Addenda to ASME NQA-1-2008,
Quality Assurance Requirements for Nuclear Facility
Applications, no. NQA-1a-2009 in Nuclear Quality Assurance, American Society of Mechanical Engineers, New
York, NY, 2009.
[41] C. Larman, Agile and Iterative Development: A Manager’s Guide, Addison-Wesley Professional, 2004.
[42] NEAMS, NUCLEAR ENERGY ADVANCED MODELING AND SIMULATION (NEAMS) SOFTWARE
VERIFICATION AND VALIDATION (V&V) PLAN
REQUIREMENTS, Tech. rep., U.S. Deptartment of
Energy, Office of Nuclear Energy (Jul. 2013).
URL
http://www.energy.gov/sites/prod/files/
2013/09/f2/NEAMS%20Software%20Verification%
20and%20Validation%20Plan%20Requirements%
20Version%200.pdf
[43] E. Biondo, A. Scopatz, M. Gidden, R. Slaybaugh, P. P.
Bates, Cameron Wilson, Quality Assurance within the
PyNE Open Source Toolkit, in: American Nuclear Society 2014 Winter Meeting, ANS, 2014.
[44] K. D. Huff, M. Fratoni, H. Greenberg, Extensions to
the Cyclus Ecosystem In Support of Market-Driven
Transition Capability, in: Transactions of the American
Nuclear Society, American Nuclear Society, Anaheim,
Makuhari, Japan, 2011.
[22] A. Worrall, R. Gregg, Scenario Analyses of Future UK
Fuel Cycle Options, Journal of Nuclear Science and Technology 44 (3) (2007) 249–256. doi:10.1080/18811248.
2007.9711279.
URL http://www.tandfonline.com/doi/abs/10.1080/
18811248.2007.9711279
[23] L. Van Den Durpel, A. Yacout, D. Wade, T. Taiwo,
U. Lauferts, DANESS V4.2: Overview of Capabilities
and Developments, in: Proceedings of Global 2009, Paris,
France, 2009.
[24] L. Guerin, B. Feng, P. Hejzlar, B. Forget, M. S. Kazimi, L. Van Den Durpel, A. Yacout, T. Taiwo, B. W.
Dixon, G. Matthern, L. Boucher, M. Delpech, R. Girieud,
M. Meyer, A Benchmark Study of Computer Codes for
System Analysis of the Nuclear Fuel Cycle, Technical
Report, Massachusetts Institute of Technology. Center
for Advanced Nuclear Energy Systems. Nuclear Fuel
Cycle Program, electric Power Research Institute (Apr.
2009).
URL http://dspace.mit.edu/handle/1721.1/75245
[25] E. A. Andrianova, V. D. Davidenko, V. F. Tsibul’skii,
Desae program for systems studies of long-term growth
of nuclear power, Atomic energy 105 (6) (2008) 385–390.
URL
http://www.springerlink.com/index/
l581v3n5111475u8.pdf
[26] K. A. McCarthy, B. Dixon, Y.-J. Choi, L. Boucher,
K. Ono, F. Alvarez-Velarde, E. M. Gonzalez, B. Hyland,
Benchmark Study on Nuclear Fuel Cycle Transition
Scenarios-Analysis Codes.
URL
http://www.iaea.org/inis/collection/
NCLCollectionStore/_Public/44/089/44089401.pdf
[27] M. L. Dunzik-Gougar, C. A. Juchau, K. Pasamehmetoglu, P. P. H. Wilson, K. M. Oliver, P. J. Turinsky,
H. S. Abdel-Khalik, R. Hays, T. E. Stover, Global Evaluation of Nuclear Infrastructure Utilization Scenarios
(GENIUS), in: GLOBAL 2007: Advanced Nuclear Fuel
Cycles and Systems, September 9, 2007 - September
13, 2007, GLOBAL 2007: Advanced Nuclear Fuel Cycles and Systems, American Nuclear Society, Boise, ID,
United states, 2007, pp. 1604–1611.
[28] R. Jain, P. P. H. Wilson, Transitioning to global optimization in fuel cycle system study tools, in: 2006
Winter Meeting of the American Nuclear Society, Nov
12 - 16 2006, Vol. 95 of Transactions of the American Nuclear Society, American Nuclear Society, Albuquerque,
NM, United states, 2006, pp. 162–163.
[29] K. M. Oliver, P. P. Wilson, A. Reveillere, T. W. Ahn,
K. Dunn, K. D. Huff, R. A. Elmore, Studying international fuel cycle robustness with the GENIUSv2 discrete
facilities/materials fuel cycle systems analysis tool, in:
Proceedings of GLOBAL 2009, GLOBAL 2009: Advanced Nuclear Fuel Cycles and Systems, Paris, France,
2009.
[30] K. D. Huff, K. M. Oliver, P. P. Wilson, T. W. Ahn,
K. Dunn, R. Elmore, GENIUSv2 Discrete Facilities/Materials Modeling of International Fuel Cycle Robustness,
in: Transactions of the American Nuclear Society, Vol.
101 of Nuclear Fuel Cycle Codes and Applications, American Nuclear Society, Washington D.C., United States,
2009, pp. 239–240.
[31] C. A. Juchau, M. L. Dunzik-Gougar, J. J. Jacobson,
Modeling the Nuclear Fuel Cycle, Nuclear Technology
171 (2) (2010) 136–141.
URL http://epubs.ans.org/?a=10778
21
CA, United States, 2014.
[45] Software Freedom Conservancy, Git, Software Freedom
Conservancy, 2014.
URL http://git-scm.com
[46] G. Inc, googletest - Google C++ Testing Framework,
Technical Report, Google Inc. (2008).
URL https://code.google.com/p/googletest/
[47] J. Pellerin, Nose is nicer testing for python, Technical
Report, nose (2007).
URL https://nose.readthedocs.org/en/latest/
[48] P. Biggar, CircleCI, https://circleci.com/ (2015).
URL https://github.com/circleci/frontend
[49] L. Dabbish, C. Stuart, J. Tsay, J. Herbsleb, Social coding
in GitHub: transparency and collaboration in an open
software repository, in: Proceedings of the ACM 2012
conference on Computer Supported Cooperative Work,
ACM, 2012, pp. 1277–1286.
[50] D. van Heesch, Doxygen: Source code documentation
generator tool, URL: http://www.doxygen.org.
[51] G. Brandl, Sphinx Documentation.
URL http://sphinx-doc.org/sphinx.pdf
[52] B. Weinberger, C. Silverstein, G. Eitzmann, M. Mentovai, T. Landray, Google C++ style guide, h ttp://googlestyleguide. googlecode. com/svn/trunk/cppguide. xml.
[53] R. Flanagan, E. A. Schneider, Input Visualization for
the Cyclus Nuclear Fuel Cycle Simulator: Cyclus Input
Control, in: Proceedings of GLOBAL 2013, Salt Lake
City, UT, United States, 2013.
[54] Y. Livnat, H. Gur, K. Potter, R. Flanagan, Cyclist,
github.com/SCI-Utah/cnome (Oct. 2014).
URL github.com/SCI-Utah/cnome
[55] A. Scopatz, Z. Welch, M. Gidden, Ciclus,
https://github.com/cyclus/ciclus (Oct. 2014).
URL https://github.com/cyclus/ciclus
[56] R. W. Carlsen, M. Gidden, K. Huff, A. C. Opotowsky,
O. Rakhimov, A. M. Scopatz, Z. Welch, P. Wilson, CycStub, https://github.com/cyclus/cycstub (Jun. 2014).
URL https://github.com/cyclus/cycstub
W.
Carlsen,
CyAn,
Figshare[57] R.
Http://dx.doi.org/10.6084/m9.figshare.1041836. doi:
http://dx.doi.org/10.6084/m9.figshare.1041836.
URL http://dx.doi.figshare.com/articles/CyAn_
Cyclus_Analysis_Tools/1041836
[58] R.
W.
Carlsen,
Cloudlus,
https://github.com/rwcarlsen/cloudlus (Oct. 2014).
URL https://github.com/rwcarlsen/cloudlus
[59] K.
D.
Huff,
StreamBlender,
FigshareHttp://dx.doi.org/10.6084/m9.figshare.1134648. doi:
http://dx.doi.org/10.6084/m9.figshare.1134648.
URL http://figshare.com/articles/StreamBlender/
1134648
[60] K.
D.
Huff,
CommodConverter,
FigshareHttp://dx.doi.org/10.6084/m9.figshare.1134647. doi:
http://dx.doi.org/10.6084/m9.figshare.1134647.
URL
http://figshare.com/articles/
CommodConverter/1134647
[61] R. Flanagan, Bright-lite, https://github.com/brightdev/bright-lite (Oct. 2014).
URL https://github.com/bright-dev/bright-lite
[62] S. Skutnik, Development of an ORIGEN-based
Reactor Analysis Module for Cyclus, FigshareHttp://dx.doi.org/10.6084/m9.figshare.1291144. doi:
http://dx.doi.org/10.6084/m9.figshare.1291144.
URL http://figshare.com/articles/Development_
of_an_ORIGEN_based_Reactor_Analysis_Module_for_
Cyclus/1291144
[63] K.
D.
Huff,
MktDrivenInst,
FigshareHttp://dx.doi.org/10.6084/m9.figshare.1134650. doi:
http://dx.doi.org/10.6084/m9.figshare.1134650.
URL http://figshare.com/articles/MktDrivenInst/
1134650
[64] D. Djokic, A. M. Scopatz, H. R. Greenberg, K. D. Huff,
R. P. Nibbelink, M. Fratoni, The Application of CYCLUS to Fuel Cycle Transition Analysis, in: Proceedings of Global 2015, LLNL-CONF-669315, Paris, France,
2015, p. 5061.
[65] A. M. Scopatz, Non-judgemental Dynamic Fuel Cycle Benchmarking, arXiv:1511.09095 [physics]ArXiv:
1511.09095.
URL http://arxiv.org/abs/1511.09095
[66] M. Gidden, P. Wilson, K. Huff, R. Carlsen, OnceThrough Benchmarks with C YCLUS, a Modular, OpenSource Fuel Cycle Simulator, in: Proceedings of the 2012
ANS Winter Conference, San Diego, CA, 2012.
[67] A. Baker, R. Ross, Comparison of the Value of Plutonium and Uranium Isotopes in Fast Reactors, in: Proc.
Conf. on Breeding, Economics and Safety in Large Fast
Breeder Reactors, ANL-6972, 1963, pp. 7–10.
22
| 5cs.CE
|
Optimization-Based Autonomous Racing
of 1:43 Scale RC Cars
Alexander Liniger, Alexander Domahidi and Manfred Morari
arXiv:1711.07300v1 [math.OC] 20 Nov 2017
Abstract
This paper describes autonomous racing of RC race cars based on mathematical optimization. Using a dynamical
model of the vehicle, control inputs are computed by receding horizon based controllers, where the objective is to
maximize progress on the track subject to the requirement of staying on the track and avoiding opponents. Two
different control formulations are presented. The first controller employs a two-level structure, consisting of a path
planner and a nonlinear model predictive controller (NMPC) for tracking. The second controller combines both
tasks in one nonlinear optimization problem (NLP) following the ideas of contouring control. Linear time varying
models obtained by linearization are used to build local approximations of the control NLPs in the form of convex
quadratic programs (QPs) at each sampling time. The resulting QPs have a typical MPC structure and can be solved
in the range of milliseconds by recent structure exploiting solvers, which is key to the real-time feasibility of the
overall control scheme. Obstacle avoidance is incorporated by means of a high-level corridor planner based on
dynamic programming, which generates convex constraints for the controllers according to the current position of
opponents and the track layout. The control performance is investigated experimentally using 1:43 scale RC race
cars, driven at speeds of more than 3 m/s and in operating regions with saturated rear tire forces (drifting). The
algorithms run at 50 Hz sampling rate on embedded computing platforms, demonstrating the real-time feasibility
and high performance of optimization-based approaches for autonomous racing.
I. I NTRODUCTION
Autonomous car racing is a challenging task for automatic control systems due to the need for handling
the vehicle close to its stability limits and in highly nonlinear operating regimes. In addition, dynamically
changing racing situations require advanced path planning mechanisms with obstacle avoidance executed
in real-time. Fast dynamics constrain the sampling time to be in the range of a few tens of milliseconds at
most, which severely limits the admissible computational complexity of the algorithms. This situation is
even more challenging if the autonomous algorithms shall be executed on simple, low-power embedded
computing platforms.
In this paper, we investigate optimization-based control strategies for the task of racing an autonomous
vehicle around a given track. We focus on methods that can be implemented to run in real-time on
embedded control platforms, and present experimental results using 1:43 scale Kyosho dnano RC race
cars that achieve top speeds of more than 3 m/s, which corresponds to an upscaled speed of about 465
km/h. For high performance, the proposed controllers operate the car at its friction limits, far beyond
the linear region of what is typically used in other autonomous driving systems. This challenging task is
generally mastered only by expert drivers with lots of training. In contrast, our approach requires merely
a map of the track and a dynamical model of the car; in particular, we use a bicycle model with nonlinear
tire forces, neglecting load transfer and coupling of lateral and longitudinal slip.
Two model-based control schemes are presented in this paper. First, we describe a hierarchical two-level
control scheme consisting of a model-based path planner generating feasible trajectories for an underlying
nonlinear model predictive control (NMPC) trajectory tracking controller. Our second approach combines
both path planning and path following into one formulation, resulting in one NMPC controller that is based
on a particular formulation known from contouring control [1], [2]. The objective of both approaches is
to maximize the progress on the track, measured by a projection of the vehicle’s position onto the center
line of the track. Linear time varying (LTV) models obtained by linearization are employed to construct a
The authors are with the Automatic Control Laboratory, ETH Zurich, 8092 Zürich, Switzerland;
Emails: liniger|domahidi|[email protected]
tractable convex optimization problem to be solved at each sampling time. Efficient interior point solvers
for embedded systems, generated by FORCES [3], [4], are employed to solve the resulting optimization
problems, which makes the approaches presented in this paper amenable for use on embedded systems.
We furthermore demonstrate that both schemes can easily be extended to incorporate obstacle avoidance
by adjusting the constraints of the resulting optimization problems according to the racing situation. With
this mechanism in place, the avoidance trajectory is optimized to yield maximal overall progress, which
translates into highly effective overtaking maneuvers that are automatically planned and executed.
A. Related work
Safe autonomous driving at moderate speeds has been demonstrated for example in the context of
Autonomous Highway Systems (AHS) in 1997 [5] within the Californian PATH programme, or in contests
such as the DARPA Grand Challenge in 2005 [6] and the Urban Challenge in 2007 [7] by numerous
research groups. In these projects, the main goal was do develop autonomous driving systems for public
traffic situations. Autonomous racing has received less attention, but impressive advances have been made
recently also in this discipline. For instance, a fully autonomous Audi TTS has been reported to race
at high speeds in [8] using a trajectory tracking controller, which follows a pre-computed trajectory.
However, to the best knowledge of the authors, fully automatic racing including obstacle avoidance in
dynamic racing situations has not been demonstrated yet in practice.
From a control perspective, the fundamental building blocks for automatic racing can be grouped into
three categories: drift control, reference tracking, and path planning. Research associated with the first
group focuses on gaining a better understanding of the behavior of the car near the friction limit for
designing safety control systems that try to prevent loss-of-control accidents. By analyzing the nonlinear
car model, it can be shown that steady state motions corresponding to drifting can be generated, see
e.g. [9] and [10]. As these approaches are not designed for trajectory tracking, the controlled car drifts
in a circle, which represents a steady state drift equilibrium.
Reference tracking controllers usually are designed to operate the vehicle within the linear tire force
region for maximum safety and robustness. Approaches based on NMPC, which allows one to incorporate
the latter constraint in a systematic manner, deal with the nonlinearities of the model either directly by
a nonlinear programming (NLP) solver [11], or use LTV [12] or piece-wise affine (PWA) approximations [13], resulting in a convex quadratic program (QP) or a mixed-integer QP, respectively. Approaches
without optimization in real-time include nonlinear robust control [14] and flatness-based control [15],
which however lack the ability to incorporate constraints. One approach that is explicitly designed for
operating with saturated tire forces is [8], where the center of percussion (CoP) is used to design a state
feedback steering controller for reference tracking. At the CoP, the rear tire forces do not influence the
dynamics by definition, which allows for a simple linear steering controller.
In order to avoid obstacles, reference tracking schemes rely on a higher-level path planner. A simple
point mass model in the high-level path planner is used in [16] to limit the computational complexity. This
can be problematic if the generated trajectories are infeasible with respect to the car’s physical dynamics,
which can lead to preventable collisions [17]. The latter reference suggests to use a library of steadystate movements (trims) with parametrizable length, which are generated from a more complex dynamical
model, and to connect them by maneuvers which allow the transition from one trim to another, similar to
the idea of [18]. This path planning has the advantage that it generates feasible reference trajectories for
the low level tracking controller, and that drifting trims can be included to increase the agility of the car.
However, the resulting optimization problem is a mixed-integer program that is too complex to be solved
within the typical sampling times on embedded platforms. Consequently, the approach is not well suited
for real-time autonomous racing.
In order to avoid relying on the feasibility of the path planner, one-level approaches have been investigated e.g. in [19], where optimal trajectories and the associated open-loop control inputs for rally
racing maneuvers are calculated numerically in simulation. In [16], obstacle avoidance is incorporated into
the tracking controller by using an additional cost term that penalizes coming too close to the obstacle.
However, the controller is reported to perform worse than its two-level counterpart, especially if the car
has to diverge from the reference trajectory. A one-level approach similar to [16] is studied in [20] in
simulation, where obstacle avoidance is incorporated into the problem formulation by using a spatial
reformulation and imposing constraints on the transformed variables. While in [19], [16] the solution to
the NLP is obtained by a standard nonlinear solver with prohibitively long solve times, [20] uses real-time
iterations [21] to achieve the low computation times needed for a real-time implementation. However, it
is assumed that there is only one side where the obstacle can be overtaken, which may not be the case
in practical racing situations.
An interesting alternative to optimization-based methods are sampling-based methods. For example,
rapidly exploring random trees (RRTs) have been investigated in [22] and [23] to generate time optimal
trajectories through a 180◦ curve. The advantage is that such algorithms tend to quickly find feasible
trajectories. In [23], the differential flatness of the system is exploited to speed up the convergence of
the algorithm, generating obstacle-free trajectories even in complex situations. However, the reported
computation times are not yet low enough to allow for a real-time implementation.
B. Contribution
In this paper, we describe two novel autonomous, optimization-based racing controllers that incorporate
obstacle avoidance, track constraints, actuator limitation and the ability for controlled drift in a systematic
and straightforward way. Real-time feasibility at 50 Hz sampling rate is demonstrated in experimental
results with fast RC cars. To the best knowledge of the authors, this is the first implementation of
autonomous racing controllers with obstacle avoidance on an experimental testbed.
The fundamental idea of both approaches is to use a receding horizon controller, which maximizes
progress on the track within the horizon as a performance measure. This is closely related to a time
optimality criterion and allows for a systematic incorporation of obstacles and other constraints. It is
particularly effective for overtaking opponents, as our controllers seek for a progress-optimal solution
around the obstacles. In order to deal with track constraints and obstacle avoidance situations, we represent
the feasible set for the position of the car at any time instance by a slab defined by two parallel linear
inequalities. This ensures tractability of the subproblems by convex programming on one hand, and
incorporation of track and obstacle constraints in a systematic manner on the other hand. To deal with
non-convex situations such as overtaking an obstacle on the left or right, a high-level corridor planning
algorithm supplies a set of appropriate convex constraints to the controllers. This constraint set is the
result of a shortest path problem solved by dynamic programming.
The first, hierarchical control approach presented in this paper is in principle similar to [17], but its
complexity is low enough to be fully implemented in real-time. Our path planner also uses trims, but only
one is selected for the whole prediction horizon from a set of trajectories, which represent steady-state
cornering conditions of the nonlinear model, gridded for velocity and steering angle. The path planner
selects the trajectory with the largest progress that does not leave the track or hits any obstacle. Moving
obstacles can inherently be dealt with, as new trims are generated every sampling time. A low level
nonlinear reference tracking MPC controller tracks the selected trim, as in [17], but we additionally use
obstacle avoidance constraints as described above, which turns out to be very effective in practice.
The second controller is based on a model predictive contouring control (MPCC) formulation [1], [2],
combining path generation and path tracking into one problem. The MPCC essentially plans a progressoptimal path by taking into account the (nonlinear) projection of the vehicle’s position onto the center
line. The resulting controller is able to plan and to follow a path which is similar to the time-optimal path
in [19] when the horizon is chosen long enough.
Both NMPC problems are approximated locally by linearizing the continuous nonlinear system dynamics
around a state trajectory to obtain an LTV model. In the hierarchical approach, we linearize around the
trajectory obtained from the path planner, while in the one-level approach the linearization points are given
by the shifted trajectory from the previous sampling time. We then discretize by the matrix exponential, and
solve the resulting quadratic program (QP) by a tailored interior point solver, generated by FORCES [3],
[4]. The computation time of the solvers scale linearly with the horizon length, hence we make use of
long horizons of up to 40 time steps in the MPCC, for example. After the QP has been solved, the first
control input is applied to the system, and the process is repeated at the next sampling time. This approach
for solving the NMPC problems corresponds to the basic version of the real-time iterations from [21].
C. Outline
The paper is organized as follows. In Section II, the dynamical model of the car and some of its basic
properties are described. In Section III-A, we present the hierarchical control approach with separate path
planner and path tracking, while the combined approach is presented in Section III-B. In Section III-C,
we briefly discuss our method for selecting convex constraints for the two controllers, enabling obstacle
avoidance in dynamic racing situations. Section IV presents the testbed setup and experimental results for
both controllers.
N OTATION
The following notation is used throughout the paper. The set of reals is denoted by R, and the set of
real column vectors of length n is denoted by Rn . The set of nonnegative and strictly positive reals is
denoted by R+ and R++ , respectively. The set of positive definite matrices of size n is denoted by Sn++
and the set of positive semi-definite matrices of size n by Sn+ . We define kxk2P , xT P x for a vector
x ∈ Rn and some positive definite matrix P ∈ Sn++ . If a ∈ Rn and b ∈ Rm are column vectors or scalars,
we denote their concatenation by (a, b) , [aT , bT ]T ∈ Rn+m .
II. C AR M ODEL
A. Bicycle Model
The RC cars are modeled using a bicycle model as done in [9], [10], where the car is modeled as one
rigid body with a mass m and an inertia Iz , and the symmetry of the car is used to reduce it to a bicycle.
Only the in-plane motions are considered, i.e. the pitch and roll dynamics as well as load changes are
neglected. As the used cars are rear wheel driven and do not have active brakes, the longitudinal force
on the front wheel is neglected. The resulting model is shown in Figure 1 together with the resulting
differential equations (1) defining the model:
Ẋ = vx cos(ϕ) − vy sin(ϕ) ,
(1a)
Ẏ = vx sin(ϕ) + vy cos(ϕ) ,
ϕ̇ = ω ,
1
v̇x = (Fr,x − Ff,y sin δ + mvy ω) ,
m
1
v̇y = (Fr,y + Ff,y cos δ − mvx ω) ,
m
1
ω̇ = (Ff,y lf cos δ − Fr,y lr ) .
Iz
(1b)
(1c)
(1d)
(1e)
(1f)
The equation of motion is derived around the center of gravity (CoG), where the states are the position
X, Y of the CoG in the inertial frame and the angle of the car relative to the inertial frame, ϕ. This
is the kinematic part of the model. The kinetic part of the model is derived around a body-fixed frame
centered at the CoG, where the states are the longitudinal and lateral velocity of the car, vx and vy , and
finally the yaw rate ω. The control inputs are the PWM duty cycle d of the electric drive train motor and
αf
δ
Ffy(αf)
vy
Y
ω
vx
φ
Fry(αr)
αr
lf
lr
Frx(d)
X
Fig. 1: Schematic drawing of the car model
the steering angle δ. The subscripts x and y indicate longitudinal and lateral forces or velocities, while
r and f refer to the front and rear tires, respectively. Finally, lf and lr are the distance from the CoG to
the front and the rear wheel.
The tire forces F model the interaction between the car and the road and are the most important part
of the dynamics. As the goal is for the cars to race, the model of the tire forces has to be realistic enough
to represent the car at high speeds and its handling limits. The lateral forces Ff,y and Fr,y are modeled
using a simplified Pacejka Tire Model [24], see (2a) and (2b), which is a good approximation to measured
friction curves in practice:
ωlf + vy
Ff,y = Df sin(Cf arctan(Bf αf )) where αf = − arctan
+δ,
(2a)
vx
ωlr − vy
Fr,y = Dr sin(Cr arctan(Br αr )) where αr = arctan
,
(2b)
vx
Fr,x = (Cm1 − Cm2 vx )d − Cr − Cd vx2 .
(2c)
The parameters B, C and D define the exact shape of the semi-empirical curve. The longitudinal force of
the rear wheel Fr,x is modeled using a motor model for the DC electric motor as well as a friction model
for the rolling resistance and the drag, cf. (2c). Due to the size of the cars, it is currently not feasible to
measure the wheel speed, which makes it impossible to use combined slip models such as [9], [19].
The model is identified using a combination of stationary and dynamic identification experiments, as
reported in [10]. This allows for identifying the rear wheel combined slip effects into the lateral tire
friction model (2b). Thus the identified model is suitable to represent the car also at its handling limits,
when the tire forces are saturated or close to saturation.
B. Stationary Velocity Analysis
For a better understanding of the model, the stationary velocities of the model are investigated. A
similar, more elaborate analysis is presented in [9], [10].
The objective is to find points in the model where all accelerations are zero. This is done for different
constant forward velocities v̄x and constant steering angles δ̄, thus the problem becomes a nonlinear
algebraic system of equations, with two equations (v̇y = 0, ω̇ = 0) and two unknowns (v̄y , ω̄). By finding
a solution to the algebraic equations for different steering angles δ̄ and different initial conditions, the
stationary velocities for one forward velocity (v̄y , ω̄) can be calculated.
2
2
Normal Driving
Understeering
Oversteering
4
1
−0.5
2
0
y
0
−0.5
−2
−1
4
0.5
v [m/s]
ω [rad/s]
y
0
6
1
2
0.5
v [m/s]
Normal Driving
Understeering
Oversteering
1.5
ω [rad/s]
1.5
6
−2
−1
−4
−1.5
−4
−1.5
−6
−2
0
−0.2
0
δ [rad]
0.2
−6
−0.2
0
δ [rad]
0.2
−2
−0.2
0
δ [rad]
0.2
−0.2
0
0.2
δ [rad]
Fig. 2: Stationary velocities for v̄x = 1.5 m/s (plots on the left) and v̄x = 2 m/s (plots on the right),
parameterized by the steering angle δ̄.
The resulting stationary velocities are shown for v̄x = 1.5 m/s and v̄x = 2 m/s in Figure 2. The resulting
stationary velocities can be categorized into three different regions. The blue line is the normal driving
region, which is characterized by the linear dependency of the yaw rate and the steering angle, as well
as small lateral velocities. The other two regions in red and green correspond to over- and understeering
points in the model. In the understeering region (green curves), the saturated front tire force law prevents
the car from achieving larger yaw rates, and thus the car can not take a sharper turn. In the oversteering
region (red curves), the rear tire force law is fully saturated and the car drives with a high lateral velocity,
which is usually called drift.
The dynamics of the model in the different regions are different, for example in the oversteering region
where the car is drifting, the steering angle can be of opposite sign than the curvature the car is driving,
known as counter steering, which does not occur in the case of the normal and the understeering mode. A
stability analysis of the lateral velocity model around the different stationary velocity points also shows
the difference in the dynamics: While the normal driving region and the understeering region are stable,
the drifting region is unstable [10].
From Figure 2 it is visible that the normal steering region is getting smaller when the car is driving
faster. Thus the maximal and minimal steering angle for which the tire forces are not saturated is reduced
with increasing velocities, and at the same time the maximal yaw rate decreases.
Because all velocities are constant, the movement of the car is a uniform circular movement, for which
the relationship between the yaw rate, the radius R and the curvature κ is known,
q
v
|ω| =
= vκ where v = vx2 + vy2 .
(3)
R
Consequently, all stationary velocity points correspond to the car driving in a circle with a constant radius,
i.e. the model can predict drifting along a circle.
III. AUTONOMOUS R ACING C ONTROL
In this main part of the paper, we present two optimization-based formulations for the task of autonomous racing for RC cars which are based on the model described in Section II. First, the hierarchical
two-level approach is presented in Section III-A, followed by the one-level scheme in Section III-B. We
then briefly discuss a high-level method for obstacle avoidance that is the same for both controllers in
Section III-C. A summary of the algorithms is given in Section III-D.
TABLE I: Part of the Path Planning Library
Description
vx [m/s]
vy [m/s]
ω [rad/s]
δ [rad]
Left
1.75
0.1185
-2.7895
-0.1000
Straight
1.75
0
0
0
Slight Right
1.75
-0.0486
1.3849
0.05
Hard Right
1.75
-0.3163
4.4350
0.16
Hard Left Drift
1.75
1.1860
-4.8709
0.2
A. Hierarchical Receding Horizon Controller
In our hierarchical control approach, a high-level path planner finds a progress-optimal, feasible trajectory within a finite number of possibilities and for a horizon of N sampling times. This trajectory is then
tracked by an MPC controller employing soft-constraints to ensure feasibility of the low-level optimization
at all times. This process is repeated in a receding-horizon fashion, hence we call the controller Hierarchical
Receding Horizon Controller (HRHC) in what follows. Details on the individual components are given
in the following.
1) Path Planning.: The purpose of the path planner is to generate a trajectory with maximal progress
which is feasible for the car’s dynamics. It is based on gridding the stationary velocities of the nonlinear
system described in Section II-B. By solving (1) for the stationary lateral velocity points given a set of
different longitudinal velocities v̄x and steering angles δ̄, a library of zero acceleration points is generated.
This includes stationary velocities from the normal as well as from the drifting region. Table I shows an
excerpt of such a library. The library used in our experiments consists of Nv̄ = 95 stationary points, out
of which 26 correspond to drifting equilibria. The stationary points are selected by uniformly gridding the
longitudinal velocity vx between 0.5 and 3.5 m/s, with steps of 0.25 m/s. For each v̄x , about five to nine
points are selected in the normal driving region, and up to four drifting points are selected for forward
velocities between 1.5 and 2.25 m/s. Note that the library does not change during run-time, hence it can
be generated offline.
To generate trajectories for the whole horizon, the stationary points are integrated. This is computationally cheap under the assumption that the stationary velocity can be reached within one time step, since
in this case all accelerations are zero. This procedure allows us to generate reference trajectories also for
unstable drifting points. The integration of the reasonable stationary velocity points leads to a countable
set of possible trajectories with a constant turning radius over the horizon. A visualization of such a set
of candidate trajectories is shown in Figure 3.
We now proceed with finding the best trajectory among the candidates obtained by gridding and
integration, which is equivalent to solving the following optimization problem:
θ? , max P XNj , YNj ,
(4a)
j∈1,...,Nv̄
s.t. xj0 = x ,
xjk+1
xjk ∈
j
=
fkm (xjk , v̄ j ) ,
Xtrack ,
v̄ ∈ V(v) ,
(4b)
k = 1, . . . , N
(4c)
k = 1, . . . , N
(4d)
(4e)
where xk , (Xk , Yk , ϕk ) is the position and orientation at time step k generated by integrating the
kinematic part of the bicycle model using the stationary velocity v̄ j , (v̄xj , v̄yj , ω̄ j ) from the library of
stationary points. The integration is denoted by the discrete time version of the model, fkm in (4c). The
objective (4a) is to find the trajectory with the largest progress on the track, which is measured by the
projection operator P : R2 → [0, L] that calculates the scalar projection of the position Xkj , Ykj onto the
piecewise linear center line parameterized by the arc length θ ∈ [0, L], where L is the length of the center
θ*
Fig. 3: Left: Generation of reference trajectories for two different longitudinal velocities (black: slow,
green: fast). Right: Solution of the path planner. The red trajectory has the largest progress but leaves the
track, so that the orange one is the optimal trajectory maximizing θN .
line. All positions of the trajectory xjk , k = 0, . . . , N, need to lie in the set Xtrack ⊂ R2 (4d) which is the
set of all admissible positions inside the track boundaries. Finally, we demand that the stationary velocity
v̄ j lies in the set V ⊂ R3 (4e), which depends on the current velocity measurement v , (vx , vy , ω) and
enforces that the planned velocity is reasonably close to the measured velocity, which helps to deal with
the assumption that the stationary velocity can be reached within one time step:
(
{(v̄x , v̄y , ω̄) ∈ R3 | ρ ≥ |vx − v̄x |}
if |v̄y | ≤ ν
V(v) ,
, (5)
3
{(v̄x , v̄y , ω̄) ∈ R | σx ≥ |vx − v̄x | , σy ≥ |vy − v̄y | , σω ≥ |ω − ω̄|} otherwise
where the two cases correspond to selecting non-drift or drift trajectories, respectively, based on the
lateral steady state velocity v̄y . The tuning parameters ν, ρ, σx , σy , σω are used to determine the behavior
of the path planner in terms of selecting candidate trajectories. Choosing parameters that lead to too
loose constraints in (5) result typically in physically impossible trajectories, which can result in crashes.
Conversely, constraints that are too tight limit the performance of the controller, as the planned trajectories
are too conservative.
Problem (4) is an integer program with the decision variable j and solved by enumeration in practice
by checking the discrete positions against local convex inner approximations of the track set, which is
reasonable due to the relatively small number of trajectories (about one hundred in our case). The result
of the optimization problem is visualized in Figure 3. The path planning allows to efficiently handle drift,
as a drifting trajectory is selected if it yields the largest progress.
The path planner has some limitations. Firstly, on one hand, the horizon length has to be quite short,
otherwise the planned trajectories become circles and always yield infeasibilities with respect to the track
constraints, even if the selected velocity would be well suited for the current state. A horizon which is too
short, on the other hand, leads to poor performance as the path planner recognizes a forthcoming curve
too late. The second problem is that the whole horizon has the same velocity, which can lead to problems
in complicated curve combinations such as chicanes.
2) Model Predictive Reference Tracking.: The reference trajectory from the path planner is generated
under simplifying assumptions, thus it is not possible to directly apply the controls which correspond to
the stationary velocity point. In order to efficiently track the reference the following MPC formulation is
used, penalizing the deviation from the reference trajectory using a quadratic function:
min kxN −
x,u,s
2
xref
N kP
+ pksN k∞ +
N
−1
X
s.t. x0 = x ,
xk+1 = Ak xk + Bk uk + gk ,
F k xk ≤ f k + s k ,
sk ≥ 0 ,
x ≤ xk ≤ x̄ ,
u ≤ uk ≤ ū ,
2
ref 2
kxk − xref
k kQ + qksk k∞ + kuk − uk kR
(6a)
k=0
k = 0, ..., N − 1
k = 1, ..., N
k = 1, ..., N
k = 1, ..., N
k = 0, ..., N − 1
(6b)
(6c)
(6d)
(6e)
(6f)
(6g)
where Q ∈ S6++ , R ∈ S2++ , P ∈ S6++ are tuning matrices and p, q ∈ R++ are penalties for the soft
constraints (6d), which are discussed below. To capture as much of the nonlinear model as possible while
maintaining computational tractability, the model is linearized around the reference trajectory, cf. (6c). It
is necessary to linearize around a trajectory rather than a single operating point, since both position and
orientation can vary significantly over the horizon. The reference trajectory is by construction feasible with
respect to the track. In order to also guarantee that the trajectory of the optimal MPC solution satisfies
track constraints, the X and Y states are limited to stay inside the track if possible. This is achieved by
limiting each point in the horizon to lie within two parallel half spaces (6d), which leads to two affine
inequality constraints per time step (one for the right and one for the left border), resulting in a convex
feasible set. Figure 4 depicts these border constraints (6d), which we formulate as soft constraints in
order to avoid infeasibility problems in practice. By using an exact penalty function (an infinity norm
in our case), we ensure that the resulting optimization problem is always feasible, and that the original
solution of the hard constrained problem is recovered in case it would admit a solution [25], [26]. Finally,
the control inputs are limited within their physical constraints, and all other states are limited within
reasonable bounds to avoid convergence problems of the solver due to free variables (6f), (6g).
Problem (6) can be reformulated as a convex QP and thus efficiently solved. In this work FORCES [3],
[4], is employed to generate tailored C-code that solves instances of (6) where parameters are the initial
state x, the matrices defining the dynamics along the reference trajectory (Ak , Bk , gk ) as well as the
changing halfspace constraints Fk , fk .
B. Model Predictive Contouring Control
Contouring control is used in various industrial applications such as machine tools for milling and
turning [27] or laser profiling [28]. In these applications, the challenge is to compute inputs that control
the movement of the tool along a reference path. The latter is given only in spatial coordinates; the
associated velocities, angles, etc. are calculated and imposed by the control algorithm. This is different
from tracking controllers in that the controller has more freedom to determine the state trajectories to
follow the given path, for example to schedule the velocity, which in tracking is defined by the reference
trajectory.
The contour following problem can be formulated in a predictive control framework to incorporate
constraints, see e.g. [1]. In this work, we adapt the particular formulation of the model predictive contouring
control (MPCC) framework from [2] to obtain a high-performance controller for autonomous racing, which
maximizes the travelled distance on the reference path within the prediction horizon. In our experiments,
we use the center line as a reference path, but employ it merely as a measure of progress by selecting
low weights on the tracking (contouring) error. As a result, the driven trajectory is very similar to those
driven by expert drivers. The advantage of this approach is that path planning and path tracking can be
combined into one nonlinear optimization problem, which can be solved in real-time by approximating
the NLP using local convex QP approximations at each sampling time [21]. The resulting QPs can be
Fig. 4: Left: Halfspace constraints (red lines) of one point in the horizon (large red dot). Right: Resulting
halfspaces (red lines) of the whole horizon, approximating the track. The green points on the center line
correspond to the closest point on the discrete center line, for each point in the horizon. The points on
the borders are the projection of the center line points on the borders.
formulated with multistage structure, which is exploited by FORCES [3], [4] to obtain solution times in
the range of a few milliseconds.
Before posing the MPCC problem, a few preliminaries are introduced such as the parameterization of
the reference path and the definition of useful error measures.
1) Parameterization of Reference Trajectory.: The reference path is parameterized by its arc length
θ ∈ [0, L] using third order spline polynomials, where L is the total length. The splines are obtained by
an offline fitting of the center line. Using this parameterization, we can obtain any point X ref (θ), Y ref (θ)
on the center line by evaluating a third order polynomial for its argument θ. The angle of the tangent to
the path at the reference point with respect to the X-axis,
∂Y ref (θ)
,
(7)
Φ(θ) , arctan
∂X ref (θ)
is also readily available. This parameterization leads to an accurate interpolation within the known points
of the reference path, and it is more accurate than the piece-wise linear parameterization employed for
the HRHC in Section III-A, which only uses a linear interpolation between the points.
2) Error measures.: In order to formulate the MPCC problem, error measures are needed that define
the deviation of the car’s current position X, Y from the desired reference point X ref (θ), Y ref (θ). We use
the same definitions as in [2], but give another derivation here. Let P : R2 → [0, L] be a projection
operator on the reference trajectory defined by
P(X, Y ) , arg min(X − X ref (θ))2 + (Y − Y ref (θ))2 .
θ
(8)
For brevity, we define θP , P(X, Y ). The orthogonal distance of the car from the reference path is then
given by the contouring error
ec (X, Y, θP ) , sin (Φ(θP )) X − X ref (θP ) − cos (Φ(θP )) Y − Y ref (θP ) ,
(9)
where Φ(·) is defined in (7). The contouring error is depicted in the left picture in Figure 5.
The projection operator (8) is not well suited for use within online optimization algorithms, as it
resembles an optimization problem itself. Thus an approximation θA of θP is introduced, which is an
independent variable determined by the controller. For this approximation to be useful, it is necessary to
link θA to θP via the lag error
el (X, Y, θA ) , |θA − θP | ,
(10)
(X,Y)
θP
(X,Y)
ec
ec
(Xref(θP ),Yref(θP ))
ф(θP )
êl
el
(Xref(θP ),Yref(θP ))
êc
ref
ref
(X (θA),Y (θA))
ф(θA )
Fig. 5: Contouring error ec (left) and lag error el (right) with linear approximations êc and êl .
which measures the quality of the approximation. The lag error is depicted in the right picture in Figure 5
(red segment on reference path).
In order to be independent of the projection operator (8), the contouring (9) and the lag error (10)
can be approximated as a function of the position X, Y and the approximate projection θA , which are
variables that can be controlled by the MPCC controller:
ec ≈ êc (X, Y, θA ) , sin (Φ(θA )) X − X ref (θA ) − cos (Φ(θA )) Y − Y ref (θA ) ,
(11a)
el ≈ êl (X, Y, θA ) , − cos (Φ(θA )) X − X ref (θA ) − sin (Φ(θA )) Y − Y ref (θA ) .
(11b)
The approximate contouring error êc (11a) and the approximate lag error êl (11b) are defined as the
orthogonal and tangential component of the error between X ref (θA ), Y ref (θA ) and the position X, Y, see
the right picture in Figure 5.
3) MPCC problem.: With these error measures in place, we now formulate the model predictive
contouring control problem for autonomous racing. The objective is a trade-off between the quality of
path-following (low contouring error) and the amount of progress achieved over a finite horizon of N
sampling times, subject to model dynamics, track- and input constraints:
min
N
X
keck (Xk , Yk , θP )k2qc − γθP,N
(12a)
k=1
s.t. x0 = x ,
xk+1 = f (xk , uk ) ,
Fk xk ≤ fk ,
x ≤ xk ≤ x̄ ,
u ≤ uk ≤ ū ,
k = 0, ..., N − 1
k = 1, ..., N
k = 1, ..., N
k = 0, ..., N − 1
(12b)
(12c)
(12d)
(12e)
(12f)
where Xk , Yk is the position of the car at time step k determined by the nonlinear model f in (12c),
which is the discrete-time version of (1) with piece-wise constant control inputs. The contouring error
eck (Xk , Yk , θP ) in the objective (12a) is defined in (9), and θP,k is the associated path parameter such that
X ref (θP,k ), Y ref (θP,k ) is the orthogonal projection of Xk , Yk onto the reference path. The two objectives
(maximum progress and tight path following) are traded off by the weights γ ∈ R++ and qc ∈ R++ ,
respectively. Constraints (12d) are the parallel half space constraints for containing the position in the
allowed corridor as described in Section III-A2, while (12e), (12f) corresponds to (6f), (6g), limiting states
and inputs to physically admissible values.
Due to the implicit dependency of the objective (12a) on the projection operator (8), optimization
problem (12) is a bi-level NLP, which is too complex to solve in real-time. Thus the idea is to use
the approximate projection θA,k instead of θP,k as introduced in Section III-B2, and to control the
approximation quality by adding a cost on the lag error (10) to the objective. In order to allow for
forming the lag error at each time step in the prediction horizon, it is necessary to introduce an integrator
state with dynamics θA,k+1 = θA,k + vk /Ts , where vk can be interpreted as the projected velocity, and θA,k
as the state of progress at time k, respectively. This approximation reduces (12) to an optimal control
problem in form of an NLP that is amenable for a real-time implementation:
min
N
X
kêck (Xk , Yk , θA,k )k2qc + kêlk (Xk , Yk , θA,k )k2ql − γvk Ts + k∆uk k2Ru + k∆vk k2Rv − γv0 Ts
(13a)
k=1
s.t. (12b) ,
θ0 = θ ,
vk
,
(12c) , θA,k+1 = θA,k +
Ts
(12d) , (12e) , 0 ≤ θk ≤ L ,
(12f) , 0 ≤ vk ≤ v̄ ,
(13b)
k = 0, ..., N − 1
k = 1, ..., N
k = 0, ..., N
(13c)
(13d)
(13e)
where ∆uk , uk −uk−1 and ∆vk , vk −vk−1 . Note that the approximate contouring error êck (Xk , Yk , θA,k )
(11a) is used in theP
objective (13a). Furthermore, we have replaced the maximization of the final progress
−1
measure, θP,N , by N
k=0 vk Ts , which is equivalent if the approximation is accurate. Sensible lower and
upper bounds on θk and vk are imposed to avoid spurious solutions of the NLP, with v̄ denoting the largest
possible progress per sampling time. The cost on the lag error êlk (Xk , Yk , θA,k ) in (13a) links the state
of progress to the dynamics of the car. To ensure an accurate progress approximation and thus a strong
coupling between the cost function and the car model, the weight on the lag error ql ∈ R++ is chosen
high as suggested in [2]. Furthermore, a cost term on the rate of change of the inputs is added to the
objective (13a) in order to penalize fast changing controls, which helps to obtain smooth control inputs
in order to prevent amplifying unmodeled dynamics.
4) Solving the MPCC problem.: In order to solve the nonlinear optimal control problem (13) in realtime, local convex approximations of (13) in form of the following QPs are built at each sampling time
by linearization of nonlinear terms:
T
T
N
X
xk
xk
xk
∆uk
∆uk
T
Γk
+ ck
min
− γvk Ts +
R
+ qksk k∞ − γv0 Ts
(14a)
θA,k
θA,k
θA,k
∆vk
∆vk
x,u,θ,v,s
k=1
s.t. x0 = x , θA,0 = θ ,
xk+1 = Ak xk + Bk uk + gk ,
vk
θA,k+1 = θA,k +
,
Ts
F k xk ≤ f k + s k ,
sk ≥ 0 ,
x ≤ xk ≤ x̄ , 0 ≤ θA,k ≤ L ,
u ≤ uk ≤ ū , 0 ≤ vk ≤ v̄ ,
k = 0, ..., N − 1
(14b)
(14c)
k = 0, ..., N − 1
(14d)
k = 1, ..., N
k = 1, ..., N
k = 1, ..., N
k = 0, ..., N
(14e)
(14f)
(14g)
(14h)
where Γk ∈ S7+ is formed by the quadratic part of the linearized contouring and lag error cost function
from (13a) and ck ∈ R7 stems from the linear part, respectively. In order to keep the linearization error
small, we use an LTV approximation of the dynamics (1) as well as of the contouring and lag errors (11).
Each nonlinear function is linearized around the output of the last QP iteration shifted by one stage. The
measurement x = x0 is used as the first linearization point, and the last input of the previous iteration is
kept constant to generate a new last input. The linearization point for the terminal state xN is calculated
by simulating the nonlinear model for one time step. The track or corridor constraints (14e) are formulated
by two half space constraints tangential to the track per time step, as described in Section III-A. These
Fig. 6: Left: Combinatorial nature of the overtaking problem, as it is possible to overtake each opponent
on the left or the right side. Center: Spatial-temporal grid for the shortest path problem solved by dynamic
programming, where it is not allowed to visit the blue grid points. Right: Optimal path of the DP (in
black) and the resulting corridor, which is issued to the HRHC (Section III-A) or MPCC (Section III-B).
constraints are formulated as soft constraints, with slack variables sk ∈ R2 and a corresponding infinitynorm penalty in the objective (14a) weighted by q ∈ R++ , which is chosen quite high to recover the
behavior of the hard constrained problem whenever possible [25], [26].
Note that the described re-linearization scheme is essentially the basic real-time iteration from [21],
where a nonlinear continuous-time optimal control problem is solved using a multiple shooting technique,
with an exponential map as integrator, and in every time step only one step of a sequential QP (SQP)
scheme is performed. Hence the convergence properties that are known for the real-time iteration [29]
hold also for the MPCC problem (13).
The local QP (14) is solved using FORCES [3], [4]. Due to the rate costs, the problem has to be lifted
to obtain the multistage structure, for which FORCES has been designed, by introducing a copy of the
previous control input at each stage.
C. Obstacle Avoidance
The two controllers presented in this section plan a path within the track, or a corridor, by taking into
account constraints (4d), (6f) or (14e) on the position of the car. Thus it is possible to include obstacle
avoidance by adapting this corridor online depending on the current constellation of opponents. Generating
the optimal corridor based on the position of the obstacles is in general hard, because of the fundamental
problem that the decision on which side to overtake is non-convex and of combinatorial nature if more
than one opponent is involved. This situation is depicted in Figure 6 in the left picture.
In this work, we employ a high level path planner based on dynamic programming (DP) to decide
on which side to overtake the obstacles. Based on the result of the DP, the adapted corridor is given
to the controllers of Section III-A or Section III-B. The high level path planner solves a shortest path
problem [30] on a spatial-temporal grid, cf. Figure 6. To incorporate the planned path of the lower level
controller into the DP, the grid is built up based on the last output of the path planner in the case of the
HRHC or the last QP solution in the case of the MPCC. The DP minimizes the travelled distance, and
additionally the deviation from the last plan of the lower level controller, such that the DP path is close
to the state prediction of the lower level controller. This ensures that the linearizations stay approximately
valid most of the time. Based on the optimal trajectory from the DP, the corridor constraints can easily
be identified, see the right picture in Figure 6.
Due to space restrictions, we do not go further into detail, but many references exist that solve the
corridor problem with different approaches. For example, a similar problem had to be solved during the
DARPA Urban challenge where the goal was autonomous driving in city traffic. In [7] several approaches
to this problem are presented, for example based on model predictive trajectory generation algorithms [31],
modified A? -algorithms [32] or RRTs [33].
D. Summary
In this main part of the paper, we have presented two approaches for automatic racing. Both approaches
are model-based and maximize progress within a given time horizon. They directly incorporate track
and obstacle constraints by using two parallel affine inequalities (slabs) representing the feasible set of
positions at each time. The major difference between the approaches is that the first (cf. Section III-A
and Algorithm Ia) is a two-level approach with a separate path planning mechanism combined with
a reference tracking MPC controller, while the second approach (cf. Section III-B and Algorithm Ib)
formulates both tasks (path planning and path tracking) into one nonlinear optimal control problem based
on model predictive contouring control.
Algorithm 1 HRHC and MPCC algorithm
(Ia) HRHC
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
get current position and velocities
compute delay compensation
function B ORDER A DJUSTMENT
shift old planned path by one stage
get position of opposing cars
run DP and get new borders (Sec. III-C)
end function
run path planner (4)
linearize and discretize the model, i.e. build
problem (6)
solve QP using FORCES (6)
send first control at the end of time slot
go to step 1
(Ib) MPCC
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
get current position and velocities
compute delay compensation
augment old QP output (Section III-B4)
function B ORDER A DJUSTMENT
get position of opposing cars
run DP and get new borders (Sec. III-C)
end function
linearize and discretize the model and the cost
function, i.e. build problem (14)
solve QP using FORCES (14)
send first control at the end of time slot
go to step 1
Both controllers send the new control input at the end of the sampling period. In order to compensate
for this fixed delay, the nonlinear model is simulated forward for this time interval at the beginning of
the algorithm, see line 2 of Algorithm Ia and Ib. The nonlinear model is integrated using a second-order
Runge-Kutta method with the current state estimate from the Kalman filter as the initial condition.
IV. R ESULTS
In this section the performance of both controllers is evaluated on an experimental testbed using 1:43
scale RC race cars. Details on the experimental setup, the particular implementation and closed-loop
performance are given in the following.
A. Experimental Setup
For our experiments, we use the Kyosho dnano cars, which are quite sophisticated with a front and rear
suspension and a rear axle differential. The cars are able to reach speeds of over 3 m/s on straights, which
corresponds to an upscaled speed of about 465 km/h. The wide speed range, the high maximal forward
velocity and the small scale introduce further complexity which is not present in full size testbeds.
The testbed further consists of an infrared camera tracking system, a control board and a custom built
race track of length L = 18.43 m (measured at the center line), see Figure 7. A PointGrey Flea3 camera
captures 100 frames per second with an accuracy of below 4 mm. A wide angle lens with an infrared filter
is used to capture the 4 by 4 meter track. Reflecting markers are arranged on the cars in different unique
patterns and used to identify the car and to measure the position and angle of the cars. An Extended
Kalman Filter (EKF) is used for state estimation, filtering the vision data and estimating the longitudinal
and lateral velocity as well as the yaw rate. The vision data of all cars is passed over an Ethernet connection
to a control PC, which runs one of the two control algorithms described in Section III together with the
corridor planner solving the DP problem. The calculated inputs are then sent via Bluetooth to the car. As
the original electronics of the dnano cars does not feature an open digital communication link, we have
replaced it by a custom made PCB, featuring a Bluetooth chip, current and voltage sensors, H-bridges
Infrared Vision USB3
System
Reflecting
Markers
Car Detection Ethernet
Estimation
Car
Controller
Bluetooth
Fig. 7: Visualization of the control loop and a picture of the used track
for DC motor actuation, and an ARM Cortex M4 microcontroller for the low level control loops such as
steering servo and traction motor control.
B. Implementation
The HRHC is implemented in ANSI C on an embedded platform using an ARM A9 chip (Exynos
4412) at 1.7 GHz. The chip is identical to the one used in Samsung Galaxy S3 smartphones. The runtime
environment was Ubuntu Linux version 12.11, and the code was compiled with the GCC compiler 4.6.3
with option -O2. The sampling time of the controller is Ts = 20 ms, while the discretization time of
the path planner and the tracking MPC controller is 25 ms. The horizon length is N = 14 time steps,
which gives an ahead prediction of 0.35 s. The tracking MPC controller results in a multistage QP with 9
variables per stage, i.e. 132 variables in total. We use a library of 95 candidate trajectories, out of which
26 are drifting stationary velocity points.
The MPCC does not have the limitation of the HRHC path planner, or in other words, the acceleration
is not zero over the whole horizon, thus it is possible to use longer horizons which should increase
the performance. Hence the controller runs with a horizon length of N = 40 with a sampling time of
Ts = 20 ms, which corresponds to a 0.8 s ahead prediction. With the re-linearization method presented in
Section III-B4, the discretization and sampling time have to be the same, as the re-linearization is based
on the last QP solution. The resulting QP has 14 variables per stage and 570 in total.
The MPCC is implemented on a newer gereration embedded platform using an Exynos 5410 chip based
on the ARM Cortex A15 architecture and running at 1.6 GHz. The chip is identical to the one used in the
Korean version of the Samsung Galaxy S4 smartphone. The embedded board runs Ubuntu Linux version
12.04. The ANSI C code of the MPCC controller has been compiled with GCC 4.6.3 with option -O3 .
To improve the convergence of the QP, the problem data is scaled to lie between −1 and +1, and the
objective (Hessian and linear term) is scaled by a factor of 0.1 to reduce large entries occurring due to
the lag error term. Note that these scalings do not change the minimizer. The optimality criteria of the
FORCES solver are adjusted such as to terminate once a sufficiently good solution has been found, with
the residuals of the equality and inequality constraints set to 10−5 , and with the duality gap set to 10−4 .
C. Single Car Racing
The driven trajectories for a single car are depicted in Figure 8, with the velocity profile encoded in
colors. Depicted are three laps, for which the HRHC achieves a lap time between 9.5 to 9.8 s while the
MPCC yields lap times between 8.9 and 9.2 s.
To better understand the driven trajectory of the HRHC, the path planner of the HRHC has to be
analyzed. The path planner has a comparably short prediction horizon, and all velocities over the whole
horizon are constant, which leads to turns of constant radius. Such a path planner works fine for 90◦ and
even up to 180◦ curves. However, the car tends to drive to the outer border after the curve, as this allows
driving a wider radius at a faster longitudinal velocity and thus maximizes the progress. However, this is
a limitation if the car should drive a combination of curves, where the position of the car at the end of the
first curve is essential for a low overall time. This problem can be seen in Figure 8, for example in the
chicane in the lower left corner. Furthermore, due to the short lookahead, the HRHC path planner is not
able to prevent such an ill positioning relative to a curve ahead. Due to the suboptimal position relative
to the curve, the controller has to brake more compared to a car on the ideal line and it is even possible
that the car touches the borders, see the narrow 180◦ curve in the center of the track in Figure 9.
These limitations are not present in the MPCC approach, where a comparably long horizon is employed.
Unlike the HRHC, the velocity is not fixed over the horizon but computed for each time step as the result of
the NLP. As a consequence of these features, the MPCC is able to plan a path even through a complicated
combination of curves. This results in a trajectory which is closer to an ideal line in a least curvature
sense, especially through complicated curves like the chicane in the lower left corner of Figure 8. In this
curve combination, the MPCC achieves velocities not smaller than 1 m/s, while the HRHC has to reduce
the velocity to nearly 0.5 m/s to drive through the chicane, and additionally causes the car to drive an
overall longer distance.
However, the MPCC has some disadvantages compared to the HRHC. In our current implementation,
the MPCC still tracks the center line, which can be seen on the first straight, after the top left corner where
a movement to the center line is clearly visible in Figure 8. This is clearly due to the objective function
of the MPCC, and cannot be completely avoided, even if the contouring cost is small. The HRHC on the
other hand does not have any cost related to the center line and only uses it as a measure of progress, thus
the car drives straight in the aforementioned segment of the track. The second disadvantage can be seen in
the S-curve at lower end of the track, where the MPCC has a small S shape in the driven trajectory. The
HRHC on the other hand shows that the section can be driven completely straight, which gives a speed
benefit. This can be most probably also attributed to the contouring error penalty, for which it would be
beneficial to drive an S-shape in order to follow the center line.
In summary, our results indicate that the HRHC is limited by the path planner, and the fact that the
whole horizon has the same velocity. Allowing multiple velocities within one prediction horizon would
most probably increase the performance of the controller. However, the complexity in the path planner
grows exponentially with the number of different velocity triples in the horizon. The MPCC, which does
not have this limitation, is able to plan better trajectories which also improve the closed loop performance.
However, the MPCC comes at a price, first in terms of computational cost (it is about a factor of five more
expensive than the HRHC when comparing computation times on the same platform, see Section IV-E for
more details on computation times) and, second, in terms of robustness. During our experiments, the relinearization scheme turned out to be sensitive to measurement errors and model drift. In particular, sudden
unexpected skidding of the car can cause problems in the re-linearization scheme. Such drifts are also
responsible for the high variations between different trajectories in certain areas of the track. Furthermore,
since the MPCC relies on the results from the previous iteration to compute the linearizations, sudden
jumps in the high-level corridor path planner might make the previous trajectory infeasible. In such a
situation, several time steps might be needed to recover feasibility of the planned trajectory, although by
using the soft constrained formulation sensible inputs are still provided to the car. The HRHC on the
other hand does not need any information from the last iteration as only the current position and velocity
is needed. This helps to deal efficiently with unexpected behavior and fast changing measurements or
corridors from the high-level obstacle avoidance mechanism.
D. Racing with multiple cars
Since both controllers plan a path around opponents while maximizing the progress, fast and safe
overtaking maneuvers are enabled. In the current work, we focus on static obstacles, which seems
sufficient to outperform non-expert human drivers. To robustly overtake dynamically moving obstacles
(other automatic controllers or expert drivers), it would be necessary to have a prediction of their behavior,
which is currently not available. These predictions could however be systematically incorporated into the
HRHC controller (Section III-A)
MPCC controller (Section III-B)
3.5
3.5
1.5
1.5
2.5
2
−0.5
Y [m]
0
0.5
[m/s]
Y [m]
0.5
3
1
2.5
0
2
[m/s]
3
1
−0.5
1.5
1.5
−1
−1
1
1
−1.5
−1.5
−1.5
−1
−0.5
0
0.5
1
1.5
2
2.5
0.5
−1.5
−1
−0.5
0
X [m]
0.5
1
1.5
2
2.5
0.5
X [m]
Fig. 8: The driven trajectory with velocity profile for 3 different laps. A video of the HRHC controller is
available at https://www.youtube.com/watch?v=ioKTyc9bG4c.
HRHC controller (Section III-A)
MPCC controller (Section III-B)
3.5
3.5
1.5
3
1
0.5
0
2
Y [m]
2.5
[m/s]
Y [m]
0.5
3
1
2.5
0
2
[m/s]
1.5
−0.5
−0.5
1.5
1.5
−1
−1
1
1
−1.5
−1.5
−1.5
−1
−0.5
0
0.5
X [m]
1
1.5
2
2.5
0.5
−1.5
−1
−0.5
0
0.5
1
1.5
2
2.5
0.5
X [m]
Fig. 9: Driven trajectories with static obstacles for 3 different laps. A video of the MPCC with obstacle
avoidance is available at https://www.youtube.com/watch?v=mXaElWYQKC4.
high-level corridor planner outlined in Section III-C, and would merely change the corridor issued to the
controllers presented in Section III-A and Section III-B.
An obstacle avoidance situation is shown in Figure 9, with a detailed zoom taken at three different time
points in Figure 10. These zooms show the prediction horizon and the corresponding planned trajectories.
Due to the limited path planner, the HRHC is not able to directly plan a path around all obstacles from the
beginning. Thus it avoids the first three cars, without predicting how to overtake the next two cars. Only
after the car has made enough progress and overtaken the first group of obstacles, can the controller find
a way between of the other two cars. The MPCC on the other hand plans the path around all obstacles
before it even reaches the first car due to its long horizon. This is an advantage, but if the model mismatch
is significant it can lead to problems, as the planned path is too optimistic.
E. Computation Times
The computation times of the most time-consuming components of the two controllers are given in
Tables II and III for the laps depicted in Figure 8 (single car racing) and Figure 9 (avoidance of opponents).
Note that the computation times of the individual blocks of the two controllers cannot be compared directly.
HRHC controller (Section III-A)
MPCC controller (Section III-B)
3.5
3.5
1.8
Y [m]
1.6
1.4
3
−1
−0.5
0
0.5
3
−1
1
X [m]
−0.5
0
0.5
1
X [m]
2.5
2.5
1.8
2
1.4
Y [m]
1.6
[m/s]
1.8
Y [m]
1.4
1.2
1.2
1.6
2
1.4
1.2
1.2
−1
−0.5
0
0.5
−1
1
−0.5
1.5
X [m]
0
0.5
1
1.5
X [m]
1.8
1
1.6
1.4
Y [m]
1.8
Y [m]
1.6
[m/s]
Y [m]
1.8
1
1.6
1.4
1.2
1.2
−1
−0.5
0
X [m]
0.5
1
0.5
−1
−0.5
0
0.5
1
0.5
X [m]
Fig. 10: Obstacle avoidance at 3 different time steps. Grey indicates the corridor chosen by the obstacle
avoidance algorithm.
To directly compare the computation times of the two controllers, the horizon length should be identical.
However, due to the constant velocity limitation in the HRHC path planner, a horizon length identical to
the MPCC is impossible without using multiple segments of constant velocity, which would make the path
planning combinatorial in complexity and thus currently prohibitive for a real-time implementation. Vice
versa, the MPCC cannot work robustly with the short horizon length used by the HRHC. The multiple
car case does not have a significant impact on the execution times of the lower level controller; only
the path planning in the HRHC gets slightly more complicated. However, the computation time of the
high-level corridor planner (the DP approach from Section III-C) varies significantly, depending on the
complexity of the racing situation. For the MPCC, the limiting factor with respect to the sampling time
is the computation time for solving the QP. The main bottleneck in the HRHC is the path planner, which
has a very high maximal computation time caused by back up rules in the case no feasible trajectory can
be found. The QP on the other hand is the most expensive step in the average, but does not have a large
variation in computation time, which makes it less critical.
The 20 ms sampling time was missed by the HRHC controller in only 0.07 % (one sampling instant in
three laps) and by the MPCC controller in 4.4 % (60 sampling instants in three laps) of the time. Overall,
our experiments demonstrate that both schemes can be implemented in (soft) real-time at sampling rates
of 50 Hz.
ACKNOWLEDGMENT
We gratefully acknowledge the work of our students in the course of the race car project: Kenneth
Kuchera, Samuel Zhao and Florian Perrodin for their fruitful help in implementing the MPCC approach;
Michael Janser for his contribution to the obstacle avoidance (DP) algorithm; Sandro Merkli, Nils Wenzler
and Marcin Dymczyk for the development of the embedded control software and the testbed setup;
Celestine Dünner and Sandro Merkli for building the track and low-level filtering software; Michael
TABLE II: HRHC computation times in milliseconds
Without Obstacles
Mean
Stdev
Max
With Obstacles
Mean
Stdev
Max
Border Adjustment
0.02
0.01
0.04
Border Adjustment
1.33
0.37
2.45
Path Planning
2.93
1.96
13.47
QP Generation
0.52
0.09
1.32
Path Planning
3.18
2.04
9.76
QP Generation
0.53
0.06
QP with FORCES
5.10
0.73
7.56
0.76
QP with FORCES
5.11
0.92
9.25
Mean
Stdev
Max
TABLE III: MPCC computation times in milliseconds
Without Obstacles
Mean
Stdev
Max
With Obstacles
Border Adjustment
0.34
0.11
0.64
Border Adjustment
0.70
0.24
1.05
QP Generation
1.95
0.44
2.92
QP Generation
2.34
0.37
2.79
15.03
1.61
21.16
14.43
1.40
21.46
QP with FORCES
QP with FORCES
Dahinden and Christian Stocker for the initial design of the embedded PCB board; Benjamin Keiser
for the current version of the infrared vision system. We furthermore thank Sean Summers, Nikolaos
Kariotoglou, Christian Conte and John Lygeros from the Automatic Control Laboratory for supervising
various projects and providing important comments to the methods presented in this paper. Special thanks
go to Colin Jones, who originated the idea of the race car testbed.
The research leading to these results has received funding from the EU in FP7 via EMBOCON (ICT248940).
R EFERENCES
[1] T. Faulwasser, B. Kern, and R. Findeisen, “Model predictive path-following for constrained nonlinear systems,” in Proceedings of the
48th IEEE Conference on Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference, pp. 8642–8647,
2009.
[2] D. Lam, C. Manzie, and M. Good, “Model predictive contouring control,” in Conference on Decision and Control (CDC), pp. 6137–
6142, 2010.
[3] A. Domahidi, A. Zgraggen, M. Zeilinger, M. Morari, and C. Jones, “Efficient interior point methods for multistage problems arising
in receding horizon control,” in Conference on Decision and Control (CDC), (Maui, HI, USA), pp. 668–674, Dec. 2012.
[4] A. Domahidi, “FORCES: Fast optimization for real-time control on embedded systems.” http://forces.ethz.ch, Oct. 2012.
[5] R. Horowitz and P. Varaiya, “Control design of an automated highway system,” Proceedings of the IEEE, vol. 88, no. 7, pp. 913–925,
2000.
[6] M. Buehler, K. Iagnemma, and S. Singh, The 2005 DARPA grand challenge: the great robot race, vol. 36. Springer, 2007.
[7] M. Buehler, K. Iagnemma, and S. Singh, The DARPA urban challenge: Autonomous vehicles in city traffic, vol. 56. Springer, 2009.
[8] K. Kritayakirana and C. Gerdes, “Using the centre of percussion to design a steering controller for an autonomous race car,” Vehicle
System Dynamics, vol. 15, pp. 33–51, 2012.
[9] E. Velenis, E. Frazzoli, and P. Tsiotras, “On steady-state cornering equilibria for wheeled vehicles with drift,” in Proceedings of the
48th IEEE Conference on Decision and Control, 2009 held jointly with the 2009 28th Chinese Control Conference, pp. 3545–3550,
IEEE, 2009.
[10] C. Voser, R. Y. Hindiyeh, and J. C. Gerdes, “Analysis and control of high sideslip manoeuvres,” Vehicle System Dynamics, vol. 48,
no. S1, pp. 317–336, 2010.
[11] F. Borrelli, P. Falcone, T. Keviczky, and J. Asgari, “MPC-based approach to active steering for autonomous vehicle systems,”
International Journal of Vehicle Autonomous Systems, vol. 3, no. 2, pp. 265–291, 2005.
[12] P. Falcone, F. Borrelli, J. Asgari, H. E. Tseng, and D. Hrovat, “Predictive active steering control for autonomous vehicle systems,”
IEEE Transactions on Control Systems Technology, vol. 15, no. 3, pp. 566–580, 2007.
[13] T. Besselmann and M. Morari, “Hybrid parameter-varying model predictive control for autonomous vehicle steering,” European Journal
of Control, vol. 14, no. 5, pp. 418–431, 2008.
[14] J. Ackermann, J. Guldner, W. Sienel, R. Steinhauser, and V. I. Utkin, “Linear and nonlinear controller design for robust automatic
steering,” IEEE Transactions on Control Systems Technology, vol. 3, no. 1, pp. 132–143, 1995.
[15] S. Fuchshumer, K. Schlacher, and T. Rittenschober, “Nonlinear vehicle dynamics control - a flatness based approach,” in Conference
on Decision and Control (CDC), pp. 6492–6497, 2005.
[16] Y. Gao, T. Lin, F. Borrelli, E. Tseng, and D. Hrovat, “Predictive control of autonomous ground vehicles with obstacle avoidance on
slippery roads,” Proceedings of DSCC, 2010.
[17] A. Gray, Y. Gao, T. Lin, J. K. Hedrick, H. E. Tseng, and F. Borrelli, “Predictive control for agile semi-autonomous ground vehicles
using motion primitives,” in American Control Conference (ACC), pp. 4239–4244, IEEE, 2012.
[18] E. Frazzoli, M. Dahleh, and E. Feron, “Maneuver-based motion planning for nonlinear systems with symmetries,” IEEE Transactions
on Robotics, vol. 21, no. 6, pp. 1077–1091, 2005.
[19] E. Velenis, P. Tsiotras, and J. Lu, “Modeling aggressive maneuvers on loose surfaces: The cases of trail-braking and pendulum-turn,”
in European Control Conference, pp. 1233–1240, 2007.
[20] J. Frasch, A. Gray, M. Zanon, H. Ferreau, S. Sager, F. Borrelli, and M. Diehl, “An auto-generated nonlinear MPC algorithm for real-time
obstacle avoidance of ground vehicles,” in Proceedings of the European Control Conference, no. accepted, 2013.
[21] M. Diehl, H. Bock, J. Schlöder, R. Findeisen, Z. Nagy, and F. Allgöwer, “Real-time optimization and nonlinear model predictive control
of processes governed by differential-algebraic equations,” Journal of Process Control, vol. 12, no. 4, pp. 577–585, 2002.
[22] J. Jeon, S. Karaman, and E. Frazzoli, “Anytime computation of time-optimal off-road vehicle maneuvers using the RRT∗ ,” in Conference
on Decision and Control (CDC), pp. 3276–3282, 2011.
[23] J. Jeon, R. Cowlagi, S. Peters, S. Karaman, E. Frazzoli, P. Tsiotras, and K. Iagnemma, “Optimal motion planning with the half-car
dynamical model for autonomous high-speed driving,” in American Control Conference (ACC), pp. 188–193, 2013.
[24] E. Bakker, L. Nyborg, and H. Pacejka, “Tyre modelling for use in vehicle dynamics studies,” SAE, 1987.
[25] D. G. Luenberger, Linear and nonlinear programming. Springer, 2003.
[26] E. C. Kerrigan and J. M. Maciejowski, “Soft constraints and exact penalty functions in model predictive control,” in Proc. UKACC
International Conference (Control 2000), (Cambridge, UK), September 2000.
[27] Y. Koren, “Control of machine tools,” Transactions of the ASME Journal of Manufacturing Science and Engineering, vol. 119, 1997.
[28] R. C. Ko, M. C. Good, and S. K. Holgamuge, “Adaptive calibration of feedforward controllers for laser profiling machines,” in
Proceedings of Information, Decision and Control, 1999.
[29] M. Diehl, H. G. Bock, and J. P. Schlöder, “A real-time iteration scheme for nonlinear optimization in optimal feedback control,” SIAM
Journal on Control and Optimization, vol. 43, no. 5, pp. 1714–1736, 2005.
[30] D. P. Bertsekas, Dynamic programming and optimal control, vol. 1. Athena Scientific Belmont, 1995.
[31] D. Ferguson, T. M. Howard, and M. Likhachev, “Motion planning in urban environments,” Journal of Field Robotics, vol. 25, pp. 939–
960, 2008.
[32] M. Montemerlo, J. Becker, S. Bhat, H. Dahlkamp, D. Dolgov, S. Ettinger, D. Haehnel, T. Hilden, G. Hoffmann, B. Huhnke, and et al.,
“Junior: The stanford entry in the urban challenge,” Journal of Field Robotics, vol. 25, pp. 569–597, 2008.
[33] Y. Kuwata, G. A. Fiore, J. Teo, E. Frazzoli, and J. P. How, “Motion planning for urban driving using RRT,” in IEEE/RSJ International
Conference on Intelligent Robots and Systems, pp. 1681–1686, 2008.
| 3cs.SY
|
Polarization-Division Multiplexing Based on the
Nonlinear Fourier Transform
J AN -W ILLEM G OOSSENS , 1,2,* M ANSOOR I. YOUSEFI , 2 Y VES
J AOUËN 2 AND H ARTMUT H AFERMANN 1
1
2
Mathematical and Algorithmic Sciences Lab, Paris Research Center, Huawei Technologies France
Communications and Electronics Department, Telecom ParisTech, Paris, 75013, France
arXiv:1707.08589v1 [cs.IT] 26 Jul 2017
* [email protected]
Abstract: Polarization-division multiplexed (PDM) transmission based on the nonlinear Fourier
transform (NFT) is proposed for optical fiber communication. The NFT algorithms are generalized
from the scalar nonlinear Schrödinger equation for one polarization to the Manakov system
for two polarizations. The transmission performance of the PDM nonlinear frequency-division
multiplexing (NFDM) and PDM orthogonal frequency-division multiplexing (OFDM) are
determined. It is shown that the transmission performance in terms of Q-factor is approximately
the same in PDM-NFDM and single polarization NFDM at twice the data rate and that the
polarization-mode dispersion does not seriously degrade system performance. Compared with
PDM-OFDM, PDM-NFDM achieves a Q-factor gain of 6.4 dB. The theory can be generalized to
multi-mode fibers in the strong coupling regime, paving the way for the application of the NFT
to address the nonlinear effects in space-division multiplexing.
© 2017 Optical Society of America
OCIS codes: (060.2330) Fiber optics communications,(060.4230) Multiplexing, (060.4370) Nonlinear optics, fibers
References and links
1. A. Hasegawa and F. Tappert, “Transmission of stationary nonlinear optical pulses in dispersive dielectric fibers. I.
anomalous dispersion,” Appl. Phys. Lett. 23, 142–144 (1973).
2. A. Hasegawa and T. Nyu, “Eigenvalue communication,” J. Lightwave Technol. 11, 395–399 (1993).
3. C. S. Gardner, J. M. Greene, M. D. Kruskal, and R. M. Miura, “Method for solving the Korteweg-deVries equation,”
Phys. Rev. Lett. 19, 1095–1097 (1967).
4. M. I. Yousefi and F. R. Kschischang, “Information transmission using the nonlinear Fourier transform, part I:
Mathematical tools,” IEEE Trans. Inf. Theory 60, 4312–4328 (2014).
5. M. I. Yousefi and F. R. Kschischang, “Information transmission using the nonlinear Fourier transform, part II:
Numerical methods,” IEEE Trans. Inf. Theory 60, 4329–4345 (2014).
6. M. I. Yousefi and F. R. Kschischang, “Information transmission using the nonlinear Fourier transform, part III:
Spectrum modulation,” IEEE Trans. Inf. Theory 60, 4346–4369 (2014).
7. S. T. Le, J. E. Prilepsky, and S. K. Turitsyn, “Nonlinear inverse synthesis for high spectral efficiency transmission in
optical fibers,” Opt. Express 22, 26720–26741 (2014).
8. S. T. Le, J. E. Prilepsky, and S. K. Turitsyn, “Nonlinear inverse synthesis technique for optical links with lumped
amplification,” Opt. Express 23, 8317–8328 (2015).
9. M. I. Yousefi and X. Yangzhang, “Linear and nonlinear frequency-division multiplexing,”
https://arxiv.org/abs/1603.04389 .
10. I. Tavakkolnia and M. Safari, “Signaling on the continuous spectrum of nonlinear optical fiber,”
https://arxiv.org/abs/1704.05537 .
11. S. T. Le, I. Philips, J. Prilepsky, P. Harper, N. Doran, A. D. Ellis, and S. Turitsyn, “First experimental demonstration of
nonlinear inverse synthesis transmission over transoceanic distances,” in “Optical Fiber Communications Conference,”
(IEEE, 2016), pp. 1–3.
12. S. T. Le, I. D. Philips, J. E. Prilepsky, M. Kamalian, A. D. Ellis, P. Harper, and S. K. Turitsyn, “Achievable information
rate of nonlinear inverse synthesis based 16QAM OFDM transmission,” in “2016 64nd European Conference on
Optical Communication (ECOC),” (VDE, 2016), pp. 1–3.
13. S. T. Le, H. Buelow, and V. Aref, “Demonstration of 64x0.5Gbaud nonlinear frequency division multiplexed
transmission with 32QAM,” in “Optical Fiber Communication Conference,” (Optical Society of America, 2017), pp.
W3J–1.
14. V. Aref, H. Bülow, K. Schuh, and W. Idler, “Experimental demonstration of nonlinear frequency division multiplexed
transmission,” in “2015 41st European Conference on Optical Communication (ECOC),” (IEEE, 2015), pp. 1–3.
15. V. Aref, S. T. Le, and H. Buelow, “Demonstration of fully nonlinear spectrum modulated system in the highly
nonlinear optical transmission regime,” in “2016 42nd European Conference on Optical Communication (ECOC),”
(VDE, 2016), pp. 1–3.
16. A. Maruta and Y. Matsuda, “Polarization division multiplexed optical eigenvalue modulation,” in “2015 International
Conference on Photonics in Switching (PS),” (IEEE, 2015), pp. 265–267.
17. X. Yangzhang, M. Yousefi, A. Alvarado, D. Lavery, and P. Bayvel, “Nonlinear frequency-division multiplexing in the
focusing regime,” in “Optical Fiber Communication Conference,” (Optical Society of America, 2017), pp. Tu3D–1.
18. M. I. Yousefi, G. Kramer, and F. R. Kschischang, “Upper bound on the capacity of the nonlinear Schrödinger channel,”
https://arxiv.org/abs/1502.06455 .
19. P. Serena, N. Rossi, and A. Bononi, “Nonlinear penalty reduction induced by PMD in 112 Gbit/s WDM PDM-QPSK
coherent systems,” in “2009 35th European Conference on Optical Communication,” (2009), pp. 1–2.
20. I. Tavakkolnia and M. Safari, “Effect of PMD on the continuous spectrum of nonlinear optical fibre,” in “2017 65th
European Conference on Optical Communication (ECOC),” (2017), pp. ci–p–11.
21. C. R. Menyuk, “Pulse propagation in an elliptically birefringent Kerr medium,” IEEE J. Quantum. Electron. 25,
2674–2682 (1989).
22. P. Wai and C. R. Menyuk, “Polarization mode dispersion, decorrelation, and diffusion in optical fibers with randomly
varying birefringence,” Lightwave Technology, Journal of 14, 148–157 (1996).
23. D. Marcuse, C. Manyuk, and P. Wai, “Application of the Manakov-PMD equation to studies of signal propagation in
optical fibers with randomly varying birefringence,” J. Lightwave Technol. 15, 1735–1746 (1997).
24. C. R. Menyuk and B. S. Marks, “Interaction of polarization mode dispersion and nonlinearity in optical fiber
transmission systems,” J. Lightwave Technol. 24, 2806–2826 (2006).
25. M. J. Ablowitz and H. Segur, Solitons and the inverse scattering transform (SIAM, 1981).
26. S. V. Manakov, “On the theory of two-dimensional stationary self-focusing of electromagnetic waves,” Soviet
Physics-JETP 38, 248–253 (1974).
27. A. Degasperis and S. Lombardo, “Integrability in action: Solitons, instability and rogue waves,” in “Rogue and Shock
Waves in Nonlinear Dispersive Media,” (Springer, 2016), pp. 23–53.
28. G. P. Agrawal, Nonlinear fiber optics (Academic press, 2007).
29. S. Civelli, E. Forestieri, and M. Secondini, “Why noise and dispersion may seriously hamper nonlinear frequencydivision multiplexing,” https://arxiv.org/abs/1705.06779 .
30. L. F. Mollenauer, S. G. Evangelides, and H. A. Haus, “Long-distance soliton propagation using lumped amplifiers
and dispersion shifted fiber,” J. Lightwave Technol. 9, 194–197 (1991).
31. K. Blow and N. Doran, “Average soliton dynamics and the operation of soliton systems with lumped amplifiers,”
IEEE Photonics Technol. Lett. 3, 369–371 (1991).
32. P. Wai, C. R. Menyuk, and H. Chen, “Stability of solitons in randomly varying birefringent fibers,” Opt. Lett. 16,
1231–1233 (1991).
33. S. G. Evangelides, L. F. Mollenauer, J. P. Gordon, and N. S. Bergano, “Polarization multiplexing with solitons,” J.
Lightwave Technol. 10, 28–35 (1992).
34. M. Bertolini, N. Rossi, P. Serena, and A. Bononi, “Do’s and don’ts for a correct nonlinear PMD emulation in 100Gb/s
PDM-QPSK systems,” Opt. Fiber Technol. 16, 274–278 (2010).
35. M. Eberhard and C. Braimiotis, Numerical Implementation of the Coarse-Step Method with a Varying DifferentialGroup Delay (Springer US, Boston, MA, 2005), pp. 530–534.
36. C. D. Poole, J. H. Winters, and J. A. Nagel, “Dynamical equation for polarization dispersion,” Opt. Lett. 16, 372–374
(1991).
37. S. Mumtaz, R.-J. Essiambre, and G. P. Agrawal, “Nonlinear propagation in multimode and multicore fibers:
Generalization of the Manakov equations,” J. Lightwave Technol. 31, 398–406 (2013).
1.
Introduction
Nonlinear frequency-division multiplexing (NFDM) is an elegant method to address the nonlinear
effects in optical fiber communication. The scheme can be viewed as a generalization of
communication using fiber solitons [1] and goes back to the original idea of eigenvalue
communication [2].
In this approach, information is encoded in the nonlinear spectrum of the signal, defined
by means of the nonlinear Fourier transform (NFT), [3–5]. The evolution of the nonlinear
spectral components in fiber is governed by simple independent equations. As a result, the
combined effects of the dispersion and nonlinearity can be compensated in the digital domain by
the application of an all-pass-like filter. Furthermore, interference-free communication can be
achieved in network environments.
The nonlinear spectrum consists of a continuous part and, in the case of the anomalous dispersion
fiber, also a discrete part (solitonic component). In principle all degrees-of-freedom can be
modulated. Prior work has mostly focused on either continuous spectrum modulation [6–10],
or discrete spectrum modulation [6]. Transmission based on NFT has been experimentally
demonstrated for the continuous spectrum [11–13], discrete spectrum [14], as well as the full
spectrum [15].
Modern coherent optical fiber systems are based on polarization-division multiplexed (PDM)
transmission to improve the achievable rates. However, research on data transmission using the
NFT is limited to the scalar nonlinear Schrödinger equation, which does not take into account
polarization effects (with the exception of [16]).
In this paper we overcome this limitation by generalizing the NFDM to the Manakov system,
proposing PDM-NFDM. We develop a stable and accurate algorithm to compute the forward
and inverse NFT of a two-dimensional signal. It is shown that the PDM-NFDM based on the
continuous spectrum modulation is feasible, and that the data rate can be approximately doubled
compared to the single polarization NFDM. Compared to the PDM-OFDM, the PDM-NFDM
exhibits a peak Q-factor gain of 6.4 dB, in a system with 25 spans of 80 km standard single-mode
fiber and 16 QAM.
In this paper, we set the discrete spectrum to zero and modulate only the continuous spectrum.
Even though not all available degrees of freedom are modulated, the achievable rates reach
remarkably close to the upper bound [17, 18].
The differential group delay and randomly varying birefringence give rise to temporal pulse
broadening due to polarization-mode dispersion (PMD). The PMD might be compensated in
conventional systems, and may even be beneficial in reducing the nonlinear distortions [19]. On
the other hand, PMD changes the nonlinear interaction between signals in the two polarizations.
The impact of PMD on NFDM is not fully investigated yet [20]. In this paper, we show that linear
polarization effects can be equalized in PDM-NFDM at the receiver using standard techniques,
and that the PMD does not seriously degrade performance.
2.
Channel Model with Two Polarizations
Light propagation in two polarizations in optical fiber is modeled by the coupled nonlinear
Schrödinger equation (CNLSE) [21]. The fiber birefringence usually varies rapidly and randomly
along the fiber in practical systems (on a scale of 0.3 to 100 meters). Under this assumption, the
averaging of the nonlinearity in the CNLSE leads to the Manakov-PMD equation [22–24]:
∂A
∆β0
∆β1
∂A
=− j
σZ A −
σZ
∂Z
2
2
∂T
2
α
β2 ∂ A
8
2
(1)
− A+ j
− jγ A A.
2
2 ∂T 2
9
Here A ≡ A(Z, T) is the 2 × 1 Jones vector containing the complex envelopes A1 and A2 of the
two polarization components, Z denotes the distance along the fiber, T represents time, σZ is a
2 × 2 Pauli matrix (depending on the state of polarization at Z), and ∆β0 , ∆β1 , α, β2 and γ are
constant numbers.
The term ∂A/∂T is responsible for the PMD [24], while the second line represents loss,
chromatic dispersion and Kerr nonlinearity. The factor 8/9 in front of the nonlinear term stems
from polarization averaging.
The NFT applies to the integrable equations. However, the Manakov-PMD system (1) apparently
is not integrable in the presence of loss or PMD. The loss may be approximately compensated
using ideal distributed Raman amplification, leading to a lossless model with distributed additive
white Gaussian noise (AWGN). Discrete amplification with short spans can also be modeled
similarly, but with a modified nonlinearity coefficient (depending on loss); see [8]. Ignoring the
PMD and, for the moment, noise, (1) is reduced to
8
∂A
β2 ∂ 2 A
2
=j
− jγ A A.
∂Z
2 ∂T 2
9
(2)
It is convenient to normalize (2). Let Z0 = 1 and
T0 =
q
| β2 | Z0 /2,
A0 =
r .
8
2
γZ0 .
9
(3)
Introducing the normalized variables z = Z/Z0 , t = T/T0 and q = A/A0 , (2) is simplified to the
Manakov equation
j
∂q ∂ 2 q
2
=
− 2s q q,
∂z ∂t 2
(4)
where s = 1 in the normal dispersion (defocusing) regime and s = −1 in the anomalous dispersion
(focusing or solitonic) regime.
It is shown in [25] that (4) is integrable. In what follows, we develop the corresponding NFT.
3.
NFT of the Two-Dimensional Signals
In this section, basics of the NFT theory of the two-dimensional signals, as well as numerical
algorithms to compute the forward and inverse NFT, are briefly presented [26].
3.1.
Brief Review of the Theory
Equation (4) can be represented by a Lax pair L̂ and M̂. This means that, operators L̂ and M̂ can
be found such that (4) is in one-to-one correspondence with the Lax equation ∂ L̂/∂z = [ M̂, L̂].
The Lax pair for the Manakov equation was found by Manakov in 1974 [26, 27]. The operator L̂
is:
∂
−q1 −q2
© ∂t∗
ª
∂
L̂ = j sq1 − ∂t
(5)
0 ®.
∂
∗
0
− ∂t
«sq2
¬
To simplify the presentation, consider the focusing regime with s = −1.
The eigenvalue problem
L̂v = λv
(6)
can be solved for the Jost function v (eigenvector) assuming that the signals vanish at t = ±∞.
This gives rise to six boundary conditions for v, denoted by j± :
j±(0) → e(0) exp(− jλt),
j±(i) → e(i) exp( jλt),
i = 1, 2,
as t → ±∞,
(7)
where e(k) are unit vectors, i.e., el(k) = δkl , k, l = 0, 1, 2. Each of the boundary conditions (7) is
bounded when λ ∈ C+ or λ ∈ C− . The eigenvalue problem (6) under the boundary conditions
(7) can be solved, obtaining six Jost functions { j±(i) (t, λ)}i=0,1,2 for all t. It can be shown that
{ j+(i) (t, λ)}i=0,1,2 and { j−(i) (t, λ)}i=0,1,2 each form an orthonormal basis for the solution space of
(6). Thus we can expand j−(0) (t, λ) in the basis of { j+(i) (t, λ)}i=0,1,2 :
j−(0) (t, λ) = a(λ) j+(0) (t, λ) + b1 (λ) j+(1) (t, λ) + b2 (λ) j+(2) (t, λ),
(8)
where a(λ), b1 (λ) and b2 (λ) are called nonlinear Fourier coefficients. It can be shown that in the
focusing regime the inner product of two Jost functions corresponding to the same eigenvalue
does not depend on time. This implies that a(λ) and bi (λ) do not depend on time (as the notation
in (8) suggests). The NFT of the q = [q1, q2 ] is now defined as
NFT(q)(λ) =
q̂i =
q̃i =
bi (λ)
a(λ) ,
bi (λ j )
a0 (λ j ) ,
λ ∈ R,
λ j ∈ C+,
i = 1, 2,
(9)
where λ j , j = 1, 2, · · · , N, are the solutions of a(λ j ) = 0 in λ j ∈ C+ .
An important property of NFT(q(t, z))(λ) is that it evolves in distance according to the
all-pass-like filter
2
H(λ) = e4jsλ L .
(10)
Remark. Note that if q1 or q2 is set to zero in the Manakov equation and the associated L̂
operator (5), the equation and the operator are reduced, respectively, to the scalar NLSE and
the corresponding L̂ operator [17]. Also, the theory in this section can straightforwardly be
generalized to include any number of signals qi , i = 1, 2, ..., for instance, LP modes propagating
in a multi-mode fiber in the strong coupling regime.
Remark Since the Jost vectors are orthonormal at all times, (8) implies the unimodularity
condition
|a(λ)| 2 + |b1 (λ)| 2 + |b2 (λ)| 2 = 1,
(11)
which will be used in the algorithm.
3.2.
Forward NFT Algorithm
We develop the NFT algorithms for the continuous spectrum that is considered in this paper. The
forward and inverse NFT algorithms are, respectively, based on the Ablowitz-Ladik and discrete
layer peeling (DLP) methods. These algorithms generalize the corresponding ones in [9].
We begin by rewriting the eigenvalue problem L̂v = λv in the form ∂v/∂t = Pv, where
− jλ
©
P = −q1∗ (t)
∗
«−q2 (t)
q1 (t)
jλ
0
q2 (t)
ª
0 ®.
jλ ¬
(12)
Here and in the remainder of this section we suppress the dependence on the coordinate z. We
discretize the time interval [T0, T1 ] according to t[k] = T0 + k∆T, where ∆T = (T1 − T0 )/N such
that t[0] = T0 and t[N] = T1 . We set qi [k] = qi (T0 + k∆T) and similarly for the vector v. The
Ablowitz-Ladik method is a discretization of ∂v/∂t = Pv as follows
z 1/2
©
v[k + 1, λ] = ck −Q1 [k]∗
∗
«−Q2 [k]
Q1 [k] Q2 [k]
ª
z −1/2
0 ® v[k, λ],
−1/2
0
z
¬
(13)
where Qi [k] = qi [k]∆T, z := e−2jλ∆T and k = 0, 1, · · · , N − 1. With this discretization v
becomesp a periodic function of λ with period π/∆T. We introduced a normalization factor
ck = 1/ |det P[k]| in (13), where |det P[k]| = 1 + |Q2 [k]| 2 + |Q2 [k]| 2 , to improve numerical
stability.
The iterative equation (13) is initialized with
v[0, λ] = j−(0) (T0, λ) = e(0) zT0 /2∆T .
After N iterations, the nonlinear Fourier coefficients are obtained as projections onto the
Jost-solutions j+(i) (T1, λ),
N
T0
a[λ] = z− 2 − 2∆T v0 [N, λ],
bi [λ] = z
N
2
T0
+ 2∆T
vi [N, λ],
(14)
i = 1, 2.
The continuous component in the NFT(q)(λ) is then computed based on (9).
(15)
The algorithm can be efficiently implemented in the frequency domain. Let us write (13) as
1
Q1 [k]z−1
© ∗
z−1
V[k + 1, λ] = ck −Q1 [k]
∗
0
«−Q2 [k]
Q2 [k]z −1
ª
0
® V[k, λ],
z−1 ¬
(16)
where V[k, λ] := (A[k, λ], B1 [k, λ], B2 [k, λ])T , and
A[k, λ] = a[k, λ]
T0
Bi [k, λ] = z−N − ∆T + 2 bi [k, λ],
1
i = 1, 2.
(17)
We discretize λ on the interval [Λ0, Λ1 ] with Λ1 = −Λ0 = π/(2∆T) such that λ[k] = Λ0 + k∆Λ.
Let tilde ’∼’ denote the action of the discrete Fourier transform DFT with respect to λ[k],
e.g., Ã[., l] = DFT(A[., λ[k]]), where
l = 0, 1, , · · · , N − 1 is the discrete frequency. Note that
DFT z −1 Bi [., λ[k]] [l] = shift B̃i [l], where shift denotes circular right shift of the array by
one element. Equation (16) in the frequency domain is
Ã[k + 1, l] = ck ( Ã[k, l] + Q1 [k] shift B̃1 [k] [l]
+ Q2 [k] shift B̃2 [k] [l]),
B̃1 [k + 1, l] = ck (−Q1 [k]∗ Ã[k, l] + shift B̃1 [k] [l]),
(18)
∗
B̃2 [k + 1, l] = ck (−Q2 [k] Ã[k, l] + shift B̃2 [k] [l]).
The initial condition is given by Ã[0] = DFT a[k] [0] and B̃i [0] = 0. At k = N − 1, a and bi are
found by recovering V[N, λ] through an inverse DFT and using (17).
3.3.
Inverse NFT Algorithm
The inverse NFT algorithm consists of two steps. First, we compute v[N, λ] from the continuous
spectra q̂1,2 (λ) and invert the forward iterations (13). Second, at each iteration, we compute Q[k]
from v[k, λ].
Substituting bi (λ) = q̂i (λ)a(λ) in the unimodularity condition (11), we can compute |a(λ)|
q
|a(λ)| = 1/ 1 + | q̂1 (λ)| 2 + | q̂2 (λ)| 2 .
In the absence of a discrete spectrum, from (9), a(λ) , 0 for all λ. We have Re(log(a)) = log(|a|)
and Im(log(a)) = ∠a. Since a(λ) and therefore log(a) are analytic functions of λ we can recover
the phase of a as ∠a = H (log(|a|)), where H denotes the Hilbert transform.
The inverse iterations are obtained by inverting the matrix in (13) and dropping terms of order
Q2i ∼ ∆T 2 (to yield the same accuracy as for the forward iterations):
z −1/2 −Q1 [k] −Q2 [k]
© ∗
ª
v[k, λ] = ck Q1 [k]
(19)
z1/2
0 ® v[k + 1, λ].
∗ [k]
1/2
Q
0
z
« 2
¬
In practice, as in the forward NFT, it is better to invert the frequency domain iterations
(18).
The signal Q[k] can then be obtained from V[k + 1, l] as follows. Recall that shift B̃i [k] [l] =
B̃i [k, l − 1]. Using the initial conditions for the forward iterations Ã[0, l] = δ0,l and B̃i [0, l] = 0,
it is straightforward to show that Ã[k, l] = 0 and B̃i [k, l] = 0 for l ≥ k > 0. In particular,
B̃i [k, N − 1] = 0 for k < N. For the first element of B̃i [k], from (18) and shift B̃1 [k] [−1] =
shift B̃1 [k] [N − 1] = 0, we obtain
Ã[k + 1, 0] = ck Ã[k, 0],
B̃1 [k + 1, 0] = −ck Q1 [k]∗ Ã[k, 0],
B̃2 [k + 1, 0] = −ck Q2 [k]∗ Ã[k, 0].
1
4
^1
q
NFT[INFT(^
q)]1
^2
q
NFT[INFT(^
q)]2
0.9
0.8
^1
q
NFT[INFT(^
q)]1
^2
q
NFT[INFT(^
q)]2
3.5
3
0.7
2.5
qj (a.u.)
j^
qj (a.u.)
j^
0.6
0.5
0.4
2
1.5
0.3
1
0.2
0.5
0.1
0
0
-4
-2
0
2
4
6
-4
-2
0
6 (a.u.)
2
4
6
6 (a.u.)
Fig. 1. Comparing q̂ = [q̂1, q̂2 ] and NFT(INFT(q̂)), where q̂1 and q̂2 are displaced Gaussians.
For fixed sampling rate, the algorithm is less accurate at higher input-power.
These equations can be solved for Q∗i [k] = − B̃i [k + 1, 0]/ Ã[k + 1, 0].
3.4.
Testing the NFT Algorithms
The forward and inverse NFT numerical algorithms are tested as follows. Figure 1 compares
a signal containing two polarization components in the nonlinear Fourier domain with its
reconstruction after successive
INFT and NFT operations. We take two displaced Gaussians with
√
standard deviation σ = 2 as input signals for the two polarization components q̂i , i = 1, 2. We
set time windows to T = 64 and take 2048 samples in time and nonlinear Fourier domain. In the
discrete layer peeling method, the signal is periodic in nonlinear Fourier domain with period
π/∆T ≈ 100.
Deviations occur as the amplitude of the signal is increased. The accuracy of the NFT (INFT)
can be enhanced by increasing the sampling rate in time (nonlinear frequency), as this reduces
errors due to to the piecewise-constant approximation of the signal. We find that we roughly need
twice the number of samples to achieve the same accuracy as in the single-polarization case.
4.
PDM-NFDM Transmitter and Receiver
In this section, we describe the transmitter (TX) and receiver (RX) digital signal processing
(DSP) in PDM-NFDM and PDM-OFDM. A schematic diagram of the polarization-division
multiplexed NFDM and OFDM transmission systems is shown in Fig. 2. The TX DSP produces
digital signals for the in-phase and quadrature components of both polarization components,
which are fed into the IQ-Modulator. The modulated signals for the two polarization components
are combined in the polarization beam combiner before they enter the transmission line consisting
of multiple fiber spans. We consider the practically relevant case of lumped amplification using
Erbium-doped fiber amplifiers (EDFAs). After propagation through the fiber the two polarization
components are separated in the polarization beam splitter and fed into the polarization-diversity
intradyne coherent receiver, which provides the input to the RX DSP.
We briefly describe the TX and RX DSP in OFDM and NFDM. We first map the incoming
bits to signals taken from a QAM constellation. We then oversample the discrete-time signal in
the time domain (by introducing zeros in the frequency domain outside the support of the signal)
and then add guard intervals in the time domain. Increasing the guard interval increases the
accuracy of the INFT. Unless stated otherwise, we do not increase the guard intervals during the
computation of the INFT as the amplitude is increased, so there is a penalty due to inaccuracies
in the algorithm. In NFDM, these steps are performed in what is called the U-domain; see [9].
SSMF
I xin
Tx DSP
in
x
in
y
in
y
Q
I
Q
IQ Mod.
E xin
IQ Mod.
E yin
Tx DSP NFDM
Tx DSP OFDM
OFDM data encoder
OFDM data encoder
Oversample in time
Include guard interval
EDFA
E xout
E yout
N spans
I xout
Qxout
I yout
Q yout
Coh.
Rx
Rx DSP NFDM
Rx DSP OFDM
Separate bursts
Separate bursts
Oversample in time
Normalize
Normalize
Include guard interval
Manakov NFT
FFT
One tap channel eq.
CDC or DBP
U qˆ
Rx DSP
qˆ U
Manakov INFT
IFFT
Unnormalize
Unnormalize
Remove guard interval
Remove guard interval
Combine bursts
Combine bursts
Training sequence equalization
Training sequence equalization
Downsample in time
Downsample in time
Minimum distance decoder
Minimum distance decoder
Fig. 2. System diagram for the polarization-multiplexed NFDM and OFDM transmission
systems with processing steps in the transmitter and receiver DSP. Steps highlighted in
purple require joint processing of both polarization components. For further explanation see
text.
The signal is subsequently mapped from the U-domain to nonlinear Fourier domain through the
transformation
q
Ui (λ) =
− log(1 − | q̂i (λ)| 2 )e j∠q̂i (λ),
i = 1, 2.
(20)
This step has no analogue in OFDM. Note that contrary to the single-polarization case here
the energy of the signal in the time domain is only approximately proportional to the energy in
the U-domain. At this point, we perform the inverse NFT in the case of NFDM and an inverse
FFT in case of OFDM. Then we obtain the unnormalized signal by introducing units using (3).
Finally we combine the OFDM or NFDM bursts to obtain the signal to be transmitted. The output
of the DSP are the in-phase and quadrature components of the signals in the two polarization
components. All steps in the DSP are performed independently for the two polarizations, except
for the INFT, which requires joint processing.
At the RX we invert the steps of the TX DSP. The signal processing begins with burst
separation and signal normalization using (3), followed by the forward NFT (FFT) in case
of NFDM (OFDM). In NFDM, we subsequently equalize the channel using (10), which is a
single-tap phase compensation. Similarly, in OFDM we either compensate the dispersion with
the phase exp(− j β2 ω2 Nspan L/2), or perform digital backpropagation (DBP) for a fixed number
of steps per span. We then remove the guard intervals in time, down-sample the signal in the time
domain, and obtain the output symbols. The bit error rate (BER) is calculated using a minimum
distance decoder for symbols.
In Fig. 3 we compare the time domain signals of NFDM and OFDM at the TX for one of the
polarization components. We use 112 subcarriers over a burst duration of T0 = 2ns in both cases.
These parameters are the same as in Ref. [8] and correspond to a burst data rate of 224GBit/s per
polarization at a Baudrate of 56GBaud. In NFDM the shape of the signal in the time domain
changes as the amplitude | q̂1,2 | is increased in the nonlinear Fourier domain. At a signal power of
0.5 dBm, one can see a significant amount of broadening of the NFDM signal in the time domain.
This effect makes it difficult to control the time duration of signals in NFDM.
0.08
0.08
NFDM
OFDM
0.07
0.05
p
jqj ( W )
0.06
0.05
p
jqj ( W )
0.06
0.04
0.04
0.03
0.03
0.02
0.02
0.01
0.01
0
-20
NFDM
OFDM
0.07
-15
-10
-5
0
5
10
15
0
-20
20
t (ns)
-15
-10
-5
0
5
10
15
20
t (ns)
Fig. 3. NFDM and OFDM signals at the TX (left panel) and RX (right panel) using the ideal
model (2) at P = 0.5 dBm without noise. Only one of the two polarizations is shown at both
TX and RX. The NFDM signal at the TX is broader due to the nonlinear effects in the NFT.
At the RX, the time duration of both signals is about the same.
Parameter
Value
Length span
80 km
Number of spans
25
Number of carriers
112
Burst duration
2 ns
Guard interval
18 ns
Burst data rate
448GBit/s
Effective data rate
44.8GBit/s
Bandwidth
56 GHz
Oversampling factor
16
Constellation
16 QAM
Noise Figure
6.2 dB
Attenuation
0.2 dB/km
Dispersion
16.89 ps/km/nm
Nonlinear index
2.6◦10⁻²⁰ W/m²
Core area
80 μm²
Table 1. The system parameters used in the simulations.
Pulse broadening in the time domain due to the chromatic dispersion can be estimated by [28]
∆T = 2π| β2 |LB,
(21)
where B is the signal bandwidth. The guard time intervals for minimizing the interaction among
bursts can be approximated using (21). For the parameters in Table 1, we obtain ∆T ∼ 15ns, to
which we add a 20% margin to obtain a total symbol duration of T = T0 +Tguard = (2+18)ns= 20ns.
This corresponds to an effective data rate of 44.8Gbit/s. The right panel of Fig. 3 shows the
time domain signals in NFDM and OFDM in one polarization at the RX after propagation
over 2000 km governed by the integrable model (2) (we consider transmission over the realistic
fiber model (1) below in Sec. 5.3). We observe that the amount of the temporal broadening
of the NFDM and OFDM signals is about the same. In our simulations we do not employ
pre-compensation at the TX, which may be added to further increase the data rate [29].
5.
Simulation results
In this section, we consider the system shown in Fig. 2 and compare the PDM-OFDM and
PDM-NFDM via simulations, taking into account loss and PMD. First, we consider the model
with loss and periodic amplification, setting the PMD to zero (namely, neglecting the terms in
the first line of the Eq. 1). Next, the PMD effects are studied in Sec. 5.3. The system parameters
used are summarized in Table 1.
10 0
B2B
Lossless
Lossy
Transf. lossless
BER
10 -1
10 -2
10 -3
10 -4
5
10
15
20
OSNR (dB)
Fig. 4. BER as a function of OSNR for NFDM, for back-to-back, lossless, lossy and
transformed-lossless models.
5.1.
Effect of loss and lumped amplification
In the lumped amplification scheme, the signal is periodically amplified after each span. The
channel is described by the model (1) including the attenuation term, which is manifestly
not integrable. The effect of lumped amplification on NFT transmission has been studied
previously [8].
We illustrate the effect of the attenuation by comparing the BER as a function of the OSNR in
Fig. 4 for four models: 1) the back-to-back (B2B) configuration; 2) lossless model (2) (there is
propagation but without loss); 3) lossy model with lumped amplification; and 4) a transformedlossless model that is introduced below. In producing Fig. 4, we artificially introduced AWGN at
the receiver, to exclude the effects of the signal-noise interaction from the comparison. We fix the
power P = −3.1dBm to keep the accuracy of the NFT algorithms the same and vary the OSNR
by changing the noise power.
We see that the BER in B2B and lossless models are approximately the same. This result
verifies that the implementation of the NFT is correct. It also shows that the effect of burst
interaction due to the finite guard interval is negligible.
The BER of the lossy model is significantly higher than the BER in the B2B and lossless models
at high OSNRs. The BER of the lossy model seems to flatten out as the OSNR is increased.
Fiber loss can be taken into account in the NFT as follows. The attenuation term in (1)
α
can be eliminated by a change of variable A(z, t) = A0 (z, t)e− 2 z [30, 31]. This transforms the
non-integrable equation (1) to the integrable equation (2) (thus with zero loss) and a modified
nonlinearity parameter
γeff (L) =
1
L
∫
L
γe−αz dz = γ(1 − e−αL )/(αL).
(22)
0
We refer to the resulting model as the transformed-lossless model.
Note that the power of the signal A0 (z, t) in the transformed-lossless model is higher than the
power of the A(z, t) in the original lossy model. That is because γeff < γ, which yields higher
amplitudes according to (3).
NLSE
Manakov
12
10
Q-factor (dB)
8
6
4
2
0
-2
-4
-10
-5
0
5
P (dBm)
Fig. 5. Comparison between NFT transmission based on the NLSE (single polarization) and
the Manakov equation (polarization-multiplexed). P denotes the total power of the signal.
At low power the offset between the curves is 3dB, as the signal power doubles when two
polarization components propagate. At higher power signal-noise interactions decrease this
gap.
Figure 4 shows that the proposed scheme for loss cancellation is indeed very effective. Using
γeff (L) in the inverse and forward NFTs, the BER of the lossy and transformed-lossless models
are almost identical.
5.2.
Transmission performance PDM-NFDM
In order to assess the transmission performance of the PDM-NFDM transmission, we performed
system simulations as described in Sec. 4. For now we focus on deterministic impairments and
neglect PMD. We simulate transmission of 112 subcarrier NFDM and OFDM pulses based
on a 16QAM constellation over Nspan = 25 spans of 80km of standard single-mode fiber. We
assume ideal flat-gain amplifiers with a noise figure of NF = 6.2dB. The system parameters are
summarized in Table 1. They are comparable with those of Ref. [8] to facilitate a comparison
with the single-polarization case.
We first compare single-polarization NFT transmission based on the NLSE with polarizationmultiplexed transmission based on the Manakov equation. Figure 5 shows that in the linear regime
the two curves are offset by 3dB because polarization multiplexing doubles the transmission
power without increasing the signal to noise ratio. We note that in this calculation we increased
the guard band and thereby the sampling rate in frequency domain by a factor of two in the
computation of the PDM-NFT (the guard band in transmission is the same) compared to the
single-polarization case. This is to avoid penalties due to inaccuracies in the NFT, which here
amount to approximately 1dB at peak power if the same guard bands are used. Without this
penalty, the Q-factor at peak power is roughly the same in both cases. This implies that data rates
can approximately be doubled using polarization multiplexing. We show in Sec. 5.3 that this
conclusion still holds in presence of polarization effects.
In Fig. 6 we compare the Q-factor as a function of launch power in PDM-OFDM and
PDM-NFDM transmission. The optimum launch power in OFDM is significantly smaller than
in NFDM. OFDM transmission is limited by nonlinearity, while NFDM is mainly limited by
nonlinear signal-noise interaction. The Q-factor at optimum launch power is significantly higher
in NFDM than in OFDM. We observe an overall gain of 6.4dB in Q-factor. Figure 7 shows the
NFDM
OFDM
OFDM DBP 4 step/span
OFDM DBP 10 step/span
OFDM DBP 16 step/span
13
12
Q-factor (dB)
11
10
9
8
7
6
5
4
3
-8
-6
-4
-2
0
2
4
6
P (dBm)
Fig. 6. Comparison of polarization-multiplexed OFDM to NFDM transmission in an idealized
setting. We use the Manakov equation without PMD-effects for 25 spans of 80 km for
16QAM. NFDM performs as well as OFDM with 10step/span DBP. The full potential of
NFDM is leveraged in a multi-channel scenario, where DBP is less efficient.
Fig. 7. Received constellations for OFDM (left panel, without DBP) and NFDM (right panel)
at the respective optimal launch power. The noise in NFDM is clearly non-Gaussian.
corresponding received constellations at the respective optimal launch power.
In Fig. 6 we further report results obtained by digital backpropagation after OFDM transmission.
For a fair comparison with NFDM, we use the same sampling rate in the DBP and apply it without
prior downsampling. OFDM with DBP achieves similar performance to NFDM for around 10
DBP steps per span and exceeds it for 16 steps per span. We note that here we considered a
single-user scenario. The full potential of NFDM is leveraged in a network scenario, where DBP
is less efficient. Our results are in good qualitative agreement with those reported in Ref. [8] for
the single-polarization case, while achieving twice the data rate.
5.3.
5.3.1.
Effect of PMD
Simulation of PMD
The fiber model (1) describes light propagation in linearly birefringent fibers [32, 33]. Here ∆β1
is the difference in propagation constants for the two polarization states which are induced by
fiber imperfections or stress. In real fibers, this so-called modal birefringence varies randomly,
resulting in PMD.
We simulate PMD with the coarse-step method, in which continuous variations of the
12
11
Q-factor (dB)
10
9
8
7
6
p
0 ps= km
p
0.1 ps= km
p
0.2 ps= km
5
4
5
10
15
20
25
30
35
40
Ntaps
Fig. 8. The effect of the number of taps on the Q-factor for different values of DPMD . The
power of the signal in the simulation is 0.5 dBm.
birefringence are approximated by a large number of short fiber sections in which the birefringence
is kept constant. PMD is thus emulated in a distributed fashion [34]. We use fixed-length sections
of length 1km, larger than typical fiber correlation lengths. At the beginning of each section,
the polarization is randomly rotated to a new point on the Poincaré sphere. We apply a uniform
random phase in the new reference frame. The latter accounts for the fact that in reality the
birefringence will vary in the sections where it is assumed constant, which will lead to a random
phase relationship between the two polarization components [32]. The differential group delay
(DGD) of each section is selected randomly from a Gaussian distribution. This way artifacts in
the wavelength domain caused by a fixed delay for all sections are avoided [35].
Within each scattering section, the equation (1) without PMD terms is solved using standard
split-step Fourier integration. To speed up the simulations, we employ a CUDA/C++ based
implementation with a MEX interface to Matlab.
The resulting DGD of the fiber is Maxwell distributed [36],
32 ∆t 2
4∆t 2
p h∆t i (∆t) = 2
exp −
.
(23)
π h∆ti 3
πh∆ti 2
For the
p distribution, the mean is related to the root-mean-square (RMS) delay by
p Maxwell
h∆ti 3π/8 = h∆t 2 i. The average DGD varies with the square root of the fiber length [28],
p
√
h∆ti ∼ h∆t 2 i = DPMD L,
(24)
where DPMD is the PMD parameter. Typical√PMD values for fibers used in telecommunications
range from 0.05 in modern fibers to 0.5 ps/ km.
5.3.2.
PMD impact on NFDM
In this section, we consider polarization effects on the NFT transmission. Since the nonlinear
term in the Manakov equation is invariant under polarization rotations, the equalization can be
done in in the nonlinear Fourier domain (cf. Fig. 2). We use a simple training sequence based
equalization algorithm to compensate linear polarization effects. The samples of the first NFDM
symbol are used as the training sequence. The filter taps of the equalizer are determined using
p
0 ps= km
p
0.2 ps= km
p
0.5 ps= km
No birefringence
12
10
Q-factor (dB)
8
6
4
2
0
-10
-8
-6
-4
-2
0
2
4
6
8
10
P (dBm)
Fig. 9. The effect of PMD √
on PDM-NFDM. We used 13, 25 and 61 taps in the equalizer for
DPMD = 0, 0.2 and 0.5ps/ km, respectively.
least-squares estimation. To obtain the Q-factor we average the BER over 120 random realizations
of PMD for each data point.
Due to its statistical nature, the effects of PMD are often quantified in terms of outage
probabilities. In practice, the system is designed to tolerate a certain amount of PMD, in this case
by fixing the number of taps in the equalizer. When the DGD exceeds this margin, the system is
said to be in outage. We first determine the number of taps to achieve a given outage probability.
Fig. 8 shows the Q-factor as a function of the number of taps for different values of the PMD
parameter. For DPMD = 0 we only have random polarization rotations and no DGD. Hence there
is no interaction between nonlinearity and PMD and we use this case as the reference. The upturn
for a small number of taps is due to the fact that a couple of taps are required to fully compensate
the polarization rotations in presence of noise.
For finite PMD, the curves for different PMD values converge to the same result within error
bars. We can estimate the required number of taps from the Maxwell distribution. In order
for the system to fully compensate PMD in 98.7% of the cases (1.3% outage probability), the
equalization must cover a time interval equal √
to the mean plus 3 standard deviations of the DGD
distribution. For example, for DPMD = 0.1ps/ km this interval corresponds to 12.8ps. Using the
sampling frequency we find that we approximately need 12 taps to converge, consistent with the
figure.
We note that by construction our equalizer also corrects potential phase rotations and therefore
at least part of the nonlinear effects. In order to separate effects due to interaction of nonlinearity
and PMD, we performed a calculation where we reversed the polarization rotations and phases
exactly (instead of using the equalizer), by keeping track of the randomly generated angles and
DGD values in the fiber simulation. We find a small phase rotation consistent with but smaller
than the one reported in [20]. In our case it remains negligible at peak power.
In Fig. 9 we compare the Q-factor as a function of launch power with and without PMD
effects. Here we use the number of taps determined
√ as described above. We observe a penalty of
roughly
0.3dB
at
peak
power
for
D
=
0.2ps/
km relative to the case without PMD (DPMD =
PMD
√
0ps/ km). The penalty is therefore not serious for typical fibers used in telecommunication.
Compared to the case without PMD effects and random birefringence (labeled “no birefringence"),
we find a penalty of roughly 1.2dB at peak power for the case of zero PMD due to the equalization.
6.
Conclusions
In this paper, we have proposed polarization-division multiplexing based on the nonlinear Fourier
transform. NFT algorithms are developed based on the Manakov equations. Our simulations
demonstrate feasibility of polarization multiplexed NFDM transmission over standard single-mode
fiber. The results show that data rates can approximately be doubled in polarization-multiplexed
transmission compared to the single-polarization case. This is an important step to achieve data
rates that can exceed those of conventional linear technology.
Numerical simulations of polarization multiplexed transmission over a realistic fiber model
including randomly varying birefringence and polarization mode dispersion have shown that
penalties due to PMD in real fibers do not seriously impact system performance. Our fiber
simulations are based on the Manakov equations. As a next step, which is beyond the scope of
this paper, the results should be verified experimentally.
The equation governing light propagation of N modes in multi-mode fibers in the strong
coupling regime can be written in the form [37]
∂A
β̄2 ∂ 2 A
2
=j
− jγκ A A,
∂Z
2 ∂T 2
(25)
where A = (A1, . . . , A N )T and β̄2 denotes the average group velocity dispersion. The NFT, as
well as the algorithms presented here, generalize to this equation in a straightforward manner.
Our approach therefore paves the way to combining the nonlinear Fourier transform with
space-division multiplexing.
7.
Acknowledgements
J-W.G. would like to thank Wasyhun A. Gemechu for helpful discussions. H.H. acknowledges
useful discussions with Djalal Bendimerad, Majid Safari, Sergei K. Turitsyn and Huijian Zhang.
| 7cs.IT
|
arXiv:math/0202276v1 [math.NA] 26 Feb 2002
A numerical method for solution of ordinary
differential equations of fractional order
Jacek Leszczynski, Mariusz Ciesielski
Technical University of Czestochowa, Institute of Mathematics & Computer Science,
ul. Dabrowskiego 73, 42-200 Czestochowa, Poland
[email protected], [email protected]
Abstract. In this paper we propose an algorithm for the numerical
solution of arbitrary differential equations of fractional order. The algorithm is obtained by using the following decomposition of the differential
equation into a system of differential equation of integer order connected
with inverse forms of Abel-integral equations. The algorithm is used for
solution of the linear and non-linear equations.
1
Introduction
In opposite to differential equations of integer order, in which derivatives depend
only on the local behaviour of the function, fractional differential equations accumulate the whole information of the function in a weighted form. This is so
called memory effect and has many applications in physics [10], chemistry [5],
engineering [3], etc. For that reason we need a method for solving such equations which will be effective, easy-to-use and applied for the equations in general
form. However, known methods used for solution of the equations have more
disadvantages. Analytical methods, described in detail in [7,12], do not work in
the case of arbitrary real order. Another analytical method [9], which uses the
multivariate Mittag-Leffler function and generalizes the previous results, can be
used only for linear type of equations. On the other hand, for specific differential
equations with oscillating and periodic solution there are some specific numerical
methods [6,13,14]. Other numerical methods [2,4] allow solution of the equations
of arbitrary real order but they work properly only for relatively simple form of
fractional equations.
Let us consider an initial value problem for the fractional differential equation
a1 τ Dtα1 y(t) + a2 τ Dtα2 y(t) + . . . + an τ Dtαn y(t) + an+1 y(t) = f (t)
(1)
connected with initial conditions
y (k) (τ ) = bk ,
(2)
where 0 < t ≤ T < ∞, ai ∈ IR, a1 6= 0, αi ∈ IR+ , i = 1, . . . , n, mi −1 ≤ αi < mi ,
mi ∈ IN, αl > αl+1 for l = 1 , . . . , n−1, bk ∈ IR, k = 0 , . . . , m1 −1, f (t) is a given
function defined on the interval [0, T ], y(t) is the unknown function which is the
solution of eqn. (1).
The fractional derivative operator Dαi is defined in the Riemann-Liouville
sense [12]. We also have other definitions of the operator like Caputo [9],
Grünwald-Letnikov [9], and Weyl-Marchaud [12]. Regarding to the RiemannLiouville operator we can define it as the left-side operator
(a Dtα y)(t)
1
dm
=
Γ (m − α) dtm
Zt
y(ξ)dξ
,
(t − ξ)α−m+1
(3)
a
where a < t ≤ T < ∞, m−1 < α ≤ m, m ∈ IN. In our study, we also use integral
operators defined in the Riemann-Liouville sense [12]. When y(t) ∈ L1 (a, b) and
α > 0 then left-side integral operator is defined as
(a Itα y)(t)
1
=
Γ (α)
Zt
y(ξ)dξ
, t > a.
(t − ξ)1−α
(4)
a
More informations concerning the operators properties one can find in literature [7,9,12]. Applying definitions (3) and (4) we have the following property
(a Dtα y)(t) = Dm (a Itm−α y)(t),
(5)
where Dm represents typical derivative operator of integer order m. According
to [9] in the fractional integrals the composition rule occurs
β
α
a It (a It y(t))
= a Itα+β y(t) = a Itβ+α y(t) = a Itβ (a Itα y(t)) .
(6)
In the general case the Riemann-Liouville fractional derivatives do not commute
(a Dtα (a Dtβ y))(t) 6= (a Dtα+β )(t) 6= (a Dtβ (a Dtα y))(t) .
(7)
Extending our considerations, the integer operator commutes with the fractional
operator
(Dtm (a Dtα y))(t) = (a Dtm+α )(t) ,
(8)
but the opposite property is impossible. The mixed operators (derivatives and
integrals) commute only in the following way
(a Dtα (a Itβ y))(t) = (a Dtα−β )(t) ,
(9)
but they do not commute in the opposite way.
We turn our attention to the composition rule in two following ways. First of
all we found in literature [10,11] the fact, that authors neglect the general property of fractional derivatives given by eqn. (7). Regarding to solution of fractional
differential equations we will apply above properties in the next sections.
2
Mathematical background
In this section we concentrate on describing the method which is decomposition
of fractional differential equation into a system of one ordinary differential equation and inverse forms of Abel-integral equations. We focus on decomposition
ways of arbitrary fractional differential equation (1) with initial conditions (2). In
our considerations we classify the fractional differential equations in dependence
on the fractional derivative occurrence as:
– one-term equations, in which Dα occurs only one,
– multi-term equations, in which Dα occurs much more times.
Corollary 1. An arbitrary one-term equation
a1 τ Dtα y(t) + a2 y(t) = f (t) , 0 ≤ m − 1 ≤ α < m, m ∈ IN ,
(10)
in which a1 6= 0 and initial conditions y (k) (τ ) = bk , (k = 0 , . . . , m − 1) should
be taken into account, can decomposed into the following system
a2
1
m
Dt z(t) = − a1 y(t) + a1kf (t)
P
m−1
(t−τ )
m−α
(0)
z(t)
y (t) = k=0 bk k! k + τ Dt
P
m−1
(t−τ
)
m−α+1
(1)
.
(11)
z(t)
y (t) = k=1 bk k! + τ Dt
...
y (m−1) (t) = bm−1 (t−τ )m−1 + τ D2m−α−1 z(t)
t
(m−1)!
Proof. We use the property (5) and we introduce a new variable z(t) which we
call a temporary function. For such introduction we have
α
τ Dt y(t)
= Dtm z(t) and z(t) = (τ Itm−α y)(t).
The new variable represents the Abel integral equation which solution, found in
literature [12], is the left inverse operator
y(t) = (τ Dtm z)(t).
In dependence on the integer order m we introduce initial conditions bk which
)k
are multiplied by a term (t−τ
k! . The term issues from a kernel of the left-side
Riemman-Liouville operator (3).
⊓
⊔
In the system of eqns. (11), the first equation is the differential equation of m
integer order and the next equations represent inverse forms of Abel-integral
equations. We also found in literature [2,4] different or similar approaches for
solution of the eqn. (10).
In mathematical point of view, more interesting is the second class called
multi-term equations. Let us consider the eqn. (1) with initial conditions (2). As
in previous class we use the rule (5). Following the previous corollary we apply
a system of new variables zi (t) = (τ Itmi −αi y)(t) and we decompose eqn. (1) into
a system of the following equations
a1 Dtm1 z1 (t) + a2 Dtm2 z2 (t) + . . . + an Dtmn zn (t)+
+an+1 y(t) = f (t)
z1 (t) = (τ Itm1 −α1 y)(t)
.
(12)
z2 (t) = (τ Itm2 −α2 y)(t)
...
zn (t) = (τ Itmn −αn y)(t)
Such system is not a final form and requires additional transformations. In multiterm class we distinguish two sub-classes depending on αi or follows the decomposition on mi :
– independent subclass, in which mi are different derivatives orders of integer
type mi 6= mi+1 for i = 1, . . . , n − 1,
– dependent subclass, in which one can find some dependence between the
derivatives order of integer type, e.g. m1 = m2 = m3 or m1 = m4 , etc.
Proposition 1. Taking into consideration the independent subclass it is possible
to formulate the unique solution of eqn. (12) in the following form
m1
m2
mn
1
Dt z1 (t) = − a1 1(a2 Dt z2 (t) + . . . + an Dt zn (t)) +
+ a1 (−an+1 y(t) + f (t))
m1 −m2 −α1 +α2
z
(t)
=
D
z1 (t)
2
0
t
m1 −m3 −α1 +α3
z
(t)
=
D
z
3
0
1 (t)
t
...
.
(13)
zn (t) = 0 Dtm1 −mn −α1 +αn z1 (t)
y (0) (t) = Pm1 −1 b (t−τ )k + Dm1 −α1 z (t)
0 t
1
k
k=0
k!
Pm
(t−τ )k
m1 −α1 +1
1 −1
(1)
z1 (t)
y (t) = k=1 bk k! + 0 Dt
.
.
.
(t−τ )m1 −1
y (m1 −1) (t) = b
+ D2m1 −α1 −1 z (t)
m1 −1 (m1 −1)!
0
t
1
Proof. In this proof we try to show a dependence of temporary functions zi (t)
(i = 2, ..., n) on the temporary function z1 (t). We assume, that initial conditions
bk = 0. In such way we can easily construct the proof. We observe that the Abel
integral operators in (12) have the order 0 < mi − αi < 1. We consider the
inverse form of such operators and for two operators we have
β
τ Dt z2 (t)
= τ Dtγ z1 (t),
(14)
where 0 < β < 1 and 0 < γ < 1 respectively. Using the property (5) we obtain
Dt1 (τ It1−β z2 (t)) = Dt1 (τ It1−γ z1 (t)).
Neglecting the operator Dt1 we can obtain the following formula
1−β
z2 (t)
τ It
= τ It1−γ z1 (t) + C1,2 ,
(15)
where C1,2 is an arbitrary constant. Additionally, we multiply the operator τ Itβ
for eqn. (15) and applying the property (6) we obtain
1
τ It z2 (t)
= τ It1−γ+β z1 (t) + τ Itβ C1,2 .
(16)
Differentiating both sides by the operator Dt1 and applying the property (9) (see
literature [7,9]) we obtain the final dependence
z2 (t) = τ Dtγ−β z1 (t) + C1,2 ·
β
.
Γ (1 + β) · t1+β
(17)
In general way we state that zi (t) (i = 2, ..., n) depends on z1 (t) together with
additional term represented by the constants C1,i .
⊓
⊔
Proposition 2. All constants C1,i = 0 (i = 2, ..., n) in eqn. (17) are equaled to
zero for τ = 0.
Proof. Taking into consideration the formula (17) we can calculate the constants
C1,i =
Γ (1 + β) · t1+β
· zi (t) − τ Dtγ−β z1 (t) .
β
Additionally, putting the initial condition t = τ = 0 we obtain all C1,i = 0.
⊓
⊔
Remark 1. According to previous considerations, the initial conditions for temporary functions zi (t) satisfy the following dependence
zi (τ = 0) = 0, i = 1, . . . , n .
(18)
In practical point of view given by formula (18), we can solve ordinary differential
equation of integer type with variable coefficients under zeros initial conditions
of temporary functions zi (t).
Let us consider the next subclass of a fractional differential equation. We
assume, that some integer orders mi are the same. This may happen in the
case when some αi and αi+1 , (i = 1, . . . , n − 1) belong to the same integer
values mi = mi+1 . We introduce a parameter r which denotes a number of
temporary functions having the same derivative operator Dm1 of integer type.
If m1 = m2 = . . . = mr for different temporary functions zi (t), (i = 1, . . . , r)
then it can express the functions zi (t), (i = 2, . . . , r) through the z1 (t) function.
It may observe a relationship in eqn. (13) for z2 (t) and z1 (t) functions respectively z2 (t) = τ Dtm1 −m2 −α1 +α2 z1 (t). We assume an equalities of the integer
orders m1 = m2 . The previous relationship becomes z2 (t) = τ Dt−α1 +α2 z1 (t).
Following the property (τ Dt−α y)(t) = (τ Itα y)(t) we have zi (t) = τ Itα1 −αi z1 (t),
(i = 2, . . . , r). In the ordinary differential equation presented in the system (13)
we change all zi (t), (i = 2, . . . , r) which depends on z1 (t). Moreover, we introduce
a new temporary function in the following form
w(t) = z1 (t) +
a2 α1 −α2
ar α1 −αr
z1 (t) + . . . +
z1 (t).
τI
τI
a1 t
a1 t
(19)
We need to find an inverse form of eqn. (19) as
z1 (t) = (1 +
a2 α1 −α2
ar α1 −αr −1
+ ...+
) w(t) ,
τI
τI
a1 t
a1 t
(20)
where (1 + aa21 τ Itα1 −α2 + . . . + aar1 τ Itα1 −αr )−1 denotes the left inverse operator to
the operator (1+ aa21 τ Itα1 −α2 +. . .+ aar1 τ Itα1 −αr ). We can apply the known Laplace
transform for eqn. (19) that to find the left inverse operator in expression (20).
The formula (20) is not suitable for practical purposes and computations.
Proposition 3. Connecting expressions (13) and (19)÷(20), the solution of the
second subclass of the fractional differential equation is presented as follows:
m1
m
Dt w(t) = − a11 (ar+1 Dt r+1 zr+1 (t) + . . . +
m
n
+an Dt zn (t) + an+1 y(t)) + a11 f (t)
z1 (t) = (1 + a2 0 I α1 −α2 + . . . + ar 0 I α1 −αr )−1 w(t)
t
t
a1
a1
m1 −mr+1 −α1 +αr+1
z
(t)
z
(t)
=
D
1
r+1
0
t
...
.
(21)
zn (t) = 0 Dtm1 −mn −α1 +αn z1 (t)
k
P
m1 −1
(t−τ )
m1 −α1
(0)
z1 (t)
y (t) = Pk=0 bk k! k + 0 Dt
m
−1
(t−τ
)
m1 −α1 +1
1
(1)
+
D
z1 (t)
b
y
(t)
=
0 t
k
k=1
k!
.
.
.
(m1 −1)
)m1 −1
2m1 −α1 −1
z1 (t)
y
(t) = bm1 −1 (t−τ
(m1 −1)! + 0 Dt
We do not need to proof the above proposition because it was done in the
previous subclass of the multi-term class.
3
Numerical treatment and examples of calculations
In this section we propose an explicit numerical scheme. For numerical solution
of the differential equation of integer order we apply one-step Euler’s method [8].
There is no limits to extend above approach to the Runge-Kutta method. According to results presented by Oldham and Spanier [7] we use numerical scheme
for integral operator as
i−1
α
X
h
α
z0 (iα − (i − 1)α ) + zi +
zi−j ((j + 1)α − (j − 1)α ) ,
0 It zi =
2Γ (1 + α)
j=1
(22)
which is valid for arbitrary α > 0. We also use an algorithm given by Oldham
and Spanier [7] for numerical differentiation. The algorithm depends on α range.
For 0 ≤ α < 1 we have
i−1
−α
X
h
α
(1 − α)z0 +
(zi−j − zi−(j+1) ) ((j + 1)1−α − j 1−α ) .
0 Dt z i =
Γ (2 − α)
iα
j=0
(23)
In literature [7] one may find the algorithm for highest values.
For limited practical solution of eqn. (20) we found in literature Babenko’s
method [1]. In general form of eqn. (20) we cannot consider the left inverse operator. For that, we found only a simplified formula limited to the two fractional
orders α1 , α2 , which binomial expansion we can show as
z1i =
∞
X
(−1)j (
j=0
a2 j (α1 −α2 )j
) ·I
wi .
a1
(24)
For some comparison we select the most popular fractional differential equation in literature [9]
a ·0 Dt2 y(t) + b ·0 Dt1.5 y(t) + c · y(t) = f (t)
(25)
called the Bagley-Torvik equation. Fig. 1a presents the qualitative comparison
of the numerical solution generated by our method with the
analytical solution.
8 for 0 ≤ t < 1
We assume: a = 1, b = 0.5, c = 0.5, the function f (t) =
and
0 for 1 < t < ∞
8
4
numerical results
Podlubny's work
Mittag-Leffler function
6
3
2
K
K
K
K
4
1
2
y(t)
y(t)
0
0
-1
-2
-2
-3
-4
-4
0
2
4
6
8
10
t
12
14
16
18
20
0
2
4
6
8
10
t
12
14
16
18
20
Fig. 1. Solution of the Bagley-Torvik equation:
a) comparison of our results with the analytical solution [9] and with Podlubny’s
work [9],
b) numerical solution of the non-linear form of Bagley-Torvik equation.
initial conditions y(0) = 0, y ′ (0) = 0 respectively. The analytical solution one
may find in [9]. We also found a simple way of solution created in Podlubny’s
work [9]. Fig. 1a certifies that our numerical results behave good in comparison to
the analytical solution. The great advantage would be the apply of our approach
to the non-linear form of fractional differential equation. Let us consider the
non-linear form of the fractional differential equation
2
0 Dt y(t)
+ 0.5 · 0 Dt1.5 y(t) + 0.5 · y 3 (t) = f (t)
(26)
8 for 0 ≤ t < 1
with initial conditions y(0) = 0, y ′ (0) = 0. This
0 for 1 < t < ∞
is the Bagley-Torvik equation where non-linear term y 3 (t) is introduced. Fig. 1b
where f (t) =
shows a behaviour of the numerical solution of eqn. (26). We can see that the
step h has strong influence to the solution y(t). Non-linear fractional differential
equations need some computational tests that to choose right value of the step.
4
Conclusions
In this paper we propose a new method for the numerical solution of arbitrary
differential equations of fractional order. Following to Blank’s results [2] the main
advantage of the method is a decomposition of fractional differential equation
into a system composed with one ordinary differential equation of integer order
and the left inverse equations of the Abel-integral operator. We distinguish two
classes of such system: one-term fractional derivative and multi-term fractional
derivatives. The comparison certifies that our method gives quite good results.
Summarizing these results, we can say that the decomposition method in its
general form gives a reasonable calculations, is the effective method and easy to
use and is applied for the fractional differential equations in general form.
References
1. Babenko Yu. I.: Heat and Mass Transfer, Khimiya, Leningrad (1986) (in Russian)
2. Blank L.: Numerical Treatment of Differential Equations of Fractional Order, Numerical Analysis Report 287, Manchester Centre for Computational Mathematics,
Menchester (1996), pp. 1-16
3. Carpinteri A. and Mainardi F. (eds.): Fractals and Fractional Calculus in Continuum Mechanics, Springer Verlag, Vienna - New-York, (1997)
4. Diethelm K.: An algorithm for the numerical solution of differential equations of
fractional order, Elec. Transact. Numer. Anal. 5 (1997), pp. 1-6
5. Goto M. and Oldham K.B.: Semiintegral electroanalysis: shapes of the neopolarogeographic plateau, Anal. Chem., 61, (1975), pp. 361-365
6. Konguetsof A. and Simons T.E.: On the construction of exponentially fitted methods for the numerical solution of the Schrodinger equation, Journal of Computational Methods in Sciences and Engineering, 1, (2001), pp. 143-160
7. Oldham K. B. and Spanier J.: The fractional Calculus, Academic Press, New York
and London (1974)
8. Palczewski A.: Ordinary differential equations, WNT, Warsaw (1999)(in Polish)
9. Podlubny I.: Fractional Differential Equations, Academic Press, San Diego (1999)
10. Riewe F.: Nonconservative Lagrangian and Hamiltonian mechanics, Phys. Rev. E
53(2) (1996) pp. 1890-1899
11. Riewe F.: Mechanics with fractional derivatives, Phys. Rev. E 55(3) (1997),
pp. 3581-3592
12. Samko S. G., Kilbas A. A. i Marichev O. I.: Integrals and derivatives of fractional
order and same of their applications, Gordon and Breach, London (1993)
13. Simons T.E.: On finite difference methods for the solution of the Schrodinger equation, Computers & Chemistry 23 (1999), pp. 513-555
14. Simons T.E.: Atomic structure computations in chemical modelling: Applications
and theory (Ed.: A. Hinchliffe, UMIST) The Royal Society of Chemistry, (2000),
pp. 38-142
| 5cs.CE
|
Adaptive Computation of the Klee’s Measure
in High Dimensions
Jérémy Barbay1 , Pablo Pérez-Lantero2 , and Javiel Rojas-Ledesma1?
1
arXiv:1505.02855v2 [cs.DS] 2 Oct 2015
2
Departmento de Ciencias de la Computación, Universidad de Chile, Chile
[email protected], [email protected].
Escuela de Ingenierı́a Civil Informática, Universidad de Valparaı́so, Chile.
[email protected].
Abstract. The Klee’s Measure of n axis-parallel boxes in Rd is the
volume of their union. It can be computed in time within O(nd/2 ) in
the worst case. We describe three techniques to boost its computation:
one based on some type of “degeneracy” of the input, and two ones
on the inherent “easiness” of the structure of the input. The first technique benefits from instances where the Maxima of the input is of small
size h, and yields a solution running in time within O(n log2d−2 h +
hd/2 ) ⊆ O(nd/2 ). The second technique takes advantage of instances
where no d-dimensional axis-aligned hyperplane intersects more than k
boxes in some dimension, and yields a solution running in time within
O(n log n+nk(d−2)/2 ) ⊆ O(nd/2 ). The third technique takes advantage of
instances where the intersection graph of the input has small treewidth ω.
It yields an algorithm running in time within O(n4 ω log ω+n(ω log ω)d/2 )
in general, and in time within O(n log n + nω d/2 ) if an optimal tree decomposition of the intersection graph is given. We show how to combine
these techniques in an algorithm which takes advantage of all three configurations.
1
Introduction
The Klee’s Measure of a set of n axis-parallel boxes in Rd is defined as
the volume of the union of the boxes in the set [8]. Its computation was first
posed by Victor Klee in 1977 [20], who originally considered the measure for
intervals in the real line. Bentley [8] generalized the problem to d dimensions and
described an algorithm running in time within O(nd−1 log n). Several years later,
Overarms and Yap [23] described a solution running in time within O(nd/2 log n),
which remained essentially unbeaten for more than 20 years until 2013, when
Chan [12] presented an algorithm running in time within O(nd/2 ). We consider
that, additionally, a d-dimensional domain box Γ is given, making the objective
to compute the Klee’s Measure within Γ .
Some special cases of this problem have been studied, such as the Hypervolume problem, where boxes are orthants of the form {(x1 , . . . , xd ) ∈ Rd |
?
Corresponding Author
2
(x1 ≤ α1 ) ∧ . . . ∧ (xd ≤ αd )}, each αi being a real number, which can be solved
in time within O(nd/3 polylog n); and Cube-KMP [2,10], when the boxes are hypercubes, which can be solved in running time within O(n(d+1)/3 polylog n) [12].
Yildiz and Suri[26] considered k-Grounded-KMP, the case when the projection of the input boxes to the first k dimensions is an instance of Hypervolume. They described an algorithm to solve 2-Grounded in time within
O(n(d−1)/2 log2 n), for any dimension d ≥ 3.
The best lower bound known for the computational complexity of the Klee’s
Measure problem in the worst case over instances of size n is within Ω(n log n),
so far tight only for dimensions one and two [16] as the best known upper bound
is O(nd/2 ) in dimension d. Chan [11] conjectured that no ‘purely combinatorial’
algorithm computing the Klee’s Measure in dimension d exists running in
time within O(nd/2−ε ) for any ε > 0. He proved that if the d-dimensional Klee’s
Measure problem can be solved in time Td (n), then one can decide whether an
arbitrary n-vertex graph G = (V, E) contains a clique of size d in time within
O(Td (O(n2 ))). The current best combinatorial algorithm for finding k-cliques in
a graph, requires near-O(nk ) time, and hence the conjecture.
In an adaptive analysis, the cost of an algorithm is measured as a function of,
not just the input size, but of other parameters that capture the inherent simplicity or difficulty of an input instance [1]. An algorithm is said to be adaptive if
“easy” instances are solved faster than the “hard” ones. There are adaptive algorithms to solve classical problems such as Sorting a permutation [22], Sorting
a multiset [5], computing the Convex Hull [19] of a set of points in the plane
and in 3-space, and computing the Maxima of a set of d-dimensional vectors [18].
There are also adaptive algorithms for the Maximum Weight Box problem [6],
of particular interest since, for any dimension d ≥ 2, the Maximum Weight
Box problem can be reduced to an instance of the Klee’s Measure problem
in 2d dimensions.
Even though the asymptotic complexity of O(nd/2 ) is the best known so far
for the Klee’s Measure problem [12], there are many cases which can be solved
in time within O(n lg n) (see Figures 1 and 3 for some examples). Some of those
“easy” instances can be mere particular cases, some others can be hints of some
hidden measures of difficulty of the Klee’s Measure problem.
Hypothesis: There are such difficulty measures that gradually separate instances of the same size n into various classes of difficulty; from easy ones solvable in time within O(n log n), to difficult ones which the best known algorithm
solves in time within O(nd/2 ).
Results: We describe three techniques to boost the computation of the Klee’s
Measure on “easy” instances, and analyze each in the adaptive model. For each
technique, we identify a proper difficulty measure, which models the features
which the technique is taking advantage of. The first technique is the simplest,
taking advantage of degenerated instances, while the second and third ones are
more sophisticated.
3
x2
x2
Γ
Γ
x3
x1
(a)
x1
(b)
Fig. 1: Two ‘easy’ instances of the Klee’s Measure problem: red dashed boxes
in (a) can be removed without affecting the Klee’s Measure within the domain
Γ , yielding a much smaller instance to solve; while the instance in (b) belongs
to the family of instances which intersection graph is a tree (a path in this
particular case), that can be solved in time within O(n log n) by a divide-andconquer algorithm.
The first technique (described in Section 2) is related to a classical problem in Computational Geometry: the computation of the Maxima of a set of
vectors. A vector in a set T ⊂ Rd is called maximal if none of the remaining
vectors in T dominates it in every component. The Maxima of T (denoted by
M (T )) is the set of maximal elements in T . In 1985, Kirkpatrick and Seidel [18]
gave an output-size sensitive algorithm for this problem, running in time within
O(n logd−2 h), where h is the size of the Maxima. We extend the concept of
Maxima to the sets of boxes, and describe an algorithm computing the Klee’s
Measure in time within O(n log2d−2 h + hd/2 ) ⊆ O(nd/2 ), where h denotes the
size of the Maxima of the input set.
The second technique (described in Section 3) is based on the profile k of the
input set, which D’Amore et al. [13] defined as the minimum, over all dimensions
i, of the maximum number of boxes intersected by a same axis aligned hyperplane orthogonal to i. The algorithm described by Chan [12] to compute the
Klee’s Measure is in fact sensitive to a difficulty measure based on a slightly
weaker definition of the profile. We improve on this by describing an algorithm to
compute the Klee’s Measure in time within O(n log n+nk (d−2)/2 ) ⊆ O(nd/2 ),
where k is the profile of the input set.
The third technique (described in Section 4) is based on the treewidth of the
intersection graph of the input set. The intersection graph of a set of boxes is a
graph G where the vertices are the boxes, and where two boxes are connected
by an edge if and only if they intersect. The treewidth ω of a graph measures
how “close” the graph is to a tree. This technique yields a solution running in
time within O(n log n + nω d/2 ) if a tree decomposition of the intersection graph
of the input set is given; and a solution running in time within O(n4 ω log ω +
n(ω log ω)d/2 ) if only the boxes are given.
4
In Section 5, we discuss how to compare and combine these three techniques,
and in Section 6 we describe some potential directions for future work.
2
Maxima Filtering
Our first technique considers the Maxima of the input set of boxes to take
advantage of instances where many boxes can be “filtered out” in small time. A
box in a set B is called maximal if none of the remaining boxes in B completely
contains it. The Maxima M (B) of B is the set of maximal elements in B. One
can observe that, by definition, elements not in the Maxima of an input set
of the Klee’s Measure problem can be removed from the input set without
affecting the value of the Klee’s Measure.
Algorithm 1 takes advantage of this fact to compute the Klee’s Measure
in time sensitive to the size of the Maxima of the input set.
Algorithm 1 maxima adaptive measure
Input: A d-dimensional domain box Γ , and a set of n d-dimensional boxes B
Output: The Klee’s Measure of B within Γ
1: Compute M (B), the Maxima of B
2: return SDC(Γ, M (B))
Overmars [24] showed that if the Maxima of a set of n d-dimensional
vectors can be computed in time Td (n), then the Maxima of a set of n boxes
can be computed in time within O(T2d (n)). To prove this, Overmars [24] expressed each box bi = [li,1 , ui,1 ] × . . . × [li,d , ui,d ] as a 2d dimensional vector
b~i = (−li,1 , ui,1 , . . . , −li,1 , ui,d ). Note that if bi , bj are boxes, then bi dominates
bj if and only if b~i dominates b~j . We use this result to show in Lemma 1 that
the Klee’s Measure can be computed in running time sensitive to the size of
Maxima of the input.
Lemma 1. Let B be a set of n boxes in Rd and Γ a d-dimensional box. The
Klee’s Measure of B within Γ can be computed in time within O(n(log h)2d−2 +
hd/2 ), where h is the size of the Maxima M (B) of B.
Proof. Algorithm 1 achieves the bound given in the lemma: as a consequence
of Overmars’ result [24], the Maxima M (B) of B is computed in step one in
time within O(n log2d−2 h) using the output-size sensitive algorithm described by
Kirkpatrick and Seidel [18]; in the second step, the Klee’s Measure of M (B),
of size h, is computed in time within O(hd/2 ) using the algorithm proposed by
Chan [12]. The result follows.
t
u
Note that in the bound from the Lemma 1, the base with exponent d/2 is h,
instead of n as in the bound O(nd/2 ) for the running time of SDC. In degenerated
5
instances, where h is significantly smaller than n, the bound from Lemma 1 is
significantly better than O(nd/2 ).
One way to further improve this result is to remove dominated elements
at each recursive call of Chan’s algorithm [12]: we discuss the difficulties in
analyzing this approach in Section 6. In the next section we describe another
boosting technique, which still reduces to Chan O(nd/2 )’s algorithm, but is less
focused on degenerated instances.
3
Profile-based Partitioning
The i-th profile ki of a set of boxes B is defined as the maximum number of boxes
intersected by any hyperplane orthogonal to the i-th dimension. The profile k
of a set of boxes is defined as k = mini∈[1..d] {ki }. D’Amore et al. [13] showed
how to compute it in linear time (after sorting the boxes in each dimension). We
make the observation that Chan’s algorithm [12] for this problem is adaptive
to a measure slightly different to the profile (and weaker than it); and improve
on this result by describing a technique which yields a solution sensitive to the
profile of B.
3.1
Intrinsic Adaptivity of Chan’s Algorithm
The Simplify, Divide and Conquer algorithm (SDC for short) proposed by Chan [12]
to compute the Klee’s Measure, already behaves adaptively in the sense that
it runs faster on some large families of instances. Let the quasi-profile κ of a set
of boxes be defined as κ = max{ki | i ∈ [1..d]}, where ki denotes the i-th profile.
Observation Let B be a set of boxes having quasi-profile κ within a domain
box Γ . Algorithm SDC computes the Klee’s Measure of B within Γ in time
within O(n log n + nκ(d−2)/2 )
The proof of this observation is quite technical and long. Since the result in
next section subsumes this one, and the analysis there is considerably simpler,
we omit the proof of this observation.
An example of the class of instances with small quasi-profile is illustrated in
Figure 1b. In the next subsection, we describe a slightly modified version of the
algorithm SDC which runs in time sensitive to the profile k of B rather than its
quasi-profile κ, an improvement since k ≤ κ on all instances.
3.2
Profile-based partitioning
Let B be a set of boxes with profile k, and Γ a domain box. Given the profile k of
B, Algorithm 2 splits Γ into m ∈ O(n/k) slabs Γ1 . . . Γm , such that the measure
of B within Γ is equal to the summation of the measures of B within Γ1 , . . . , Γm ,
respectively. The algorithm performs a plane sweep by one of the dimensions with
the smallest profile and cuts the domain by a hyperplane every 2k endpoints.
6
Algorithm 2 split-domain
Input: A domain Γ , a set of n boxes B, and the profile k of B
Output: A partition of Γ into m slabs, intersecting each one O(k) boxes.
1: let i be a dimension where the i-th profile ki of B equals k
2: for j = 1, 2, . . . , m ∈ O(n/k) do
3:
let p ← (2k × j)-th endpoint of B within Γ
4:
split Γ into {ΓL , ΓR } by the hyperplane xi = p
5:
let Γj ← ΓL , and Γ ← ΓR
6: return {Γ1 , . . . , Γm }
By computing the Klee’s Measure of B within each Γi , and summing up all
those values, one can compute the Klee’s Measure of B within Γ .
Each of the slabs into which Γ is divided in Algorithm 2 can intersect at most
O(k) boxes of B: by definition of the profile, at most O(k) boxes can intersect
the boundaries of the slab, and since each slab contains at most 2k endpoints,
no more than O(k) boxes can completely lie in its interior. This can be used to
bound the running time of the computation of the Klee’s Measure of B.
Lemma 2. Let B be a set of n boxes in Rd , Γ be a d-dimensional domain box,
and k denote the profile of B. The Klee’s Measure of B within Γ can be
d−2
computed in time within O n log n + nk 2 .
Proof. Using Algorithm 2, one can split the domain into O(n/k) slabs in linear
time after sorting the input. The measure within each slab can be computed in
time within O(k d/2 ) using the algorithm SDC. The result follows.
t
u
Note that again in the bound from Lemma 2, the value with d in the exponent
is the profile k ∗ , instead of the size of the set n. Over instances with small profile
k ∗ (like the ones in the class illustrated in Figure 1b), the bound from Lemma 2
is significantly better than the upper bound O(nd/2 ) for the running time of
SDC. In the next section, we describe a technique, based on the treewidth of the
intersection graph of the input set, a measure that captures how “close” a graph
is to a tree. This technique takes advantage of inputs where the intersection
graph is of small treewidth.
4
Intersection Graph’s Treewidth
In instances such as the one described in Figure 1b, where the intersection graph
is a tree, a minor variant of SDC performs in time within O(n log n) independently
of the dimension d. The concept of treewidth was discovered independently several times under different names (for a nice introduction, see Sections 10.4 and
10.5 of Kleinberg and Tardos’ book [21]). Many graph problems that are NPhard for general graphs can be solved in polynomial time for graphs with small
treewidth. For example, Arnborg and Proskurowski [4] showed that for most
7
NP-hard problems that have linear time algorithms for trees, there are algorithms solving them in time linear in the size of the graph but exponential or
super-exponential in the treewidth. They illustrated the idea with classical optimization problems involving independent sets, dominating sets, graph coloring,
Hamiltonian circuits and network reliability.
In this section we describe how to generalize this behavior to instances with
a more general intersection graph, taking advantage of the treewidth [21] of this
intersection graph. We recall the definition and some basic results on treewidth
in Section 4.1, to apply them to the computation of the Klee’s Measurein
Section 4.2.
4.1
Preliminaries
The most widely used treewidth definition, based on tree decompositions, was
introduced by Robertson and Seymour [25].
Definition 1. A tree decomposition of a graph G = (V, E) is a pair ({Xi |i ∈
I}, T = (I, F )), with {Xi |i ∈ I} a family of subsets of V and T a tree, such that:
S
– (Node coverage) i∈I Xi = V ,
– (Edge coverage) for all hu, vi ∈ E, there is an i ∈ I with u, v ∈ Xi , and
– (Coherence) if v ∈ Xi ∩ Xj , then for all k in the simple path from i to j in
T we have v ∈ Xk .
One refers to the elements of I as nodes, and to the elements of V as vertices.
The width of a tree decomposition ({Xi |i ∈ I}, T = (I, F )) is maxi∈I |Xi | − 1.
A tree decomposition of G is called optimal if its width is the minimum width
among all tree decompositions of G. The treewidth ω of a graph G is the width
of an optimal decomposition of itself. (see Figure 2 for an illustration of tree
decompositions and treewidth).
8
5 7
1
4
3
1
6
5,6,
7,8
7
6
2
2
5
3
8
4
(a)
(b)
1,2,
5,6
3,4,
5,6,
(c)
Fig. 2: Tree decomposition: (a) a set of boxes; (b) the intersection graph of the
set; and (c) an optimal tree decomposition of the graph, with treewidth ω = 2
If Ti is a sub-graph of T , we use Vi to denote the vertices associated with the
nodes in Ti , and GVi to denote the sub-graph of G induced by Vi .
8
Property 1. [21] Let k be a node of T and suppose that T − k has components T1 , T2 , . . . , Td . Then, the sub-graphs GV1 \Xk , GV2 \Xk , . . . , GVd \Xk have no
vertices in common, and there are no edges between them.
A tree decomposition ({Xi | i ∈ I}, T = (I, F )) is nonredundant if there is
no edge hi, ji in T such that Xi ⊆ Xj . There is a simple procedure to make any
tree decomposition be nonredundant without affecting the width: if there is an
edge hi, ji in T such that Xi ⊆ Xj , one can contract the edge by ‘folding’ the
node i into j; by repeating this process as often as necessary, one ends up having
a nonredundant tree decomposition.
Property 2. [21] Any nonredundant tree decomposition of an n-vertex graph
has at most n nodes.
It is NP-hard to determine the treewidth of a given graph. Furthermore, there
is no known algorithm to compute a constant-factor approximation of an optimal
tree decomposition in polynomial time. The best polynomial
time approxima√
tion algorithms for tree decompositions are a O(ω log ω)-factor approximation
algorithm running in time within nO(1) described by Feige et al. [15]; and a
O(ω log ω)-factor approximation algorithm running in time within (n4 ω log ω)
described by Amir [3]. If the treewidth is known to be constant, then a (3ω + 4)approximation can be computed in time within O(2O(ω) +n log n), and a (5ω+4)approximation can be computed in time within O(2O(ω) + n), using two algorithms described by Bodlaender et al. [9] respectively.
4.2
An algorithm sensitive to the intersection graph’s treewidth
Here we describe an algorithm which benefits from instances that have an intersection graph with small treewidth. We will say that a set of boxes has treewidth
ω if its intersection graph has treewidth ω.
Intuitively, consider a set of n boxes with a tree T as intersection graph. Its
Klee’s Measure can be computed in a divide-and-conquer fashion: reduce the
problem to two sub-problems by dividing the intersection graph, via a vertex
removal, into two sub-trees T1 , T2 of roughly equal sizes; solve each problem
independently; and then combine their solutions. Since the intersection graph is
a tree, one can always find a vertex v that divides the tree into two forests of size
at most bn/2c; by adding v back to both forests we obtain T1 , T2 of size at most
d(n + 1)/2e. The Klee’s Measure of the original instance is the sum of the
Klee’s Measure of each sub-instance minus the measure of their intersection,
which is the volume of the box (vertex) used to split. This procedure yields an
algorithm running time within O(n log n).
This procedure can be extended to the computation of the Klee’s Measure
of an instance of tree width ω, given a tree decomposition T of its intersection
graph. The following lemma shows how the solutions of two sub-problems can
be combined into the general solution. If t is a node of T , we denote by Bt the
subset of the boxes of B corresponding to the vertices within Xt .
9
Lemma 3. Let T be a tree decomposition of the intersection graph of a set of
boxes B, and t be a node of T such that, when removed, T is split into S
two nonempty sub-forests
F
and
F
.
Let
T
=
F
∪
{t},
T
=
F
∪
{t},
B
=
1
2
L
1
R
2
L
l∈TL Bl ,
S
and BR = r∈TR Br . Then, TL and TR are tree decompositions of BL and BR
respectively; and the Klee’s Measure of B equals the Klee’s Measure of BL
plus the Klee’s Measure of BR minus the Klee’s Measure of Bt .
Proof. By Property 1 we know that F1 and F2 share no vertices, and there is
no edge between them. Hence, no box corresponding to a vertex in a node from
F1 can intersect a box corresponding to a vertex in a node from F2 . Therefore,
the intersection between BL and BR is Bt . This, and the fact that the volume of
a box (i.e., the Klee’s Measure
of a box) is a Lebesgue measure, proves that
S
the Klee’s Measure of BL BR equals the Klee’s Measure of BL plus the
Klee’s Measure of BR minus the Klee’s Measure of Bt . The result follows.
t
u
Using this lemma, we can apply the procedure described above for trees to
general tree decompositions, as in Algorithm 3. Lemma 4 provides an upper
bound for the running time of this new solution.
Algorithm 3 tw measure
Input: A domain box Γ , and set of n boxes B in Rd , and an ρ-node tree decomposition T of the intersection graph of B
Output: The Klee’s Measure of B within Γ
1: if ρ = 1 then
2:
let t ← the only node in T
3:
if the measure of t has not being computed before then
4:
measures[t] ← SDC(Γ, Bt )
5:
return measures[t]
6: else
7:
Find a node t ∈ T that when removed splits T into two sub-forests
{F1 , F2 } of sizes at most dρ/2e
8:
let T1 ← FS
∪ {t}
1 ∪ {t}, T2 ← F2 S
9:
Let BL ← t∈TL Bt , BR ← t∈TR Bt
10:
return tw measure(Γ, BL , TL ) + tw measure(Γ, BR , TR ) − measures[t]
Lemma 4. Let B be a set of n d-dimensional boxes. Let T be a tree decomposition of the intersection graph of B with ρ nodes of sizes n1 , . . . , nρ , respectively.
The Klee’s Measure of B within a given d-dimensional domain box Γ can be
Pρ
d/2
computed in time within O(ρ log ρ + i=1 ni ).
Proof. We show that Algorithm 3 runs in time within the given bound. The
recursion tree corresponding to the algorithm has ρ leaves, and since at each
10
step the size of the problem is approximately reduced by one half, the height is
within O(log ρ). The total running time at each internal level of the tree is within
O(ρ), and hence the ρ log ρ term. Moreover, the Klee’s Measure of the boxes
within each leaf is computed only once, making the total time of computing the
Pρ
d/2
measure of the leaves to be within O( i=1 ni ). The result follows.
t
u
When computing the Klee’s Measure of a set B of boxes, for whose intersection graph is given an optimal tree decomposition, the following result
follows.
Corollary 1. Let B be a set of n d-dimensional boxes, and T be an optimal
non-redundant tree decomposition of the intersection graph of B. The Klee’s
Measure of B within a given d-dimensional domain box Γ can be computed in
time within O(n log n+nω d/2 ), where ω is the treewidth of the intersection graph
of B.
Proof. Let ρ denote the number of nodes in T . By Property 2, we know that,
since T is non-redundant, ρ ≤ n. Besides, each node in the tree decomposition
has at most ω + 1 vertices. The result follows by replacing each ni by ω, for
i = [1..ρ], in Lemma 4.
t
u
Note that the bound O(n log n + nω d/2 ) in Lemma 4 is better than or equal
to O(nd/2 ) as long as ω ≤ n1−2/d . For this bound to be achieved, an optimal
tree decomposition of the intersection graph is required. This decomposition,
in general, needs to be computed, and it is not known whether this can be
performed in polynomial time [21].
Optimal tree decomposition of certain classes of graphs can be found efficiently. The Klee’s Measure of sets with intersection graph in such classes
can be computed in time depending on the treewidth. We describe two examples
of such results in Corollaries 2 and 3.
Corollary 2. Let B = {b1 , b2 , . . . , bn } be a set of n boxes in Rd , Γ be a ddimensional box, and G be the intersection graph of B. The measure of the union
Pρ
d/2
of B within Γ can be computed in time within O(n logd−1 n + i=1 ni ), where
ρ is the number of connected components of G, and n1 , . . . , nρ are the sizes of
the ρ connected components.
Proof. An algorithm described by Edelsbrunner et al. [14] computes the connected components in time within O(n logd−1 n). From the connected components one can easily obtain a tree decomposition of the graph as follows: create
a node for each connected component, and add edges between the nodes until
obtaining any arbitrary tree. By Lemma 4 the bound follows.
t
u
When the profile of the input instance is k, the same bound from Lemma 2
can be achieved by using Algorithm 3, as seen in Corollary 3.
Corollary 3. Let B be a set of n boxes in Rd , Γ be a d-dimensional box, and
k be the profile of B within Γ . The Klee’s Measure of B within Γ can be
d−2
computed in time within O(n log n + (n/k)k 2 ).
11
Proof. We can transform B into a set B 0 with the same Klee’s Measure, but
with treewidth within O(k), as follows: Split the domain into O(n/k) slabs using
Algorithm 2. Then, for each slab, add to B 0 the boxes in B that intersect the
slab, restricted to it (i.e., if a box intersects several slabs, the box will be split
into multiple boxes that intersect only one slab, and such that the union of them
is the original one)
A tree decomposition of the intersection graph of B 0 with O(n/k) nodes of
size within O(k) can be obtained as follows: create a node for each slab, and
add edges between the nodes until an arbitrary tree is obtained. Since no box
can intersect a box out of its slab, the tree decomposition is valid. The bound
follows from applying Lemma 4.
t
u
An approximation of the optimal tree decomposition of the input set could
be used, obtaining the weaker bounds described in Corollary 4.
Corollary 4. Let B be a set of n d-dimensional boxes, and Γ a d-dimensional
domain box. The Klee’s Measure of B within Γ can be computed in time
within O(n4 ω log ω + N (ω log ω)d/2 ).
Proof. The result follows by replacing the ω term in the bound of Lemma 4 by
the O(ω log ω)-factor approximation obtained by Amir’s algorithm [3] (see the
end of Section 4.1 for details).
t
u
Note that the O(n4 ω log ω +n(ω log ω)d/2 ) bound for the general case is lower
than O(nd/2 ) as long as d > 8 (because of the first term) and ω log ω ≤ n(d−2)/d .
In the following section, we compare the techniques we have described so far
and describe how to combine them.
5
Combining the Techniques
A low profile implies that the intersection graph has low treewidth (Corollary 3),
but a low treewidth does not imply a low profile: an instance of n boxes in the
class illustrated in Figure 3b has a profile within O(n), and its treewidth is one.
On the other hand, the running time of the algorithm taking advantage of the
profile is never worth than O(nd/2 ), which is not true for the running time of the
one sensitive to the treewith, even if an optimal tree decomposition is provided
to it.
The treewidth and profile measures are independent from the size of the
Maxima. For example, an instance of n boxes in the class illustrated in Figure 3a has a Maxima of size 1, and its treewidth is n − 1. With respect to the
treewidth, this is a ‘hard’ instance, but with respect to the Maxima size is easy.
On the contrary, an instance of n boxes in the class illustrated in Figure 3b has
a Maxima size of n, whiles its treewidth is one.
Since these two measures are independent, we can combine them to obtain
an algorithm sensitive to both of them, at the same time, by computing the
Maxima of the set; and finding the Klee’s Measure of the Maxima of the
remaining graph as described in Corollary 4. This way of proceeding yields an
algorithm with running time improving over the results from Lemmas 1 and 4.
12
x2
x2
Γ
Γ
x1
x1
(a)
(b)
Fig. 3: Two classes of instances of the Klee’s Measure problem that are “easy”
or “hard” depending on the measure considered: instance (a) is easy if the size of
the Maxima is considered, but difficult if the profile or treewidth are considered;
instance (b) is easy for treewidth, but hard for both Maxima size and profile.
Theorem 1. Let B be a set of n boxes in Rd , Γ a d-dimensional box, and G
be the intersection graph of B. The Klee’s Measure of B within
Γ can be
2d−2
4
d/2
computed in time within O n log
h + h ω log ω + h(ω log ω)
, where h is
the size of the Maxima M (B) of B, and w its treewidth.
No lower bound is known for this problem with respect to these measures. In
fact, we believe the results obtained here can be further improved, by considering
finer versions of the measures in order to improve the analysis. We describe
preliminary results in this direction in the next section.
6
Discussion
Each of the three boosting techniques that we analyzed can be improved, and
we describe preliminary results for each technique in those directions below, as
well as other lines of research.
The Maxima based technique (described in Section 2) yields an algorithm
running in time within O(n(log h)2d−2 +hd/2 ), where h is the size of the Maxima
of the input set. This bound can be improved. For example, if instead of filtering
items not in the Maxima only once, this is done as part of the simplification
step of the algorithm Simplify, Divide and Conquer (SDC) [12], the expression for
h
) + O(n log2d−2 h). This running time
its running time becomes T (n) = 2T ( 22/d
is still within O(nd/2 ) in the worst case, and also within O(n log2d−2 h + hd/2 ).
It is never worse (asymptotically) and it is better in many cases, but how to
formally analyze this improvement is still an open question.
The profile based
technique (described in
Section 3) yields a solution running
d−2
2
in time within O (n − k) log n−k
. The algorithm SDC [12] is already
k + nk
adaptive to the profile of the input set. It has a limitation though: it necessarily
13
cycles over the dimensions in order to ensure running in time within O(nd/2 ).
If there are few dimensions where the profile of the set is small, this technique
performs considerably better than SDC. The technique could be further improved
if, instead of considering an upper bound for the profile in each sub-problem, we
use the exact value of the profile of the subproblem. However, it is not clear how
to analyze this improvement.
The treewidth based technique (described in Section 4) yields an algorithm
running in time within O(n log n+nω d/2 ), if an optimal tree decomposition of the
intersection graph is given; and in time within O(n4 ω log ω+n(ω log ω)d/2 ) if not.
Note that these running time bounds are not always better than or equal to the
O(nd/2 ) achivied by algorithm SDC. The dependence on a tree decomposition
is the main weakness of this approach. It is not known whether the Klee’s
Measure can be computed by using a treewidth-sensitive algorithm that does
not depend explicitly on a tree decomposition of the intersection graph.
Finally, note that the techniques that we described focus on the structure of
the instance, as opposed to the order in which the instance is given. As such,
the algorithms that we described cannot beat the O(n log n) bound, even though
there are instances that can still be solved in time within O(n). If one considers
the order in which the input is given, for special pre-sorted inputs one can achieve
the O(n) bound.
Acknowledgement
All authors were partially supported by Millennium Nucleus Information and
Coordination in Networks ICM/FIC RC130003. We thank Timothy Chan for
his helpful comments, and one anonymous referee from ESA 2015 for pointing
out the relation between our techniques of analysis and the treewidth of the
intersection graph.
References
1. Afshani, P., Barbay, J., Chan, T.M.: Instance-optimal geometric algorithms. In:
Proceedings of the Annual IEEE Symposium on Foundations of Computer Science
(FOCS). pp. 129–138 (2009)
2. Agarwal, P.K.: An improved algorithm for computing the volume of the union
of cubes. In: Proceedings of the Annual Symposium on Computational Geometry
(SoCG). pp. 230–239. ACM, New York, NY, USA (2010)
3. Amir, E.: Approximation algorithms for treewidth. Algorithmica 56(4), 448–479
(2010)
4. Arnborg, S., Proskurowski, A.: Linear time algorithms for NP-hard problems restricted to partial k-trees. Journal of Discrete Applied Mathematics (JDAM) 23(1),
11 – 24 (1989)
5. Barbay, J.: From time to space: Fast algorithms that yield small and fast data
structures. In: Space-Efficient Data Structures, Streams, and Algorithms (IanFest).
pp. 97–111 (2013)
14
6. Barbay, J., Chan, T.M., Navarro, G., Pérez-Lantero, P.: Maximum-weight planar
boxes in O(n2 ) time (and better). Information Processing Letters (IPL) 114(8),
437–445 (2014)
7. Barbay, J., Pérez-Lantero, P., Rojas-Ledesma, J.: Adaptive computation of the
klee’s measure in high dimensions. CoRR abs/1505.02855 (2015), http://arxiv.
org/abs/1505.02855, (Last accessed on 2015-08-28.)
8. Bentley, J.L.: Algorithms for Klee’s rectangle problems. Unpublished notes (1977)
9. Bodlaender, H.L., Drange, P.G., Dregi, M.S., Fomin, F.V., Lokshtanov, D.,
Pilipczuk, M.: A o(cˆk n) 5-approximation algorithm for treewidth. CoRR
abs/1304.6321 (2013), http://arxiv.org/abs/1304.6321, (Last accessed on 201508-22.)
10. Bringmann, K.: An improved algorithm for Klee’s measure problem on fat boxes.
Computational Geometry: Theory and Applications (CGTA) 45(5-6), 225–233
(2012)
11. Chan, T.M.: A (slightly) faster algorithm for Klee’s measure problem. In: Proceedings of the Annual Symposium on Computational Geometry (SoCG). pp. 94–100
(2008)
12. Chan, T.M.: Klee’s measure problem made easy. In: Proceedings of the Annual
IEEE Symposium on Foundations of Computer Science (FOCS). pp. 410–419
(2013)
13. d’Amore, F., Nguyen, V.H., Roos, T., Widmayer, P.: On optimal cuts of hyperrectangles. Computing 55(3), 191–206 (1995)
14. Edelsbrunner, H., Van Leeuwen, J., Ottmann, T., Wood, D.: Computing the connected components of simple rectilinear geometrical objects in d-space. RAIRO Theoretical Informatics and Applications - Informatique Thorique et Applications
18(2), 171–183 (1984)
15. Feige, U., Hajiaghayi, M., Lee, J.R.: Improved approximation algorithms for
minimum-weight vertex separators. In: Proceedings of the annual ACM Symposium on Theory Of Computing (STOC). pp. 563–572. STOC ’05, ACM, New York,
NY, USA (2005)
16. Fredman, M.L., Weide, B.: On the complexity of computing the measure of
∪n
1 [ai , bi ]. Communications of the ACM (CACM) 21(7), 540–544 (Jul 1978)
17. Gavril, F.: The intersection graphs of subtrees in trees are exactly the chordal
graphs. Journal of Combinatorial Theory (JCT), Series B 16(1), 47 – 56 (1974)
18. Kirkpatrick, D.G., Seidel, R.: Output-size sensitive algorithms for finding maximal
vectors. In: Proceedings of the Annual Symposium on Computational Geometry
(SoCG). pp. 89–96 (1985)
19. Kirkpatrick, D.G., Seidel, R.: The ultimate planar convex hull algorithm. SIAM
Journal on Computing (JC) 15(1), 287–299 (Feb 1986)
20. Klee, V.: Can the measure of ∪n
1 [ai , bi ] be computed in less than o(n log n) steps?
The American Mathematical Monthly (AMM) 84(4), 284–285 (1977)
21. Kleinberg, J., Tardos, E.: Algorithm Design. Addison-Wesley Longman Publishing
Co., Inc., Boston, MA, USA (2005)
22. Moffat, A., Petersson, O.: An overview of adaptive sorting. Australian Computer
Journal (AJC) 24(2), 70–77 (1992)
23. Overmars, M.H., Yap, C.: New upper bounds in Klee’s measure problem. SIAM
Journal on Computing (JC) 20(6), 1034–1045 (1991)
24. Overmars, M.H.: On the equivalence of rectangle containment, rectangle enclosure and ECDF-searching. Technical report, University of Utrecht, Department of
Computer Science (01 1981)
15
25. Robertson, N., Seymour, P.: Graph minors. ii. algorithmic aspects of tree-width
7(3), 309 – 322 (1986)
26. Yildiz, H., Suri, S.: On Klee’s measure problem for grounded boxes. In: Proceedings of the Annual Symposium on Computational Geometry (SoCG). pp. 111–120.
ACM, New York, NY, USA (2012)
| 8cs.DS
|
Uplink Coverage Performance of an Underlay
Drone Cell for Temporary Events
(Invited Paper)
Xiaohui Zhou∗ , Jing Guo∗ , Salman Durrani∗ , and Halim Yanikomeroglu†
∗
arXiv:1801.05948v2 [cs.IT] 6 Mar 2018
Research School of Engineering, The Australian National University, Canberra, ACT 2601, Australia.
Emails: {xiaohui.zhou, jing.guo, salman.durrani}@anu.edu.au.
†
Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada.
Email: [email protected].
Abstract—Using a drone as an aerial base station (ABS)
to provide coverage to users on the ground is envisaged as
a promising solution for beyond fifth generation (beyond-5G)
wireless networks. While the literature to date has examined
downlink cellular networks with ABSs, we consider an uplink
cellular network with an ABS. Specifically, we analyze the use of
an underlay ABS to provide coverage for a temporary event, such
as a sporting event or a concert in a stadium. Using stochastic
geometry, we derive the analytical expressions for the uplink
coverage probability of the terrestrial base station (TBS) and
the ABS. The results are expressed in terms of (i) the Laplace
transforms of the interference power distribution at the TBS
and the ABS and (ii) the distance distribution between the ABS
and an independently and uniformly distributed (i.u.d.) ABSsupported user equipment and between the ABS and an i.u.d.
TBS-supported user equipment. The accuracy of the analytical
results is verified by Monte Carlo simulations. Our results show
that varying the ABS height leads to a trade-off between the
uplink coverage probability of the TBS and the ABS. In addition,
assuming a quality of service of 90% at the TBS, an uplink
coverage probability of the ABS of over 85% can be achieved,
with the ABS deployed at or below its optimal height of typically
between 250 − 500 m for the considered setup.
I. I NTRODUCTION
The use of drones as aerial base stations (ABSs), to form
drone cells and to provide flexible and agile coverage, has
gained enormous interest as a potential beyond fifth generation
(beyond-5G) wireless network solution [1, 2]. In [1], eight
scenarios have been identified for drone cell deployment, with
drones providing service to: 1) rural areas, 2) urban areas,
3) users with high mobility, 4) congested urban areas, 5)
congested backhaul, 6) temporary events, 7) temporary blind
spots and 8) sensor networks. For these scenarios, drone
cells have been investigated in the literature from different
perspectives, such as drone channel modeling [3, 4, ?, 4, 6],
drone deployment and optimization of trajectories [7–9, ?–9,
11–14], and performance analysis of drone enabled cellular
systems [15–19]. In this work, we focus on the last aspect.
Motivation: The literature to date [15–19] has focused on
the downlink, generally for Scenarios 1–3. In this work, we
focus on the uplink for Scenario 6, i.e., using ABS to provide
additional coverage for temporary events, such as concerts
This work was supported in part by the Australian Research Council’s
Discovery Project Funding Scheme (Project number DP170100939) and the
Natural Sciences and Engineering Research Council of Canada (NSERC).
or sports events. Such temporary events are happening more
frequently in cities all over the world with very high number of
users gathering, which often leads to network congestion and
poor user experience. The optimal ABS height with respect
to the downlink performance does not necessarily optimize
the uplink performance. For example, the distribution of the
interference powers are different for the uplink and downlink
cases. Moreover, the uplink is the bottleneck in such events
since an increasing number of users try to share content from
the event on social media applications. Therefore, assessing the
usefulness of ABSs to provide uplink coverage for temporary
events is an important open problem in the literature which
has great practical importance as well.
Related Work: The downlink performance of a single static
drone and a single mobile drone with underlay device-todevice users was studied in [15], while [16] analyzed the
downlink coverage of a finite network formed by multiple
drones. The downlink coverage probability of a network with
multiple directional beamforming drones was investigated in
[17]. The downlink coverage performance of a network of
multiple drones in an urban environment was studied in [18].
In [19], the authors studied the downlink in a cellular network
with multiple ground base stations and a drone user equipment
(UE).
Contributions: In this paper, we analyze the use of an ABS
to provide coverage for a temporary event. To the best of our
knowledge, this scenario has not yet been considered in the
literature to date. Using stochastic geometry, we analyze the
uplink coverage probability of the terrestrial base station (TBS)
and the ABS. The novel contributions of this paper are:
• We derive the analytical expressions for uplink coverage
probability of the TBS and the ABS. The results are in
terms of (i) the Laplace transforms of the interference
power distribution at the TBS and the ABS and (ii) the
distance distribution between the ABS and an independently and uniformly distributed (i.u.d.) ABS-supported
user equipment (AsUE) and between the ABS and an
i.u.d. TBS-supported user equipment (TsUE).
• Our results show that increasing the height of the ABS
can generally improve the uplink coverage probability of
the ABS, while it degrades the uplink coverage probability of the TBS. In addition, there is an optimal ABS
height which maximizes the uplink coverage probability
of the ABS.
• We assess the feasibility of establishing an underlay
ABS to provide uplink coverage for temporary events.
Assuming a quality of service of 90% at the TBS, under
our considered system set up, uplink coverage probability
of the ABS of over 85% can be achieved, with the ABS
at or below its optimal height if the center of the stadium
is sufficiently distanced from the TBS.
II. S YSTEM MODEL
We consider the uplink communication in a two-cell network comprised of a TBS and an ABS, where the network
region S1 is a disk with radius r1 , i.e., |S1 | = πr12 and a TBS
is located at the center. We assume that there is a temporary
event held inside a stadium within the network region. The
stadium’s building area S2 is modeled as a disk with radius
r2 and its center is at a distance d from the TBS. To provide
additional resources for the event, an ABS is deployed to act
as an ABS1 . The ABS is assumed to be placed at a height
of h above the center of the stadium, as shown in Fig. 1.
There are Nc TsUEs served by the TBS, which are spatially
distributed according to a Binomial point process (BPP) inside
the network region excluding the stadium, i.e., S1 \ S2 . At
the same time, there are Nd AsUEs on the ground inside the
stadium S2 . For tractability, we assume that all AsUEs are
served by the ABS only. The location of AsUEs is modelled
as an independent BPP in S2 .
Channel Model: There are two types of communication
links in the considered system model: aerial links and terrestrial links. The link between the TsUE and the ABS and the
link between the AsUE and the ABS are aerial links. The link
between the TsUE and the TBS and the link between the AsUE
and the TBS are terrestrial links. For analytical tractability,
similar to [16, 19], we assume the aerial links experience
Nakagami-m fading. The AsUE to ABS link has a strong line
of sight (LOS) with fading parameter mAA while the TsUE
to ABS link has a weak LOS with fading parameter mTA . As
for the terrestrial links, Rayleigh fading is assumed [11].
A general power-law path-loss model is considered2 , in
which the signal power decays at a rate `−α with the propagation distance ` and α is the path-loss exponent. Due
to different characteristics of aerial link and terrestrial link,
different path-loss exponent αTBS , αTA and αAA are assumed
for terrestrial link, aerial link between the TsUE and the ABS,
and aerial link between the AsUE and the ABS respectively.
Furthermore, both the TsUE to TBS link and the AsUE to
ABS link experience additive white Gaussian noise (AWGN)
with variance σ 2 .
Uplink Network Model: For the spectrum efficiency, we assume that both the TBS and the ABS share the same spectrum
resource, i.e., in an underlay fashion. Orthogonal multiple
1 Current
drone regulations prohibit a drone from flying over stadiums or
sports events. This is expected to change in the future.
2 The validity of using this path-loss model for aerial links will be verified in
Section IV by comparing with simulations using air-to-ground channel model
for aerial links.
TBS
TsUE
ABS
AsUE
h
ZT
r1
ZA
d
r2
TBS
TsUE
ABS
AsUE
S1
dT
d
dA
r2
S2
r1
(a) 3D view.
(b) Projection on the ground.
Fig. 1. Illustration of the system model.
access technique is employed in this work. We assume that
the number of the TsUEs and the AsUEs are sufficiently high.
That is to say, there will always be one TsUE and one AsUE
to be served per each channel at the same time. Hence, there
is no interference among TsUEs (or AsUEs), but interference
exists between TsUEs and AsUEs. In this work, we focus our
analysis on one uplink channel since other channels share the
same interference statistics.
For reliable and successful uplink communication, the TsUE
controls its transmit power such that the average signal received at the TBS is equal to the threshold ρT . Power control
is deployed at the AsUE. We also set a maximum transmit
power constraint at the AsUE, to avoid the transmit power for
AsUE going to very large when the ABS is placed at a high
altitude. In other words, the AsUE compensates for the pathloss to keep the average signal power at the ABS equal to
the threshold ρA if the transmit power required for the pathloss inversion is less than Pmax . Otherwise, the AsUE tries to
establish an uplink connection with the ABS by transmitting
with a power of Pmax . Therefore, the instantaneous transmit
power for the AsUE, Pa , depends on the propagation distance
between the AsUE and the ABS and can be shown as (1) at
the top of the next page, where ZA is the Euclidean distance
between the AsUE and the ABS.
SINR: For the considered setup, the instantaneous signal-tointerference-plus-noise ratio (SINR) at the TBS is given as
SINRT =
Pt HT dT−αTBS
ρ T HT
=
,
−αTBS
TBS
2
+
σ
+ σ2
Pa HA d−α
P
H
d
a A A
A
(2)
TBS
where Pt = ρT dα
is the TsUE transmit power. HT and HA
T
are the fading power gain between the TsUE and the TBS and
between the AsUE and the TBS, respectively, which follow
exponential distribution. dT and dA are the Euclidean distance
between the TsUE and the TBS and between the AsUE and
the TBS, respectively. The transmit power of the AsUE Pa is
given in (1).
The instantaneous SINR at the ABS is given as
SINRA =
−αAA
Pa GA ZA
,
Pt GT ZT−αTA + σ 2
(3)
where GA and GT are the fading power gain between the
AsUE and the ABS and between the TsUE and the ABS,
respectively, which follow Gamma distribution. ZA and ZT
are the Euclidean distance between the AsUE and the ABS
and between the TsUE and the ABS, respectively.
Pmax ,
q
1
2
1
1
Pmax αAA
Pmax αAA
2 < h < ( Pmax ) αAA
αAA
(
||
−
r
&
Z
>
(
)
)
)
h > ( Pρmax
A
2
ρA
ρA
ρA
A
q
.
q
Pa =
2
2
1
1
αAA
Pmax αAA
Pmax αAA
Pmax αAA
2 ||
2 < h < ( Pmax ) αAA
ρ
Z
,
h
6
(
)
−
r
(
)
−
r
&
Z
<
(
)
A A
A
2
2
ρA
ρA
ρA
ρA
R √ 2 2 R
h +r2 2π
1
fZA (z)dθdz,
LIT (s, Pmax |θ, z) 2π
h
0
1
Pmax α
R ( ρA ) AA R 2π
1
LIT (s, ρA z αAA |θ, z) 2π
fZA (z)dθdz
h √
0
LIT (s) =
R h2 +r22 R 2π
1
+
LIT (s, Pmax |θ, z) 2π fZA (z)dθdz,
1
0
) αAA
√( Pρmax
A
R h2 +r22 R 2π L (s, ρ z αAA |θ, z) 1 f (z)dθdz,
IT
A
h
2π ZA
0
III. C OVERAGE P ROBABILITY
1
h > ( Pρmax
) αAA
A
q
2
1
) αAA − r22 < h < ( Pρmax
) αAA
( Pρmax
A
A
q
2
h 6 ( Pρmax
) αAA − r22
A
.
(5)
B. ABS Coverage Probability
In this section, we analyze the network performance by
adopting coverage probability as the performance metric. The
coverage probability is formally defined as
Pbcov , Pr(SINRb > γb ),
(1)
(4)
where superscript b is T for TBS and A for ABS, and γb is the
SINR threshold. SINRT and SINRA can be found in (2) and
(3), respectively. The results for the coverage probability of the
TBS and the ABS are presented in the next two subsections.
A. TBS Coverage Probability
First we present two lemmas, which are used in deriving
the coverage probability of the TBS in Theorem 1.
Lemma 1: The Laplace transform of the interference power
distribution at the TBS is given as (5) at the top of the this
page, where
1
.
(6)
LIT (s, p|θ, z) =
sp
1+
αTBS
√
(z2−h2+d2−2 z2−h2 d cos(θ)) 2
Proof: See Appendix 1.
From Lemma 1, we can see that the transmit power of the
AsUE Pa and the distance between the AsUE and the TBS
dA are related to the distance between the AsUE and the ABS
ZA . This important distance distribution is presented in the
following lemma.
Lemma 2: The probability density function (pdf) of the
distance ZA between the ABS at height h above the center of
S2 and an i.u.d. AsUE inside S2 is
q
2z
fZA (z) = 2 , h 6 z 6 r22 + h2 .
(7)
r2
Proof: See Appendix 2.
Theorem 1: Based on the system model in Section II, the
coverage probability of the TBS is
γT 2
σ
LIT (s),
PT
=
exp
−
(8)
cov
ρT
TBS
where IT = Pa HA d−α
, s = γρTT , and LIT (s) is given by
A
Lemma 1.
Proof: See Appendix 3.
Substituting (5) and (7) into (8), we can obtain the coverage
probability of the TBS.
We begin by presenting three lemmas, which will then
be used to compute the coverage probability of the ABS in
Theorem 2.
Lemma 3: The Laplace transform of the interference power
distribution at the ABS is
Z √(r1 −d)2 +h2Z 2π
LIA (s|ω, z)fΩ (ω|z)fZT (z)dωdz
LIA(s) = √
r 2 +h2
2
Z √(r1 +d)2 +h2 Z
+ √
(r1 −d)2 +h2
0
ω
b
LIA (s|ω, z)fΩ (ω|z)fZT (z)dωdz, (9)
−b
ω
where
TA
LIA (s|ω, z) = mm
mTA + sρT z −αTA
TA
−mTA
αTBS
p
2
2
2
2
2
2
.
× z −h +d −2 z −h d cos(ω)
(10)
Proof: The proof follows the same lines as Lemma 1 and
is skipped for the sake of brevity.
The pdf of the distance between the TsUE and the ABS
fZT (z), and the conditional pdf of the angle, fΩ (ω|z), between
the ground projection of ZT and dT are given in Lemma 4
and Lemma 5, respectively.
Lemma 4: The pdf of the distance ZT between the ABS
at height h above the center of S2 and an i.u.d. TsUE inside
S1 \ S2 is
( 2z
p
p
,
r22 +h2 6 z 6 (r1 −d)2 +h2
r12−r22
p
p
fZT(z) =
,
2zb
ω
,
(r1 −d)2 +h2 6 z 6 (r1 +d)2 +h2
π(r12−r22 )
(11)
√
2
2
z −h
where ω
b = arcsec( d22d
).
+z 2 −h2 −r12
Proof: See Appendix 4.
Lemma 5: The pdf of the angle, fΩ (ω|z), between the
ground projection of ZT and dT conditioned on ZT is
(
p
p
1
,
r22 +h2 6 z 6 (r1 −d)2 +h2
2π
p
p
fΩ (ω|z) = 1
.
(r1 −d)2 +h2 6 z 6 (r1 +d)2 +h2
2b
ω,
(12)
Proof: This lemma can be proved by using cosine rule
and simple trigonometry.
R √ 2 2
h +r2 A
Pcov (Pmax |z)fZA (z)dz,
h
1
Pmax α
R ( ρA ) AA A
Pcov (ρA z αAA |z)fZA (z)dz
h √
PA
=
2
2
R
cov
h +r2
PA
+
1
cov (Pmax |z)fZA (z)dz,
Pmax α
) AA
( ρ
√ A
R h2+r22 PA (ρ z αAA |z)f (z)dz,
ZA
cov A
h
1
h > ( Pρmax
) αAA
A
q
.
2
1
2 < h < ( Pmax ) αAA
αAA
)
−r
( Pρmax
2
ρ
A
A
q
2
h 6 ( Pρmax
) αAA − r22
A
1
TBS coverage probability
Coverage probability
1
h=200 m
0.8
0.6
h=500 m
0.4
0.2
0
-20
(13)
TBS coverage probability
ABS coverage probability
Simulation (ATG)
-15
-10
-5
SINR threshold
0
T
,
A
5
(dB)
Pmax=10 dBm
0.7
0.6
0.5
0.4
d=200 m
d=250 m
d=300 m
Pmax=20 dBm
h*=631 m
h*=251 m
300
400
500
600
700
800
ABS height h (m)
Fig. 3. Coverage probability of the TBS versus the height of the ABS
with different distance between the center of the stadium and the TBS
and different maximum transmit power for the AsUE.
Theorem 2: Based on the system model in Section II, the
coverage probability of the ABS is given as (13) at the top of
this page, where
mX
AA −1
(−s)n
exp(−sσ 2 )
n!
n=0
n
X
n
dk
(−σ 2 )n−k k LIA (s),
×
k
ds
0.8
0.3
150
10
Fig. 2. Coverage probability of the TBS and the ABS versus the SINR
threshold γT and γA with different height of the ABS and simulation
with ATG aerial link model.
PA
cov (Pa |z) =
0.9
(14)
k=0
αAA
s = mAA γpA z
and LIA (s) is given by Lemma 3. The pdf
of the distance between the AsUE and the ABS fZA (z) is
provided in Lemma 2.
Proof: See Appendix 5.
Combining Lemma 3, 4, and 5 with Theorem 2, we can
calculate the coverage probability of the ABS.
IV. R ESULTS
In this section, we first validate the analytical results and
then discuss the design insights. The simulation results are
generated by averaging over 106 Monte Carlo simulation runs.
In the simulations, the terrestrial links follow the power-loss
path-loss model described in Section II. However, the aerial
links follow the air-to-ground (ATG) channel model in [15]
with C = 4.88, B = 0.43 and η = −20 dB. Unless stated
otherwise, we set the parameters as follows: r1 = 500 m,
r2 = 100 m, d = 200 m, Pmax = 20 dBm, ρT = −75 dBm,
ρA = −50 dBm, αAA = 2.5, αTA = 3, αTBS = 4, mAA = 5,
mTA = 3, σ 2 = −100 dBm, γA = 0 dB and γT = 0 dB.
Fig. 2 plots the coverage probability of the TBS and the
ABS against the SINR threshold with an ABS height of 200
m and 500 m. The simulation results match very well with the
analytical results. This is because that the ABS is assumed to
be placed directly above the stadium in our model and the
likelihood of the aerial links being LOS is very high. This
validates the use of the tractable power-law path-loss model
for aerial links in our analysis. From this figure, we can see
that if an ABS is placed at a higher altitude, the coverage
probability of the ABS is higher, but the coverage probability
of the TBS is lower. This is discussed in detail next.
Impact of ABS height: Fig. 3 plots the coverage probability
of the TBS against the height of the ABS with different d (i.e.,
distance between the center of the stadium and the TBS) and
different Pmax (i.e., maximum transmit power for the AsUE).
From the figure, we can see that the coverage probability of
the TBS first decreases as the ABS height increase. This is
because the transmit power of the AsUE increases with the
ABS’s height, whereby the interference at the TBS increases.
After a certain ABS height, the coverage probability of the
TBS stays as a constant. This is due to the fact that the AsUE
has reached its maximum transmit power and the interference
generated at the TBS keeps the same on average. Note that
the height where the coverage probability of the TBS starts to
level off is independent of the projection distance between the
center of the stadium and the TBS, but the height increases
with the AsUE maximum transmit power.
Fig. 4 plots the coverage probability of the ABS against the
height of the ABS with different maximum transmit power
of the AsUE. We can see that the simulation results using
the ATG channel model for the aerial links match very well
with the analytical results3 . The figure shows that there is an
3 The analytical performance with the ATG channel model in [15] is the
subject of our ongoing work.
Maximum ABS coverage probability
1
ABS coverage probability
(630,0.9805)
0.9
(394,0.8775)
0.8
(240,0.7363)
0.7
0.6
0.5
0.4
150
Pmax=10dBm
Pmax=15dBm
Pmax=20dBm
Simulation (ATG)
300 400 500 600 700 800 900 1000
1
0.9
h=631 m
h=568 m
h=631 m
99% TBS coverage
90% TBS coverage
80% TBS coverage
h=492 m
h=451 m
h=342 m
h=356 m
0.8
h=174 m
h=242 m
h=131 m
h=234 m
0.7
h=149 m
h=125 m
0.6
150
200
250
300
350
400
ABS height h (m)
Distance between center of stadium and TBS d (m)
Fig. 4. Coverage probability of the ABS versus the ABS height with
different AsUE maximum transmit power and simulation with ATG
aerial link model. The triangle markers denote the optimal ABS height.
Fig. 5. Maximum coverage probability of the ABS versus the distance
between the center of the stadium and the TBS d with different TBS
coverage requirements.
optimal height which can maximize the coverage probability
of the ABS. This optimal height increases with the maximum
transmit power of the AsUE Pmax . From the figure, we find
that the curves with different Pmax are overlapped when h is
small. This comes from the fact that in this certain range, the
transmit power of the AsUE is below Pmax and the AsUE to
ABS link is under full channel inversion. Under full channel
inversion, the average desired signal power received at the
ABS stays the same and the interference power drops as the
height increases. Therefore, the coverage probability increases.
When the ABS height is above the optimal height, the AsUE
transmits with its maximum power Pmax and the received
power of the desired signal reduces as the height increases
further. Hence, the coverage probability starts to drop (e.g.,
the red and green curves in Fig. 4). Furthermore, a larger
AsUE maximum transmit power generally results in a higher
coverage probability of the ABS when the height increases.
Feasibility: From the previous figures, we can see that there
is a trade-off between the coverage probability of the TBS and
the ABS. Fig. 5 plots the maximum coverage probability that
can be achieved at the ABS versus the distance between the
center of the stadium and the TBS d, if 99%, 90% or 80%
coverage probability of the TBS is required. The maximum
achievable ABS coverage probability increases with d and then
becomes almost flat after a certain point.The optimal height
of the ABS cannot be achieved, when d is small. When d
is sufficiently large, the ABS can be placed at its optimal
height, so the optimal coverage probability of the ABS can be
achieved. For instance, from Fig. 5, we can find that for 90%
coverage probability of the TBS, 85% coverage probability of
the ABS can be achieved by placing the ABS at a height of
342 m if the center of the stadium is 300 m apart from the
TBS. Therefore, ABS underlay cellular network is feasible
under practical network setup.
V. C ONCLUSIONS
In this paper, the uplink communication in a two-cell
network with a TBS and an ABS was considered. We derived
the exact expressions for uplink coverage probability of the
TBS and the ABS in terms of the Laplace transforms of
the interference power distribution at the TBS and the ABS
and the distance distribution between the ABS and an i.u.d.
AsUE and between the ABS and an i.u.d. TsUE. Our results
demonstrated the feasibility of establishing an underlay ABS
to provide uplink coverage for temporary events. Future work
can consider the impact of beamforming at the ABS and user
scheduling if there are multiple UEs per channel.
A PPENDIX
1) Proof of Lemma 1: Following the definition of the Laplace
transform, the Laplace transform of the interference power
distribution at the TBS is expressed as
−αTBS
LIT (s) = EIT [exp(−sIT)] = EPa ,h,d [exp(−sPa HA dA
)]
"
#
1
= EPa ,d
,
(15)
TBS
1 + sPa d−α
A
where the third step comes from the fact that HA follows
exponential distribution with unit mean. Conditioned on the
value of h, there are three possible cases for LIT (s). When
q
2
1
( Pρmax
) αAA − r22 < h < ( Pρmax
) αAA , the Laplace transform
A
A
of the interference power distribution at the TBS equals to
1
max ) αAA
( Pρ
Z
LIT (s) =
fZA (z)dz
TBS
1+sρD z αAA d−α
A
"
#
1
Ed
fZA (z)dz
TBS
1 + sPmax d−α
A
Z √h2 +r2
2
max
( Pρ
A
1
) αAA
=
1
Z
max ) αAA
( Pρ
A
Eθ
h
1
1+
sρD z αAA
z 2−h2+d2−2
Z √h2+r2
2
+
max
( Pρ
A
#
1
Ed
h
+
"
A
√
αTBS
2
z 2−h2 d cos Θ
Eθ
1
) αAA
fZ (z)dz
A
1
1+
z 2−h2+d2−2
√
sPmax
− αTBS
2
z 2−h2 d cos Θ
fZ (z)dz
A
(16a)
Z
=
max
( Pρ
A
1
) αAA
h
Z √h2 +r2 Z
2
+
1
max
( Pρ
A
) αAA
Z
2π
LIT (s, ρA z αAA |θ, z)
0
2π
LIT(s,Pmax |θ, z)
0
1
fZ (z)dθdz
2π A
1
fZ (z)dθdz,
2π A
(16b)
where dA is expressed in terms of z, h, d, and θ by cosine
rule in (16a) and (16b) is obtained by taking the expectation
1
over Θ, which
has a conditional pdf as fΘ (θ|z) = 2π
for
p
h 6 z 6 r22 + h2 .
Following similar steps, we can work out the Laplace
transform of the interference power distribution at the TBS
1
for the other two cases, i.e., when h > ( Pρmax
) αAA and
A
q
2
) αAA − r22 .
h 6 ( Pρmax
A
2) Proof of Lemma 2: The relation between the length of the
AsUE to ABS link Z
pA with its projection distance on the
2 + h2 . The distance distribution of
ground rA is ZA = rA
the projection distance on the ground is frA (r) = 2r
[20].
r22
Thus, we can get the pdf of ZA as
√
p
d( z 2 − h2 )
z 2 − h2
frA
dz
√
z
2 z 2 − h2
2z
= √
= 2.
r22
r2
z 2 − h2
fZA (z) =
(17)
3) Proof of Theorem 1: The coverage probability of the TBS
is given by
PT
cov = Pr(SINRT > γT )
γT
2
TBS
= Pr HT >
+
σ
)
(Pa HA d−α
A
ρT
γT
γT 2
2
= E exp − (IT +σ ) = exp − σ LIT (s),
ρT
ρT
(18)
where in the third step we use the fact that the link between
the TsUE and the TBS experiences Rayleigh fading with a pdf
of fHA (h) = exp(−h).
4) Proof of Lemma 4: From the proof of Lemma 2, we know
that in order to find the distribution of the distance ZT between
the TsUE and the ABS, the distribution of its projection
distance rT is needed. Using similar approach in [20, 21], the
distance distribution of rT is derived as
frT (r)=
22r 2 ,
r −r
1
2
22r 2 arcsec
πr1 −πr2
r2 6 r 6 r1 −d
2dr
2
d2 +r 2 −r1
,
r1 −d 6 r 6 r1 +d
. (19)
Using the pdf of the auxiliary random variable rT in (19),
we can obtain Lemma 4.
5) Proof of Theorem 2: The coverage probability of the ABS
is given by
PA
cov = Pr(SINRA > γA )
"
!#
γA
−αTA
2
= EZA Pr GA >
+ σ )|z
−αAA (Pt GT ZT
Pa ZA
"m −1
!
#
n
AA
k
X
X
(−s)n
n
2
2 n−k d
= EZA
exp(−sσ )
(−σ )
LI (s)
n!
k
dsk A
n=0
k=0
Z √ 2 2
h +r2
=
PA
cov (Pa |z)fZA (z)dz,
(20)
h
where the third step comes from the fact that GA follows
Gamma distribution. The transmit power of the AsUE Pa is
given in (1).
R EFERENCES
[1] I. Bor-Yaliniz and H. Yanikomeroglu, “The new frontier in RAN
heterogeneity: Multi-tier drone-cells,” IEEE Commun. Mag., vol. 54,
no. 11, pp. 48–55, Nov. 2016.
[2] S. Chandrasekharan, K. Gomez, A. Al-Hourani, S. Kandeepan,
T. Rasheed, L. Goratti, L. Reynaud, D. Grace, I. Bucaille, T. Wirth, and
S. Allsopp, “Designing and implementing future aerial communication
networks,” IEEE Commun. Mag., vol. 54, no. 5, pp. 26–34, May 2016.
[3] R. Amorim, H. Nguyen, P. Mogensen, I. Z. Kovcs, J. Wigard, and T. B.
Srensen, “Radio channel modeling for UAV communication over cellular
networks,” IEEE Wireless Commun. Lett., vol. 6, no. 4, pp. 514–517,
Aug. 2017.
[4] R. Amorim, P. Mogensen, T. Sorensen, I. Z. Kovacs, and J. Wigard,
“Pathloss measurements and modeling for UAVs connected to cellular
networks,” in Proc. IEEE VTC Spring, Jun. 2017.
[5] A. Al-Hourani and K. Gomez, “Modeling cellular-to-UAV path-loss for
suburban environments,” to appear in IEEE Wireless Commun. Lett.,
2017.
[6] A. Al-Hourani, S. Kandeepan, and A. Jamalipour, “Modeling air-toground path loss for low altitude platforms in urban environments,” in
Proc. IEEE Globecom, Dec. 2014.
[7] A. Fotouhi, M. Ding, and M. Hassan. (2017) “Dronecells: Improving
5G spectral efficiency using drone-mounted flying base stations”.
[Online]. Available: https://arxiv.org/abs/1707.02041
[8] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for
UAV-enabled mobile relaying systems,” IEEE Trans. Commun., vol. 64,
no. 12, pp. 4983–4996, Dec. 2016.
[9] M. Alzenad, A. El-Keyi, F. Lagum, and H. Yanikomeroglu, “3-D placement of an unmanned aerial vehicle base station (UAV-BS) for energyefficient maximal coverage,” IEEE Wireless Commun. Lett., vol. 6, no. 4,
pp. 434–437, Aug. 2017.
[10] H. He, S. Zhang, Y. Zeng, and R. Zhang, “Joint altitude and beamwidth
optimization for UAV-enabled multiuser communications,” to appear in
IEEE Commun. Lett., 2017.
[11] C. Zhang and W. Zhang, “Spectrum sharing for drone networks,” IEEE
J. Sel. Areas Commun., vol. 35, no. 1, pp. 136–144, Jan. 2017.
[12] F. Lagum, I. Bor-Yaliniz, and H. Yanikomeroglu, “Strategic densification with UAV-BSs in cellular networks,” to appear in IEEE Wireless
Commun. Lett., 2017.
[13] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication
design for multi-UAV enabled wireless networks,” to appear in IEEE
Trans. Wireless Commun., 2018.
[14] J. Lyu, Y. Zeng, and R. Zhang, “Spectrum sharing and cyclical multiple
access in UAV-aided cellular offloading,” in Proc. IEEE Globecom, Dec.
2017.
[15] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Unmanned aerial
vehicle with underlaid device-to-device communications: Performance
and tradeoffs,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3949–
3963, Jun. 2016.
[16] V. V. Chetlur and H. S. Dhillon, “Downlink coverage analysis for a
finite 3-D wireless network of unmanned aerial vehicles,” IEEE Trans.
Commun., vol. 65, no. 10, pp. 4543–4558, Oct. 2017.
[17] M. M. Azari, Y. Murillo, O. Amin, F. Rosas, M.-S. Alouini, and
S. Pollin. (2017) “Coverage maximization for a poisson field of drone
cells”. [Online]. Available: https://arxiv.org/abs/1708.06598
[18] B. Galkin, J. Kibilda, and L. A. DaSilva. (2017) “Coverage analysis
for low-altitude UAV networks in urban environments”. [Online].
Available: https://arxiv.org/abs/1704.06214
[19] M. M. Azari, F. Rosas, A. Chiumento, and S. Pollin, “Coexistence of
terrestrial and aerial users in cellular networks,” in Proc. IEEE Globecom
Workshops, Dec. 2017.
[20] J. Guo, S. Durrani, and X. Zhou, “Outage probability in arbitrarilyshaped finite wireless networks,” IEEE Trans. Commun., vol. 62, no. 2,
pp. 699–712, Feb. 2014.
[21] Z. Khalid and S. Durrani, “Distance distributions in regular polygons,”
IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2363–2368, Jun. 2013.
| 7cs.IT
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.